亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? the baudy world of the byte bandit-a postmodernist interpreta.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
                            THE BAUDY WORLD OF THE BYTE BANDIT:             A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND                                 Gordon Meyer and Jim Thomas                               Department of Sociology                            Northern Illinois University                                  DeKalb, IL 60115                                   (10 June, 1990)                Forthcoming in In F.  Schmalleger (ed.),  Computers in Criminal          Justice, Bristol (Ind.):  Wyndham Hall.   An earlier version of          this paper was presented at  the American Society of Criminology          annual meetings, Reno (November 9, 1989).   Authors are listed in          alphabetical order.  Address correspondence to Jim Thomas.          We are indebted  to the numerous anonymous  computer underground          participants who provided  information.  Special acknowledgement          goes to Hatchet Molly, Jedi, The Mentor,  Knight Lightning,  and          Taran King.                             THE BAUDY WORLD OF THE BYTE BANDIT:             A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND               Hackers are "nothing more  than high-tech street gangs"               (Federal Prosecutor, Chicago).                Transgression is not immoral. Quite to the contrary, it               reconciles the law with what it forbids; it is the dia-               lectical game of good and evil (Baudrillard, 1987: 81).               There ain't no sin and there ain't no virtue.  There's               just stuff people do.   It's all part of the nice, but               that's as far as any man got a right to say (Steinbeck,               1939:31-32).                The criminalization of "deviant acts" transforms and reduces          broader social meanings to legal ones.  Once a category of behav-          iors has become defined by statute as sanctionably deviant,  the          behaviors so-defined assume  a new set of meanings  that may ob-          scure ones  possessed by those  who engage in  such behaviors.          "Computer deviants" provide one example.               The proliferation of computer  technology has been accompa-          nied by the growth of a computer underground (CU),  often mistak-          enly labeled "hackers," that is  perceived as criminally deviant          by the media, law enforcement officials, and researchers.   Draw-          ing from ethnographic data,  we offer  a cultural rather than a          criminological analysis of the underground by suggesting that the          CU reflects an attempt to recast, re-appropriate, and reconstruct          the power-knowledge relationship that  increasingly dominates the                                         - 1 -            ideology and actions of modern society.  Our data reveal the com-          puter underground as  an invisible community with  a complex and          interconnected cultural lifestyle, an inchoate anti-authoritarian          political consciousness,  and dependent on norms of reciprocity,          sophisticated socialization  rituals,  networks  of information          sharing, and an explicit value system.   We interpret the CU cul-          ture as a challenge to and parody of conventional culture,  as a          playful attempt to reject the seriousness of technocracy,  and as          an ironic substitution of rational  technological control of the          present for an anarchic and playful future.                        Stigmatizing the Computer Underground               The computer underground refers to persons engaged in one or          more of several activities, including pirating, anarchy, hacking,          and phreaking[1].    