-
1
-
-
85069558590
-
-
Digital Life No. 6
-
Baker, Steve (1995) ‘Digital life no. 6’, available at: http://www.taponline.com/tap/tech/net-tools/digital/digital.html.
-
(1995)
-
-
Baker, S.1
-
2
-
-
79954955610
-
-
trans. Guido Waldman, London: Harvill Press
-
Baricco, A. (1997) Silk, trans. Guido Waldman, London: Harvill Press.
-
(1997)
Silk
-
-
Baricco, A.1
-
3
-
-
0041450577
-
Crime and puzzlement
-
fall 1990
-
Barlow, J.P. (1990) ‘Crime and puzzlement’, Whole Earth Review, fall 1990:44-57.
-
(1990)
Whole Earth Review
, pp. 44-57
-
-
Barlow, J.P.1
-
7
-
-
0011599920
-
-
Lexington, MA: Lexington Books
-
Bequai, A. (1987) Technocrimes, Lexington, MA: Lexington Books.
-
(1987)
Technocrimes
-
-
Bequai, A.1
-
8
-
-
0039190419
-
-
London: Orbit
-
Besher, A. (1994) Rim, London: Orbit.
-
(1994)
Rim
-
-
Besher, A.1
-
9
-
-
34250071433
-
Do not despair: There is life after constructivism
-
winter 1993
-
Bijker, WE. (1993) ‘Do not despair: There is life after constructivism’, Science, Technology, &Human Values 18(1), winter 1993:113-38.
-
(1993)
Science, Technology, &Human Values
, vol.18
, Issue.1
, pp. 113-138
-
-
Bijker, W.E.1
-
10
-
-
0003776669
-
-
Cambridge, MA: MIT Press
-
Bijker, WE., Hughes, T. and Pinch, T (eds) (1987) The Social Construction of Technological Systems, Cambridge, MA: MIT Press.
-
(1987)
The Social Construction of Technological Systems
-
-
Bijker, W.E.1
Hughes, T.2
Pinch, T.3
-
13
-
-
85069578685
-
-
Guardian, Thursday 1 April 1993, review section: 19
-
Bowcott, O. (1993) ‘Hacking and the Bedworth Syndrome’, Guardian Thursday 1 April 1993, review section: 19.
-
(1993)
Hacking and the Bedworth Syndrome
-
-
Bowcott, O.1
-
15
-
-
85069567861
-
-
Paper prepared for the PICT Software Workshop, UMIST, 18-19July
-
Brady, T. (1988) ‘Crisis what crisis?’, Paper prepared for the PICT Software Workshop, UMIST, 18-19July 1988.
-
(1988)
Crisis What Crisis?
, pp. 1988
-
-
Brady, T.1
-
18
-
-
85069566240
-
Elemental issues
-
June 1990
-
Carr, E. (1990) ‘Elemental issues’, Micro Decision June 1990:30-1.
-
(1990)
Micro Decision
, pp. 30-31
-
-
Carr, E.1
-
19
-
-
33745289277
-
-
Ph.D. thesis, Curtin University of Technology, Perth, Western Australia; conferred March
-
Chantler, Nicholas (1995) ‘Risk: The profile of the computer hacker’, Ph.D. thesis, Curtin University of Technology, Perth, Western Australia; conferred March 1996.
-
(1995)
Risk: The Profile of The Computer Hacker
, pp. 1996
-
-
Chantler, N.1
-
23
-
-
84909368281
-
The intruder-a biography of cheshire catalyst
-
Colligan, D. (1982) ‘The intruder-A biography of Cheshire Catalyst’, Technology Illustrated October/November 1982, available at: http://www.dsl.org/rn/doc/arc/nws/cheshire.phk.
-
(1982)
Technology Illustrated
-
-
Colligan, D.1
-
25
-
-
85069569628
-
Is hacking the same as breaking and entering?
-
file 2
-
Cosell, Bemie (1991) ‘Is hacking the same as breaking and entering?’, Computer Underground Digest 3 (12): file 2.
-
(1991)
Computer Underground Digest
, vol.3
, Issue.12
-
-
Cosell, B.1
-
27
-
-
84909368278
-
Introduction
-
New York: Ace Books
-
Dann, J. and Dozois, G. (1996) ‘Introduction’, in Hackers, New York: Ace Books.
