Works Cited CandyMan. Online definitions, http://www.mgmua.com/hackers/inventory/definitions.html. Crash, Doctor. "The Techno-Revolution." Phrack, 1 (6), 1986. Deane, Joel. "Has Back Orifice gone legit?" http://www.zdnet.com/pcweek/stories/news/0,4153,1015473,00.html, ZDNET: July 12, 1999. Dibbel, Julian. "The Prisoner: Phiber Optik Goes Directly to Jail." Online Village Voice article, http://www.levity.com/julian/phiber.html, 1994. "electrohippies website." http://www.greennet.org.uk/ehippies/, 1999. "Falling Through the Net: Defining the Digital Divide." Online Report, http://www.ntia.doc.gov/ntiahome/fttn99/contents.html, 1999. Gibson, William. Neuromancer. Electronic book, http://www.cyberpunkproject.org/idb/gibson_neuromancer.html, 1984. Gilboa, Netta. Interview of Erik Bloodaxe. Online, http://www.eff.org/pub/Privacy/Security/Hacking_cracking_phreaking/Net_culture_and_hacking/Hackers/bloodaxe-goggans_94.interview, 1994. Hafner, Katie and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster, 1991. "Human Development Report." Online report, http://www.undp.org/hdro/, 1999. Jordan, Tim and Paul Taylor. "A Sociology of Hackers." The Sociological Review, 46 (4), 1998, 757-780. "Lamer Speak." Online text file, http://www.fwi.uva.nl/~mes/jargon/l/Lamer-speak.html, 1996. Levy, Steven. Hackers: Heroes of the Computer Revolution. Electronic book, ftp://sailor.gutenberg.org/pub/gutenberg/etext96/hckrs10.txt, 1984. Mentor, The. "The Conscience of a Hacker." Phrack, 1 (7), 1986. Phrack. Online electronic journal, http://www.phrack.com. Issues 1 – 55 : 1985-1999. Meyer, Gordon R. "The Social Organization of The Computer Underground." Online Masters Thesis, http://www.eff.org/pub/Privacy/Security/Hacking_cracking_phreaking/Net_culture_and_hacking/Hackers/soc_org_of_comp_underground.paper, 1989. Mizrach, Steve. "Old Hackers, New Hackers: What's the Difference?" Online essay, http://www.eff.org/pub/Privacy/Security/Hacking_cracking_phreaking/Net_culture_and_hacking/Hackers/old_and_new_hackers.article. Online Congressional Testimony. http://eff.bilkent.edu.tr/pub/GII_NII/Commerce_online/Digital_money/Crypto_misc/Computer_security/markey_goldstein.testimony, 1993. Raymond, Eric S. "A Brief History of Hackerdom." Online essay, http://www.tuxedo.org/~esr/writings/hacker-history/hacker-history.html, 1999. Robin, Michael. "Technology For The Coming Millennium." Interview of Kirkpatrick Sale. Online, http://www.gn.apc.org/pmhp/dc/activism/saleludd.htm, 1996. Sterling, Bruce. The Hacker Crackdown. Electronic book, ftp://uiarchive.cso.uiuc.edu/pub/etext/gutenberg/etext94/hack11a.txt, 1994. Stoll, Clifford. "Stalking the wily hacker." Online journal article, http://www.eff.org/pub/Privacy/Security/Hacking_cracking_phreaking/Net_culture_and_hacking/Hackers/stalking_the_wily_hacker.article, 1984. Trigaux, Robert. "A history of hacking." St. Petersburg Times Online, http://www.sptimes.com/Hackers/history.hacking.html, 1998. Van Slambrouck, Paul. "Cyber threats: How serious?" Christian Science Monitor, 03/09/98, p. 1.
|
Index Introduction Theoretical Framework Methodology Hacking History Phone Hacking What is Hacking? Juvenile Discourse, Black Hats, and White Hats Hacker Language Juvenility and Carding Problems with the White Hat Hacking Discourse Nostalgic Discourse Problems with the Nostalgic Discourse Law Enforcement and Computer Security Discourse The Legal Discourse Problems with the Law Enforcement Discourse Media Discourse Technopower Hackers as Resistance (illegal and legal) Limitations to Resistance Conclusion Works Cited |