You are looking at the HTML representation of the XML format.
HTML is good for debugging, but is unsuitable for application use.
Specify the format parameter to change the output format.
To see the non HTML representation of the XML format, set format=xml.
See the complete documentation, or API help for more information.
<?xml version="1.0"?>
<api>
  <query-continue>
    <allpages gapcontinue="Traditional_Conceptions_of_Hacking" />
  </query-continue>
  <query>
    <pages>
      <page pageid="9" ns="0" title="Re-defining and Understanding True Hacking">
        <revisions>
          <rev contentformat="text/x-wiki" contentmodel="wikitext" xml:space="preserve">==Hacker mind-sets==

In order to understand the hacker mind-set and ethical underpinnings, it is vital to establish the underlying beliefs that ground attitudes towards capitalism and the wider modern economic system surrounding it.

The network society in which hackers fundamentally operate, organise, innovate and disrupt can be traced back to through proceeding scientific revolutions and emerged at a very specific moment in history. Thomas Kuhn describes technological paradigms as a conceptual pattern that sets standards for performance by organising the available range of technologies around a nucleus that enhances the performance of each [Kuhn, 1962]. In his view the industrial revolution firstly enabled humans to generate power and distribute energy via human ingenuity and artefacts without being solely dependent upon the natural environment in its existing natural state. Energy generation in this sense enables activities by powering-over nature and overcoming the limiting conditions of own individual existence. Water, steam, electric and nuclear power allowed for new forms of production, consumption and social organisation for the evolving industrial society. The avant-garde today being the post-industrialist knowledge economies found in the West in which hacking primarily functions.

The industrial society is comprised of factories, corporations, bureaucracy, and the phasing-out of traditional agricultural labour in place of large-scale urbanisation; international transportations systems, centralised social systems, mass-media and-mass communications. The rise of mass communications and the Internet in particular made fundamental changes to the control of knowledge and information and have challenged the way in which wealth, power and meaning is generated. Information processing, communication and innovation technologies (computer micro chips, network connectivity and associated costs) essentially impact upon the industrialist paradigm itself; specifically on how the generation, control and application of knowledge occurs.

The value in the Internet today comes from linking-up of artefacts in the virtual and real world into new combinations, built upon and extending the configurations of its original architect in modular forms. This re-combinatorial and reconfigurable nature of intellectual property artefacts provides a key source of innovation in the post industrialist networked society. The process of innovation is also subject to recombination and reconfiguration, particularly in the latter stages of the product life cycle (PLC) via acts of hacking to create new artefact combinations or arrangements that in turn support further spirals of meaningful knowledge and information for the system as a whole. The hacker entity freely facilitates this recombination and reconfiguration irrespective of prior intellectual property rights and law that are perceived as a perverse abstraction unto itself; a concept claiming private ownership rights over nature, whether supported and justified by post-industrialist legal regimes or not. In this sense, the configuration of social structures supporting the organisational arrangement of human relationships to production, consumption and power (framed by culture) is unrestrictedly subverted, distorted and reconfigured by hackers.

==Information society ==

The information driven society was partly invented and developed by a culture of open data sharing, collaboration and cooperation found within ARPAnet experiments and scientific as well as academic research communities. Researchers were free to examine others findings as well as test and further develop others ideas. Self professed hackers designed and built the technologies underpinning the Internet (Unix, Linux, communications protocols, sockets and layers) that make the Internet work and they believed in simply building things for societal value, not destroying them as the popular media would have us presume. Hacker ethics originating at MIT in the generative context, only to have meaning subverted by continued usage referring to computer criminals in the early 1980’s when students broke into rooms that housed campus mainframe computers in order to test out new programs and written code. They believed in freedom of information and voluntary mutual help. In their eyes, legal and institutional barriers only prevented a good solution to a creative problem from being found and simply forced people to re-invent wheels. They believed a solution to a problem should not have to be solved twice and intellectual property and private ownership rights simply create barriers to creative problem solving, resulting in epistemological and idealistic confrontations with the establishment, culminating in a spectrum of hackers acts along an illegal-to- legal dimension.

Hacker culture is a fundamental concept grounded in a specific set of ethical foundations that underpin the networked, post industrialist society and is embedded in a set of cultural beliefs, values and general world economic view. Whilst widely misinterpreted in popular culture, hackers can provide vital sources of innovation that are instinctively and habitually disregarded as simply disruptive, illegal, dangerous and irrelevant to organisations activities.

