-
1
-
-
33645758831
-
-
John Perry Barlow Library, accessed June 2011
-
Barlow, John Perry. (1996). A declaration of the independence of cyberspace. John Perry Barlow Library. Available at https://projects.eff.org/~barlow/Declaration-Final.html [accessed June 2011].
-
(1996)
A declaration of the independence of cyberspace
-
-
Barlow, J.P.1
-
6
-
-
51949114541
-
-
accessed June 2011
-
Bethke, Bruce. (1997). The etymology of ‘cyberpunk’. Available at http://www.brucebethke.com/articles/re_cp.html [accessed June 2011].
-
(1997)
The etymology of ‘cyberpunk’
-
-
Bethke, B.1
-
7
-
-
85069819874
-
Cyberpunk as social theory
-
Sallie Westwood and John Williams (eds), London: Routledge, 235-48
-
Burrows, Roger. (1997). Cyberpunk as social theory. In Sallie Westwood and John Williams (eds). Imagining Cities: Scripts, Signs and Memories. London: Routledge, 235-48.
-
(1997)
Imagining Cities: Scripts, Signs and Memories
-
-
Burrows, R.1
-
11
-
-
84994782214
-
-
Leeds Social Sciences Institute Public Guest Lecture, Leeds, 23 October
-
Furedi, Frank. (2006). What is distinct about our rules of fear? Leeds Social Sciences Institute Public Guest Lecture, Leeds, 23 October.
-
(2006)
What is distinct about our rules of fear?
-
-
Furedi, F.1
-
13
-
-
57349198984
-
On the concept of moral panic
-
Garland, David. (2008). On the concept of moral panic. Crime Media Culture, 4(1), 9-30.
-
(2008)
Crime Media Culture
, vol.4
, Issue.1
, pp. 9-30
-
-
Garland, D.1
-
14
-
-
84909017983
-
Burning chrome
-
July. [Reproduced in William Gibson. (1986b). Burning Chrome. New York: Arbor House, 169-91.]
-
Gibson, William. (1982). Burning chrome. Omni Magazine, July. [Reproduced in William Gibson. (1986b). Burning Chrome. New York: Arbor House, 169-91.]
-
(1982)
Omni Magazine
-
-
Gibson, W.1
-
15
-
-
0003954001
-
-
London: Grafton
-
Gibson, William. (1984). Neuromancer. London: Grafton.
-
(1984)
Neuromancer
-
-
Gibson, W.1
-
16
-
-
0141834663
-
-
London: Grafton
-
Gibson, William. (1986a). Count Zero. London: Grafton.
-
(1986)
Count Zero
-
-
Gibson, W.1
-
20
-
-
84878855078
-
Forty years of movie hacking: Considering the potential implications of the popular media representation of computer hackers from 1968 to 2008
-
Gordon, Damian. (2010). Forty years of movie hacking: Considering the potential implications of the popular media representation of computer hackers from 1968 to 2008. International Journal of Internet Technology and Secured Transactions 2(1/2), 59-87.
-
(2010)
International Journal of Internet Technology and Secured Transactions
, vol.2
, Issue.1-2
, pp. 59-87
-
-
Gordon, D.1
-
21
-
-
84994769966
-
Computer hacking and ethics
-
[accessed September 2011]
-
Harvey, Brian. (1985). Computer hacking and ethics, ACM Select Panel on Hacking. Available at http://www.cs.berkeley.edu/~bh/hacker.html [accessed September 2011].
-
(1985)
ACM Select Panel on Hacking
-
-
Harvey, B.1
-
22
-
-
84994770992
-
-
Unprinted Evidence, House of Commons: Culture, Media and Sport Committee, HC 362-II, April. [Nick Davies’ evidence on Tuesday 21 April 2009, Q402-Q495, 125-49, accessed June 2011
-
HOC. (2009). Press standards, privacy and libel, Second report of session 2009-10, Volume 2. Unprinted Evidence, House of Commons: Culture, Media and Sport Committee, HC 362-II, April. [Nick Davies’ evidence on Tuesday 21 April 2009, Q402-Q495, 125-49.] Available at http://www.publications.parliament.uk/pa/cm200910/cmselect/cmcumeds/362/362ii.pdf [accessed June 2011].
-
(2009)
Press standards, privacy and libel, Second report of session 2009-10
, vol.2
-
-
-
23
-
-
84900174260
-
-
Cm 7842, London: Office of Public Sector Information, March, accessed June 2011
-
Home Office. (2010). Cyber Crime Strategy, Cm 7842, London: Office of Public Sector Information, March. Available at http://www.official-documents.gov.uk/document/cm78/7842/7842.pdf [accessed June 2011].
-
(2010)
Cyber Crime Strategy
-
-
-
24
-
-
22144486370
-
Reinventing tradition? Reassurance, neighbourhood security and policing
-
Innes, M. (2004). Reinventing tradition? Reassurance, neighbourhood security and policing. Criminology and Criminal Justice 4(2), 151-71.
-
(2004)
Criminology and Criminal Justice
, vol.4
, Issue.2
, pp. 151-171
-
-
Innes, M.1
-
25
-
-
84994748443
-
-
Paper given to the Social Contexts and Responses to Risk (SCARR) Conference, Kent, UK, 28-30 January, accessed June 2011
-
Innes, M. (2005). Why disorder matters? Antisocial behaviour and incivility as signals of risk. Paper given to the Social Contexts and Responses to Risk (SCARR) Conference, Kent, UK, 28-30 January. Available at http://www.kent.ac.uk/scarr/events/finalpapers/Innes.pdf [accessed June 2011].
