| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Files spread between Dropbox, Google Drive, Gmail, Slack, and more? Dokkio, a new product from the PBworks team, integrates and organizes them for you. Try it for free today.

View
 

Hactivism

Page history last edited by David Shutkin 7 years, 3 months ago

 

Since 2010, the release of hundreds of thousands of classified U.S. government documents by Wikileaks brought hacktivism to the attention of the world. There are forms of hacktivism that damage computer networks and are waged for financial gain and there are forms of hacktivism advocating for political or social change. Laws in the United States generally prohibit hacktivism. However, there are laws that protect free speech and the right to protest.  Should expressive forms of hacktivism that resemble conventional forms of protest be protected from anti-hacking laws? Post your response to your blog (400+ incredibly thoughtful words, about 6 paragraphs)

 

1. A Weapon We Can’t Control

The New York Times June 24, 2012 By MISHA GLENNY

 

2. Obama Order Sped Up Wave of Cyberattacks Against Iran

The New York Times: June 1, 2012 By DAVID E. SANGER
 

3. Graphic multimedia:  How a Secret Cyberwar Program Worked

 

4. Hampson, N. (2012). Hacktivism: a new breed of protest in a networked world. Boston College International & Comparative Law Review, 35(2), 511-542.

 

5. Jamil, D.  & Khan, M. (2011). Is ethical hacking ethical? International Journal of Engineering Science & Technology3(5), 3758-3763.

 

6. Kushner, D. (2012). MACHINE POLITICS. New Yorker88(12), 24-30.

 

7. Murphy, S. (2011). Agents provocateurs.New Scientist211(2829), 46-49.

 

8. Internet Freedom Coalition

 

 

 

 

Comments (0)

You don't have permission to comment on this page.