亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? the baudy world of the byte bandit-a postmodernist interpreta.txt

?? 1000 HOWTOs for various needs [WINDOWS]
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
                            THE BAUDY WORLD OF THE BYTE BANDIT:             A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND                                 Gordon Meyer and Jim Thomas                               Department of Sociology                            Northern Illinois University                                  DeKalb, IL 60115                                   (10 June, 1990)                Forthcoming in In F.  Schmalleger (ed.),  Computers in Criminal          Justice, Bristol (Ind.):  Wyndham Hall.   An earlier version of          this paper was presented at  the American Society of Criminology          annual meetings, Reno (November 9, 1989).   Authors are listed in          alphabetical order.  Address correspondence to Jim Thomas.          We are indebted  to the numerous anonymous  computer underground          participants who provided  information.  Special acknowledgement          goes to Hatchet Molly, Jedi, The Mentor,  Knight Lightning,  and          Taran King.                             THE BAUDY WORLD OF THE BYTE BANDIT:             A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND               Hackers are "nothing more  than high-tech street gangs"               (Federal Prosecutor, Chicago).                Transgression is not immoral. Quite to the contrary, it               reconciles the law with what it forbids; it is the dia-               lectical game of good and evil (Baudrillard, 1987: 81).               There ain't no sin and there ain't no virtue.  There's               just stuff people do.   It's all part of the nice, but               that's as far as any man got a right to say (Steinbeck,               1939:31-32).                The criminalization of "deviant acts" transforms and reduces          broader social meanings to legal ones.  Once a category of behav-          iors has become defined by statute as sanctionably deviant,  the          behaviors so-defined assume  a new set of meanings  that may ob-          scure ones  possessed by those  who engage in  such behaviors.          "Computer deviants" provide one example.               The proliferation of computer  technology has been accompa-          nied by the growth of a computer underground (CU),  often mistak-          enly labeled "hackers," that is  perceived as criminally deviant          by the media, law enforcement officials, and researchers.   Draw-          ing from ethnographic data,  we offer  a cultural rather than a          criminological analysis of the underground by suggesting that the          CU reflects an attempt to recast, re-appropriate, and reconstruct          the power-knowledge relationship that  increasingly dominates the                                         - 1 -            ideology and actions of modern society.  Our data reveal the com-          puter underground as  an invisible community with  a complex and          interconnected cultural lifestyle, an inchoate anti-authoritarian          political consciousness,  and dependent on norms of reciprocity,          sophisticated socialization  rituals,  networks  of information          sharing, and an explicit value system.   We interpret the CU cul-          ture as a challenge to and parody of conventional culture,  as a          playful attempt to reject the seriousness of technocracy,  and as          an ironic substitution of rational  technological control of the          present for an anarchic and playful future.                        Stigmatizing the Computer Underground               The computer underground refers to persons engaged in one or          more of several activities, including pirating, anarchy, hacking,          and phreaking[1].    