A wider contextual understanding of hacker activities is needed, devoid of misleading popular connotations and bias, to draw attention to the ways in which hacking acts can generate sources of important value for the innovating firm. By demonstrating how hackers can be vitally beneficial to firms, not simply disruptive and counter productive, it is hoped that general attitudes and policymaking will reflect the subtly changing attitudes to hacker activities already slowly taking place. In so doing should allow both private ownership and open ownership property regimes to exist more complimentarily in a mutually beneficial and reciprocal relationship towards the same goals.

==Hackers ethics, passion and the roots of work==

The underlying roots of hacker ethics and mind set can be traced back to direct challenges to the idea of the protestant work ethic [Weber, 1905]. Weber argued that the capitalist spirit is found in the implicit obligation individuals feel towards undertaking productive work, enforced by religion and God. Members of
society are made to feel obliged to work and to find contentment in professional working activities as one’s natural God given duty. For hackers, motivations to work are entirely different. The driving force behind value creation in life comes from the passion to create artefacts of great social value, rather than merely for money and capital generation. The same ideals and vision carefully crafted and communicated to consumers by large innovative corporations who go to great lengths (and cost) to emphasise corporate social responsibility and a wider societal purpose in the world. It has long been established that firms who understand consumer’s driving passions (legal or illegal), are far better suited to creating relevant innovations and value, if they are closely aligned and directly connected to underlying consumer passions.

Basic work ethics and organisational factors for hackers do not originate primarily from work or capital gain per se, but from passion and desire to create something socially valuable. This explains the predominant view of firms such as Microsoft as the enemy of hackers with its focus on wealth generation, closed code, proprietary systems and appropriation rents from its patent portfolio and strict licensing model (in spite of a recent strategic shift towards financing and encouraging the development of Open Source software). For hackers, when profit, growth and wealth generation are the dominant focus for a firm, passion is no longer the central driving force behind innovation and creation, therefore something to be entirely wary of. Hackers also believe that innovators should directly profit from their socially beneficial efforts, but not profiting from closed information to others.

The term ''hacker'' has a broad and general definition that spans the illegal to legal dimension but essentially encompass all hacker classes as an expert or enthusiast of any kind [Himanen, 2001]. This term generally applies to anyone with a passionate interest in any domain in the information age. Unlike most typical users who see computers, networks and devices as black boxes that can enhance productivity; hackers see computers, networks and devices as sources of entertainment just like any other personal hobby. They are driven to understand and master a technology because it personally interests them and provides pleasure, joy and excitement, not merely as something that reduces uncertainty in performing a desired task in the workplace [Rogers, 1995].

&lt;blockquote&gt;[Hackers are] people who love and understand the technology they use. These are people who can &quot;hack&quot; together a solution to a problem with a soldering iron and a few paper clips. People who modify operating systems because they don't like the way they work [Robson, 1999].&lt;/blockquote&gt;

Hackers have a strong sense of play; are prepared to take risks in exploring a technology and care deeply and passionately about their interests.&lt;ref&gt;Impassioned hackers who care deeply about the technologies they use and develop, ironically, are key attributes employers search for when interviewing potential candidates because it increases the likelihood&lt;/ref&gt; As Burrel Smith of Apple stated: ‘you can be a hacker carpenter... It has to do with craftsmanship and caring about what you’re doing.”

Apple is an example of a habitually innovative and disruptive firm, marketing itself upon core countercultural ethics, similar to those found in hacker communities. Technology in their eyes should be used for your own purposes outside the control of large firms. Apple wishes to outwardly express its image as a group of freethinking rebels, troublemakers and technological radicals, akin to popular hacker culture. This may have reverberated with consumers when Apple was fighting against market domination by the likes of Microsoft and IBM, but becomes somewhat contradictory when it is now Apple who dominates markets as the most valuable company in history. The philosophy behind the hippy chique becomes hippy control freak within closed systems, gated communities, centralised control and vertically integrated products that lock users into proprietary platforms. Rather than echoing radical rebelliousness, vertically integrated software and hardware screams instead, proprietary claims to private ownership and ‘a firm knows best’ attitude most strongly detested within hacker ethics.

