亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? the baudy world of the byte bandit-a postmodernist interpreta.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
                            THE BAUDY WORLD OF THE BYTE BANDIT:             A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND                                 Gordon Meyer and Jim Thomas                               Department of Sociology                            Northern Illinois University                                  DeKalb, IL 60115                                   (10 June, 1990)                Forthcoming in In F.  Schmalleger (ed.),  Computers in Criminal          Justice, Bristol (Ind.):  Wyndham Hall.   An earlier version of          this paper was presented at  the American Society of Criminology          annual meetings, Reno (November 9, 1989).   Authors are listed in          alphabetical order.  Address correspondence to Jim Thomas.          We are indebted  to the numerous anonymous  computer underground          participants who provided  information.  Special acknowledgement          goes to Hatchet Molly, Jedi, The Mentor,  Knight Lightning,  and          Taran King.                             THE BAUDY WORLD OF THE BYTE BANDIT:             A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND               Hackers are "nothing more  than high-tech street gangs"               (Federal Prosecutor, Chicago).                Transgression is not immoral. Quite to the contrary, it               reconciles the law with what it forbids; it is the dia-               lectical game of good and evil (Baudrillard, 1987: 81).               There ain't no sin and there ain't no virtue.  There's               just stuff people do.   It's all part of the nice, but               that's as far as any man got a right to say (Steinbeck,               1939:31-32).                The criminalization of "deviant acts" transforms and reduces          broader social meanings to legal ones.  Once a category of behav-          iors has become defined by statute as sanctionably deviant,  the          behaviors so-defined assume  a new set of meanings  that may ob-          scure ones  possessed by those  who engage in  such behaviors.          "Computer deviants" provide one example.               The proliferation of computer  technology has been accompa-          nied by the growth of a computer underground (CU),  often mistak-          enly labeled "hackers," that is  perceived as criminally deviant          by the media, law enforcement officials, and researchers.   Draw-          ing from ethnographic data,  we offer  a cultural rather than a          criminological analysis of the underground by suggesting that the          CU reflects an attempt to recast, re-appropriate, and reconstruct          the power-knowledge relationship that  increasingly dominates the                                         - 1 -            ideology and actions of modern society.  Our data reveal the com-          puter underground as  an invisible community with  a complex and          interconnected cultural lifestyle, an inchoate anti-authoritarian          political consciousness,  and dependent on norms of reciprocity,          sophisticated socialization  rituals,  networks  of information          sharing, and an explicit value system.   We interpret the CU cul-          ture as a challenge to and parody of conventional culture,  as a          playful attempt to reject the seriousness of technocracy,  and as          an ironic substitution of rational  technological control of the          present for an anarchic and playful future.                        Stigmatizing the Computer Underground               The computer underground refers to persons engaged in one or          more of several activities, including pirating, anarchy, hacking,          and phreaking[1].    