898 lines
41 KiB
Plaintext
898 lines
41 KiB
Plaintext
|
||
|
||
Computer underground Digest Thu Aug 26 1993 Volume 5 : Issue 66
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Ediot: Etaoin Shrdlu, III
|
||
|
||
CONTENTS, #5.66 (Aug 26 1993)
|
||
File 1--SPECIAL ISSUES ON BIBLIOS AND RESOURCES
|
||
File 2--Computerization & Controversy (Biblio Resource)
|
||
File 3--40Hex is now a print magazine
|
||
File 4--"In a Different Format" (Review of gender/comp thesis)
|
||
File 5--"Smoking Dope on IRC--Play/Performance in Cyberspace"
|
||
File 6--Classifying Grad Theses & Dissertations as "private?"
|
||
File 7-- O'Reilly Internet Information Service
|
||
File 8--"The Internet Letter"--Internet's First Commercial Digest
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Thu, 26 Aug 1993 23:12:45 CDT
|
||
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
Subject: File 1--SPECIAL ISSUES ON BIBLIOS AND RESOURCES
|
||
|
||
CuD has been a bit remiss this year in running bibliographic items and
|
||
research-related resources for scholars and others studying
|
||
Techno/computer-culture. Over the next two weeks, we will run several
|
||
special issues, beginning with this one, listing bibliographic items
|
||
and summarizing resources that might be of interest to researchers. We
|
||
will try to keep the bulk of the items confined to the special issues
|
||
so that those who are not interested in such things can delete the
|
||
entire issue.
|
||
|
||
As some know, CuD also tries to keep track of student theses and
|
||
dissertations related to computer culture. If you know of grad student
|
||
works broadly related to computer culture, please let us know so that
|
||
we can add them to our files and, on occasion, put folks in contact
|
||
with each other. We're also interested in receiving copies of
|
||
completes works (articles, conference papers, conference transcripts)
|
||
that we can place in the ftp archives.
|
||
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 14 Aug 1993 15:17:11 -0700
|
||
From: Rob Kling <kling@ICS.UCI.EDU>
|
||
Subject: File 2--Computerization & Controversy (Biblio Resource)
|
||
|
||
Computerization and Controversy:
|
||
Value Conflicts and Social Choices
|
||
|
||
Charles Dunlop and Rob Kling (Editors)
|
||
Univ. of Michigan - Flint Univ. of California - Irvine
|
||
|
||
Many students, professionals, managers, and laymen are hungry for
|
||
honest, probing discussions of the opportunities and problems of
|
||
computerization. This anthology introduces some of the major social
|
||
controversies about the computerization of society. It highlights some
|
||
of the key value conflicts and social choices about computerization.
|
||
It helps readers recognize the social pro-cesses that drive and shape
|
||
computerization, and to understand the paradoxes and ironies of
|
||
computerization
|
||
|
||
Some of the controversies about computerization covered in this
|
||
collection include:
|
||
* the appropriateness of utopian and anti-utopian scenarios
|
||
for understanding the future
|
||
* whether computerization demonstrably improves the
|
||
productivity of organizations
|
||
* how computerization transforms work
|
||
* how computerized systems can be designed with social
|
||
principles in view
|
||
* whether electronic mail facilitates the formation of new
|
||
communities or undermines intimate interaction
|
||
* whether computerization is likely to reduce privacy and
|
||
personal freedom
|
||
* the risks raised by computerized systems in health care
|
||
* the ethical issues when computer science researchers accept
|
||
military funding
|
||
* the extent to which organizations, rather than "hackers,"
|
||
are significant perpetrators of computer abuse
|
||
|
||
The authors include Paul Attewell, Carl Barus, Wendell Berry, James Beninger, John Bennett*, Alan Borning, Niels Bjorn-Anderson*, Chris
|
||
Bullen*, Roger Clarke, Peter Denning, Pelle Ehn, Edward Feigenbaum, Linda Garcia, Suzanne Iacono, Jon Jacky*, Rob Kling, Kenneth
|
||
Kraemer*, John Ladd, Kenneth Laudon, Pamela McCorduck, Jan Mouritsen, David Parnas, Judith Perrolle*, James Rule, John Sculley, John
|
||
Shattuck, Brian Smith, Clifford Stoll, Lindsy Van Gelder, Fred Weingarten, Joseph Weizenbaum, and Terry Winograd.
|
||
(*'d authors have contributed new essays for the book.)
|
||
|
||
Each of the seven sections opens with a 20 page analytical essay
|
||
which identifies major controversies and places the articles in
|
||
the context of key questions and debates. These essays also point
|
||
the reader to recent additional research and debate about the
|
||
controversies.
|
||
|
||
Published by Academic Press (Boston). 758 pp. 1991. $39.95
|
||
(North America)
|
||
|
||
ISBN: 0-12-224356-0 Phone: 1-800-321-5068 Fax: 1-800-235-0256
|
||
|
||
See Below for Ordering Information
|
||
|
||
|
||
8/18/91
|
||
|
||
To Order
|
||
Computerization and Controversy:
|
||
Value Conflicts and Social Choices
|
||
by Charles Dunlop and Rob Kling (Editors)
|
||
|
||
In North America
|
||
|
||
Individuals may purchase copies directly from Academic Press for
|
||
$39.95 + tax and shipping by calling 1-800-321-5068, faxing 1-800-235-0256
|
||
or by writing to:
|
||
|
||
Academic Press Ordering
|
||
Academic Press Warehouse
|
||
Order Dept.
