Description
Once purchased you will be given a download link for both .ePub and .PDF file formats.
Preface
The current world political climate, post-economic crisis and creative industry’s aggressive responses to new disruptive technologies and innovations are forcing governments and policy makers around the World to re-address the effectiveness, suitability and relevance of long established institutions in a digitally connected and distributed World. In the pursuit of economic growth, IP holders, distribution networks and content creators appropriate rents from internally generated or proprietary property but at the same time encroach upon strongly held ethics and values within the hacker landscape, in some cases reaching a critical intersection where the boundaries between open and proprietary developed property have become blurred with divergent goals, politics, interests, morals and power. As a result globally distributed hacker teams emerge and operate at the fringes, self-organising, governing and even innovating. The aim being open and unrestricted generation of higher, more relevant value peaks than those developed internally by firms restricted by and locked into tight internal product development cycles. This monograph is an in depth discussion of this complex environment, its origins, its dynamics and its impact between firm and hacker led innovation where the two can co-exist in a mutually beneficial and essential form. The intention is to promote discussion, inform policy and to open up the area for future research.
Table of Contents
Introduction & Aims
- 1.0 Introduction
Chapter 1
- 1.1 Traditional Conceptions of Hacking
Chapter 2
- 2.1 Re-defining and Understanding True Hacking
- 2.2 Extant Hacker Typology
- 2.3 Hacker Generations and Evolution
Chapter 3
- 3.1 Hacker Ethics and Morals
Chapter 4
- 4.1 Hackers, Problem Solving and Innovation
- 4.2 Hacker Innovation Cycles
Chapter 5
- 5.1 Hacker Innovation and Consumer Artefacts
- 5.2 Product Innovations Designed to be Hacked
- 5.3 Unlocking Generativity through Hacking
Chapter 6
- 6.1 Implications of Hacker Innovation for Firms
- 6.2 Hacking and Counter-cultural Rebellion
Conclusion
- 7.0 Conclusion
References
There are no reviews yet.