home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Thu Aug 26 1993 Volume 5 : Issue 66
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Ediot: Etaoin Shrdlu, III
-
- CONTENTS, #5.66 (Aug 26 1993)
- File 1--SPECIAL ISSUES ON BIBLIOS AND RESOURCES
- File 2--Computerization & Controversy (Biblio Resource)
- File 3--40Hex is now a print magazine
- File 4--"In a Different Format" (Review of gender/comp thesis)
- File 5--"Smoking Dope on IRC--Play/Performance in Cyberspace"
- File 6--Classifying Grad Theses & Dissertations as "private?"
- File 7-- O'Reilly Internet Information Service
- File 8--"The Internet Letter"--Internet's First Commercial Digest
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
- etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 26 Aug 1993 23:12:45 CDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 1--SPECIAL ISSUES ON BIBLIOS AND RESOURCES
-
- CuD has been a bit remiss this year in running bibliographic items and
- research-related resources for scholars and others studying
- Techno/computer-culture. Over the next two weeks, we will run several
- special issues, beginning with this one, listing bibliographic items
- and summarizing resources that might be of interest to researchers. We
- will try to keep the bulk of the items confined to the special issues
- so that those who are not interested in such things can delete the
- entire issue.
-
- As some know, CuD also tries to keep track of student theses and
- dissertations related to computer culture. If you know of grad student
- works broadly related to computer culture, please let us know so that
- we can add them to our files and, on occasion, put folks in contact
- with each other. We're also interested in receiving copies of
- completes works (articles, conference papers, conference transcripts)
- that we can place in the ftp archives.
-
-
- ------------------------------
-
- Date: Sat, 14 Aug 1993 15:17:11 -0700
- From: Rob Kling <kling@ICS.UCI.EDU>
- Subject: File 2--Computerization & Controversy (Biblio Resource)
-
- Computerization and Controversy:
- Value Conflicts and Social Choices
-
- Charles Dunlop and Rob Kling (Editors)
- Univ. of Michigan - Flint Univ. of California - Irvine
-
- Many students, professionals, managers, and laymen are hungry for
- honest, probing discussions of the opportunities and problems of
- computerization. This anthology introduces some of the major social
- controversies about the computerization of society. It highlights some
- of the key value conflicts and social choices about computerization.
- It helps readers recognize the social pro-cesses that drive and shape
- computerization, and to understand the paradoxes and ironies of
- computerization
-
- Some of the controversies about computerization covered in this
- collection include:
- * the appropriateness of utopian and anti-utopian scenarios
- for understanding the future
- * whether computerization demonstrably improves the
- productivity of organizations
- * how computerization transforms work
- * how computerized systems can be designed with social
- principles in view
- * whether electronic mail facilitates the formation of new
- communities or undermines intimate interaction
- * whether computerization is likely to reduce privacy and
- personal freedom
- * the risks raised by computerized systems in health care
- * the ethical issues when computer science researchers accept
- military funding
- * the extent to which organizations, rather than "hackers,"
- are significant perpetrators of computer abuse
-
- The authors include Paul Attewell, Carl Barus, Wendell Berry, James Beninger, Jo
- hn Bennett*, Alan Borning, Niels Bjorn-Anderson*, Chris
- Bullen*, Roger Clarke, Peter Denning, Pelle Ehn, Edward Feigenbaum, Linda Garcia
- , Suzanne Iacono, Jon Jacky*, Rob Kling, Kenneth
- Kraemer*, John Ladd, Kenneth Laudon, Pamela McCorduck, Jan Mouritsen, David Parn
- as, Judith Perrolle*, James Rule, John Sculley, John
- Shattuck, Brian Smith, Clifford Stoll, Lindsy Van Gelder, Fred Weingarten, Josep
- h Weizenbaum, and Terry Winograd.
- (*'d authors have contributed new essays for the book.)
-
- Each of the seven sections opens with a 20 page analytical essay
- which identifies major controversies and places the articles in
- the context of key questions and debates. These essays also point
- the reader to recent additional research and debate about the
- controversies.
-
- Published by Academic Press (Boston). 758 pp. 1991. $39.95
- (North America)
-
- ISBN: 0-12-224356-0 Phone: 1-800-321-5068 Fax: 1-800-235-0256
-
- See Below for Ordering Information
-
-
- 8/18/91
-
- To Order
- Computerization and Controversy:
- Value Conflicts and Social Choices
- by Charles Dunlop and Rob Kling (Editors)
-
- In North America
-
- Individuals may purchase copies directly from Academic Press for
- $39.95 + tax and shipping by calling 1-800-321-5068, faxing 1-800-235-0256
- or by writing to:
-
- Academic Press Ordering
- Academic Press Warehouse
- Order Dept.