-
(1996)
Hackers
-
-
Dann, J.1
Dozois, G.2
-
28
-
-
85069590174
-
The hermetic underground
-
file 7
-
Dark Adept (1990) ‘The hermetic underground’, Computer Underground Digest 2(15): file 7.
-
(1990)
Computer Underground Digest
, vol.2
, Issue.15
-
-
Adept, D.1
-
30
-
-
84952557636
-
The sexy computer
-
T.Forester (ed.), Oxford: Basil Blackwell
-
De Lacy, J. (1989) ‘The sexy computer’, in T.Forester (ed.) Computers in the Human Context, Oxford: Basil Blackwell.
-
(1989)
Computers in the Human Context
-
-
De Lacy, J.1
-
31
-
-
85069570114
-
-
paper presented at the National Computer Security Conference, Washington, DC, 1-4 October 1990
-
Denning, D.E. (1990) ‘Concerning hackers who break into computer systems’, paper presented at the National Computer Security Conference, Washington, DC, 1-4 October 1990, pp. 653- 64.
-
(1990)
Concerning Hackers Who Break into Computer Systems
-
-
Denning, D.E.1
-
35
-
-
85069610236
-
The techno-revolution
-
phile 3
-
Doctor Crash (1986) ‘The techno-revolution’, Phrack 1(6): phile 3.
-
(1986)
Phrack
, vol.1
, Issue.6
-
-
Crash, D.1
-
36
-
-
85069562110
-
-
Worm? Virus? Hero?’, unpublished paper, Sociology Departments of UCLA and Indiana Universities
-
Dougan, W. and Gieryn, T. (1990) ‘Robert Morris: Worm? Virus? Hero?’, unpublished paper, Sociology Departments of UCLA and Indiana Universities.
-
(1990)
Robert Morris
-
-
Dougan, W.1
Gieryn, T.2
-
37
-
-
0004008053
-
-
London: Routledge & Kegan Paul
-
Douglas, M. (1966) Purity and Danger, London: Routledge & Kegan Paul.
-
(1966)
Purity and Danger
-
-
Douglas, M.1
-
40
-
-
85069562626
-
Eff response to the atlanta sentencing
-
file 3
-
Electronic Frontier Foundation (1990) ‘EFF response to the Atlanta sentencing’, Computer Underground Digest 2(7): file 3.
-
(1990)
Computer Underground Digest
, vol.2
, Issue.7
-
-
-
48
-
-
11344279136
-
Elites, lamers, narcs and whores: Exploring the computer underground
-
L.Cherny and E.R.Weise, Seattle: Seal Press
-
Gilboa, N. (1996) ‘Elites, lamers, narcs and whores: Exploring the computer underground’, in L.Cherny and E.R.Weise Wired Women: Gender and New Realities in Cyberspace, Seattle: Seal Press.
-
(1996)
Wired Women: Gender and New Realities in Cyberspace
-
-
Gilboa, N.1
-
50
-
-
85069566380
-
Computer security
-
June 1990
-
Gold, S. (1990) ‘Computer security’, Micro Decision June 1990:47-61.
-
(1990)
Micro Decision
, pp. 47-61
-
-
Gold, S.1
-
51
-
-
85069581668
-
Response to telecom digests views
-
July 1990: file 4
-
Goldstein, E. (1990) ‘Response to Telecom Digest’s views’, Computer Underground Digest 1(13), July 1990: file 4.
-
(1990)
Computer Underground Digest
, vol.1
, Issue.13
-
-
Goldstein, E.1
-
52
-
-
85033882029
-
Hacker testimony to house subcommittee largely unheard
-
file 1
-
Goldstein, E. (1993) ‘Hacker testimony to House Subcommittee largely unheard’, Computer Underground Digest 5(43): file 1.
-
(1993)
Computer Underground Digest
, vol.5
, Issue.43
-
-
Goldstein, E.1
-
53
-
-
84925711746
-
Motley bunch hack at the end of universe
-
Friday 13 August: 11
-
Goodwins, R. (1993) ‘Motley bunch hack at the end of universe’, The Independent Friday 13 August: 11.
-
(1993)
The Independent
-
-
Goodwins, R.1
-
56
-
-
85069609643
-
-
position paper for the 1997 Oksnoen Symposium on Pleasure and Technology
-
Hannemyr, G. (1997) ‘Hacking considered constructive’, position paper for the 1997 Oksnoen Symposium on Pleasure and Technology, available at: http://home.sn.no/home/gisle/oks97.html.
