메뉴 건너뛰기




Volumn 25, Issue 6, 2009, Pages 1331-1334

A nexus of Cyber-Geography and Cyber-Psychology: Topos/"Notopia" and identity in hacking

Author keywords

Cyber Geography; Cyber Identity; Cyber Psychology; Hacking; Identity; Notopia

Indexed keywords

CYBER-GEOGRAPHY; CYBER-IDENTITY; CYBER-PSYCHOLOGY; HACKING; IDENTITY; NOTOPIA;

EID: 69549129402     PISSN: 07475632     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.chb.2009.05.009     Document Type: Article
Times cited : (12)

References (36)
  • 2
  • 3
    • 1942537606 scopus 로고    scopus 로고
    • Penetration testing and social engineering - hacking the weakest link
    • Barrett N. Penetration testing and social engineering - hacking the weakest link. Information Security Technical Report 8 4 (2003) 56-64
    • (2003) Information Security Technical Report , vol.8 , Issue.4 , pp. 56-64
    • Barrett, N.1
  • 7
    • 34548223308 scopus 로고    scopus 로고
    • A case of mistaken identity? News accounts of hacker, consumer, and organizational responsibility for compromised digital records
    • Erickson K., and Howard P. A case of mistaken identity? News accounts of hacker, consumer, and organizational responsibility for compromised digital records. Journal of Computer-Mediated Communication 12 4 (2007) 1229-1247
    • (2007) Journal of Computer-Mediated Communication , vol.12 , Issue.4 , pp. 1229-1247
    • Erickson, K.1    Howard, P.2
  • 12
    • 85044916062 scopus 로고    scopus 로고
    • Chinese hacking signals age of Info Warfare
    • Inman B. Chinese hacking signals age of Info Warfare. New Perspectives Quarterly 24 4 (2007) 14-15
    • (2007) New Perspectives Quarterly , vol.24 , Issue.4 , pp. 14-15
    • Inman, B.1
  • 13
    • 84978108370 scopus 로고    scopus 로고
    • Site spoofing becomes more popular
    • Hancock B. Site spoofing becomes more popular. Computers and Security 19 7 (2000) 581-583
    • (2000) Computers and Security , vol.19 , Issue.7 , pp. 581-583
    • Hancock, B.1
  • 14
    • 0036088283 scopus 로고    scopus 로고
    • The virtual and the imaginary: The role of diasphoric new media in the construction of a national identity during the break-up of Yugoslavia
    • Kaldor-Robinson J. The virtual and the imaginary: The role of diasphoric new media in the construction of a national identity during the break-up of Yugoslavia. Oxford Development Studies 30 2 (2002) 177-187
    • (2002) Oxford Development Studies , vol.30 , Issue.2 , pp. 177-187
    • Kaldor-Robinson, J.1
  • 15
    • 0033312965 scopus 로고    scopus 로고
    • Hackers: Freedom fighters of the 21st century
    • Kovacich G.L. Hackers: Freedom fighters of the 21st century. Computers and Security 18 7 (1999) 573-576
    • (1999) Computers and Security , vol.18 , Issue.7 , pp. 573-576
    • Kovacich, G.L.1
  • 17
    • 69549090731 scopus 로고    scopus 로고
    • Software could spoof-proof domain names
    • Machlis S. Software could spoof-proof domain names. Computers and Security 16 7 (1997) 621
    • (1997) Computers and Security , vol.16 , Issue.7 , pp. 621
    • Machlis, S.1
  • 18
    • 20444499196 scopus 로고    scopus 로고
    • Exploring identities through the internet: Youth experiences online
    • Maczewski M. Exploring identities through the internet: Youth experiences online. Child and Youth Care Forum 31 2 (2002) 111-129
    • (2002) Child and Youth Care Forum , vol.31 , Issue.2 , pp. 111-129
    • Maczewski, M.1
  • 19
    • 0036180037 scopus 로고    scopus 로고
    • Cybernations: Identity, self-determination, democracy and the "internet effect" in the emerging information order