Because computer  underground participants          freely share information and often are involved collectively in a          single incident,  media definitions invoke the generalized meta-          phors of  "conspiracies" and "criminal rings,"  (e.g.,  Camper,          1989;  Computer Hacker Ring, 1990;  Zablit, 1989), "modem macho"          evil-doers (Bloombecker, 1988),  moral bankruptcy (E.  Schwartz,          1988), "electronic trespassers" (Parker: 1983), "crazy kids dedi-          cated to making mischief" (Sandza, 1984a:  17), "electronic van-          dals" (Bequai:  1987), a new or global "threat" (Markoff, 1990a;          Van,  1989),  saboteurs ("Computer Sabateur," 1988),  monsters          (Stoll, 1989:  323), secret societies of criminals (WMAQ, 1990),          "'malevolent, nasty, evil-doers' who 'fill the screens of amateur          {computer} users with pornography'"  (Minister of Parliament Emma                                         - 2 -            Nicholson, cited in "Civil Liberties," 1990:  27), "varmints" and          "bastards" (Stoll,  1989:  257),  and "high-tech street gangs"          ("Hacker, 18," 1989).  Stoll (cited in J. Schwartz, 1990: 50) has          even compared them to persons who  put razorblades in the sand at          beaches, a bloody, but hardly accurate, analogy.   Most dramatic          is Rosenblatt's (1990:  37) attempt to link hackers to pedophilia          and "snuff films," a ploy clearly designed to inflame rather than          educate.               These images have prompted calls  for community and law en-          forcement vigilance (Conly and McEwen, 1990:  2;  Conly,  1989;          McEwen, 1989).   and for application of the Racketeer Influenced          and Corrupt Organizations (RICO) Act to prosecute and control the          "criminals" (Cooley, 1984),  which have created considerable con-          cern for civil liberties (Markoff, 1990b;  J.  Schwartz, 1990).          Such exaggerated discourse also fails  to distinguish between un-          derground "hobbyists," who may infringe  on legal norms but have          no intention of pillaging,  from  felonious predators,  who use          technology to loot[2].   Such terminology creates a common stock          of public knowledge that formats  interpretations of CU activity          in ways pre-patterned as requiring  social control to protect the          commonweal (e.g., Altheide, 1985).               As Hollinger and Lanza-Kaduce (1988:  119), Kane (1989), and          Pfuhl (1987) observed,  the stigmatization of hackers has emerged          primarily through value-laden media depictions.   When in 1988 a          Cornell University graduate student inadvertently infected an in-          ternational computer network by  planting a self-reproducing "vi-                                         - 3 -            rus," or "rogue program," the news  media followed the story with          considerable detail about  the dangers of computer  abuse (e.g.,          Allman, 1990; Winter, 1988).  Five years earlier, in May of 1983,          a group of hackers known as  "The 414's" received equal media at-          tention when they  broke into the computer system  of the Sloan          Kettering Cancer research center.   Between these dramatic and a-          typical events, the media have dramatized the dangers of computer          renegades,  and media anecdotes  presented during Congressional          legislative debates  to curtail "computer abuse"  dramatized the          "computer hacking problem" (Hollinger  and Lanza-Kaduce,  1988:          107).   Although the accuracy and objectivity of the evidence has          since been challenged (Hollinger and Lanza-Kaduce 1988: 105), the          media continue to format CU activity  by suggesting that any com-          puter-related felony can be attributed to hacking.  