- 465 S. Lincoln
- Troy, Missouri 63379
-
- Faculty who offer courses about social issues in computing may order
- examination copies from Academic Press. Write on university letterhead
- or enclose a business card, and include the following information
- about your course: class name and number, department, # of students,
- books used in the past, adoption deadline. Send your requests for
- examination copies to:
-
- Amy Yodannis
- College and Commercial Sales Supervisor
- Academic Press
- 1250 Sixth Avenue
- San Diego, CA 92101
- Tel: 619-699-6547 Fax: 619-699-6715
-
-
- Outside North America
-
- Please contact your local Academic Press/Harcourt Brace Jovanovich office,
- including:
-
- Harcourt Brace Jovanovich, Ltd (Western Europe and UK)
- 24-28 Oval Rd.
- London NW1 7DX U.K.
- Telephone: 44-71-267-4466 Fax: 44-71-482-2293
- Telex: 25775 ACPRESS G Cable: ACADINC LONDON NW1
-
- Harcourt Brace Jovanovich Group Pty, Ltd
- (Australia/New Zealand)
- Locked bag 16
- Marrickville, NSW 2204 Australia
- Telephone: (01) 517-8999 Fax: (02) 517-2249
-
- Harcourt Brace Jovanovich Japan Inc.
- Ichibancho Central Bldg
- 22-1 Ichibancho,
- Chiyoda Ku, Tokyo 102 Japan
-
- ------------------------------
-
- Subject: File 3--40Hex is now a print magazine
- From: fortyhex (geoff heap)
- Date: Mon, 16 Aug 93 17:19:02 EDT
-
- 40Hex, the world's most popular underground virus magazine is now
- available in two versions -- the familiar online magazine and a new
- printed magazine.
-
- In the past two and a half years, 40Hex has become the most popular
- virus magazine in the underground. The new printed magazine (dubbed
- 40Hex Hardcopy) is intended for anyone who wishes to learn as much as
- they can about computer viruses -- from the source, the virus writers.
-
- Each issue will contain --
-
- o A complete virus disassembly, fully commented in the 40Hex
- tradition,
-
- o Detailed programming articles, intended for those fluent in
- assembly,
-
- o Introductory articles intended to help those on all levels of
- ability, and
-
- o Interviews with virus writers and virus researchers.
-
- Also included is an editorial column, which will provide a forum
- for discussions about any virus related issue. Submissions from both
- sides of the argument are welcome, and will be given an equal voice.
-
-
- Subscriptions --
-
- The price for 40Hex Hardcopy is $35 per year for individuals, $50 per
- year for corporations. The magazine is bimonthly (six issues per year).
-
- The online magazine is available free of charge from many privately
- operated BBSs. You may receive a disk with the latest issue from us for
- $5. Please send a note specifying whether you would like a 5 1/4 or a 3
- 1/2 inch disk.
-
-
- Correspondence --
-
- Subscription requests should be addressed to
- Subscriptions
- 40Hex Magazine
- PO Box 252
- New City, NY, 10956
-
- Article submissions should be addressed to
- Articles
- 40Hex Magazine
- PO Box 252
- New City, NY, 10956
-
- Letters to the editors should be addressed to
- The Editors
- 40Hex Magazine
- PO Box 252
- New City, NY, 10956
-
- if you have access to internet E-Mail, you can send a note to
- fortyhex@mindvox.phantom.com
-
-
- note: manuscripts will not be returned to the sender unless they are
- accompanied by postage. All submissions must be marked "manuscript
- submitted for publication."
-
-
- The online magazine will still be published, and will remain
- separate from the new hardcopy magazine with no article overlap.
-
-
- +++
-
- Leni Niles
- Co-Editor, 40Hex Hardcopy
-
- ------------------------------
-
- Date: Sun, 22 Aug 1993 00:58:08 -0400 (EDT)
- From: sabina@CNS.NYU.EDU(sabina)
- Subject: File 4--"In a Different Format" (Review of gender/comp thesis)
-
- Review of IN A DIFFERENT FORMAT: CONNECTING WOMEN, COMPUTERS, AND
- EDUCATION USING GILLIGAN'S FRAMEWORK
- (Author: Joan Carmeichael; A Thesis in the Department of
- Educatinal Studies, Concordia University, Montreal, Quebec,
- Canada, January, 1991.
- Reviewed by Sabina Wolfson, New York University
-
- In reference to women's different voice, Ada
- Lovelace draws on woman's experience and woman's
- `voice' to describe an abstract mathematical process
- by using a weaving analogy: "We may say most aptly
- that the Analytical Engine weaves algebraic patterns
- just as the Jacquard-loom waves flowers and
- leaves." This quote does not mean that only women
- were weavers, but that perhaps only a woman would
- compare algebra to flowers (Carmeichael, 1991).