|
||
465 S. Lincoln
|
||
Troy, Missouri 63379
|
||
|
||
Faculty who offer courses about social issues in computing may order
|
||
examination copies from Academic Press. Write on university letterhead
|
||
or enclose a business card, and include the following information
|
||
about your course: class name and number, department, # of students,
|
||
books used in the past, adoption deadline. Send your requests for
|
||
examination copies to:
|
||
|
||
Amy Yodannis
|
||
College and Commercial Sales Supervisor
|
||
Academic Press
|
||
1250 Sixth Avenue
|
||
San Diego, CA 92101
|
||
Tel: 619-699-6547 Fax: 619-699-6715
|
||
|
||
|
||
Outside North America
|
||
|
||
Please contact your local Academic Press/Harcourt Brace Jovanovich office,
|
||
including:
|
||
|
||
Harcourt Brace Jovanovich, Ltd (Western Europe and UK)
|
||
24-28 Oval Rd.
|
||
London NW1 7DX U.K.
|
||
Telephone: 44-71-267-4466 Fax: 44-71-482-2293
|
||
Telex: 25775 ACPRESS G Cable: ACADINC LONDON NW1
|
||
|
||
Harcourt Brace Jovanovich Group Pty, Ltd
|
||
(Australia/New Zealand)
|
||
Locked bag 16
|
||
Marrickville, NSW 2204 Australia
|
||
Telephone: (01) 517-8999 Fax: (02) 517-2249
|
||
|
||
Harcourt Brace Jovanovich Japan Inc.
|
||
Ichibancho Central Bldg
|
||
22-1 Ichibancho,
|
||
Chiyoda Ku, Tokyo 102 Japan
|
||
|
||
------------------------------
|
||
|
||
Subject: File 3--40Hex is now a print magazine
|
||
From: fortyhex (geoff heap)
|
||
Date: Mon, 16 Aug 93 17:19:02 EDT
|
||
|
||
40Hex, the world's most popular underground virus magazine is now
|
||
available in two versions -- the familiar online magazine and a new
|
||
printed magazine.
|
||
|
||
In the past two and a half years, 40Hex has become the most popular
|
||
virus magazine in the underground. The new printed magazine (dubbed
|
||
40Hex Hardcopy) is intended for anyone who wishes to learn as much as
|
||
they can about computer viruses -- from the source, the virus writers.
|
||
|
||
Each issue will contain --
|
||
|
||
o A complete virus disassembly, fully commented in the 40Hex
|
||
tradition,
|
||
|
||
o Detailed programming articles, intended for those fluent in
|
||
assembly,
|
||
|
||
o Introductory articles intended to help those on all levels of
|
||
ability, and
|
||
|
||
o Interviews with virus writers and virus researchers.
|
||
|
||
Also included is an editorial column, which will provide a forum
|
||
for discussions about any virus related issue. Submissions from both
|
||
sides of the argument are welcome, and will be given an equal voice.
|
||
|
||
|
||
Subscriptions --
|
||
|
||
The price for 40Hex Hardcopy is $35 per year for individuals, $50 per
|
||
year for corporations. The magazine is bimonthly (six issues per year).
|
||
|
||
The online magazine is available free of charge from many privately
|
||
operated BBSs. You may receive a disk with the latest issue from us for
|
||
$5. Please send a note specifying whether you would like a 5 1/4 or a 3
|
||
1/2 inch disk.
|
||
|
||
|
||
Correspondence --
|
||
|
||
Subscription requests should be addressed to
|
||
Subscriptions
|
||
40Hex Magazine
|
||
PO Box 252
|
||
New City, NY, 10956
|
||
|
||
Article submissions should be addressed to
|
||
Articles
|
||
40Hex Magazine
|
||
PO Box 252
|
||
New City, NY, 10956
|
||
|
||
Letters to the editors should be addressed to
|
||
The Editors
|
||
40Hex Magazine
|
||
PO Box 252
|
||
New City, NY, 10956
|
||
|
||
if you have access to internet E-Mail, you can send a note to
|
||
fortyhex@mindvox.phantom.com
|
||
|
||
|
||
note: manuscripts will not be returned to the sender unless they are
|
||
accompanied by postage. All submissions must be marked "manuscript
|
||
submitted for publication."
|
||
|
||
|
||
The online magazine will still be published, and will remain
|
||
separate from the new hardcopy magazine with no article overlap.
|
||
|
||
|
||
+++
|
||
|
||
Leni Niles
|
||
Co-Editor, 40Hex Hardcopy
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 22 Aug 1993 00:58:08 -0400 (EDT)
|
||
From: sabina@CNS.NYU.EDU(sabina)
|
||
Subject: File 4--"In a Different Format" (Review of gender/comp thesis)
|
||
|
||
Review of IN A DIFFERENT FORMAT: CONNECTING WOMEN, COMPUTERS, AND
|
||
EDUCATION USING GILLIGAN'S FRAMEWORK
|
||
(Author: Joan Carmeichael; A Thesis in the Department of
|
||
Educatinal Studies, Concordia University, Montreal, Quebec,
|
||
Canada, January, 1991.