-
(1997)
Hacking Considered constructive
-
-
Hannemyr, G.1
-
57
-
-
85069588745
-
-
United Kingdom Parliamentary Debates, House of Commons, 9 February 1990
-
Hansard (1990a) United Kingdom Parliamentary Debates, House of Commons, 9 February 1990.
-
(1990)
-
-
-
58
-
-
85069560651
-
-
United Kingdom Parliamentary Debates, Standing Committee C, 28 March 1990
-
Hansard (1990b) United Kingdom Parliamentary Debates, Standing Committee C, 28 March 1990.
-
(1990)
-
-
-
59
-
-
0001785384
-
A manifesto for cyborgs: Science, technology, and socialist feminism in the 1980s
-
Haraway, D. (1985) ‘A manifesto for cyborgs: Science, technology, and socialist feminism in the 1980’s’, Socialist Review 80:40-55.
-
(1985)
Socialist Review
, vol.80
, pp. 40-55
-
-
Haraway, D.1
-
60
-
-
85069591409
-
Computer hacking “addict is cleared of conspiracy
-
Thursday 18 March: 1
-
Harris, G. (1993a) ‘Computer hacking “addict�? is cleared of conspiracy’, The Scotsman Thursday 18 March: 1.
-
(1993)
The Scotsman
-
-
Harris, G.1
-
61
-
-
85069605997
-
Daring data raider dependent on hacking fix
-
Thursday 18 March: 3
-
Harris, G. (1993b) ‘Daring data raider dependent on hacking fix’, The Scotsman, Thursday 18 March: 3.
-
(1993)
The Scotsman
-
-
Harris, G.1
-
62
-
-
84909368258
-
Fear of a hack planet: The strange metamorphosis of the computer hacker
-
July 15 1996
-
Hawn, M. (1996) ‘Fear of a hack planet: The strange metamorphosis of the computer hacker’, The Site July 15 1996, available at: http://www.zdtv.com/0796w3/worl/worl54_071596.html.
-
(1996)
The Site
-
-
Hawn, M.1
-
63
-
-
0002015705
-
The erotic ontology of cyberspace
-
Michael Benedikt, Cambridge, MA: MIT Press
-
Heim, Michael (1991) ‘The erotic ontology of cyberspace’, in Michael Benedikt, Cyberspace: First Steps, Cambridge, MA: MIT Press.
-
(1991)
Cyberspace: First Steps
-
-
Heim, M.1
-
64
-
-
85069592080
-
Banned from the internet
-
March 1997
-
Heiman, J.D. (1997) ‘Banned from the internet’, Swing Magazine March 1997:70-5, available at: http.www.paranoia.com/ ~mthreat/swing. html.
-
(1997)
Swing Magazine
, pp. 70-75
-
-
Heiman, J.D.1
-
69
-
-
85069601574
-
What the laws enforce
-
March
-
Johnson, B. (1991) ‘What the laws enforce’, RISKS 11(32), March.
-
(1991)
RISKS
, vol.11
, Issue.32
-
-
Johnson, B.1
-
71
-
-
85069599995
-
When hacking turns into an obsession
-
Thursday 18 March: 7
-
Kane, A. and Mason, J. (1993) ‘When hacking turns into an obsession’, Financial Times Thursday 18 March: 7.
-
(1993)
Financial Times
-
-
Kane, A.1
Mason, J.2
-
73
-
-
29944436476
-
Civil liberties in cyberspace: When does hacking turn from an exercise of civil liberties into crime?
-
September 1991
-
Kapor, M. (1991) ‘Civil liberties in cyberspace: When does hacking turn from an exercise of civil liberties into crime?’ Scientific American September 1991, available at: http://www.eff.org/pub/Legal/cyberliberties_kapor.article.
-
(1991)
Scientific American
-
-
Kapor, M.1
-
80
-
-
85069547096
-
Hacker goggans: Life on both sides of the firewall
-
January 8 1996, news section
-
Lange, L. (1996) ‘Hacker Goggans: Life on both sides of the firewall’, Electronic Engineering Times 883, January 8 1996, news section, available at: http://www.cdc.net/~x/1996/erikb.asc.
