References

From Hacker Innovation: Redefinition and Examination of Outlaw Sources of Generativity for Future Product Development Strategies (2014) by Mike Pinder
Revision as of 17:24, 31 August 2014 by Mikepinder (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Assange, J. (2012). "WikiLeaks." Retrieved Sep, 2012, from http://www.wikileaks.org/.

Baldwin, C., C. Hienerth, et al. (2006). "How user innovations become commercial products: A theoretical investigation and case study." Research Policy 35(9): 1291-1313.

Baldwin, C. C., B. (2000). Design Rules Volume 1. The Power of Modularity. Cambridge, Massachusetts, The MIT Press.

Baldwin, C. C., B. (2003). "The architecture of cooperation - how code architecture mitigates free riding in the open source development model." Mit Sloan Management Review.

Baldwin, C. v. H., E. (2010). "Modelling a Paradigm Shift: From Producer to User and Open Collaborative Innovation." MIT Sloan School of Management Working Paper No.4764-09.

BBC (2012). "Inside 'dirty lab' hacking to beat hackers." Technology News. from http://www.bbc.co.uk/news/technology-17123857.

BBC (2012). "News Corp profits increase as hacking scandal costs soar." from http://www.bbc.co.uk/news/business-16964528.

BBC (2012). "Two men bailed over computer-hacking probe." from http://www.bbc.co.uk/news/uk-17161804.

Berthon, P. P., L. McCarthy, I. Kates, S. (2007). "When customers get clever: Managerial approaches to dealing with creative consumers."

Business Horizons 50: 39-47.

Bishop, B. (2012). "Google Nexus Q media streamer: first impressions and video." Retrieved July, 2012, from http://www.theverge.com/2012/6/28/3121991/google-nexus-q-media- streamer-first-impressions.

Bogers, M., A. Afuah, et al. (2010). "Users as Innovators: A Review, Critique, and Future Research Directions." Journal of Management 36(4): 857-875.

Brown, T. (2008). "Design Thinking." Harvard Business Review.

Cohen, W. M. and D. A. Levinthal (1990). "Absorptive Capacity: A New Perspective on Learning and Innovation." Administrative Science Quarterly(35): 182-152.

Csikszentmihalyi, M. (1990). Flow: The Psychology of Optimal Experience. New York: Harper and Row.

Csikszentmihalyi, M. (1997). Finding Flow: The Psychology of Engagement with Everyday Life. New York, Basic Books.

Dennis, T. (2007). "Microsoft stomps on XDA developers." Retrieved Sep, 2012, from http://www.theinquirer.net/inquirer/news/1018935/microsoft-stomps- xda-developers.

Dewar, R. D. and J. E. Dutton (1986). "The Adoption of Radical and Incremental Innovations: An Empirical Analysis." Management Science 32(11): 1422-1433.

Dictionaries, O. (2012). "Definition for hacker - Oxford Dictionaries Online (World English)." Retrieved April 22, 2012, from http://oxforddictionaries.com/definition/hacker?q=hacker.

Fleming, L. S., O. (2001). "Technology as a complex adaptive system: evidence from patent data." Research Policy 30: 1019-1039.

Flowers, S. (2006). KNOWLEDGE, INNOVATION AND COMPETITIVENESS: DYNAMICS OF FIRMS, NETWORKS, REGIONS AND INSTITUTIONS. DRUID Summer Conference 2006. Denmark.

Flowers, S. (2007). From Outlaws to Trusted Partners: Challenges in mobilising User-Centric Innovation in R&D projects. Centre for Research in Innovation Management (CENTRIM), University of Brighton. Brighton, University of Brighton (CENTRIM).

Foundation, T. L. (2012, 10 April). "How Linux is Built." from http://www.linuxfoundation.org/.

Gassmann, O., E. Enkel, et al. (2010). "The future of open innovation." R & D Management 40(3): 213-221.

Gloor, P., M. Paasivaara, et al. FINDING COLLABORATIVE INNOVATION NETWORKS THROUGH CORRELATING PERFORMANCE WITH SOCIAL NETWORK STRUCTURE.

Gloor, P., J. Putzke, et al. (2005). Studying Microscopic Peer-to-Peer Communication Patterns. Americas Conference on Information Systems.

Gordon, D. (2010). "Forty Years of Movie Hacking: Considering the Potential Implications of the Popular Media Representation of

Computer Hackers from 1968 to 2008." International Journal of Internet Technology and Secured Transactions.

