Hacktivists and Insurgency
(eVideo)
Contributors:
Published:
[San Francisco, California, USA] : Kanopy Streaming, 2015.
Format:
eVideo
Physical Desc:
1 online resource (streaming video file)
Status:
Kanopy
Description
Enter the netherworld of hacktivism, or the use of computer hacking methods to stage protests and make political statements. In this episode, learn to identify and distinguish the "good guys" from the "bad guys" by exploring real-world examples that illustrate the three major types of hacktivists: political activists, cyber insurgents, and mischief makers.
Copies
Kanopy
More Copies In Prospector
Loading Prospector Copies...
More Details
Language:
Undetermined
Notes
General Note
Title from title frames.
General Note
In Process Record.
Participants/Performers
Features: Paul Rosenzweig The University of Chicago Law School
Date/Time and Place of Event
Originally produced by The Teaching Company/The Great Courses in 2013.
Description
Enter the netherworld of hacktivism, or the use of computer hacking methods to stage protests and make political statements. In this episode, learn to identify and distinguish the "good guys" from the "bad guys" by exploring real-world examples that illustrate the three major types of hacktivists: political activists, cyber insurgents, and mischief makers.
System Details
Mode of access: World Wide Web.
Language
In English
Citations
APA Citation (style guide)
(2015). Hacktivists and Insurgency. [San Francisco, California, USA], Kanopy Streaming.
Chicago / Turabian - Author Date Citation (style guide)2015. Hacktivists and Insurgency. [San Francisco, California, USA], Kanopy Streaming.
Chicago / Turabian - Humanities Citation (style guide)Hacktivists and Insurgency. [San Francisco, California, USA], Kanopy Streaming, 2015.
MLA Citation (style guide)Hacktivists and Insurgency. [San Francisco, California, USA], Kanopy Streaming, 2015.
Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.
Staff View
Grouped Work ID:
4e18aa94-9787-7f6d-408d-3e4e6478124e
Record Information
Last File Modification Time | Sep 02, 2020 05:08:37 AM |
---|---|
Last Grouped Work Modification Time | Sep 02, 2020 05:07:23 AM |
MARC Record
LEADER | 01615ngm a2200361za 4500 | ||
---|---|---|---|
001 | kan1148518 | ||
003 | CaSfKAN | ||
006 | m o c | ||
007 | vz uzazuu | ||
007 | cr una---unuuu | ||
008 | 150908p20152013cau031 o vlund d | ||
028 | 5 | 2 | |a 1148518|b Kanopy |
035 | |a (OCoLC)921957864 | ||
040 | |a VDU|b eng|c VDU | ||
245 | 0 | 0 | |a Hacktivists and Insurgency |
264 | 1 | |a [San Francisco, California, USA] :|b Kanopy Streaming,|c 2015. | |
300 | |a 1 online resource (streaming video file) | ||
306 | |a Duration: 31 minutes | ||
336 | |a two-dimensional moving image|b tdi|2 rdacontent | ||
337 | |a computer|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
500 | |a Title from title frames. | ||
500 | |a In Process Record. | ||
511 | 0 | |a Features: Paul Rosenzweig The University of Chicago Law School | |
518 | |a Originally produced by The Teaching Company/The Great Courses in 2013. | ||
520 | |a Enter the netherworld of hacktivism, or the use of computer hacking methods to stage protests and make political statements. In this episode, learn to identify and distinguish the "good guys" from the "bad guys" by exploring real-world examples that illustrate the three major types of hacktivists: political activists, cyber insurgents, and mischief makers. | ||
538 | |a Mode of access: World Wide Web. | ||
546 | |a In English | ||
653 | |a Computer Science and IT | ||
653 | |a Health and Safety | ||
710 | 2 | |a Kanopy (Firm) | |
856 | 4 | 0 | |u https://broomfield.kanopy.com/node/148519|z A Kanopy streaming video |
856 | 4 | 2 | |z Cover Image|u https://www.kanopy.com/node/148519/external-image |