827 lines
35 KiB
Plaintext
827 lines
35 KiB
Plaintext
|
||
|
||
Computer underground Digest Wed Jul 19, 1995 Volume 7 : Issue 61
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
||
Archivist: Brendan Kehoe
|
||
Shadow Master: Stanton McCandlish
|
||
Field Agent Extraordinaire: David Smith
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
|
||
CONTENTS, #7.61 (Wed, Jul 19, 1995)
|
||
|
||
File 1--Senate Prayer - "Lord, save our kids from porn"
|
||
File 2--Beyond the Rimm
|
||
File 3--cybercensorship
|
||
File 4--(fwd) Hackers busted in Colorado
|
||
File 5--A response to a spammer (fwd)
|
||
File 6--Exon is unknown to the public
|
||
File 7--TIS CFP FYI
|
||
File 8--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
||
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
||
---------------------------------------------------------------------
|
||
|
||
Date: Wed, 19 Jul 1995 01:53:49 -0500
|
||
From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas)
|
||
Subject: File 1--Senate Prayer - "Lord, save our kids from porn"
|
||
|
||
((MODERATORS' NOTE: This isn't satire!!)
|
||
|
||
prayer (Senate - June 12, 1995)
|
||
|
||
[Page: S8127]
|
||
|
||
The Chaplain, Dr. Lloyd John Ogilvie, offered the following prayer:
|
||
|
||
Almighty God, Lord of all life, we praise You for the advancements in
|
||
computerized communications that we enjoy in our time. Sadly, however,
|
||
there are those who are littering this information superhighway with
|
||
obscene, indecent, and destructive pornography . Virtual but
|
||
virtueless reality is projected in the most twisted, sick, misuse of
|
||
sexuality. Violent people with sexual pathology are able to stalk and
|
||
harass the innocent. Cyber solicitation of teenagers reveals the dark
|
||
side of online victimization.
|
||
|
||
Lord, we are profoundly concerned about the impact of this on our
|
||
children. We have learned from careful study how children can become
|
||
addicted to pornography at an early age. Their understanding and
|
||
appreciation of Your gift of sexuality can be denigrated and
|
||
eventually debilitated. Pornography disallowed in print and the mail
|
||
is now readily available to young children who learn how to use the
|
||
computer.
|
||
|
||
Oh God, help us care for our children. Give us wisdom to create
|
||
regulations that will protect the innocent. In times past, You have
|
||
used the Senate to deal with problems of air and water pollution, and
|
||
the misuse of our natural resources. Lord, give us courage to balance
|
||
our reverence for freedom of speech with responsibility for what is
|
||
said and depicted.
|
||
|
||
Now, guide the Senators as they consider ways of controlling the
|
||
pollution of computer communications and how to preserve one of our
|
||
greatest resources: the minds of our children and the future moral
|
||
strength of our Nation. Amen.
|
||
|
||
------------------------------
|
||
|
||
Date: 17 Jul 95 08:21:57 EDT
|
||
From: Lance Rose <72230.2044@COMPUSERVE.COM>
|
||
Subject: File 2--Beyond the Rimm
|
||
|
||
The Net did a swell job of defending its turf from errant
|
||
government porn regulation by deep-sixing the badly misleading Rimm
|
||
study, and causing Time magazine to recant. This certainly shows the
|
||
astounding and still growing power of the Net organism. But it also
|
||
raises the question: to what ends does the Net flex its muscles?
|
||
|
||
For instance, the Net excels at self-protective acts against
|
||
overt moves threatening the Net as a whole, like taking down the Rimm
|
||
study, or making adjustments making spamming more difficult after
|
||
Canter & Siegel. But what about more subtle moves? Net-based
|
||
activities did not stop the FBI wiretapping act last year. Nor would
|
||
they have made a dent in the Exon bill in the '94 incarnation had the
|
||
telecom deregulation bills of that year stayed alive.
|
||
|
||
The difference here seems to be in terms of media attention. A
|
||
move with big media attention gets a big net response; a move that
|
||
catches the news reporters asleep also catches the Net napping.