    • Mills K. Cybernations: Identity, self-determination, democracy and the "internet effect" in the emerging information order. Global Society 16 1 (2002) 69-87
    • (2002) Global Society , vol.16 , Issue.1 , pp. 69-87
    • Mills, K.1
  • 23
    • 0142167572 scopus 로고    scopus 로고
    • Modelling indicators and indices of landscape complexity: An approach using GIS
    • Papadimitriou F. Modelling indicators and indices of landscape complexity: An approach using GIS. Εcological Indicators 2 2 (2002) 17-25
    • (2002) Εcological Indicators , vol.2 , Issue.2 , pp. 17-25
    • Papadimitriou, F.1
  • 25
    • 63049126093 scopus 로고    scopus 로고
    • Papadimitriou, F. (2006). A Geography of Notopia: Hackers et al., hacktivism, urban cybergoups/cybercultures and digital social movements. City 10(3), 317-326.
    • Papadimitriou, F. (2006). A Geography of Notopia: Hackers et al., hacktivism, urban cybergoups/cybercultures and digital social movements. City 10(3), 317-326.
  • 28
    • 44249083758 scopus 로고    scopus 로고
    • The self in cyberspace: Identity formation in postmodern societies and Jung's Self as an objective psyche
    • Roesler Ch. The self in cyberspace: Identity formation in postmodern societies and Jung's Self as an objective psyche. Journal of Analytical Psychology 53 3 (2008) 421-436
    • (2008) Journal of Analytical Psychology , vol.53 , Issue.3 , pp. 421-436
    • Roesler, Ch.1
  • 29
    • 0036036094 scopus 로고    scopus 로고
    • Issues in cybersecurity; understanding the potential risks associated with hackers/crackers
    • Smith A.D., and Rupp W.T. Issues in cybersecurity; understanding the potential risks associated with hackers/crackers. Information Management & Computer Security 10 4 (2002) 178-183
    • (2002) Information Management & Computer Security , vol.10 , Issue.4 , pp. 178-183
    • Smith, A.D.1    Rupp, W.T.2
  • 30
    • 69549104836 scopus 로고    scopus 로고
    • Russian hacker enters fraud plea in citicorp case
    • Starkman D. Russian hacker enters fraud plea in citicorp case. Computers and Security 17 2 (1998) 154
    • (1998) Computers and Security , vol.17 , Issue.2 , pp. 154
    • Starkman, D.1
  • 31
    • 0011560238 scopus 로고
    • IP spoofing and session hijacking
    • Thomsen D. IP spoofing and session hijacking. Network Security 3 (1995) 6-11
    • (1995) Network Security , vol.3 , pp. 6-11
    • Thomsen, D.1
  • 33
    • 0036899311 scopus 로고    scopus 로고
    • Your money or your website?
    • Wales E. Your money or your website?. Computer Fraud & Security 12 (2002) 7-8
    • (2002) Computer Fraud & Security , vol.12 , pp. 7-8
    • Wales, E.1
  • 34
    • 27944488188 scopus 로고    scopus 로고
    • Harvard College, Cambridge, Mass
    • Wark M. A hacker manifesto (2004), Harvard College, Cambridge, Mass
    • (2004) A hacker manifesto
    • Wark, M.1
  • 35
    • 0031327513 scopus 로고    scopus 로고
    • Hyperbole over cyberspace: Self-presentation and social boundaries in internet home pages and discourse
    • Wynn E., and Katz J.E. Hyperbole over cyberspace: Self-presentation and social boundaries in internet home pages and discourse. The Information Society 13 4 (1997) 297-327
    • (1997) The Information Society , vol.13 , Issue.4 , pp. 297-327
    • Wynn, E.1    Katz, J.E.2
  • 36
    • 85045160218 scopus 로고    scopus 로고
    • Computer hacking: Just another case of juvenile delinquency?
    • Yar M. Computer hacking: Just another case of juvenile delinquency?. Howard Journal of Criminal Justice 44 4 (2005) 387-399
    • (2005) Howard Journal of Criminal Justice , vol.44 , Issue.4 , pp. 387-399
    • Yar, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.