LEADER 03387oam 22005534a 450 001 9910137187403321 005 20210915045941.0 035 $a(CKB)3710000000534164 035 $a(SSID)ssj0001680226 035 $a(PQKBManifestationID)16496131 035 $a(PQKBTitleCode)TC0001680226 035 $a(PQKBWorkID)15028167 035 $a(PQKB)10543162 035 $a(OCoLC)1181773736 035 $a(MdBmJHUP)muse87163 035 $a(EXLCZ)993710000000534164 100 $a20200729e20202015 uy 0 101 0 $aeng 135 $aurmu#---uuuuu 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMedieval Hackers$fKathleen E. Kennedy 210 1$aBaltimore, Maryland :$cProject Muse,$d2020 210 4$dİ2020 215 $a1 online resource (147 pages) $cillustrations; PDF, digital file(s) 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$aPrint version: 0692352465 320 $aIncludes bibliographical references (pages 149-168). 327 $aMedieval hackers? -- Hacking bread laws -- The first hacker Bible -- Tyndale and the Joye of piracy -- Selling statutes -- Homo hacker? : an epilogue. 330 $aMedieval Hackers calls attention to the use of certain vocabulary terms in the Middle Ages and today: commonness, openness, and freedom. Today we associate this language with computer hackers, some of whom believe that information, from literature to the code that makes up computer programs, should be much more accessible to the general public than it is. In the medieval past these same terms were used by translators of censored texts, including the bible. Only at times in history when texts of enormous cultural importance were kept out of circulation, including our own time, does this vocabulary emerge. Using sources from Anonymous?s Fawkes mask to William Tyndale?s Bible prefaces, Medieval Hackers demonstrates why we should watch for this language when it turns up in our media today. This is important work in media archaeology, for as Kennedy writes in this book, the ?effluorescence of intellectual piracy? in our current moment of political and technological revolutions ?cannot help but draw us to look back and see that the enforcement of intellectual property in the face of traditional information culture has occurred before?.We have seen that despite the radically different stakes involved, in the late Middle Ages, law texts traced the same trajectory as religious texts. In the end, perhaps religious texts serve as cultural bellwethers for the health of the information commons in all areas. As unlikely as it might seem, we might consider seriously the import of an animatronic [John] Wyclif, gesturing us to follow him on a (potentially doomed) quest to preserve the information commons. 606 $aHacking 606 $aHackers 606 $aIntellectual property 606 $aInformation commons 608 $aElectronic books. 615 0$aHacking. 615 0$aHackers. 615 0$aIntellectual property. 615 0$aInformation commons. 676 $a025.5/23 700 $aKennedy$b Kathleen E.$f1975-$0965217 712 02$aProject Muse, 801 0$bMdBmJHUP 801 1$bMdBmJHUP 906 $aBOOK 912 $a9910137187403321 996 $aMedieval hackers$92189841 997 $aUNINA