|
||
Reviewed by Sabina Wolfson, New York University
|
||
|
||
In reference to women's different voice, Ada
|
||
Lovelace draws on woman's experience and woman's
|
||
%voice' to describe an abstract mathematical process
|
||
by using a weaving analogy: "We may say most aptly
|
||
that the Analytical Engine weaves algebraic patterns
|
||
just as the Jacquard-loom waves flowers and
|
||
leaves." This quote does not mean that only women
|
||
were weavers, but that perhaps only a woman would
|
||
compare algebra to flowers (Carmeichael, 1991).
|
||
|
||
Joan Carmeichael's _In a Different Format: Connecting women, computers
|
||
and education using Gilligan's framework_ presents a new way of
|
||
viewing women, computers, and education based on Carol Gilligan's
|
||
conceptual framework. Gilligan's framework is an ethic of caring --
|
||
a interconnected web of concepts based on cooperation, relationships,
|
||
responsibility, and networking rather than, as is customary in a
|
||
framework of morality, separation and competition.
|
||
|
||
The first and last section of Carmeichael's thesis focus specifically
|
||
on Gilligan's framework and Carmeichael's application of it, while the
|
||
rest of the thesis provides a broad(?) and and thoughtful historical
|
||
reviews of women & technology, women & science, and women & education.
|
||
These historical reviews substantiate Carmeichael's suggestion that
|
||
"women are not equal participants and do not heave equal power in the
|
||
hierarchally organised industrial workplace, nor will they
|
||
automatically become equal partners in the new information workplace
|
||
based on computers." This lack of equal power is examined through
|
||
historial reviews of women & science, women & technology, and women &
|
||
education.
|
||
|
||
* Women & science presents four women scientists, their work, and the
|
||
problems they faced, followed by a review of modern science, the male
|
||
bias of science, and how women have been and continue to be excluded.
|
||
|
||
* Women & technology discusses the rise of computers and the
|
||
Information Age, the myth that computers are %boy's toys', and how
|
||
Gilligan's framework can be applied to technological developments and
|
||
how new technology will be used.
|
||
|
||
* Women and education discusses the problems girls and women face
|
||
within the education system, the introduction of computers into
|
||
schools, how mathematics is used as a %critical filter' limiting
|
||
women's access to computers and science in general. Carmeichael also
|
||
examines the attitudes held about women and by women: that "male
|
||
experience is...the norm, the yardstick against which any female
|
||
experience that is different is found to be deviant",the %we can, but
|
||
I can't' paradox, and others.
|
||
|
||
Bringing together history, computers, and women, Carmeichael writes:
|
||
|
||
Women have been working with technology in the workplace
|
||
for over a hundred years. The first technological
|
||
revolution in the office took place from 1880 to 1920 and
|
||
saw the development and consolidation of the mechanical
|
||
office and the entry of large numbers of women into the
|
||
paid-labour force. In the then newly organized office,
|
||
women could hold clerical jobs - new, deskilled positions
|
||
- as long as it was clear they could not advance to
|
||
managerial positions. There are two lessons to be
|
||
learned from the first technological revolution. One is
|
||
that the feminization of office work did not change
|
||
women's position in society, and, secondly, there is no
|
||
automatic liberating quality to new technology. (Bernard,
|
||
1984)
|
||
|
||
Carmeichael concluded her thesis by discussing how Gilligan's
|
||
framework can be applied to education and the work place. Carmeichael
|
||
suggests that the traditional teaching style generally reflects a
|
||
%boy's style' of learning rather than a typically %girl's style' of
|
||
learning (based on cooperation and inclusion). " When we continue to
|
||
use strategies and classroom techniques predicated on competition
|
||
rather than cooperation, we preserve a macho perspective and fail to
|
||
view females on their own terms." (Lewis, 175 cited in Carmeichael,
|
||
1991) In the workplace, Gilligan's framework can be applied by move
|
||
away from a hierarchical workplace towards a workplace of cooperation
|
||
(teams, networks, etc.) which is a viable alternative particularly in
|
||
an information-intensive environment.
|
||
|
||
Overall Carmeichael's thesis provides a strong(?) historical look at
|
||
women and science/technology/computers/education. Carmeichael's use
|
||
of Gilligan's framework "fits" into the history she presents, but no
|
||
empirical research was conducted.
|
||
|
||
An aspect of woman and computing that Carmeichael did not discuss, but
|
||
which would fit in well with her thesis, is women and computer
|
||
mediated communication (CMC). An emphasis on cooperation and
|
||
inclusion has been identified by Dehorah Tannen as a more typically
|
||
female method of verbal communication, and Susan Herring's research
|
||
suggests that this method of communication might persist into CMC.
|
||
Herring research suggests, as Carmeichael noted, that new technology
|
||
doesn't alter established inequalities:
|
||
|
||
Rather than being democratic, academic CMC is power-based
|
||
and hierarchical. This state of affairs cannot however
|
||
be attributed to the influence of computers communication
|
||
technology; rather, it continues pre-existing patterns of
|
||
hierarchy and lame dominance in academic more generally,
|
||
and in society as a whole."
|
||
|
||
On the other hand, some research does suggest a egalitarianism in CMC.
|
||
Egalitarianism is only part of democratization. Democratization also
|
||
implies equal access to computers and no prevention (internal or
|
||
external coercion) of participation in discussions. There is much
|
||
research to suggest that neither of these requirements are met.
