Home > Research > Publications & Outputs > State Hacking at the Edge of Code, Capitalism a...

Electronic data

  • State hacking at the edge of code

    Rights statement: This is an Accepted Manuscript of an article published by Taylor & Francis in Information, Communication & Society on 16 June 2020, available online:  https://www.tandfonline.com/doi/abs/10.1080/1369118X.2020.1776368

    Accepted author manuscript, 655 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

State Hacking at the Edge of Code, Capitalism and Culture

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

State Hacking at the Edge of Code, Capitalism and Culture. / Follis, Luca; Fish, Adam.
In: Information, Communication and Society, Vol. 25, No. 2, 31.01.2022, p. 242-257.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Follis L, Fish A. State Hacking at the Edge of Code, Capitalism and Culture. Information, Communication and Society. 2022 Jan 31;25(2):242-257. Epub 2020 Jun 16. doi: 10.1080/1369118X.2020.1776368

Author

Follis, Luca ; Fish, Adam. / State Hacking at the Edge of Code, Capitalism and Culture. In: Information, Communication and Society. 2022 ; Vol. 25, No. 2. pp. 242-257.

Bibtex

@article{55433ed26e244471a66c2d58eed149cf,
title = "State Hacking at the Edge of Code, Capitalism and Culture",
abstract = "Hacking is a set of practices with code that provides the state an opportunity to defend and expand itself onto the internet. Bringing together science and technology studies and sociology scholarship on boundary objects and boundary work, we develop a theory of the practices of the hacker state. To do this, we investigate weaponized code, the state{\textquoteright}s boundary work at hacker conferences, and bug bounty programmes. In the process, we offer a depiction of the hacker state as aggressive, networked, and adaptive.",
keywords = "Hacker, Hacking, State, Boundary object, Boundary work",
author = "Luca Follis and Adam Fish",
note = "This is an Accepted Manuscript of an article published by Taylor & Francis in Information, Communication & Society on 16 June 2020, available online:  https://www.tandfonline.com/doi/abs/10.1080/1369118X.2020.1776368 ",
year = "2022",
month = jan,
day = "31",
doi = "10.1080/1369118X.2020.1776368",
language = "English",
volume = "25",
pages = "242--257",
journal = "Information, Communication and Society",
issn = "1369-118X",
publisher = "Routledge",
number = "2",

}

RIS

TY - JOUR

T1 - State Hacking at the Edge of Code, Capitalism and Culture

AU - Follis, Luca

AU - Fish, Adam

N1 - This is an Accepted Manuscript of an article published by Taylor & Francis in Information, Communication & Society on 16 June 2020, available online:  https://www.tandfonline.com/doi/abs/10.1080/1369118X.2020.1776368

PY - 2022/1/31

Y1 - 2022/1/31

N2 - Hacking is a set of practices with code that provides the state an opportunity to defend and expand itself onto the internet. Bringing together science and technology studies and sociology scholarship on boundary objects and boundary work, we develop a theory of the practices of the hacker state. To do this, we investigate weaponized code, the state’s boundary work at hacker conferences, and bug bounty programmes. In the process, we offer a depiction of the hacker state as aggressive, networked, and adaptive.

AB - Hacking is a set of practices with code that provides the state an opportunity to defend and expand itself onto the internet. Bringing together science and technology studies and sociology scholarship on boundary objects and boundary work, we develop a theory of the practices of the hacker state. To do this, we investigate weaponized code, the state’s boundary work at hacker conferences, and bug bounty programmes. In the process, we offer a depiction of the hacker state as aggressive, networked, and adaptive.

KW - Hacker

KW - Hacking

KW - State

KW - Boundary object

KW - Boundary work

U2 - 10.1080/1369118X.2020.1776368

DO - 10.1080/1369118X.2020.1776368

M3 - Journal article

VL - 25

SP - 242

EP - 257

JO - Information, Communication and Society

JF - Information, Communication and Society

SN - 1369-118X

IS - 2

ER -