메뉴 건너뛰기




Volumn , Issue , 2012, Pages 4-18

The devil drives a Lada: The social construction of hackers as cybercriminals

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84994745812     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1057/9780230392083_2     Document Type: Chapter
Times cited : (17)

References (44)
  • 1
    • 33645758831 scopus 로고    scopus 로고
    • John Perry Barlow Library, accessed June 2011
    • Barlow, John Perry. (1996). A declaration of the independence of cyberspace. John Perry Barlow Library. Available at https://projects.eff.org/~barlow/Declaration-Final.html [accessed June 2011].
    • (1996) A declaration of the independence of cyberspace
    • Barlow, J.P.1
  • 6
    • 51949114541 scopus 로고    scopus 로고
    • accessed June 2011
    • Bethke, Bruce. (1997). The etymology of ‘cyberpunk’. Available at http://www.brucebethke.com/articles/re_cp.html [accessed June 2011].
    • (1997) The etymology of ‘cyberpunk’
    • Bethke, B.1
  • 7
    • 85069819874 scopus 로고    scopus 로고
    • Cyberpunk as social theory
    • Sallie Westwood and John Williams (eds), London: Routledge, 235-48
    • Burrows, Roger. (1997). Cyberpunk as social theory. In Sallie Westwood and John Williams (eds). Imagining Cities: Scripts, Signs and Memories. London: Routledge, 235-48.
    • (1997) Imagining Cities: Scripts, Signs and Memories
    • Burrows, R.1
  • 11
    • 84994782214 scopus 로고    scopus 로고
    • Leeds Social Sciences Institute Public Guest Lecture, Leeds, 23 October
    • Furedi, Frank. (2006). What is distinct about our rules of fear? Leeds Social Sciences Institute Public Guest Lecture, Leeds, 23 October.
    • (2006) What is distinct about our rules of fear?
    • Furedi, F.1
  • 13
    • 57349198984 scopus 로고    scopus 로고
    • On the concept of moral panic
    • Garland, David. (2008). On the concept of moral panic. Crime Media Culture, 4(1), 9-30.
    • (2008) Crime Media Culture , vol.4 , Issue.1 , pp. 9-30
    • Garland, D.1
  • 14
    • 84909017983 scopus 로고
    • Burning chrome
    • July. [Reproduced in William Gibson. (1986b). Burning Chrome. New York: Arbor House, 169-91.]
    • Gibson, William. (1982). Burning chrome. Omni Magazine, July. [Reproduced in William Gibson. (1986b). Burning Chrome. New York: Arbor House, 169-91.]
    • (1982) Omni Magazine
    • Gibson, W.1
  • 15
  • 16
    • 0141834663 scopus 로고
    • London: Grafton
    • Gibson, William. (1986a). Count Zero. London: Grafton.
    • (1986) Count Zero
    • Gibson, W.1
  • 20
    • 84878855078 scopus 로고    scopus 로고
    • Forty years of movie hacking: Considering the potential implications of the popular media representation of computer hackers from 1968 to 2008
    • Gordon, Damian. (2010). Forty years of movie hacking: Considering the potential implications of the popular media representation of computer hackers from 1968 to 2008. International Journal of Internet Technology and Secured Transactions 2(1/2), 59-87.
    • (2010) International Journal of Internet Technology and Secured Transactions , vol.2 , Issue.1-2 , pp. 59-87
    • Gordon, D.1
  • 21
    • 84994769966 scopus 로고
    • Computer hacking and ethics
    • [accessed September 2011]
    • Harvey, Brian. (1985). Computer hacking and ethics, ACM Select Panel on Hacking. Available at http://www.cs.berkeley.edu/~bh/hacker.html [accessed September 2011].