|
||
|
||
The potential danger here is huge, and obvious. If the Net as
|
||
a whole responds to mass media apperances, what is to stop those
|
||
controlling the mass media from manipulating the power of the Net? Is
|
||
the Net just a dumb creature that responds on a low level to dimly
|
||
perceived threats to its existence, or is it (or can it be) a
|
||
higher-order product of the smart minds that comprise it?
|
||
|
||
As to the self-protective aspect, how well does the Net respond
|
||
to events that do not rip at its very fibre? We have shining examples
|
||
of a few years past -- the role of the Net in stopping the reactionary
|
||
coup in Russia, and in getting out word on the repressive violent
|
||
tactics of Chines gov't. leaders against students. As wonderful as
|
||
these effects were, they were also a low-order use of the Net: using
|
||
it as a robust communications medium.
|
||
|
||
What about Net community responses to events other than those
|
||
that threaten the Net as a whole? You can see the Net operate as a
|
||
community to protect itself. But what else might it accomplish? Are
|
||
there other social agendas or political results towards which the Net
|
||
may turn its power in the future? Should there be, or should the Net
|
||
be value-neutral (the issue of its very existence apart),
|
||
acknowledging the diverse political views and needs of its
|
||
inhabitants?
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 07 Jul 1995 15:03:06 -0400
|
||
From: christij@UNIX.ASB.COM(Joseph Christie)
|
||
Subject: File 3--cybercensorship
|
||
|
||
When I was a young child my momma read to me, a lot. She chose the
|
||
books. When I got older the books I read were picked by her and my
|
||
teachers. As I got older, I started to pick my own books from the ones
|
||
made available to me by momma and my teachers.
|
||
|
||
When I got a little older I was introduced to the public library. I
|
||
picked out the books but they were always shown to momma for approval
|
||
before I checked them out. As time went by, I started asking momma's
|
||
approval less and less as my own tastes and preferrences developed but
|
||
I still asked her opinion frequently.
|
||
|
||
Momma was not very well educated and before the 8th grade I was
|
||
reading things that she did not understand and had never been exposed
|
||
to. Technical and science books as well as philosophy, religious texts
|
||
other than the bible and some fiction that could be called "of
|
||
questionable taste". She would sometimes look at what I was reading
|
||
but I knew she didn't really understand much of it. She did not forbid
|
||
me from reading things she didn't understand nor did she forbid me
|
||
from reading those that she understood but did not approve, she had
|
||
faith that she had instilled in me a good grounding for making my own
|
||
value judgements. She knew I might sometimes make mistakes and also
|
||
that sometimes I might choose to expose myself to things that she
|
||
would not approve.
|
||
|
||
I don't ever remember a time when momma wished that the government
|
||
would step in and relieve her of the overwhelming burden of deciding
|
||
what was acceptable for me to read. The term "family values" is
|
||
bandied about more and more lately. Isn't responsibility one of the
|
||
most important "family values" that we are expected to learn? We learn
|
||
responsibility for ourselves, out pets, our family members. Much of
|
||
what we learn while growing up centers around responsibility.
|
||
Shouldn't parents demonstrate that responsibility by exercising
|
||
control over their children rather than allowing some distant,
|
||
faceless bureaucrat to dictate what is available to their family.
|
||
|
||
When the discussion turns to the topic of adult material and children
|
||
using computers, the politicians are saying that we are so incapable
|
||
or so negligent in this particular instance that they must step in and
|
||
tell us how to behave to protect our children from what the
|
||
politicians don't understand themselves. How would these same parents
|
||
feel if the government was trying to legislate that in order to become
|
||
well rounded citizens, all children MUST be exposed to sexually
|
||
explicit material by the age of say 7 or 8. It is the same principle
|
||
just different particulars. We wouldn't have too much problem rallying
|
||
support behind defeating that one though, would we?
|
||
|
||
If the politicians were truly concerned about the welfare of children
|
||
in this country their time and money could be better invested. How
|
||
about some serious AIDS education? How about more money for public
|
||
schools? How about let's not gut the school lunch program and the
|
||
infant immunization programs? How about some real drug and alcohol
|
||
education and treatment? More children die from tobacco and alcohol
|
||
related death than from sex in this country, where's all the political
|
||
outrage on this crisis?
|
||
|
||
It is the parents themselves that must make the decisions about their
|
||
own children and what they are exposed to as they grow up. Children
|
||
are constantly barraged by sex in the media and in advertisements that
|
||
surround them every day all day. Computers are just one more place
|
||
they see it. Most of what the public and the politicians are outraged
|
||
about is already illegal. Children being propositioned, children being
|
||
lured away from home by perverts and pedophiles are all against laws
|
||
already on the books. What we need is education not legislation. Teach
|
||
the parents, don't write more laws. As Frank Zappa said, "We are a
|
||
nation of laws, poorly written and randomly enforced."