|
||
However, egalitarianism simply implies that, once individual are
|
||
participating in discussion, they do so equally. In my ongoing
|
||
research, examining gender differences and similarities in Usenet
|
||
postings, it appears that CMC is egalitarian. Specifically, my
|
||
research suggests that:
|
||
|
||
(1) The average woman and man post a similar number of
|
||
articles.
|
||
(2) The average woman and man post articles of similar
|
||
length.
|
||
(3) The ratio of overall participation by gender (7% for
|
||
women and ??% for men) appears to be similar to the
|
||
ratio of new topic initiators by gender. In addition,
|
||
the amount of "follow up" discussion does not appear to
|
||
correlate with the gender of the topic initiator.
|
||
|
||
Thus, in the public aspects of Usenet, discussions appear to be
|
||
egalitarian, though, since women only post 7% of the articles, Usenet
|
||
is clearly not democratizing.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 23 Aug 1993 22:40:09 +200 (WET)
|
||
From: brenda danet <msdanet@PLUTO.CC.HUJI.AC.IL>
|
||
Subject: File 5--"Smoking Dope on IRC--Play/Performance in Cyberspace"
|
||
|
||
((MODERATORS' NOTE: The following is excerpted from a longer paper
|
||
that will be available from the CuD archives soon. The authors
|
||
feedback on the project)).
|
||
|
||
+++++
|
||
|
||
"SMOKING DOPE" ON INTERNET RELAY CHAT: A CASE STUDY OF PLAY AND
|
||
PERFORMANCE IN A TEXTUAL CYBERSPACE
|
||
|
||
Brenda Danet, Hebrew University of Jerusalem
|
||
<msdanet@pluto.cc.huji.ac.il>
|
||
Yehudit Rosenbaum-Tamari, Hebrew University of Jerusalem
|
||
<ksuyr@hujivm1>
|
||
Lucia Ruedenberg, New York University
|
||
<ruednbrg@ACFcluster.NYU.EDU>
|
||
|
||
Like Richard Schechner (1988) we believe that play, not "work" or
|
||
"serious real life," is the ground of all of the multiple realities
|
||
(Schutz, 1977) in which we live. We are rediscovering this basic fact
|
||
of human existence in postmodern times: computers and
|
||
computer-mediated communication offer new possibilities for play, and
|
||
are altering common-sense perceptions of what constitutes "play" and
|
||
"work." We may be reverting from a stage in the history of play in
|
||
which leisure has been demarcated as a separate sphere of life
|
||
(Turner, 1974, 1986), to one in which the "playful" and the "serious"
|
||
are intertwined in ways which at least partially resemble those of
|
||
traditional cultures.
|
||
|
||
Playfulness is a prominent feature of hacker culture (Raymond, 1991;
|
||
Barlow, 1990; Meyer and Thomas, 1990), and of computerized writing of
|
||
all kinds. Its prominence grows as we move from basic word-processing
|
||
of author-absent texts (Heim, 1987; Bolter, 1991), to interactive
|
||
fiction, or hypertext (Delany and Landow, 1991; Bolter, 1991, chap.
|
||
8), and electronic mail and discussion groups (Danet and Ruedenberg,
|
||
1992), to interactive modes (Blackman and Clevenger, 1990; Reid, 1991;
|
||
Rosenbaum-Tamari, 1993; Curtis, 1992), in which writing is most
|
||
intensively experienced as "talking," and the distinction between
|
||
process and product of communication breaks down
|
||
(Kirshenblatt-Gimblett, 1976, Introduction).
|
||
|
||
We are engaged in a case study of "deep play" (Geertz, 1972, 1991) on
|
||
Internet Relay Chat (IRC), in which the participants simulate *smoking
|
||
marihuana.* To borrow the title of a book by Victor Turner (Turner,
|
||
1967), the text we analyze is a "forest of typographic symbols." Our
|
||
approach textual and micro-sociolinguistic, and draws heavily on the
|
||
anthropology of play and performance.
|
||
|
||
This interaction is a form of play because (1) it offers a "flow
|
||
experience" fusing action and awareness (Csikszentmihalyi, 1977); (2)
|
||
it is dominated by the frame of "make-believe" (Bateson, 1972;
|
||
Goffman, 1974; Handelman, 1976); and thus (3) takes place in the
|
||
subjunctive mode of possibility and experimentation (Turner, 1974,
|
||
1986), thereby reducing accountability for action (Handelman, 1976;
|
||
Honigmann, 1977; Ben-Ari, 1989). Like sports and other forms of
|
||
competitive play such as verbal dueling (Huizinga, 1955; Abrahams,
|
||
1973; Dundes, 1970; Labov, 1972; Gossen, 1976), this sequence also
|
||
contains prominent elements of contest, or competition in the
|
||
demonstration of skill (Huizinga, 1955; Caillois, 1961). Among the
|
||
features fostering playfulness are the medium's ephemerality, speed,
|
||
and near-instant interactivity (Rafaeli, 1988), the masking of
|
||
identity (Kiesler, et al,, 1984; Blackman and Clevenger, 1990;
|
||
Honigmann, 1977), the influence of hacker culture (Raymond, 1991), and
|
||
the frontier-like quality of cyberspace (Barlow, 1990; Meyer and
|
||
Thomas, 1990; Melbin, 1987)--not only fully three-dimensional
|
||
cyberspace (Benedikt, 1991; Rheingold, 1992; Lanier and Biocca, 1992)
|
||
but even "primitive," two-dimensional textual cyberspace.
