{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:42:33Z","timestamp":1750308153733,"version":"3.41.0"},"reference-count":6,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2006,6,1]],"date-time":"2006-06-01T00:00:00Z","timestamp":1149120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2006,6]]},"abstract":"<jats:p>Why computer science should pay serious attention to the hacking community and its passion for pushing the limits of technology and its role as a counterbalance to its misuse.<\/jats:p>","DOI":"10.1145\/1132469.1132497","type":"journal-article","created":{"date-parts":[[2006,7,25]],"date-time":"2006-07-25T14:14:26Z","timestamp":1153836866000},"page":"32-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Introduction"],"prefix":"10.1145","volume":"49","author":[{"given":"Gregory","family":"Conti","sequence":"first","affiliation":[{"name":"United States Military Academy, West Point, NY and Georgia Institute of Technology, Atlanta"}]}],"member":"320","published-online":{"date-parts":[[2006,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.98"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047671.1047694"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of DARPA DISCEX III (Washington, D.C., Apr. 22--24)","author":"Cowan C.","year":"2003","unstructured":"Cowan , C. , Arnold , S. , Beattie , S. , Wright , C. , and Viega , J . Defcon capture the flag: Defending vulnerable code from intense attack . In Proceedings of DARPA DISCEX III (Washington, D.C., Apr. 22--24) . IEEE Computer Society Press, Los Alamitos, CA , 2003 . Cowan, C., Arnold, S., Beattie, S., Wright, C., and Viega, J. Defcon capture the flag: Defending vulnerable code from intense attack. In Proceedings of DARPA DISCEX III (Washington, D.C., Apr. 22--24). IEEE Computer Society Press, Los Alamitos, CA, 2003."},{"key":"e_1_2_1_4_1","series-title":"Apr. 2004","volume-title":"The Word Hacker. Posted on a personal Web site.","author":"Graham P.","unstructured":"Graham , P. The Word Hacker. Posted on a personal Web site. ( Apr. 2004 ); www.paulgraham.com\/gba.html. Graham, P. The Word Hacker. Posted on a personal Web site. (Apr. 2004); www.paulgraham.com\/gba.html."},{"key":"e_1_2_1_5_1","unstructured":"Le H. Vietnam medic makes DIY endoscope. BBC News Online (Aug. 22 2005); news.bbc.co.uk\/1\/hi\/technology\/4145984.stm.  Le H. Vietnam medic makes DIY endoscope. BBC News Online (Aug. 22 2005); news.bbc.co.uk\/1\/hi\/technology\/4145984.stm."},{"key":"e_1_2_1_6_1","volume-title":"The Jargon File 4.4.7. (Dec. 29","author":"Raymond E.","year":"2003","unstructured":"Raymond , E. The Jargon File 4.4.7. (Dec. 29 , 2003 ); www.catb.org\/~esr\/jargon\/html\/H\/hacker.html. Raymond, E. The Jargon File 4.4.7. (Dec. 29, 2003); www.catb.org\/~esr\/jargon\/html\/H\/hacker.html."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1132469.1132497","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1132469.1132497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:18:50Z","timestamp":1750263530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1132469.1132497"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6]]},"references-count":6,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2006,6]]}},"alternative-id":["10.1145\/1132469.1132497"],"URL":"https:\/\/doi.org\/10.1145\/1132469.1132497","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2006,6]]},"assertion":[{"value":"2006-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}