Hacker (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Hacker" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
3,959th place
3,208th place
2nd place
2nd place
5th place
5th place
2,120th place
1,328th place
11th place
8th place
214th place
176th place
low place
low place
415th place
327th place
272nd place
225th place
146th place
110th place
207th place
136th place
9,245th place
6,554th place
low place
low place
low place
low place
193rd place
152nd place
421st place
263rd place
446th place
308th place
388th place
265th place
7,051st place
4,002nd place
low place
low place
1,564th place
1,028th place
1,475th place
1,188th place
low place
6,771st place
28th place
26th place

archives.gov

obamawhitehouse.archives.gov

arstechnica.com

bu.edu

scholarship.law.bu.edu

  • Ghappour, Ahmed (2017-01-01). "Tallinn, Hacking, and Customary International Law". AJIL Unbound. 111: 224–228. doi:10.1017/aju.2017.59. ISSN 2398-7723. S2CID 158071009. Archived from the original on 2021-04-20. Retrieved 2020-09-06.
  • Ghappour, Ahmed (2017-04-01). "Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web". Stanford Law Review. 69 (4): 1075. Archived from the original on 2021-04-20. Retrieved 2020-09-06.

ca.gov

chhs.ca.gov

catb.org

cmu.edu

ece.cmu.edu

cnet.com

  • Skillings, Jon (27 May 2020). "In '95, these people defined tech: Gates, Bezos, Mitnick and more". CNET. Archived from the original on 28 May 2020. Retrieved 28 May 2020. The term "hacker" started out with a benign definition: It described computer programmers who were especially adept at solving technical problems. By the mid-1990s, however, it was widely used to refer to those who turned their skills toward breaking into computers, whether for mild mischief or criminal gain. Which brings us to Kevin Mitnick.

cnn.com

tech.fortune.cnn.com

digital.gov

doi.org

  • Ghappour, Ahmed (2017-01-01). "Tallinn, Hacking, and Customary International Law". AJIL Unbound. 111: 224–228. doi:10.1017/aju.2017.59. ISSN 2398-7723. S2CID 158071009. Archived from the original on 2021-04-20. Retrieved 2020-09-06.
  • Malkin, G, ed. (1996). "Internet Users' Glossary". IETF Tools. doi:10.17487/RFC1983. RFC 1983. Archived from the original on 2016-06-05.
  • Samuel Chng; Han Yu Lu; Ayush Kumar; David Yau (Mar 2022). "Hacker types, motivations and strategies: A comprehensive framework". Computers in Human Behavior Reports. 5. doi:10.1016/j.chbr.2022.100167. ISSN 2451-9588.
  • Malkin, G.; Laquey, T. (1993). "Internet Users' Glossary". IETF. CiteSeerX 10.1.1.418.7680. doi:10.17487/RFC1392. Archived from the original on 2016-05-16.RFC 1392
  • Thompson, Ken (August 1984). "Reflections on Trusting Trust" (PDF). Communications of the ACM. 27 (8): 761. doi:10.1145/358198.358210. S2CID 34854438. Archived (PDF) from the original on 2007-09-24. Retrieved 2007-08-24.

edn.com

gnu.org

ietf.org

tools.ietf.org

imranontech.com

linguistlist.org

listserv.linguistlist.org

mit.edu

slice.mit.edu

tmrc.mit.edu

nbcphiladelphia.com

newyorker.com

pctools.com

psu.edu

citeseerx.ist.psu.edu

semanticscholar.org

api.semanticscholar.org

  • Ghappour, Ahmed (2017-01-01). "Tallinn, Hacking, and Customary International Law". AJIL Unbound. 111: 224–228. doi:10.1017/aju.2017.59. ISSN 2398-7723. S2CID 158071009. Archived from the original on 2021-04-20. Retrieved 2020-09-06.
  • Thompson, Ken (August 1984). "Reflections on Trusting Trust" (PDF). Communications of the ACM. 27 (8): 761. doi:10.1145/358198.358210. S2CID 34854438. Archived (PDF) from the original on 2007-09-24. Retrieved 2007-08-24.

technical.ly

web.archive.org

wired.com

worldcat.org

search.worldcat.org

  • Ghappour, Ahmed (2017-01-01). "Tallinn, Hacking, and Customary International Law". AJIL Unbound. 111: 224–228. doi:10.1017/aju.2017.59. ISSN 2398-7723. S2CID 158071009. Archived from the original on 2021-04-20. Retrieved 2020-09-06.
  • Samuel Chng; Han Yu Lu; Ayush Kumar; David Yau (Mar 2022). "Hacker types, motivations and strategies: A comprehensive framework". Computers in Human Behavior Reports. 5. doi:10.1016/j.chbr.2022.100167. ISSN 2451-9588.
  • * "What is a Civic Hacker?". Digital.gov. 2013-05-15. Archived from the original on 2023-11-03. Retrieved 2023-11-03.