메뉴 건너뛰기




Volumn 8, Issue 2, 2003, Pages

The Internet, information architecture and community memory

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; ECONOMIC AND SOCIAL EFFECTS; ELECTRIC NETWORK ANALYSIS; INTERNET; PUBLIC POLICY; RESOURCE ALLOCATION; SAFETY FACTOR; STUDENTS; SUSTAINABLE DEVELOPMENT; TECHNOLOGY TRANSFER;

EID: 2942704293     PISSN: 10836101     EISSN: None     Source Type: Journal    
DOI: 10.1111/j.1083-6101.2003.tb00208.x     Document Type: Conference Paper
Times cited : (5)

References (43)
  • 2
    • 33746623454 scopus 로고    scopus 로고
    • Retrieved November 21, 2002
    • Anderson, R. J. (1996). The eternity service. Retrieved November 21, 2002 from http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html.
    • (1996) The Eternity Service
    • Anderson, R.J.1
  • 3
    • 0037772953 scopus 로고    scopus 로고
    • The advent of netwar
    • J. Arquilla & D. Ronfeldt (Eds.). Santa Monica, CA: RAND
    • Arquilla, J., & Ronfeldt, D. (1997a). The advent of netwar. In J. Arquilla & D. Ronfeldt (Eds.), In Athena's camp (pp. 275-293). Santa Monica, CA: RAND.
    • (1997) Athena's Camp , pp. 275-293
    • Arquilla, J.1    Ronfeldt, D.2
  • 4
    • 53849149446 scopus 로고    scopus 로고
    • Looking ahead: Preparing for information-age conflict
    • J. Arquilla & D. Ronfeldt (Eds.). Santa Monica, CA: RAND
    • Arquilla, J., & Ronfeldt, D. (1997b). Looking ahead: Preparing for information-age conflict. In J. Arquilla & D. Ronfeldt (Eds.), In Athena's camp (pp. 439-493). Santa Monica, CA: RAND.
    • (1997) Athena's Camp , pp. 439-493
    • Arquilla, J.1    Ronfeldt, D.2
  • 5
    • 84876617059 scopus 로고    scopus 로고
    • Battening down the hatches with Bastille
    • Bauer, M. (2001). Battening down the hatches with Bastille. Linux Journal, 84, 30+.
    • (2001) Linux Journal , vol.84 , pp. 30
    • Bauer, M.1
  • 6
    • 0038024282 scopus 로고
    • Leaderless resistance
    • Retrieved November 21, 2002
    • Beam, L. (1992). Leaderless resistance, The Seditionist 12. Retrieved November 21, 2002 from http://www.louisbeam.com/leaderless.htm.
    • (1992) The Seditionist , vol.12
    • Beam, L.1
  • 9
    • 0001078041 scopus 로고    scopus 로고
    • Small states and cyberboosterism
    • Brunn, S., & Cottle, C. (1997). Small states and cyberboosterism. The Geographical Review 87(2), 240-258.
    • (1997) The Geographical Review , vol.87 , Issue.2 , pp. 240-258
    • Brunn, S.1    Cottle, C.2
  • 10
    • 84876594257 scopus 로고    scopus 로고
    • Information interventions, media development and the Internet
    • M. Price & M. Thompson (Eds.). Edinburgh: Edinburgh University Press
    • Carmichael, P. (2002a). Information interventions, media development and the Internet. In M. Price & M. Thompson (Eds.), Forging peace: Information, human rights, and the management of media space (pp. 365-392). Edinburgh: Edinburgh University Press.
    • (2002) Forging Peace: Information, Human Rights, and the Management of Media Space , pp. 365-392
    • Carmichael, P.1
  • 12
    • 84876639551 scopus 로고    scopus 로고
    • CERT Coordination Center Software Engineering Institute. Retrieved November 21, 2002
    • CERT (1999). Distributed denial of service tools (CERT incident note IN-99-07). CERT Coordination Center Software Engineering Institute. Retrieved November 21, 2002 from http://www.cert.org/incident_notes/IN-99-07.html.
    • (1999) Distributed Denial of Service Tools (CERT Incident Note IN-99-07)
  • 14
    • 84876641135 scopus 로고    scopus 로고
    • Gold water poured on Sealand security
    • June 6. Retrieved November 21, 2002
    • Cohen, D. (2000, June 6). Gold water poured on Sealand security. The Guardian. Retrieved November 21, 2002 from http://www.guardian.co.uk/business/ story/0,3604,328707,00.html.
    • (2000) The Guardian
    • Cohen, D.1
  • 16
    • 84876612408 scopus 로고    scopus 로고
    • On guard: Fortifying your site against attack
    • Curtin, M. (2000). On guard: Fortifying your site against attack. Web Techniques, 5(4), 46-50.
    • (2000) Web Techniques , vol.5 , Issue.4 , pp. 46-50
    • Curtin, M.1
  • 19
    • 2942736657 scopus 로고    scopus 로고
    • Welcome to Sealand. Now bugger off
    • Retrieved November 21, 2002
    • Garfinkel, S. (2000). Welcome to Sealand. Now bugger off. Wired, 8(7). Retrieved November 21, 2002 from http://www.wired.eom/wired/archive/8.07/haven. html.
    • (2000) Wired , vol.8 , Issue.7
    • Garfinkel, S.1
  • 24
    • 0041052165 scopus 로고
    • Richmond, VA: Historical Review Press
    • Harwood, R. [Richard Verrall] (1975) Did six million really die? Richmond, VA: Historical Review Press.
    • (1975) Did Six Million Really Die?
    • Harwood, R.1
  • 29
    • 84876644421 scopus 로고    scopus 로고
    • Tactical media as a tool for survival in the war zone
    • February. J. Beasley-Murray, P. Husbands, & V. Brown (Chairs), Duke University, Durham, North Carolina
    • Markovic, I. (1998, February). Tactical media as a tool for survival in the war zone. In J. Beasley-Murray, P. Husbands, & V. Brown (Chairs), Globalization from below: Contingency, conflict, contestation in historical perspective, Duke University, Durham, North Carolina.
    • (1998) Globalization from below: Contingency, Conflict, Contestation in Historical Perspective
    • Markovic, I.1
  • 30
    • 84876637579 scopus 로고    scopus 로고
    • February 17. Message posted to the BIND Users electronic mailing list
    • Miller, A. (2000, February 17). NNTP IP Address spoofing, tracing abuse. Message posted to the BIND Users electronic mailing list, archived at http://www.isc.org/ml-archives/bind-users/2000/02/msg00597.html.
    • (2000) NNTP IP Address Spoofing, Tracing Abuse
    • Miller, A.1
  • 31
    • 84937325621 scopus 로고    scopus 로고
    • Increasing the reusability of qualitative data with XML
    • Retrieved November 20, 2002
    • Muhr, T. (2000) Increasing the reusability of qualitative data with XML. Forum Qualitative Sozialforschung, 1(3). Retrieved November 20, 2002 from http://qualitative-research.net/fqs-texte/3-00/3-00muhr-e.htm.
    • (2000) Forum Qualitative Sozialforschung , vol.1 , Issue.3
    • Muhr, T.1
  • 36
    • 0038244140 scopus 로고
    • National Institute of Standards and Technology, U.S. Department of Commerce. Retrieved November 21, 2002
    • Wack, J., & Carnahan, L. (1995). Keeping your site comfortably secure: An introduction to Internet firewalls. National Institute of Standards and Technology, U.S. Department of Commerce. Retrieved November 21, 2002, from http://csrc.nist.gov/publications/nistpubs/800-10/node31.html.
    • (1995) Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls
    • Wack, J.1    Carnahan, L.2
  • 37
    • 85084163931 scopus 로고    scopus 로고
    • Publius: A robust, tamper-evident, censorship-resistant Web publishing system
    • August. S. Bellovin & G. Rose (Chairs), Denver, Colorado
    • Waldman, M., Rubin, A., & and Cranor, L. (2000, August). Publius: A robust, tamper-evident, censorship-resistant Web publishing system. In S. Bellovin & G. Rose (Chairs), 9th Usenix Security Symposium, Denver, Colorado.
    • (2000) 9th Usenix Security Symposium
    • Waldman, M.1    Rubin, A.2    Cranor, L.3
  • 39
    • 84944416435 scopus 로고    scopus 로고
    • Cyberspace: A new medium for communication and command and control by extremists
    • Whine, M. (1999). Cyberspace: A new medium for communication and command and control by extremists. Studies in Conflict and Terrorism 22(3), 231-245.
    • (1999) Studies in Conflict and Terrorism , vol.22 , Issue.3 , pp. 231-245
    • Whine, M.1
  • 40
    • 2942711144 scopus 로고    scopus 로고
    • Interoperability through gateways
    • A. Oram (Ed.). Sebastopol, CA: O'Reilly Associates
    • Wiley, B. (2001). Interoperability through gateways. In A. Oram (Ed.), Peer-to-peer: Harnessing disruptive technologies (pp.381-392). Sebastopol, CA: O'Reilly Associates.
    • (2001) Peer-to-peer: Harnessing Disruptive Technologies , pp. 381-392
    • Wiley, B.1
  • 41
    • 84876594922 scopus 로고    scopus 로고
    • Retrieved November 21, 2002
    • Yee, D. (2001). Cyberhate conference report. Retrieved November 21, 2002 from http://danny.oz.au/freedom/hate/cyberhate.htm.
    • (2001) Cyberhate Conference Report
    • Yee, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.