From Hacker Innovation: Redefinition and Examination of Outlaw Sources of Generativity for Future Product Development Strategies (2014) by Mike Pinder
Jump to: navigation, search

Assange, J. (2012). "WikiLeaks." Retrieved Sep, 2012, from

Baldwin, C., C. Hienerth, et al. (2006). "How user innovations become commercial products: A theoretical investigation and case study." Research Policy 35(9): 1291-1313.

Baldwin, C. C., B. (2000). Design Rules Volume 1. The Power of Modularity. Cambridge, Massachusetts, The MIT Press.

Baldwin, C. C., B. (2003). "The architecture of cooperation - how code architecture mitigates free riding in the open source development model." Mit Sloan Management Review.

Baldwin, C. v. H., E. (2010). "Modelling a Paradigm Shift: From Producer to User and Open Collaborative Innovation." MIT Sloan School of Management Working Paper No.4764-09.

BBC (2012). "Inside 'dirty lab' hacking to beat hackers." Technology News. from

BBC (2012). "News Corp profits increase as hacking scandal costs soar." from

BBC (2012). "Two men bailed over computer-hacking probe." from

Berthon, P. P., L. McCarthy, I. Kates, S. (2007). "When customers get clever: Managerial approaches to dealing with creative consumers."

Business Horizons 50: 39-47.

Bishop, B. (2012). "Google Nexus Q media streamer: first impressions and video." Retrieved July, 2012, from streamer-first-impressions.

Bogers, M., A. Afuah, et al. (2010). "Users as Innovators: A Review, Critique, and Future Research Directions." Journal of Management 36(4): 857-875.

Brown, T. (2008). "Design Thinking." Harvard Business Review.

Cohen, W. M. and D. A. Levinthal (1990). "Absorptive Capacity: A New Perspective on Learning and Innovation." Administrative Science Quarterly(35): 182-152.

Csikszentmihalyi, M. (1990). Flow: The Psychology of Optimal Experience. New York: Harper and Row.

Csikszentmihalyi, M. (1997). Finding Flow: The Psychology of Engagement with Everyday Life. New York, Basic Books.

Dennis, T. (2007). "Microsoft stomps on XDA developers." Retrieved Sep, 2012, from xda-developers.

Dewar, R. D. and J. E. Dutton (1986). "The Adoption of Radical and Incremental Innovations: An Empirical Analysis." Management Science 32(11): 1422-1433.

Dictionaries, O. (2012). "Definition for hacker - Oxford Dictionaries Online (World English)." Retrieved April 22, 2012, from

Fleming, L. S., O. (2001). "Technology as a complex adaptive system: evidence from patent data." Research Policy 30: 1019-1039.


Flowers, S. (2007). From Outlaws to Trusted Partners: Challenges in mobilising User-Centric Innovation in R&D projects. Centre for Research in Innovation Management (CENTRIM), University of Brighton. Brighton, University of Brighton (CENTRIM).

Foundation, T. L. (2012, 10 April). "How Linux is Built." from

Gassmann, O., E. Enkel, et al. (2010). "The future of open innovation." R & D Management 40(3): 213-221.


Gloor, P., J. Putzke, et al. (2005). Studying Microscopic Peer-to-Peer Communication Patterns. Americas Conference on Information Systems.

Gordon, D. (2010). "Forty Years of Movie Hacking: Considering the Potential Implications of the Popular Media Representation of

Computer Hackers from 1968 to 2008." International Journal of Internet Technology and Secured Transactions.

Hamilton, F. (2011). "Hacking case police reading 300m e-mails." from

Hannemyr, G. (1999). "Technology and Pleasure: Hacking Considered Constructive." from

Hars, A. (2001). Working for free? Motivations of participating in open source projects. System Sciences, 2001. Proceedings of the 34th Annual Hawaii International Conference. Hawaii.

Hertel, G., S. Niender, et al. (2003). "Motivation of software developers in OpenSource projects: an Internet-based survey of contributors to the Linux kernel." Research Policy 32(7): 1159-1177.

Himanen, P. (2001). The Hacker Ethic and the Spirit of the Information Age. New York, Random House.

IDEO (2012). "IDEO Labs Bay Area Hack Nights." Retrieved Feb, 2012, from

Jeppesen, L. B. and M. J. Molin (2003). "Consumers as co-developers: Learning and innovation outside the firm." Technology Analysis & Strategic Management 15(3): 363-383.

Jeppessen, L. B. M., M. (2003). "Consumers as Co-Developers: Learning and Innovation Outside the Firm." Technology Analysis & Strategic Management 15(3).

Johnson, S. (2010). Where Good Ideas Come From: The Natural History of Innovation. New York, Riverhead Books.

Joyce, J. (2012). "Raspberry Pi computer: Can it get kids into code?". Retrieved April 3, 2012, from

Katz, R. and T. J. Allen (1982). "Investigating the Not Invented Here (NIH) syndrome: A look at the performance, tenure, and communication patterns of 50 R & D Project Groups." R&D Management 12(1): 7-20.

Kuhn, T. (1962). The structure of scientific revolutions. Chicago, The University of Chicago Press.

Lakhani, K. and E. von Hippel (2001). "How opensource software works: 'free' user-to-user assistance." MIT Sloan Management Review 32(6): 923-943.

Lakhani, K. W., R. (2003). Why Hackers Do What They Do: Understanding Motivation and Effort in Free/Open Source Software Projects. Perspectives on Free and Open Source Software. B. F. Joseph Feller, Scott A. Hissam, Karim Lakhani. Cambridge Massachusetts. London, England, MIT Press.