This holds true at least for hardware development by adopting a closed strategy, firms like Apple lock out the possibility for social product development inherently generated within the network society. There is no desire to be more responsive to the external environment because the environment does not know yet what it wants and Apple intuitively does. This has been made clear one successful and dominant design product launch after another. Firms like Apple however are somewhat rare and demonstrates an uncanny ability to develop truly radical unknown innovation for consumer needs that do not yet exist. The hacker ethic is sacrificed in order to create a seamless and simple mass-appealing product, but in so doing resists any form of user empowerment and flies in the face of the fundamental nature of networked information technologies themselves. By contrast in its software domain, Apple opened up its software development kit (SDK) and created the App Store in order to leverage the hacker ethic and creativity from external communities and firms alike by commercialising external generated applications to run on all its hardware devices, which in turn spawned an entire market economy and is well en-route to displacing the desktop/laptop market entirely in the coming years.

Habitual behaviour by industry innovation leaders deliberately closes-off external boundaries in the competitive landscape, dismissing it as externally generated noise that serves only to blur internal creative vision and direction in the fuzzy front end of the design and innovation process as it only creates fragmentation. However for those firms able to see value from external customers, consumers and stakeholders, external ideas, resources and hacking have the potential to provide vital waypoints, design trajectories and market direction to help reduce uncertainty in the innovation process.


NEXT: '''Chapter 2.2''' - [[Extant Hacker Typology]]

&lt;disqus&gt;&lt;/disqus&gt;


[[File:hackers-and-innovation-epub-pdf-book111.png|250px|link=http://www.mikepinder.co.uk/store/e-books/hackers-innovation-redefinition-examination-outlaw-sources-generativity-future-product-development-strategies/ ]]

&lt;big&gt;'''''Purchase E-Book (ePub &amp; PDF) Version'''''&lt;/big&gt;

You can read the monograph for free online here or you can purchase an ePub and PDF version for your smartphone, tablet, laptop or desktop e-reader.

[[File:add-basket-version.png|link=http://www.mikepinder.co.uk/store/e-books/hackers-innovation-redefinition-examination-outlaw-sources-generativity-future-product-development-strategies/]]


== Footnotes ==
&lt;references/&gt; 

==References==
&lt;HarvardReferences&gt;
* [*Kuhn, 1962] Kuhn, T. (1962). The structure of scientific revolutions. Chicago, The University of Chicago Press.
* [*Weber, 1905] Weber, M. (1905). The Protestant Ethic and the Spirit of Capitalism Munich.
* [*Himanen, 2001] Himanen, P. (2001). The Hacker Ethic and the Spirit of the Information Age. New York, Random House.
* [*Rogers, 1995] Rogers, E. M. (1995). Diffusion of Innovations. New York, The Free Press.
* [*Robson, 1999] Robson, G. (1999). &quot;How to Become a Hacker in 2473 easy lessons.&quot; Retrieved March 20, 2012, from http://users.telenet.be/mydotcom/library/index.htm.
* [*Sharma, 2012]  Sharma, A. (2012). &quot;Stuxnet - First Cyber Weapon of the World.&quot; Retrieved April 11, 2012, from http://www.symantec.com/connect/blogs/stuxnet-first-cyber- weapon-world.
* [*Nappenberger, 2012]  Nappenberger, B. (2012). We Are Legion: The Story of the Hacktivists.
* [*IDEO, 2012]  IDEO (2012). &quot;IDEO Labs Bay Area Hack Nights.&quot; Retrieved Feb, 2012, from http://labs.ideo.com/2012/03/13/bay-area-hack-night/
&lt;/HarvardReferences&gt;</rev>
        </revisions>
      </page>
      <page pageid="46" ns="0" title="References">
        <revisions>
          <rev contentformat="text/x-wiki" contentmodel="wikitext" xml:space="preserve">Assange, J. (2012). &quot;WikiLeaks.&quot; Retrieved Sep, 2012, from http://www.wikileaks.org/.

Baldwin, C., C. Hienerth, et al. (2006). &quot;How user innovations become commercial products: A theoretical investigation and case study.&quot; Research Policy 35(9): 1291-1313.

Baldwin, C. C., B. (2000). Design Rules Volume 1. The Power of Modularity. Cambridge, Massachusetts, The MIT Press.

Baldwin, C. C., B. (2003). &quot;The architecture of cooperation - how code architecture mitigates free riding in the open source development model.&quot; Mit Sloan Management Review.

Baldwin, C. v. H., E. (2010). &quot;Modelling a Paradigm Shift: From Producer to User and Open Collaborative Innovation.&quot; MIT Sloan School of Management Working Paper No.4764-09.

BBC (2012). &quot;Inside 'dirty lab' hacking to beat hackers.&quot; Technology News. from http://www.bbc.co.uk/news/technology-17123857.

