{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:49:47Z","timestamp":1752230987615},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2007,11,1]],"date-time":"2007-11-01T00:00:00Z","timestamp":1193875200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2007,11,1]],"date-time":"2007-11-01T00:00:00Z","timestamp":1193875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1007\/bf03253320","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:33:22Z","timestamp":1625639602000},"page":"1312-1326","source":"Crossref","is-referenced-by-count":10,"title":["The professionalisation paths of hackers in IT security: The sociology of a divided identity"],"prefix":"10.1007","volume":"62","author":[{"given":"Nicolas","family":"Auray","sequence":"first","affiliation":[]},{"given":"Danielle","family":"Kaminsky","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03253320_CR1","series-title":"s\u00e9rie Raisons pratiques","doi-asserted-by":"crossref","first-page":"177","DOI":"10.4000\/books.editionsehess.10438","volume-title":"Cognition et information en soci\u00e9t\u00e9","author":"N. \u00ab. Auray","year":"1997","unstructured":"Auray N., \u00abIronie et solidarit\u00e9 dans un milieu technicis\u00e9. Les d\u00e9fis contre les protections dans les collectifs de \u201chackers\u201d\u00bb, Cognition et information en soci\u00e9t\u00e9, s\u00e9rie Raisons pratiques n\u00b0 8, Paris, published by ehess, pp. 177\u2013201, 1997."},{"key":"BF03253320_CR2","volume-title":"sociology thesis","author":"N. \u00ab. Auray","year":"2000","unstructured":"Auray N., \u00abPolitique de l\u2019informatique et de l\u2019information. Les pionniers de la nouvelle fronti\u00e8re \u00e9lectronique\u00bb, sociology thesis, ehess (dir. L. Th\u00e9venot). Online at: http:\/\/ses.enst.fr\/auray, 2000."},{"key":"BF03253320_CR3","doi-asserted-by":"crossref","DOI":"10.3917\/meta.becke.1985.01","volume-title":"Outsiders. \u00c9tudes de sociologie de la d\u00e9viance","author":"H. Becker","year":"1985","unstructured":"Becker H., Outsiders. \u00c9tudes de sociologie de la d\u00e9viance, Anne-Marie M\u00e9taili\u00e9 publications, 1985 (1963)."},{"key":"BF03253320_CR4","first-page":"3","volume":"22","author":"L. \u00ab. Boltanski","year":"1978","unstructured":"Boltanski L., \u00abLes cadres autodidactes\u00bb, Actes de la Recherche en Sciences Sociales, 22, pp. 3\u201323, 1978.","journal-title":"Annales Des T\u00e9l\u00e9communications"},{"key":"BF03253320_CR5","volume-title":"De la justification","author":"L. Boltanski","year":"1991","unstructured":"Boltanski L., Th\u00e9venot L., De la justification, nrf, Paris, 1991."},{"key":"BF03253320_CR6","volume-title":"Profile of a computer hacker","author":"N. Chantler","year":"1996","unstructured":"Chantler N., Profile of a computer hacker. Florida: Infowar, 1996."},{"key":"BF03253320_CR7","first-page":"408","volume":"xliii","author":"E.C. Hughes","year":"1937","unstructured":"Hughes E.C.,\u201cInstitutional Office and the Person\u201d, American Journal of sociology, vol. xliii, p. 408\u2013410, 1937.","journal-title":"Annales Des T\u00e9l\u00e9communications"},{"issue":"4","key":"BF03253320_CR8","first-page":"757","volume":"46","author":"T. Jordan","year":"1998","unstructured":"Jordan T., Taylor P., \u201cA Sociology of Hackers\u201d, Sociological Review 46 (4): 757\u201380, 1998.","journal-title":"Annales Des T\u00e9l\u00e9communications"},{"key":"BF03253320_CR9","volume-title":"Auteurs de virus, \u00e9diteurs d\u2019antivirus: les liaisons dangereuses","author":"D. \u00ab. Kaminsky","year":"1998","unstructured":"Kaminsky D., \u00abAuteurs de virus, \u00e9diteurs d\u2019antivirus: les liaisons dangereuses\u00bb, study for clusif, 1998."},{"key":"BF03253320_CR10","volume-title":"Out of the inner circle","author":"B. Landreth","year":"1985","unstructured":"Landreth B., Out of the inner circle, New York: Tempus Book, 1985."},{"key":"BF03253320_CR11","series-title":"Wired","volume-title":"The rise of crowdsourcing","author":"J. Howe","year":"2006","unstructured":"Howe J., 2006, \u201cThe rise of crowdsourcing\u201d, Wired, n\u00b0 14.06."},{"key":"BF03253320_CR12","volume-title":"The Pro-Am Revolution. How enthusiasts are changing our economy and society","author":"C. Leadbeater","year":"2004","unstructured":"Leadbeater C., Miller P., The Pro-Am Revolution. How enthusiasts are changing our economy and society, Demos, 2004."