Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
hacker_culture [2024/03/31 16:23] ntnsndr [10. Security culture] updating links |
hacker_culture [2024/04/23 18:40] (current) ntnsndr [13. Singularity] |
||
---|---|---|---|
Line 113: | Line 113: | ||
*25 points* | *25 points* | ||
- | Become a goon. The final project for this course is to write an illustrated, 1,800-to-2,000-word report on a real-world hack that for a relevant establishmentarian organization. Pick a hack that particularly fascinates you. | + | Become a goon. The final project for this course is to write an illustrated, 1,800-to-2,000-word report on a real-world hack for a relevant establishmentarian organization. Pick a hack that particularly fascinates you. |
If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance, and a recommendation for what your organization should do about it. | If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance, and a recommendation for what your organization should do about it. | ||
Line 240: | Line 240: | ||
### 13. Singularity | ### 13. Singularity | ||
- | * Alessandro Delfanti and Johan Söderberg, "[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](http://www.ephemerajournal.org/contribution/repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism)," _Ephemera_ 18, no. 3 (2018) | + | * Alessandro Delfanti and Johan Söderberg, "[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](https://ephemerajournal.org/contribution/repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism)," _Ephemera_ 18, no. 3 (2018) |
* Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://www.wired.com/story/now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/)," _Wired_ (January 31, 2018) | * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://www.wired.com/story/now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/)," _Wired_ (January 31, 2018) | ||