BBC (2012). &quot;News Corp profits increase as hacking scandal costs soar.&quot; from http://www.bbc.co.uk/news/business-16964528.

BBC (2012). &quot;Two men bailed over computer-hacking probe.&quot; from http://www.bbc.co.uk/news/uk-17161804.

Berthon, P. P., L. McCarthy, I. Kates, S. (2007). &quot;When customers get clever: Managerial approaches to dealing with creative consumers.&quot; 

Business Horizons 50: 39-47.

Bishop, B. (2012). &quot;Google Nexus Q media streamer: first impressions and video.&quot; Retrieved July, 2012, from http://www.theverge.com/2012/6/28/3121991/google-nexus-q-media- streamer-first-impressions.

Bogers, M., A. Afuah, et al. (2010). &quot;Users as Innovators: A Review, Critique, and Future Research Directions.&quot; Journal of Management 36(4): 857-875.

Brown, T. (2008). &quot;Design Thinking.&quot; Harvard Business Review.

Cohen, W. M. and D. A. Levinthal (1990). &quot;Absorptive Capacity: A New Perspective on Learning and Innovation.&quot; Administrative Science Quarterly(35): 182-152.

Csikszentmihalyi, M. (1990). Flow: The Psychology of Optimal Experience. New York: Harper and Row.

Csikszentmihalyi, M. (1997). Finding Flow: The Psychology of Engagement with Everyday Life. New York, Basic Books.

Dennis, T. (2007). &quot;Microsoft stomps on XDA developers.&quot; Retrieved Sep, 2012, from http://www.theinquirer.net/inquirer/news/1018935/microsoft-stomps- xda-developers.

Dewar, R. D. and J. E. Dutton (1986). &quot;The Adoption of Radical and Incremental Innovations: An Empirical Analysis.&quot; Management Science 32(11): 1422-1433.

Dictionaries, O. (2012). &quot;Definition for hacker - Oxford Dictionaries Online (World English).&quot; Retrieved April 22, 2012, from http://oxforddictionaries.com/definition/hacker?q=hacker.

Fleming, L. S., O. (2001). &quot;Technology as a complex adaptive system: evidence from patent data.&quot; Research Policy 30: 1019-1039.

Flowers, S. (2006). KNOWLEDGE, INNOVATION AND COMPETITIVENESS: DYNAMICS OF FIRMS, NETWORKS, REGIONS AND INSTITUTIONS. DRUID Summer Conference 2006. Denmark.

Flowers, S. (2007). From Outlaws to Trusted Partners: Challenges in mobilising User-Centric Innovation in R&amp;D projects. Centre for Research in Innovation Management (CENTRIM), University of Brighton. Brighton, University of Brighton (CENTRIM).

Foundation, T. L. (2012, 10 April). &quot;How Linux is Built.&quot; from http://www.linuxfoundation.org/.

Gassmann, O., E. Enkel, et al. (2010). &quot;The future of open innovation.&quot; R &amp; D Management 40(3): 213-221.

Gloor, P., M. Paasivaara, et al. FINDING COLLABORATIVE INNOVATION NETWORKS THROUGH CORRELATING PERFORMANCE WITH SOCIAL NETWORK STRUCTURE.

Gloor, P., J. Putzke, et al. (2005). Studying Microscopic Peer-to-Peer Communication Patterns. Americas Conference on Information Systems.

Gordon, D. (2010). &quot;Forty Years of Movie Hacking: Considering the Potential Implications of the Popular Media Representation of 

Computer Hackers from 1968 to 2008.&quot; International Journal of Internet Technology and Secured Transactions.

Hamilton, F. (2011). &quot;Hacking case police reading 300m e-mails.&quot; from http://www.thetimes.co.uk/tto/news/medianews/article3223328.ece.

Hannemyr, G. (1999). &quot;Technology and Pleasure: Hacking Considered Constructive.&quot; from http://hannemyr.com/en/oks97.php.

Hars, A. (2001). Working for free? Motivations of participating in open source projects. System Sciences, 2001. Proceedings of the 34th Annual Hawaii International Conference. Hawaii.

Hertel, G., S. Niender, et al. (2003). &quot;Motivation of software developers in OpenSource projects: an Internet-based survey of contributors to the Linux kernel.&quot; Research Policy 32(7): 1159-1177.

Himanen, P. (2001). The Hacker Ethic and the Spirit of the Information Age. New York, Random House.