Hamilton, F. (2011). "Hacking case police reading 300m e-mails." from http://www.thetimes.co.uk/tto/news/medianews/article3223328.ece.

Hannemyr, G. (1999). "Technology and Pleasure: Hacking Considered Constructive." from http://hannemyr.com/en/oks97.php.

Hars, A. (2001). Working for free? Motivations of participating in open source projects. System Sciences, 2001. Proceedings of the 34th Annual Hawaii International Conference. Hawaii.

Hertel, G., S. Niender, et al. (2003). "Motivation of software developers in OpenSource projects: an Internet-based survey of contributors to the Linux kernel." Research Policy 32(7): 1159-1177.

Himanen, P. (2001). The Hacker Ethic and the Spirit of the Information Age. New York, Random House.

IDEO (2012). "IDEO Labs Bay Area Hack Nights." Retrieved Feb, 2012, from http://labs.ideo.com/2012/03/13/bay-area-hack-night/

Jeppesen, L. B. and M. J. Molin (2003). "Consumers as co-developers: Learning and innovation outside the firm." Technology Analysis & Strategic Management 15(3): 363-383.

Jeppessen, L. B. M., M. (2003). "Consumers as Co-Developers: Learning and Innovation Outside the Firm." Technology Analysis & Strategic Management 15(3).

Johnson, S. (2010). Where Good Ideas Come From: The Natural History of Innovation. New York, Riverhead Books.

Joyce, J. (2012). "Raspberry Pi computer: Can it get kids into code?". Retrieved April 3, 2012, from http://m.bbc.co.uk/news/technology-17192823.

Katz, R. and T. J. Allen (1982). "Investigating the Not Invented Here (NIH) syndrome: A look at the performance, tenure, and communication patterns of 50 R & D Project Groups." R&D Management 12(1): 7-20.

Kuhn, T. (1962). The structure of scientific revolutions. Chicago, The University of Chicago Press.

Lakhani, K. and E. von Hippel (2001). "How opensource software works: 'free' user-to-user assistance." MIT Sloan Management Review 32(6): 923-943.

Lakhani, K. W., R. (2003). Why Hackers Do What They Do: Understanding Motivation and Effort in Free/Open Source Software Projects. Perspectives on Free and Open Source Software. B. F. Joseph Feller, Scott A. Hissam, Karim Lakhani. Cambridge Massachusetts. London, England, MIT Press.

Lerner, J. and T. Jean (2003). "Some Simple Economics of Open Source." The Journal of Industrial Economics 50(2): 197-234.

Levy, S. (1984). Hackers: Heroes of the Computer Revolution, Penguin.

Lin, Y. (2002). Pan-hacker culture and unconventional software innovation: exploring the socio-economic dimensions of Linux. Linux Tag 2002. Karlsruhe, Germancy.

Lin, Y. (2007). Hacker Culture and the FLOSS Innovation Handbook on Research in Open Source Software: Technological, Economic and Social Perspectives. K. S. St.Amant, Brian. Idea Group.

Locke, J. (1689). Two Treatises of Government: In the Former, The False Principles and Foundation of Sir Robert Filmer, And His Followers, are Detected and Overthrown. The Latter is an Essay concerning The True Original, Extent, and End of Civil-Government.

Lucas, G. (1977). Star Wars Episode IV: A New Hope G. Lucas. US, Lucas Film.

Marx, K. (1848) The Communist Manifesto.

Mollick, E. (2004). Innovations From The Underground: Towards a Theory of Parasitic Innovation. SLOAN SCHOOL OF MANAGEMENT Harvard University. Master of Science.

Nappenberger, B. (2012). We Are Legion: The Story of the Hacktivists.

OUYA (2012). "A new kind of video game console." Retrieved November, 2012, from http://www.ouya.tv/gamers/.

Parliament, U. (2000). Freedom of Information Act. ch3600s08a. 2000 c. 36.

Piller, F. N., Franke (2004). "Value Creation by Toolkits for User Innovation and Design - The Case of the Watch Market." Journal of Product Innovation Management 21(6): 401-415.

Piller, F. T. and D. Walcher (2006). "Toolkits for idea competitions: a novel method to integrate users in new product development." R & D Management 36(3): 307-318.

Prugl, R. and M. Schreier (2006). "Learning from leading-edge customers at The Sims: opening up the innovation process using toolkits." R & D Management 36(3): 237-250.

Raymond, E. S. (2000). "The Cathedral and the Bazaar." from http://www.tuxedo.org/~esr/.

Robertson, D. (2010). Hacker Spaces, Georgia Institute of Technology. Robson, G. (1999). "How to Become a Hacker in 2473 easy lessons." Retrieved March 20, 2012, from http://users.telenet.be/mydotcom/library/index.htm.

Rockman, S. (2012). "Is raspberry pi a mid-life crisis?". Retrieved April 15, 2012, from http://www.zdnet.co.uk/blogs/fuss-free-phones-simon-rockman- 10024919/is-raspberry-pi-a-mid-life-crisis-10025449/.

Rogers, E. M. (1995). Diffusion of Innovations. New York, The Free Press. Rosenbaum, R. (1971). Secrets of the Little Blue Box. Esquire: 117-226.

Rosenberg, N. (1982). Inside the Black Box: Technology & Economics. Cambridge, Cambridge University Press.

Sarma, M. L.-F., J. Clark, E. (2009). VIRTUAL INNOVATION WITHIN A HACKER COMMUNITY AN EMPIRICAL STUDY OF OPEN SOURCE SOFTWARE DEVELOPMENT. Duid Summer Conference 2009. Copenhagen Business School.

Schaller, R. (1997). " Moore's law: past, present and future " Spectrum, IEEE 34(6): 52-59.

Schlesinger, F. (2011). "Hacking should have been disclosed." from http://www.thetimes.co.uk/tto/news/medianews/article3298525.ece.

Schreier, M., S. Oberhauser, et al. (2007). "Lead users and the adoption and diffusion of new products: Insights from two extreme sports communities." Marketing Letters 18(1-2): 15-30.

Schulz, C. W., S. (2008). Outlaw Community Innovations. Munich School of Management, University of Munich.

Schulze, A. and M. Hoegl (2008). "Organizational knowledge creation and the generation of new product ideas: A behavioral approach." Research Policy 37(10): 1742-1750.

Schumpeter, J. A. (1942). Capitalism, Socialism and Democracy. London, Unwin.

Sharma, A. (2012). "Stuxnet - First Cyber Weapon of the World." Retrieved April 11, 2012, from http://www.symantec.com/connect/blogs/stuxnet-first-cyber- weapon-world.

Smith, A. (1776). An Inquiry into the Nature and Causes of the Wealth of Nations. London.

Staff, E. (2012). "Mark Zuckerberg’s Letter to Investors: ‘The Hacker Way’." Retrieved July 2012, from http://www.wired.com/business/2012/02/zuck- letter/.

Sydow, J. and U. Staber (2002). "The Institutional Embeddedness of Project Networks: The Case of Content Production in German Television." Regional Studies 36(3): 215-227.

Telecom, S. a. S. (2012). Android Smartphone Activations Reached 331 Million in Q1 2012.

Thieme, R. (2003). "Hacker Generations." Retrieved Sep, 2012, from http://www.ctheory.net/articles.aspx?id=394

Ven, K. and J. Verelst (2008). "The impact of ideology on the organizational adoption of open source software." Journal of Database Management 19(2): 58- 72.

von Hippel, E. (1986). "Lead Users: A Source of Novel Product Concepts." Management Science 32(7): 791-805.

von Hippel, E. (2005). Democratizing Innovation. Cambridge, Massachusetts, MIT Press.

von Hippel, E., J. Jong, et al. (2012). "Comparing Business and Household Sector Innovation in Consumer Products: Findings from a Representative Study in the United Kingdom." Management Science 58(9): 1669-1681.

von Hippel, E. P., J. (2008). User Innovation and Hacking. Pervasive Computing, IEEE C5. 8: 66.

von Hippel, E. v. K., G. (2003). "Open Source Software and the Private-Collective Innovation Model - Issues for Organization Science." Organization Science 14(2): 209-223.

Wark, M. (2004). A Hacker Manifesto. Cambridge, Harvard College.

Weber, M. (1905). The Protestant Ethic and the Spirit of Capitalism Munich. Weber, S. (2004). The Success of Open Source, Cambridge University Press.

Webster, B. (2011). "The front-page story on the hacking scandal that led to end of the World." from http://www.thetimes.co.uk/tto/news/medianews/article3256368.ece.

Zetter, K. (2011). "Feds Arrest 14 ‘Anonymous’ Suspects Over PayPal Attack, Raid Dozens More." Retrieved 15 March, 2012, from http://www.wired.com/threatlevel/2011/07/paypal-hack-arrests/.

Zittrain, J. (2008). The Future of the Internet And How to Stop It New Haven & London, Yale University Press.