-
- Joan Carmeichael's _In a Different Format: Connecting women, computers
- and education using Gilligan's framework_ presents a new way of
- viewing women, computers, and education based on Carol Gilligan's
- conceptual framework. Gilligan's framework is an ethic of caring --
- a interconnected web of concepts based on cooperation, relationships,
- responsibility, and networking rather than, as is customary in a
- framework of morality, separation and competition.
-
- The first and last section of Carmeichael's thesis focus specifically
- on Gilligan's framework and Carmeichael's application of it, while the
- rest of the thesis provides a broad(?) and and thoughtful historical
- reviews of women & technology, women & science, and women & education.
- These historical reviews substantiate Carmeichael's suggestion that
- "women are not equal participants and do not heave equal power in the
- hierarchally organised industrial workplace, nor will they
- automatically become equal partners in the new information workplace
- based on computers." This lack of equal power is examined through
- historial reviews of women & science, women & technology, and women &
- education.
-
- * Women & science presents four women scientists, their work, and the
- problems they faced, followed by a review of modern science, the male
- bias of science, and how women have been and continue to be excluded.
-
- * Women & technology discusses the rise of computers and the
- Information Age, the myth that computers are `boy's toys', and how
- Gilligan's framework can be applied to technological developments and
- how new technology will be used.
-
- * Women and education discusses the problems girls and women face
- within the education system, the introduction of computers into
- schools, how mathematics is used as a `critical filter' limiting
- women's access to computers and science in general. Carmeichael also
- examines the attitudes held about women and by women: that "male
- experience is...the norm, the yardstick against which any female
- experience that is different is found to be deviant",the `we can, but
- I can't' paradox, and others.
-
- Bringing together history, computers, and women, Carmeichael writes:
-
- Women have been working with technology in the workplace
- for over a hundred years. The first technological
- revolution in the office took place from 1880 to 1920 and
- saw the development and consolidation of the mechanical
- office and the entry of large numbers of women into the
- paid-labour force. In the then newly organized office,
- women could hold clerical jobs - new, deskilled positions
- - as long as it was clear they could not advance to
- managerial positions. There are two lessons to be
- learned from the first technological revolution. One is
- that the feminization of office work did not change
- women's position in society, and, secondly, there is no
- automatic liberating quality to new technology. (Bernard,
- 1984)
-
- Carmeichael concluded her thesis by discussing how Gilligan's
- framework can be applied to education and the work place. Carmeichael
- suggests that the traditional teaching style generally reflects a
- `boy's style' of learning rather than a typically `girl's style' of
- learning (based on cooperation and inclusion). " When we continue to
- use strategies and classroom techniques predicated on competition
- rather than cooperation, we preserve a macho perspective and fail to
- view females on their own terms." (Lewis, 175 cited in Carmeichael,
- 1991) In the workplace, Gilligan's framework can be applied by move
- away from a hierarchical workplace towards a workplace of cooperation
- (teams, networks, etc.) which is a viable alternative particularly in
- an information-intensive environment.
-
- Overall Carmeichael's thesis provides a strong(?) historical look at
- women and science/technology/computers/education. Carmeichael's use
- of Gilligan's framework "fits" into the history she presents, but no
- empirical research was conducted.
-
- An aspect of woman and computing that Carmeichael did not discuss, but
- which would fit in well with her thesis, is women and computer
- mediated communication (CMC). An emphasis on cooperation and
- inclusion has been identified by Dehorah Tannen as a more typically
- female method of verbal communication, and Susan Herring's research
- suggests that this method of communication might persist into CMC.
- Herring research suggests, as Carmeichael noted, that new technology
- doesn't alter established inequalities:
-
- Rather than being democratic, academic CMC is power-based
- and hierarchical. This state of affairs cannot however
- be attributed to the influence of computers communication
- technology; rather, it continues pre-existing patterns of
- hierarchy and lame dominance in academic more generally,
- and in society as a whole."
-
- On the other hand, some research does suggest a egalitarianism in CMC.
- Egalitarianism is only part of democratization. Democratization also
- implies equal access to computers and no prevention (internal or
- external coercion) of participation in discussions. There is much
- research to suggest that neither of these requirements are met.
- However, egalitarianism simply implies that, once individual are
- participating in discussion, they do so equally. In my ongoing
- research, examining gender differences and similarities in Usenet
- postings, it appears that CMC is egalitarian. Specifically, my
- research suggests that:
-
- (1) The average woman and man post a similar number of
- articles.
- (2) The average woman and man post articles of similar
- length.
