SEARCH

SEARCH BY CITATION

References

  • Burchell, G. (1996). Liberal government and techniques of the self. In A.Barry, T.Osbourne, & N.Rose (Eds.), Foucault and Political Reason: Liberalism, Neoliberalism, and Rationalities of Government (pp. 1936). Chicago: University of Chicago Press.
  • Cavazos, E. A., & Morin, D. (1996). A new legal paradigm from cyberspace? The effect of the information age on the law. Technology in Society, 18(3), 357371.
  • Critcher, C. (2003). Moral Panics and the Media. Buckingham, UK: Open University Press.
  • Fox, S. (2000). Trust and Privacy Online: Why Americans Want to Rewrite the Rules. Washington, DC: Pew Internet and American Life Project.
  • Hall, S., Critcher, C., Jefferson, T., Clarke, J., & Robert, B. (1978). Policing the Crisis: Mugging, the State, and Law and Order. New York: Palgrave Macmillan.
  • Howard, P. N. (2002). Network ethnography and the hypermedia organization: New media, new organizations, new methods. New Media & Society, 4(4), 550574.
  • Howard, P. N. (2006). New Media Campaigns and the Managed Citizen. New York: Cambridge University Press.
  • Howard, P. N., Carr, J., & Milstein, T. J. (2005). Digital technology and the market for political surveillance. Surveillance and Society, 3(1).
  • Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46(4), 757781.
  • Jordan, T., & Taylor, P. (2004). Hacktivism and Cyberwars: Rebels With a Cause? New York: Routledge.
  • Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing, 18(3), 1529.
  • Mnookin, R., & Kornhauser, L. (1979). Bargaining in the shadow of the law. Yale Law Journal, 88, 950968.
  • Nissenbaum, H. (2004). Hackers and the contested ontology of cyberspace. New Media & Society, 6(2), 195217.
  • Peck, J., & Tickell, A. (2002). Neoliberalizing space. Anitpode, 34(3), 380404.
  • Rose, N. (1999). Powers of Freedom: Reframing Political Thought. Cambridge: Cambridge University Press.
  • Samuelson, P. (2003). Digital rights management (and, or, vs.) the law. Communications of the ACM, 46(4), 4145.
  • Skibell, R. (2002). The myth of the computer hacker. Information, Communication and Society, 5(3), 336356.
  • Skibell, R. (2003). Cybercrimes & misdemeanors: A reevaluation of the computer fraud and abuse act. Berkeley Technology Law Journal, 18(3), 909944.
  • Thomas, D. (2002). Hacker Culture. Minneapolis: University of Minnesota Press.
  • United States v. Kevin Mitnick. (1998). 145 F.3d 1342 (9th Circuit).
  • United States v. Thomas. (1996). 74 F. 3d 701 (6th Circuit).
  • Universal City Studios, Inc. v. Reimerdes. (2000). 111 F.Supp.2d 294 320 (Federal Superior Court).
  • Wilson, M. (2003). Chips, bits and the law: An economic geography of Internet gambling. Environment and Planning A, 35(7), 12451260.
  • Zook, M. (2003). Underground globalization: Mapping the space of flows of the Internet adult industry. Environment and Planning A, 35(7), 12611286.