856
Views
26
CrossRef citations to date
0
Altmetric
Original Articles

The Myth of the Computer Hacker

Pages 336-356 | Published online: 14 Dec 2010

REFERENCES

  • Banasair, D. (1999) 'Computer Hacker's Sentence Spotlights High-Tech Crime Prosecutions', Criminal Justice Weekly, 3 August. Available online: http:/ /www.epic.org/epic/staff/banisar/hacker.html
  • Barlow, J. P. (1990) 'Crime & Puzzlement', Whole Earth Review, Fall: 44-57. Available online: http://www. eff.org/pub/Publications/]ohn_Perry_Barlow/HTML/crime _and_puzzlement_1,html
  • Barthes, R. (1985) Mythologies, trans. Annette Lavers, London: Paladin.
  • Beale, M. (2000) 'Report: Many Consumers Still Fear E-Commcrce', E-Commerce Times, 3 August. Available online: http://www. ecommercetimes.com/perl/story/?id-1053.
  • Caminada, M., van de Riet, R. P., Van Zanten, A. and van Doom, L. (1998) 'Internet security incidents, a survey within Dutch organizations', Computers & Security, 17:417-33.
  • Computer Fraud Security (1999) 'Hackers, Crackers and Phreakers Oh My!', Editorial, Computer Fraud & Security, March: 18-19.
  • Duff, L. and Gardiner, S. (1996) 'Computer crime in the global village: strategies for control and regulation - in defence of the hacker', International Journal of Sociology of Law, 24: 211 -28.
  • Edelman, M. (1967) The Symbolic Uses of Politics, Chicago: University of Illinois Press.
  • Foucault, M. (1972a) 'The archaeology of knowledge', trans. A.M. Sheridan Smith, in The Archaeology of knowledge & The Discourse on Language, New York: Pantheon Books.
  • Foucault, M. (1972b) 'The discourse on language', trans. Rupert Swyer, in The Archaeology of Knowledge «S The Discourse, on language, New York: Pantheon Books.
  • Foucault, M. (1977) Discipline & Punish: The Birth of the Prison, trans. Alan Sheridan, New York: Vintage Books.
  • Goldstein, E. (2000) 'Hackers to Blame, Doubtful', 2600: Hacker Quarterly News, 9 February. Available online: http://www.2600.com/news/2000/0209.html
  • Grossman, W. M. (1997) Net. wars. New York: New York University Press.
  • Hafner, K. and Markkoff, J. (1991) Cyberpunk: Outlaws and Hackers on the Computer Frontier, London: Fourth Estate Limited.
  • Hamin, Z. (2000), 'Insider cyber-threats: problems and perspectives', International Review of Law Computers & Technology, 14: 105 -13.
  • Hollingor, R. C. and Lanza-Kaduce, L. (1988) ' The process of criminalization: the case of computer crime Laws', Criminology, 26: 101 - 26.
  • Howard, J. D. (1997) 'An Analysis of Security Incidents On The Internet 1989 1995', Carngie Mellon Phd in Philosophy. Available online: http://www.cert.org/research/JHThesis/Start.html.
  • Lessig, L. (1999) Code and other Laws of Cyherspace, New York: Basic Books,
  • Leyden, J. (2001) 'Stop the Antivirus Vendor Hype' The Register, June 3, available at: http://www.theregister.co.uk/content/archive/ 17572.html.
  • Liszka, J. J. (1989) The Scmtonic of Myth: A Critical Study of the Symbol, Bloomington, IN: Indiana University Press.
  • Lombardi, R. (2000) 'Dispelling the Myth on Internet Security Issues', Price, Waterhouse, Coopers Online. Available online: hup://www.pwcglobal.com/852566940047314 3/0/6BEE38F531)4872 E385256803005241.C0?Open&Highlight=2,hackers.
  • Nichols, R. K., Ryan, D. J. and Ryan, J. J. (2000) Defending Your Digital Assets Against Hackers. Crackers, Spies, and Thieves, New York: McGraw-Hill.
  • Pfuhl, E. H. Jr (1987), 'Computer abuse: problems of instrumental control', Deciant Behavior. 8: 113 30.
  • Power, R. and Beeson, C. (2000) '2000 CSI/FBI Computer Crime and Security Survey', Computer Security Issues & Trends, Spring: 1 16.
  • Roush, W. (1995) 'Hackers: Taking a Byte Out of Computer Crime', Technology Review, April. Available online: http://www.techreview.com/articles/apr95/Roush-text.html.
  • Schwartau, W. (2000) Cybershock: .Surviving Hackers Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Destruction, New York: Thunder's Mouth Press.
  • Shaw, E., Ruby, K. G. and Post, J. M. (1998) 'The insider threat to information systems: the psychology of the dangerous insider', Security Awareness Bulletin. 2: 1 10.
  • Sirius, R. U. (2000) 'Superhacker Kevin Mitnick: Menace to Fear or Rogue to Love?', Village Force, 22 February, Westlaw.
  • Smith, G. (1998) 'An Info-Warrior Wheels', Netly News Network, 28 January. Available online: http://sun.soci.niu.edu/~crypt/other/zienet.htm
  • Smith, G. (2000) 'The Can't of Idiots: Usage of the "wake-up call" in Computer Security and Technology Reporting', Crypt Newsletter. November. Available online: http://www.soci.nio.edu/~crypt/other, cant.him
  • Sterling, B. (1993) The Hacker Crackdown: Law and Disorder on the Electronic Frontier. New York: Penguin Books.
  • Taylor, P. A. (1998) Hacker: Crime in the Digital Sublime, London: Routledge.
  • Thomas, D. (1999) 'How Much Damage Did Mitnick Do?', Wired, 5 May. Available online: http: //www. wired.com.news.politics/0,283,19488.00.html
  • Zaller, J. R. (1992) The Nature and Origins of Mass Opinion, Cambridge: University of Cambridge Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.