Because computer  underground participants          freely share information and often are involved collectively in a          single incident,  media definitions invoke the generalized meta-          phors of  "conspiracies" and "criminal rings,"  (e.g.,  Camper,          1989;  Computer Hacker Ring, 1990;  Zablit, 1989), "modem macho"          evil-doers (Bloombecker, 1988),  moral bankruptcy (E.  Schwartz,          1988), "electronic trespassers" (Parker: 1983), "crazy kids dedi-          cated to making mischief" (Sandza, 1984a:  17), "electronic van-          dals" (Bequai:  1987), a new or global "threat" (Markoff, 1990a;          Van,  1989),  saboteurs ("Computer Sabateur," 1988),  monsters          (Stoll, 1989:  323), secret societies of criminals (WMAQ, 1990),          "'malevolent, nasty, evil-doers' who 'fill the screens of amateur          {computer} users with pornography'"  (Minister of Parliament Emma                                         - 2 -            Nicholson, cited in "Civil Liberties," 1990:  27), "varmints" and          "bastards" (Stoll,  1989:  257),  and "high-tech street gangs"          ("Hacker, 18," 1989).  Stoll (cited in J. Schwartz, 1990: 50) has          even compared them to persons who  put razorblades in the sand at          beaches, a bloody, but hardly accurate, analogy.   Most dramatic          is Rosenblatt's (1990:  37) attempt to link hackers to pedophilia          and "snuff films," a ploy clearly designed to inflame rather than          educate.               These images have prompted calls  for community and law en-          forcement vigilance (Conly and McEwen, 1990:  2;  Conly,  1989;          McEwen, 1989).   and for application of the Racketeer Influenced          and Corrupt Organizations (RICO) Act to prosecute and control the          "criminals" (Cooley, 1984),  which have created considerable con-          cern for civil liberties (Markoff, 1990b;  J.  Schwartz, 1990).          Such exaggerated discourse also fails  to distinguish between un-          derground "hobbyists," who may infringe  on legal norms but have          no intention of pillaging,  from  felonious predators,  who use          technology to loot[2].   Such terminology creates a common stock          of public knowledge that formats  interpretations of CU activity          in ways pre-patterned as requiring  social control to protect the          commonweal (e.g., Altheide, 1985).               As Hollinger and Lanza-Kaduce (1988:  119), Kane (1989), and          Pfuhl (1987) observed,  the stigmatization of hackers has emerged          primarily through value-laden media depictions.   When in 1988 a          Cornell University graduate student inadvertently infected an in-          ternational computer network by  planting a self-reproducing "vi-                                         - 3 -            rus," or "rogue program," the news  media followed the story with          considerable detail about  the dangers of computer  abuse (e.g.,          Allman, 1990; Winter, 1988).  Five years earlier, in May of 1983,          a group of hackers known as  "The 414's" received equal media at-          tention when they  broke into the computer system  of the Sloan          Kettering Cancer research center.   Between these dramatic and a-          typical events, the media have dramatized the dangers of computer          renegades,  and media anecdotes  presented during Congressional          legislative debates  to curtail "computer abuse"  dramatized the          "computer hacking problem" (Hollinger  and Lanza-Kaduce,  1988:          107).   Although the accuracy and objectivity of the evidence has          since been challenged (Hollinger and Lanza-Kaduce 1988: 105), the          media continue to format CU activity  by suggesting that any com-          puter-related felony can be attributed to hacking.  