1,119
Views
14
CrossRef citations to date
0
Altmetric
Research Article

Decoding the Binary: Reconsidering the Hacker Subculture through a Gendered Lens

, &
Pages 936-948 | Received 23 Jul 2018, Accepted 01 Aug 2018, Published online: 31 Mar 2019

References

  • Agnew, Robert. 1995. “Strain and Subcultural Theories of Criminality.” Pp. 305–327 in Criminology: A Contemporary Handbook, edited by. J. F. Sheley and CA Belmont. Wadsworth. Belmont, CA.
  • Ahmed, Sara. 2012. On Being Included. Durham, NC: Duke University Press.
  • Alfrey, Lauren and France W. Twine. 2017. “Gender-Fluid Geek Girls.” Gender & Society 31 (1):28–50. doi: 10.1177/0891243216680590
  • Bachmann, Michael. 2011. “Deciphering the Hacker Underground.” Pp. 105–26 in Corporate Hacking and Technology-Driven Crime, edited by Thomas J. Holt and Bernadette Schell. Hershey, PA: IGI Global,
  • Banks, James. 2018. “Radical Criminology and the Techno-Security-Capitalist Complex.” Pp. 102–15 in Technocrime and Criminological Theory, edited by Kevin F. Steinmetz and Matt R. Nobles. New York, NY: Routledge,
  • Barlow, John P. (1990). Crime and Puzzlement. Retrieved December 21, 2017 https://w2.eff.org/Misc/Publications/John_Perry_Barlow/HTML/crime_and_puzzlement_1.html.
  • Bossler, Adam M. and George W. Burruss. 2010. “The General Theory of Crime and Computer Hacking.” Pp. 38–67 in Corporate Hacking and Technology-Driven Crime, edited by Thomas J. Holt and Bernadette H. Schell. Hershey, PA: ISI Global,
  • Brake, Michael. 1980. The Sociology of Youth Cultures and Youth Subcultures. London: Routledge and Kegan Paul.
  • Butler, Judith. 1990. Gender Trouble. New York, NY: Routledge.
  • Crenshaw, Kimberle. 1991. “Mapping the Margins: Intersectionality, Identity Politics, and Violence Against Women of Color.” Stanford Law Review 43: 1241–1299.
  • Cohen, Albert K. 1955/2010. “Delinquent Boys.” Pp. 170–78 in Criminological Theory: Readings and Retrospectives, edited by Heith Copes and Volkan Topalli. New York, NY: McGraw-Hill,
  • Coleman, Gabriella E. 2012. “Phreaks, Hackers, and Trolls.” Pp. 99–119 in The Social Media Reader, edited by Michael Mandiberg. New York, NY: NYU Press,
  • Coleman, Gabriella E. 2014. Hacker, Hoaxer, Whistleblower, Spy. New York, NY: Verso.
  • Conger, Kate. 2017. “Exclusive: Here’s the Full 10-Page Anti-Diversity Screed Circulating Internally at Google.” Gizmodo, August 5. Retrieved from November 2, 2017 https://gizmodo.com/exclusive-heres-the-full-10-page-anti-diversity-screed-1797564320.
  • Connell, Raewyn W. 1987. Gender and Power. Stanford, CA: Stanford University Press.
  • Connell, Raewyn W., and James W. Messerschmidt. 2005. ““Hegemonic Masculinity: Rethinking The Concept.“. Gender & Society 19:829–859.
  • Décary-Hétu, David, Carlo Morselli, and Leman-Langlois. Stéphane. 2011. “Welcome to the Scene.” Journal of Research in Crime and Delinquency 49 (3):359–82. doi: 10.1177/0022427811420876
  • DeKeseredy, Walter S. and Martin D. Schwartz. 2010. “Friedman Economic Policies, Social Exclusion, and Crime.” Crime, Law and Social Change 54:159–70. doi: 10.1007/s10611-010-9251-8
  • Ferrell, Jeff. 2013. “Cultural Criminology and the Politics of Meaning.” Critical Criminology 21:251–71. doi: 10.1007/s10612-013-9186-3
  • Ferrell, Jeff. 2018. Drift. Oakland: University of California Press.
  • Ferrell, Jeff, Keith Hayward, and Jock Young. 2015. Cultural Criminology: An Invitation. 2nd ed. Thousand Oaks, CA: Sage.
  • Foster, Janet. 1990. Villains. London: Routledge.
  • Furnell, Steven. 2002. Cybercrime. Boston, MA: Addison-Wesley.
  • Gibson, William. 1984. Neuromancer. New York, NY: Penguin Group.
  • Giddens, Anthony. 1976. New Rules of Sociological Method. London, England: Hutchison.
  • Giddens, Anthony. 1981. “Agency, Institution, and Time-Space Analysis.” Pp. 161–74 in Advances in Social Theory and Methodology, edited by Karin Knorr-Cetina and A.V. Cicourel. New York, NY: Cambridge University Press,
  • Gilboa, Netta. 1996. “Elites, Lamers, Narcs and Whores.” Pp. 98–113 in Wired Women, edited by Lynn Cherny and Elizabeth R. Weise. Seattle, WA: Seal Press,
  • Hamm, Mark S. 2002. In Bad Company. Boston: Northeastern University Press.
