1,381
Views
12
CrossRef citations to date
0
Altmetric
Original Articles

Web of resistance: Deleuzian digital space and hacktivism

Pages 334-349 | Received 01 Feb 2015, Accepted 08 Feb 2016, Published online: 06 Apr 2016

References

  • Berlatsky, N. (2015, January 7). Hashtag activism isn’t a copout. The Atlantic. Retrieved August 4, 2015, from http://theatlantic.com
  • Buchanan, I. (2007). Deleuze and the internet. Australian Humanities Review, 43. Retrieved from http://www.australianhumanitiesreview.org
  • Burnett, K. (1993). Toward a theory of hypertextual design. Postmodern Culture, 3(2). Web. Retrieved from July 12, 2015.
  • CAE. (1994). The electronic disturbance. New York, NY: Autonomedia.
  • Carr, D. (2012, March 25). Hashtag activism and its limits. New York Times. Retrieved August 4, 2015 from http://www.nytimes.com
  • Deleuze, G., & Guattari, F. (1987). A thousand plateaus: Capitalism and schizophrenia. (B. Massumi, Trans.). Minneapolis: University of Minnesota Press.
  • Deleuze, G. (1992). Postscript on the societies of control. October, 59, 3–7.
  • Fieni, D. (2012). What a wall wants or how graffiti thinks: Nomad grammatology in the French banlieue. Diacritics, 40, 72–93.
  • Frohmann, B. (2007). Foucault, Deleuze, and the ethics of digital networks. In R. Capurro, J. Fruhbauer, & T. Hausmanninger (Eds.), Localizing the internet. Ethical aspects in intercultural perspective (pp. 57–68). Munich: Fink.
  • Gellman, B., & Poitras, L. (2013, June 7). U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. The Washington Post. Retrieved August 15, 2013 from http://www.washingtonpost.com
  • Gibson, W. (1984). Neuromancer. New York, NY: Ace Books.
  • Goodrum, A. & Manion, M. (2000). The ethics of hacktivism. Journal of Information Ethics, 9, 51–59.
  • Greenberg, A., & Grauer, Y. (2015). Security Bill Passes Senate with Privacy Flaws Unfixed. Wired 27 October. Retrieved October 27, 2015 from https://www.wired.com
  • Gosztola, K. (2015, July 31). During Baltimore uprising, city officals criminalized hashtags & labeled social media postings as ‘threats’. ShadowProof. Retrieved August 1, 2015 from http://shadowproof.com
  • Huschle, B. (2002). Cyber disobedience. International Journal of Applied Philosophy, 16, 69–83.
  • Jarrett, H. M., & Bailie, M. W. (2010). Prosecuting computer crimes. Office of Legal Education Executive Office for United States Attorneys Accessible from US Justice Department. Retrieved October 27, 2015 from http://www.justice.gov
  • Jordan, T., & Taylor, P. (2004). Hacktivism and cyberwars: Rebels without a cause? New York, NY: Routledge.
  • Lucas, D. (2014). The legendary #Anonymous PayPal 14 speak out post-sentencing. The Cryptosphere. Retrieved October 23, 2015 from thecryptosphere.com
  • Nunes, M. (1999). Virtual topographies: Smooth and striated cyberspace. In M. L. Ryan (Ed.). Cyberspace textuality: Computer technology and literary theory (pp. 61–77). Indianapolis: Indiana University Press.
  • Russell, J. (2012, April 16). Anonymous says it took the CIA website offline again with a new DDoS attack. TNW News. Retrieved October 23, 2015 from http://thenextweb.com
  • Sauter, M. (2014). The coming swarm: DDoS actions, hacktivism, and civil disobedience on the internet. London: Bloomsbury.
  • Speer, M. (2014). The complementary aspects of Marshall McLuhan and postmodernism in the literary study of the internet: Exemplified in the rhizome theory of Gilles Deleuze and Felix Guattari. In C. Birkle, A. Krewani, & M. Kuester (Es.). McLuhan’s global village (pp. 47–57). London: Routledge.
  • Vieira, L. M. M., & Ferasso, M. (2010). The rhizomatic structure of cyberspace: Virtuality and its possibilities. International Journal of Networking and Virtual Organisations, 7, 549–559.10.1504/IJNVO.2010.035405
  • Wade, A. G. (2015). There’s a hack for that: Subverting repression through hacktivist modes of freedom. Powerlines, 3(1). Retrieved August 14, 2015, from http://amst.umd.edu/powerlines

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.