Additionally,          media stories are taken from the accounts of police blotters, se-          curity personnel, and apprehended hackers, each of whom have dif-          ferent perspectives and definitions.   This creates a self-rein-          forcing  imagery in  which  extreme  examples and  cursively          circulated data are discretely adduced  to substantiate the claim          of criminality by  those with a vested interest  in creating and          maintaining such definitions.   For  example,  Conly and McEwen          (1990)  list examples of law  enforcement jurisdictions in which          special units to  fight "computer crime," very  broadly defined,          have been created.  These broad  definitions serve to expand the          scope of authority and resources of the units.   Nonetheless, de-          spite criminalization,  there is little  evidence to support the                                         - 4 -            contention that computer hacking has been sufficiently abusive or          pervasive to warrant zealous  prosecution (Michalowski and Pfuhl,          forthcoming).               As an antidote to the  conventional meanings of CU activity          as simply one of deviance,  we shift the social meaning of CU be-          havior from one of stigma to one of culture creation and meaning.          Our work is tentative,  in part  because of the lack of previous          substantive literature and in part  because of the complexity of          the data, which indicate a multiplicity of subcultures within the          CU.  This paper examines two distinct CU subcultures, phreaks and          hackers,  and challenges the Manichean  view that hackers can be          understood simply as profaners of a sacred moral and economic or-          der.                     The Computer Underground and Postmodernism               The computer underground  is a culture of  persons who call          computer bulletin board systems (BBSs,  or just "boards"),  and          share the interests fostered by the BBS.   In conceptualizing the          computer underground as a distinct culture, we draw from Geertz's          (1973: 5) definition of culture as a system of meanings that give          significance to shared  behaviors that must be  interpreted from          the perspective of those engaged in them.  A culture provides not          only the "systems of standards for perceiving, believing,  evalu-          ating, and acting" (Goodenough,  1981:  110),  but includes the          rules and symbols  of interpretation and discourse  for partici-          pants:               In crude relief,  culture can be understood as a set of               solutions devised by a group of people to meet specific               problems  posed by  situations  they  face in  com-                                        - 5 -                 mon. . . This notion of culture as a living, historical               product of group problem solving  allows an approach to               cultural study that is applicable to any group, be it a               society, a neighborhood, a family, a dance band,  or an               organization and its segments  (Van Maanen and Barley,               1985: 33).               Creating and maintaining a culture requires continuous indi-          vidual or group processes of  sustaining an identity through the          coherence gained by a consistent aesthetic point of view, a moral          conception of self,  and a lifestyle that expresses those concep-          tions in one's immediate existence and tastes (Bell, 1976:  36).          