메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1-203

Hackers: Crime in the digital sublime

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85069610394     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4324/9780203201503     Document Type: Book
Times cited : (14)

References (175)
  • 1
    • 85069558590 scopus 로고
    • Digital Life No. 6
    • Baker, Steve (1995) ‘Digital life no. 6’, available at: http://www.taponline.com/tap/tech/net-tools/digital/digital.html.
    • (1995)
    • Baker, S.1
  • 2
    • 79954955610 scopus 로고    scopus 로고
    • trans. Guido Waldman, London: Harvill Press
    • Baricco, A. (1997) Silk, trans. Guido Waldman, London: Harvill Press.
    • (1997) Silk
    • Baricco, A.1
  • 3
    • 0041450577 scopus 로고
    • Crime and puzzlement
    • fall 1990
    • Barlow, J.P. (1990) ‘Crime and puzzlement’, Whole Earth Review, fall 1990:44-57.
    • (1990) Whole Earth Review , pp. 44-57
    • Barlow, J.P.1
  • 7
    • 0011599920 scopus 로고
    • Lexington, MA: Lexington Books
    • Bequai, A. (1987) Technocrimes, Lexington, MA: Lexington Books.
    • (1987) Technocrimes
    • Bequai, A.1
  • 8
    • 0039190419 scopus 로고
    • London: Orbit
    • Besher, A. (1994) Rim, London: Orbit.
    • (1994) Rim
    • Besher, A.1
  • 9
    • 34250071433 scopus 로고
    • Do not despair: There is life after constructivism
    • winter 1993
    • Bijker, WE. (1993) ‘Do not despair: There is life after constructivism’, Science, Technology, &Human Values 18(1), winter 1993:113-38.
    • (1993) Science, Technology, &Human Values , vol.18 , Issue.1 , pp. 113-138
    • Bijker, W.E.1
  • 13
    • 85069578685 scopus 로고
    • Guardian, Thursday 1 April 1993, review section: 19
    • Bowcott, O. (1993) ‘Hacking and the Bedworth Syndrome’, Guardian Thursday 1 April 1993, review section: 19.
    • (1993) Hacking and the Bedworth Syndrome
    • Bowcott, O.1
  • 15
    • 85069567861 scopus 로고
    • Paper prepared for the PICT Software Workshop, UMIST, 18-19July
    • Brady, T. (1988) ‘Crisis what crisis?’, Paper prepared for the PICT Software Workshop, UMIST, 18-19July 1988.
    • (1988) Crisis What Crisis? , pp. 1988
    • Brady, T.1
  • 17
  • 18
    • 85069566240 scopus 로고
    • Elemental issues
    • June 1990
    • Carr, E. (1990) ‘Elemental issues’, Micro Decision June 1990:30-1.
    • (1990) Micro Decision , pp. 30-31
    • Carr, E.1
  • 19
    • 33745289277 scopus 로고
    • Ph.D. thesis, Curtin University of Technology, Perth, Western Australia; conferred March
    • Chantler, Nicholas (1995) ‘Risk: The profile of the computer hacker’, Ph.D. thesis, Curtin University of Technology, Perth, Western Australia; conferred March 1996.
    • (1995) Risk: The Profile of The Computer Hacker , pp. 1996
    • Chantler, N.1
  • 23
    • 84909368281 scopus 로고
    • The intruder-a biography of cheshire catalyst
    • Colligan, D. (1982) ‘The intruder-A biography of Cheshire Catalyst’, Technology Illustrated October/November 1982, available at: http://www.dsl.org/rn/doc/arc/nws/cheshire.phk.
    • (1982) Technology Illustrated
    • Colligan, D.1
  • 25
    • 85069569628 scopus 로고
    • Is hacking the same as breaking and entering?
    • file 2
    • Cosell, Bemie (1991) ‘Is hacking the same as breaking and entering?’, Computer Underground Digest 3 (12): file 2.
    • (1991) Computer Underground Digest , vol.3 , Issue.12
    • Cosell, B.1
  • 27
    • 84909368278 scopus 로고    scopus 로고
    • Introduction
    • New York: Ace Books
    • Dann, J. and Dozois, G. (1996) ‘Introduction’, in Hackers, New York: Ace Books.
    • (1996) Hackers
    • Dann, J.1    Dozois, G.2
  • 28
    • 85069590174 scopus 로고
    • The hermetic underground
    • file 7
    • Dark Adept (1990) ‘The hermetic underground’, Computer Underground Digest 2(15): file 7.
