{"_id":"7XPHASpFMeaHLuZrH","bibbaseid":"ccc-hackerethikwassinddieethischengrundstzedeshackensmotivationundgrenzen-1998","downloads":0,"creationDate":"2017-12-10T11:20:55.275Z","title":"Hackerethik. Was sind die ethischen Grundsätze des Hackens -- Motivation und Grenzen","author_short":["CCC"],"year":1998,"bibtype":"misc","biburl":"http://ddi.uni-wuppertal.de/forschung/Komplett.bib","bibdata":{"bibtype":"misc","type":"misc","author":[{"firstnames":[],"propositions":[],"lastnames":["CCC"],"suffixes":[]}],"title":"Hackerethik. Was sind die ethischen Grundsätze des Hackens -- Motivation und Grenzen","year":"1998","note":"CCC -- Chaos Computer Club e.\\,V.","url":"http://www.ccc.de/hackerethics","urldate":"2016-05-27","bibtex":"@misc{CCC1998,\n author = {{CCC}},\n title = {{Hackerethik. Was sind die ethischen Grunds{\\\"a}tze\n des Hackens -- Motivation und Grenzen}},\n year = 1998,\n note = {CCC -- Chaos Computer Club e.\\,V.},\n url={http://www.ccc.de/hackerethics},\n urldate={2016-05-27},\n}\n\n","author_short":["CCC"],"key":"CCC1998","id":"CCC1998","bibbaseid":"ccc-hackerethikwassinddieethischengrundstzedeshackensmotivationundgrenzen-1998","role":"author","urls":{"Paper":"http://www.ccc.de/hackerethics"},"downloads":0,"html":""},"search_terms":["hackerethik","sind","die","ethischen","grunds","tze","des","hackens","motivation","und","grenzen","ccc"],"keywords":[],"authorIDs":[],"dataSources":["6BepyHGwnjChmJuia"]}