- (3) The ratio of overall participation by gender (7% for
- women and ??% for men) appears to be similar to the
- ratio of new topic initiators by gender. In addition,
- the amount of "follow up" discussion does not appear to
- correlate with the gender of the topic initiator.
-
- Thus, in the public aspects of Usenet, discussions appear to be
- egalitarian, though, since women only post 7% of the articles, Usenet
- is clearly not democratizing.
-
- ------------------------------
-
- Date: Mon, 23 Aug 1993 22:40:09 +200 (WET)
- From: brenda danet <msdanet@PLUTO.CC.HUJI.AC.IL>
- Subject: File 5--"Smoking Dope on IRC--Play/Performance in Cyberspace"
-
- ((MODERATORS' NOTE: The following is excerpted from a longer paper
- that will be available from the CuD archives soon. The authors
- feedback on the project)).
-
- +++++
-
- "SMOKING DOPE" ON INTERNET RELAY CHAT: A CASE STUDY OF PLAY AND
- PERFORMANCE IN A TEXTUAL CYBERSPACE
-
- Brenda Danet, Hebrew University of Jerusalem
- <msdanet@pluto.cc.huji.ac.il>
- Yehudit Rosenbaum-Tamari, Hebrew University of Jerusalem
- <ksuyr@hujivm1>
- Lucia Ruedenberg, New York University
- <ruednbrg@ACFcluster.NYU.EDU>
-
- Like Richard Schechner (1988) we believe that play, not "work" or
- "serious real life," is the ground of all of the multiple realities
- (Schutz, 1977) in which we live. We are rediscovering this basic fact
- of human existence in postmodern times: computers and
- computer-mediated communication offer new possibilities for play, and
- are altering common-sense perceptions of what constitutes "play" and
- "work." We may be reverting from a stage in the history of play in
- which leisure has been demarcated as a separate sphere of life
- (Turner, 1974, 1986), to one in which the "playful" and the "serious"
- are intertwined in ways which at least partially resemble those of
- traditional cultures.
-
- Playfulness is a prominent feature of hacker culture (Raymond, 1991;
- Barlow, 1990; Meyer and Thomas, 1990), and of computerized writing of
- all kinds. Its prominence grows as we move from basic word-processing
- of author-absent texts (Heim, 1987; Bolter, 1991), to interactive
- fiction, or hypertext (Delany and Landow, 1991; Bolter, 1991, chap.
- 8), and electronic mail and discussion groups (Danet and Ruedenberg,
- 1992), to interactive modes (Blackman and Clevenger, 1990; Reid, 1991;
- Rosenbaum-Tamari, 1993; Curtis, 1992), in which writing is most
- intensively experienced as "talking," and the distinction between
- process and product of communication breaks down
- (Kirshenblatt-Gimblett, 1976, Introduction).
-
- We are engaged in a case study of "deep play" (Geertz, 1972, 1991) on
- Internet Relay Chat (IRC), in which the participants simulate *smoking
- marihuana.* To borrow the title of a book by Victor Turner (Turner,
- 1967), the text we analyze is a "forest of typographic symbols." Our
- approach textual and micro-sociolinguistic, and draws heavily on the
- anthropology of play and performance.
-
- This interaction is a form of play because (1) it offers a "flow
- experience" fusing action and awareness (Csikszentmihalyi, 1977); (2)
- it is dominated by the frame of "make-believe" (Bateson, 1972;
- Goffman, 1974; Handelman, 1976); and thus (3) takes place in the
- subjunctive mode of possibility and experimentation (Turner, 1974,
- 1986), thereby reducing accountability for action (Handelman, 1976;
- Honigmann, 1977; Ben-Ari, 1989). Like sports and other forms of
- competitive play such as verbal dueling (Huizinga, 1955; Abrahams,
- 1973; Dundes, 1970; Labov, 1972; Gossen, 1976), this sequence also
- contains prominent elements of contest, or competition in the
- demonstration of skill (Huizinga, 1955; Caillois, 1961). Among the
- features fostering playfulness are the medium's ephemerality, speed,
- and near-instant interactivity (Rafaeli, 1988), the masking of
- identity (Kiesler, et al,, 1984; Blackman and Clevenger, 1990;
- Honigmann, 1977), the influence of hacker culture (Raymond, 1991), and
- the frontier-like quality of cyberspace (Barlow, 1990; Meyer and
- Thomas, 1990; Melbin, 1987)--not only fully three-dimensional
- cyberspace (Benedikt, 1991; Rheingold, 1992; Lanier and Biocca, 1992)
- but even "primitive," two-dimensional textual cyberspace.