},{"key":"BF03253320_CR13","volume-title":"Delinquency and Drift","author":"D. Matza","year":"1964","unstructured":"Matza D., Delinquency and Drift, New York: John Wiley and Sons Inc, 1964."},{"key":"BF03253320_CR14","volume-title":"Hackers, Heroes of the computer revolution","author":"S. Levy","year":"1984","unstructured":"Levy S., Hackers, Heroes of the computer revolution, Anchor Press\/Doubleday, Garden City, New-York, 1984."},{"key":"BF03253320_CR15","volume-title":"The fugitive game: online with Kevin Mitnick","author":"J. Littman","year":"1995","unstructured":"Littman J.\n                           The fugitive game: online with Kevin Mitnick. Toronto: Little Brown & Company, 1995."},{"key":"BF03253320_CR16","volume-title":"The Watchman: The twisted life and crimes of serial hacker kevin poulsen","author":"J. Littman","year":"1997","unstructured":"Littman J., The Watchman: The twisted life and crimes of serial hacker kevin poulsen. Toronto: Little Brown & Company, 1997."},{"key":"BF03253320_CR17","volume-title":"The Student Physician. Introductory Studies in the sociology of medical education","year":"1957","unstructured":"Merton R. (ed.), The Student Physician. Introductory Studies in the sociology of medical education, Cambridge, Harvard University Press, 1957."},{"key":"BF03253320_CR18","volume-title":"The social organization of the computer underground","author":"G. Meyer","year":"1989","unstructured":"Meyer G., 1989, The social organization of the computer underground, Northern Illinois University (PhD)."},{"issue":"2","key":"BF03253320_CR19","first-page":"195","volume":"6","author":"H. Nissenbaum","year":"2004","unstructured":"Nissenbaum H., \u201cHackers and the contested ontology of cyberspace\u201d, New Media and Society, vol. 6(2), pp. 195\u2013217, 2004.","journal-title":"Annales Des T\u00e9l\u00e9communications"},{"key":"BF03253320_CR20","volume-title":"ACM: Computers & Society (SIGCAS)","author":"A. Panteli","year":"2003","unstructured":"Panteli A., \u201cCode confidential: Codes and practices for computing professionals\u201d, ACM: Computers & Society (SIGCAS), vol.32, n\u00b0 6, 2003."},{"key":"BF03253320_CR21","volume-title":"Secret et lien social","author":"A. Petitat","year":"2000","unstructured":"Petitat A., Secret et lien social, L\u2019Harmattan, Paris, 2000."},{"key":"BF03253320_CR22","series-title":"Paper presented at the meeting of InfowarCon\u201998","volume-title":"Information terrorism and the dangerous insider","author":"J. Post","year":"1998","unstructured":"Post J., Shaw E., Ruby K., \u201cInformation terrorism and the dangerous insider\u201d. Paper presented at the meeting of InfowarCon\u201998, Washington, dc, 1998."},{"key":"BF03253320_CR23","volume-title":"Zero Day Initiative: How does it work?","author":"TippingPoint","year":"2005","unstructured":"TippingPoint, 2005, \u201cZero Day Initiative: How does it work?\u201d, http:\/\/www.zerodayinitiative.com\/details."},{"key":"BF03253320_CR24","volume-title":"Chevaliers d\u2019Internet et pirates informatiques","author":"Y. Vandoorselaere","year":"1999","unstructured":"Vandoorselaere Y., Langlois Ph., Golovanivsky A., Chevaliers d\u2019Internet et pirates informatiques, \u00c9ditions n\u00b0 1, Paris, 1999.","edition":"\u00c9ditions n\u00b0 1"},{"key":"BF03253320_CR25","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2333.001.0001","volume-title":"Democratizing Innovation","author":"Von Hippel","year":"2005","unstructured":"Von Hippel, Democratizing Innovation, MIT Press, 2005"},{"key":"BF03253320_CR26","first-page":"137","volume":"2","author":"H. Wilensky","year":"1964","unstructured":"Wilensky H., \u201cThe professionalisation of everyone?\u201d, American Journal of Sociology, 2, pp. 137\u2013158, 1964.","journal-title":"Annales Des T\u00e9l\u00e9communications"}],"container-title":["Annales Des T\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03253320.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03253320\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03253320.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:31:15Z","timestamp":1652747475000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03253320"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":26,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2007,11]]}},"alternative-id":["BF03253320"],"URL":"https:\/\/doi.org\/10.1007\/bf03253320","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,11]]}}}