Computer Hacking as a Social Problem
暂无分享,去创建一个
[1] P. Gerbaudo. Tweets and the Streets: Social Media and Contemporary Activism , 2012 .
[2] M. Berman. All that is solid melts into air : the experience of modernity , 1982 .
[3] Johan Sderberg,et al. Hacking Capitalism: The Free and Open Source Software Movement , 2007 .
[4] Dànielle Nicole DeVoss,et al. Why Napster matters to writing: Filesharing as a new ethic of digital delivery , 2006 .
[5] Hackers: Cyberpunks or microserfs? , 1998 .
[6] David M. Berry,et al. The Contestation of Code: A Preliminary Investigation into the Discourse of the Free Software and Open Software Movement , 2004 .
[7] J. Richards. Cyber-War: The Anatomy of the Global Security Threat , 2014 .
[8] Orly Turgeman-Goldschmidt. Hackers' Accounts , 2005 .
[9] D. Wall. Cybercrime: The Transformation of Crime in the Information Age , 2007 .
[10] Sandor Vegh. The media's portrayal of hacking, hackers, and hacktivism before and after September 11 , 2005, First Monday.
[11] Janina Muller,et al. Outsiders Studies In The Sociology Of Deviance , 2016 .
[12] M. Yar,et al. Book Review: Cybercrime and Society , 2006 .
[13] I. Bogost,et al. Games of Empire: Global Capitalism and Video Games , 2010 .
[14] Jock Given,et al. The wealth of networks: How social production transforms markets and freedom , 2007, Inf. Econ. Policy.
[15] Gemma Horton. Information politics: liberation and exploitation in the digital society , 2018, Information, Communication & Society.
[16] Johan Söderberg,et al. Misuser Inventions and the Invention of the Misuser: Hackers, Crackers and Filesharers , 2010 .
[17] William L. Simon,et al. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , 2005 .
[18] Brian W. Alleyne. Challenging Code: A Sociological Reading of the KDE Free Software Project , 2011 .
[19] N. Dyer-Witheford,et al. Games of Empire: Global Capitalism and Video Games , 2010 .
[20] A. Jamrozik,et al. The Sociology of Social Problems: Theoretical Perspectives and Methods of Intervention , 1998 .
[21] John L. Rice,et al. Cybercrime: Understanding and addressing the concerns of stakeholders , 2011, Comput. Secur..
[22] Michael Kenney. Cyber-Terrorism in a Post-Stuxnet World , 2015 .