Additionally,          media stories are taken from the accounts of police blotters, se-          curity personnel, and apprehended hackers, each of whom have dif-          ferent perspectives and definitions.   This creates a self-rein-          forcing  imagery in  which  extreme  examples and  cursively          circulated data are discretely adduced  to substantiate the claim          of criminality by  those with a vested interest  in creating and          maintaining such definitions.   For  example,  Conly and McEwen          (1990)  list examples of law  enforcement jurisdictions in which          special units to  fight "computer crime," very  broadly defined,          have been created.  These broad  definitions serve to expand the          scope of authority and resources of the units.   Nonetheless, de-          spite criminalization,  there is little  evidence to support the                                         - 4 -            contention that computer hacking has been sufficiently abusive or          pervasive to warrant zealous  prosecution (Michalowski and Pfuhl,          forthcoming).               As an antidote to the  conventional meanings of CU activity          as simply one of deviance,  we shift the social meaning of CU be-          havior from one of stigma to one of culture creation and meaning.          Our work is tentative,  in part  because of the lack of previous          substantive literature and in part  because of the complexity of          the data, which indicate a multiplicity of subcultures within the          CU.  This paper examines two distinct CU subcultures, phreaks and          hackers,  and challenges the Manichean  view that hackers can be          understood simply as profaners of a sacred moral and economic or-          der.                     The Computer Underground and Postmodernism               The computer underground  is a culture of  persons who call          computer bulletin board systems (BBSs,  or just "boards"),  and          share the interests fostered by the BBS.   In conceptualizing the          computer underground as a distinct culture, we draw from Geertz's          (1973: 5) definition of culture as a system of meanings that give          significance to shared  behaviors that must be  interpreted from          the perspective of those engaged in them.  A culture provides not          only the "systems of standards for perceiving, believing,  evalu-          ating, and acting" (Goodenough,  1981:  110),  but includes the          rules and symbols  of interpretation and discourse  for partici-          pants:               In crude relief,  culture can be understood as a set of               solutions devised by a group of people to meet specific               problems  posed by  situations  they  face in  com-                                        - 5 -                 mon. . . This notion of culture as a living, historical               product of group problem solving  allows an approach to               cultural study that is applicable to any group, be it a               society, a neighborhood, a family, a dance band,  or an               organization and its segments  (Van Maanen and Barley,               1985: 33).               Creating and maintaining a culture requires continuous indi-          vidual or group processes of  sustaining an identity through the          coherence gained by a consistent aesthetic point of view, a moral          conception of self,  and a lifestyle that expresses those concep-          tions in one's immediate existence and tastes (Bell, 1976:  36).          