References
- AFP (2004) ‘Mydoom overtakes Sobig.F as biggest computer virus ever’, 29 Jan.
- AFP (2005) ‘Experts warn against hiring hackers’, 23 May.
- Anders , G. 1956/2002 . L'Obsolescence de l'homme , Paris : Editions de l'Encyclopédie des nuisances . trans. Christophe David
- Anon. 2003 . Meet the superbugs . Australian Personal Computer , : 82 – 86 . (Feb.),
- Basel Action Network (2002) Exporting Harm: the High-tech Trashing of Asia, Available at: http://www.ban.org (accessed 15 Jun. 2004).
- Bequai , A. 1997 . Organized crime: manipulating cyberspace . Computer Audit Update , 1997 ( 12 ) : 25 – 29 .
- Breton , P. 2000 . Le culte de l'Internet. Une menace pour le lien social? , Paris : Editions La Découverte .
- Brock, J. L. (1996) ‘Information security: computer attacks at Department of Defense pose increasing risks’, Testimony before the Permanent Subcommittee on Investigations, Committee on Government Affairs, US Senate, Available at: http://www.fas.org/irp/gao/aim96084.htm (accessed 30 Mar. 2004).
- Business Software Alliance (BSA) (2001) Sixth Annual BSA Global Software Piracy Study.
- Castells , M. 1997 . End of Millennium. The Information Age: Economy, Society and Culture , vol. III , London : Blackwell .
- Clinton , W. J. 1999 . Keeping America Secure for the 21st Century . Proceedings of the National Academy of Sciences , 96 ( 7 ) : 3486 – 3488 .
- Cohen , F. 1987 . Computer viruses: theory and experiments . Computers and Security , 6 ( 1 ) : 22 – 35 .
- Deleuze , G. and Guattari , F. 1987 . A Thousand Plateaux: Capitalism and Schizophrenia , London : Athlone . trans. Brian Massumi
- Delio, M. (2004) ‘Spyware on my machine? So what?’, Wired News, 6 Dec., Available at: http://www.wired.com/news/technology/0,1282,65906,00.html (accessed 10 Dec. 2004).
- Denning, D. E. (1990) ‘Concerning hackers who break into computer systems’, Phrack, no. 32, Available at: http://www.phrack.org (accessed 30 Mar. 2004).
- Denning, D. E. (1999) ‘Activism, hacktivism, and cyberterrorism: the Internet as a tool for influencing foreign policy’, Nautilus Conference, Available at: http://www.nautilus.org/infopolicy/workshop/papers/denning.html (accessed 30 Mar. 2004).
- Dyer-Witheford , N. 1999 . Cyber-Marx. Cycles and Circuits of Struggle in High-technology Capitalism , Urbana and Chicago : University of Illinois Press .
- Eunjung Cha , A. 2003 . Internet dreams turn to crime. Russian start-up firm targeted U.S. companies . The Washington Post , : A01 18 May,
- Eunjung Cha , A. 2004 . Computer users face new scourge. Hidden adware programs hijack hard drives . The Washington Post , : A01 10 Oct,
- Ferronato, M. (2004) ‘The VX scene’, I love you, Available at: http://www.digitalcraft.org/iloveyou/catalogue_VXscene_Massimo_Ferronato.htm (accessed 15 Dec. 2004).
- Foucart , S. 2003 . Internet est victime d'une recrudescence des attaques de virus . Le Monde , 3 : 23 Sep.,
- Ghosh, R. A. (1998) ‘FM interview of Linus Torvalds. What motivates free software developers?’, First Monday, vol. 3, no. 3 Available at: http://www.firstmonday.org/issues/issue3_3/torvalds/index.html (accessed 12 Jan. 2004).
- Gibson , W. 1984 . Neuromancer , New York : Ace Books .
- Gibson , W. 1986 . Count Zero , New York : Ace Books .
- Gibson , W. 1988 . Mona Lisa Overdrive , New York : Bantam Books .
- Grugq, The. (2001a) Cheating the ELF: Subversive Dynamic Linking to Libraries, Available at: http://hcunix.7350.org/grugq/doc/subversiveld.pdf (accessed 21 Mar. 2004).
- Grugq, The. (2001b) ‘Subversive dynamic linking on UNIX platforms’, Neohapsis Archives, Available at: http://archives.neohapsis.com/archives/vuln-dev/2001-q4/0333.html (accessed 30 Mar. 2004).
- Halbert , D. 1997 . Discourses of danger and the computer hacker . The Information Society , 13 : 361 – 374 .
- Hales, P. (2002) ‘Cyber security act slips into homeland security legislation. Hackers face life imprisonment, snoops gain sweeping powers’, The Inquirer, 14 Nov., Available at: http://www.theinquirer.net/?article=6250 (accessed 30 Mar. 2004).
- Haraway , D. 1991 . Simians, Cyborgs and Women: the Reinvention of Nature , New York : Routledge .
- Heintz , J. 2000 . Russia home to hard-working hackers. Notorious or desperate? Economic woes encourage fabled “khakeri” . The Associated Press , 20 Nov
- Helmreich , S. 2000 . Flexible infections: computer viruses, human bodies, nation-states, evolutionary capitalism . Science, Technology & Human Values , 25 ( 4 ) : 472 – 491 .
