Reference list
- Alper, M. (2014). “Can our kids hack it with computers?”: Constructing youth hackers in family computing magazines (1983–1987). International Journal of Communication, 8, 26.
- Backmann, G. (2017). Utopian hacks. Limn, 8, Retrieved from https://limn.it/articles/utopian-hacks/
- Bauman, Z. (1990). Modernity and ambivalence. Theory, Culture & Society, 7(2–3), 143–169. doi: 10.1177/026327690007002010
- Benbennick, D. (2005). Möbius Strip. Retrieved from https://commons.wikimedia.org/wiki/File:M%C3%B6bius_strip.jpg
- Bialski, P. (2017). I am not a hacker. Limn, 8, Retrieved from https://limn.it/articles/i-am-not-a-hacker/
- Bigo, D. (2008a). International political sociology. In P. Williams (Ed.), Security studies: An introduction (pp. 116–129). London: Routledge.
- Bigo, D. (2008b). The emergence of a consensus: Global terrorism, global insecurity, and global security. In A. Chebel d’Appollonia, & S. Reich (Eds.), Immigration, integration and security: America and Europe in comparative perspective (pp. 67–94). Pittsburgh, PA: University of Pittsburgh Press.
- Bigo, D. (2013). The transnational feld of computerised exchange of information in police matters and its european guilds. In N. Kauppi, & M. R. Madsen (Eds.), Transnational power elites: The new professionals of governance, law and security (pp. 155–182). London: Routledge.
- Bigo, D., & Walker, R. B. (2007). Political sociology and the problem of the international. Millennium: Journal of International Studies, 35, 725–739. doi: 10.1177/03058298070350030401
- Bourdieu, P. (1985). The genesis of the concepts of habitus and field. Sociocriticism, 2(2), 11–24. doi: 10.1177/0038038504040870
- Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101. doi: 10.1191/1478088706qp063oa
- Braybrooke, K., & Jordan, T. (2017). Genealogy, culture and technomyth: Decolonizing western information technologies, from open source to the maker movement. Digital Culture & Society, 3(1), 25–46. doi: 10.14361/dcs-2017-0103
- Buhs, J. B. (2010). Wildmen on the cyberfrontier: The computer geek as an iteration in the american wildman lore cycle. Folklore, 121(1), 61–80. doi: 10.1080/00155870903482015
- Caldwell, T. (2011). Ethical hackers: Putting on the white hat. Network Security, 2011(7), 10–13. doi: 10.1016/S1353-4858(11)70075-7
- Coleman, G. (2013a). Anonymous in context: The politics and power behind the mask (No. 3). Waterloo: Centre for International Governance Innovation.
- Coleman, G. (2013b). Coding freedom: The ethics and aesthetics of hacking. Princeton, NJ: Princeton University Press.
- Coleman, G. (2014). Hacker, hoaxer, whilstleblower, spy: The many faces of anonymous. London, New York: Verso.
- Coleman, G. (2016). Hacker. In B. Peters (Ed.), Digital keywords: A vocabulary of information society and culture (pp. 158–172). Princeton; Oxford: Princeton University Press.
- Coleman, G. (2017). The public interest hack. Limn, 8, Retrieved from https://limn.it/articles/the-public-interest-hack/
- Coleman, G., & Golub, A. (2008). Hacker practice: Moral genres and the cultural articulation of liberalism. Anthropological Theory, 8, 255–277. doi: 10.1177/1463499608093814
- Collins, K. (2018, August 6). Inside The Boot Camp Reforming Teenage Hackers. CNET. Retrieved from https://www.cnet.com/news/inside-the-boot-camp-reforming-teenage-hackers/
- Davies, S. R. (2018). Characterizing hacking: Mundane engagement in US hacker and makerspaces*. Science, Technology, & Human Values, 43, 171–197. doi: 10.1177/0162243917703464
- Delfanti, A., & Söderberg, J. (2018). Repurposing the hacker. Three cycles of recuperation in the evolution of hacking and capitalism. Ephemera. Theory and Politics in Organization, 18, 457–476.