-
- Features previously thought to characterize oral, as opposed to
- written, performance, are strikingly in evidence, even in some
- non-synchronous modes of computer-based writing, but *especially* in
- synchronous ones (Bolter, 1991: 59). Verbal and typographic art are
- important; communication is highly stylized (Reid, 1991). Participants
- are conscious of their audience and pay special attention to the
- display of communicative competence, to how their messages are
- packaged (Bauman, 1975). Thus, the poetic function of communication is
- dominant (Jakobson, 1960). The need to say in writing what we have
- been used to saying in speech calls attention to the communicative
- means employed in formulating the message. The reduced transparency
- of language heightens meta-linguistic awareness, and leads us to treat
- graphic symbols as objects and to play with them (Cazden, 1976).
-
- In our analysis, we identify and describe an extraordinarily rich
- variety of forms of play with identity, language, and typography, as
- well as with the frames of interaction themselves. Play is at its
- deepest and most complex when the participants not only simulate
- smoking marihuana but communicate messages about the virtuosity of
- their performance. They struggle to create a sense of "place," despite
- the abstractness of cyberspace, simulate experiences of all the five
- senses, and luxuriate in playing with the forbidden.
-
- In the last chapter of the monograph we discuss play on IRC as a
- newly emerging form of popular culture. We compare it to jazz,
- graffiti, comics, and improvisational theater. We elaborate on Mark
- Poster's claim that "computer writing is the quintessential postmodern
- linguistic activity" (Poster (1990: 128). Analysts of hacker culture
- see hackers as pioneering explorers at the normative edge of society,
- rather than dangerous anarchists (Barlow, 1990; Meyer and Thomas,
- 1990). Similarly, we see participants on IRC as pioneers exploring a
- new communicative frontier, rather than immature computer science
- students wasting institutional resources by "fooling around" when they
- should be "working."
-
- REFERENCES
-
- Abrahams, Roger D. 1973. Playing the Dozens. In Mother Wit from the
- Laughing Barrel: Readings in the Interpretation of Afro-American
- Folklore. Ed. Alan Dundes, 295-309. Englewood Cliffs, NJ.
-
- Barlow, John. 1990. Crime and Puzzlement. Electronic manuscript, also
- published in Whole Earth Review, 1990, 45-57.
-
- Bateson, Gregory. 1972. A Theory of Play and Fantasy. In Steps to An
- Ecology of Mind. Ed. Gregory Bateson, 177-193. New York: Ballantine.
-
- Ben-Ari, Eyal. 1989. Masks and Soldiering: the Israeli Army and the
- Palestinian Uprising. Cultural Anthropology 4, 4: 372-389.
-
- Benedikt, Michael, Editor. 1991. Cyberspace: First Steps. Cambridge,
- MA: M.I.T.
-
- Blackman, Bernard I., and Theodore Clevenger, Jr. 1990. On-Line
- Computer Messaging: Surrogates for Nonverbal Behavior. Paper presented
- at the International Communication Association, Dublin, Ireland, June
- 24-29, 1990.
-
- Bolter, Jay David. 1991. Writing Space: the Computer, Hyptertext, and
- the History of Writing. Hillsdale, NJ: Lawrence Erlbaum.
-
- Caillois, Roger. 1961. Man, Play and Games. Glencoe, IL: Free Press.
-
- Cazden, Courtney B. 1976. Play with Language and Meta-linguistic
- Awareness: One Dimension of Language Experience. Play--Its Role in
- Development and Evolution. Ed. Jerome S. Bruner, Elison Jolly and
- Kathy Sylva, 603-608. New York: Penguin.
-
- Csikszentmihalyi, Mihalyi. 1977. Beyond Boredom and Anxiety. San
- Francisco: Jossey-Bass.
-
- Curtis, Pavel. 1992. Mudding: Social Phenomena in Text-Based Virtual
- Realities. Intertrek 3, no. 3: 26-34.
-
- Danet, Brenda, and Lucia Ruedenberg. 1992. "Smiley" Icons: Keyboard
- Kitsch or New Communication Code? Paper presented at the Annual
- Meeting, American Folklore Society, Jacksonville, Florida, October,
- 1992.
-
- Geertz, 1991 [1972]. Deep Play. In Rethinking Popular Culture. Chandra
- Mukerji and Michael Schudson, eds., pp.239-277. Berkeley: University
- of California Press. Reprinted from Daedelus, 101, 1, 1972.
-
- Goffman, Erving. 1974. Frame Analysis: An Essay on the Organization of
- Experience. New York: Harper & Row.
-
- Gossen, Gary H. 1976. Verbal Dueling in Chamula. In Speech Play:
- Research and Resources for the Study of Linguistic Creativity. Ed.
- Barbara Kirshenblatt-Gimblett, pp.121-146. Philadelphia: University
- of Pennsylvania Press.
