Reply
Related Articles
- Who's a hacker? Gannaway, R.R. // Columbia Journalism Review;Mar/Apr85, Vol. 23 Issue 6, p66
Presents a letter to the editor dealing with the term hacker.
- Open-and-Shut Case. Smith, Joe N.; Shmavonian, Karl // Forbes Global;11/15/2004, Vol. 7 Issue 20, p6
Presents a letter to the editor in response to the article "The Next Threat," in the September 20, 2004 issue.
- More to Hacking Than Ethics. Lynch, Dave // InfoWorld;1/3/2005, Vol. 27 Issue 1, p9
Presents a letter to the editor in response to the column "Certified Ethical Hacker Credential Proves Nothing," in the December 19, 2004 issue of "InfoWorld."
- Mac attack. Sheldrake, Kevin // New Scientist;2/6/2010, Vol. 205 Issue 2746, p27
A letter to the editor is presented in response to an article by Paul Marks on the dangers of hackers using networks of computers to eavesdrop on conversations on one's laptop or smartphone.
- The Ethics of Hacking. PAGANINI, PIERLUIGI // Forbes Asia;May2012, Vol. 8 Issue 6, p12
A letter to the editor is presented in response to the article "The Zero-Day Salesman," in the April 2012 issue, which discusses hackers' practice of stealing and selling information to government agencies.
- Gatekeeping warning. Sampson, Adam // Community Care;5/4/2006, Issue 1621, p22
This article presents a letter to the editor about gatekeeping.
- Question of "Community Control". LEWIS, DEBORAH A. // American Journal of Public Health;Oct1971, Vol. 61 Issue 10, p1934
A letter to the editor is presented in response to the article on community control by Steven Jonas in the May 1971 issue.
- Reply to Deborah Lewis. JONAS, STEVEN // American Journal of Public Health;Oct1971, Vol. 61 Issue 10, p1936
A response by Steven Jonas to a letter to the editor about his article on community control in the May 1971 issue is presented.
- Long-Term Energy Solutions: The Truth Behind the Silent Lie. Morse, William // Physics Today;Nov2004, Vol. 57 Issue 11, p17
Presents a letter to the editor about social control.