The investigation, arrest, and conviction of a number of high-profile hacker-activists, or hacktivists, reveal the ways subjectivity is mobilized through processes of revelation and evasion. We use the term subjectivation to describe the performative practices engaged in by hacktivists and contrast them with governmental and disciplinary practices of subjection. We elaborate upon two categories of subjectivation (coming out and versioning) and two categories of subjection (doxing and gagging). These categories form the vectors of hacktivist and state coproduction that emerge in selfie-incrimination. We use the term selfie to describe both intentional and inadvertent practices of online self-disclosure. Selfie-incrimination that is public an...
Anonymity has long been discussed as a source of disinhibition. The myth of the Ring of Gyges illust...
Through an empirical examination of the criminalization of the Turkish hacktivist group Redhack in s...
Swaths of personal and nonpersonal information collected online about internet users are increasingl...
This paper describes how hacking can be the act of redefining what is seen and not seen in the conte...
This short essay explores how the notion of hacktivism changes due to easily accessible, military gr...
After WikiLeaks released hundreds of thousands of classified U.S. government documents in 2010, the ...
Summary How hackers and hacking moved from being a target of the state to a key resource for the exp...
Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattack...
Background and aims: Cybercrime is an issue that increases year on year, however rarely are the mo...
Hacktivism is a portmanteau of computer hacking and activism (Wikipedia). Coined in 1996 by Omega, a...
Underground hacking has evolved from its early countercultural roots to become a complex and varied ...
This paper explores the concept of hacktivism, which is hacking for a political or social cause on t...
Individuals rely on digital media to denounce and shame other individuals. This may serve to seek j...
If personae are masks used to communicate a certain character in performance, what happens in rapid ...
Digital media and networks occupy an increasing central position within contemporary societies. This...
Anonymity has long been discussed as a source of disinhibition. The myth of the Ring of Gyges illust...
Through an empirical examination of the criminalization of the Turkish hacktivist group Redhack in s...
Swaths of personal and nonpersonal information collected online about internet users are increasingl...
This paper describes how hacking can be the act of redefining what is seen and not seen in the conte...
This short essay explores how the notion of hacktivism changes due to easily accessible, military gr...
After WikiLeaks released hundreds of thousands of classified U.S. government documents in 2010, the ...
Summary How hackers and hacking moved from being a target of the state to a key resource for the exp...
Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattack...
Background and aims: Cybercrime is an issue that increases year on year, however rarely are the mo...
Hacktivism is a portmanteau of computer hacking and activism (Wikipedia). Coined in 1996 by Omega, a...
Underground hacking has evolved from its early countercultural roots to become a complex and varied ...
This paper explores the concept of hacktivism, which is hacking for a political or social cause on t...
Individuals rely on digital media to denounce and shame other individuals. This may serve to seek j...
If personae are masks used to communicate a certain character in performance, what happens in rapid ...
Digital media and networks occupy an increasing central position within contemporary societies. This...
Anonymity has long been discussed as a source of disinhibition. The myth of the Ring of Gyges illust...
Through an empirical examination of the criminalization of the Turkish hacktivist group Redhack in s...
Swaths of personal and nonpersonal information collected online about internet users are increasingl...