-
- Handelman, Don. 1976. Play and Ritual: Complementary Frames of
- Meta-Communication. In It's a Funny Thing, Humour. Ed. A.J. Chapman
- and H. Foot, pp. 185-192. London: Pergamon.
-
- Heim, M. 1987. Electric Language: A Philosophical Study of Word
- Processing. New Haven: Yale University Press.
-
- Honigmann, John. 1977. The Masked Face. Ethos 5: 263-280.
-
- Huizinga, Jan. 1955. Homo Ludens. Boston: Beacon.
-
- Kiesler, Sara, J. Siegel, and T.W. McGuire. 1984. Social Psychological
- Aspects of Computer-mediated Communication. American Psychologist 39:
- 1123-1134.
-
- Kirshenblatt-Gimblett, Barbara, Editor. Speech Play: Research and
- Resources for the Study of Linguistic Creativity. Philadelphia:
- University of Pennsylvania Press.
-
- Labov, William. 1972. Rules for Ritual Insults. Studies in Social
- Interaction. Ed. David Sudnow, 120-169. New York: Macmillan.
-
- Lanier, Jaron, and Frank Biocca. 1992. An Insider's View of the Future
- of Virtual Reality. Special issue on "Virtual Reality: A Communication
- Perspective," Ed. Frank Biocca. Journal of Communication 42, no. 4:
- 150-172.
-
- Melbin, Murray. 1987. Night as Frontier. New York: Free Press.
-
- Meyer, Gordon, and Jim Thomas. 1990. The Baudy World of the Byte
- Bandit: a Postmodernist Interpretation of the Computer Underground.
- Electronic manuscript; also published in F. Schmalleger, ed.,
- Computers in Criminal Justice, Bristol, Indiana: Wyndham Hall, 1990,
- pp. 31-67.
-
- Poster, Mark. 1990. The Mode of Information: Poststructuralisms and
- Contexts. Chicago: University of Chicago Press.
-
- Rafaeli, Sheizaf. 1988. Interactivity: from New Media to
- Communication. Sage Annual Reviews of Communication Research, vol. 16,
- Ed. Robert B. Pawkins, John M. Wiemann, and Suzanne Pingree, Advancing
- Communication Science: Merging Mass and Interpersonal Processes, pp.
- 110-133. Beverly Hills, CA: Sage.
-
- Raymond, Eric S., Editor. 1991. The New Hackers' Dictionary. With
- assistance and illustrations by Guy L. Steele, Jr. Cambridge, MA:
- M.I.T. Press.
-
- Reid, Elizabeth. 1991. Electropolis: Communication and Community on
- Internet Relay Chat. Adapted from a B.A. Honors thesis, Dept. of
- History, University of Melbourne, Australia. Electronic manuscript.
-
- Rosenbaum-Tamari, Yehudit. 1993. Play, Language and Culture in
- Computer-Mediated Communication. Ph.D. dissertation proposal, Dept. of
- Sociology & Anthropology, Hebrew University of Jerusalem.
-
- Schechner, Richard. 1988. Playing. Play and Culture 1, 3: 3-19.
-
- Schutz, Alfred. 1977. Multiple Realities. Rules and Meanings. Ed.
- Mary Douglas, pp. 227-231. Hammondsworth, Middlesex: Penguin.
-
- Turner, Victor. 1967. The Forest of Symbols. Ithaca: Cornell
- University Press.
-
- ______________. 1974. From Liminal to Liminoid: An Essay in
- Comparative Symbology. Rice University Studies 60: 53-92.
-
- ______________. 1986. The Anthropology of Performance. New York: PAJ
- Publications.
-
- ------------------------------
-
- Date: Tue, 24 Aug 1993 13:49:43 CDT
- From: Trudy McCarty <tmccarty@LEO.VSLA.EDU>
- Subject: File 6--Classifying Grad Theses & Dissertations as "private?"
-
- Date--Mon, 23 Aug 1993 14:18:00 EDT
- From--LISA BODENHEIMER <BODENHL%CLEMSON.BITNET@UBVM.cc.buffalo.edu>
- Subject--Interesting news story
- Originally from--AUTOCAT <AUTOCAT@UBVM.cc.buffalo.edu>
-
- In yesterday's Greenville (S.C.) News, there was an article with the
- headline "New interpretation says theses are records, not research
- tools." To quote from the article:
-
- "The Federal Department of Education has ruled that master's and
- doctoral theses--research papers normally bound and put on the shelves
- at schools nationwide--are student 'educational records,' much like
- grade reports. That means that they can not be checked out of
- libraries, sent to faraway researchers, or called up through computer
- databases without the author's permission, the News & Observer of
- Raleigh (N.C.) reported."