    • (1990) Computer Underground Digest , vol.2 , Issue.15
    • Adept, D.1
  • 30
    • 84952557636 scopus 로고
    • The sexy computer
    • T.Forester (ed.), Oxford: Basil Blackwell
    • De Lacy, J. (1989) ‘The sexy computer’, in T.Forester (ed.) Computers in the Human Context, Oxford: Basil Blackwell.
    • (1989) Computers in the Human Context
    • De Lacy, J.1
  • 31
    • 85069570114 scopus 로고
    • paper presented at the National Computer Security Conference, Washington, DC, 1-4 October 1990
    • Denning, D.E. (1990) ‘Concerning hackers who break into computer systems’, paper presented at the National Computer Security Conference, Washington, DC, 1-4 October 1990, pp. 653- 64.
    • (1990) Concerning Hackers Who Break into Computer Systems
    • Denning, D.E.1
  • 33
    • 85069553205 scopus 로고
    • NCCV 1992
    • Denning, D.E. (1992b) ‘Hacker ethics’ in NCCV (1992), pp. 59-64.
    • (1992) Hacker Ethics , pp. 59-64
    • Denning, D.E.1
  • 35
    • 85069610236 scopus 로고
    • The techno-revolution
    • phile 3
    • Doctor Crash (1986) ‘The techno-revolution’, Phrack 1(6): phile 3.
    • (1986) Phrack , vol.1 , Issue.6
    • Crash, D.1
  • 36
    • 85069562110 scopus 로고
    • Worm? Virus? Hero?’, unpublished paper, Sociology Departments of UCLA and Indiana Universities
    • Dougan, W. and Gieryn, T. (1990) ‘Robert Morris: Worm? Virus? Hero?’, unpublished paper, Sociology Departments of UCLA and Indiana Universities.
    • (1990) Robert Morris
    • Dougan, W.1    Gieryn, T.2
  • 37
    • 0004008053 scopus 로고
    • London: Routledge & Kegan Paul
    • Douglas, M. (1966) Purity and Danger, London: Routledge & Kegan Paul.
    • (1966) Purity and Danger
    • Douglas, M.1
  • 40
    • 85069562626 scopus 로고
    • Eff response to the atlanta sentencing
    • file 3
    • Electronic Frontier Foundation (1990) ‘EFF response to the Atlanta sentencing’, Computer Underground Digest 2(7): file 3.
    • (1990) Computer Underground Digest , vol.2 , Issue.7
  • 48
    • 11344279136 scopus 로고    scopus 로고
    • Elites, lamers, narcs and whores: Exploring the computer underground
    • L.Cherny and E.R.Weise, Seattle: Seal Press
    • Gilboa, N. (1996) ‘Elites, lamers, narcs and whores: Exploring the computer underground’, in L.Cherny and E.R.Weise Wired Women: Gender and New Realities in Cyberspace, Seattle: Seal Press.
    • (1996) Wired Women: Gender and New Realities in Cyberspace
    • Gilboa, N.1
  • 50
    • 85069566380 scopus 로고
    • Computer security
    • June 1990
    • Gold, S. (1990) ‘Computer security’, Micro Decision June 1990:47-61.
    • (1990) Micro Decision , pp. 47-61
    • Gold, S.1
  • 51
    • 85069581668 scopus 로고
    • Response to telecom digests views
    • July 1990: file 4
    • Goldstein, E. (1990) ‘Response to Telecom Digest’s views’, Computer Underground Digest 1(13), July 1990: file 4.
    • (1990) Computer Underground Digest , vol.1 , Issue.13
    • Goldstein, E.1
  • 52
    • 85033882029 scopus 로고
    • Hacker testimony to house subcommittee largely unheard
    • file 1
    • Goldstein, E. (1993) ‘Hacker testimony to House Subcommittee largely unheard’, Computer Underground Digest 5(43): file 1.
    • (1993) Computer Underground Digest , vol.5 , Issue.43
    • Goldstein, E.1
  • 53
    • 84925711746 scopus 로고
    • Motley bunch hack at the end of universe
    • Friday 13 August: 11
    • Goodwins, R. (1993) ‘Motley bunch hack at the end of universe’, The Independent Friday 13 August: 11.
