2015
DOI: 10.15307/fcj.26.192.2015
|View full text |Cite
|
Sign up to set email alerts
|

FCJ-192 Sand in the Information Society Machine: How Digital Technologies Change and Challenge the Paradigms of Civil Disobedience

Abstract: Abstract:Digital technologies have fostered the rise of new forms of civil disobedience that change and challenge established notions of this form of political action. This paper examines digital civil disobedience using the concept of friction to explore contested entanglements of this kind of protest and its new technological adaptations, as well as tensions on the conceptual level of civil disobedience. The paper is split into in three sections which offer analyses of (a) the historical dimension of this fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…freedom of information) (Coleman, 2011;Kelty, 2008;Young et al, 2007). These hackers are characterized as "digital activists" or as engaging in "digital civil disobedience" (Sauter, 2013;Züger et al, 2015). The hacker group Anonymous demonstrated this political motivation in 2010 with their highly publicized distributed denial-of-service (DDoS) attacks intended to support WikiLeaks and their endeavor to freely publish classified documents (Sauter, 2013).…”
Section: Hacking Behaviorsmentioning
confidence: 99%
“…freedom of information) (Coleman, 2011;Kelty, 2008;Young et al, 2007). These hackers are characterized as "digital activists" or as engaging in "digital civil disobedience" (Sauter, 2013;Züger et al, 2015). The hacker group Anonymous demonstrated this political motivation in 2010 with their highly publicized distributed denial-of-service (DDoS) attacks intended to support WikiLeaks and their endeavor to freely publish classified documents (Sauter, 2013).…”
Section: Hacking Behaviorsmentioning
confidence: 99%