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 25 Jun 1995 22:07:15 -0500 (CDT)
|
||
From: David Smith <bladex@BGA.COM>
|
||
Subject: File 4--(fwd) Hackers busted in Colorado
|
||
|
||
---------- Forwarded message ----------
|
||
|
||
Here is the pathetic excuse for a headline article, as printed in the
|
||
Denver Post:
|
||
|
||
(Note: All typos are the fools who typed this up)
|
||
|
||
|
||
ROCKY MOUNTAIN NEWS
|
||
(Front Page Headline) COMPUTER-CRIME RING CRACKED (Monday June 19, 1995)
|
||
Quartet accused of hacking into Arapahoe college's system,
|
||
inciting illegal acts.
|
||
|
||
----------------------------------------------
|
||
(Fourth Page Article) 4 ACCUSED IN COMPUTER HACKING CASE (By Marlys
|
||
Duran) Suspects used equopment at college to incite criminal acts,
|
||
officials say.
|
||
|
||
Arapahoe County - Hackers calling themselves "The New Order" allegedly
|
||
gained access to the Arapahoe Community College computer and used it
|
||
to distribute tips on how to committ crimes.
|
||
|
||
One man operated a computer bulletin board on which
|
||
contributors from throughout the world exchanged how-to information on
|
||
crimes ranging from credit-card fraud to high-tech burglary,
|
||
authorities said.
|
||
|
||
Computers were seized from the homes of four hackers, ranging
|
||
in age from 15 to 21. Secret Service experts were called in to help
|
||
crack the computer files.
|
||
|
||
Investigators found software for breaking passwords, lists of
|
||
private passwords for several computer systems, instructions for
|
||
cellular telephone fraud, private credit reports, lists of credit-card
|
||
numbers and electronic manuals on how to make bombs and illegal drugs.
|
||
|
||
In a 97-page affidavit detailing the 18-month investigation,
|
||
investigator John Davis of the Arapahoe district attorney's office
|
||
said that the hackers "operate with an attitude of indifference to the
|
||
rights and privacy of others and have made efforts to teach and
|
||
involve others in their criminal enterprise."
|
||
|
||
((Remainder deleted))
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 16 Jun 1995 07:01:20 +0200
|
||
From: Maurice Hendrix <mhe@CRAY-3.XS4ALL.NL>
|
||
Subject: File 5--A response to a spammer (fwd)
|
||
|
||
From--Hanno Liem <hardware@xs4all.nl>
|
||
|
||
((MODERATORS' NOTE: The following post was a response to a spammer who
|
||
complained about the cancelling of his posts. The spammer was not
|
||
Canter and Siegel, but the comments are a perfect respose to C&S's
|
||
complaints about cancelling spam)).
|
||
|
||
> This evidently was in regards to a post sent to several pertinent
|
||
> mailing lists, including one I operate here at my own site,
|
||
|
||
When people do this I always like to say in a Monty Python manner:
|
||
|
||
You do not get it. I will tell you. I hope you will get it.
|
||
|
||
You spammed.
|
||
|
||
We do not like spam. Spam is bad. Spam hurts the net. We like the net.
|
||
So we do not like spam. In fact, we hate spam.
|
||
|
||
What is spam? Spam is the same thing lots and lots of times.
|
||
|
||
What is lots and lots? We will not tell you. Why? We think you might
|
||
post one less, and then say it is not spam. But we will tell you this:
|
||
count the things on your hands and feet. It is near that.
|
||
|
||
What is spam not? Spam is not a bad post. Spam is not a bad post lots
|
||
and lots of times. Spam is not a post in the wrong place. Spam is not
|
||
a bad post in the wrong place lots and lots of times.
|
||
|
||
Spam is the same thing lots and lots of times.