- Décary-Hétu, D., & Dupont, B. (2012). The social network of hackers. Global Crime, 13, 160–175. doi: 10.1080/17440572.2012.702523
- di Salvo, P. (2017). Hacking/Journalism. Limn, 8. Retrieved from https://limn.it/articles/hackingjournalism/
- Donovan, J. (2017). Refuse and resist! Limn, 8, Retrieved from https://limn.it/articles/refuse-and-resist/
- Ekeland, T. (2017). Hacker Madness. Limn, 8. Retrieved from https://limn.it/articles/hacker-madness/
- Facebook. (2012). Registration Statement on Form S-1: Facebook, Inc. (pp. 1–150). Retrieved from Securities and Exchange Commission website: https://www.sec.gov/Archives/edgar/data/1326801/000119312512034517/d287954ds1.htm#toc287954_10
- Fitzgerald, M. (2007). L0pht in Transition. CSO Online. Retrieved from https://www.csoonline.com/article/2121870/lopht-in-transition.html
- Grenfell, M. (2014). Pierre Bourdieu. Key concepts (2nd ed.). London: Routledge.
- Gröndahl, B. (2000). Hacker. Rotbuch: Hamburg.
- Guarnieri, C. (2017). What is to be hacked? Limn, 8, Retrieved from http://limn.it/what-is-to-be-hacked/
- HackerOne. (2016). 2016 Bug Bounty Hacker Report. HackerOne. Retrieved from https://hackerone.app.box.com/s/04uvkrh3sojep65g0ol9at63r3fyibv8
- Halbert, D. (1997). Discourses of danger and the computer hacker. The Information Society, 13, 361–374. doi: 10.1080/019722497129061
- Huang, A. “bunnie”. (2017). The hardware hacker: Adventures in making & breaking hardware. San Francisco, CA: No Starch Press.
- Irani, L. (2015). Hackathons and The making of entrepreneurial citizenship. Science, Technology & Human Values, 40, 799–824. doi: 10.1177/0162243915578486
- Irani, L. (2019). Chasing innovation: Making entrepreneurial citizens in modern India (Vol. 22). Princeton, NJ: Princeton University Press.
- Isin, E. F. (2009). Citizenship in flux: The figure of the activist citizen. Subjectivity, 29, 367–388. doi: 10.1057/sub.2009.25
- Jarvis, L., Macdonald, S., & Nouri, L. (2014). The cyberterrorism threat: Findings from a survey of researchers. Studies in Conflict & Terrorism, 37, 68–90. doi: 10.1080/1057610X.2014.853603
- Johnston, J. R. (2009). Technological turf wars: A case study of the computer antivirus industry. Philadelphia, PA: Temple University Press.
- Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46, 757–780. doi: 10.1111/1467-954X.00139
- Jordan, T., & Taylor, P. A. (2004). Hacktivism and cyberwars: Rebels with a cause? New York, NY: Routledge.
- Kelty, C. M. (2008). Two bits: The cultural significance of free software. Durham, NC: Duke University Press.
- Kelty, C. M. (2018). Hacking the social? In N. Marres, M. Guggenheim, & A. Wilkie (Eds.), Inventing the social (pp. 287–297). Manchester: Mattering Press.
- Kelty, C. M., & Coleman, G. (2017). Preface: Hacks, Leaks, and Breaches. Limn, 8. Retrieved from https://limn.it/articles/preface-hacks-leaks-and-breaches/
- Kessler, O., & Werner, W. (2013). Expertise, uncertainty, and international law: A study of the tallinn manual on cyberwarfare. Leiden Journal of International Law, 26, 793–810. doi: 10.1017/S0922156513000411
- Klein, A. G. (2015). Vigilante media: Unveiling anonymous and the hacktivist persona in the Global Press. Communication Monographs, 82, 379–401. doi: 10.1080/03637751.2015.1030682
- Kubitschko, S. (2015). The role of hackers in countering surveillance and promoting democracy. Media and Communication, 3(2), 77–87. doi: 10.17645/mac.v3i2.281
- Leander, A. (2011). The promises, problems, and potentials of a bourdieu-inspired staging of international relations. International Political Sociology, 5, 294–313. doi: 10.1111/j.1749-5687.2011.00135.x
- Leonard, P. (2014). ‘A revolution in code’? Hari Kunzru’s transmission and the cultural politics of hacking. Textual Practice, 28, 267–287. doi: 10.1080/0950236X.2013.824501
- Levy, S. (1984). Hackers: Heroes of the computer revolution. New York, NY: Doubleday.
