M. S. BernsteinA. Monroy-HernandezD. HarryP. AndreK. PanovichG. Vargas 2011 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community Fifth International AAAI Conference on Weblogs and Social Media ICWSM 50 57
K. Bojarski 2015 Dealer, Hacker, Lawyer, Spy: Modern Techniques and Legal Boundaries of Counter-cybercrime Operations The European Review of Organised Crime 2 2 25 50
G. Coleman 2014 Hacker, hoaxer, whistleblower, spy: The Many Faces of Anonymous London Verso
G. Coleman 2015 Epilogue: The State of Anonymous Hacker, hoaxer, whistleblower, spy: The Many Faces of Anonymous London Verso 401 461
N. Chantler 1996 Profile of a computer hacker Florida Infowar
L. DobuschD. Schoeneborn 2015 Fluidity, Identity, and Organizationality: The Communicative Constitution of Anonymous Journal of Management Studies 52 8 1005 1035
M. Glenny 2011 Dark market: How hackers became the new mafia New York Vintage
C. Gunnarson 2014 Changing the Game: Addiopizzo’s Mobilisation against Racketeering in Palermo The European Review of Organised Crime 1 1 39 77
A. N. Joinson 2007 Disinhibition and the Internet J. Gackenbach Psychology and the Internet: Intrapersonal, interpersonal, and transpersonal implications 2nd San Diego Academic Press 75 92
P. Krapp 2005 Terror and play; or what was hacktivism? Grey Room MIT Press 21 70 93
B. LandrethH. Rheingold 1985 Out of the inner circle: a hacker's guide to computer security Bellevue, Washington Microsoft Press
N. Lapidot-LeflerA. Barak 2015 The benign online disinhibition effect: Could situational factors induce self-disclosure and prosocial behaviors? Cyberpsychology: Journal of Psychosocial Research on Cyberspace 9 2 2 3
M. McEvoy Manjikian 2010 From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik International Studies Quarterly 54 381 401
C. McMahon 2016 Cyber-Psychology: The Key to Securing the Human Element in Your Organization Info Security Magazine available from: https://www.infosecurity-magazine.com/magazine-features/cyberpsychology-securing-human/ accessed 12 03 16
P. Olsen 2013 We are Anonymous London Random House
M. K. Rogers 2006 A two-dimensional circumplex approach to the development of a hacker taxonomy Digital Investigation 3 2 97 102
M. K. Rogers 2010 The psyche of cybercriminals: a psycho-social perspective S. GhoshE. Turrini Cybercrimes: A Multidisciplinary Analysis Berlin Springer 217 35
R. Seebruck 2015 A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model Digital Investigation 14 36 45
J. Suler 2004 The Online Disinhibition Effect CyberPsychology & Behavior 7 3 321 326
P. Taylor 1999 Hackers: crime in the digital sublime London Routledge