|
||
|
||
We do not care what is in a spam. We do not care if it is in the right
|
||
place or the wrong place. If we cared, that would be bad. If we did not
|
||
like a post, we could say it is bad, so it is spam. Or we could say it
|
||
is in the wrong place, so it is spam. That would be worse than spam. So
|
||
we say a thing is spam if it is the same thing lots and lots of times.
|
||
|
||
One more time: spam is the same thing lots and lots of times.
|
||
|
||
Why is spam bad? The more times it is there, the more room it takes
|
||
on each site's disk, and the more time it takes to get it to all of
|
||
the sites. It should take just a small bit of room on each site's
|
||
disk, and take just a small bit of time to get there. So spam is a
|
||
lot of waste.
|
||
|
||
Why else is spam bad? The more times it is there, the more times we
|
||
have to see it. Some folks pay for their news by the note, or by the
|
||
byte, or by how much time it takes them to get it. Some have to pay
|
||
for each post in a group they read, and their site does not care if
|
||
they read the post. So spam is not fair.
|
||
|
||
Why else is spam bad? Spam makes folks mad. They post notes and say
|
||
that they are mad. Lots and lots of notes. We call these notes
|
||
"flames." So spam makes lots and lots of flames.
|
||
|
||
Why is a small spam bad? Some folks think that if a small thing is
|
||
not bad, then the same thing big is not bad too. So if a small spam
|
||
is not yelled at, then there will be lots and lots of big spams.
|
||
|
||
What did you do? You sent the same thing lots and lots of times. So
|
||
you spammed. Spam is bad.
|
||
|
||
We do not care what you said. We do not care if it was in the right
|
||
place. You sent the same thing lots and lots of times. That is spam.
|
||
That is bad.
|
||
|
||
Some folks like to get rid of spam when they see it. We think that is
|
||
good. We like them. We think they are good.
|
||
|
||
When they get rid of spam, they get rid of all of it. They do not try
|
||
to think if some of the posts are in the wrong place and just get rid
|
||
of those ones. That would be bad. As bad as to say that a post is
|
||
spam if they did not like it. No, they get rid of all of them. That
|
||
is the right way to get rid of spam.
|
||
|
||
Not all folks think we should do this. There are a few, like Dave
|
||
Hayes, who think spam should be left there, that we should all be free
|
||
to spam and spam and spam. But there are lots and lots more who think
|
||
spam should be got rid of.
|
||
|
||
Why are we mad at you? You spammed. But there is more: when we said
|
||
we were mad, you said you did not spam. And you said few of us were mad.
|
||
And you said your spam was not bad because it was in the right place.
|
||
And you said that we should not get rid of it. Or that we should not get
|
||
rid of the ones in the right place.
|
||
|
||
You said you will do it no more. We do not know if we think that is
|
||
true. Why? You said things that we think are bad. You did things that
|
||
we think are bad. So we do not trust you. We think you might do it the
|
||
next time you think of a thing you want lots and lots of folks to hear.
|
||
|
||
How can you make us think you will do it no more, and that you are good
|
||
folks?
|
||
|
||
(1) Say that what you did was spam.
|
||
(2) Say that what you did was bad.
|
||
(3) Say that you feel bad since you did this bad thing.
|
||
(4) *Then* say that you will do it no more.
|
||
|
||
Then we might trust you. Then we might not be mad at you.
|
||
|
||
That is not too hard for you to get, is it?
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 29 Jun 1995 10:33:07 -0500
|
||
From: m-atkinson@NWU.EDU(Michael A. Atkinson)
|
||
Subject: File 6--Exon is unknown to the public
|
||
|
||
It seems that most of the general public have no idea about the Exon
|
||
Bill, aka the Communications Decency Act.
|
||
|
||
My mother is a well-informed liberal lawyer in New York City.
|
||
Speaking with her on the telephone last night, I asked her what she
|
||
thought of Exon. Her response: "Huh?"
|
||
|
||
She had heard of it, of course. She thought it was a great idea,
|
||
because it would Protect The Children. Naturally, she was appalled
|
||
when I told her what it really is about.
|
||
|
||
Clearly, to get the issues out in the open where they belong, we need
|
||
better national media involvement. If we could get the national media
|
||
to believe (as I do) that Exon is the first step in a massive
|
||
trouncing of the First Amendment, we would hopefully be able to
|
||
mobilize public opinion, and defeat it.
