Rights statement: This is an Accepted Manuscript of an article published by Taylor & Francis in Information, Communication & Society on 16 June 2020, available online: https://www.tandfonline.com/doi/abs/10.1080/1369118X.2020.1776368
Accepted author manuscript, 655 KB, PDF document
Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License
Final published version
Research output: Contribution to Journal/Magazine › Journal article › peer-review
State Hacking at the Edge of Code, Capitalism and Culture. / Follis, Luca; Fish, Adam.
In: Information, Communication and Society, Vol. 25, No. 2, 31.01.2022, p. 242-257.Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - State Hacking at the Edge of Code, Capitalism and Culture
AU - Follis, Luca
AU - Fish, Adam
N1 - This is an Accepted Manuscript of an article published by Taylor & Francis in Information, Communication & Society on 16 June 2020, available online: https://www.tandfonline.com/doi/abs/10.1080/1369118X.2020.1776368
PY - 2022/1/31
Y1 - 2022/1/31
N2 - Hacking is a set of practices with code that provides the state an opportunity to defend and expand itself onto the internet. Bringing together science and technology studies and sociology scholarship on boundary objects and boundary work, we develop a theory of the practices of the hacker state. To do this, we investigate weaponized code, the state’s boundary work at hacker conferences, and bug bounty programmes. In the process, we offer a depiction of the hacker state as aggressive, networked, and adaptive.
AB - Hacking is a set of practices with code that provides the state an opportunity to defend and expand itself onto the internet. Bringing together science and technology studies and sociology scholarship on boundary objects and boundary work, we develop a theory of the practices of the hacker state. To do this, we investigate weaponized code, the state’s boundary work at hacker conferences, and bug bounty programmes. In the process, we offer a depiction of the hacker state as aggressive, networked, and adaptive.
KW - Hacker
KW - Hacking
KW - State
KW - Boundary object
KW - Boundary work
U2 - 10.1080/1369118X.2020.1776368
DO - 10.1080/1369118X.2020.1776368
M3 - Journal article
VL - 25
SP - 242
EP - 257
JO - Information, Communication and Society
JF - Information, Communication and Society
SN - 1369-118X
IS - 2
ER -