These behavioral expressions signify a variety of meanings,  and          as signifiers they reflect a type of code that can be interpreted          semiotically,  or as a sign system amenable to readings indepen-          dent of either participants or of  those imposed by the super-or-          dinate culture:               All aspects of culture possess  a semiotic value,  and               the most  taken-for-granted phenomena can  function as               signs:   as elements in communication systems governed               by semantic rules  and codes which are  not themselves               directly apprehended in experience.   These signs are,               then,  as opaque as the social relations which produce               them and which they re-present (Hebdige, 1982: 13).               It is this symbolic cultural ethos,   by which we mean the          style, world view, and mood (Hebdige,  1979),  that reflects the          postmodernist elements of the CU and separates it from modernism.          Modernist culture  is characterized especially  by rationality,          technological enhancement, deference to centralized control,  and          mass communication.   The emergence  of computer technology has          created dramatic changes in social communication, economic trans-          actions, and information processing and sharing, while simultane-          ously introducing new forms of surveillance, social control,  and                                         - 6 -

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产91精品一区二区麻豆网站| 欧美一区二区三区日韩| 国产精品正在播放| 美腿丝袜亚洲一区| 久久99精品国产麻豆婷婷 | 免费亚洲电影在线| 午夜精品一区二区三区三上悠亚| 一区二区免费视频| 亚洲一二三四在线| 天涯成人国产亚洲精品一区av| 亚洲一区二区在线播放相泽 | 成人性生交大合| 99久久夜色精品国产网站| 91偷拍与自偷拍精品| 在线免费精品视频| 欧美福利视频一区| 精品少妇一区二区三区在线视频| 精品国产乱子伦一区| 久久久久亚洲蜜桃| 亚洲欧美日韩系列| 性久久久久久久久久久久| 久久爱另类一区二区小说| 国产大陆精品国产| 色综合激情五月| 欧美高清dvd| 久久先锋影音av| 亚洲欧美经典视频| 天天av天天翘天天综合网色鬼国产| 亚洲v精品v日韩v欧美v专区| 蜜桃精品视频在线| 成人精品免费视频| 欧美日韩视频在线一区二区| 日韩欧美黄色影院| 中文字幕亚洲综合久久菠萝蜜| 亚洲永久免费av| 蜜臀99久久精品久久久久久软件| 国产激情偷乱视频一区二区三区| 97久久久精品综合88久久| 欧美精品一二三| 国产欧美综合在线观看第十页| 亚洲视频资源在线| 亚洲.国产.中文慕字在线| 国产最新精品精品你懂的| 91蜜桃传媒精品久久久一区二区| 欧美日韩一区高清| 欧美精品一区二区高清在线观看| 国产精品国产精品国产专区不片| 亚洲成av人片在线| 成人中文字幕在线| 4438x亚洲最大成人网| 欧美激情一二三区| 日日摸夜夜添夜夜添精品视频 | 精品国产乱码久久久久久图片| 国产片一区二区三区| 亚洲电影一级片| 成人一区二区视频| 日韩一区国产二区欧美三区| 国产精品美女一区二区在线观看| 亚洲国产欧美一区二区三区丁香婷| 另类成人小视频在线| 色婷婷av一区二区三区大白胸| 久久中文字幕电影| 日韩高清一区二区| 91视视频在线观看入口直接观看www| 日韩欧美国产不卡| 亚洲一区在线看| 99久久伊人网影院| 久久亚洲捆绑美女| 日韩精品电影一区亚洲| 91亚洲精品久久久蜜桃网站| 精品国产免费久久| 丝袜美腿亚洲综合| 欧美视频三区在线播放| 欧美国产一区二区在线观看| 麻豆精品精品国产自在97香蕉| 欧美午夜在线一二页| 亚洲视频资源在线| 懂色av一区二区夜夜嗨| 欧美变态口味重另类| 婷婷丁香久久五月婷婷| 91久久精品午夜一区二区| 国产精品网曝门| 国产麻豆视频精品| 日韩午夜精品视频| 午夜精品成人在线视频| 欧美在线小视频| 亚洲精品高清视频在线观看| 成人中文字幕电影| 国产人成亚洲第一网站在线播放| 精品综合免费视频观看| 日韩一区二区三区观看| 日本在线不卡视频一二三区| 欧美午夜电影网| 亚洲午夜影视影院在线观看| 色噜噜久久综合| 艳妇臀荡乳欲伦亚洲一区| 色老汉一区二区三区| 日韩理论片一区二区| 99re热视频这里只精品| 最近中文字幕一区二区三区| 大白屁股一区二区视频| 国产精品久久免费看| 9人人澡人人爽人人精品| 中文字幕一区二区三区乱码在线 | 欧美写真视频网站| 亚洲一区二区视频在线| 欧美视频在线一区| 午夜精品一区二区三区电影天堂 | 97久久超碰精品国产| 亚洲欧洲精品一区二区三区| 99re66热这里只有精品3直播| 亚洲国产高清在线| 97久久精品人人做人人爽50路 | 成人一级黄色片| 国产精品色哟哟网站| 一道本成人在线| 午夜视频久久久久久| 日韩你懂的在线播放| 国产精品亚洲视频| 综合中文字幕亚洲| 精品视频在线视频| 男人的天堂亚洲一区| 亚洲激情一二三区| 色婷婷精品久久二区二区蜜臂av| 亚洲国产精品久久久久婷婷884 | 国产精品色呦呦| 日本伦理一区二区| 日韩国产精品久久久久久亚洲| 日韩视频在线一区二区| 国产精品一区在线观看乱码| 欧美国产禁国产网站cc| 色94色欧美sute亚洲线路一ni| 亚洲电影一级黄| 精品久久久久99| av在线播放不卡| 午夜av区久久| 久久久久99精品国产片| 色综合久久中文字幕综合网| 日韩av电影一区| 中文字幕国产精品一区二区| 在线观看视频一区| 久久激五月天综合精品| 国产精品不卡一区| 欧美一区二区三区在线观看视频| 国产一区二区看久久| 国产精品第四页| 日韩一级片在线观看| 成人性生交大片免费看视频在线 | 久久精品99国产精品| 国产欧美一区在线| 欧美日韩一区二区三区在线| 国产在线不卡视频| 一区二区三区不卡视频| 26uuu国产电影一区二区| 日本乱人伦一区| 欧美日韩久久不卡| 粉嫩一区二区三区性色av| 性欧美大战久久久久久久久| 国产午夜亚洲精品不卡| 欧美日韩一级二级| 成人三级在线视频| 日本伊人午夜精品| 亚洲女人的天堂| 国产日韩欧美一区二区三区乱码 | 中文字幕一区av| 日韩女优电影在线观看| 在线精品视频免费播放| 国产在线看一区| 三级影片在线观看欧美日韩一区二区 | 欧美三区在线观看| 成人午夜在线视频| 久久激情五月婷婷| 亚洲高清一区二区三区| 国产精品国产精品国产专区不蜜 | 久久嫩草精品久久久精品一| 欧美日韩国产系列| 色老综合老女人久久久| 高清在线成人网| 狠狠色丁香九九婷婷综合五月| 亚洲成人综合视频| 亚洲激情图片小说视频| 国产日韩欧美激情| 三级在线观看一区二区| 亚洲一区二区三区视频在线播放| 国产欧美一区二区精品婷婷| 51午夜精品国产| 欧美日韩在线一区二区| 99vv1com这只有精品| 成人激情校园春色| 国产99久久久精品| 国产一区二区三区观看| 久久国产精品第一页| 免费日韩伦理电影| 日韩精品高清不卡| 天天影视网天天综合色在线播放| 亚洲图片自拍偷拍| 一二三四区精品视频| 一区二区久久久久久| 亚洲精品成a人| 亚洲永久免费av|