-
(1996)
Electronic Engineering Times
, vol.883
-
-
Lange, L.1
-
81
-
-
85069584292
-
What the laws enforce debate
-
March
-
Laughlin, C. (1991) ‘What the laws enforce debate’, RISKS 11(34), March.
-
(1991)
RISKS
, vol.11
, Issue.34
-
-
Laughlin, C.1
-
86
-
-
85069566875
-
Sexism and the computer underground
-
file 4
-
Liz E.Borden (1991) ‘Sexism and the computer underground’, Computer Underground Digest 3(0): file 4.
-
(1991)
Computer Underground Digest
, vol.3
-
-
Liz, E.B.1
-
92
-
-
85069575294
-
Crime bytes back
-
Marda, L. and Ray, D. (1990) ‘Crime bytes back’, Omni 12(11): 34-102.
-
(1990)
Omni
, vol.12
, Issue.11
, pp. 34-102
-
-
Marda, L.1
Ray, D.2
-
94
-
-
84862716309
-
Management culture-hackers and bean counters
-
28 October 1996
-
Martin, J. (1996) ‘Management culture-hackers and bean counters’, Information Week 28 October 1996, available at: http://www.cdc.net/~x/1996/cybercorp.asc.
-
(1996)
Information Week
-
-
Martin, J.1
-
95
-
-
85069545750
-
A bug in the machine
-
17 December
-
Matthews, D. (1989) ‘A bug in the machine’, The Sunday Correspondent 17 December: 37-41.
-
(1989)
The Sunday Correspondent
, pp. 37-41
-
-
Matthews, D.1
-
96
-
-
57349186134
-
The conscience of a hacker
-
phile 3
-
The Mentor (1986) ‘The conscience of a hacker’ Phrack 1(7): phile 3.
-
(1986)
Phrack
, vol.1
, Issue.7
-
-
Mentor, T.1
-
99
-
-
85069584221
-
-
paper presented at the American Society of Criminology annual meetings, Reno, November
-
Meyer, G. and Thomas, J. (1989) ‘Baudy world of the byte bandit: A post-modernist interpretation of the CU’, paper presented at the American Society of Criminology annual meetings, Reno, November, available at: http://www.eff.org.Zpub/Net_culture…nk.
-
(1989)
Baudy World of the Byte Bandit: A Post-Modernist Interpretation of the CU
-
-
Meyer, G.1
Thomas, J.2
-
100
-
-
84908942336
-
(Witch)hunting for the computer underground: Joe mccarthy in a leisure suit
-
2 September 1990
-
Meyer, G. and Thomas, J. (1990) ‘(Witch)hunting for the computer underground: Joe McCarthy in a leisure suit’, The Critical Criminologist 2 September 1990:225-53.
-
(1990)
The Critical Criminologist
, pp. 225-253
-
-
Meyer, G.1
Thomas, J.2
-
101
-
-
0346843193
-
Technology, property, and law: The case of computer crime
-
May
-
Michalowski, R. and Pfuhl, E. (1990) ‘Technology, property, and law: The case of computer crime’, Crime Law and Social Change 15(3), May: 255-75.
-
(1990)
Crime Law and Social Change
, vol.15
, Issue.3
, pp. 255-275
-
-
Michalowski, R.1
Pfuhl, E.2
-
102
-
-
0002869277
-
Women and children first: Gender and the settling of the electronic frontier
-
James Brooks and Iain A.Boal, San Francisco: City Lights
-
Miller, Laura (1995) ‘Women and children first: Gender and the settling of the electronic frontier’, in James Brooks and Iain A.Boal (eds) Resisting the Virtual Life: The Culture and Politics of Information, San Francisco: City Lights.
-
(1995)
Resisting The Virtual Life: The Culture and Politics of Information
-
-
Miller, L.1
-
106
-
-
84909332302
-
The leap and the lapse: Hacking a private site in cyberspace
-
V. Conley (ed.), Ohio: Miami University Press
-
Moreiras, A. (1993) ‘The leap and the lapse: Hacking a private site in cyberspace’, in V. Conley (ed.), Rethinking Technologies, Ohio: Miami University Press.
-
(1993)
Rethinking Technologies
-
-
Moreiras, A.1
-
107
-
-
85069612142
-
Satanic viruses
-
(British Edition), February 1991
-
Mungo, P. (1991) ‘Satanic viruses’, Gentlemen’s Quarterly 20 (British Edition), February 1991: 126-30.