- Himanen , P. 2001 . The Hacker Ethic. A Radical Approach to the Philosophy of Business , New York : Random House .
- Jordan , T. and Taylor , P. 1998 . A sociology of hackers . The Sociological Review , 46 ( 4 ) : 757 – 780 .
- Kan, G. (2001) ‘Next step for P2P? Open service', openp2p.com, 8 Feb., Available at: http://www.openp2p.com/pub/a/p2p/2001/08/02/openservices.html (accessed 27 Jan. 2005).
- Klein , N. 2000 . No Logo: Taking Aim at the Brand Bullies , London : Flamingo .
- Krebs, B. (2003) ‘Internet worm hits airlines, banks’, washingtonpost.com, 26 Jan., Available at: http://www.washingtonpost.com/wp-dyn/articles/A46928-2003Jan26.html (accessed 15 Jan. 2004).
- Levy , S. 1984 . Hackers: Heroes of the Computer Revolution , New York : Doubleday .
- Lowe , S. 2004 . The worm has turned . Sydney Morning Herald , 13 : 16 May.,
- Mandosio , J.-M. 2000 . Après l'effondrement. Notes sur l'utopie néotechnologique , Paris : Editions de l'Encyclopédie des nuisances .
- Marx , K. 1973 . Grundrisse , Harmondsworth : Penguin .
- McGuire, D. (2004) ‘Mashboxx aims to make file sharing legit. Grokster founder prepares licensed P2P service’, washingtonpost.com, 22 Dec., Available at: http://www.washingtonpost.com/wp-dyn/articles/A18568-2004Dec22.html?referrer=email (accessed 24 Jan. 2005).
- Musgrove , M. 2005 . Microsoft offers anti-spyware software. Analysts say move signals interest in security market . The Washington Post , 7 Jan. : E05
- Negri , T. 1994 . Constituent republic . Common Sense , 16 : 88 – 96 .
- Nissenbaum , H. 2004 . Hackers and the contested ontology of cyberspace . New Media and Society , 6 ( 2 ) : 195 – 217 .
- Parikka, J. (2005) ‘Digital monsters, binary aliens—computer viruses, capitalism and the flow of information’, Fibreculture, no. 4, Available at: http://journal.fibreculture.org/issue4/issue4_parikka.html (accessed 15 Oct. 2005).
- Pax , S. 2003 . The Baghdad Blog , London : Atlantic Books .
- Poulsen, K. (2003) ‘Matrix sequel has hacker cred’, SecurityFocus, 16 May 2003, Available at: http://www.theregister.co.uk/2003/05/16/matrix_sequel_has_hacker_cred/ (accessed 8 Dec. 2004).
- Qing , S. and Wen , W. 2005 . A survey and trends on internet worms . Computers & Security , 24 : 334 – 346 .
- Raymond, E. (1986) ‘How to become a hacker’, Thyrsus Enterprises, Available at: http://www.catb.org/~esr/faqs/hacker-howto.html (accessed 30 Mar. 2004).
- Raymond , E. 1998 . The cathedral and the bazaar . First Monday , 3 ( 3 ) Available at: http://www.firstmonday.org/issues/issue3_3/raymond/index.html (accessed 5 Jun. 2003)
- Ross , A. 1991 . “ Hacking away at the counterculture ” . In Technoculture , Edited by: Penley , C. and Ross , A. Minneapolis : University of Minnesota Press .
- Schiller , D. 1999 . Digital Capitalism. Networking the Global Market System , Cambridge, MA : MIT Press .
- Shipley, G. (1999) ‘Anatomy of a network intrusion’, Network Computing, 18 Oct., Available at: http://www.networkcomputing.com/1021/1021ws1.html (accessed 12 Jan. 2004).
- Stallman, R. (1985) ‘‘Why I must write GNU’, The GNU Manifesto Web page’, Available at: http://www.gnu.org/gnu/manifesto.html (accessed 5 Jun. 2003).
- Sterling , B. 1992 . The Hacker Crackdown. Law and Disorder on the Electronic Frontier , New York : Bantam Books .
- Tanner , A. 2004 . Hackers seek to save America . Reuters , 17 Sep
- Thompson , C. 2004 . The virus underground . The New York Times Magazine , 8 : 28 – 36 . Feb.,
- Turkle , S. 1984 . The Second Self: Computers and the Human Spirit , London : Granada .
- Vincent , J.-M. 1993 . Les Automatismes sociaux et le général intellect . Futur Antérieur , : 121 – 130 .
- Virno , P. 1996 . “ Notes on the general intellect ” . In Marxism beyond Marxism , Edited by: Makdisi , S. , Casarino , C. and Carl , R. London : Routledge .
- Wajcman , J. 2004 . Techno Feminism , Cambridge : Polity Press .
- Wark, M. (2004) ‘A Hacker Manifesto (version 4.0)’, Subsol, Available at: http://subsol.c3.hu/subsol_2/contributors0/warktext.html (accessed 18 Apr. 2004).
- Williams, P. (2001) ‘Organized crime and cybercrime: synergies, trends, and responses’, Global Issues. An Electronic Journal of the U.S. Department of State, vol. 62, no. 2, Available at: http://usinfo.state.gov/journals/itgic/0801/ijge/gj07.htm (accessed 21 Mar. 2004).