Query Result Set
Skip Navigation Links
   ActiveUsers:1584Hits:18278628Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
TANCZER, LEONIE MARIA (3) answer(s).
 
SrlItem
1
ID:   171964


50 shades of hacking: How IT and cybersecurity industry actors perceive good, bad, and former hackers / Tanczer, Leonie Maria   Journal Article
Tanczer, Leonie Maria Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The hacker is the epitome of a cybersecurity threat and the embodied misuse of the Internet. However, in recent years, notions of hacking have begun to change. Blurred boundaries mark the term, best expressed in its overlap with “security researcher.” This article draws on a 3.5-year research project on the hacker community and applies an international political sociology framework to uncover routines of rationalization. Interviews with IT and cybersecurity industry experts expose accepted identities, practices, and behaviors of hackers, which allows for the construction of in-group and out-group members in the IT and cybersecurity field. Additionally, the empirical findings are used to propose a conceptual framework (the Möbius strip) to situate the moral valence of hackers on a flexible model. Thus, the article provides insight into the ontological and normative complexities that define the study of hackers, as well as the perception of IT and cybersecurity professionals.
Key Words Industry  Identity  Hacking  Cybersecurity  Hacker  Security Researcher 
        Export Export
2
ID:   150490


Censorship and surveillance in the digital age: the technological challenges for academics / Tanczer, Leonie Maria   Journal Article
Tanczer, Leonie Maria Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The “Snowden leaks” and censorship methods used during the Arab Spring have brought warranted attention to technologically supported censorship and surveillance (Bauman et al. 2014; Deibert and Crete-Nishihata 2012, 344). The public is now aware how digital tools and information are prone to tracing, interception, and suppression. Processes of eavesdropping and information collection (i.e., surveillance) are often interrelated with processes of removal, displacement, and restriction of material or speech (i.e., censorship). Both are often enshrouded in secrecy, leaving censorship and surveillance techniques open to abuses (Setty 2015).
Key Words Surveillance  Internet  Academic freedom  Encryption  Cryptography  Censorship 
        Export Export
3
ID:   171772


Online Surveillance, Censorship, and Encryption in Academia / Tanczer, Leonie Maria   Journal Article
Tanczer, Leonie Maria Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The Internet and digital technologies have become indispensable in academia. A world without email, search engines, and online databases is practically unthinkable. Yet, in this time of digital dependence, the academy barely demonstrates an appetite to reflect upon the new challenges that digital technologies have brought to the scholarly profession. This forum's inspiration was a roundtable discussion at the 2017 International Studies Association Annual Convention, where many of the forum authors agreed on the need for critical debate about the effects of online surveillance and censorship techniques on scholarship. This forum contains five critiques regarding our digitized infrastructures, datafied institutions, mercenary corporations, exploitative academic platforms, and insecure online practices. Together, this unique collection of articles contributes to the research on academic freedom and helps to frame the analysis of the neoliberal higher education sector, the surveillance practices that students and staff encounter, and the growing necessity to improve our “digital hygiene.”
Key Words Surveillance  Internet  Academic freedom  Encryption  Censorship 
        Export Export