Because computer  underground participants          freely share information and often are involved collectively in a          single incident,  media definitions invoke the generalized meta-          phors of  "conspiracies" and "criminal rings,"  (e.g.,  Camper,          1989;  Computer Hacker Ring, 1990;  Zablit, 1989), "modem macho"          evil-doers (Bloombecker, 1988),  moral bankruptcy (E.  Schwartz,          1988), "electronic trespassers" (Parker: 1983), "crazy kids dedi-          cated to making mischief" (Sandza, 1984a:  17), "electronic van-          dals" (Bequai:  1987), a new or global "threat" (Markoff, 1990a;          Van,  1989),  saboteurs ("Computer Sabateur," 1988),  monsters          (Stoll, 1989:  323), secret societies of criminals (WMAQ, 1990),          "'malevolent, nasty, evil-doers' who 'fill the screens of amateur          {computer} users with pornography'"  (Minister of Parliament Emma                                         - 2 -            Nicholson, cited in "Civil Liberties," 1990:  27), "varmints" and          "bastards" (Stoll,  1989:  257),  and "high-tech street gangs"          ("Hacker, 18," 1989).  Stoll (cited in J. Schwartz, 1990: 50) has          even compared them to persons who  put razorblades in the sand at          beaches, a bloody, but hardly accurate, analogy.   Most dramatic          is Rosenblatt's (1990:  37) attempt to link hackers to pedophilia          and "snuff films," a ploy clearly designed to inflame rather than          educate.               These images have prompted calls  for community and law en-          forcement vigilance (Conly and McEwen, 1990:  2;  Conly,  1989;          McEwen, 1989).   and for application of the Racketeer Influenced          and Corrupt Organizations (RICO) Act to prosecute and control the          "criminals" (Cooley, 1984),  which have created considerable con-          cern for civil liberties (Markoff, 1990b;  J.  Schwartz, 1990).          Such exaggerated discourse also fails  to distinguish between un-          derground "hobbyists," who may infringe  on legal norms but have          no intention of pillaging,  from  felonious predators,  who use          technology to loot[2].   Such terminology creates a common stock          of public knowledge that formats  interpretations of CU activity          in ways pre-patterned as requiring  social control to protect the          commonweal (e.g., Altheide, 1985).               As Hollinger and Lanza-Kaduce (1988:  119), Kane (1989), and          Pfuhl (1987) observed,  the stigmatization of hackers has emerged          primarily through value-laden media depictions.   When in 1988 a          Cornell University graduate student inadvertently infected an in-          ternational computer network by  planting a self-reproducing "vi-                                         - 3 -            rus," or "rogue program," the news  media followed the story with          considerable detail about  the dangers of computer  abuse (e.g.,          Allman, 1990; Winter, 1988).  Five years earlier, in May of 1983,          a group of hackers known as  "The 414's" received equal media at-          tention when they  broke into the computer system  of the Sloan          Kettering Cancer research center.   Between these dramatic and a-          typical events, the media have dramatized the dangers of computer          renegades,  and media anecdotes  presented during Congressional          legislative debates  to curtail "computer abuse"  dramatized the          "computer hacking problem" (Hollinger  and Lanza-Kaduce,  1988:          107).   Although the accuracy and objectivity of the evidence has          since been challenged (Hollinger and Lanza-Kaduce 1988: 105), the          media continue to format CU activity  by suggesting that any com-          puter-related felony can be attributed to hacking.  