skip to main content
Skip header Section
Hackers: heroes of the computer revolutionOctober 1984
Publisher:
  • Doubleday
  • Div. of Bantam Doubleday Dell Publishing1540 Broadway New York, NY
  • United States
ISBN:978-0-385-19195-1
Published:01 October 1984
Pages:
458
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Sartori L and Bocca G (2022). Minding the gap(s): public perceptions of AI and socio-technical imaginaries, AI & Society, 38:2, (443-458), Online publication date: 1-Apr-2023.
  2. Gladston A, Ben Stewart S. , Dhanush N. and Santhosh G. (2022). Efficient Client-Side Cross-Platform Compatible Solution for Phishing Prevention, International Journal of Cyber Warfare and Terrorism, 12:1, (1-24), Online publication date: 4-Mar-2022.
  3. ACM
    Rigaud C, Bailly G, Avellino I and Jansen Y (2022). Exploring Capturing Approaches in Shared Fabrication Workshops: Current Practice and Opportunities, Proceedings of the ACM on Human-Computer Interaction, 6:CSCW2, (1-33), Online publication date: 7-Nov-2022.
  4. Gorbatai A, Dioun C and Lashley K (2021). Making Space for Emotions, Organization Science, 32:1, (42-63), Online publication date: 1-Jan-2021.
  5. ACM
    Pozos R and Friend M "You Sound Like a Good Program Manager": An Analysis of Gender in Women's Computing Life Histories Proceedings of the 52nd ACM Technical Symposium on Computer Science Education, (692-698)
  6. ACM
    Power users, tinkerers, and gurus Code Nation
  7. ACM
    Solomon C, Harvey B, Kahn K, Lieberman H, Miller M, Minsky M, Papert A and Silverman B (2020). History of Logo, Proceedings of the ACM on Programming Languages, 4:HOPL, (1-66), Online publication date: 14-Jun-2020.
  8. Hodges J (2019). Technical Fixes for Legal Uncertainty in the 1980s Software Cracking Scene, IEEE Annals of the History of Computing, 41:4, (20-33), Online publication date: 1-Oct-2019.
  9. ACM
    Ames M (2018). Hackers, Computers, and Cooperation, Proceedings of the ACM on Human-Computer Interaction, 2:CSCW, (1-19), Online publication date: 1-Nov-2018.
  10. Bashir M, Wee C, Memon N and Guo B (2017). Profiling cybersecurity competition participants, Computers and Security, 65:C, (153-165), Online publication date: 1-Mar-2017.
  11. Ames M Charismatic technology Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives, (109-120)
  12. ACM
    Ames M, Rosner D and Erickson I Worship, Faith, and Evangelism Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, (69-81)
  13. Wirman H (2014). Gender and Identity in Game-Modifying Communities, Simulation and Gaming, 45:1, (70-92), Online publication date: 1-Feb-2014.
  14. Beyer J (2014). The Emergence of a Freedom of Information Movement, Journal of Computer-Mediated Communication, 19:2, (141-154), Online publication date: 1-Jan-2014.
  15. Rughiniş R Serious games as input versus modulation Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers, (175-184)
  16. Christiansen P Between a mod and a hard place Game Mods, (27-50)
  17. Von Krogh G, Haefliger S, Spaeth S and Wallin M (2012). Carrots and rainbows, MIS Quarterly, 36:2, (649-676), Online publication date: 1-Jun-2012.
  18. Vainio N and Vadén T (2012). Free Software Philosophy and Open Source, International Journal of Open Source Software and Processes, 4:4, (56-66), Online publication date: 1-Oct-2012.
  19. Lin Y (2012). Hacker Culture and the FLOSS Innovation, International Journal of Open Source Software and Processes, 4:3, (26-37), Online publication date: 1-Jul-2012.
  20. Bianchi A, Kang S and Stewart D (2012). The Organizational Selection of Status Characteristics, Organization Science, 23:2, (341-354), Online publication date: 1-Mar-2012.
  21. Haigh T (2011). The history of information technology, Annual Review of Information Science and Technology, 45:1, (431-487), Online publication date: 1-Jan-2011.
  22. ACM
    Jonsson F and Verhagen H Senses working overtime Proceedings of the 8th International Conference on Advances in Computer Entertainment Technology, (1-8)
  23. ACM
    Wang T and Kaye J Inventive leisure practices CHI '11 Extended Abstracts on Human Factors in Computing Systems, (263-272)
