Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
hacker_culture [2024/03/31 16:23]
ntnsndr [10. Security culture] updating links
hacker_culture [2024/04/23 18:40]
ntnsndr [13. Singularity]
Line 113: Line 113:
 *25 points* *25 points*
  
-Become a goon. The final project for this course is to write an illustrated,​ 1,​800-to-2,​000-word report on a real-world hack that for a relevant establishmentarian organization. Pick a hack that particularly fascinates you.+Become a goon. The final project for this course is to write an illustrated,​ 1,​800-to-2,​000-word report on a real-world hack for a relevant establishmentarian organization. Pick a hack that particularly fascinates you.
  
 If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance,​ and a recommendation for what your organization should do about it. If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance,​ and a recommendation for what your organization should do about it.
Line 240: Line 240:
 ### 13. Singularity ### 13. Singularity
  
-  * Alessandro Delfanti and Johan Söderberg, "​[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](http://www.ephemerajournal.org/​contribution/​repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism),"​ _Ephemera_ 18, no. 3 (2018)+  * Alessandro Delfanti and Johan Söderberg, "​[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](https://​ephemerajournal.org/​contribution/​repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism),"​ _Ephemera_ 18, no. 3 (2018)
   * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://​www.wired.com/​story/​now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/​),"​ _Wired_ (January 31, 2018)   * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://​www.wired.com/​story/​now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/​),"​ _Wired_ (January 31, 2018)