Abstract
No abstract available.
Cited By
- Kaynak E (2024). Leveraging Learning Collectives, Organization Science, 35:3, (948-973), Online publication date: 1-May-2024.
- Sartori L and Bocca G (2022). Minding the gap(s): public perceptions of AI and socio-technical imaginaries, AI & Society, 38:2, (443-458), Online publication date: 1-Apr-2023.
- Rigaud C, Bailly G, Avellino I and Jansen Y (2022). Exploring Capturing Approaches in Shared Fabrication Workshops: Current Practice and Opportunities, Proceedings of the ACM on Human-Computer Interaction, 6:CSCW2, (1-33), Online publication date: 7-Nov-2022.
- Gladston A, Ben Stewart S. , Dhanush N. and Santhosh G. (2022). Efficient Client-Side Cross-Platform Compatible Solution for Phishing Prevention, International Journal of Cyber Warfare and Terrorism, 12:1, (1-24), Online publication date: 4-Mar-2022.
- Pozos R and Friend M "You Sound Like a Good Program Manager": An Analysis of Gender in Women's Computing Life Histories Proceedings of the 52nd ACM Technical Symposium on Computer Science Education, (692-698)
- Gorbatai A, Dioun C and Lashley K (2021). Making Space for Emotions, Organization Science, 32:1, (42-63), Online publication date: 1-Jan-2021.
- Solomon C, Harvey B, Kahn K, Lieberman H, Miller M, Minsky M, Papert A and Silverman B (2020). History of Logo, Proceedings of the ACM on Programming Languages, 4:HOPL, (1-66), Online publication date: 14-Jun-2020.
- Power users, tinkerers, and gurus Code Nation
- Hodges J (2019). Technical Fixes for Legal Uncertainty in the 1980s Software Cracking Scene, IEEE Annals of the History of Computing, 41:4, (20-33), Online publication date: 1-Oct-2019.
- Chen Y (2019). “Being a butt while on the internet”, Proceedings of the Association for Information Science and Technology, 55:1, (76-85), Online publication date: 1-Feb-2019.
- Ames M (2018). Hackers, Computers, and Cooperation, Proceedings of the ACM on Human-Computer Interaction, 2:CSCW, (1-19), Online publication date: 1-Nov-2018.
- Bashir M, Wee C, Memon N and Guo B (2017). Profiling cybersecurity competition participants, Computers and Security, 65:C, (153-165), Online publication date: 1-Mar-2017.
- Ames M Charismatic technology Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives, (109-120)
- Ames M, Rosner D and Erickson I Worship, Faith, and Evangelism Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, (69-81)
- Wirman H (2014). Gender and Identity in Game-Modifying Communities, Simulation and Gaming, 45:1, (70-92), Online publication date: 1-Feb-2014.
- Beyer J (2014). The Emergence of a Freedom of Information Movement, Journal of Computer-Mediated Communication, 19:2, (141-154), Online publication date: 1-Jan-2014.
- Vainio N and Vadén T (2012). Free Software Philosophy and Open Source, International Journal of Open Source Software and Processes, 4:4, (56-66), Online publication date: 1-Oct-2012.
- Rughiniş R Serious games as input versus modulation Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers, (175-184)
- Lin Y (2012). Hacker Culture and the FLOSS Innovation, International Journal of Open Source Software and Processes, 4:3, (26-37), Online publication date: 1-Jul-2012.
- Von Krogh G, Haefliger S, Spaeth S and Wallin M (2012). Carrots and rainbows, MIS Quarterly, 36:2, (649-676), Online publication date: 1-Jun-2012.
- Bianchi A, Kang S and Stewart D (2012). The Organizational Selection of Status Characteristics, Organization Science, 23:2, (341-354), Online publication date: 1-Mar-2012.
- Christiansen P Between a mod and a hard place Game Mods, (27-50)
- Jonsson F and Verhagen H Senses working overtime Proceedings of the 8th International Conference on Advances in Computer Entertainment Technology, (1-8)
- Wang T and Kaye J Inventive leisure practices CHI '11 Extended Abstracts on Human Factors in Computing Systems, (263-272)
- Haigh T (2011). The history of information technology, Annual Review of Information Science and Technology, 45:1, (431-487), Online publication date: 1-Jan-2011.
- Lundestad C and Hommels A (2007). Software vulnerability due to practical drift, Ethics and Information Technology, 9:2, (89-100), Online publication date: 1-Jul-2007.
- Lievrouw L Oppositional and activist new media Proceedings of the ninth conference on Participatory design: Expanding boundaries in design - Volume 1, (115-124)
- Boehm B A view of 20th and 21st century software engineering Proceedings of the 28th international conference on Software engineering, (12-29)
- Aude C Net-art, entre conflit et sensibilité de l'interface Proceedings of the 18th Conference on l'Interaction Homme-Machine, (179-182)
- Lin Y (2004). Epistemologically multiple actor-centered systems, Ubiquity, 2004:February, (1-1), Online publication date: 1-Feb-2004.
- Rittenhouse R Hacker Encyclopedia of Computer Science, (763-765)
- Hemmendinger D and Reilly E Digital equipment corporation (DEC) Encyclopedia of Computer Science, (572-576)
- Tavani H (2000). Defining the boundaries of computer crime, ACM SIGCAS Computers and Society, 30:3, (3-9), Online publication date: 1-Sep-2000.
- Manion M and Goodrum A (2000). Terrorism or civil disobedience, ACM SIGCAS Computers and Society, 30:2, (14-19), Online publication date: 1-Jun-2000.
- Ishii H, Wisneski C, Orbanes J, Chun B and Paradiso J PingPongPlus Proceedings of the SIGCHI conference on Human Factors in Computing Systems, (394-401)
- Cusumano M and Selby R (1997). How Microsoft builds software, Communications of the ACM, 40:6, (53-61), Online publication date: 1-Jun-1997.
- Schuler D (1994). Community networks, Communications of the ACM, 37:1, (38-51), Online publication date: 2-Jan-1994.
- Rout T (1992). The culture of quality and software engineering education, ACM SIGCSE Bulletin, 24:2, (29-34), Online publication date: 1-Jun-1992.
- O'Neil J (1991). Happenings, IEEE Annals of the History of Computing, 13:3, (273-277), Online publication date: 1-Jul-1991.
- Hollinger R (1991). Hackers, ACM SIGCAS Computers and Society, 21:1, (6-17), Online publication date: 1-Jun-1991.
- Smith R (1988). A Historical Overview of Computer Architecture, IEEE Annals of the History of Computing, 10:4, (277-303), Online publication date: 1-Oct-1988.
- Schou C and Nord R Literary criticism and programming pedagogy Proceedings of the 1988 ACM sixteenth annual conference on Computer science, (67-71)
Index Terms
- Hackers: heroes of the computer revolution
Please enable JavaScript to view thecomments powered by Disqus.