856
Views
26
CrossRef citations to date
0
Altmetric
Original Articles

The Myth of the Computer Hacker

Pages 336-356 | Published online: 14 Dec 2010

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (7)

DeJarvis Oliver & Adriane. B. Randolph. (2022) Hacker Definitions in Information Systems Research. Journal of Computer Information Systems 62:2, pages 397-409.
Read now
Peter Nagy, Joey Eschrich & Ed Finn. (2021) Time hacking: how technologies mediate time. Information, Communication & Society 24:15, pages 2229-2243.
Read now
Erin Harbinson & Nicole Selzer. (2019) The risk and needs of cyber-dependent offenders sentenced in the United States. Journal of Crime and Justice 42:5, pages 582-598.
Read now
RobertG. Morris & AshleyG. Blackburn. (2009) CRACKING THE CODE: AN EMPIRICAL EXPLORATION OF SOCIAL LEARNING THEORY AND COMPUTER CRIME. Journal of Crime and Justice 32:1, pages 1-34.
Read now
Randall Young & Lixuan Zhang. (2007) Illegal Computer Hacking: An Assessment of Factors that Encourage and Deter the Behavior. Journal of Information Privacy and Security 3:4, pages 33-52.
Read now

Articles from other publishers (19)

Ethem Ilbiz & Christian KaunertEthem Ilbiz & Christian Kaunert. 2023. The Sharing Economy for Tackling Cybercrime. The Sharing Economy for Tackling Cybercrime 13 28 .
Christian Mehrstam. (2022) WarGames and the Refamiliarization of the Hacker . Genre 55:3, pages 235-258.
Crossref
Eric Zufferey. 2022. Where Has Social Justice Gone?. Where Has Social Justice Gone? 193 208 .
Jacob W. Justice & Brett J. Bricker. (2019) Hacked: Defining the 2016 Presidential Election in the Liberal Media. Rhetoric and Public Affairs 22:3, pages 389-420.
Crossref
Michael Tan. (2018) When Makerspaces Meet School: Negotiating Tensions Between Instruction and Construction. Journal of Science Education and Technology 28:2, pages 75-89.
Crossref
. 2019. Où est passée la justice sociale ?. Où est passée la justice sociale ? 365 396 .
Paul Joseph Barnett & Ralf Romeike. 2017. The Cambridge Handbook of Creativity across Domains. The Cambridge Handbook of Creativity across Domains 299 322 .
Kevin F. Steinmetz. (2017) Ruminations on Warning Banners, Deterrence, and System Intrusion Research. Criminology & Public Policy 16:3, pages 727-737.
Crossref
Kathryn C. Seigfried-Spellar, Nicolás Villacís-Vukadinović & Donald R. Lynam. (2017) Computer criminal behavior is related to psychopathy and other antisocial behavior. Journal of Criminal Justice 51, pages 67-73.
Crossref
Thierry Balzacq & Myriam Dunn Cavelty. (2016) A theory of actor-network for cyber-security. European Journal of International Security 1:2, pages 176-198.
Crossref
Scott Hamilton Dewey. (2016) (Non-)use of Foucault’s Archaeology of Knowledge and Order of Things in LIS journal literature, 1990-2015 . Journal of Documentation 72:3, pages 454-489.
Crossref
Alfons van Marrewijk. (2016) Conflicting Subcultures in Mergers and Acquisitions: a Longitudinal Study of Integrating a Radical Internet Firm into a Bureaucratic Telecoms Firm. British Journal of Management 27:2, pages 338-354.
Crossref
Kevin F. Steinmetz. (2015) Craft(y)ness. British Journal of Criminology 55:1, pages 125-145.
Crossref
Maura Conway. 2014. Cyber Behavior. Cyber Behavior 217 245 .
Myriam Dunn Cavelty. (2013) From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse. International Studies Review 15:1, pages 105-122.
Crossref
Maura Conway. 2012. Law, Policy, and Technology. Law, Policy, and Technology 279 307 .
Mark Rounds & Norman Pendgraft. (2009) Diversity in Network Attacker Motivation: A Literature Review. Diversity in Network Attacker Motivation: A Literature Review.
Kris Erickson & Philip N. Howard. (2007) A Case of Mistaken Identity? News Accounts of Hacker, Consumer, and Organizational Responsibility for Compromised Digital Records. Journal of Computer-Mediated Communication 12:4, pages 1229-1247.
Crossref
James R. Francisco. (2004) Defensive Information Warfare: A Review of Selected Literature. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.