-
- The article goes on to say that making theses and dissertations
- available for public use without the author's permission is a violation
- of the Federal Education Rights and Privacy Act. Ways to comply with
- the law include having current students sign a waiver, tracking down
- former students to get permission, or taking authors' names off theses
- (this last has interesting implications for cataloging!).
-
- There are obviously many implications for libraries here. I'd like to
- know if this has been publicized elsewhere, and what thoughts people
- have (aside from utter incredulity) on this. (FYI--this was an
- Associated Press story from out of Raleigh, N.C.) Thanks.
-
- Lisa Bodenheimer, Clemson University, Clemson, SC bodenhl@clemson
-
- +++++++++++++++
-
- ((MODERATORS' NOTE: The new FERPA interpretation extends "privacy
- rights" beyond reasonable bounds. The implications affect CuD and
- other information-oriented journals and newsletters as well as
- scholars. By sealing scholarship that has correctly been considered
- public documents, a significant portion of research now threatens to
- become "secret."
-
- Classifying students dissertations and theses as "student personnel
- records," thereby making them subject to FERPA seems a
- misinterpretation of the Act. At virtually every school of which I'm
- aware, these are considered public documents because they are 1)
- defended publicly, 2) "published" as a research contribution to a
- specific field (regardless of the quality of the content), 3) placed,
- usually by requirement, in a public archive of some sort (eg, U.
- library, departmental office, U of Mich Microfiche). Further, those
- products that are subsidized by gov't or other grants are--if I recall
- my own obligations as recipient--contractually defined as public.
-
- While it might be possible, through intellectual aerobics and and most
- obscurely narrow interpretation of FERPA to redefine theses and
- dissertations as "personnel records" (and I'm not convinced that it
- is), such an interpretation certainly violates the fundamental
- principle of advanced-degree research by imposing restrictions that
- subvert academic integrity and violate long-established principles
- of free-flowing scholarly information.
-
- ------------------------------
-
- Date: Thu, 19 Aug 1993 18:19:02 CDT
- From: Brian Erwin <brian@ORA.COM>
- Subject: File 7-- O'Reilly Internet Information Service
-
- THE GLOBAL NETWORK NAVIGATOR
- An Internet-based Information Center
- O'Reilly & Associates, Inc.
- Free Subscription (send mail to info@gnn.com)
-
- Next month, we will launch a new experiment in online
- publishing, _The Global Network Navigator_ (GNN), a free Internet-
- based information center that will initially be available as a
- quarterly. GNN will consist of a regular news service, an online
- magazine, The Whole Internet Interactive Catalog, and a global
- marketplace containing information about products and services.
-
- Keep Up with News of the Global Network
- The Global Network News provides a continuously updated
- listing of interesting news items by and about the users of the
- Internet, including announcements of new information services.
-
- Discover New Interests in GNN Magazine
- Each issue will present articles developed around a common
- theme, such as government or education. Regular columns will cover
- such topics as how to provide information services on the Internet or
- help for new Internet users. It will have several innovative
- departments, such as Off The Wall Gallery, that exhibits in digital
- form the works of new artists, and Go Find Out, a section containing
- reviews of the Internet's most interesting resources.
-
- How to find resources on a particular subject
- One of the most popular features of O'Reilly's _The Whole
- Internet User's Guide and Catalog, by Ed Krol, is the catalog of
- information resources on the Internet. GNN features an expanded,
- interactive version of this resource catalog that can be used online
- to navigate to the Internet servers containing those resources.
- The Online Whole Internet Catalog organizes Internet resources in the
- following categories:
-
- - The Internet - Arts
- - Current Affairs - Libraries, Reference & Education
- - Science - Government and Politics
- - Technology - Business
- - Humanities - Work and Play
-
- In the Online Whole Internet Catalog, subscribers can not
- only read about these resources, they can actually connect to them with
- a click of the button.
-
- Participate in the GNN Marketplace
- Getting good information from a company about their products
- or services is almost as valuable as the product or service itself.
- The Global Marketplace provides referrals to companies providing this
- kind of information online through the Internet. The Global Marketplace
- also contains commercial resource centers in which subscribers may
- find white papers, product brochures or catalogs, demo software or
- press releases for the companies advertising in GNN Marketplace.
-
- GNN and The World Wide Web
- Global Network Navigator is an application of the World Wide
- Web (WWW), developed at CERN in Switzerland. Users can choose any
- WWW browser, such as Mosaic (available for UNIX, Windows, and the Mac)
- from the National Center for Supercomputing Applications. In addition,
- O'Reilly & Associates will make available Viola, an X-based hypermedia
- software environment in which we've developed a sophisticated WWW
- graphical browser. Viola makes it possible to distribute object-oriented
- documents that use formatted text, graphics, icons, and scripts. All
- World Wide Web browsers can be used to access network services such as
- gopher and WAIS, independent of the Global Network Navigator.
