亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? the baudy world of the byte bandit-a postmodernist interpreta.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
                            THE BAUDY WORLD OF THE BYTE BANDIT:             A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND                                 Gordon Meyer and Jim Thomas                               Department of Sociology                            Northern Illinois University                                  DeKalb, IL 60115                                   (10 June, 1990)                Forthcoming in In F.  Schmalleger (ed.),  Computers in Criminal          Justice, Bristol (Ind.):  Wyndham Hall.   An earlier version of          this paper was presented at  the American Society of Criminology          annual meetings, Reno (November 9, 1989).   Authors are listed in          alphabetical order.  Address correspondence to Jim Thomas.          We are indebted  to the numerous anonymous  computer underground          participants who provided  information.  Special acknowledgement          goes to Hatchet Molly, Jedi, The Mentor,  Knight Lightning,  and          Taran King.                             THE BAUDY WORLD OF THE BYTE BANDIT:             A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND               Hackers are "nothing more  than high-tech street gangs"               (Federal Prosecutor, Chicago).                Transgression is not immoral. Quite to the contrary, it               reconciles the law with what it forbids; it is the dia-               lectical game of good and evil (Baudrillard, 1987: 81).               There ain't no sin and there ain't no virtue.  There's               just stuff people do.   It's all part of the nice, but               that's as far as any man got a right to say (Steinbeck,               1939:31-32).                The criminalization of "deviant acts" transforms and reduces          broader social meanings to legal ones.  Once a category of behav-          iors has become defined by statute as sanctionably deviant,  the          behaviors so-defined assume  a new set of meanings  that may ob-          scure ones  possessed by those  who engage in  such behaviors.          "Computer deviants" provide one example.               The proliferation of computer  technology has been accompa-          nied by the growth of a computer underground (CU),  often mistak-          enly labeled "hackers," that is  perceived as criminally deviant          by the media, law enforcement officials, and researchers.   Draw-          ing from ethnographic data,  we offer  a cultural rather than a          criminological analysis of the underground by suggesting that the          CU reflects an attempt to recast, re-appropriate, and reconstruct          the power-knowledge relationship that  increasingly dominates the                                         - 1 -            ideology and actions of modern society.  Our data reveal the com-          puter underground as  an invisible community with  a complex and          interconnected cultural lifestyle, an inchoate anti-authoritarian          political consciousness,  and dependent on norms of reciprocity,          sophisticated socialization  rituals,  networks  of information          sharing, and an explicit value system.   We interpret the CU cul-          ture as a challenge to and parody of conventional culture,  as a          playful attempt to reject the seriousness of technocracy,  and as          an ironic substitution of rational  technological control of the          present for an anarchic and playful future.                        Stigmatizing the Computer Underground               The computer underground refers to persons engaged in one or          more of several activities, including pirating, anarchy, hacking,          and phreaking[1].    