- Maxigas. (2017). Hackers against technology: Critique and recuperation in technological cycles. Social Studies of Science, 47, 841–860. doi: 10.1177/0306312717736387
- McGraw, G. (2016). Silver Bullet Talks with Peiter (Mudge) Zatko. IEEE Security & Privacy, 14(1), 7–10. doi: 10.1109/MSP.2016.11
- McLellan, V. (1981, July 26). Case of the Purloined Password. The New York Times. Retrieved from https://www.nytimes.com/1981/07/26/business/case-of-the-purloined-password.html
- Meyer, G. R. (1989). The Social Organization of the Computer Underground (Master of Arts, Criminology, Northern Illinois University). Retrieved from http://www.dtic.mil/docs/citations/ADA390834.
- Millman, R. (2018, July 5). The SC Media UK Global Top 50 Companies in the Cyber-Security Market. SC Media UK. Retrieved from https://www.scmagazineuk.com/article/1487005
- PC-WELT. (2018, August 31). Werden Sie doch Ethical Hacker! - Anzeige. PC-WELT. Retrieved from https://www.pcwelt.de/a/werden-sie-doch-ethical-hacker-anzeige,3452042
- Quigley, K., Burns, C., & Stallard, K. (2015). ‘Cyber gurus’: A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection. Government Information Quarterly, 32, 108–117. doi: 10.1016/j.giq.2015.02.001
- Reuters. (2018, August 29). Germany, seeking independence from U.S., pushes cyber security research. Reuters. Retrieved from https://www.reuters.com/article/us-germany-cyber/germany-seeking-independence-from-u-s-pushes-cyber-security-research-idUSKCN1LE1FX
- Rogers, M. K. (2006). A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation, 3(2), 97–102. doi: 10.1016/j.diin.2006.03.001
- Schrock, A. R. (2016). Civic hacking as data activism and advocacy: A history from publicity to open Government data. New Media & Society, 18, 581–599. doi: 10.1177/1461444816629469
- Shires, J. (2020). Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy, 41, 82–107. doi:10.1080/13523260.2019.1670006.
- Skare, E. (2018). Digital surveillance/militant resistance: Categorizing the “proto-state hacker”. Television & New Media, Advance online publication.
- Slayton, R. (2017). The paradoxical authority of the certified ethical hacker. Limn, 8, Retrieved from https://limn.it/articles/the-paradoxical-authority-of-the-certified-ethical-hacker/
- Söderberg, J. (2010). Misuser inventions and the invention of the misuser: Hackers, crackers and filesharers. Science as Culture, 19, 151–179. doi: 10.1080/09505430903168177
- Söderberg, J., & Delfanti, A. (2015). Hacking hacked! The life cycles of digital innovation. Science, Technology, & Human Values, 40, 793–798. doi: 10.1177/0162243915595091
- Stańczyk, M. (2017). Unseen War? Hackers, tactical media, and their depiction in hollywood cinema. TransMissions: The Journal of Film and Media Studies, 2, 62–77. Retrieved from http://transmissions.edu.pl/unseen-war-hackers-tactical-media-and-their-depiction-in-hollywood-cinema/
- Starostin, E. L., & Heijden, G. H. M. v. d. (2007). The shape of a möbius strip. Nature Materials, 6, 563–567. doi: 10.1038/nmat1929
- Steinmetz, K. F. (2015). Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology, 55, 125–145. doi: 10.1093/bjc/azu061
- Stephenson, P. (1999). Hiring hackers. Information Systems Security, 8(2), 10–13. doi: 10.1201/1086/43305.8.2.19990601/31059.3
- Tanczer, L. M. (2015). Hacking the label: Hacktivism, race, and gender. Ada: A Journal of Gender, New Media, and Technology, (6), Retrieved from https://adanewmedia.org/2015/01/issue6-tanczer/
- Turgeman-Goldschmidt, O. (2005). Hackers’ accounts: Hacking as a social entertainment. Social Science Computer Review, 23(1), 8–23. doi:10.1177/0894439304271529
- Vollmann, M. T. (2015). The 414s: The Original Teenage Hackers [Documentary]. Retrieved from http://www.the414s.com/
- Wark, M. (2004). A hacker manifesto (Vol. 23). Cambridge, MA: Harvard College.
- Watkins, J. (2018). No good deed goes unpunished: The duties held by malware researchers, penetration testers, and white Hat hackers. Minnesota Journal of Law, Science & Technology, 19, 535–563.
- Züger, T., Milan, S., & Tanczer, L. M. (2015). Sand in the information society machine: How digital technologies change and challenge the Paradigms of civil disobedience. The Fiberculture Journal, 26(192), 108–135.