  • Heidegger, Martin. 1977. The Question Concerning Technology and Other Essays. New York, NY: HarperPerennial.
  • Herbert, Steve. 1998. “Police Subculture Reconsidered.” Criminology 36:343–69. doi: 10.1111/j.1745-9125.1998.tb01251.x
  • Herring, Susan. 1994. “Politeness in Computer Culture.” Pp. 278–94 in Cultural Performances, edited by M. Bucholtz, A. Liang, and L. Sutton. Berkeley: Berkeley Women and Language Group,
  • Herring, Susan. 1999. “The Rhetorical Dynamics of Gender Harassment Online.” The Information Society 15 (3):151–67. doi: 10.1080/019722499128466
  • Holt, Thomas J. 2006. Gender and Hacking. Paper presented at the CarolinaCon ’06 Convention, Raleigh, NC.
  • Holt, Thomas J. 2007. “Subcultural Evolution?” Deviant Behavior 28 (2):171–98. doi: 10.1080/01639620601131065
  • Holt, Thomas J. 2009. “Lone Hacks or Group Cracks.” Pp. 336–55 in Crimes of the Internet, edited by Frank Schmalleger and Michael Pittaro. Upper Saddle River, NJ: Pearson Education,
  • Holt, Thomas J. 2010. “Examining the Role of Technology in the Formation of Deviant Subcultures.” Social Science Computer Review 28:466–81. doi: 10.1177/0894439309351344
  • Hutchings, Alice and Yi T. Chua. 2016. “Gendering Cybercrime.” Pp. 167–88 in Cybercrime through an Interdisciplinary Lens, edited by Thomas J. Holt. London: Routledge,
  • Hutchings, Alice, and Richard Clayton. 2017. “Exploring the Provision of Online Booter Services.” Deviant Behavior 37 (10):1163–78. doi:10.1080/01639625.2016.1169829.
  • Jane, Emma A. 2017. Misogyny Online. Thousand Oaks, CA: Sage.
  • Jeong, Sarah. 2017. “In Chatlogs, Celebrated Hacker and Activist Confesses Countless Sexual Assaults.” The Verge, November 19. Retrieved December 21, 2017 https://www.theverge.com/2017/11/19/16675704/morgan-marquis-boire-hacker-sexual-assault.
  • Jordan, Tim and Paul A. Taylor. 1998. “A Sociology of Hackers.” The Sociological Review 46 (4):757–80. doi: 10.1111/1467-954X.00139
  • Jordan, Tim and Paul A. Taylor. 2004. Hacktivism and Cyberwars. New York: Routledge.
  • Keller, Laurie S. 1988. “Machismo and the Hacker Mentality.” Paper presented to the WiC (Women in Computing) Conference, Lancaster, UK.
  • Kornblum, William. 1997. Sociology in a Changing World. 4th ed. Fort Worth, TX: Harcourt Brace and Company.
  • Kornhauser, Ruth. 1978. Social Sources of Delinquency: An Appraisal of Analytic Models. Chicago, IL: University of Chicago Press.
  • Laura, Naegler and Sara Salman. 2016. “Cultural Criminology and Gender Consciousness.” Feminist Criminology 11 (4):354–74. doi: 10.1177/1557085116660609
  • Levy, Steven. 1984. Hackers. New York: Dell.
  • Liza, Mundy. 2017. “Why Is Silicon Valley so Awful to Women?” The Atlantic, April. Retrieved from November 2, 2017 https://www.theatlantic.com/magazine/archive/2017/04/why-is-silicon-valley-so-awful-to-women/517788/.
  • Mantilla, Karla. 2015. Gendertrolling. Santa Barbara, CA: ABC-CLIO, LLC.
  • Marcum, Catherine D., George E. Higgins, Melissa L. Ricketts, and Scott E. Wolfe. 2014. “Hacking in High School.” Deviant Behavior 35 (7):581–91. doi: 10.1080/01639625.2013.867721
  • Matza, David. 1964. Delinquency and Drift. New York, NY: John Wiley & Sons, Inc.
  • Maurer, David W. 1981. Language of the Underworld. Lexington: University of Kentucky Press.
  • MacDonald, Marjorie. 2001. “Finding a Critical Perspective in Grounded Theory.” Pp.113-157 in Using Grounded Theory in Nursing edited by Rita S. Schreiber and Phyllis N. Stern New York, NY: Springer.
  • McRobbie, Angela, and Jenny Garber. 2005. “Girls and Subcultures.” Pp. 177–188 In Resistance Through Ritual - Youth Subcultures in Post-war Britain edited by Stuart Hall and Tony Jefferson. London: Routledge
  • Messerschmidt, James W. 1993. Masculinities and Crime. Lanham, MD: Rowman & Littlefield.
