메뉴 건너뛰기




Volumn 7, Issue 5, 2005, Pages 599-624

The moral ambiguity of social control in cyberspace: A retro-assessment of the 'golden age' of hacking

Author keywords

Computer underground; Hacker crackdown; Hacker ethic; Hackers; Social control in cyberspace

Indexed keywords


EID: 27644464704     PISSN: 14614448     EISSN: None     Source Type: Journal    
DOI: 10.1177/1461444805056008     Document Type: Article
Times cited : (28)

References (76)
  • 1
    • 27644434620 scopus 로고
    • Why the FBI should be concerned about the secret service
    • 2.04, File 3. 23 September
    • Anonymous (1990) 'Why the FBI Should Be Concerned About the Secret Service'. Computer underground Digest, 2.04, File 3. 23 September.
    • (1990) Computer Underground Digest
  • 3
    • 0041450577 scopus 로고
    • URL (consulted 3 June 2005)
    • Barlow, John Perry (1990b) 'Crime and Puzzlement', URL (consulted 3 June 2005): http://www.eff.org/Publications/John_Perry_Barlow/HTML/ crime_and_puzzlement_1.html
    • (1990) Crime and Puzzlement
    • Barlow, J.P.1
  • 4
    • 0039248599 scopus 로고
    • The economy of ideas: A framework for patents and copyrights in the digital age (everything you know about intellectual property is wrong)
    • issue 2.03, March, URL (consulted 3 June 2005)
    • Barlow, John Perry (1994) 'The Economy of Ideas: A Framework for Patents and Copyrights in the Digital Age (Everything You Know About Intellectual Property Is Wrong)' Wired, issue 2.03, March, URL (consulted 3 June 2005): http://www.wired.com/wired/archive/2.03/economy.ideas_pr.html
    • (1994) Wired
    • Barlow, J.P.1
  • 5
    • 0343609948 scopus 로고    scopus 로고
    • URL (consulted 3 June 2005)
    • Barlow, John Perry (1996) 'A Cyberspace Independence Declaration', URL (consulted 3 June 2005): http://archives.theconnection.org/archive/category/ technology/-barlow.shtml
    • (1996) A Cyberspace Independence Declaration
    • Barlow, J.P.1
  • 7
    • 84861267456 scopus 로고    scopus 로고
    • URL (consulted 3 June 2005)
    • BBSLIST (2003) 'BBSes listed on bbslist.textfile.com By Year', URL (consulted 3 June 2005): http://bbslist.textfiles.com/support/statistics.html
    • (2003) BBSes Listed on Bbslist.textfile.com by Year
  • 8
    • 0011599920 scopus 로고
    • Lexington, MA: Lexington
    • Bequai, August (1987) Technocrimes. Lexington, MA: Lexington.
    • (1987) Technocrimes
    • Bequai, A.1
  • 9
    • 84861257698 scopus 로고
    • URL (consulted 3 June 2005)
    • Bickford, Robert (1990) 'Are You a Hacker?', URL (consulted 3 June 2005): http://www.daft.com/~rab/ayah.html
    • (1990) Are You A Hacker?
    • Bickford, R.1
  • 10
    • 27644466112 scopus 로고
    • interview, NBC television, 23 November
    • Bloombecker, Jay (1988) interview, Hour Magazine, NBC television, 23 November.
    • (1988) Hour Magazine
    • Bloombecker, J.1
  • 11
    • 27644500866 scopus 로고
    • Woman indicted as computer hacker mastermind
    • 21 June
    • Camper, John (1989) 'Woman Indicted as Computer Hacker Mastermind', Chicago Tribune, 21 June, p. II-4.
    • (1989) Chicago Tribune
    • Camper, J.1
  • 13
    • 27644577205 scopus 로고
    • Civil liberties hacked to pieces: Jolyon Jenkins refuses to panic over computer crime
    • 9 February
    • 'Civil Liberties Hacked to Pieces: Jolyon Jenkins Refuses to Panic over Computer Crime' (1990) New Statesman & Society, 9 February, p. 27.