    • (1993) The Independent
    • Goodwins, R.1
  • 56
    • 85069609643 scopus 로고    scopus 로고
    • position paper for the 1997 Oksnoen Symposium on Pleasure and Technology
    • Hannemyr, G. (1997) ‘Hacking considered constructive’, position paper for the 1997 Oksnoen Symposium on Pleasure and Technology, available at: http://home.sn.no/home/gisle/oks97.html.
    • (1997) Hacking Considered constructive
    • Hannemyr, G.1
  • 57
    • 85069588745 scopus 로고
    • United Kingdom Parliamentary Debates, House of Commons, 9 February 1990
    • Hansard (1990a) United Kingdom Parliamentary Debates, House of Commons, 9 February 1990.
    • (1990)
  • 58
    • 85069560651 scopus 로고
    • United Kingdom Parliamentary Debates, Standing Committee C, 28 March 1990
    • Hansard (1990b) United Kingdom Parliamentary Debates, Standing Committee C, 28 March 1990.
    • (1990)
  • 59
    • 0001785384 scopus 로고
    • A manifesto for cyborgs: Science, technology, and socialist feminism in the 1980s
    • Haraway, D. (1985) ‘A manifesto for cyborgs: Science, technology, and socialist feminism in the 1980’s’, Socialist Review 80:40-55.
    • (1985) Socialist Review , vol.80 , pp. 40-55
    • Haraway, D.1
  • 60
    • 85069591409 scopus 로고
    • Computer hacking “addict is cleared of conspiracy
    • Thursday 18 March: 1
    • Harris, G. (1993a) ‘Computer hacking “addict�? is cleared of conspiracy’, The Scotsman Thursday 18 March: 1.
    • (1993) The Scotsman
    • Harris, G.1
  • 61
    • 85069605997 scopus 로고
    • Daring data raider dependent on hacking fix
    • Thursday 18 March: 3
    • Harris, G. (1993b) ‘Daring data raider dependent on hacking fix’, The Scotsman, Thursday 18 March: 3.
    • (1993) The Scotsman
    • Harris, G.1
  • 62
    • 84909368258 scopus 로고    scopus 로고
    • Fear of a hack planet: The strange metamorphosis of the computer hacker
    • July 15 1996
    • Hawn, M. (1996) ‘Fear of a hack planet: The strange metamorphosis of the computer hacker’, The Site July 15 1996, available at: http://www.zdtv.com/0796w3/worl/worl54_071596.html.
    • (1996) The Site
    • Hawn, M.1
  • 63
    • 0002015705 scopus 로고
    • The erotic ontology of cyberspace
    • Michael Benedikt, Cambridge, MA: MIT Press
    • Heim, Michael (1991) ‘The erotic ontology of cyberspace’, in Michael Benedikt, Cyberspace: First Steps, Cambridge, MA: MIT Press.
    • (1991) Cyberspace: First Steps
    • Heim, M.1
  • 64
    • 85069592080 scopus 로고    scopus 로고
    • Banned from the internet
    • March 1997
    • Heiman, J.D. (1997) ‘Banned from the internet’, Swing Magazine March 1997:70-5, available at: http.www.paranoia.com/ ~mthreat/swing. html.
    • (1997) Swing Magazine , pp. 70-75
    • Heiman, J.D.1
  • 69
    • 85069601574 scopus 로고
    • What the laws enforce
    • March
    • Johnson, B. (1991) ‘What the laws enforce’, RISKS 11(32), March.
    • (1991) RISKS , vol.11 , Issue.32
    • Johnson, B.1
  • 71
    • 85069599995 scopus 로고
    • When hacking turns into an obsession
    • Thursday 18 March: 7
    • Kane, A. and Mason, J. (1993) ‘When hacking turns into an obsession’, Financial Times Thursday 18 March: 7.
    • (1993) Financial Times
    • Kane, A.1    Mason, J.2
  • 73
    • 29944436476 scopus 로고
    • Civil liberties in cyberspace: When does hacking turn from an exercise of civil liberties into crime?
    • September 1991
    • Kapor, M. (1991) ‘Civil liberties in cyberspace: When does hacking turn from an exercise of civil liberties into crime?’ Scientific American September 1991, available at: http://www.eff.org/pub/Legal/cyberliberties_kapor.article.
    • (1991) Scientific American
    • Kapor, M.1
  • 80
    • 85069547096 scopus 로고    scopus 로고
    • Hacker goggans: Life on both sides of the firewall
    • January 8 1996, news section
    • Lange, L. (1996) ‘Hacker Goggans: Life on both sides of the firewall’, Electronic Engineering Times 883, January 8 1996, news section, available at: http://www.cdc.net/~x/1996/erikb.asc.