Because computer  underground participants          freely share information and often are involved collectively in a          single incident,  media definitions invoke the generalized meta-          phors of  "conspiracies" and "criminal rings,"  (e.g.,  Camper,          1989;  Computer Hacker Ring, 1990;  Zablit, 1989), "modem macho"          evil-doers (Bloombecker, 1988),  moral bankruptcy (E.  Schwartz,          1988), "electronic trespassers" (Parker: 1983), "crazy kids dedi-          cated to making mischief" (Sandza, 1984a:  17), "electronic van-          dals" (Bequai:  1987), a new or global "threat" (Markoff, 1990a;          Van,  1989),  saboteurs ("Computer Sabateur," 1988),  monsters          (Stoll, 1989:  323), secret societies of criminals (WMAQ, 1990),          "'malevolent, nasty, evil-doers' who 'fill the screens of amateur          {computer} users with pornography'"  (Minister of Parliament Emma                                         - 2 -            Nicholson, cited in "Civil Liberties," 1990:  27), "varmints" and          "bastards" (Stoll,  1989:  257),  and "high-tech street gangs"          ("Hacker, 18," 1989).  Stoll (cited in J. Schwartz, 1990: 50) has          even compared them to persons who  put razorblades in the sand at          beaches, a bloody, but hardly accurate, analogy.   Most dramatic          is Rosenblatt's (1990:  37) attempt to link hackers to pedophilia          and "snuff films," a ploy clearly designed to inflame rather than          educate.               These images have prompted calls  for community and law en-          forcement vigilance (Conly and McEwen, 1990:  2;  Conly,  1989;          McEwen, 1989).   and for application of the Racketeer Influenced          and Corrupt Organizations (RICO) Act to prosecute and control the          "criminals" (Cooley, 1984),  which have created considerable con-          cern for civil liberties (Markoff, 1990b;  J.  Schwartz, 1990).          Such exaggerated discourse also fails  to distinguish between un-          derground "hobbyists," who may infringe  on legal norms but have          no intention of pillaging,  from  felonious predators,  who use          technology to loot[2].   Such terminology creates a common stock          of public knowledge that formats  interpretations of CU activity          in ways pre-patterned as requiring  social control to protect the          commonweal (e.g., Altheide, 1985).               As Hollinger and Lanza-Kaduce (1988:  119), Kane (1989), and          Pfuhl (1987) observed,  the stigmatization of hackers has emerged          primarily through value-laden media depictions.   When in 1988 a          Cornell University graduate student inadvertently infected an in-          ternational computer network by  planting a self-reproducing "vi-                                         - 3 -            rus," or "rogue program," the news  media followed the story with          considerable detail about  the dangers of computer  abuse (e.g.,          Allman, 1990; Winter, 1988).  Five years earlier, in May of 1983,          a group of hackers known as  "The 414's" received equal media at-          tention when they  broke into the computer system  of the Sloan          Kettering Cancer research center.   Between these dramatic and a-          typical events, the media have dramatized the dangers of computer          renegades,  and media anecdotes  presented during Congressional          legislative debates  to curtail "computer abuse"  dramatized the          "computer hacking problem" (Hollinger  and Lanza-Kaduce,  1988:          107).   Although the accuracy and objectivity of the evidence has          since been challenged (Hollinger and Lanza-Kaduce 1988: 105), the          media continue to format CU activity  by suggesting that any com-          puter-related felony can be attributed to hacking.  