Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,147,209 papers from all fields of science
Search
Sign In
Create Free Account
The Hacker Ethic and the Spirit of the Information Age
Known as:
The Hacker Ethic
The Hacker Ethic and the Spirit of the Information Age is a book released in 2001, and written by Pekka Himanen, with prologue written by Linus…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
The Art of Unix Programming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Designing ethical systems for videogames
P. Christiansen
International Conference on Foundations of…
2017
Corpus ID: 36552715
Videogames1 have the potential to promote ethical reasoning and reflection in players, however, designing games with this goal…
Expand
2016
2016
The hacker ethic vs netarchical capitalism: free software and peer production within collaborative economic practices in Andalusia
Manuel Fernández García
,
Lucía del Moral-Espín
2016
Corpus ID: 193397055
espanolEn los ultimos anos el termino Economia Colaborativa se ha popularizado sin que, hasta el momento, haya sido definido de…
Expand
2010
2010
Hacking for humanity
H. Goldstein
IEEE spectrum
2010
Corpus ID: 39363876
He brings the hacker ethic and Internet access to the far corners of the globe. He attained geek immortality by coinventing the…
Expand
Review
2008
Review
2008
Reseña de "The hacker ethic and the spirit of the information age. Nova York: Random House, 2001" de HIMANEN, Pekka
D. Mocelin
2008
Corpus ID: 141596026
The text presents a review of the book The hacker ethic and the spirit of the information age, written by Finnish philosopher…
Expand
2006
2006
Academic freedom and the hacker ethic
T. Cross
Communications of the ACM
2006
Corpus ID: 28357315
Hackers advocate the free pursuit and sharing of knowledge without restriction, even as they acknowledge that applying it is…
Expand
2005
2005
On intellectual capital: Exogenous and endogenous complexity
C. Bettiol
,
L. Henriksen
,
S. Voelpel
2005
Corpus ID: 15416978
In a period of global transition a change in system of reference is now needed. This paper explores changes in ‘systems of…
Expand
2003
2003
Democratizing software: Open source, the hacker ethic, and beyond
B. Jesiek
First Monday
2003
Corpus ID: 41547562
The development of computer software and hardware in closed-source, corporate environments limits the extent to which…
Expand
1992
1992
Teaching the Ethical Use of Information Assets
D. Parker
Information Security Journal
1992
Corpus ID: 39893624
Conflicts in ethical values give rise to computer crime and, hence, the need for information security. Therefore, information…
Expand
1990
1990
ID 2 and constructivist theory
M. Merrill
,
Zhongming Li
,
Mark k. Jones
1990
Corpus ID: 214792709
1988
1988
BloomBecker's Viewpoint: ‘Great vindicator’ may be hero of computer security
J. BloomBecker
Computer Science On-line Conference
1988
Corpus ID: 1131635
With computer viruses the talk of the town, computer security needs a "great vaccinator." Jonas Salk's vaccine not only…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE