Hackers' Accounts
暂无分享,去创建一个
[1] P. Taylor. Hacktivism : In search of lost ethics? , 2003 .
[2] Christa Reiser,et al. Social Stratification and the Digital Divide , 2003 .
[3] Olga V. Smyslova,et al. Flow-Based Model of Computer Hackers' Motivation , 2003, Cyberpsychology Behav. Soc. Netw..
[4] Reid Skibell. The Myth of the Computer Hacker , 2002 .
[5] Brenda Danet,et al. Cyberpl@y: Communicating Online , 2001 .
[6] M. Castells,et al. The Hacker Ethic and the Spirit of the Information Age , 2001 .
[7] Jan Ljungberg,et al. Open source movements as a model for organising , 2000, ECIS.
[8] Paul A. Taylor,et al. Hackers: Crime in the Digital Sublime , 1999 .
[9] Gisle Hannemyr. Technology and Pleasure: Considering Hacking Constructive , 1999, First Monday.
[10] Laura J Gurak,et al. Wired women: Gender and new realities in cyberspace , 1999 .
[11] T. Jordan,et al. A Sociology of Hackers , 1998 .
[12] A. Lieblich,et al. Narrative Research: Reading, Analysis, and Interpretation , 1998 .
[13] H. Omer,et al. Constructing Therapeutic Narratives , 1997 .
[14] Debora Halbert. Discourses of Danger and the Computer Hacker , 1997, Inf. Soc..
[15] W. F. Skinner,et al. A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .
[16] T. Orbuch,et al. People's Accounts Count: The Sociology of Accounts , 1997 .
[17] S. Gardiner,et al. Computer Crime in the Global Village: Strategies for Control and Regulation — in Defence of the Hacker , 1996 .
[18] A. Chandler,et al. The Changing Definition and Image of Hackers in Popular Discourse , 1996 .
[19] C. Stanley. Teenage kicks: Urban narratives of dissent not deviance , 1995 .
[20] Pamela Jordan. Basics of qualitative research: Grounded theory procedures and techniques , 1994 .
[21] Wade Roush. Hackers taking a byte out of computer crime , 1994 .
[22] Bruce C. Straits,et al. Approaches to social research , 1993 .
[23] Bruce Sterling,et al. The Hacker Crackdown: Law and Disorder on the Electronic Frontier , 1992 .
[24] Scott H. Decker,et al. A Snowball's Chance in Hell: Doing Fieldwork with Active Residential Burglars , 1992 .
[25] J. D. Orcutt. The Politics and Morality of Deviance: Moral Panics, Drug Abuse, Deviant Science, and Reversed Stigmatization.By Nachman Ben-Yehuda. SUNY Press, 1990. 320 pp. Cloth, $49.50; paper, $16.95 , 1992 .
[26] Clive Davidson,et al. Cyberpunk: Outlaws and hackers on the computer frontier , 1992 .
[27] D. Bar-On,et al. A Biographical Case Study of a Victimizer's Daughter's Strategy: Pseudo-Identification With the Victims of the Holocaust , 1992 .
[28] Richard C. Hollinger,et al. Hackers: computer heroes or electronic highwaymen? , 1991, CSOC.
[29] Keith Jackson,et al. Computer ethics: Cautionary tales and ethical dilemmas in computing , 1990 .
[30] J. Katz,et al. Seductions of Crime: Moral and Sensual Attractions in Doing Evil. , 1990 .
[31] Donn B. Parker. Computer Crime: Criminal Justice Resource Manual (Second Edition). , 1989 .
[32] Parker. Computer Crime: Criminal Justice Resource Manual (2nd ed.) , 1989 .
[33] L. Lanza-Kaduce,et al. THE PROCESS OF CRIMINALIZATION: THE CASE OF COMPUTER CRIME LAWS* , 1988 .
[34] Anselm L. Strauss,et al. Qualitative Analysis For Social Scientists , 1987 .
[35] Les Johnson,et al. The Information Technology Revolution , 1986, J. Inf. Technol..
[36] Ulrich Sieber. The international handbook on computer crime , 1986 .
[37] Nachman Ben-Yehuda. Deviance in Science: Towards the Criminology of Science , 1986 .
[38] Ulrich Sieber. The international handbook on computer crime - computer-related economic crime and the infringements of privacy , 1986 .
[39] Suzanne K. Damarin,et al. The second self: Computers and the human spirit , 1985 .
[40] Steven Levy,et al. Hackers: Heroes of the Computer Revolution , 1984 .
[41] Howard S. Becker,et al. Becoming a Marijuana User , 1982 .
[42] C. Tapper. Computer Crime , 1981, The Medico-legal journal.
[43] C. Geertz. The interpretation of cultures: Selected essays , 1975 .
[44] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[45] Gresham M. Sykes,et al. Juvenile Delinquency and Subterranean Values , 1961 .
[46] Rashed A. Chowdhury. Accounts , 1949, Journal of the Royal Asiatic Society.
[47] C. Mills. Situated Actions and Vocabularies of Motive , 1940 .