Hacker (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Hacker" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
3,959th place
3,208th place
2nd place
2nd place
5th place
5th place
287th place
321st place
2,120th place
1,328th place
11th place
8th place
6,184th place
4,465th place
214th place
176th place
low place
low place
415th place
327th place
272nd place
225th place
146th place
110th place
9,245th place
6,554th place
low place
low place
low place
low place
193rd place
152nd place
421st place
263rd place
446th place
308th place
388th place
265th place
7,051st place
4,002nd place
low place
low place
1,564th place
1,028th place
1,475th place
1,188th place
low place
6,771st place
28th place
26th place

archives.gov (Global: 446th place; English: 308th place)

obamawhitehouse.archives.gov

arstechnica.com (Global: 388th place; English: 265th place)

bu.edu (Global: 2,120th place; English: 1,328th place)

scholarship.law.bu.edu

  • Ghappour, Ahmed (2017-01-01). "Tallinn, Hacking, and Customary International Law". AJIL Unbound. 111: 224–228. doi:10.1017/aju.2017.59. ISSN 2398-7723. S2CID 158071009. Archived from the original on 2021-04-20. Retrieved 2020-09-06.
  • Ghappour, Ahmed (2017-04-01). "Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web". Stanford Law Review. 69 (4): 1075. Archived from the original on 2021-04-20. Retrieved 2020-09-06.

ca.gov (Global: 421st place; English: 263rd place)

chhs.ca.gov

catb.org (Global: 3,959th place; English: 3,208th place)

cmu.edu (Global: 1,564th place; English: 1,028th place)

ece.cmu.edu

cnet.com (Global: 272nd place; English: 225th place)

  • Skillings, Jon (27 May 2020). "In '95, these people defined tech: Gates, Bezos, Mitnick and more". CNET. Archived from the original on 28 May 2020. Retrieved 28 May 2020. The term "hacker" started out with a benign definition: It described computer programmers who were especially adept at solving technical problems. By the mid-1990s, however, it was widely used to refer to those who turned their skills toward breaking into computers, whether for mild mischief or criminal gain. Which brings us to Kevin Mitnick.

cnn.com (Global: 28th place; English: 26th place)

tech.fortune.cnn.com

digital.gov (Global: low place; English: low place)

doi.org (Global: 2nd place; English: 2nd place)

  • Ghappour, Ahmed (2017-01-01). "Tallinn, Hacking, and Customary International Law". AJIL Unbound. 111: 224–228. doi:10.1017/aju.2017.59. ISSN 2398-7723. S2CID 158071009. Archived from the original on 2021-04-20. Retrieved 2020-09-06.
  • G. Malkin, ed. (August 1996). Internet Users' Glossary. Network Working Group. doi:10.17487/RFC1983. FYI 18. RFC 1983. Informational. Obsoletes RFC 1392.
  • Samuel Chng; Han Yu Lu; Ayush Kumar; David Yau (Mar 2022). "Hacker types, motivations and strategies: A comprehensive framework". Computers in Human Behavior Reports. 5. doi:10.1016/j.chbr.2022.100167. ISSN 2451-9588.
  • G. Malkin; T. LaQuey Parker, eds. (January 1993). Internet Users' Glossary. Network Working Group. doi:10.17487/RFC1392. FYI 18. RFC 1392. Informational. Obsoleted by RFC 1983
  • Thompson, Ken (August 1984). "Reflections on Trusting Trust" (PDF). Communications of the ACM. 27 (8): 761. doi:10.1145/358198.358210. S2CID 34854438. Archived (PDF) from the original on 2007-09-24. Retrieved 2007-08-24.

edn.com (Global: low place; English: 6,771st place)

etymonline.com (Global: 287th place; English: 321st place)

gnu.org (Global: 1,475th place; English: 1,188th place)

ietf.org (Global: 214th place; English: 176th place)

datatracker.ietf.org

imranontech.com (Global: low place; English: low place)

linguistlist.org (Global: 9,245th place; English: 6,554th place)

listserv.linguistlist.org

mit.edu (Global: 415th place; English: 327th place)

slice.mit.edu

tmrc.mit.edu

nbcphiladelphia.com (Global: 7,051st place; English: 4,002nd place)

newyorker.com (Global: 146th place; English: 110th place)

pctools.com (Global: low place; English: low place)

rfc-editor.org (Global: 6,184th place; English: 4,465th place)

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

  • Ghappour, Ahmed (2017-01-01). "Tallinn, Hacking, and Customary International Law". AJIL Unbound. 111: 224–228. doi:10.1017/aju.2017.59. ISSN 2398-7723. S2CID 158071009. Archived from the original on 2021-04-20. Retrieved 2020-09-06.
  • Thompson, Ken (August 1984). "Reflections on Trusting Trust" (PDF). Communications of the ACM. 27 (8): 761. doi:10.1145/358198.358210. S2CID 34854438. Archived (PDF) from the original on 2007-09-24. Retrieved 2007-08-24.

technical.ly (Global: low place; English: low place)

web.archive.org (Global: 1st place; English: 1st place)

wired.com (Global: 193rd place; English: 152nd place)

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org

  • Ghappour, Ahmed (2017-01-01). "Tallinn, Hacking, and Customary International Law". AJIL Unbound. 111: 224–228. doi:10.1017/aju.2017.59. ISSN 2398-7723. S2CID 158071009. Archived from the original on 2021-04-20. Retrieved 2020-09-06.
  • Samuel Chng; Han Yu Lu; Ayush Kumar; David Yau (Mar 2022). "Hacker types, motivations and strategies: A comprehensive framework". Computers in Human Behavior Reports. 5. doi:10.1016/j.chbr.2022.100167. ISSN 2451-9588.
  • * "What is a Civic Hacker?". Digital.gov. 2013-05-15. Archived from the original on 2023-11-03. Retrieved 2023-11-03.