    • (1996) Electronic Engineering Times , vol.883
    • Lange, L.1
  • 81
    • 85069584292 scopus 로고
    • What the laws enforce debate
    • March
    • Laughlin, C. (1991) ‘What the laws enforce debate’, RISKS 11(34), March.
    • (1991) RISKS , vol.11 , Issue.34
    • Laughlin, C.1
  • 86
    • 85069566875 scopus 로고
    • Sexism and the computer underground
    • file 4
    • Liz E.Borden (1991) ‘Sexism and the computer underground’, Computer Underground Digest 3(0): file 4.
    • (1991) Computer Underground Digest , vol.3
    • Liz, E.B.1
  • 92
    • 85069575294 scopus 로고
    • Crime bytes back
    • Marda, L. and Ray, D. (1990) ‘Crime bytes back’, Omni 12(11): 34-102.
    • (1990) Omni , vol.12 , Issue.11 , pp. 34-102
    • Marda, L.1    Ray, D.2
  • 94
    • 84862716309 scopus 로고    scopus 로고
    • Management culture-hackers and bean counters
    • 28 October 1996
    • Martin, J. (1996) ‘Management culture-hackers and bean counters’, Information Week 28 October 1996, available at: http://www.cdc.net/~x/1996/cybercorp.asc.
    • (1996) Information Week
    • Martin, J.1
  • 95
    • 85069545750 scopus 로고
    • A bug in the machine
    • 17 December
    • Matthews, D. (1989) ‘A bug in the machine’, The Sunday Correspondent 17 December: 37-41.
    • (1989) The Sunday Correspondent , pp. 37-41
    • Matthews, D.1
  • 96
    • 57349186134 scopus 로고
    • The conscience of a hacker
    • phile 3
    • The Mentor (1986) ‘The conscience of a hacker’ Phrack 1(7): phile 3.
    • (1986) Phrack , vol.1 , Issue.7
    • Mentor, T.1
  • 100
    • 84908942336 scopus 로고
    • (Witch)hunting for the computer underground: Joe mccarthy in a leisure suit
    • 2 September 1990
    • Meyer, G. and Thomas, J. (1990) ‘(Witch)hunting for the computer underground: Joe McCarthy in a leisure suit’, The Critical Criminologist 2 September 1990:225-53.
    • (1990) The Critical Criminologist , pp. 225-253
    • Meyer, G.1    Thomas, J.2
  • 101
    • 0346843193 scopus 로고
    • Technology, property, and law: The case of computer crime
    • May
    • Michalowski, R. and Pfuhl, E. (1990) ‘Technology, property, and law: The case of computer crime’, Crime Law and Social Change 15(3), May: 255-75.
    • (1990) Crime Law and Social Change , vol.15 , Issue.3 , pp. 255-275
    • Michalowski, R.1    Pfuhl, E.2
  • 102
    • 0002869277 scopus 로고
    • Women and children first: Gender and the settling of the electronic frontier
    • James Brooks and Iain A.Boal, San Francisco: City Lights
    • Miller, Laura (1995) ‘Women and children first: Gender and the settling of the electronic frontier’, in James Brooks and Iain A.Boal (eds) Resisting the Virtual Life: The Culture and Politics of Information, San Francisco: City Lights.
    • (1995) Resisting The Virtual Life: The Culture and Politics of Information
    • Miller, L.1
  • 106
    • 84909332302 scopus 로고
    • The leap and the lapse: Hacking a private site in cyberspace
    • V. Conley (ed.), Ohio: Miami University Press
    • Moreiras, A. (1993) ‘The leap and the lapse: Hacking a private site in cyberspace’, in V. Conley (ed.), Rethinking Technologies, Ohio: Miami University Press.
    • (1993) Rethinking Technologies
    • Moreiras, A.1
  • 107
    • 85069612142 scopus 로고
    • Satanic viruses
    • (British Edition), February 1991
    • Mungo, P. (1991) ‘Satanic viruses’, Gentlemen’s Quarterly 20 (British Edition), February 1991: 126-30.