|
||
|
||
------------------------------
|
||
|
||
Subject: File 7--TIS CFP FYI
|
||
Date: Fri, 14 Jul 1995 12:16:33 -0700
|
||
From: Rob Kling <kling@ICS.UCI.EDU>
|
||
|
||
CALL FOR PAPERS --
|
||
The Information Society (an International
|
||
Journal)
|
||
|
||
http://www.ics.uci.edu/~kling/tis.html
|
||
|
||
|
||
Information and Call for Papers for "The Information Society"
|
||
journal, published quarterly by Taylor & Francis
|
||
Titles of articles published in Vol. 9 (1993) and Vol. 10 (1994)
|
||
Subscription Form
|
||
|
||
Revised [7/5/95]
|
||
-----------------------------------------------------------
|
||
|
||
THE INFORMATION SOCIETY
|
||
An International Journal
|
||
|
||
An "information technology revolution" that can stimulate
|
||
significant social change is clearly underway. The exponential
|
||
growth in computational capability per unit dollar will continue at
|
||
least for the next several decades. Communication bandwidth is
|
||
undergoing simultaneous exponential growth. Connectivity among
|
||
individuals, companies and nations is forming what some are
|
||
calling cyberspace and virtual communities and new forums and
|
||
formats for electronic publishing, communication and commerce.
|
||
Since wealth, power and freedom of action derive from control
|
||
over, access to, and effective use of, information and expertise, the
|
||
shifting organization of information technologies and social life --
|
||
large scale and small scale -- is a major concern. These combined
|
||
trends have stimulated discussions the relationships between
|
||
technological change and social change. The term Information
|
||
Society has been a key marker for many of these studies and
|
||
discussions.
|
||
|
||
"The Information Society" journal, published since 1981, is a
|
||
key forum for thoughtful analysis of the impacts, policies, system
|
||
concepts, methodologies and cultural change related to these
|
||
trends. It is a refereed journal that publishes scholarly articles,
|
||
position papers, short communications and book reviews.
|
||
|
||
"The Information Society" is a multidisciplinary journal whose
|
||
audiences include policy- and decision-makers and scientists in
|
||
government, industry and education; managers concerned with the
|
||
effects of the information revolution on individuals, organizations
|
||
and society; and scholars with an interest in the relationship
|
||
between information technologies, social/organizational life, and
|
||
social change.
|
||
|
||
The Information Society is undergoing a transition under the
|
||
leadership of its new Editor-in-Chief, Rob Kling. This CFP lists
|
||
some of the members of the new editorial board. The journal's
|
||
editorial board will be experimenting with new electronic and
|
||
paper formats, including a web server for abstracts and tables of
|
||
contents. In addition, we are experimenting with a policy to allow
|
||
authors to identify 5 people who may recieve copies of the issue in
|
||
which their article appears.
|
||
|
||
Rob Kling is soliciting individual articles and proposals from
|
||
people who wish to organize and edit special issues. He is
|
||
interested in provocative analytical articles or empirical studies
|
||
that are written to advance our understanding of the relationships
|
||
between information technology, related social practices and
|
||
policies, and social change. TIS articles are typically 4,000-7,500
|
||
words long, and are written vividly with coherent analyses and
|
||
minimal jargon. TIS also publishes shorter "position statements"
|
||
of up to 2,000 words and debates in a new section, called "The
|
||
Forum."
