Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
The Computer Underground - Online Term Paper

The Computer Underground


Department of Sociology
Northern Illinois University
DeKalb, IL 60115
(5 March, 1990)


THE BAUDY WORLD OF THE BYTE BANDIT:
A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND


An earlier version of this paper was presented at the American
Society of Criminology annual meetings, Reno (November 9, 1989). Authors
are listed in alphabetical order. Address correspondence to Jim Thomas. We
are indebted to the numerous anonymous computer underground participants
who provided information. Special acknowledgement goes to Hatchet Molly,
Jedi, The Mentor, Knight Lightning, and Taran King.

ABSTRACT

...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

of both the
nature of the acts and their broader relationship to the culture in which
they occur. This has occured with the criminalization of computer
phreaking and hacking. In this paper, we examine the computer underground
as a cultural, rather than a deviant, phe- nomenon. Our data reveal the
computer underground as an invisi- ble community with a complex and
interconnected culture, depen- dent for survival on information sharing,
norms of reciprocity, sophisticated socialization rituals, and an explicit
value sys- tem. We suggest that the dominant image of the computer under-
ground as one of criminal deviance results in a failure to appre- ciate
cultural meaning. We conclude by arguing that there are characteristics
of underground activity that embrace a postmoder- nist rejection of
conventional culture.


- ii -



THE BAUDY WORLD OF THE BYTE BANDIT:
A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND Hackers ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

such
behaviors. "Computer deviants" provide one example of a criminalized type
of "lifestyle politics."

The proliferation of computer technology has been accompa- nied by
the growth of a computer underground (CU), often mistak- enly labeled
"hackers," that is perceived as criminally deviant by the media, law
enforcement officials, and researchers. Draw- ing from ethnographic data,
we offer a cultural rather than a criminological analysis of the
underground by suggesting that it reflects an attempt to recast, re-
appropriate, and reconstruct the power-knowledge relationship that
increasingly dominates the ideology and actions of modern society. Our
data reveal the com- ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

The Computer Underground. (2004, August 15). Retrieved December 22, 2024, from http://www.essayworld.com/essays/The-Computer-Underground/12684
"The Computer Underground." Essayworld.com. Essayworld.com, 15 Aug. 2004. Web. 22 Dec. 2024. <http://www.essayworld.com/essays/The-Computer-Underground/12684>
"The Computer Underground." Essayworld.com. August 15, 2004. Accessed December 22, 2024. http://www.essayworld.com/essays/The-Computer-Underground/12684.
"The Computer Underground." Essayworld.com. August 15, 2004. Accessed December 22, 2024. http://www.essayworld.com/essays/The-Computer-Underground/12684.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 8/15/2004 09:27:12 AM
Category: Computers
Type: Premium Paper
Words: 10572
Pages: 39

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» The Computer Underground
» The Computer Underground.
» Computer Software Piracy And It...
» The Future Of Computer Crime In...
» Hackers
» Computer Crime
» Computer Crimes: Laws Must Be P...
» Computer Crime In The 90's
» William Gibson And The Internet
» Computer Crime
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved