{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T04:44:21Z","timestamp":1770525861291,"version":"3.49.0"},"reference-count":27,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1080\/01972243.2015.1107164","type":"journal-article","created":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T15:50:42Z","timestamp":1450799442000},"page":"40-50","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["The gray zone: Networks of piracy, control, and resistance"],"prefix":"10.1080","volume":"32","author":[{"given":"Burcu S.","family":"Bakio\u01e7lu","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,12,22]]},"reference":[{"key":"cit0001","volume-title":"The reinvention of politics: Rethinking modernity in the global social order","author":"Beck U.","year":"1997"},{"key":"cit0003","volume-title":"Digital media and democracy: Tactics in hard times","author":"Boler M","year":"2010"},{"key":"cit0004","volume":"18","author":"Burwell C.","year":"2008","journal-title":"Electronic Journal of Communication"},{"key":"cit0006","first-page":"155","volume-title":"The hacker ethic","author":"Castells M.","year":"2001"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-322-89613-1"},{"key":"cit0008","volume-title":"Communication power","author":"Castells M.","year":"2009"},{"key":"cit0005","volume-title":"The practice of everyday life","author":"Certeau M.","year":"1984"},{"key":"cit0010","author":"Coleman G.","year":"2012","journal-title":"Triple Canopy"},{"key":"cit0018","volume-title":"Internet and society","author":"Fuchs C.","year":"2008"},{"key":"cit0022","first-page":"335","volume-title":"Net working\/networking: Citizen initiated internet politics","author":"Hintikka K. A.","year":"2008"},{"key":"cit0023","first-page":"725","volume":"22","author":"Hughes J.","year":"2005","journal-title":"Cardozo Arts & Entertainment Law Journal"},{"key":"cit0024","doi-asserted-by":"crossref","DOI":"10.4324\/9780203490037","volume-title":"Hacktivism and cyberwars: Rebels with a cause?","author":"Jordan T.","year":"2004"},{"issue":"1","key":"cit0025","first-page":"222","volume":"7","author":"Katyal S.","year":"2005","journal-title":"Yale Journal of Law and Technology"},{"key":"cit0026","first-page":"205","volume-title":"Sarai reader 05: Bare acts","author":"Lin Y.","year":"2005"},{"issue":"2","key":"cit0027","first-page":"143","volume":"18","author":"Linde J.","year":"2010","journal-title":"Convergence"},{"key":"cit0029","doi-asserted-by":"crossref","DOI":"10.3726\/978-1-4539-0948-5","volume-title":"New noise: A cultural sociology of digital disruption","author":"Lindgren S.","year":"2013"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811414833"},{"key":"cit0030","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84457-583-1","volume-title":"Shadow economies of cinema: Mapping informal film distribution","author":"Lobato R.","year":"2012"},{"key":"cit0031","first-page":"606","volume":"6","author":"Lobato R.","year":"2011","journal-title":"International Journal of Communication, Piracy Cultures"},{"key":"cit0032","volume-title":"Paper presented at the annual meeting of the Association of Internet Researchers","author":"Mauger J.","year":"2012"},{"key":"cit0033","volume-title":"Anonymous: What do we have to fear from hacktivism, the lulz, and the hive mind","author":"McLaughlin V.","year":"2012"},{"key":"cit0035","volume-title":"Communication and control","author":"Mulgan G. F.","year":"1991"},{"key":"cit0036","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/8698.001.0001","volume-title":"The digital rights movement: The role of technology in subverting digital copyright","author":"Postigo H.","year":"2012"},{"key":"cit0037","volume-title":"Tactical media","author":"Raley R.","year":"2009"},{"key":"cit0038","volume-title":"Distributed denial of service actions and the challenge of civil disobedience on the Internet","author":"Sauter M.","year":"2013"},{"key":"cit0043","first-page":"621","volume":"22","author":"Urban J. M.","year":"2006","journal-title":"Santa Clara Computer and High Technology Law Journal"},{"key":"cit0044","first-page":"1207","volume":"17","author":"Yen A. C.","year":"2002","journal-title":"Berkley Technology Law Journal"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2015.1107164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T04:04:05Z","timestamp":1599969845000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2015.1107164"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,22]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,12,22]]},"published-print":{"date-parts":[[2016,1]]}},"alternative-id":["10.1080\/01972243.2015.1107164"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2015.1107164","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,22]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}