IDEO (2012). &quot;IDEO Labs Bay Area Hack Nights.&quot; Retrieved Feb, 2012, from
http://labs.ideo.com/2012/03/13/bay-area-hack-night/

Jeppesen, L. B. and M. J. Molin (2003). &quot;Consumers as co-developers: Learning and innovation outside the firm.&quot; Technology Analysis &amp; Strategic Management 15(3): 363-383.

Jeppessen, L. B. M., M. (2003). &quot;Consumers as Co-Developers: Learning and Innovation Outside the Firm.&quot; Technology Analysis &amp; Strategic Management 15(3).

Johnson, S. (2010). Where Good Ideas Come From: The Natural History of Innovation. New York, Riverhead Books.

Joyce, J. (2012). &quot;Raspberry Pi computer: Can it get kids into code?&quot;. Retrieved April 3, 2012, from http://m.bbc.co.uk/news/technology-17192823.

Katz, R. and T. J. Allen (1982). &quot;Investigating the Not Invented Here (NIH) syndrome: A look at the performance, tenure, and communication patterns of 50 R &amp; D Project Groups.&quot; R&amp;D Management 12(1): 7-20.

Kuhn, T. (1962). The structure of scientific revolutions. Chicago, The University of Chicago Press.

Lakhani, K. and E. von Hippel (2001). &quot;How opensource software works: 'free' user-to-user assistance.&quot; MIT Sloan Management Review 32(6): 923-943.

Lakhani, K. W., R. (2003). Why Hackers Do What They Do: Understanding Motivation and Effort in Free/Open Source Software Projects. Perspectives on Free and Open Source Software. B. F. Joseph Feller, Scott A. Hissam, Karim Lakhani. Cambridge Massachusetts. London, England, MIT Press.

Lerner, J. and T. Jean (2003). &quot;Some Simple Economics of Open Source.&quot; The Journal of Industrial Economics 50(2): 197-234.

Levy, S. (1984). Hackers: Heroes of the Computer Revolution, Penguin.

Lin, Y. (2002). Pan-hacker culture and unconventional software innovation: exploring the socio-economic dimensions of Linux. Linux Tag 2002. Karlsruhe, Germancy.

Lin, Y. (2007). Hacker Culture and the FLOSS Innovation Handbook on Research in Open Source Software: Technological, Economic and Social Perspectives. K. S. St.Amant, Brian. Idea Group.

Locke, J. (1689). Two Treatises of Government: In the Former, The False Principles and Foundation of Sir Robert Filmer, And His Followers, are Detected and Overthrown. The Latter is an Essay concerning The True Original, Extent, and End of Civil-Government.

Lucas, G. (1977). Star Wars Episode IV: A New Hope G. Lucas. US, Lucas Film.

Marx, K. (1848) The Communist Manifesto.

Mollick, E. (2004). Innovations From The Underground: Towards a Theory of Parasitic Innovation. SLOAN SCHOOL OF MANAGEMENT Harvard University. Master of Science.

Nappenberger, B. (2012). We Are Legion: The Story of the Hacktivists.

OUYA (2012). &quot;A new kind of video game console.&quot; Retrieved November, 2012,
from http://www.ouya.tv/gamers/.

Parliament, U. (2000). Freedom of Information Act. ch3600s08a. 2000 c. 36.

Piller, F. N., Franke (2004). &quot;Value Creation by Toolkits for User Innovation and Design - The Case of the Watch Market.&quot; Journal of Product Innovation Management 21(6): 401-415.

Piller, F. T. and D. Walcher (2006). &quot;Toolkits for idea competitions: a novel method to integrate users in new product development.&quot; R &amp; D Management 36(3): 307-318.

Prugl, R. and M. Schreier (2006). &quot;Learning from leading-edge customers at The Sims: opening up the innovation process using toolkits.&quot; R &amp; D Management 36(3): 237-250.

Raymond, E. S. (2000). &quot;The Cathedral and the Bazaar.&quot; from http://www.tuxedo.org/~esr/.

Robertson, D. (2010). Hacker Spaces, Georgia Institute of Technology. Robson, G. (1999). &quot;How to Become a Hacker in 2473 easy lessons.&quot; Retrieved March 20, 2012, from http://users.telenet.be/mydotcom/library/index.htm.

Rockman, S. (2012). &quot;Is raspberry pi a mid-life crisis?&quot;. Retrieved April 15, 2012, from http://www.zdnet.co.uk/blogs/fuss-free-phones-simon-rockman- 10024919/is-raspberry-pi-a-mid-life-crisis-10025449/.