-
(1991)
Gentlemen’s Quarterly
, vol.20
, pp. 126-130
-
-
Mungo, P.1
-
108
-
-
85069567706
-
On computer security and public trust
-
Terrell Ward Bynum, Walter Maner and John L.Fodor (eds), Research Center on Computing and Society
-
Murray, W. (1992) ‘On computer security and public trust’, in Terrell Ward Bynum, Walter Maner and John L.Fodor (eds) Computing Security, Research Center on Computing and Society.
-
(1992)
Computing Security
-
-
Murray, W.1
-
109
-
-
85069606629
-
-
New Haven: Southern Connecticut State University
-
National Conference on Computing and Values (NCCV) (1992) Computing Security, New Haven: Southern Connecticut State University.
-
(1992)
Computing Security
-
-
-
110
-
-
85069556286
-
Ncsc conference report-a “knight lightning perspective
-
file 6
-
Neidorf, Craig (1990) ‘NCSC Conference report-a “Knight Lightning�? perspective’, Computer Underground Digest 2(7): file 6.
-
(1990)
Computer Underground Digest
, vol.2
, Issue.7
-
-
Neidorf, C.1
-
111
-
-
85069596530
-
Computer security and human values
-
Terrell Ward Bynum, Walter Maner and John L.Fodor, New Haven: Research Center on Computing and Society
-
Neumann, P. (1992) ‘Computer security and human values’, in Terrell Ward Bynum, Walter Maner and John L.Fodor (eds) Computing Security, New Haven: Research Center on Computing and Society.
-
(1992)
Computing Security
-
-
Neumann, P.1
-
113
-
-
85069547818
-
Healthy hobby that becomes obsession
-
Thursday March 18:5
-
Nuttall, N. (1993) ‘Healthy hobby that becomes obsession’, The Times Thursday March 18:5.
-
(1993)
The Times
-
-
Nuttall, N.1
-
114
-
-
85069604419
-
Hacking is a crime, pure and simple
-
February: file 1
-
Parrish jr., E. (1989) ‘Hacking is a crime, pure and simple’, Phrack 2(24), February: file 1.
-
(1989)
Phrack
, vol.2
, Issue.24
-
-
Parrish, E.1
-
116
-
-
85069593771
-
-
paper for the workshop on ‘Social Perspectives of Software’, Oxford, January
-
Pelaez, E (1990) ‘Soft ware’, paper for the workshop on ‘Social Perspectives of Software’, Oxford, January.
-
(1990)
Soft Ware
-
-
Pelaez, E.1
-
119
-
-
85069562639
-
Computers turned my boy into a robot
-
Thursday 18 March
-
Phillips, M. (1993) ‘Computers turned my boy into a robot’, Daily Mirror Thursday 18 March, pp. 1-4.
-
(1993)
Daily Mirror
, pp. 1-4
-
-
Phillips, M.1
-
120
-
-
85069572538
-
Hacker penetrated mod
-
Tuesday 18 March: 1
-
Pithers, M. and Watts, S. (1993) ‘Hacker penetrated MoD’, Independent Tuesday 18 March: 1.
-
(1993)
Independent
-
-
Pithers, M.1
Watts, S.2
-
121
-
-
0011517106
-
-
German Informatics Society, 11 October, Stuttgart
-
Postman, N. (1990) ‘Informing ourselves to death’, German Informatics Society, 11 October, Stuttgart, available at: http://www.eff.org/pub/Net culture.
-
(1990)
Informing Ourselves to Death
-
-
Postman, N.1
-
122
-
-
85069550870
-
-
Scales-O-Justice website
-
Poulsen, K. (undated) ‘Recidivism explained’, Scales-O-Justice website, available at: http:// catalog.com/kevin/returns.html.
-
Recidivism Explained
-
-
Poulsen, K.1
-
123
-
-
85069607274
-
-
letter to TV producer of an edition ofUnsolved Mysteries on Poulsen WWW site
-
Poulsen, K (undated-b), ‘Dark Dante’, letter to TV producer of an edition of Unsolved Mysteries on Poulsen WWW site, available at: http://catalog.com/kevin/usm.html.
-
Dark Dante
-
-
Poulsen, K.1
-
124
-
-
85069545589
-
-
Thursday 18 July 1985
-
PR Newswire (1985) Thursday 18 July 1985, p. 2, available at: http://www.dsl.org/rn/doc/arc/nws/hcknews.hac.
