소장자료
LDR | 02620nam 2200505 4500 | ||
001 | 0100869719▲ | ||
005 | 20250522170031▲ | ||
006 | m o d ▲ | ||
007 | cr#unu||||||||▲ | ||
008 | 250123s2024 us ||||||||||||||c||eng d▲ | ||
020 | ▼a9798384088905▲ | ||
035 | ▼a(MiAaPQ)AAI31674373▲ | ||
035 | ▼a(MiAaPQ)OhioLINKosu1713370199322221▲ | ||
040 | ▼aMiAaPQ▼cMiAaPQ▼d221016▲ | ||
082 | 0 | ▼a808▲ | |
100 | 1 | ▼aTurpin, Christoffer James.▲ | |
245 | 1 | 0 | ▼aDigital Metis; Computer Hacking as Agonistic and Metic Rhetoric▼h[electronic resource].▲ |
260 | ▼a[S.l.]: ▼bThe Ohio State University. ▼c2024▲ | ||
260 | 1 | ▼aAnn Arbor : ▼bProQuest Dissertations & Theses, ▼c2024▲ | |
300 | ▼a1 online resource(176 p.)▲ | ||
500 | ▼aSource: Dissertations Abstracts International, Volume: 86-04, Section: B.▲ | ||
502 | 1 | ▼aThesis (Ph.D.)--The Ohio State University, 2024.▲ | |
520 | ▼aThis dissertation explores the contrast between the Athenian and metic rhetorical paradigms through the lens of the hacker. Arguing the dominant Athenian rhetorical paradigm is marked by public, persuasive, often-disembodied rhetorics in pursuit of epistemic truths, I argue the metic paradigm focuses on stealthy, deceptive, embodied rhetoric in pursuit of advantages over adversaries. Noting how today's digital rhetorical situation is largely adversarial, this dissertation points to the hacker as an exemplar of metic rhetorics. Through three case studies, each focusing on a different type of computer hack, this dissertation explores how the hacker subjectivity is produced and describes its beneficial lines of flight, discusses the interplay of metaphor and physicality in digital activism and cyberwar, and shows how metic rhetorical practices can be leveraged to create a safer and more just world and thus improve personal and organizational cybersecurity.▲ | ||
590 | ▼aSchool code: 0168.▲ | ||
650 | 4 | ▼aRhetoric.▲ | |
650 | 4 | ▼aInformation technology.▲ | |
650 | 4 | ▼aComputer engineering.▲ | |
650 | 4 | ▼aComputer science.▲ | |
653 | ▼aRhetorics▲ | ||
653 | ▼aCybersecurity▲ | ||
653 | ▼aMetis▲ | ||
653 | ▼aDigital activism▲ | ||
653 | ▼aCyberwar▲ | ||
653 | ▼aStructured Query Language Injection▲ | ||
690 | ▼a0681▲ | ||
690 | ▼a0489▲ | ||
690 | ▼a0984▲ | ||
690 | ▼a0464▲ | ||
710 | 2 | 0 | ▼aThe Ohio State University.▼bEnglish.▲ |
773 | 0 | ▼tDissertations Abstracts International▼g86-04B.▲ | |
790 | ▼a0168▲ | ||
791 | ▼aPh.D.▲ | ||
792 | ▼a2024▲ | ||
793 | ▼aEnglish▲ | ||
856 | 4 | 0 | ▼uhttp://www.riss.kr/pdu/ddodLink.do?id=T17164950▼nKERIS▼z이 자료의 원문은 한국교육학술정보원에서 제공합니다.▲ |

Digital Metis; Computer Hacking as Agonistic and Metic Rhetoric[electronic resource]
자료유형
국외eBook
서명/책임사항
Digital Metis; Computer Hacking as Agonistic and Metic Rhetoric [electronic resource].
발행사항
[S.l.] : The Ohio State University. 2024 Ann Arbor : ProQuest Dissertations & Theses , 2024
형태사항
1 online resource(176 p.)
일반주기
Source: Dissertations Abstracts International, Volume: 86-04, Section: B.
학위논문주기
Thesis (Ph.D.)--The Ohio State University, 2024.
요약주기
This dissertation explores the contrast between the Athenian and metic rhetorical paradigms through the lens of the hacker. Arguing the dominant Athenian rhetorical paradigm is marked by public, persuasive, often-disembodied rhetorics in pursuit of epistemic truths, I argue the metic paradigm focuses on stealthy, deceptive, embodied rhetoric in pursuit of advantages over adversaries. Noting how today's digital rhetorical situation is largely adversarial, this dissertation points to the hacker as an exemplar of metic rhetorics. Through three case studies, each focusing on a different type of computer hack, this dissertation explores how the hacker subjectivity is produced and describes its beneficial lines of flight, discusses the interplay of metaphor and physicality in digital activism and cyberwar, and shows how metic rhetorical practices can be leveraged to create a safer and more just world and thus improve personal and organizational cybersecurity.
주제
ISBN
9798384088905
관련 인기대출 도서