Rogers, E. M. (1995). Diffusion of Innovations. New York, The Free Press. Rosenbaum, R. (1971). Secrets of the Little Blue Box. Esquire: 117-226.

Rosenberg, N. (1982). Inside the Black Box: Technology &amp; Economics. Cambridge, Cambridge University Press.

Sarma, M. L.-F., J. Clark, E. (2009). VIRTUAL INNOVATION WITHIN A HACKER COMMUNITY AN EMPIRICAL STUDY OF OPEN SOURCE SOFTWARE DEVELOPMENT. Duid Summer Conference 2009. Copenhagen Business School.

Schaller, R. (1997). &quot; Moore's law: past, present and future &quot; Spectrum, IEEE 34(6): 52-59.

Schlesinger, F. (2011). &quot;Hacking should have been disclosed.&quot; from http://www.thetimes.co.uk/tto/news/medianews/article3298525.ece.

Schreier, M., S. Oberhauser, et al. (2007). &quot;Lead users and the adoption and diffusion of new products: Insights from two extreme sports communities.&quot; Marketing Letters 18(1-2): 15-30.

Schulz, C. W., S. (2008). Outlaw Community Innovations. Munich School of Management, University of Munich.

Schulze, A. and M. Hoegl (2008). &quot;Organizational knowledge creation and the generation of new product ideas: A behavioral approach.&quot; Research Policy 37(10): 1742-1750.

Schumpeter, J. A. (1942). Capitalism, Socialism and Democracy. London, Unwin.

Sharma, A. (2012). &quot;Stuxnet - First Cyber Weapon of the World.&quot; Retrieved April 11, 2012, from http://www.symantec.com/connect/blogs/stuxnet-first-cyber- weapon-world.

Smith, A. (1776). An Inquiry into the Nature and Causes of the Wealth of Nations. London.

Staff, E. (2012). &quot;Mark Zuckerberg’s Letter to Investors: ‘The Hacker Way’.&quot; Retrieved July 2012, from http://www.wired.com/business/2012/02/zuck- letter/.

Sydow, J. and U. Staber (2002). &quot;The Institutional Embeddedness of Project Networks: The Case of Content Production in German Television.&quot; Regional Studies 36(3): 215-227.

Telecom, S. a. S. (2012). Android Smartphone Activations Reached 331 Million in Q1 2012.

Thieme, R. (2003). &quot;Hacker Generations.&quot; Retrieved Sep, 2012, from
http://www.ctheory.net/articles.aspx?id=394

Ven, K. and J. Verelst (2008). &quot;The impact of ideology on the organizational adoption of open source software.&quot; Journal of Database Management 19(2): 58- 72.

von Hippel, E. (1986). &quot;Lead Users: A Source of Novel Product Concepts.&quot; Management Science 32(7): 791-805.

von Hippel, E. (2005). Democratizing Innovation. Cambridge, Massachusetts, MIT Press.

von Hippel, E., J. Jong, et al. (2012). &quot;Comparing Business and Household Sector Innovation in Consumer Products: Findings from a Representative Study in the United Kingdom.&quot; Management Science 58(9): 1669-1681.

von Hippel, E. P., J. (2008). User Innovation and Hacking. Pervasive Computing, IEEE C5. 8: 66.

von Hippel, E. v. K., G. (2003). &quot;Open Source Software and the Private-Collective Innovation Model - Issues for Organization Science.&quot; Organization Science 14(2): 209-223.

Wark, M. (2004). A Hacker Manifesto. Cambridge, Harvard College.

Weber, M. (1905). The Protestant Ethic and the Spirit of Capitalism Munich. Weber, S. (2004). The Success of Open Source, Cambridge University Press.

Webster, B. (2011). &quot;The front-page story on the hacking scandal that led to end of the World.&quot; from http://www.thetimes.co.uk/tto/news/medianews/article3256368.ece.

Zetter, K. (2011). &quot;Feds Arrest 14 ‘Anonymous’ Suspects Over PayPal Attack, Raid Dozens More.&quot; Retrieved 15 March, 2012, from http://www.wired.com/threatlevel/2011/07/paypal-hack-arrests/.

Zittrain, J. (2008). The Future of the Internet And How to Stop It New Haven &amp; London, Yale University Press.</rev>
        </revisions>
      </page>
    </pages>
  </query>
</api>