{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T00:09:39Z","timestamp":1777939779638,"version":"3.51.4"},"reference-count":35,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2005,10,1]],"date-time":"2005-10-01T00:00:00Z","timestamp":1128124800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2005,10]]},"abstract":"<jats:p>This article traces the emergence of the new social movement of hacktivism from hacking and questions its potential as a source of technologically-mediated radical political action. It assesses hacktivism in the light of critical theories of technology that question the feasibility of re-engineering technical systems to more humane ends. The predecessor of hacktivism, hacking, is shown to contain certain parasitical elements that provide a barrier to more politically-orientated goals. Examples are provided of how such goals are much more in evidence within hacktivism. Its alternative conceptualization of the human-technology relationship is examined in terms of a purported development from conceptualizations of networks to webs that incorporate new ways of producing online solidarity and oppositional practices to global capital.<\/jats:p>","DOI":"10.1177\/1461444805056009","type":"journal-article","created":{"date-parts":[[2005,9,14]],"date-time":"2005-09-14T04:20:17Z","timestamp":1126671617000},"page":"625-646","source":"Crossref","is-referenced-by-count":48,"title":["From hackers to hacktivists: speed bumps on the global superhighway?"],"prefix":"10.1177","volume":"7","author":[{"given":"Paul A.","family":"Taylor","sequence":"first","affiliation":[{"name":"University of Leeds, UK,"}]}],"member":"179","published-online":{"date-parts":[[2005,10,1]]},"reference":[{"key":"atypb1","volume-title":"The Culture Industry","author":"Adorno, T.","year":"1991"},{"key":"atypb2","volume-title":"Netocracy: The New Power Elite and Life After Capitalism","author":"Bard, A.","year":"2002"},{"key":"atypb3","volume-title":"For a Critique of the Political Economy of the Sign","author":"Baudrillard, J.","year":"1981"},{"key":"atypb4","volume-title":"America","author":"Baudrillard, J.","year":"1988"},{"key":"atypb5","volume-title":"The Illusion of the End","author":"Baudrillard, J.","year":"1994"},{"key":"atypb6","volume-title":"The Spirit of Terrorism","author":"Baudrillard, J.","year":"2002"},{"key":"atypb7","volume-title":"Cyberselfish: A Critical Romp Through the Terribly Libertarian World of Hi-tech","author":"Boorsook, P.","year":"2000"},{"key":"atypb8","volume-title":"Microserfs","author":"Coupland, D.","year":"1995"},{"key":"atypb9","volume-title":"Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism","author":"Dyer-Witheford, N.","year":"1999"},{"key":"atypb10","volume-title":"Travels in Hyperreality","author":"Eco, U.","year":"1967"},{"key":"atypb11","volume-title":"\u2018Performance Art in a Digital Age: A Conversation with Ricardo Dominguez\u2019","author":"Fusco, C.","year":"1999"},{"key":"atypb12","volume-title":"Neuromancer","author":"Gibson, W.","year":"1984"},{"key":"atypb13","volume-title":"Hacking Cyberspace","author":"Gunkel, D.","year":"2001"},{"key":"atypb14","volume-title":"Empire","author":"Hardt, M.","year":"2000"},{"key":"atypb15","volume-title":"Digital Matters: The Theory and Culture of the Matrix","author":"Harris, J.","year":"2005"},{"key":"atypb16","volume-title":"The Question Concerning Technology and Other Essays","author":"Heidegger, M.","year":"1977"},{"key":"atypb17","doi-asserted-by":"publisher","DOI":"10.4324\/9780203490037"},{"key":"atypb18","doi-asserted-by":"publisher","DOI":"10.4135\/9781446217283"},{"key":"atypb19","first-page":"20","volume-title":"Technology and Social Process","author":"Latour, B.","year":"1988"},{"key":"atypb20","volume-title":"We Have Never Been Modern","author":"Latour, B.","year":"1993"},{"key":"atypb21","volume-title":"Hackers: Heroes of the Computer Revolution","author":"Levy, S.","year":"1984"},{"key":"atypb22","volume-title":"History and Class Consciousness: Studies in Marxist Dialectics","author":"Luk\u00e1cs, G.","year":"1971"},{"key":"atypb23","volume-title":"Perform or Else, From Discipline to Performance","author":"McKenzie, J.","year":"2001"},{"key":"atypb24","volume-title":"The Time of the Tribes: The Decline of Individualism in Mass Society","author":"Maffesoli, M.","year":"1996"},{"key":"atypb25","first-page":"469","volume-title":"The Marx-Engels Reader","author":"Marx, K.","year":"1978"},{"key":"atypb26","volume-title":"Strange Weather","author":"Ross, A.","year":"1991"},{"key":"atypb27","volume-title":"The Cult of Information: The Folklore of Computers and the True Art of Thinking","author":"Roszak, T.","year":"1986"},{"key":"atypb28","volume-title":"\u2018Press Release\u2019","author":"RTMark","year":"2000"},{"key":"atypb29","doi-asserted-by":"publisher","DOI":"10.1080\/13691189809358980"},{"key":"atypb30","doi-asserted-by":"publisher","DOI":"10.4324\/9780203201503"},{"key":"atypb31","first-page":"59","volume-title":"Crime and the Internet","author":"Taylor, P. A.","year":"2001"},{"key":"atypb32","first-page":"126","volume-title":"Dot.cons: Crime Deviance and Identity on the Internet","author":"Taylor, P. A.","year":"2003"},{"key":"atypb33","volume-title":"The Handbook of Information Security","author":"Taylor, P. A.","year":"2005"},{"key":"atypb34","volume-title":"Close to the Machine: Technophilia and its Discontents","author":"Ullman, E.","year":"1997"},{"key":"atypb35","volume-title":"The Network Revolution: Confessions of a Computer Scientist","author":"Vallee, J.","year":"1984"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444805056009","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444805056009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T05:28:22Z","timestamp":1777699702000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444805056009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10]]},"references-count":35,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2005,10]]}},"alternative-id":["10.1177\/1461444805056009"],"URL":"https:\/\/doi.org\/10.1177\/1461444805056009","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,10]]}}}