    • (1990) New Statesman & Society , pp. 27
  • 14
    • 27644533117 scopus 로고
    • Computer hacker says it's his constitutional right
    • 3 August
    • Clark, Kenneth R. (1992) 'Computer Hacker Says it's His Constitutional Right', Chicago Tribune, 3 August, p. 12.
    • (1992) Chicago Tribune , pp. 12
    • Clark, K.R.1
  • 16
    • 27644560763 scopus 로고
    • Computer hacker ring with a bay area link
    • 9 May
    • 'Computer Hacker Ring with a Bay Area Link' (1990) San Francisco Chronicle, 9 May, p. A-30.
    • (1990) San Francisco Chronicle
  • 17
    • 27644534770 scopus 로고
    • Computer saboteur gets probation
    • 22 October
    • 'Computer Saboteur gets Probation' (1988) Chicago Tribune, 22 October, p. 4.
    • (1988) Chicago Tribune , pp. 4
  • 18
    • 84861256526 scopus 로고
    • Excerpts from 'mad hacker's key party
    • 19 October, URL (consulted 3 June 2005)
    • Computer underground Digest (1991) 'Excerpts from 'Mad Hacker's Key Party', 3(37), 19 October, URL (consulted 3 June 2005): http://venus.soci.niu. edu/~cudigest/CUDS3/cud337.txt
    • (1991) Computer Underground Digest , vol.3 , Issue.37
  • 19
    • 27644445008 scopus 로고
    • ComSec press release
    • 3.24, File 3. July 3
    • ComSec (1991) 'ComSec Press Release', Computer Underground Digest, 3.24, File 3. July 3.
    • (1991) Computer Underground Digest
  • 20
    • 27644451248 scopus 로고
    • RICO: Modern weaponry against software pirates
    • Cooley, Ronald B. (1984) 'RICO: Modern Weaponry Against Software Pirates', Computer Law Journal, 5(2-3): 143-62.
    • (1984) Computer Law Journal , vol.5 , Issue.2-3 , pp. 143-162
    • Cooley, R.B.1
  • 21
    • 27644508581 scopus 로고    scopus 로고
    • Hacktivism and how it got here
    • URL (consulted 3 June 2005)
    • Delio, Michelle (2004) 'Hacktivism and How It Got Here', Wired, URL (consulted 3 June 2005): http://www.wired.com/news/infostructure/0,1377,64193, 00.html
    • (2004) Wired
    • Delio, M.1
  • 22
    • 0346466624 scopus 로고
    • Concerning hackers who break into computers systems
    • paper presented, Washington, DC, 1-4 October
    • Denning, Dorothy E. (1990) 'Concerning Hackers Who Break into Computers Systems', paper presented at the National Computer Security Conference, Washington, DC, 1-4 October.
    • (1990) National Computer Security Conference
    • Denning, D.E.1
  • 23
    • 79957404988 scopus 로고
    • The techno-revolution
    • 'Doctor Crash'
    • 'Doctor Crash' (1986) The Techno-Revolution', Phrack 1(6): Phile 3.
    • (1986) Phrack , vol.1 , Issue.6 , pp. 3
  • 24
    • 84861259287 scopus 로고
    • 19 March, URL (consulted 3 June 2005)
    • EFFector Online (1993) 'Steve Jackson Games Wins Lawsuit Against US Secret Service', 5(4), 19 March, URL (consulted 3 June 2005): http://www.eff.org/EFF/Newsletters/EFFector/effect05.04
    • (1993) Steve Jackson Games Wins Lawsuit Against US Secret Service , vol.5 , Issue.4
  • 25
    • 84970268737 scopus 로고
    • In pursuit of the postmodern: An introduction
    • Featherstone, Mike (1988) 'In Pursuit of the Postmodern: An Introduction', Theory, Culture and Society 2-3(June): 195-215.
    • (1988) Theory, Culture and Society , vol.2-3 , Issue.JUNE , pp. 195-215
    • Featherstone, M.1
  • 26
    • 84861267099 scopus 로고
    • Forgotten victims
    • files 4-5, 4(21), URL (consulted 3 June 2005)
    • 'Forgotten Victims' (1992) Computer Underground Digest, files 4-5, 4(21), URL (consulted 3 June 2005): http://venus.soci.niu.edu/~cudigest/CUDS4/cud421. txt
    • (1992) Computer Underground Digest
  • 27
    • 0003954001 scopus 로고
    • New York: New York Press
    • Gibson, William (1984) Neuromancer. New York: New York Press.