Additionally,          media stories are taken from the accounts of police blotters, se-          curity personnel, and apprehended hackers, each of whom have dif-          ferent perspectives and definitions.   This creates a self-rein-          forcing  imagery in  which  extreme  examples and  cursively          circulated data are discretely adduced  to substantiate the claim          of criminality by  those with a vested interest  in creating and          maintaining such definitions.   For  example,  Conly and McEwen          (1990)  list examples of law  enforcement jurisdictions in which          special units to  fight "computer crime," very  broadly defined,          have been created.  These broad  definitions serve to expand the          scope of authority and resources of the units.   Nonetheless, de-          spite criminalization,  there is little  evidence to support the                                         - 4 -            contention that computer hacking has been sufficiently abusive or          pervasive to warrant zealous  prosecution (Michalowski and Pfuhl,          forthcoming).               As an antidote to the  conventional meanings of CU activity          as simply one of deviance,  we shift the social meaning of CU be-          havior from one of stigma to one of culture creation and meaning.          Our work is tentative,  in part  because of the lack of previous          substantive literature and in part  because of the complexity of          the data, which indicate a multiplicity of subcultures within the          CU.  This paper examines two distinct CU subcultures, phreaks and          hackers,  and challenges the Manichean  view that hackers can be          understood simply as profaners of a sacred moral and economic or-          der.                     The Computer Underground and Postmodernism               The computer underground  is a culture of  persons who call          computer bulletin board systems (BBSs,  or just "boards"),  and          share the interests fostered by the BBS.   In conceptualizing the          computer underground as a distinct culture, we draw from Geertz's          (1973: 5) definition of culture as a system of meanings that give          significance to shared  behaviors that must be  interpreted from          the perspective of those engaged in them.  A culture provides not          only the "systems of standards for perceiving, believing,  evalu-          ating, and acting" (Goodenough,  1981:  110),  but includes the          rules and symbols  of interpretation and discourse  for partici-          pants:               In crude relief,  culture can be understood as a set of               solutions devised by a group of people to meet specific               problems  posed by  situations  they  face in  com-                                        - 5 -                 mon. . . This notion of culture as a living, historical               product of group problem solving  allows an approach to               cultural study that is applicable to any group, be it a               society, a neighborhood, a family, a dance band,  or an               organization and its segments  (Van Maanen and Barley,               1985: 33).               Creating and maintaining a culture requires continuous indi-          vidual or group processes of  sustaining an identity through the          coherence gained by a consistent aesthetic point of view, a moral          conception of self,  and a lifestyle that expresses those concep-          tions in one's immediate existence and tastes (Bell, 1976:  36).          