|
||
|
||
Features previously thought to characterize oral, as opposed to
|
||
written, performance, are strikingly in evidence, even in some
|
||
non-synchronous modes of computer-based writing, but *especially* in
|
||
synchronous ones (Bolter, 1991: 59). Verbal and typographic art are
|
||
important; communication is highly stylized (Reid, 1991). Participants
|
||
are conscious of their audience and pay special attention to the
|
||
display of communicative competence, to how their messages are
|
||
packaged (Bauman, 1975). Thus, the poetic function of communication is
|
||
dominant (Jakobson, 1960). The need to say in writing what we have
|
||
been used to saying in speech calls attention to the communicative
|
||
means employed in formulating the message. The reduced transparency
|
||
of language heightens meta-linguistic awareness, and leads us to treat
|
||
graphic symbols as objects and to play with them (Cazden, 1976).
|
||
|
||
In our analysis, we identify and describe an extraordinarily rich
|
||
variety of forms of play with identity, language, and typography, as
|
||
well as with the frames of interaction themselves. Play is at its
|
||
deepest and most complex when the participants not only simulate
|
||
smoking marihuana but communicate messages about the virtuosity of
|
||
their performance. They struggle to create a sense of "place," despite
|
||
the abstractness of cyberspace, simulate experiences of all the five
|
||
senses, and luxuriate in playing with the forbidden.
|
||
|
||
In the last chapter of the monograph we discuss play on IRC as a
|
||
newly emerging form of popular culture. We compare it to jazz,
|
||
graffiti, comics, and improvisational theater. We elaborate on Mark
|
||
Poster's claim that "computer writing is the quintessential postmodern
|
||
linguistic activity" (Poster (1990: 128). Analysts of hacker culture
|
||
see hackers as pioneering explorers at the normative edge of society,
|
||
rather than dangerous anarchists (Barlow, 1990; Meyer and Thomas,
|
||
1990). Similarly, we see participants on IRC as pioneers exploring a
|
||
new communicative frontier, rather than immature computer science
|
||
students wasting institutional resources by "fooling around" when they
|
||
should be "working."
|
||
|
||
REFERENCES
|
||
|
||
Abrahams, Roger D. 1973. Playing the Dozens. In Mother Wit from the
|
||
Laughing Barrel: Readings in the Interpretation of Afro-American
|
||
Folklore. Ed. Alan Dundes, 295-309. Englewood Cliffs, NJ.
|
||
|
||
Barlow, John. 1990. Crime and Puzzlement. Electronic manuscript, also
|
||
published in Whole Earth Review, 1990, 45-57.
|
||
|
||
Bateson, Gregory. 1972. A Theory of Play and Fantasy. In Steps to An
|
||
Ecology of Mind. Ed. Gregory Bateson, 177-193. New York: Ballantine.
|
||
|
||
Ben-Ari, Eyal. 1989. Masks and Soldiering: the Israeli Army and the
|
||
Palestinian Uprising. Cultural Anthropology 4, 4: 372-389.
|
||
|
||
Benedikt, Michael, Editor. 1991. Cyberspace: First Steps. Cambridge,
|
||
MA: M.I.T.
|
||
|
||
Blackman, Bernard I., and Theodore Clevenger, Jr. 1990. On-Line
|
||
Computer Messaging: Surrogates for Nonverbal Behavior. Paper presented
|
||
at the International Communication Association, Dublin, Ireland, June
|
||
24-29, 1990.
|
||
|
||
Bolter, Jay David. 1991. Writing Space: the Computer, Hyptertext, and
|
||
the History of Writing. Hillsdale, NJ: Lawrence Erlbaum.
|
||
|
||
Caillois, Roger. 1961. Man, Play and Games. Glencoe, IL: Free Press.
|
||
|
||
Cazden, Courtney B. 1976. Play with Language and Meta-linguistic
|
||
Awareness: One Dimension of Language Experience. Play--Its Role in
|
||
Development and Evolution. Ed. Jerome S. Bruner, Elison Jolly and
|
||
Kathy Sylva, 603-608. New York: Penguin.
|
||
|
||
Csikszentmihalyi, Mihalyi. 1977. Beyond Boredom and Anxiety. San
|
||
Francisco: Jossey-Bass.
|
||
|
||
Curtis, Pavel. 1992. Mudding: Social Phenomena in Text-Based Virtual
|
||
Realities. Intertrek 3, no. 3: 26-34.
|
||
|
||
Danet, Brenda, and Lucia Ruedenberg. 1992. "Smiley" Icons: Keyboard
|
||
Kitsch or New Communication Code? Paper presented at the Annual
|
||
Meeting, American Folklore Society, Jacksonville, Florida, October,
|
||
1992.
|
||
|
||
Geertz, 1991 [1972]. Deep Play. In Rethinking Popular Culture. Chandra
|
||
Mukerji and Michael Schudson, eds., pp.239-277. Berkeley: University
|
||
of California Press. Reprinted from Daedelus, 101, 1, 1972.
|
||
|
||
Goffman, Erving. 1974. Frame Analysis: An Essay on the Organization of
|
||
Experience. New York: Harper & Row.
|
||
|
||
Gossen, Gary H. 1976. Verbal Dueling in Chamula. In Speech Play:
|
||
Research and Resources for the Study of Linguistic Creativity. Ed.