These behavioral expressions signify a variety of meanings,  and          as signifiers they reflect a type of code that can be interpreted          semiotically,  or as a sign system amenable to readings indepen-          dent of either participants or of  those imposed by the super-or-          dinate culture:               All aspects of culture possess  a semiotic value,  and               the most  taken-for-granted phenomena can  function as               signs:   as elements in communication systems governed               by semantic rules  and codes which are  not themselves               directly apprehended in experience.   These signs are,               then,  as opaque as the social relations which produce               them and which they re-present (Hebdige, 1982: 13).               It is this symbolic cultural ethos,   by which we mean the          style, world view, and mood (Hebdige,  1979),  that reflects the          postmodernist elements of the CU and separates it from modernism.          Modernist culture  is characterized especially  by rationality,          technological enhancement, deference to centralized control,  and          mass communication.   The emergence  of computer technology has          created dramatic changes in social communication, economic trans-          actions, and information processing and sharing, while simultane-          ously introducing new forms of surveillance, social control,  and                                         - 6 -

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
99视频有精品| 欧美精品1区2区3区| 欧美日韩色综合| 国产亚洲一二三区| 一区二区久久久久| 风间由美一区二区三区在线观看 | 欧美一区二区在线免费观看| 中文字幕欧美国产| 美女国产一区二区| 欧美主播一区二区三区美女| 中文字幕乱码日本亚洲一区二区 | 白白色 亚洲乱淫| 国产精品福利一区| 久久99日本精品| 欧美日韩一区不卡| 亚洲品质自拍视频网站| 国产麻豆精品在线观看| 欧美精品久久99| 亚洲成人tv网| 欧美日韩午夜影院| 亚洲一区二区三区视频在线播放| 粉嫩av一区二区三区| 精品少妇一区二区三区视频免付费 | 欧美日韩五月天| 一区二区三区在线看| 成人av电影在线观看| 久久九九影视网| 国产精品主播直播| 欧美日韩精品电影| 亚洲免费观看高清完整版在线观看 | 国产xxx精品视频大全| 日韩免费高清电影| 蜜臀99久久精品久久久久久软件| 在线播放亚洲一区| 美女免费视频一区二区| 日韩精品一区二区三区四区视频| 奇米影视一区二区三区| 日韩午夜激情免费电影| 久久丁香综合五月国产三级网站| 欧美一卡二卡在线观看| 男人的j进女人的j一区| 日韩美一区二区三区| 久久99精品国产麻豆婷婷 | 国产在线精品国自产拍免费| 精品欧美一区二区在线观看| 久久国产精品露脸对白| 国产片一区二区三区| 亚洲男人的天堂av| 久久久亚洲精品石原莉奈| 免费视频最近日韩| 日韩精品在线一区二区| 美女网站视频久久| 久久蜜桃一区二区| www.视频一区| 午夜精品久久久久影视| 欧美大肚乱孕交hd孕妇| 国产v日产∨综合v精品视频| 中文字幕一区二| 欧美日韩中文国产| 老司机免费视频一区二区三区| 日本一区二区免费在线观看视频| 国产在线精品一区二区| 中文字幕日本不卡| 制服丝袜av成人在线看| 成人天堂资源www在线| 亚洲免费高清视频在线| 欧美一级生活片| 不卡一区二区在线| 日本欧美久久久久免费播放网| 日韩丝袜情趣美女图片| 成人黄页在线观看| 免费在线观看一区二区三区| 欧美国产视频在线| 欧美日韩一本到| 丁香六月综合激情| 日韩激情一区二区| 亚洲欧洲av一区二区三区久久| 日本一区二区免费在线观看视频 | 国内精品伊人久久久久影院对白| 国产精品久久看| 538prom精品视频线放| 成人综合婷婷国产精品久久免费| 亚洲影视在线播放| 国产女人18水真多18精品一级做| 欧美日韩在线电影| 国产91精品精华液一区二区三区| 日日摸夜夜添夜夜添精品视频 | 青青草原综合久久大伊人精品 | 91高清在线观看| 国产在线观看一区二区| 丝袜美腿一区二区三区| 成人免费一区二区三区在线观看| 日韩免费高清av| 欧美日韩国产一级二级| 97精品久久久午夜一区二区三区 | 亚洲成人av一区二区三区| 一区视频在线播放| 国产日韩欧美麻豆| 日韩欧美亚洲国产另类| 91久久精品日日躁夜夜躁欧美| 高清不卡一区二区| 激情偷乱视频一区二区三区| 天堂va蜜桃一区二区三区漫画版| 亚洲乱码精品一二三四区日韩在线| 久久九九国产精品| 亚洲精品一区二区三区在线观看| 欧美精品v日韩精品v韩国精品v| 91麻豆swag| 99久久精品免费看国产免费软件| 成人爱爱电影网址| 国产成人精品免费| 成人深夜福利app| 国产成人高清视频| 成人sese在线| 91免费小视频| 在线一区二区三区四区| 欧美亚洲综合色| 欧美日韩一区精品| 3atv一区二区三区| 欧美一区二区三区免费视频| 制服丝袜亚洲色图| 欧美一级免费观看| 精品国产成人在线影院| 亚洲精品一区二区三区99| 26uuu精品一区二区| 国产日产精品一区| 日韩理论片一区二区| 一区二区三区四区不卡在线| 亚洲一区在线电影| 日韩av不卡在线观看| 九九久久精品视频| 成人丝袜视频网| 色妹子一区二区| 欧美一区二区三区视频在线观看| 欧美电影免费观看高清完整版在| 久久久精品天堂| 国产精品国产三级国产aⅴ入口 | 国产一区福利在线| 欧美性猛交xxxxxxxx| 欧美日韩精品高清| 久久一夜天堂av一区二区三区 | 91丨九色丨国产丨porny| 欧美视频在线不卡| 欧美v亚洲v综合ⅴ国产v| 韩国精品免费视频| 亚洲一区二区欧美日韩| 亚洲123区在线观看| 日韩黄色免费网站| 国产成人精品免费看| 91丨porny丨首页| 欧美一区欧美二区| 国产精品久久久久一区二区三区共 | 国产精品麻豆视频| 亚洲资源中文字幕| 国产一区二区久久| 91福利在线观看| 26uuu久久综合| 一区二区在线电影| 国产精品一区二区三区四区| 91麻豆高清视频| 久久夜色精品国产欧美乱极品| 亚洲美女一区二区三区| 精品一区二区av| 欧美三电影在线| 国产欧美在线观看一区| 石原莉奈在线亚洲二区| av中文字幕一区| 一区二区三区国产精品| 精品写真视频在线观看| 中文字幕一区三区| 99久久精品免费| 欧美不卡视频一区| 首页亚洲欧美制服丝腿| 91小视频免费观看| 国产日韩精品久久久| 国产一区在线观看麻豆| 欧美成人官网二区| 老司机精品视频导航| 欧美精品乱码久久久久久| 日日夜夜精品视频天天综合网| 日韩视频一区二区| 91精品久久久久久蜜臀| 亚洲激情图片小说视频| 国产九色sp调教91| 精品国产自在久精品国产| 亚洲第一激情av| 在线免费观看视频一区| 成人欧美一区二区三区视频网页| 国产精品一区久久久久| wwww国产精品欧美| 久久99精品国产麻豆不卡| 欧美精选午夜久久久乱码6080| 亚洲图片有声小说| 精品视频一区二区三区免费| 亚洲黄网站在线观看| 色综合久久久久久久久| 亚洲欧美另类综合偷拍| 色狠狠一区二区| 亚洲va欧美va天堂v国产综合| 欧美色网一区二区|