  24. Lundestad C and Hommels A (2007). Software vulnerability due to practical drift, Ethics and Information Technology, 9:2, (89-100), Online publication date: 1-Jul-2007.
  25. ACM
    Lievrouw L Oppositional and activist new media Proceedings of the ninth conference on Participatory design: Expanding boundaries in design - Volume 1, (115-124)
  26. ACM
    Aude C Net-art, entre conflit et sensibilité de l'interface Proceedings of the 18th Conference on l'Interaction Homme-Machine, (179-182)
  27. ACM
    Boehm B A view of 20th and 21st century software engineering Proceedings of the 28th international conference on Software engineering, (12-29)
  28. ACM
    Lin Y (2004). Epistemologically multiple actor-centered systems, Ubiquity, 2004:February, (1-1), Online publication date: 1-Feb-2004.
  29. Rittenhouse R Hacker Encyclopedia of Computer Science, (763-765)
  30. Hemmendinger D and Reilly E Digital equipment corporation (DEC) Encyclopedia of Computer Science, (572-576)
  31. ACM
    Tavani H (2000). Defining the boundaries of computer crime, ACM SIGCAS Computers and Society, 30:3, (3-9), Online publication date: 1-Sep-2000.
  32. ACM
    Manion M and Goodrum A (2000). Terrorism or civil disobedience, ACM SIGCAS Computers and Society, 30:2, (14-19), Online publication date: 1-Jun-2000.
  33. ACM
    Ishii H, Wisneski C, Orbanes J, Chun B and Paradiso J PingPongPlus Proceedings of the SIGCHI conference on Human Factors in Computing Systems, (394-401)
  34. ACM
    Cusumano M and Selby R (1997). How Microsoft builds software, Communications of the ACM, 40:6, (53-61), Online publication date: 1-Jun-1997.
  35. ACM
    Schuler D (1994). Community networks, Communications of the ACM, 37:1, (38-51), Online publication date: 2-Jan-1994.
  36. ACM
    Rout T (1992). The culture of quality and software engineering education, ACM SIGCSE Bulletin, 24:2, (29-34), Online publication date: 1-Jun-1992.
  37. ACM
    Hollinger R (1991). Hackers, ACM SIGCAS Computers and Society, 21:1, (6-17), Online publication date: 1-Jun-1991.
  38. O'Neil J (1991). Happenings, IEEE Annals of the History of Computing, 13:3, (273-277), Online publication date: 1-Jul-1991.
  39. ACM
    Schou C and Nord R Literary criticism and programming pedagogy Proceedings of the 1988 ACM sixteenth annual conference on Computer science, (67-71)
  40. Smith R (1988). A Historical Overview of Computer Architecture, IEEE Annals of the History of Computing, 10:4, (277-303), Online publication date: 1-Oct-1988.
Contributors
  • IBM Thomas J. Watson Research Center

Recommendations

Reviews

Michael Roy Williams

This review is about a month late in being returned to the editorial offices of . There is a good reason. Having heard a lot about the book, I was anxious to read it. It is so full of errors and trite statements that I spent the best part of a month reading a few pages, throwing it down in disgust, then spending time the next day looking for it in order to continue with the task. Don't misunderstand me, it is a good read—equivalent to any novel—but it has very little academic or scholarly use. The stories are interesting, but a lot of them are well known already. If you don't mind glaring errors of fact concerning some of the machines Levy is describing (which suggests that the people he is describing are equally misrepresented), or even that he attributes the terms “hack” and “hacker” to the 1950s members of a model railroad club at MIT (when they have been in the English language since the 1700s), then you might like to borrow a copy of Hackers to read in the bath. The book itself doesn't even look good on your bookshelf. It is printed, cut, and bound in such a way that it resembles the products produced during the paper shortages of the Second World War. I am sure that the book will be much appreciated by a general audience, but not by computer professionals (other than the hackers themselves). Three hackers mentioned in the book actually went so far as to let their names be quoted on the dust jacket under capsule reviews like “fascinating,” “intriguing,” and “fun.” It is amazing how much more “intriguing” a story can be when your name is listed as the subject of 17 entries in the index.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.