-
- How To Subscribe
- The Global Network Navigator is available over the Internet
- as a free subscription service during its launch. GNN will be funded by
- sponsors who provide commercial information of interest to our readers
- in GNN Marketplace and through advertising in GNN News, GNN Magazine and
- the Online Whole Internet Catalog.
- To get information on subscribing to Global Network Navigator,
- send e-mail to info@gnn.com.
-
- +++
- Brian Erwin, brian@ora.com
- O'Reilly & Associates
- 103A Morris Street, Sebastopol CA 95472
- 707-829-0515, Fax 707-829-0104
-
- ------------------------------
-
- Date: Thu, 26 Aug 1993 21:18:51 CDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 8--"The Internet Letter"--Internet's First Commercial Digest
-
- The Internet Letter (ISSN 1070-9851), the first commercial newsletter
- on the Internet, will premiere at INET 93 and INTEROP(r)93, and a hard
- copy version will be available at Booth #1334 (InterCon Systems Corp.)
- in the South Hall of the Moscone Center.
-
- The first issue of TIL provides provides the following information
- about the editor:
-
- The editor is Jayne Levin (netweek@access.digex.net). Levin
- was former deputy bureau chief of Institutional Investor in
- Washington, D.C., and has written on the Internet for The
- Washington Post and Infoworld. Tony Rutkowski
- (amr@CNRI.Reston.VA.US) is special adviser. Rutkowski is
- founder and vice president of the Internet Society and
- director of technology assessment at Sprint Corp. He was
- former editor-in-chief and publisher of Telecommunications
- magazine. Levin will be available for interviews at INTEROP.
- Contact INTEROP press relations.
-
- The table of contents for the first issue covered a wide range
- of topics. The articles were professionally written and incisive:
-
- 001) INTERNET EXPERIENCING AN INFORMATION EXPLOSION
- 002) COMPANIES TAP INTERNET'S POWER
- 003) THE TOP 150 COMMERCIAL USERS ON INTERNET -- CHART
- 004) CIA, US GOVERNMENT INTELLIGENCE AGENCIES DEVELOP INTERNET LINK
- 005) REALTY FIRM IMPROVES PRODUCTIVITY, INTERNET SPEEDS REALTY TRANSACTIONS
- 006) MULTIMEDIA MAGAZINE TO DEBUT ON INTERNET
- 007) TASK FORCE PROPOSES STANDARD TO SECURE CONTENTS OF E-MAIL
- 008) INTERNET MERCANTILE STANDARDS EXPLORED
- 009) GOPHER LICENSING FEE SPARKS DISPUTE
- 010) FINDING GOPHER & GN
- 011) FROM SOFTWARE TO MAGAZINES, BUYING ELECTRONICALLY
- 012) CIX LAUNCHES COMMERCIAL "INFORMATION" EXCHANGE
- 013) SOME COMPANIES PREFER WAIS FOR BUILDING IN-HOUSE DATABASES
- 014) MORE ON WAIS
- 015) INTERNET TO ASSIST BETHANY IN ADOPTION SERVICES
- 016) FAQ
- 017) PROVIDERS' CIRCUIT
- 018) CIX CONTACTS -- CHART
- 019) TIPS & TECHNIQUES
- 020) POINTERS
- 021) TALK OF THE NET
- 022) WASHINGTON
- 023) READ ALL ABOUT IT
- 024) DATEBOOK
-
- The first issue of TIL provides the following price information:
-
- 30-DAY INTEROP SPECIAL (good until September 30)
-
- 40% Discount off the regular rate of $249/year
-
- Charter subscriptions: $149/year -- a 40% discount.
- Universities and nonprofits $95/year.
-
- If you not completely satified, your money will be refunded.
-
- You can receive The Internet Letter electronically or on paper.
-
- Although the first issue of TIL suggests that the newsletter will of
- of considerable utility to Internet travellers, the issue of
- commercialization of is troublesome. CuD is opposed on principal to
- such commercial endeavors. In response to CuD's query, the author
- presented the other side of the argument, one that we have recently
- raised as well. Namely, the time required to publish a newsletter of
- reasonable quality (and, judging from the first issue, TIL is of
- exceptional quality) can be prohibitive. The time required approaches
- that of a full-time journalist who is paid a living wage. Should the
- Internet be a mechanism for delivering a commercial product? The
- question raises too many issues to be addressed here. We are of two
- minds, and find the issues too complex for an easy answer. Perhaps
- readers have thoughts on the issue they could share. Meanwhile, the
- first issue of TIL is free, and it's well-worth a look.
-
- ------------------------------
-
- End of Computer Underground Digest #5.66
-