Pub Date : 2020-12-31DOI: 10.1525/9780520971653-005
{"title":"2. Hacking and Risk to Systems","authors":"","doi":"10.1525/9780520971653-005","DOIUrl":"https://doi.org/10.1525/9780520971653-005","url":null,"abstract":"","PeriodicalId":448437,"journal":{"name":"Why Hackers Win","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-31DOI: 10.1525/9780520971653-006
{"title":"3. The Political Economy of the Hack","authors":"","doi":"10.1525/9780520971653-006","DOIUrl":"https://doi.org/10.1525/9780520971653-006","url":null,"abstract":"","PeriodicalId":448437,"journal":{"name":"Why Hackers Win","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127958660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-31DOI: 10.1525/9780520971653-004
{"title":"1. On the Structures and Functions of Hacking","authors":"","doi":"10.1525/9780520971653-004","DOIUrl":"https://doi.org/10.1525/9780520971653-004","url":null,"abstract":"","PeriodicalId":448437,"journal":{"name":"Why Hackers Win","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131044530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-31DOI: 10.1525/9780520971653-007
{"title":"4. Antihacking Law and Policy","authors":"","doi":"10.1525/9780520971653-007","DOIUrl":"https://doi.org/10.1525/9780520971653-007","url":null,"abstract":"","PeriodicalId":448437,"journal":{"name":"Why Hackers Win","volume":"124 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114089097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Structures and Functions of Hacking","authors":"","doi":"10.2307/j.ctvr00xbr.6","DOIUrl":"https://doi.org/10.2307/j.ctvr00xbr.6","url":null,"abstract":"","PeriodicalId":448437,"journal":{"name":"Why Hackers Win","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116166537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}