-
(1985)
, pp. 2
-
-
-
127
-
-
85069596288
-
The virtual philanderer
-
life section, 1 March: 11
-
Rayner, Jay (1997) ‘The virtual philanderer’, Observer, life section, 1 March: 11.
-
(1997)
Observer
-
-
Rayner, J.1
-
128
-
-
84928833155
-
Jacked in: Fordism, cyberpunk, marxism
-
Rosenthal, Pam (1991) ‘Jacked in: Fordism, cyberpunk, Marxism’, Socialist Review 21(1): 79-103.
-
(1991)
Socialist Review
, vol.21
, Issue.1
, pp. 79-103
-
-
Rosenthal, P.1
-
130
-
-
53149096948
-
-
honours thesis, Sociology and Anthropology, Concordia University, Montreal
-
Rosteck, T. (1994) ‘Computer hackers: Rebels with a cause’, honours thesis, Sociology and Anthropology, Concordia University, Montreal, available at: http://geocities.com/CapeCanaveral/3498/.
-
(1994)
Computer Hackers: Rebels with a cause
-
-
Rosteck, T.1
-
132
-
-
13444299304
-
Hackers: Taking a byte out of computer crime
-
April
-
Roush, Wade ‘Hackers: Taking a byte out of computer crime’, Technology Review April 1995, available at: http://web.mit.edu/techreview/www/articles/apr95/Roush.html.
-
(1995)
Technology Review
-
-
Roush, W.1
-
134
-
-
84976788704
-
What is cyberspace?
-
Saffo, P. (1989) ‘What is cyberspace?’, Communications of the ACM 32(6):664-5.
-
(1989)
Communications of the ACM
, Issue.6
, pp. 664-665
-
-
Saffo, P.1
-
135
-
-
0003265515
-
Alt.Civilizations.Faq: Cyberspace as the darker side of the west
-
Z.Sardar and J.Ravetz, London: Pluto Press
-
Sardar, Ziauddin (1996), ‘alt.civilizations.faq: Cyberspace as the darker side of the West’, in Z.Sardar and J.Ravetz (eds) Cyberfutures: Culture and Politics on the Information Super-highway, London: Pluto Press.
-
(1996)
Cyberfutures: Culture and Politics on the Information Super-Highway
-
-
Sardar, Z.1
-
137
-
-
3943108716
-
Computer security: The achilles heel of the electronic air force?
-
January-February
-
Schell, R.R. (1979) ‘Computer security: The Achilles’ heel of the electronic air force?’ Air University Review XXX(2), January-February: 16-33.
-
(1979)
Air University Review
, vol.30
, Issue.2
, pp. 16-33
-
-
Schell, R.R.1
-
138
-
-
0042738159
-
Cyberculture, cyborg post-modernism and the sociology of virtual reality technologies: Surfing the soul in the information age
-
June
-
Schroeder, R. (1994) ‘Cyberculture, cyborg post-modernism and the sociology of virtual reality technologies: Surfing the soul in the information age’, Futures 26(5), June: 519-28.
-
(1994)
Futures
, vol.26
, Issue.5
, pp. 519-528
-
-
Schroeder, R.1
-
144
-
-
85069550970
-
Playgrounds of the mind: Cyberspace
-
file 6
-
Silicon Surfer (1990) ‘Playgrounds of the mind: Cyberspace’, Computer Underground Digest 2(17): file 6.
-
(1990)
Computer Underground Digest
, vol.2
, Issue.17
-
-
Surfer, S.1
-
145
-
-
33750337448
-
-
London: HarperCollins
-
Smith, Michael Marshall (1996) Spares, London: HarperCollins.
-
(1996)
Spares
-
-
Smith, M.M.1
-
147
-
-
85069604326
-
Three letters on computer security and society
-
CSD-TR-91-088
-
Spafford, E.H. (1991) ‘Three letters on computer security and society’, Purdue University Technical Report, CSD-TR-91-088.
-
(1991)
Purdue University Technical Report
-
-
Spafford, E.H.1
-
150
-
-
3543038778
-
-
Cambridge, MA: Free Software Foundation
-
Stallman, R. (1985) The GNU Manifesto, Cambridge, MA: Free Software Foundation.
