{"id":2,"date":"2012-11-29T07:50:30","date_gmt":"2012-11-29T07:50:30","guid":{"rendered":"http:\/\/blogs.scu.edu\/analyticalhypertext\/?page_id=2"},"modified":"2012-12-05T22:39:40","modified_gmt":"2012-12-05T22:39:40","slug":"sample-page","status":"publish","type":"page","link":"https:\/\/blogs.scu.edu\/analyticalhypertext\/","title":{"rendered":"Intro"},"content":{"rendered":"<div id=\"attachment_60\" style=\"width: 374px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.cartoonstock.com\/directory\/w\/world_superpower.asp\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-60\" class=\" wp-image-60  \" src=\"http:\/\/blogs.scu.edu\/analyticalhypertext\/files\/2012\/11\/nki0158l.jpg\" alt=\"\" width=\"364\" height=\"308\" srcset=\"https:\/\/blogs.scu.edu\/analyticalhypertext\/files\/2012\/11\/nki0158l.jpg 400w, https:\/\/blogs.scu.edu\/analyticalhypertext\/files\/2012\/11\/nki0158l-300x253.jpg 300w, https:\/\/blogs.scu.edu\/analyticalhypertext\/files\/2012\/11\/nki0158l-355x300.jpg 355w\" sizes=\"auto, (max-width: 364px) 100vw, 364px\" \/><\/a><p id=\"caption-attachment-60\" class=\"wp-caption-text\"><a href=\"http:\/\/www.cartoonstock.com\/directory\/w\/world_superpower.asp\">Hacktivism calls hackers to sometimes make enemies with those in power.<\/a><\/p><\/div>\n<p>The typical image of a hacker is that of a solitary male in a dimly lit basement, typing away on his computer until the wee hours of the night. He is probably young and angry at someone, so he is hacking to fight some personal quest for justice.<\/p>\n<p>This image is not necessarily a positive one, and it does not at all cover what it means to be a hacker. The hacking community is very much social, rather than solitary. There are hack-a-thons held regularly across the world. At the yearly, Chaos Communication Camp, hackers join together to fight the good fight.<\/p>\n<p>They are hacktivists.<\/p>\n<p>In the Digital Age, activism is not a dying art. In fact it is alive and well, though much of the movements have moved online. \u00a0So what it Hacktivism? Getting back at the government through computer hacking.<\/p>\n<p>These themes have even made appearances in pop culture. Cory Doctorow&#8217;s young adult novel, Little Brother, directly addresses the possibility for Hacktivism. \u00a0Though set in a dystopian San Francisco, California, the novel highlights some aspects of government control that may already be influencing our lives. But it doesn&#8217;t stop there. Doctorow attempts to empower his readers to standup for our basic rights to privacy through explaining just how hacking and hacktivism can be a part of our every day lives.<\/p>\n<p>This analytical hypertext covers Online Activism, or Hactivism. This topic is broad and so it will be divided into a few major sub categories.\u00a0<a href=\"http:\/\/blogs.scu.edu\/analyticalhypertext\/little-brother-analysis\/\">Hacktivism in Little Brother<\/a>,\u00a0<a href=\"http:\/\/blogs.scu.edu\/analyticalhypertext\/definition-hacktivism\/\">What it is<\/a> (The different types: Cyberattacks, campaigns, and wars), <a href=\"http:\/\/blogs.scu.edu\/analyticalhypertext\/the-purpose\/\">Purpose of Hacktivism<\/a>, <a href=\"http:\/\/blogs.scu.edu\/analyticalhypertext\/examples\/\">Examples<\/a> (WikiLeaks, Blackouts, Arab Spring, Cyber Protests against World Bank, etc.).<\/p>\n<p style=\"text-align: center\"><strong><br \/>\n<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The typical image of a hacker is that of a solitary male in a dimly lit basement, typing away on his computer until the wee hours of the night. He is probably young and angry at someone, so he is &hellip; <a href=\"https:\/\/blogs.scu.edu\/analyticalhypertext\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":299,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"qubely_global_settings":"","qubely_interactions":"","kk_blocks_editor_width":"","_kiokenblocks_attr":"","_kiokenblocks_dimensions":"","footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/users\/299"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":22,"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":134,"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/pages\/2\/revisions\/134"}],"wp:attachment":[{"href":"https:\/\/blogs.scu.edu\/analyticalhypertext\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}