    • (1991) Gentlemen’s Quarterly , vol.20 , pp. 126-130
    • Mungo, P.1
  • 108
    • 85069567706 scopus 로고
    • On computer security and public trust
    • Terrell Ward Bynum, Walter Maner and John L.Fodor (eds), Research Center on Computing and Society
    • Murray, W. (1992) ‘On computer security and public trust’, in Terrell Ward Bynum, Walter Maner and John L.Fodor (eds) Computing Security, Research Center on Computing and Society.
    • (1992) Computing Security
    • Murray, W.1
  • 109
    • 85069606629 scopus 로고
    • New Haven: Southern Connecticut State University
    • National Conference on Computing and Values (NCCV) (1992) Computing Security, New Haven: Southern Connecticut State University.
    • (1992) Computing Security
  • 110
    • 85069556286 scopus 로고
    • Ncsc conference report-a “knight lightning perspective
    • file 6
    • Neidorf, Craig (1990) ‘NCSC Conference report-a “Knight Lightning�? perspective’, Computer Underground Digest 2(7): file 6.
    • (1990) Computer Underground Digest , vol.2 , Issue.7
    • Neidorf, C.1
  • 111
    • 85069596530 scopus 로고
    • Computer security and human values
    • Terrell Ward Bynum, Walter Maner and John L.Fodor, New Haven: Research Center on Computing and Society
    • Neumann, P. (1992) ‘Computer security and human values’, in Terrell Ward Bynum, Walter Maner and John L.Fodor (eds) Computing Security, New Haven: Research Center on Computing and Society.
    • (1992) Computing Security
    • Neumann, P.1
  • 113
    • 85069547818 scopus 로고
    • Healthy hobby that becomes obsession
    • Thursday March 18:5
    • Nuttall, N. (1993) ‘Healthy hobby that becomes obsession’, The Times Thursday March 18:5.
    • (1993) The Times
    • Nuttall, N.1
  • 114
    • 85069604419 scopus 로고
    • Hacking is a crime, pure and simple
    • February: file 1
    • Parrish jr., E. (1989) ‘Hacking is a crime, pure and simple’, Phrack 2(24), February: file 1.
    • (1989) Phrack , vol.2 , Issue.24
    • Parrish, E.1
  • 116
    • 85069593771 scopus 로고
    • paper for the workshop on ‘Social Perspectives of Software’, Oxford, January
    • Pelaez, E (1990) ‘Soft ware’, paper for the workshop on ‘Social Perspectives of Software’, Oxford, January.
    • (1990) Soft Ware
    • Pelaez, E.1
  • 119
    • 85069562639 scopus 로고
    • Computers turned my boy into a robot
    • Thursday 18 March
    • Phillips, M. (1993) ‘Computers turned my boy into a robot’, Daily Mirror Thursday 18 March, pp. 1-4.
    • (1993) Daily Mirror , pp. 1-4
    • Phillips, M.1
  • 120
    • 85069572538 scopus 로고
    • Hacker penetrated mod
    • Tuesday 18 March: 1
    • Pithers, M. and Watts, S. (1993) ‘Hacker penetrated MoD’, Independent Tuesday 18 March: 1.
    • (1993) Independent
    • Pithers, M.1    Watts, S.2
  • 121
    • 0011517106 scopus 로고
    • German Informatics Society, 11 October, Stuttgart
    • Postman, N. (1990) ‘Informing ourselves to death’, German Informatics Society, 11 October, Stuttgart, available at: http://www.eff.org/pub/Net culture.
    • (1990) Informing Ourselves to Death
    • Postman, N.1
  • 122
    • 85069550870 scopus 로고    scopus 로고
    • Scales-O-Justice website
    • Poulsen, K. (undated) ‘Recidivism explained’, Scales-O-Justice website, available at: http:// catalog.com/kevin/returns.html.
    • Recidivism Explained
    • Poulsen, K.1
  • 123
    • 85069607274 scopus 로고    scopus 로고
    • letter to TV producer of an edition ofUnsolved Mysteries on Poulsen WWW site
    • Poulsen, K (undated-b), ‘Dark Dante’, letter to TV producer of an edition of Unsolved Mysteries on Poulsen WWW site, available at: http://catalog.com/kevin/usm.html.
    • Dark Dante
    • Poulsen, K.1
  • 124
    • 85069545589 scopus 로고
    • Thursday 18 July 1985
    • PR Newswire (1985) Thursday 18 July 1985, p. 2, available at: http://www.dsl.org/rn/doc/arc/nws/hcknews.hac.