Additionally,          media stories are taken from the accounts of police blotters, se-          curity personnel, and apprehended hackers, each of whom have dif-          ferent perspectives and definitions.   This creates a self-rein-          forcing  imagery in  which  extreme  examples and  cursively          circulated data are discretely adduced  to substantiate the claim          of criminality by  those with a vested interest  in creating and          maintaining such definitions.   For  example,  Conly and McEwen          (1990)  list examples of law  enforcement jurisdictions in which          special units to  fight "computer crime," very  broadly defined,          have been created.  These broad  definitions serve to expand the          scope of authority and resources of the units.   Nonetheless, de-          spite criminalization,  there is little  evidence to support the                                         - 4 -            contention that computer hacking has been sufficiently abusive or          pervasive to warrant zealous  prosecution (Michalowski and Pfuhl,          forthcoming).               As an antidote to the  conventional meanings of CU activity          as simply one of deviance,  we shift the social meaning of CU be-          havior from one of stigma to one of culture creation and meaning.          Our work is tentative,  in part  because of the lack of previous          substantive literature and in part  because of the complexity of          the data, which indicate a multiplicity of subcultures within the          CU.  This paper examines two distinct CU subcultures, phreaks and          hackers,  and challenges the Manichean  view that hackers can be          understood simply as profaners of a sacred moral and economic or-          der.                     The Computer Underground and Postmodernism               The computer underground  is a culture of  persons who call          computer bulletin board systems (BBSs,  or just "boards"),  and          share the interests fostered by the BBS.   In conceptualizing the          computer underground as a distinct culture, we draw from Geertz's          (1973: 5) definition of culture as a system of meanings that give          significance to shared  behaviors that must be  interpreted from          the perspective of those engaged in them.  A culture provides not          only the "systems of standards for perceiving, believing,  evalu-          ating, and acting" (Goodenough,  1981:  110),  but includes the          rules and symbols  of interpretation and discourse  for partici-          pants:               In crude relief,  culture can be understood as a set of               solutions devised by a group of people to meet specific               problems  posed by  situations  they  face in  com-                                        - 5 -                 mon. . . This notion of culture as a living, historical               product of group problem solving  allows an approach to               cultural study that is applicable to any group, be it a               society, a neighborhood, a family, a dance band,  or an               organization and its segments  (Van Maanen and Barley,               1985: 33).               Creating and maintaining a culture requires continuous indi-          vidual or group processes of  sustaining an identity through the          coherence gained by a consistent aesthetic point of view, a moral          conception of self,  and a lifestyle that expresses those concep-          tions in one's immediate existence and tastes (Bell, 1976:  36).          