Medieval Hackers / Kathleen E. Kennedy.

Medieval Hackers calls attention to the use of certain vocabulary terms in the Middle Ages and today: commonness, openness, and freedom. Today we associate this language with computer hackers, some of whom believe that information, from literature to the code that makes up computer programs, should...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
HerausgeberIn:
Sonstige:
TeilnehmendeR:
Place / Publishing House:Baltimore, Maryland : : Project Muse,, 2020
©2020
Year of Publication:2015
2020
Language:English
Physical Description:1 online resource (147 pages) :; illustrations; PDF, digital file(s).
Notes:Bibliographic Level Mode of Issuance: Monograph
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993547664304498
ctrlnum (CKB)3710000000534164
(SSID)ssj0001680226
(PQKBManifestationID)16496131
(PQKBTitleCode)TC0001680226
(PQKBWorkID)15028167
(PQKB)10543162
(OCoLC)1181773736
(MdBmJHUP)muse87163
(oapen)https://directory.doabooks.org/handle/20.500.12854/38536
(EXLCZ)993710000000534164
collection bib_alma
record_format marc
spelling Kennedy, Kathleen E., 1975- author.
Medieval Hackers Kathleen E. Kennedy.
Brooklyn, NY punctum books 2015
Baltimore, Maryland : Project Muse, 2020
©2020
1 online resource (147 pages) : illustrations; PDF, digital file(s).
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file rda
Bibliographic Level Mode of Issuance: Monograph
Medieval Hackers calls attention to the use of certain vocabulary terms in the Middle Ages and today: commonness, openness, and freedom. Today we associate this language with computer hackers, some of whom believe that information, from literature to the code that makes up computer programs, should be much more accessible to the general public than it is. In the medieval past these same terms were used by translators of censored texts, including the bible. Only at times in history when texts of enormous cultural importance were kept out of circulation, including our own time, does this vocabulary emerge. Using sources from Anonymous’s Fawkes mask to William Tyndale’s Bible prefaces, Medieval Hackers demonstrates why we should watch for this language when it turns up in our media today. This is important work in media archaeology, for as Kennedy writes in this book, the “effluorescence of intellectual piracy” in our current moment of political and technological revolutions “cannot help but draw us to look back and see that the enforcement of intellectual property in the face of traditional information culture has occurred before….We have seen that despite the radically different stakes involved, in the late Middle Ages, law texts traced the same trajectory as religious texts. In the end, perhaps religious texts serve as cultural bellwethers for the health of the information commons in all areas. As unlikely as it might seem, we might consider seriously the import of an animatronic [John] Wyclif, gesturing us to follow him on a (potentially doomed) quest to preserve the information commons.
Also available in print form.
Includes bibliographical references (pages 149-168).
Medieval hackers? -- Hacking bread laws -- The first hacker Bible -- Tyndale and the Joye of piracy -- Selling statutes -- Homo hacker? : an epilogue.
Description based on print version record.
English
Hacking.
Hackers.
Intellectual property.
Information commons.
Electronic books.
medieval history
information commons
hacktivism
media archeology
intellectual property
media studies
Renaissance history
Project Muse, distributor.
Print version: 0692352465
Kennedy, Kathleen E. edt
Kennedy, Kathleen E. oth
language English
format eBook
author Kennedy, Kathleen E., 1975-
spellingShingle Kennedy, Kathleen E., 1975-
Medieval Hackers
Medieval hackers? -- Hacking bread laws -- The first hacker Bible -- Tyndale and the Joye of piracy -- Selling statutes -- Homo hacker? : an epilogue.
author_facet Kennedy, Kathleen E., 1975-
Kennedy, Kathleen E.
Kennedy, Kathleen E.
Project Muse,
author_variant k e k ke kek
author_role VerfasserIn
author2 Kennedy, Kathleen E.
Kennedy, Kathleen E.
Project Muse,
author2_variant k e k ke kek
author2_role HerausgeberIn
Sonstige
TeilnehmendeR
author_sort Kennedy, Kathleen E., 1975-
title Medieval Hackers
title_full Medieval Hackers Kathleen E. Kennedy.
title_fullStr Medieval Hackers Kathleen E. Kennedy.
title_full_unstemmed Medieval Hackers Kathleen E. Kennedy.
title_auth Medieval Hackers
title_new Medieval Hackers
title_sort medieval hackers
publisher punctum books
Project Muse,
publishDate 2015
2020
physical 1 online resource (147 pages) : illustrations; PDF, digital file(s).