-
(2005)
Why disorder matters? Antisocial behaviour and incivility as signals of risk
-
-
Innes, M.1
-
27
-
-
84994761473
-
Haxploitation: The complete Reg guide to hackers in film
-
3 August, accessed June 2011
-
Leyden, John. (2001). Haxploitation: the complete Reg guide to hackers in film. The Register, 3 August. Available at http://www.theregister.co.uk/2001/08/03/haxploitation_the_complete_reg_guide/[accessed June 2011].
-
(2001)
The Register
-
-
Leyden, J.1
-
28
-
-
84994747659
-
Tiger team brings haxploitation to TV: Penetration testing telly show up against the Queen
-
19 December, accessed June 2011
-
Leyden, John. (2007). Tiger team brings haxploitation to TV: Penetration testing telly show up against the Queen. The Register, 19 December. Available at http://www.theregister.co.uk/2007/12/19/tiger_team/[accessed June 2011].
-
(2007)
The Register
-
-
Leyden, J.1
-
29
-
-
84994747663
-
Jean Baudrillard and American popular culture
-
accessed June 2011
-
Longworth, Karina. (2007). Jean Baudrillard and American popular culture, International Journal of Baudrillard Studies, 4(3). Available at http://www.ubishops.ca/baudrillardstudies/vol4_3/v4-3-article58-longworth.html [accessed June 2011].
-
(2007)
International Journal of Baudrillard Studies
, vol.4
, Issue.3
-
-
Longworth, K.1
-
30
-
-
84994770971
-
-
BBC News Online, 22 June, accessed June 2011
-
Mackenzie, Iain. (2011). Who loves the hacktivists? BBC News Online, 22 June. Available at http://www.bbc.co.uk/news/technology-13872755 [accessed June 2011].
-
(2011)
Who loves the hacktivists?
-
-
Mackenzie, I.1
-
31
-
-
80052138945
-
Hacktivism: Assessing the damage
-
Mansfield-Devine, Steve. (2011). Hacktivism: Assessing the damage. Network Security, 2011(8), 5-13.
-
(2011)
Network Security
, vol.2011
, Issue.8
, pp. 5-13
-
-
Mansfield-Devine, S.1
-
32
-
-
84994687211
-
Remember Baudrillard
-
14 March, accessed June 2011
-
McLemee, S. (2007) Remember Baudrillard, Inside Higher Ed, 14 March. Available at http://www.insidehighered.com/views/mclemee/mclemee135 [accessed June 2011].
-
(2007)
Inside Higher Ed
-
-
McLemee, S.1
-
33
-
-
84994686291
-
LulzSec, Anonymous declare ‘war’ on U.S., international gov’ts, banks
-
[accessed June 2011]
-
Mick, Jason. (2011). LulzSec, Anonymous declare ‘war’ on U.S., international gov’ts, banks. Daily Tech. Available at http://www.dailytech.com/LulzSec+Anonymous+Declare+War+on+US+International+Govts+Banks/article21952.htm [accessed June 2011].
-
(2011)
Daily Tech
-
-
Mick, J.1
-
34
-
-
1842435111
-
Hackers and the contested ontology of cyberspace
-
Nissenbaum, Helen. (2004). Hackers and the contested ontology of cyberspace. New Media & Society 6(2), 195-217.
-
(2004)
New Media & Society
, vol.6
, Issue.2
, pp. 195-217
-
-
Nissenbaum, H.1
-
36
-
-
84878174259
-
Notes toward a postcyberpunk manifesto
-
accessed June 2011
-
Person, Lawrence. (1998). Notes toward a postcyberpunk manifesto. Nova Express 16. Available at http://project.cyberpunk.ru/idb/notes_toward_a_ postcyberpunk_manifesto.html [accessed June 2011].
-
(1998)
Nova Express
, pp. 16
-
-
Person, L.1
-
37
-
-
84994687226
-
Hackers at the Movies
-
8 February [accessed June 2011]
-
ScienceDaily. (2010). Hackers at the Movies. ScienceDaily. 8 February. Available at http://www.sciencedaily.com/releases/2010/02/100205120215.htm [accessed June 2011].
-
(2010)
ScienceDaily
-
-
-
39
-
-
0345133779
-
-
London: ROC/Penguin
-
Stephenson, Neal. (1992). Snowcrash. London: ROC/Penguin.
-
(1992)
Snowcrash
-
-
Stephenson, N.1
-
41
-
-
84994786710
-
Why can’t we all get along? How technology, security, and privacy can coexist in the digital age
-
New York: New York University Press, Jack Balkin, James Grimmelmann, Ethan Katz, Nimrod Kozlovski, Shlomit Wagman and Tal Zarsky (eds)
-
Taipale, Kim. (2006). Why can’t we all get along? How technology, security, and privacy can coexist in the digital age. In Jack Balkin, James Grimmelmann, Ethan Katz, Nimrod Kozlovski, Shlomit Wagman and Tal Zarsky (eds). Cybercrime: Digital Cops in a Networked Environment. New York: New York University Press, 151-83.
-
(2006)
Cybercrime: Digital Cops in a Networked Environment
, pp. 151-183
-
-
Taipale, K.1
-
42
-
-
0003934786
-
-
New York: Bantam Books
-
Toffler, Alvin. (1970). Future Shock. New York: Bantam Books.
-
(1970)
Future Shock
-
-
Toffler, A.1
-
44
-
-
51949117093
-
Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime
-
revised 2011, accessed June 2011
-
Wall, David. (2008) [revised 2011]. Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime. Information, Communication & Society 11(6), 861-84. Available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1155155 [accessed June 2011].
-
(2008)
Information, Communication & Society
, vol.11
, Issue.6
, pp. 861-884
-
-
Wall, D.1
|