-
(1985)
The GNU Manifesto
-
-
Stallman, R.1
-
151
-
-
85069600471
-
-
unpublished work placement report, The Centre for Research into Innovation Culture and Technology: Brunel University
-
Steele, K. (1988) ‘The social construction of the software crisis’, unpublished work placement report, The Centre for Research into Innovation Culture and Technology: Brunel University.
-
(1988)
The Social Construction of the Software Crisis
-
-
Steele, K.1
-
153
-
-
85069559290
-
-
Sterling, B (1991) CyberView 91 Report, available at: http://www.eff.org/pub/Net_culture_Bruce:Sterling/cyberview_91.report.
-
(1991)
Cyberview 91 Report
-
-
Sterling, B.1
-
155
-
-
85069607980
-
Why the legion of doom has little to fear from the feds
-
April 1991
-
Stockfield, B. (1991) ‘Why the Legion of Doom has little to fear from the Feds’, Business Week 22 April 1991:62.
-
(1991)
Business Week
, vol.22
, pp. 62
-
-
Stockfield, B.1
-
157
-
-
84933476272
-
Hackers: Cyberpunks or microserfs?
-
winter
-
Taylor, Paul A. (1998) ‘Hackers: Cyberpunks or microserfs?’, Information Communication &Society 1 (4), winter, 401-19.
-
(1998)
Information Communication &Society
, vol.1
, Issue.4
, pp. 401-419
-
-
Taylor, P.A.1
-
158
-
-
85069586397
-
-
December 1996
-
Thieme, R. (1996) Internet Underground December 1996:21-2, available at: http://www.paranoia.com/~mthreat/iu.html.
-
(1996)
Internet Underground
, pp. 21-22
-
-
Thieme, R.1
-
161
-
-
85069609539
-
The evil that hackers do
-
file 4
-
Toxic Shock Group (1990) ‘The evil that hackers do’, Computer Underground Digest 2(6): file 4.
-
(1990)
Computer Underground Digest
, vol.2
, Issue.6
-
-
-
163
-
-
85069563332
-
Computer abuse proposal gives police lot of room for discretion
-
translation of title, Amsterdam) 23 April
-
Uitenbrauer, F. (1991) ‘Computer abuse proposal gives police lot of room for discretion’ (translation of title), NRC Handelsbad (Amsterdam) 23 April.
-
(1991)
RC Handelsbad
-
-
Uitenbrauer, F.1
-
164
-
-
85069606112
-
-
United Nations International Review of Criminal Policy-Manual on the Prevention and Control of Computer-related Crime, available at: http://www.ifs.univie.ac.at/~pr2gql/rev4344.html.
-
-
-
-
167
-
-
85069613802
-
-
Virtual Play: Baudrillard Online, available at: http://www.eff.org/pub/Netculture_ rnism.
-
-
-
-
168
-
-
84866809218
-
-
WarRoom, WarRoom Research, LLC
-
WarRoom (1996) ‘1996 information systems security survey’, WarRoom Research, LLC, available at: http://www.infowar.com/.
-
(1996)
1996 Information Systems Security Survey
-
-
-
169
-
-
85069563704
-
Trial haunted by life in the twilight zone
-
Thursday 18 March: 4
-
Watts, S. (1993) ‘Trial haunted by life in the twilight zone’, The Times Thursday 18 March: 4.
-
(1993)
The Times
-
-
Watts, S.1
-
171
-
-
85069598652
-
An answer to sexism in the cu
-
no file number
-
Wilson, Brian Scott (1991) ‘An answer to sexism in the CU’, Computer Underground Digest 3(1): no file number.
-
(1991)
Computer Underground Digest
, vol.3
, Issue.1
-
-
Wilson, B.S.1
-
173
-
-
71549155525
-
The social basis of computer viruses
-
Brunel University
-
Woolgar, S. and Russell, G. (1990) ‘The social basis of computer viruses’, in CRICTDiscussion Paper, Brunel University.
-
(1990)
Crictdiscussion Paper
-
-
Woolgar, S.1
Russell, G.2
-
175
-
-
84970234217
-
The hacker papers
-
August 1980
-
Zimbardo, P. (1980) ‘The hacker papers’, Psychology Today August 1980:62-9, available at: http://www.dsl.org/m/doc/arc/nws/hackpape.hac.
-
(1980)
Psychology Today
, pp. 62-69
-
-
Zimbardo, P.1
|