Also available in print form.
contents Medieval hackers? -- Hacking bread laws -- The first hacker Bible -- Tyndale and the Joye of piracy -- Selling statutes -- Homo hacker? : an epilogue.
isbn 0692352465
callnumber-first Z - Library Science
callnumber-subject ZA - Information Resources
callnumber-label ZA3270
callnumber-sort ZA 43270 K46 42015
genre Electronic books.
genre_facet Electronic books.
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 020 - Library & information sciences
dewey-ones 025 - Library operations
dewey-full 025.5/23
dewey-sort 225.5 223
dewey-raw 025.5/23
dewey-search 025.5/23
oclc_num 1181773736
work_keys_str_mv AT kennedykathleene medievalhackers
AT projectmuse medievalhackers
status_str c
ids_txt_mv (CKB)3710000000534164
(SSID)ssj0001680226
(PQKBManifestationID)16496131
(PQKBTitleCode)TC0001680226
(PQKBWorkID)15028167
(PQKB)10543162
(OCoLC)1181773736
(MdBmJHUP)muse87163
(oapen)https://directory.doabooks.org/handle/20.500.12854/38536
(EXLCZ)993710000000534164
carrierType_str_mv cr
is_hierarchy_title Medieval Hackers
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
_version_ 1787548669092823041
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03869cam a22006494a 4500</leader><controlfield tag="001">993547664304498</controlfield><controlfield tag="005">20230621140715.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr#mu#---uuuuu</controlfield><controlfield tag="008">200729r20202015nyu o 00 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)3710000000534164</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0001680226</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)16496131</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0001680226</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)15028167</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10543162</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1181773736</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MdBmJHUP)muse87163</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/38536</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)993710000000534164</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MdBmJHUP</subfield><subfield code="c">MdBmJHUP</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">ZA3270</subfield><subfield code="b">.K46 2015</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">025.5/23</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kennedy, Kathleen E.,</subfield><subfield code="d">1975-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Medieval Hackers</subfield><subfield code="c">Kathleen E. Kennedy.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Brooklyn, NY</subfield><subfield code="b">punctum books</subfield><subfield code="c">2015</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Baltimore, Maryland :</subfield><subfield code="b">Project Muse,</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (147 pages) :</subfield><subfield code="b">illustrations; PDF, digital file(s).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Bibliographic Level Mode of Issuance: Monograph</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Medieval Hackers calls attention to the use of certain vocabulary terms in the Middle Ages and today: commonness, openness, and freedom. Today we associate this language with computer hackers, some of whom believe that information, from literature to the code that makes up computer programs, should be much more accessible to the general public than it is. In the medieval past these same terms were used by translators of censored texts, including the bible. Only at times in history when texts of enormous cultural importance were kept out of circulation, including our own time, does this vocabulary emerge. Using sources from Anonymous’s Fawkes mask to William Tyndale’s Bible prefaces, Medieval Hackers demonstrates why we should watch for this language when it turns up in our media today. This is important work in media archaeology, for as Kennedy writes in this book, the “effluorescence of intellectual piracy” in our current moment of political and technological revolutions “cannot help but draw us to look back and see that the enforcement of intellectual property in the face of traditional information culture has occurred before….We have seen that despite the radically different stakes involved, in the late Middle Ages, law texts traced the same trajectory as religious texts. In the end, perhaps religious texts serve as cultural bellwethers for the health of the information commons in all areas. As unlikely as it might seem, we might consider seriously the import of an animatronic [John] Wyclif, gesturing us to follow him on a (potentially doomed) quest to preserve the information commons.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print form.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 149-168).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Medieval hackers? -- Hacking bread laws -- The first hacker Bible -- Tyndale and the Joye of piracy -- Selling statutes -- Homo hacker? : an epilogue.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intellectual property.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information commons.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books. </subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">medieval history</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">information commons</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hacktivism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">media archeology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intellectual property</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">media studies</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Renaissance history</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Project Muse,</subfield><subfield code="e">distributor.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">0692352465</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kennedy, Kathleen E.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kennedy, Kathleen E.</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-08-29 03:32:20 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2015-12-12 16:57:58 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338611850004498&amp;Force_direct=true</subfield><subfield code="Z">5338611850004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338611850004498</subfield></datafield></record></collection>