    • (1985) ACM Select Panel on Hacking
    • Harvey, B.1
  • 22
    • 84994770992 scopus 로고    scopus 로고
    • Unprinted Evidence, House of Commons: Culture, Media and Sport Committee, HC 362-II, April. [Nick Davies’ evidence on Tuesday 21 April 2009, Q402-Q495, 125-49, accessed June 2011
    • HOC. (2009). Press standards, privacy and libel, Second report of session 2009-10, Volume 2. Unprinted Evidence, House of Commons: Culture, Media and Sport Committee, HC 362-II, April. [Nick Davies’ evidence on Tuesday 21 April 2009, Q402-Q495, 125-49.] Available at http://www.publications.parliament.uk/pa/cm200910/cmselect/cmcumeds/362/362ii.pdf [accessed June 2011].
    • (2009) Press standards, privacy and libel, Second report of session 2009-10 , vol.2
  • 23
    • 84900174260 scopus 로고    scopus 로고
    • Cm 7842, London: Office of Public Sector Information, March, accessed June 2011
    • Home Office. (2010). Cyber Crime Strategy, Cm 7842, London: Office of Public Sector Information, March. Available at http://www.official-documents.gov.uk/document/cm78/7842/7842.pdf [accessed June 2011].
    • (2010) Cyber Crime Strategy
  • 24
    • 22144486370 scopus 로고    scopus 로고
    • Reinventing tradition? Reassurance, neighbourhood security and policing
    • Innes, M. (2004). Reinventing tradition? Reassurance, neighbourhood security and policing. Criminology and Criminal Justice 4(2), 151-71.
    • (2004) Criminology and Criminal Justice , vol.4 , Issue.2 , pp. 151-171
    • Innes, M.1
  • 25
    • 84994748443 scopus 로고    scopus 로고
    • Paper given to the Social Contexts and Responses to Risk (SCARR) Conference, Kent, UK, 28-30 January, accessed June 2011
    • Innes, M. (2005). Why disorder matters? Antisocial behaviour and incivility as signals of risk. Paper given to the Social Contexts and Responses to Risk (SCARR) Conference, Kent, UK, 28-30 January. Available at http://www.kent.ac.uk/scarr/events/finalpapers/Innes.pdf [accessed June 2011].
    • (2005) Why disorder matters? Antisocial behaviour and incivility as signals of risk
    • Innes, M.1
  • 27
    • 84994761473 scopus 로고    scopus 로고
    • Haxploitation: The complete Reg guide to hackers in film
    • 3 August, accessed June 2011
    • Leyden, John. (2001). Haxploitation: the complete Reg guide to hackers in film. The Register, 3 August. Available at http://www.theregister.co.uk/2001/08/03/haxploitation_the_complete_reg_guide/[accessed June 2011].
    • (2001) The Register
    • Leyden, J.1
  • 28
    • 84994747659 scopus 로고    scopus 로고
    • Tiger team brings haxploitation to TV: Penetration testing telly show up against the Queen
    • 19 December, accessed June 2011
    • Leyden, John. (2007). Tiger team brings haxploitation to TV: Penetration testing telly show up against the Queen. The Register, 19 December. Available at http://www.theregister.co.uk/2007/12/19/tiger_team/[accessed June 2011].
    • (2007) The Register
    • Leyden, J.1
  • 29
    • 84994747663 scopus 로고    scopus 로고
    • Jean Baudrillard and American popular culture
    • accessed June 2011
    • Longworth, Karina. (2007). Jean Baudrillard and American popular culture, International Journal of Baudrillard Studies, 4(3). Available at http://www.ubishops.ca/baudrillardstudies/vol4_3/v4-3-article58-longworth.html [accessed June 2011].
    • (2007) International Journal of Baudrillard Studies , vol.4 , Issue.3
    • Longworth, K.1
  • 30
    • 84994770971 scopus 로고    scopus 로고
    • BBC News Online, 22 June, accessed June 2011
    • Mackenzie, Iain. (2011). Who loves the hacktivists? BBC News Online, 22 June. Available at http://www.bbc.co.uk/news/technology-13872755 [accessed June 2011].
    • (2011) Who loves the hacktivists?