|
||
|
||
Among the topics addressed within the journal are:
|
||
|
||
* changing National Information Infrastructures, especially as
|
||
they influence cultural expectations and social practices,
|
||
|
||
* the politics of change in National Information
|
||
Infrastrustures,
|
||
|
||
* the implications of the coming surge in electronic data
|
||
interchange (EDI) and electronic commerce among
|
||
businesses globally,
|
||
|
||
* the ability of companies to "outsource" portions of their
|
||
information processing to different countries around the
|
||
world, creating transborder data flow issues for the countries
|
||
involved and increasing the rapidity with which jobs migrate
|
||
globally,
|
||
|
||
* meanings and implications of political/economic systems
|
||
that are based on universal access to baseline information
|
||
services or fees-for-all-services,
|
||
|
||
* options for, and implications of, various forms of "electronic
|
||
democracy",
|
||
|
||
* the rise of "virtual communities" of persons worldwide
|
||
engaging in "many-to-many" communication among their
|
||
participants, irrespective of borders or corporate structures,
|
||
|
||
* the role of place and space in visions and practice of digital
|
||
libraries and electronic forums,
|
||
|
||
* cultural changes in relation to cyberspace -- both empirical
|
||
studies and studies of their representation in popular
|
||
culture,
|
||
|
||
* the structure of the information industries, including
|
||
markets, industrial alliances, the character of work, and
|
||
management-labor relations,
|
||
|
||
* ethical dimensions in the development and use of new
|
||
information technologies; and
|
||
|
||
* gender issues in the development and use of new information
|
||
technologies.
|
||
|
||
|
||
Articles published in Vol. 9 (1993) and Vol 10( 1994) include:
|
||
|
||
Kling, R., Dunlop, C. Controversies about computerization and
|
||
the character of white collar worklife. 9(1), 1993.
|
||
|
||
Calantone, R.J., Holsapple, C.W., Johnson, L.E. Communication
|
||
and communication support: an agenda for investigation.
|
||
9(1), 1993.
|
||
|
||
Schoonmaker, S. Trading on-line: information flows in advanced
|
||
capitalism. 9(1), 1993.
|
||
|
||
Arthur, C. Zen and the art of ignoring information. 9(1), 1993.
|
||
|
||
Mankin, D. Review of Peter G.W. Keen, "Shaping the future:
|
||
business design through information technology". 9(1), 1993.
|
||
|
||
Kling, R. Organizational analysis in computer science. 9(2), 1993.
|
||
|
||
Bikson, T.K., Law, S.A. Electronic mail use at the World Bank:
|
||
messages from users. 9(2), 1993.
|
||
|
||
Bikson, T.K., Law, S.A. Electronic information media and records
|
||
management methods: a survey of practices in United
|
||
Nations organizations. 9(2), 1993.
|
||
|
||
Martin, W.J., McKeown, S.F. The potential of information and
|
||
telecommunications technologies for rural development. 9(2),
|
||
1993.
|
||
|
||
Lincoln, T.L., Essin, D.J., Ware, W.H. The electronic medical
|
||
record: a challenge for computer science to develop clinically
|
||
and socially relevant computer systems to coordinate
|
||
information for patient care and analysis. 9(2), 1993.
|
||
|
||
Kling, R., Covi, L. Review of Lee Sproull and Sara Kiesler
|
||
"Connections: New ways of working in the networked
|
||
organization". 9(2), 1993.
|
||
|
||
Ware, W. The New Faces of Privacy. 9(3), 1993.
|
||
|
||
Soe, L.L., Markus, M.L. Technological or social utility?
|
||
Unraveling explanations of email, vmail, and fax use. 9(3),
|
||
1993.
|
||
|
||
Orlikowski, W.J. Learning from Notes: organizational issues in
|
||
groupware implementation. 9(3), 1993.
|
||
|
||
Katz, J.E. and Hyman, M.H. Dimensions of concern over telecom
|
||
privacy in the United States. 9(3), 1993.
|
||
|
||
Chen, Z. Intelligence and discovery in an information society: an
|
||
essay in memory of Derek de Solla Price. 9(3), 1993.
|
||
|
||
Allen, J.P. Review of "Microcomputers in African development:
|
||
critical perspectives". 9(3), 1993.
|
||
|
||
=====================
|
||
|
||
Camp, L. Jean and J.D. Tygar. 1994. "Providing Auditing While
|
||
Protecting Privacy." The Information Society. 10(1):59-71.
|
||
|
||
Clarke, Roger. 1994. "Electronic Support for the Practice of
|
||
Research." The Information Society.10(1):25-42.
|
||
|
||
Lind. Mary, R. and Robert W. Zmud. 1994. "Employee
|
||
Information Processing Behaviors Before and After a
|
||
Corporate Downsizing." The Information Society. 10(1):43-58.
|
||
|
||
Webster, Frank. 1994. "What Information Society?" The
|
||
Information Society. 10(1):1-24.
