Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 adam:2004
%A Adam, A. E.
%D 2004
%J ACM SIGCAS Computers and Society
%K imported
%N 7
%P 12
%T Hacking into Hacking: Gender and the Hacker Phenomenon
%V 32
@article{adam:2004,
added-at = {2009-04-26T12:47:14.000+0200},
author = {Adam, A. E.},
biburl = {https://www.bibsonomy.org/bibtex/2e1acdba6207592ccc8bccb9016347733/sgiersig},
interhash = {4ac85c5ede126a9e5a10f525093fd482},
intrahash = {e1acdba6207592ccc8bccb9016347733},
journal = {ACM SIGCAS Computers and Society},
key = {adam:2004},
keywords = {imported},
number = 7,
pages = 12,
timestamp = {2009-04-26T12:47:14.000+0200},
title = {Hacking into Hacking: Gender and the Hacker Phenomenon},
volume = 32,
year = 2004
}