    • Mackenzie, I.1
  • 31
    • 80052138945 scopus 로고    scopus 로고
    • Hacktivism: Assessing the damage
    • Mansfield-Devine, Steve. (2011). Hacktivism: Assessing the damage. Network Security, 2011(8), 5-13.
    • (2011) Network Security , vol.2011 , Issue.8 , pp. 5-13
    • Mansfield-Devine, S.1
  • 32
    • 84994687211 scopus 로고    scopus 로고
    • Remember Baudrillard
    • 14 March, accessed June 2011
    • McLemee, S. (2007) Remember Baudrillard, Inside Higher Ed, 14 March. Available at http://www.insidehighered.com/views/mclemee/mclemee135 [accessed June 2011].
    • (2007) Inside Higher Ed
    • McLemee, S.1
  • 33
    • 84994686291 scopus 로고    scopus 로고
    • LulzSec, Anonymous declare ‘war’ on U.S., international gov’ts, banks
    • [accessed June 2011]
    • Mick, Jason. (2011). LulzSec, Anonymous declare ‘war’ on U.S., international gov’ts, banks. Daily Tech. Available at http://www.dailytech.com/LulzSec+Anonymous+Declare+War+on+US+International+Govts+Banks/article21952.htm [accessed June 2011].
    • (2011) Daily Tech
    • Mick, J.1
  • 34
    • 1842435111 scopus 로고    scopus 로고
    • Hackers and the contested ontology of cyberspace
    • Nissenbaum, Helen. (2004). Hackers and the contested ontology of cyberspace. New Media & Society 6(2), 195-217.
    • (2004) New Media & Society , vol.6 , Issue.2 , pp. 195-217
    • Nissenbaum, H.1
  • 36
    • 84878174259 scopus 로고    scopus 로고
    • Notes toward a postcyberpunk manifesto
    • accessed June 2011
    • Person, Lawrence. (1998). Notes toward a postcyberpunk manifesto. Nova Express 16. Available at http://project.cyberpunk.ru/idb/notes_toward_a_ postcyberpunk_manifesto.html [accessed June 2011].
    • (1998) Nova Express , pp. 16
    • Person, L.1
  • 37
    • 84994687226 scopus 로고    scopus 로고
    • Hackers at the Movies
    • 8 February [accessed June 2011]
    • ScienceDaily. (2010). Hackers at the Movies. ScienceDaily. 8 February. Available at http://www.sciencedaily.com/releases/2010/02/100205120215.htm [accessed June 2011].
    • (2010) ScienceDaily
  • 39
  • 41
    • 84994786710 scopus 로고    scopus 로고
    • Why can’t we all get along? How technology, security, and privacy can coexist in the digital age
    • New York: New York University Press, Jack Balkin, James Grimmelmann, Ethan Katz, Nimrod Kozlovski, Shlomit Wagman and Tal Zarsky (eds)
    • Taipale, Kim. (2006). Why can’t we all get along? How technology, security, and privacy can coexist in the digital age. In Jack Balkin, James Grimmelmann, Ethan Katz, Nimrod Kozlovski, Shlomit Wagman and Tal Zarsky (eds). Cybercrime: Digital Cops in a Networked Environment. New York: New York University Press, 151-83.
    • (2006) Cybercrime: Digital Cops in a Networked Environment , pp. 151-183
    • Taipale, K.1
  • 42
    • 0003934786 scopus 로고
    • New York: Bantam Books
    • Toffler, Alvin. (1970). Future Shock. New York: Bantam Books.
    • (1970) Future Shock
    • Toffler, A.1
  • 44
    • 51949117093 scopus 로고    scopus 로고
    • Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime
    • revised 2011, accessed June 2011
    • Wall, David. (2008) [revised 2011]. Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime. Information, Communication & Society 11(6), 861-84. Available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1155155 [accessed June 2011].
    • (2008) Information, Communication & Society , vol.11 , Issue.6 , pp. 861-884
    • Wall, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.