|
||
Barbara Kirshenblatt-Gimblett, pp.121-146. Philadelphia: University
|
||
of Pennsylvania Press.
|
||
|
||
Handelman, Don. 1976. Play and Ritual: Complementary Frames of
|
||
Meta-Communication. In It's a Funny Thing, Humour. Ed. A.J. Chapman
|
||
and H. Foot, pp. 185-192. London: Pergamon.
|
||
|
||
Heim, M. 1987. Electric Language: A Philosophical Study of Word
|
||
Processing. New Haven: Yale University Press.
|
||
|
||
Honigmann, John. 1977. The Masked Face. Ethos 5: 263-280.
|
||
|
||
Huizinga, Jan. 1955. Homo Ludens. Boston: Beacon.
|
||
|
||
Kiesler, Sara, J. Siegel, and T.W. McGuire. 1984. Social Psychological
|
||
Aspects of Computer-mediated Communication. American Psychologist 39:
|
||
1123-1134.
|
||
|
||
Kirshenblatt-Gimblett, Barbara, Editor. Speech Play: Research and
|
||
Resources for the Study of Linguistic Creativity. Philadelphia:
|
||
University of Pennsylvania Press.
|
||
|
||
Labov, William. 1972. Rules for Ritual Insults. Studies in Social
|
||
Interaction. Ed. David Sudnow, 120-169. New York: Macmillan.
|
||
|
||
Lanier, Jaron, and Frank Biocca. 1992. An Insider's View of the Future
|
||
of Virtual Reality. Special issue on "Virtual Reality: A Communication
|
||
Perspective," Ed. Frank Biocca. Journal of Communication 42, no. 4:
|
||
150-172.
|
||
|
||
Melbin, Murray. 1987. Night as Frontier. New York: Free Press.
|
||
|
||
Meyer, Gordon, and Jim Thomas. 1990. The Baudy World of the Byte
|
||
Bandit: a Postmodernist Interpretation of the Computer Underground.
|
||
Electronic manuscript; also published in F. Schmalleger, ed.,
|
||
Computers in Criminal Justice, Bristol, Indiana: Wyndham Hall, 1990,
|
||
pp. 31-67.
|
||
|
||
Poster, Mark. 1990. The Mode of Information: Poststructuralisms and
|
||
Contexts. Chicago: University of Chicago Press.
|
||
|
||
Rafaeli, Sheizaf. 1988. Interactivity: from New Media to
|
||
Communication. Sage Annual Reviews of Communication Research, vol. 16,
|
||
Ed. Robert B. Pawkins, John M. Wiemann, and Suzanne Pingree, Advancing
|
||
Communication Science: Merging Mass and Interpersonal Processes, pp.
|
||
110-133. Beverly Hills, CA: Sage.
|
||
|
||
Raymond, Eric S., Editor. 1991. The New Hackers' Dictionary. With
|
||
assistance and illustrations by Guy L. Steele, Jr. Cambridge, MA:
|
||
M.I.T. Press.
|
||
|
||
Reid, Elizabeth. 1991. Electropolis: Communication and Community on
|
||
Internet Relay Chat. Adapted from a B.A. Honors thesis, Dept. of
|
||
History, University of Melbourne, Australia. Electronic manuscript.
|
||
|
||
Rosenbaum-Tamari, Yehudit. 1993. Play, Language and Culture in
|
||
Computer-Mediated Communication. Ph.D. dissertation proposal, Dept. of
|
||
Sociology & Anthropology, Hebrew University of Jerusalem.
|
||
|
||
Schechner, Richard. 1988. Playing. Play and Culture 1, 3: 3-19.
|
||
|
||
Schutz, Alfred. 1977. Multiple Realities. Rules and Meanings. Ed.
|
||
Mary Douglas, pp. 227-231. Hammondsworth, Middlesex: Penguin.
|
||
|
||
Turner, Victor. 1967. The Forest of Symbols. Ithaca: Cornell
|
||
University Press.
|
||
|
||
+______________. 1974. From Liminal to Liminoid: An Essay in
|
||
Comparative Symbology. Rice University Studies 60: 53-92.
|
||
|
||
+______________. 1986. The Anthropology of Performance. New York: PAJ
|
||
Publications.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 24 Aug 1993 13:49:43 CDT
|
||
From: Trudy McCarty <tmccarty@LEO.VSLA.EDU>
|
||
Subject: File 6--Classifying Grad Theses & Dissertations as "private?"
|
||
|
||
Date--Mon, 23 Aug 1993 14:18:00 EDT
|
||
From--LISA BODENHEIMER <BODENHL%CLEMSON.BITNET@UBVM.cc.buffalo.edu>
|
||
Subject--Interesting news story
|
||
Originally from--AUTOCAT <AUTOCAT@UBVM.cc.buffalo.edu>
|
||
|
||
In yesterday's Greenville (S.C.) News, there was an article with the
|
||
headline "New interpretation says theses are records, not research
|
||
tools." To quote from the article:
|
||
|
||
"The Federal Department of Education has ruled that master's and
|
||
doctoral theses--research papers normally bound and put on the shelves
|
||
at schools nationwide--are student 'educational records,' much like
|
||
grade reports. That means that they can not be checked out of
|
||
libraries, sent to faraway researchers, or called up through computer
|
||
databases without the author's permission, the News & Observer of
|
||
Raleigh (N.C.) reported."