    • (1984) Neuromancer
    • Gibson, W.1
  • 28
    • 27644500752 scopus 로고
    • Hacker, 18, gets prison for fraud
    • 15 February
    • 'Hacker, 18, Gets Prison for Fraud' (1989) Chicago Tribune, 15 February, p. III-1.
    • (1989) Chicago Tribune
  • 30
    • 27644529910 scopus 로고
    • Is computer hacking a crime? A debate from the electronic underground
    • Harper's Forum (1990) 'Is Computer Hacking a Crime? A Debate from the Electronic Underground', Harper's, 280(March): 45-57.
    • (1990) Harper's , vol.280 , Issue.MARCH , pp. 45-57
  • 31
    • 0003897909 scopus 로고
    • [1821] New York: Oxford University Press
    • Hegel, Georg Wilhelm Friedrich (1973[1821]) Hegel's Philosophy of Right. New York: Oxford University Press.
    • (1973) Hegel's Philosophy of Right
    • Hegel, G.W.F.1
  • 35
    • 0242595962 scopus 로고    scopus 로고
    • Cybercrime's scope: Interpreting "access" and "authorization" in computer misuse statutes
    • Kerr, Orin S. (2003) 'Cybercrime's Scope: Interpreting "Access" and "Authorization" in Computer Misuse Statutes', New York University Law Review 78(5): 1596-1668.
    • (2003) New York University Law Review , vol.78 , Issue.5 , pp. 1596-1668
    • Kerr, O.S.1
  • 39
    • 0007198927 scopus 로고
    • The German ideology
    • Karl Marx and Frederick Engels, Moscow: Progress Publishers
    • Marx, Karl (1976) 'The German Ideology', in Karl Marx and Frederick Engels, Collected Works. Vol. 5 1845-1847. Moscow: Progress Publishers.
    • (1976) Collected Works. Vol. 5 1845-1847 , vol.5
    • Marx, K.1
  • 42
    • 27644561637 scopus 로고
    • Hackers, phreakers and pirates: The semantics of the computer age
    • P. Kane (ed.). New York: Bantam
    • Meyer, Gordon R. (1989b) 'Hackers, Phreakers and Pirates: The Semantics of the Computer Age', in P. Kane (ed.), V.I.R.US Protection: Vital Information Resources Under Siege, pp. 74-82. New York: Bantam.
    • (1989) V.I.R.US Protection: Vital Information Resources under Siege , pp. 74-82
    • Meyer, G.R.1
  • 43
    • 84861268597 scopus 로고
    • Fear and loathing in the secret service: A synopsis of GURPS Cyperpunk
    • URL (consulted 3 June 2005)
    • Meyer, Gordon R. (1990) 'Fear and Loathing in the Secret Service: A Synopsis of GURPS Cyperpunk', Computer underground Digest 1(25), URL (consulted 3 June 2005): http://venus.soci.niu.edu/~cudigest/CUDS1/cud126.txt.
    • (1990) Computer Underground Digest , vol.1 , Issue.25
    • Meyer, G.R.1
  • 44
    • 4043097445 scopus 로고
    • The baudy world of the byte bandit: A postmodernist interpretation of the computer underground
    • F. Schmalleger (ed.). Bristol, IN: Wyndham Hall
    • Meyer, Gordon and Jim Thomas (1990) 'The Baudy World of the Byte Bandit: A Postmodernist Interpretation of the Computer Underground', in F. Schmalleger (ed.) Computers in Criminal Justice, pp. 31-67. Bristol, IN: Wyndham Hall.
    • (1990) Computers in Criminal Justice , pp. 31-67
    • Meyer, G.1    Thomas, J.2
  • 45
    • 84934563444 scopus 로고
    • Overcoming the absurd: Prisoner litigation as primitive rebellion
    • Milovanovic, Dragan and Jim Thomas (1989) 'Overcoming the Absurd: Prisoner Litigation as Primitive Rebellion', Social Problems 36(1): 48-60.
