BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
beyond (2)
self (2)
hackerspac (2)
not (2)
ideal (1)

Stem hack$ (all stems)

11 papers:

SANERSANER-2015-EshkevariSCA #php #question
Are PHP applications ready for Hack? (LME, FDS, JRC, GA), pp. 63–72.
CSCWCSCW-2015-FoxUR #recognition
Hacking Culture, Not Devices: Access and Recognition in Feminist Hackerspaces (SF, RRU, DR), pp. 56–68.
DATEDATE-2014-HamdiouiDNSBT #hardware
Hacking and protecting IC hardware (SH, JLD, GDN, FS, GvB, MT), pp. 1–7.
CHICHI-2014-BardzellBT #quote #self #tool support
“Now that’s definitely a proper hack”: self-made tools in hackerspaces (JB, SB, AT), pp. 473–476.
SACSAC-2014-ZangerleS #classification #quote #twitter
“Sorry, I was hacked”: a classification of compromised twitter accounts (EZ, GS), pp. 587–593.
HCIDUXU-PMT-2013-Evans #bibliography #online
Beyond Satisfaction Questionnaires: “Hacking” the Online Survey (ALE), pp. 222–231.
ICSEICSE-2010-Schneider #exclamation
Beyond hacking: an SOS! (FBS), p. 2.
CHICHI-2009-RosnerB #learning
Learning from IKEA hacking: I’m not one to decoupage a tabletop and call it a day (DR, JB), pp. 419–422.
ITiCSEITiCSE-2005-Clark #self
Hacking as a form of “self-improvement” (EC), p. 397.
CSEETCSEET-2002-DuleyM
Cutting Hacking: Breaking from Tradition (RD, SPM), pp. 224–233.
TOOLSTOOLS-USA-2001-McClure #how #privacy #security
Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available (SM), p. 7.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.