|
||
|
||
The article goes on to say that making theses and dissertations
|
||
available for public use without the author's permission is a violation
|
||
of the Federal Education Rights and Privacy Act. Ways to comply with
|
||
the law include having current students sign a waiver, tracking down
|
||
former students to get permission, or taking authors' names off theses
|
||
(this last has interesting implications for cataloging!).
|
||
|
||
There are obviously many implications for libraries here. I'd like to
|
||
know if this has been publicized elsewhere, and what thoughts people
|
||
have (aside from utter incredulity) on this. (FYI--this was an
|
||
Associated Press story from out of Raleigh, N.C.) Thanks.
|
||
|
||
Lisa Bodenheimer, Clemson University, Clemson, SC bodenhl@clemson
|
||
|
||
+++++++++++++++
|
||
|
||
((MODERATORS' NOTE: The new FERPA interpretation extends "privacy
|
||
rights" beyond reasonable bounds. The implications affect CuD and
|
||
other information-oriented journals and newsletters as well as
|
||
scholars. By sealing scholarship that has correctly been considered
|
||
public documents, a significant portion of research now threatens to
|
||
become "secret."
|
||
|
||
Classifying students dissertations and theses as "student personnel
|
||
records," thereby making them subject to FERPA seems a
|
||
misinterpretation of the Act. At virtually every school of which I'm
|
||
aware, these are considered public documents because they are 1)
|
||
defended publicly, 2) "published" as a research contribution to a
|
||
specific field (regardless of the quality of the content), 3) placed,
|
||
usually by requirement, in a public archive of some sort (eg, U.
|
||
library, departmental office, U of Mich Microfiche). Further, those
|
||
products that are subsidized by gov't or other grants are--if I recall
|
||
my own obligations as recipient--contractually defined as public.
|
||
|
||
While it might be possible, through intellectual aerobics and and most
|
||
obscurely narrow interpretation of FERPA to redefine theses and
|
||
dissertations as "personnel records" (and I'm not convinced that it
|
||
is), such an interpretation certainly violates the fundamental
|
||
principle of advanced-degree research by imposing restrictions that
|
||
subvert academic integrity and violate long-established principles
|
||
of free-flowing scholarly information.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 19 Aug 1993 18:19:02 CDT
|
||
From: Brian Erwin <brian@ORA.COM>
|
||
Subject: File 7-- O'Reilly Internet Information Service
|
||
|
||
THE GLOBAL NETWORK NAVIGATOR
|
||
An Internet-based Information Center
|
||
O'Reilly & Associates, Inc.
|
||
Free Subscription (send mail to info@gnn.com)
|
||
|
||
Next month, we will launch a new experiment in online
|
||
publishing, _The Global Network Navigator_ (GNN), a free Internet-
|
||
based information center that will initially be available as a
|
||
quarterly. GNN will consist of a regular news service, an online
|
||
magazine, The Whole Internet Interactive Catalog, and a global
|
||
marketplace containing information about products and services.
|
||
|
||
Keep Up with News of the Global Network
|
||
The Global Network News provides a continuously updated
|
||
listing of interesting news items by and about the users of the
|
||
Internet, including announcements of new information services.
|
||
|
||
Discover New Interests in GNN Magazine
|
||
Each issue will present articles developed around a common
|
||
theme, such as government or education. Regular columns will cover
|
||
such topics as how to provide information services on the Internet or
|
||
help for new Internet users. It will have several innovative
|
||
departments, such as Off The Wall Gallery, that exhibits in digital
|
||
form the works of new artists, and Go Find Out, a section containing
|
||
reviews of the Internet's most interesting resources.
|
||
|
||
How to find resources on a particular subject
|
||
One of the most popular features of O'Reilly's _The Whole
|
||
Internet User's Guide and Catalog, by Ed Krol, is the catalog of
|
||
information resources on the Internet. GNN features an expanded,
|
||
interactive version of this resource catalog that can be used online
|
||
to navigate to the Internet servers containing those resources.
|
||
The Online Whole Internet Catalog organizes Internet resources in the
|
||
following categories:
|
||
|
||
- The Internet - Arts
|
||
- Current Affairs - Libraries, Reference & Education
|
||
- Science - Government and Politics
|
||
- Technology - Business
|
||
- Humanities - Work and Play
|
||
|
||
In the Online Whole Internet Catalog, subscribers can not
|
||
only read about these resources, they can actually connect to them with
|
||
a click of the button.
|
||
|
||
Participate in the GNN Marketplace
|
||
Getting good information from a company about their products
|
||
or services is almost as valuable as the product or service itself.
|
||
The Global Marketplace provides referrals to companies providing this
|
||
kind of information online through the Internet. The Global Marketplace
|
||
also contains commercial resource centers in which subscribers may
|
||
find white papers, product brochures or catalogs, demo software or
|
||
press releases for the companies advertising in GNN Marketplace.
|
||
|
||
GNN and The World Wide Web
|
||
Global Network Navigator is an application of the World Wide
|
||
Web (WWW), developed at CERN in Switzerland. Users can choose any
|
||
WWW browser, such as Mosaic (available for UNIX, Windows, and the Mac)
|
||
from the National Center for Supercomputing Applications. In addition,
|
||
O'Reilly & Associates will make available Viola, an X-based hypermedia
|
||
software environment in which we've developed a sophisticated WWW
|
||
graphical browser. Viola makes it possible to distribute object-oriented
|
||
documents that use formatted text, graphics, icons, and scripts. All
|
||
World Wide Web browsers can be used to access network services such as
|
||
gopher and WAIS, independent of the Global Network Navigator.