|
||
|
||
Agre, Philip E. 1994. "Surveillance and Capture: Two Models of
|
||
Privacy." The Information Society. 10(2):101-128.
|
||
|
||
Agre, Philip E. 1994. "Understanding the Digital Individual." The
|
||
Information Society. 10(2):73-76.
|
||
|
||
Allen, Jonathan P. 1994. "Mutual Control in the Newly Integrated
|
||
Work Environments." The Information Society. 10(2):129-138.
|
||
|
||
Clarke, Roger. 1994. "The Digital Persona and Its Application to
|
||
Data Surveillance." The Information Society. 10(2):77-92.
|
||
|
||
Hill, William C. and James D. Hollan. 1994. "History-Enriched
|
||
Digital Objects: Prototypes and Policy Issues." The
|
||
Information Society. 10(2):139-145.
|
||
|
||
Kilger, Max. 1994. "The Digital Individual." The Information
|
||
Society. 10(2):93-100.
|
||
|
||
Chartrand, Robert Lee and Robert C. Ketcham. 1994.
|
||
"Opportunities for the Use of Information Resources and
|
||
Advanced Technologies in Congress: A Study for the Joint
|
||
Committee on the Organized Congress." (A Consultant
|
||
Report). The Information Society. 10(3):181-222.
|
||
|
||
Kling, Rob. 1994. "Reading "All About" Computerization: How
|
||
Genre Conventions Shape Nonfiction Social Analysis." The
|
||
Information Society. 10(3):147-172.
|
||
|
||
Wilson, Francis A. and John N. Wilson. 1994. "The Role of
|
||
Computer Systems in Organizational Decision Making." The
|
||
Information Society. 10(3):173-180.
|
||
|
||
Fogelman, Martin. 1994. "Freedom and Censorship in the
|
||
Emerging Electronic Environment." The Information Society.
|
||
10(4):295-303.
|
||
|
||
Kraemer, Kenneth L., Dedrick, Jason and Sheryl Jarman. 1994.
|
||
"Supporting the Free Market: Information Technology Policy
|
||
in Hong Kong." The Information Society. 10(4):223-246.
|
||
|
||
Lee, Laurie Thomas and Robert LaRose. 1994. "Caller ID and the
|
||
Meaning of Privacy." The Information Society. 10(4):247-266.
|
||
|
||
Mowshowitz, Abbe. 1994. "Virtual Organization: A Vision of
|
||
Management in the Information Society." The Information
|
||
Society. 10(4):267-288.
|
||
|
||
Walsham, Geoff. 1994. "Virtual Organization: An Alternative
|
||
View." The Information Society. 10(4):289-292.
|
||
|
||
Mowshowitz, Abbe. 1994. "Reply to Walsham's Critique." The
|
||
Information Society. 10(4):293-294.
|
||
|
||
|
||
EDITORIAL BOARD
|
||
(partial listing, 7/5/95)
|
||
|
||
Phil Agre Department of Communications
|
||
University of California, San Diego
|
||
Jonathan Allen Department of Engineering
|
||
Cambridge University (UK)
|
||
Tora Bikson RAND Corporation
|
||
Santa Monica, Ca
|
||
Geoffrey Bowker Library and Information Science
|
||
University of Illinois, Urbana
|
||
Christine Borgman Library and Information Science
|
||
University of California, Los Angeles
|
||
Lewis Branscomb Kennedy School of Government
|
||
Harvard University
|
||
Su-Shing Chen Information Technology and
|
||
Organizations
|
||
National Science Foundation
|
||
Andrew Clement Faculty of Information Studies
|
||
University of Toronto
|
||
Karen Coyle Department of Library Automation
|
||
University of California
|
||
Mary Culnan Department of Information Systems
|
||
Georgetown University
|
||
Batya Friedman Department of Computer Science
|
||
Colby College
|
||
Vijay Gurbaxani Graduate School of Management
|
||
University of California, Irvine
|
||
Suzanne Iacono Department of Information Systems
|
||
Boston University
|
||
Pertti Jarvinen Department of Information Systems
|
||
University of Tampere (Finland)
|
||
Kenneth Kraemer Center for Research on IT and
|
||
Organizations and
|
||
Graduate School of Management
|
||
University of California, Irvine
|
||
Gary T. Marx Department of Sociology
|
||
University of Colorado, Boulder
|
||
Richard O. Mason School of Management
|
||
Southern Methodist University
|
||
Mark Poster Department of History
|
||
University of California, Irvine
|
||
Marc Rotenberg Electronic Privacy Information Clearinghouse
|
||
Washington, DC
|
||
Jorge Schement School of Communication
|
||
Rutgers University
|
||
Doug Schuler Computer Professionals for Social
|
||
Responsibility
|
||
Seattle, Wa
|
||
Rick Weingarten Computing Research Association
|
||
Washington, DC
|
||
Rolf Wigand School of Information Studies
|
||
Syracuse University
|
||
SUBMITTING A PAPER
|
||
|
||
Please send five copies of each manuscript to the Editor-in-Chief.