These behavioral expressions signify a variety of meanings,  and          as signifiers they reflect a type of code that can be interpreted          semiotically,  or as a sign system amenable to readings indepen-          dent of either participants or of  those imposed by the super-or-          dinate culture:               All aspects of culture possess  a semiotic value,  and               the most  taken-for-granted phenomena can  function as               signs:   as elements in communication systems governed               by semantic rules  and codes which are  not themselves               directly apprehended in experience.   These signs are,               then,  as opaque as the social relations which produce               them and which they re-present (Hebdige, 1982: 13).               It is this symbolic cultural ethos,   by which we mean the          style, world view, and mood (Hebdige,  1979),  that reflects the          postmodernist elements of the CU and separates it from modernism.          Modernist culture  is characterized especially  by rationality,          technological enhancement, deference to centralized control,  and          mass communication.   The emergence  of computer technology has          created dramatic changes in social communication, economic trans-          actions, and information processing and sharing, while simultane-          ously introducing new forms of surveillance, social control,  and                                         - 6 -

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
一区二区激情小说| 91麻豆产精品久久久久久 | 国产丝袜美腿一区二区三区| 1024国产精品| 精品亚洲成a人| 欧美日韩成人在线| 国产精品国产三级国产专播品爱网 | 亚洲欧美日韩久久精品| 成人av影视在线观看| 欧美日本在线一区| 亚洲日本电影在线| 精品亚洲国内自在自线福利| 欧美色图片你懂的| 亚洲视频你懂的| 国产91丝袜在线18| 欧美成人高清电影在线| 一区二区三区四区不卡视频 | 日本 国产 欧美色综合| 欧美性xxxxxxxx| 亚洲在线成人精品| 色就色 综合激情| 日韩理论电影院| 97久久精品人人爽人人爽蜜臀| 精品国产乱码久久久久久久久 | 亚洲高清免费在线| 色综合久久中文综合久久97| 中文字幕亚洲电影| av在线播放成人| 综合久久久久久| 一本久道中文字幕精品亚洲嫩| 国产亚洲福利社区一区| 成人动漫av在线| 日韩毛片精品高清免费| 成人免费视频播放| 中文字幕中文字幕一区二区| 懂色av一区二区三区蜜臀| 日本一区二区高清| 91精选在线观看| 视频一区二区三区中文字幕| 欧美日韩黄色影视| 五月婷婷另类国产| 日韩欧美国产综合一区 | 国产婷婷色一区二区三区四区| 经典三级一区二区| 国产亚洲一二三区| 99re在线精品| 婷婷六月综合亚洲| 精品国产免费一区二区三区四区| 激情综合亚洲精品| 国产欧美一区二区三区鸳鸯浴| 波多野结衣亚洲一区| 一区二区三区四区中文字幕| 欧美精选午夜久久久乱码6080| 蜜臀av一区二区| 欧美极品xxx| 在线欧美一区二区| 久久精品国产第一区二区三区| 国产女主播在线一区二区| 91免费看`日韩一区二区| 亚洲成年人影院| 久久久精品一品道一区| 在线观看日韩电影| 紧缚奴在线一区二区三区| 亚洲国产经典视频| 欧美日韩一区二区三区在线看| 麻豆视频观看网址久久| 中文字幕欧美一| 在线不卡中文字幕| 国产精品伊人色| 亚洲国产欧美在线| 久久久亚洲精品石原莉奈| 色婷婷精品久久二区二区蜜臂av| 蜜臀av一区二区在线免费观看 | 91视频国产资源| 久久av中文字幕片| 亚洲日穴在线视频| 欧美成人精精品一区二区频| 91网站最新网址| 狠狠色综合播放一区二区| 亚洲综合另类小说| 国产欧美一区二区三区沐欲 | 精品裸体舞一区二区三区| 91网站最新地址| 久久99精品久久只有精品| 亚洲综合激情另类小说区| 国产亚洲一本大道中文在线| 欧美精品亚洲一区二区在线播放| 不卡一区二区三区四区| 国产自产视频一区二区三区| 丝袜亚洲另类丝袜在线| 亚洲精品高清在线| 国产精品久久免费看| 久久蜜桃av一区二区天堂| 欧美肥妇free| 欧美在线播放高清精品| 成人精品国产免费网站| 狠狠色狠狠色综合系列| 日韩成人伦理电影在线观看| 亚洲一线二线三线久久久| 亚洲婷婷综合久久一本伊一区| 欧美韩国一区二区| 久久精品日产第一区二区三区高清版| 在线观看91av| 这里只有精品视频在线观看| 欧美日韩专区在线| 欧美三级午夜理伦三级中视频| 91久久香蕉国产日韩欧美9色| 成人视屏免费看| 成人免费视频caoporn| 国产一区二区福利视频| 国产一区在线视频| 狠狠色丁香婷婷综合| 久久黄色级2电影| 久久99国产精品免费| 精品中文字幕一区二区| 国产一区二区三区黄视频| 国产一区二区视频在线| 国产成人小视频| 成人午夜在线视频| 99精品桃花视频在线观看| 一道本成人在线| 欧美日韩在线播| 日韩一区二区三区四区五区六区| 日韩你懂的在线观看| 久久久久久久av麻豆果冻| 国产欧美精品一区| 中文字幕av一区二区三区| 亚洲免费av在线| 偷偷要91色婷婷| 久久精品免费观看| 国产成人无遮挡在线视频| av电影一区二区| 欧美午夜一区二区三区| 日韩欧美电影一二三| 久久精品视频一区| 亚洲男同性视频| 人人狠狠综合久久亚洲| 国产91精品一区二区麻豆亚洲| 成人黄色网址在线观看| 欧美日韩国产综合一区二区三区 | 国产精品剧情在线亚洲| 亚洲国产日韩精品| 精品无人码麻豆乱码1区2区| 9久草视频在线视频精品| 91精品欧美综合在线观看最新| 欧美大片一区二区| 亚洲女同女同女同女同女同69| 日韩主播视频在线| 成人av电影免费在线播放| 91精品国产综合久久蜜臀| 中文字幕av资源一区| 五月婷婷另类国产| 成人在线综合网站| 3atv一区二区三区| 亚洲欧美怡红院| 久久精品久久精品| 91成人网在线| 久久免费电影网| 视频精品一区二区| av电影在线不卡| 久久午夜羞羞影院免费观看| 亚洲美女免费在线| 国产91在线看| 日韩视频永久免费| 亚洲国产精品久久不卡毛片 | 日韩一级欧美一级| 亚洲美女电影在线| 成人中文字幕在线| 欧美电影免费观看高清完整版在线观看 | 亚洲一区二区精品久久av| 国产不卡免费视频| 日韩视频一区二区在线观看| 一区二区不卡在线播放 | 久久婷婷色综合| 石原莉奈在线亚洲三区| 色94色欧美sute亚洲线路二| 国产亚洲美州欧州综合国| 日韩av在线播放中文字幕| 一本大道综合伊人精品热热| 国产精品国产三级国产普通话三级| 久久成人免费电影| 日韩午夜激情免费电影| 亚洲丶国产丶欧美一区二区三区| 99久久精品国产麻豆演员表| 中文字幕av免费专区久久| 国产精品一区2区| 久久精品视频免费| 国产精品亚洲专一区二区三区| 日韩丝袜美女视频| 麻豆国产精品官网| 欧美tk—视频vk| 国产综合色产在线精品| 久久综合视频网| 国模一区二区三区白浆| 久久久另类综合| 盗摄精品av一区二区三区| 国产欧美一区二区精品婷婷| 国产高清不卡一区二区| 中文在线一区二区| 不卡av在线免费观看|