Entry
Reader's guide
Entries A-Z
Subject index
Hacktivism
Hacktivism, considered by many to be an emerging form of deviance, can be defined as computer hacking for a political or social purpose. A complex and controversial concept with multiple definitions, hacktivism is rooted in the merger of computer hacking and political activism. Hacktivism amalgamates the creative use and manipulation of computer systems and technologies with the spirit of political activism. There is considerable public confusion about what constitutes hacktivism, the differences between hacktivism and other types of online deviance, and the motivations of hacktivists.
Historical Roots
The roots of computer hacking lie in the early development of computer networks and the Internet, beginning in the 1960s with the development of ARPANET, an early U.S. network that became the prototype of the Internet, which began to take shape during the 1970s and 1980s. By the 1990s, increasing numbers of computer users sought to acquire greater knowledge of computers and computer networks, to explore them creatively, and to identify and develop new ways of addressing the limitations of existing computer and network technology. These “hackers” developed a deep understanding of computers, software, and computer networks, as well as the ability to creatively explore and manipulate computer systems. The emergent hacker community developed an identifiable set of political and social values. The belief that information needs to be freely available became a core political value for the hacker community, along with the abolition of censorship, mistrust of authority, and opposition to anything that would limit the free flow of information. This evolving culture helped give rise to the free software movement and to the development of free and open source operating systems such as Linux.
Michelle Levesque has shown that, along with the growth of the hacker community, political activists were becoming more aware of the possibilities for integrating Internet technology into their already decentralized communication networks. Activist networks such as PeaceNet (one of the earliest examples of a text-based network that allowed activists to communicate simply and easily) evolved in parallel with the growth of the Internet. She writes that in recognition of the new possibilities for communication made possible by the Internet, more activist groups began to expand their communication networks to take advantage of the open architecture of the rapidly evolving Internet. Very quickly these activists realized that the Internet, and the communication technology that it made possible, was an excellent platform for reaching a vast audience and getting their message to them at little or no cost. The development of the Internet made it possible for activists and groups to communicate across national boundaries quickly and cheaply, and to reach vast new audiences.
The anonymous computer hacker and writer metacOm has argued that hacktivism represents the fusion of the evolution of computer activism with the politicization of hackers. As he also noted, the two communities complement each other because they face the same opposition through the repressive use of laws and technologies by governments and corporations to monitor and control the Internet.
The media has had a significant impact on affecting public understanding of hacktivism. Due in no small part to the role of the media in shaping popular discourse about hacktivism, there is considerable confusion over both the motivations and methods, and even the types of activities that are described as hacktivism. Conceptual confusion over terminology characterizes public understanding and awareness about hacktivism and, consequently, affects social policy. One source of confusion is the failure to distinguish effectively between hacktivism and “cracking.” As metacOm also noted, actions such as unauthorized access to computer systems, denial of service attacks, and defacement of websites have often been incorrectly labeled by media as instances of hacktivism, despite there being little evidence of a political motivation or goal for these actions. The key distinction then is that while hacktivism may encompass instances of breaking into computer systems, among other practices, there is a political motivation involved. As compared with hactivism, cracking involves hacking that is disruptive and lacks the political motive that can be seen in true hacktivism.
...
- Crime, Property
- Crime, Sex
- Crime, Violent
- Crime, White-Collar/Corporate
- Defining Deviance
- Changing Deviance Designations
- Cognitive Deviance
- Conformity
- Constructionist Definitions of Social Problems
- Death of Sociology of Deviance
- Defining Deviance
- Folk Crime
- Hegemony
- Homecomer
- Marginality
- Medicalization of Deviance
- Normal Deviance
- Normalization
- Norms and Societal Expectations
- Positive Deviance
- Positivist Definitions of Deviance
- Primary and Secondary Deviance
- Secret Deviance
- Social Change and Deviance
- Solitary Deviance
- Stranger
- Taboo
- Urban Legends
- Deviance in Social Institutions
- Deviant Subcultures
- Biker Gangs
- Body Modification
- Cockfighting
- Cosplay and Fandom
- Cults
- Dogfighting
- Drag Queens and Kings
- Eunuchs
- Female Bodybuilding
- Fortune-Telling
- Gangs, Street
- Goth Subculture
- Hooliganism
- Metal Culture
- Nudism
- Professional Wrestling
- Punk Subculture
- Rave Culture
- Roller Derby
- Satanism
- Skinheads
- Straight Edge
- Suspension
- Vegetarianism and Veganism
- Discrimination
- Drug Use and Abuse
- Age and Drug Use
- Alcohol and Crime
- Club Drugs
- Cocaine
- Decriminalization and Legalization
- Designer Drugs
- Drug Dependence Treatment
- Drug Normalization
- Drug Policy
- Drug War (War on Drugs)
- Gender and Drug Use
- Heroin
- Legal Highs
- Marijuana
- Methamphetamine
- Performance-Enhancing Drugs
- Prescription Drug Misuse
- Race/Ethnicity and Drug Use
- Socioeconomic Status and Drug Use
- Tobacco and Cigarettes
- Marriage and Family Deviance
- Measuring Deviance
- Mental and Physical Disabilities
- Methodology for Studying Deviance
- Autoethnography
- Collecting Data Online
- Cross-Cultural Methodology
- Edge Ethnography
- Ethics and Deviance Research
- Ethnography and Deviance
- Institutional Review Boards and Studying Deviance
- Interviews
- Participant Observation
- Qualitative Methods in Studying Deviance
- Quantitative Methods in Studying Deviance
- Self-Report Surveys
- Triangulation
- Self-Destructive Deviance
- Sexual Deviance
- Autoerotic Asphyxiation
- Bead Whores
- Bestiality
- Bisexuality
- Bondage and Discipline
- Buckle Bunnies
- Erotica Versus Pornography
- Escorts
- Feederism
- Fetishes
- Furries
- Intersexuality
- Masturbation
- Necrophilia
- Pornography
- Public Sex
- Road Whores
- Sadism and Masochism
- Sex Tourism
- Sexual Addiction
- Sexual Harassment
- Strippers, Female
- Strippers, Male
- Tearooms
- Transgender Lifestyles
- Transsexuals
- Transvestism
- Voyeurism
- Social and Political Protest
- Social Control and Deviance
- Studying Deviant Subcultures
- Technology and Deviance
- Theories of Deviance, Macro
- Anomie Theory
- Broken Windows Thesis
- Chicago School
- Code of the Street
- Conflict Theory
- Feminist Theory
- Institutional Anomie Theory
- Marxist Theory
- Peacemaking Criminology
- Queer Theory
- Routine Activity Theory
- Social Disorganization Theory
- Social Reality Theory
- Southern Subculture of Violence
- Structural Functionalism
- Theories of Deviance, Micro
- Accounts, Sociology of
- Biosocial Perspectives on Deviance
- Constructionist Theories
- Containment Theory
- Control Balance Theory
- Control Theory
- Differential Association Theory
- Dramaturgy
- Drift Theory
- Focal Concerns Theory
- General Strain Theory
- Identity
- Identity Work
- Individualism
- Integrated Theories
- Labeling Approach
- Neutralization Theory
- Phenomenological Theory
- Rational Choice Theory
- Reintegrative Shaming
- Self-Control Theory
- Self-Esteem and Deviance
- Self, The
- Social Bonds
- Social Learning Theory
- Sociolinguistic Theories
- Somatotypes: Sheldon, William
- Symbolic Interactionism
- Transitional Deviance
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches