000 | 03189nam a22006017a 4500 | ||
---|---|---|---|
001 | sulb-eb0026456 | ||
003 | BD-SySUS | ||
005 | 20160413122649.0 | ||
007 | cr nn 008mamaa | ||
008 | 120930s2013 ne | s |||| 0|eng d | ||
020 |
_a9789400752764 _9978-94-007-5276-4 |
||
024 | 7 |
_a10.1007/978-94-007-5276-4 _2doi |
|
050 | 4 | _aB65 | |
072 | 7 |
_aLAB _2bicssc |
|
072 | 7 |
_aPHI021000 _2bisacsh |
|
072 | 7 |
_aLAW000000 _2bisacsh |
|
082 | 0 | 4 |
_a340.1 _223 |
100 | 1 |
_aZiccardi, Giovanni. _eauthor. |
|
245 | 1 | 0 |
_aResistance, Liberation Technology and Human Rights in the Digital Age _h[electronic resource] / _cby Giovanni Ziccardi. |
264 | 1 |
_aDordrecht : _bSpringer Netherlands : _bImprint: Springer, _c2013. |
|
300 |
_aVIII, 328 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLaw, Governance and Technology Series ; _v7 |
|
505 | 0 | _aChapter 1 Opening Remarks: Hacking and Digital Dissidence -- Chapter 2 Digital Resistance, Digital Liberties and Digital Transparency -- Chapter 3 Hacking and Digital Dissidence Activities -- Chapter 4 Digital Resistance, Digital Liberties and Human Rights -- Chapter 5 The Use of Liberation Technology -- Chapter 6 Digital Activism, Internet Control, Transparency, Censorship, Surveillance and Human Rights: an International Perspective -- Chapter 7 Conclusions: the Landscape of Digital Liberties and the Future -- Index. . | |
520 | _aThis book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference between hacking and computer crimes, the book explains concepts of hacktivism, the information war between states, a new form of politics (such as open data movements, radical transparency, crowd sourcing and “Twitter Revolutions”), and the hacking of political systems and of state technologies. The book focuses on the protection of human rights in countries with oppressive regimes. | ||
650 | 0 | _aPhilosophy. | |
650 | 0 | _aPolitical science. | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aComputers. | |
650 | 0 | _aLaw and legislation. | |
650 | 0 | _aCriminal law. | |
650 | 0 | _aMass media. | |
650 | 0 | _aLaw. | |
650 | 0 | _aConstitutional law. | |
650 | 1 | 4 | _aPhilosophy. |
650 | 2 | 4 | _aPhilosophy of Law. |
650 | 2 | 4 | _aMedia Law. |
650 | 2 | 4 | _aLegal Aspects of Computing. |
650 | 2 | 4 | _aConstitutional Law. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aCriminal Law. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9789400752757 |
830 | 0 |
_aLaw, Governance and Technology Series ; _v7 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-94-007-5276-4 |
912 | _aZDB-2-SHU | ||
942 |
_2Dewey Decimal Classification _ceBooks |
||
999 |
_c48548 _d48548 |