  • Miller, Jody. 2002. “The Strengths and Limits of ‘Doing Gender’ for Understanding Street Crime.” Theoretical Criminology 6:433–60. doi: 10.1177/136248060200600403
  • Miller, Walter B. 1958. “Lower Class Culture as a Generating Milieu of Gang Delinquency.” Journal of Social Issues 14 (3):5–19. doi: 10.1111/j.1540-4560.1958.tb01413.x
  • Nirgendwo. 1998. “Chapter 14: Female Hackers?” An English Translation of Linus Walleij’s Copyright Does Not Exist. Retrieved December 29, 2017 http://www.devili.iki.fi/pub/misc/books/cdne.pdf
  • Nwalozie, Chijioke. 2015. “Rethinking Subculture and Subcultural Theory in the Study of Youth Crime-A Theoretical Discourse.” Journal of Theoretical & Philosophical Criminology 7 (1):1–29.
  • Phillips, Whitney. 2015. This Is Why We Can’t Have Nice Things. Cambridge, MA: MIT Press.
  • Quinn, James F. and Craig J. Forsyth. 2005. “Describing Sexual Behavior in the Era of the Internet.” Deviant Behavior 26:191–207. doi: 10.1080/01639620590888285
  • Quinn, Zoë. 2017. Crash Override. New York, NY: Public Affairs.
  • Reagle, Joseph. 2017. “Naïve Meritocracy and the Meanings of Myth.” Ada (11): Retrieved from September 22, 2017 http://adanewmedia.org/2017/05/issue11-reagle/
  • Rogers, Marc, Natalie D. Smoak, and Jia Liu. 2006. “Self-Reported Deviant Computer Behavior.” Deviant Behavior 27 (3):245–68. doi: 10.1080/01639620600605333
  • Rotundo, E. Anthony. 1998. “Boy Culture.” Pp. 337–62 in The Children’s Culture Reader, edited by Henry Jenkins. New York: NYU Press,
  • Schell, Bernadette H., J. L. Dodge, and Steve S. Moutsatsos. 2002. The Hacking of America. Westport, CT: Quorum Books.
  • Silverman, David. 2001. Interpreting Qualitative Data: Methods of Analysing Talk, Text and Interaction (2nd ed.). London: Sage.
  • Skinner, William F. and Anne M. Fream. 1997. “A Social Learning Theory Analysis of Computer Crime among College Students.” Journal of Research in Crime and Delinquency 34:495–518. doi: 10.1177/0022427897034004005
  • Spertus, Ellen. 1991. “Why Are There So Few Female Computer Scientists?” MIT Artificial Intelligence Lab Technical Report 1315. Retrieved December 21, 2017, ftp://publications.ai.mit.edu/ai-publications/pdf/AITR-1315.pdf.
  • Steinmetz, Kevin F. 2015. “Craft(Y)Ness.” British Journal of Criminology 55:125–45. doi: 10.1093/bjc/azu061
  • Steinmetz, Kevin F. 2016. Hacked: A Radical Approach to Hacker Culture and Crime. New York, NY: NYU Press.
  • Sykes, Gresham M. and David Matza. 1957. “Techniques of Neutralization.” American Sociological Review 22 (6):664–70. doi: 10.2307/2089195
  • Tanczer, Leonie M. 2016. “Hacktivism and the Male-Only Stereotype.” New Media & Society 18 (8):1599–615. doi: 10.1177/1461444814567983
  • Taylor, Paul A. 2003. “Maestros or Misogynists?.” Pp. 126–46 in Dot.Cons: Crime, Deviance and Identity on the Internet, edited by Yvonne Jewkes. Portland, OR: Willan Publishing,
  • Taylor, Paul. A. 1999. Hackers: Crime in the Digital Sublime. New York, NY: Routledge.
  • Thomas, Douglas. 2002. Hacker Culture. Minneapolis: University of Minnesota Press.
  • Turkle, Sherry. 1984. The Second Self. New York, NY: Simon and Schuster.
  • Ullman, Ellen. 1997. Close to the Machine. San Francisco: City Lights Books.
  • Wajcman, Judy. 1991. Feminism Confronts Technology. University Park, PA: The Pennsylvania State University Press.
  • Wall, David S. 2012. “The Devil Drives a Lada.” Pp. 4–18 in Constructing Crime, edited by C. Gregoriou. Basingstoke, UL: Palgrave MacMillan,
  • Warnick, Bryan R. 2004. “Technological Metaphors and Moral Education.” Studies in Philosophy and Education 23:265–81. doi: 10.1023/B:SPED.0000028400.55658.9e
  • Wolfgang, Marvin E., F. and Franco Ferracuti. 1967. The Subculture of Violence. London: Tavistock Publications.
  • Yar, Majid. 2005. “Computer Hacking?” Howard Journal of Criminal Justice 44 (4):387–99. doi: 10.1111/j.1468-2311.2005.00383.x
  • Yar, Majid. 2013. Cybercrime and Society. 2nd ed. Thousand Oaks, CA: Sage.
  • Young, Jock. 2007. The Vertigo of Late Modernity. Thousand Oaks, CA: Sage.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.