    • (1985) , pp. 2
  • 127
    • 85069596288 scopus 로고    scopus 로고
    • The virtual philanderer
    • life section, 1 March: 11
    • Rayner, Jay (1997) ‘The virtual philanderer’, Observer, life section, 1 March: 11.
    • (1997) Observer
    • Rayner, J.1
  • 128
    • 84928833155 scopus 로고
    • Jacked in: Fordism, cyberpunk, marxism
    • Rosenthal, Pam (1991) ‘Jacked in: Fordism, cyberpunk, Marxism’, Socialist Review 21(1): 79-103.
    • (1991) Socialist Review , vol.21 , Issue.1 , pp. 79-103
    • Rosenthal, P.1
  • 130
    • 53149096948 scopus 로고
    • honours thesis, Sociology and Anthropology, Concordia University, Montreal
    • Rosteck, T. (1994) ‘Computer hackers: Rebels with a cause’, honours thesis, Sociology and Anthropology, Concordia University, Montreal, available at: http://geocities.com/CapeCanaveral/3498/.
    • (1994) Computer Hackers: Rebels with a cause
    • Rosteck, T.1
  • 132
    • 13444299304 scopus 로고
    • Hackers: Taking a byte out of computer crime
    • April
    • Roush, Wade ‘Hackers: Taking a byte out of computer crime’, Technology Review April 1995, available at: http://web.mit.edu/techreview/www/articles/apr95/Roush.html.
    • (1995) Technology Review
    • Roush, W.1
  • 134
    • 84976788704 scopus 로고
    • What is cyberspace?
    • Saffo, P. (1989) ‘What is cyberspace?’, Communications of the ACM 32(6):664-5.
    • (1989) Communications of the ACM , Issue.6 , pp. 664-665
    • Saffo, P.1
  • 135
    • 0003265515 scopus 로고    scopus 로고
    • Alt.Civilizations.Faq: Cyberspace as the darker side of the west
    • Z.Sardar and J.Ravetz, London: Pluto Press
    • Sardar, Ziauddin (1996), ‘alt.civilizations.faq: Cyberspace as the darker side of the West’, in Z.Sardar and J.Ravetz (eds) Cyberfutures: Culture and Politics on the Information Super-highway, London: Pluto Press.
    • (1996) Cyberfutures: Culture and Politics on the Information Super-Highway
    • Sardar, Z.1
  • 137
    • 3943108716 scopus 로고
    • Computer security: The achilles heel of the electronic air force?
    • January-February
    • Schell, R.R. (1979) ‘Computer security: The Achilles’ heel of the electronic air force?’ Air University Review XXX(2), January-February: 16-33.
    • (1979) Air University Review , vol.30 , Issue.2 , pp. 16-33
    • Schell, R.R.1
  • 138
    • 0042738159 scopus 로고
    • Cyberculture, cyborg post-modernism and the sociology of virtual reality technologies: Surfing the soul in the information age
    • June
    • Schroeder, R. (1994) ‘Cyberculture, cyborg post-modernism and the sociology of virtual reality technologies: Surfing the soul in the information age’, Futures 26(5), June: 519-28.
    • (1994) Futures , vol.26 , Issue.5 , pp. 519-528
    • Schroeder, R.1
  • 144
    • 85069550970 scopus 로고
    • Playgrounds of the mind: Cyberspace
    • file 6
    • Silicon Surfer (1990) ‘Playgrounds of the mind: Cyberspace’, Computer Underground Digest 2(17): file 6.
    • (1990) Computer Underground Digest , vol.2 , Issue.17
    • Surfer, S.1
  • 145
    • 33750337448 scopus 로고    scopus 로고
    • London: HarperCollins
    • Smith, Michael Marshall (1996) Spares, London: HarperCollins.
    • (1996) Spares
    • Smith, M.M.1
  • 147
    • 85069604326 scopus 로고
    • Three letters on computer security and society
    • CSD-TR-91-088
    • Spafford, E.H. (1991) ‘Three letters on computer security and society’, Purdue University Technical Report, CSD-TR-91-088.
    • (1991) Purdue University Technical Report
    • Spafford, E.H.1
  • 150
    • 3543038778 scopus 로고
    • Cambridge, MA: Free Software Foundation
    • Stallman, R. (1985) The GNU Manifesto, Cambridge, MA: Free Software Foundation.
