Difference between revisions of "Introduction"

From Hacker Innovation: Redefinition and Examination of Outlaw Sources of Generativity for Future Product Development Strategies (2014) by Mike Pinder
Jump to: navigation, search
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Preface ==
+
[[File:hackers-and-innovation-mike-pinder-3a.png]]
 
+
The current world political climate, post-economic crisis and creative industry’s aggressive responses to disruptive technologies and innovations are forcing governments and policy makers around the World to re-address the effectiveness, suitability and relevance of long established institutions in a digitally connected and distributed world. In the pursuit of economic gain, IP holders, distribution networks and content creators appropriate rent from their internally generated property. These institutions at the same time encroach upon strongly held ethics and values within the hacker political landscape, in some cases reaching critical intersections where the boundaries between open and proprietary developed property become blurred via divergent goals, politics, interests, morals and power. As a result globally distributed hacker teams emerge and operate at the fringes, self-organising, governing and innovating. The aim being open and unrestricted generation of higher value peaks than those developed internally by firms who can held back by tight internal product development cycles built with openly developed systems. This monograph is an in depth discussion of this complex environment and its impacts on firm innovation and hacker innovators communities with the intention of opening up future research avenues.
+
  
 
== Introduction ==
 
== Introduction ==
Line 21: Line 19:
  
 
NEXT: '''Chapter 1.1''' - [[Traditional Conceptions of Hacking]]
 
NEXT: '''Chapter 1.1''' - [[Traditional Conceptions of Hacking]]
 +
  
 
<disqus></disqus>
 
<disqus></disqus>
 +
 +
 +
[[File:hackers-and-innovation-epub-pdf-book111.png|250px|link=http://www.mikepinder.co.uk/store/e-books/hackers-innovation-redefinition-examination-outlaw-sources-generativity-future-product-development-strategies/ ]]
 +
 +
<big>'''''Purchase E-Book (ePub & PDF) Version'''''</big>
 +
 +
You can read the monograph for free online here or you can purchase an ePub and PDF version for your smartphone, tablet, laptop or desktop e-reader.
 +
 +
[[File:add-basket-version.png|link=http://www.mikepinder.co.uk/store/e-books/hackers-innovation-redefinition-examination-outlaw-sources-generativity-future-product-development-strategies/]]
 +
 +
  
 
== Footnotes ==
 
== Footnotes ==
  
 
<references />
 
<references />

Latest revision as of 10:39, 25 April 2016

Hackers-and-innovation-mike-pinder-3a.png

Introduction

Hacking activities can (and in some cases do) involve deviant criminal behaviours, but can also involve legitimate, legal and positive-generative sources of innovation in contrast to our popular cultural conceptions in which the term is predominantly used. Continued heterogeneous usage of the term hacker has created semantic confusion across culture through the use of phrases: a hacker, hacking, a hack and to hack. These terms are frequently used in opposing and sometimes extreme-meaning contexts. In one instance to report on negative, illegal personal data theft whilst on another, lauded by large multinational organisations promoting an upcoming hackathon, hack-night, hack-fest or hack- idol event, in a positive, generative systematic and methodological process to drive creation[1]. Clearly vast meaning confusion resonates across culture and there is a subsequent need to decompose term usages to reveal the spectrum of actual hacker activities taking place.

It is the purpose of this paper to uncover the true foundations of hacking and hackers; their ethics, morals, wider purpose in society and to discuss the activities as potentially useful innovation sources. I will give a brief typology of currently defined forms of hacking with the aim of explicitly and succinctly mapping common hacker traits and differences as well as to understand contravening popular perceptions and why they exist in the first place. I will present an overall picture of the hacking landscape in order to locate areas of potential legal and generative sources of innovation for both firms and end-users alike. Once a clear definition of hacking has been established I will delve into particular form of hacking. One that explores the circumvention of barriers to innovation in order to enable the unlocking of hidden design module configurations held within the architecture and structure of technological artefacts.

Resultant technological hacks that optimise design module configurations are usually made freely available to all stakeholders via networked digital technologies. This is especially fruitful for potential re-absorption and appropriation by firms to in order generate further complimentary sources of value, more inline with wider consumer needs across the adopter categories. I will discuss the impact of hacker activities upon innovation and design processes within organisation and on wider policy making as well as highlight future research directions for this unconventional domain of interest.

Aims

  • To promote a wider understanding of hacking activities and to encourage a semantic re-conceptualisation, clearly distinguished from acts of security cracking.
  • To broaden our perception of hacking activities along an illegal-to-legal dimension and to isolate the point at which hacking becomes positively generative and potentially valuable to firm innovation efforts.
  • To isolate the circumstances and environments under which instances of hacking may be useful, generative and important sources of innovation and value to firms.
  • To explore ways in which hacker communities and firms can co-exist complimentarily and reciprocally, given legal restrictions of IP regimes in light of hacking’s circumvention of current IP frameworks.
  • To open-up future academic research enquiries within hacker innovation studies.


NEXT: Chapter 1.1 - Traditional Conceptions of Hacking


blog comments powered by Disqus


Hackers-and-innovation-epub-pdf-book111.png

Purchase E-Book (ePub & PDF) Version

You can read the monograph for free online here or you can purchase an ePub and PDF version for your smartphone, tablet, laptop or desktop e-reader.

Add-basket-version.png


Footnotes

  1. The annual Pwn2Own hackathon event by CanSecWest, Vancouver, Canada: (http://cansecwest.com); IDEO Labs, Bay Area Hack Night (http://labs.ideo.com/2012/03/13/bay-area-hack-night).