|
||
|
||
How To Subscribe
|
||
The Global Network Navigator is available over the Internet
|
||
as a free subscription service during its launch. GNN will be funded by
|
||
sponsors who provide commercial information of interest to our readers
|
||
in GNN Marketplace and through advertising in GNN News, GNN Magazine and
|
||
the Online Whole Internet Catalog.
|
||
To get information on subscribing to Global Network Navigator,
|
||
send e-mail to info@gnn.com.
|
||
|
||
+++
|
||
Brian Erwin, brian@ora.com
|
||
O'Reilly & Associates
|
||
103A Morris Street, Sebastopol CA 95472
|
||
707-829-0515, Fax 707-829-0104
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 26 Aug 1993 21:18:51 CDT
|
||
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
Subject: File 8--"The Internet Letter"--Internet's First Commercial Digest
|
||
|
||
The Internet Letter (ISSN 1070-9851), the first commercial newsletter
|
||
on the Internet, will premiere at INET 93 and INTEROP(r)93, and a hard
|
||
copy version will be available at Booth #1334 (InterCon Systems Corp.)
|
||
in the South Hall of the Moscone Center.
|
||
|
||
The first issue of TIL provides provides the following information
|
||
about the editor:
|
||
|
||
The editor is Jayne Levin (netweek@access.digex.net). Levin
|
||
was former deputy bureau chief of Institutional Investor in
|
||
Washington, D.C., and has written on the Internet for The
|
||
Washington Post and Infoworld. Tony Rutkowski
|
||
(amr@CNRI.Reston.VA.US) is special adviser. Rutkowski is
|
||
founder and vice president of the Internet Society and
|
||
director of technology assessment at Sprint Corp. He was
|
||
former editor-in-chief and publisher of Telecommunications
|
||
magazine. Levin will be available for interviews at INTEROP.
|
||
Contact INTEROP press relations.
|
||
|
||
The table of contents for the first issue covered a wide range
|
||
of topics. The articles were professionally written and incisive:
|
||
|
||
001) INTERNET EXPERIENCING AN INFORMATION EXPLOSION
|
||
002) COMPANIES TAP INTERNET'S POWER
|
||
003) THE TOP 150 COMMERCIAL USERS ON INTERNET -- CHART
|
||
004) CIA, US GOVERNMENT INTELLIGENCE AGENCIES DEVELOP INTERNET LINK
|
||
005) REALTY FIRM IMPROVES PRODUCTIVITY, INTERNET SPEEDS REALTY TRANSACTIONS
|
||
006) MULTIMEDIA MAGAZINE TO DEBUT ON INTERNET
|
||
007) TASK FORCE PROPOSES STANDARD TO SECURE CONTENTS OF E-MAIL
|
||
008) INTERNET MERCANTILE STANDARDS EXPLORED
|
||
009) GOPHER LICENSING FEE SPARKS DISPUTE
|
||
010) FINDING GOPHER & GN
|
||
011) FROM SOFTWARE TO MAGAZINES, BUYING ELECTRONICALLY
|
||
012) CIX LAUNCHES COMMERCIAL "INFORMATION" EXCHANGE
|
||
013) SOME COMPANIES PREFER WAIS FOR BUILDING IN-HOUSE DATABASES
|
||
014) MORE ON WAIS
|
||
015) INTERNET TO ASSIST BETHANY IN ADOPTION SERVICES
|
||
016) FAQ
|
||
017) PROVIDERS' CIRCUIT
|
||
018) CIX CONTACTS -- CHART
|
||
019) TIPS & TECHNIQUES
|
||
020) POINTERS
|
||
021) TALK OF THE NET
|
||
022) WASHINGTON
|
||
023) READ ALL ABOUT IT
|
||
024) DATEBOOK
|
||
|
||
The first issue of TIL provides the following price information:
|
||
|
||
30-DAY INTEROP SPECIAL (good until September 30)
|
||
|
||
40% Discount off the regular rate of $249/year
|
||
|
||
Charter subscriptions: $149/year -- a 40% discount.
|
||
Universities and nonprofits $95/year.
|
||
|
||
If you not completely satified, your money will be refunded.
|
||
|
||
You can receive The Internet Letter electronically or on paper.
|
||
|
||
Although the first issue of TIL suggests that the newsletter will of
|
||
of considerable utility to Internet travellers, the issue of
|
||
commercialization of is troublesome. CuD is opposed on principal to
|
||
such commercial endeavors. In response to CuD's query, the author
|
||
presented the other side of the argument, one that we have recently
|
||
raised as well. Namely, the time required to publish a newsletter of
|
||
reasonable quality (and, judging from the first issue, TIL is of
|
||
exceptional quality) can be prohibitive. The time required approaches
|
||
that of a full-time journalist who is paid a living wage. Should the
|
||
Internet be a mechanism for delivering a commercial product? The
|
||
question raises too many issues to be addressed here. We are of two
|
||
minds, and find the issues too complex for an easy answer. Perhaps
|
||
readers have thoughts on the issue they could share. Meanwhile, the
|
||
first issue of TIL is free, and it's well-worth a look.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.66
|
||
************************************
|
||
|
||
|