|
||
|
||
|
||
For manuscript format details (double spaced, single sided, etc.),
|
||
contact the Editor-in-Chief, see the inside back cover of an issue
|
||
of the journal or read the instructions file on the journal's web
|
||
page:(URL http://www.ics.uci.edu/~kling/tis.html).
|
||
|
||
(Note: TIS can accept some manuscipts via electronic submission.
|
||
But this must be done with the permission and in coordination
|
||
with the Editor-in-Chief, to insure that the electronic mansucsript
|
||
exchange will be workable).
|
||
|
||
Editor-in-chief:
|
||
Professor Rob Kling
|
||
Center for Research on
|
||
Information Technology and Organizations
|
||
320 Berkeley Place
|
||
University of California, Irvine
|
||
Irvine, Ca 92717-4650
|
||
tel: (714) 824-5160 fax: (714)824-8096
|
||
email - internet: kling@ics.uci.edu http://www.ics.uci.ed
|
||
u/~kling
|
||
|
||
To subscribe, the following form may be clipped and mailed to the
|
||
address below:
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
THE INFORMATION SOCIETY
|
||
Published quarterly, ISSN 0197-2243
|
||
|
||
___ Please enter my institutional subscription to Volume 11
|
||
(1995) at US$99
|
||
___ Please enter my personal subscription to Volume 11
|
||
(1995) at US$49
|
||
___ Please send me a free sample copy
|
||
|
||
Payment options:
|
||
|
||
___Check/Money Order Enclosed (please make checks payable
|
||
to Taylor & Francis, in U.S. funds only)
|
||
___ Please charge my: ___ VISA __ MC ___ Amex
|
||
|
||
Card # ________________________________ Exp date: __
|
||
Signature: ________________________________________
|
||
Telephone: ____________________________________
|
||
(required for credit card purchases)
|
||
|
||
or BILL TO: (please print)
|
||
|
||
Name ____________________________________________
|
||
Institution__________________________________________
|
||
Address______________________________________________
|
||
City_________________________________________________
|
||
State ____________________ Zip _______________
|
||
|
||
SHIP TO (if different):
|
||
|
||
Name_________________________________________________
|
||
Institution __________________________________________
|
||
Address ______________________________________________
|
||
City _________________________________________________
|
||
State _______________________ Zip _______________
|
||
|
||
Mail this form to: Taylor & Francis Inc.
|
||
1900 Frost Road, Suite 101
|
||
Bristol PA 19007-1598
|
||
toll free: 1-800-821-8312
|
||
or fax: 1-215-785-5515
|
||
|
||
|
||
Outside the U.S. contact: Taylor & Francis Ltd.
|
||
Rankine Road
|
||
Basingstoke, Hampshire
|
||
RG24 0PR, United Kingdom
|
||
tel: +44 (0) 256 840366
|
||
fax: +44 (0) 256 479438
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
||
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
Subject: File 8--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically.
|
||
|
||
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
||
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115, USA.
|
||
|
||
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
||
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
CuD is also available via Fidonet File Request from
|
||
1:11/70; unlisted nodes and points welcome.
|
||
|
||
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
||
In ITALY: Bits against the Empire BBS: +39-464-435189
|
||
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
||
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
||
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
||
|
||
The most recent issues of CuD can be obtained from the
|
||
Cu Digest WWW site at:
|
||
URL: http://www.soci.niu.edu:80/~cudigest/
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #7.61
|
||
************************************
|
||
|