These behavioral expressions signify a variety of meanings,  and          as signifiers they reflect a type of code that can be interpreted          semiotically,  or as a sign system amenable to readings indepen-          dent of either participants or of  those imposed by the super-or-          dinate culture:               All aspects of culture possess  a semiotic value,  and               the most  taken-for-granted phenomena can  function as               signs:   as elements in communication systems governed               by semantic rules  and codes which are  not themselves               directly apprehended in experience.   These signs are,               then,  as opaque as the social relations which produce               them and which they re-present (Hebdige, 1982: 13).               It is this symbolic cultural ethos,   by which we mean the          style, world view, and mood (Hebdige,  1979),  that reflects the          postmodernist elements of the CU and separates it from modernism.          Modernist culture  is characterized especially  by rationality,          technological enhancement, deference to centralized control,  and          mass communication.   The emergence  of computer technology has          created dramatic changes in social communication, economic trans-          actions, and information processing and sharing, while simultane-          ously introducing new forms of surveillance, social control,  and                                         - 6 -

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲欧美电影一区二区| 国产精品久久一卡二卡| 91在线丨porny丨国产| 国产一二精品视频| 国产专区综合网| 国产乱理伦片在线观看夜一区| 另类小说综合欧美亚洲| 日本欧美韩国一区三区| 日本系列欧美系列| 麻豆一区二区99久久久久| 国产一区二区女| 成人一区二区三区视频在线观看 | 国产精品国产三级国产普通话蜜臀 | 亚洲欧洲www| 亚洲日本va午夜在线电影| 亚洲人成网站在线| 午夜精品久久久久久久 | 成人午夜精品一区二区三区| 成人免费av在线| 91久久精品午夜一区二区| 91精品久久久久久久91蜜桃| 欧美v国产在线一区二区三区| 久久久久久久久伊人| 亚洲色图制服诱惑 | 亚洲图片另类小说| 亚洲第一综合色| 久久精品国产精品青草| 成人18视频在线播放| 在线电影欧美成精品| 精品国产三级电影在线观看| 国产精品久久久99| 日本中文字幕一区二区视频| 国产精品1区2区| 欧美性淫爽ww久久久久无| 精品久久五月天| 一区二区三区 在线观看视频| 蜜臀av一区二区在线观看| 91香蕉视频在线| 欧美成人官网二区| 亚洲图片自拍偷拍| 成人毛片视频在线观看| 日韩免费福利电影在线观看| 亚洲色欲色欲www| 精品午夜久久福利影院| 91高清视频在线| 久久精品免视看| 日本aⅴ亚洲精品中文乱码| 99re亚洲国产精品| 国产欧美日韩在线视频| 久久精品国产在热久久| 欧美日韩精品一区二区三区蜜桃 | 亚洲午夜久久久久久久久电影网 | 欧美亚洲国产一卡| 欧美韩国日本不卡| 久久99精品久久久久婷婷| 在线观看日韩av先锋影音电影院| 久久精品一区二区三区不卡| 青青草国产成人av片免费| 在线一区二区三区做爰视频网站| 国产精品每日更新| 国产不卡视频一区| 国产亚洲精品aa午夜观看| 久久99精品久久久久婷婷| 91精品国产品国语在线不卡| 亚洲国产成人91porn| 在线免费观看成人短视频| 亚洲色欲色欲www在线观看| 99这里只有久久精品视频| 中文字幕免费不卡| 国产suv精品一区二区6| 国产日韩欧美一区二区三区乱码 | 精品影院一区二区久久久| 欧美日韩一区国产| 亚洲午夜国产一区99re久久| 欧美做爰猛烈大尺度电影无法无天| 中文字幕一区二区三区在线不卡 | xf在线a精品一区二区视频网站| 日本伊人午夜精品| 精品国产亚洲在线| 国产一区二区视频在线播放| 国产婷婷精品av在线| 成人免费视频一区二区| 最新热久久免费视频| 色噜噜久久综合| 亚洲成人免费视频| 日韩欧美在线一区二区三区| 韩国女主播一区| 国产欧美一区二区精品婷婷| av在线免费不卡| 一区二区三区在线免费播放| 欧美色大人视频| 久久精品国产亚洲aⅴ| 国产婷婷一区二区| 在线中文字幕不卡| 青青草精品视频| 中文字幕乱码亚洲精品一区| 在线观看免费视频综合| 日韩电影一二三区| 中文字幕不卡一区| 在线视频综合导航| 国内精品第一页| 中文字幕在线观看一区| 欧美蜜桃一区二区三区| 韩国v欧美v日本v亚洲v| 国产精品久久久久一区| 在线成人小视频| 成人福利视频网站| 五月婷婷综合激情| 国产精品美女久久久久高潮| 制服丝袜日韩国产| 国产福利精品导航| 日本在线观看不卡视频| 成人免费在线播放视频| 欧美成人精品高清在线播放| 91女神在线视频| 狠狠色丁香久久婷婷综合_中| 一二三四社区欧美黄| 国产午夜精品一区二区三区四区| 欧美性淫爽ww久久久久无| 成人免费不卡视频| 韩国精品主播一区二区在线观看| 一区二区三区影院| 亚洲国产精品精华液2区45| 欧美夫妻性生活| 91视视频在线观看入口直接观看www | 成人福利在线看| 久久精品72免费观看| 亚洲一区电影777| 欧美国产日本视频| 欧美精品一区二区三区蜜臀| 欧美美女bb生活片| 在线免费观看一区| 99在线精品观看| 国产91精品露脸国语对白| 久久国产婷婷国产香蕉| 日韩在线一区二区三区| 亚洲制服丝袜一区| 亚洲综合网站在线观看| 国产精品毛片高清在线完整版| 久久亚洲一区二区三区四区| 欧美乱熟臀69xxxxxx| 精品视频全国免费看| 色吧成人激情小说| 91成人免费在线视频| 99视频精品全部免费在线| 成人精品免费视频| 成人黄色电影在线| 91亚洲永久精品| 99热这里都是精品| 91亚洲精华国产精华精华液| 99国产精品99久久久久久| 91色在线porny| 色88888久久久久久影院按摩 | 日本不卡一区二区三区| 午夜精品免费在线观看| 五月天丁香久久| 日韩国产在线一| 久久精品国产免费看久久精品| 久久aⅴ国产欧美74aaa| 国产麻豆午夜三级精品| 高清国产一区二区| 92精品国产成人观看免费| 一本久久精品一区二区| 欧美午夜理伦三级在线观看| 欧美午夜精品一区二区三区| 91精选在线观看| 日韩欧美一区二区视频| 国产亚洲精品久| 亚洲久本草在线中文字幕| 一区二区在线观看免费| 婷婷激情综合网| 麻豆精品久久久| 成人网在线播放| 欧美日韩成人综合| 久久免费偷拍视频| 最新国产成人在线观看| 亚洲成av人综合在线观看| 韩国av一区二区三区四区 | 日韩欧美中文字幕制服| 国产日本一区二区| 亚洲在线一区二区三区| 国产综合色在线视频区| 色猫猫国产区一区二在线视频| 欧美一区二区免费视频| 国产精品乱人伦中文| 日韩二区三区在线观看| zzijzzij亚洲日本少妇熟睡| 欧美主播一区二区三区美女| 久久亚洲一级片| 天堂蜜桃一区二区三区| 成人精品高清在线| 91精品国产综合久久久蜜臀粉嫩| 国产亚洲精品aa| 欧美aⅴ一区二区三区视频| 99久久精品99国产精品| 精品成人在线观看| 亚洲一二三四区| 成人性生交大片免费看在线播放| 67194成人在线观看| 亚洲男女一区二区三区|