    • (1989) Social Problems , vol.36 , Issue.1 , pp. 48-60
    • Milovanovic, D.1    Thomas, J.2
  • 46
    • 1842435111 scopus 로고    scopus 로고
    • Hackers and the contested ontology of cyberspace
    • Nissenbaum, Helen (2004) 'Hackers and the Contested Ontology of Cyberspace', New Media and Society 6(2): 195-217.
    • (2004) New Media and Society , vol.6 , Issue.2 , pp. 195-217
    • Nissenbaum, H.1
  • 47
    • 0013359311 scopus 로고    scopus 로고
    • URL (consulted 3 June 2005)
    • NUA Internet Surveys (2002a) 'How Many Online', URL (consulted 3 June 2005): http://www.nua.ie/surveys/how_many_online/world.html
    • (2002) How Many Online
  • 48
    • 84861261651 scopus 로고    scopus 로고
    • URL (consulted 3 June 2005)
    • NUA Internet Surveys (2002b) 'How Many Online (US and Canada)', URL (consulted 3 June 2005): http://www.nua.ie/surveys/how_many_online/n_america. html
    • (2002) How Many Online (US and Canada)
  • 49
    • 27644555875 scopus 로고
    • Computer hackers seeking to rectify public image
    • 4 December
    • O'Connor, Rory J. (1989) 'Computer Hackers Seeking to Rectify Public Image', Chicago Tribune, 4 December, p. 10.
    • (1989) Chicago Tribune , pp. 10
    • O'Connor, R.J.1
  • 50
    • 84886230072 scopus 로고    scopus 로고
    • (nd) URL (consulted 3 June 2005)
    • Oikarinen, Jarkko (nd) 'IRC History', URL (consulted 3 June 2005): http://www.irc.org/history_docs/jarkko.html
    • IRC History
    • Oikarinen, J.1
  • 52
    • 84861256270 scopus 로고
    • URL (consulted 3 June 2005)
    • PIRATE (1989) 'So You Want to be a Pirate?' 1(June), URL (consulted 3 June 2005): http://www.etext.org/CuD/Pirate/pirate-1
    • (1989) So You Want to Be A Pirate? , vol.1 , Issue.JUNE
  • 53
    • 0010875498 scopus 로고    scopus 로고
    • New York: Black Sheep Books
    • Platt, Charles (1996) Anarchy Online. New York: Black Sheep Books.
    • (1996) Anarchy Online
    • Platt, C.1
  • 54
    • 0025385983 scopus 로고
    • Deterring computer crime
    • Rosenblatt, Kenneth (1990) 'Deterring Computer Crime', Technology Review 93(2): 34-40.
    • (1990) Technology Review , vol.93 , Issue.2 , pp. 34-40
    • Rosenblatt, K.1
  • 55
    • 84861256489 scopus 로고    scopus 로고
    • From here to there
    • 'Ruffin, Oxblood' text#384, 3 June. URL(consulted 24 December 2004)
    • 'Ruffin, Oxblood' (2004) 'From Here to There', Cult of the Dead Cow, text#384, 3 June. URL(consulted 24 December 2004): http://www.cultcow.com/ cDc_files/cDc-0384.html
    • (2004) Cult of the Dead Cow
  • 56
    • 27644595002 scopus 로고
    • The night of the hackers
    • 12 November
    • Sandza, Richard (1984) The Night of the Hackers', Newsweek, 12 November, pp. 17-18.
    • (1984) Newsweek , pp. 17-18
    • Sandza, R.1
  • 58
    • 84861270861 scopus 로고
    • Special on "computer hacking"
    • 27 September
    • Schwartz, Eddie (1988) 'Special on "Computer Hacking'", WGN Radio, 27 September.
    • (1988) WGN Radio
    • Schwartz, E.1
  • 59
    • 27644465090 scopus 로고
    • The hacker dragnet: The feds put a tail on computer crooks - and sideswipe a few innocent bystanders
    • 30 April
    • Schwartz, John (1990) 'The Hacker Dragnet: The Feds Put a Tail on Computer Crooks - and Sideswipe a Few Innocent Bystanders', Newsweek, 30 April, p. 50.
