Hackers' Accounts

Hacking is a widespread international phenomenon, and hackers' actions occasionally reach the media headlines. This study was designed to explore hackers' accounts. Understanding the concept of accounts is important in itself because it enables us to comprehend how people view themselves within their cultural context. The research was based on unstructured, in-depth, face-to-face interviews with 54 Israeli hackers who where asked to tell their life stories. The interviewees were located by a snowball or chain referral sampling strategy. This study found that hacking in general, and penetrating computer systems or software in particular, constitutes a new form of entertainment for hackers. Thus, as it is based on the play-like quality that characterizes the use of digital technology, hacking often constitutes a new form of social activity.

[1]  P. Taylor Hacktivism : In search of lost ethics? , 2003 .

[2]  Christa Reiser,et al.  Social Stratification and the Digital Divide , 2003 .

[3]  Olga V. Smyslova,et al.  Flow-Based Model of Computer Hackers' Motivation , 2003, Cyberpsychology Behav. Soc. Netw..

[4]  Reid Skibell The Myth of the Computer Hacker , 2002 .

[5]  Brenda Danet,et al.  Cyberpl@y: Communicating Online , 2001 .

[6]  M. Castells,et al.  The Hacker Ethic and the Spirit of the Information Age , 2001 .

[7]  Jan Ljungberg,et al.  Open source movements as a model for organising , 2000, ECIS.

[8]  Paul A. Taylor,et al.  Hackers: Crime in the Digital Sublime , 1999 .

[9]  Gisle Hannemyr Technology and Pleasure: Considering Hacking Constructive , 1999, First Monday.

[10]  Laura J Gurak,et al.  Wired women: Gender and new realities in cyberspace , 1999 .

[11]  T. Jordan,et al.  A Sociology of Hackers , 1998 .

[12]  A. Lieblich,et al.  Narrative Research: Reading, Analysis, and Interpretation , 1998 .

[13]  H. Omer,et al.  Constructing Therapeutic Narratives , 1997 .

[14]  Debora Halbert Discourses of Danger and the Computer Hacker , 1997, Inf. Soc..

[15]  W. F. Skinner,et al.  A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .

[16]  T. Orbuch,et al.  People's Accounts Count: The Sociology of Accounts , 1997 .

[17]  S. Gardiner,et al.  Computer Crime in the Global Village: Strategies for Control and Regulation — in Defence of the Hacker , 1996 .

[18]  A. Chandler,et al.  The Changing Definition and Image of Hackers in Popular Discourse , 1996 .

[19]  C. Stanley Teenage kicks: Urban narratives of dissent not deviance , 1995 .

[20]  Pamela Jordan Basics of qualitative research: Grounded theory procedures and techniques , 1994 .

[21]  Wade Roush Hackers taking a byte out of computer crime , 1994 .

[22]  Bruce C. Straits,et al.  Approaches to social research , 1993 .

[23]  Bruce Sterling,et al.  The Hacker Crackdown: Law and Disorder on the Electronic Frontier , 1992 .

[24]  Scott H. Decker,et al.  A Snowball's Chance in Hell: Doing Fieldwork with Active Residential Burglars , 1992 .

[25]  J. D. Orcutt The Politics and Morality of Deviance: Moral Panics, Drug Abuse, Deviant Science, and Reversed Stigmatization.By Nachman Ben-Yehuda. SUNY Press, 1990. 320 pp. Cloth, $49.50; paper, $16.95 , 1992 .

[26]  Clive Davidson,et al.  Cyberpunk: Outlaws and hackers on the computer frontier , 1992 .

[27]  D. Bar-On,et al.  A Biographical Case Study of a Victimizer's Daughter's Strategy: Pseudo-Identification With the Victims of the Holocaust , 1992 .

[28]  Richard C. Hollinger,et al.  Hackers: computer heroes or electronic highwaymen? , 1991, CSOC.

[29]  Keith Jackson,et al.  Computer ethics: Cautionary tales and ethical dilemmas in computing , 1990 .

[30]  J. Katz,et al.  Seductions of Crime: Moral and Sensual Attractions in Doing Evil. , 1990 .

[31]  Donn B. Parker Computer Crime: Criminal Justice Resource Manual (Second Edition). , 1989 .

[32]  Parker Computer Crime: Criminal Justice Resource Manual (2nd ed.) , 1989 .

[33]  L. Lanza-Kaduce,et al.  THE PROCESS OF CRIMINALIZATION: THE CASE OF COMPUTER CRIME LAWS* , 1988 .

[34]  Anselm L. Strauss,et al.  Qualitative Analysis For Social Scientists , 1987 .

[35]  Les Johnson,et al.  The Information Technology Revolution , 1986, J. Inf. Technol..

[36]  Ulrich Sieber The international handbook on computer crime , 1986 .

[37]  Nachman Ben-Yehuda Deviance in Science: Towards the Criminology of Science , 1986 .

[38]  Ulrich Sieber The international handbook on computer crime - computer-related economic crime and the infringements of privacy , 1986 .

[39]  Suzanne K. Damarin,et al.  The second self: Computers and the human spirit , 1985 .

[40]  Steven Levy,et al.  Hackers: Heroes of the Computer Revolution , 1984 .

[41]  Howard S. Becker,et al.  Becoming a Marijuana User , 1982 .

[42]  C. Tapper Computer Crime , 1981, The Medico-legal journal.

[43]  C. Geertz The interpretation of cultures: Selected essays , 1975 .

[44]  A. Strauss,et al.  The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .

[45]  Gresham M. Sykes,et al.  Juvenile Delinquency and Subterranean Values , 1961 .

[46]  Rashed A. Chowdhury Accounts , 1949, Journal of the Royal Asiatic Society.

[47]  C. Mills Situated Actions and Vocabularies of Motive , 1940 .