Lerner, J. and T. Jean (2003). "Some Simple Economics of Open Source." The Journal of Industrial Economics 50(2): 197-234.

Levy, S. (1984). Hackers: Heroes of the Computer Revolution, Penguin.

Lin, Y. (2002). Pan-hacker culture and unconventional software innovation: exploring the socio-economic dimensions of Linux. Linux Tag 2002. Karlsruhe, Germancy.

Lin, Y. (2007). Hacker Culture and the FLOSS Innovation Handbook on Research in Open Source Software: Technological, Economic and Social Perspectives. K. S. St.Amant, Brian. Idea Group.

Locke, J. (1689). Two Treatises of Government: In the Former, The False Principles and Foundation of Sir Robert Filmer, And His Followers, are Detected and Overthrown. The Latter is an Essay concerning The True Original, Extent, and End of Civil-Government.

Lucas, G. (1977). Star Wars Episode IV: A New Hope G. Lucas. US, Lucas Film.

Marx, K. (1848) The Communist Manifesto.

Mollick, E. (2004). Innovations From The Underground: Towards a Theory of Parasitic Innovation. SLOAN SCHOOL OF MANAGEMENT Harvard University. Master of Science.

Nappenberger, B. (2012). We Are Legion: The Story of the Hacktivists.

OUYA (2012). "A new kind of video game console." Retrieved November, 2012, from

Parliament, U. (2000). Freedom of Information Act. ch3600s08a. 2000 c. 36.

Piller, F. N., Franke (2004). "Value Creation by Toolkits for User Innovation and Design - The Case of the Watch Market." Journal of Product Innovation Management 21(6): 401-415.

Piller, F. T. and D. Walcher (2006). "Toolkits for idea competitions: a novel method to integrate users in new product development." R & D Management 36(3): 307-318.

Prugl, R. and M. Schreier (2006). "Learning from leading-edge customers at The Sims: opening up the innovation process using toolkits." R & D Management 36(3): 237-250.

Raymond, E. S. (2000). "The Cathedral and the Bazaar." from

Robertson, D. (2010). Hacker Spaces, Georgia Institute of Technology. Robson, G. (1999). "How to Become a Hacker in 2473 easy lessons." Retrieved March 20, 2012, from

Rockman, S. (2012). "Is raspberry pi a mid-life crisis?". Retrieved April 15, 2012, from 10024919/is-raspberry-pi-a-mid-life-crisis-10025449/.

Rogers, E. M. (1995). Diffusion of Innovations. New York, The Free Press. Rosenbaum, R. (1971). Secrets of the Little Blue Box. Esquire: 117-226.

Rosenberg, N. (1982). Inside the Black Box: Technology & Economics. Cambridge, Cambridge University Press.


Schaller, R. (1997). " Moore's law: past, present and future " Spectrum, IEEE 34(6): 52-59.

Schlesinger, F. (2011). "Hacking should have been disclosed." from

Schreier, M., S. Oberhauser, et al. (2007). "Lead users and the adoption and diffusion of new products: Insights from two extreme sports communities." Marketing Letters 18(1-2): 15-30.

Schulz, C. W., S. (2008). Outlaw Community Innovations. Munich School of Management, University of Munich.

Schulze, A. and M. Hoegl (2008). "Organizational knowledge creation and the generation of new product ideas: A behavioral approach." Research Policy 37(10): 1742-1750.

Schumpeter, J. A. (1942). Capitalism, Socialism and Democracy. London, Unwin.

Sharma, A. (2012). "Stuxnet - First Cyber Weapon of the World." Retrieved April 11, 2012, from weapon-world.

Smith, A. (1776). An Inquiry into the Nature and Causes of the Wealth of Nations. London.

Staff, E. (2012). "Mark Zuckerberg’s Letter to Investors: ‘The Hacker Way’." Retrieved July 2012, from letter/.

Sydow, J. and U. Staber (2002). "The Institutional Embeddedness of Project Networks: The Case of Content Production in German Television." Regional Studies 36(3): 215-227.

Telecom, S. a. S. (2012). Android Smartphone Activations Reached 331 Million in Q1 2012.

Thieme, R. (2003). "Hacker Generations." Retrieved Sep, 2012, from

Ven, K. and J. Verelst (2008). "The impact of ideology on the organizational adoption of open source software." Journal of Database Management 19(2): 58- 72.

von Hippel, E. (1986). "Lead Users: A Source of Novel Product Concepts." Management Science 32(7): 791-805.

von Hippel, E. (2005). Democratizing Innovation. Cambridge, Massachusetts, MIT Press.

von Hippel, E., J. Jong, et al. (2012). "Comparing Business and Household Sector Innovation in Consumer Products: Findings from a Representative Study in the United Kingdom." Management Science 58(9): 1669-1681.

von Hippel, E. P., J. (2008). User Innovation and Hacking. Pervasive Computing, IEEE C5. 8: 66.

von Hippel, E. v. K., G. (2003). "Open Source Software and the Private-Collective Innovation Model - Issues for Organization Science." Organization Science 14(2): 209-223.

Wark, M. (2004). A Hacker Manifesto. Cambridge, Harvard College.

Weber, M. (1905). The Protestant Ethic and the Spirit of Capitalism Munich. Weber, S. (2004). The Success of Open Source, Cambridge University Press.

Webster, B. (2011). "The front-page story on the hacking scandal that led to end of the World." from

Zetter, K. (2011). "Feds Arrest 14 ‘Anonymous’ Suspects Over PayPal Attack, Raid Dozens More." Retrieved 15 March, 2012, from

Zittrain, J. (2008). The Future of the Internet And How to Stop It New Haven & London, Yale University Press.