    • (1990) Newsweek , pp. 50
    • Schwartz, J.1
  • 61
    • 27644579370 scopus 로고    scopus 로고
    • URL (consulted 3 June 2005)
    • Stallman, Richard (2001) 'Science Must Push Copyright Aside', URL (consulted 3 June 2005): http://www.nature.com/nature/debates/e-access/Articles/ stallman.html
    • (2001) Science Must Push Copyright Aside
    • Stallman, R.1
  • 63
    • 84861263322 scopus 로고
    • B. Sterling and W. Gibson comments on cyberspace and education
    • 5.54, 20 July, URL (consulted 3 June 2005)
    • Sterling, Bruce (1993) 'B. Sterling and W. Gibson Comments on Cyberspace and Education', Computer underground Digest. 5.54, 20 July, URL (consulted 3 June 2005): http://venus.soci.niu.edu/~cudigest/CUDS5/cud554.txt
    • (1993) Computer Underground Digest
    • Sterling, B.1
  • 66
    • 27644460817 scopus 로고
    • Hollywood hacker: More media and le abuse?
    • #3.09. File 2, March 20
    • Thomas, Jim (1990a) 'Hollywood Hacker: More Media and LE Abuse?' Computer Underground Digest #3.09. File 2, March 20.
    • (1990) Computer Underground Digest
    • Thomas, J.1
  • 67
    • 84861264455 scopus 로고
    • The secret service, E911 and legal rhetoric: Malice in wonderland, part one
    • URL (consulted 3 June 2005)
    • Thomas, Jim (1990b) The Secret Service, E911 and Legal Rhetoric: Malice in Wonderland, Part One', Computer underground Digest 1(19), URL (consulted 3 June 2005): http://venus.soci.niu.edu/~cudigest/CUDS1/cud119.txt
    • (1990) Computer Underground Digest , vol.1 , Issue.19
    • Thomas, J.1
  • 69
    • 27644526338 scopus 로고
    • Joe McCarthy in a leisure suit: (Witch)hunting for the computer underground
    • Thomas, Jim and Gordon Meyer (1990) 'Joe McCarthy in a Leisure Suit: (Witch)Hunting for the Computer Underground', The Critical Criminologist 2(September): 7-8, and 19-20.
    • (1990) The Critical Criminologist , vol.2 , Issue.SEPTEMBER , pp. 7-8
    • Thomas, J.1    Meyer, G.2
  • 71
    • 84861258191 scopus 로고    scopus 로고
    • "Good" hackers being recruited for front line of computer security
    • 22 June
    • Trigaux, Robert (1998) '"Good" Hackers being Recruited for Front Line of Computer Security', Chicago Tribune, 22 June, p. 7.
    • (1998) Chicago Tribune , pp. 7
    • Trigaux, R.1
  • 72
    • 84861262332 scopus 로고
    • Information release
    • (Chicago), 6 February, reprinted URL (consulted 3 June 2005)
    • US Department of Justice (1990) 'Information Release' (Chicago), 6 February, reprinted in Computer underground Digest 1(1), URL (consulted 3 June 2005): http://venus.soci.niu.edu/~cudigest/CUDS1/cud100.txt
    • (1990) Computer Underground Digest , vol.1 , Issue.1
  • 73
    • 27644459333 scopus 로고
    • Oddballs no more, hackers are now a threat
    • 5 March
    • Van, John (1989) 'Oddballs no More, Hackers Are Now a Threat', Chicago Tribune, 5 March, p. IV-4.
    • (1989) Chicago Tribune
    • Van, J.1
  • 74
    • 27644537378 scopus 로고
    • Channel 5, Chicago, 6 February
    • WMAQ Evening News (1990) Channel 5, Chicago, 6 February.
    • (1990) WMAQ Evening News
  • 75
    • 27644523952 scopus 로고
    • Worm case outlined
    • 10 January
    • 'Worm Case Outlined' (1990) Chicago Tribune, 10 January, p. 5.
    • (1990) Chicago Tribune , pp. 5
  • 76
    • 27644576354 scopus 로고
    • Fraud sweep nabs 2 Michigan teens in computer ring
    • 25 May
    • Zablit, Jocelyne (1989) 'Fraud Sweep Nabs 2 Michigan Teens in Computer Ring', Detroit Free Press, 25 May, p. 1.
    • (1989) Detroit Free Press , pp. 1
    • Zablit, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.