    • (1985) The GNU Manifesto
    • Stallman, R.1
  • 151
    • 85069600471 scopus 로고
    • unpublished work placement report, The Centre for Research into Innovation Culture and Technology: Brunel University
    • Steele, K. (1988) ‘The social construction of the software crisis’, unpublished work placement report, The Centre for Research into Innovation Culture and Technology: Brunel University.
    • (1988) The Social Construction of the Software Crisis
    • Steele, K.1
  • 153
    • 85069559290 scopus 로고
    • Sterling, B (1991) CyberView 91 Report, available at: http://www.eff.org/pub/Net_culture_Bruce:Sterling/cyberview_91.report.
    • (1991) Cyberview 91 Report
    • Sterling, B.1
  • 155
    • 85069607980 scopus 로고
    • Why the legion of doom has little to fear from the feds
    • April 1991
    • Stockfield, B. (1991) ‘Why the Legion of Doom has little to fear from the Feds’, Business Week 22 April 1991:62.
    • (1991) Business Week , vol.22 , pp. 62
    • Stockfield, B.1
  • 157
    • 84933476272 scopus 로고    scopus 로고
    • Hackers: Cyberpunks or microserfs?
    • winter
    • Taylor, Paul A. (1998) ‘Hackers: Cyberpunks or microserfs?’, Information Communication &Society 1 (4), winter, 401-19.
    • (1998) Information Communication &Society , vol.1 , Issue.4 , pp. 401-419
    • Taylor, P.A.1
  • 158
    • 85069586397 scopus 로고    scopus 로고
    • December 1996
    • Thieme, R. (1996) Internet Underground December 1996:21-2, available at: http://www.paranoia.com/~mthreat/iu.html.
    • (1996) Internet Underground , pp. 21-22
    • Thieme, R.1
  • 161
    • 85069609539 scopus 로고
    • The evil that hackers do
    • file 4
    • Toxic Shock Group (1990) ‘The evil that hackers do’, Computer Underground Digest 2(6): file 4.
    • (1990) Computer Underground Digest , vol.2 , Issue.6
  • 163
    • 85069563332 scopus 로고
    • Computer abuse proposal gives police lot of room for discretion
    • translation of title, Amsterdam) 23 April
    • Uitenbrauer, F. (1991) ‘Computer abuse proposal gives police lot of room for discretion’ (translation of title), NRC Handelsbad (Amsterdam) 23 April.
    • (1991) RC Handelsbad
    • Uitenbrauer, F.1
  • 164
    • 85069606112 scopus 로고    scopus 로고
    • United Nations International Review of Criminal Policy-Manual on the Prevention and Control of Computer-related Crime, available at: http://www.ifs.univie.ac.at/~pr2gql/rev4344.html.
  • 167
    • 85069613802 scopus 로고    scopus 로고
    • Virtual Play: Baudrillard Online, available at: http://www.eff.org/pub/Netculture_ rnism.
  • 168
    • 84866809218 scopus 로고    scopus 로고
    • WarRoom, WarRoom Research, LLC
    • WarRoom (1996) ‘1996 information systems security survey’, WarRoom Research, LLC, available at: http://www.infowar.com/.
    • (1996) 1996 Information Systems Security Survey
  • 169
    • 85069563704 scopus 로고
    • Trial haunted by life in the twilight zone
    • Thursday 18 March: 4
    • Watts, S. (1993) ‘Trial haunted by life in the twilight zone’, The Times Thursday 18 March: 4.
    • (1993) The Times
    • Watts, S.1
  • 171
    • 85069598652 scopus 로고
    • An answer to sexism in the cu
    • no file number
    • Wilson, Brian Scott (1991) ‘An answer to sexism in the CU’, Computer Underground Digest 3(1): no file number.
    • (1991) Computer Underground Digest , vol.3 , Issue.1
    • Wilson, B.S.1
  • 173
    • 71549155525 scopus 로고
    • The social basis of computer viruses
    • Brunel University
    • Woolgar, S. and Russell, G. (1990) ‘The social basis of computer viruses’, in CRICTDiscussion Paper, Brunel University.
    • (1990) Crictdiscussion Paper
    • Woolgar, S.1    Russell, G.2
  • 175
    • 84970234217 scopus 로고
    • The hacker papers
    • August 1980
    • Zimbardo, P. (1980) ‘The hacker papers’, Psychology Today August 1980:62-9, available at: http://www.dsl.org/m/doc/arc/nws/hackpape.hac.
    • (1980) Psychology Today , pp. 62-69
    • Zimbardo, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.