home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Wed Jul 19, 1995 Volume 7 : Issue 61
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
-
- CONTENTS, #7.61 (Wed, Jul 19, 1995)
-
- File 1--Senate Prayer - "Lord, save our kids from porn"
- File 2--Beyond the Rimm
- File 3--cybercensorship
- File 4--(fwd) Hackers busted in Colorado
- File 5--A response to a spammer (fwd)
- File 6--Exon is unknown to the public
- File 7--TIS CFP FYI
- File 8--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Wed, 19 Jul 1995 01:53:49 -0500
- From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas)
- Subject: File 1--Senate Prayer - "Lord, save our kids from porn"
-
- ((MODERATORS' NOTE: This isn't satire!!)
-
- prayer (Senate - June 12, 1995)
-
- [Page: S8127]
-
- The Chaplain, Dr. Lloyd John Ogilvie, offered the following prayer:
-
- Almighty God, Lord of all life, we praise You for the advancements in
- computerized communications that we enjoy in our time. Sadly, however,
- there are those who are littering this information superhighway with
- obscene, indecent, and destructive pornography . Virtual but
- virtueless reality is projected in the most twisted, sick, misuse of
- sexuality. Violent people with sexual pathology are able to stalk and
- harass the innocent. Cyber solicitation of teenagers reveals the dark
- side of online victimization.
-
- Lord, we are profoundly concerned about the impact of this on our
- children. We have learned from careful study how children can become
- addicted to pornography at an early age. Their understanding and
- appreciation of Your gift of sexuality can be denigrated and
- eventually debilitated. Pornography disallowed in print and the mail
- is now readily available to young children who learn how to use the
- computer.
-
- Oh God, help us care for our children. Give us wisdom to create
- regulations that will protect the innocent. In times past, You have
- used the Senate to deal with problems of air and water pollution, and
- the misuse of our natural resources. Lord, give us courage to balance
- our reverence for freedom of speech with responsibility for what is
- said and depicted.
-
- Now, guide the Senators as they consider ways of controlling the
- pollution of computer communications and how to preserve one of our
- greatest resources: the minds of our children and the future moral
- strength of our Nation. Amen.
-
- ------------------------------
-
- Date: 17 Jul 95 08:21:57 EDT
- From: Lance Rose <72230.2044@COMPUSERVE.COM>
- Subject: File 2--Beyond the Rimm
-
- The Net did a swell job of defending its turf from errant
- government porn regulation by deep-sixing the badly misleading Rimm
- study, and causing Time magazine to recant. This certainly shows the
- astounding and still growing power of the Net organism. But it also
- raises the question: to what ends does the Net flex its muscles?
-
- For instance, the Net excels at self-protective acts against
- overt moves threatening the Net as a whole, like taking down the Rimm
- study, or making adjustments making spamming more difficult after
- Canter & Siegel. But what about more subtle moves? Net-based
- activities did not stop the FBI wiretapping act last year. Nor would
- they have made a dent in the Exon bill in the '94 incarnation had the
- telecom deregulation bills of that year stayed alive.
-
- The difference here seems to be in terms of media attention. A
- move with big media attention gets a big net response; a move that
- catches the news reporters asleep also catches the Net napping.
-
- The potential danger here is huge, and obvious. If the Net as
- a whole responds to mass media apperances, what is to stop those
- controlling the mass media from manipulating the power of the Net? Is
- the Net just a dumb creature that responds on a low level to dimly
- perceived threats to its existence, or is it (or can it be) a
- higher-order product of the smart minds that comprise it?
-
- As to the self-protective aspect, how well does the Net respond
- to events that do not rip at its very fibre? We have shining examples
- of a few years past -- the role of the Net in stopping the reactionary
- coup in Russia, and in getting out word on the repressive violent
- tactics of Chines gov't. leaders against students. As wonderful as
- these effects were, they were also a low-order use of the Net: using
- it as a robust communications medium.
-
- What about Net community responses to events other than those
- that threaten the Net as a whole? You can see the Net operate as a
- community to protect itself. But what else might it accomplish? Are
- there other social agendas or political results towards which the Net
- may turn its power in the future? Should there be, or should the Net
- be value-neutral (the issue of its very existence apart),
- acknowledging the diverse political views and needs of its
- inhabitants?
-
- ------------------------------
-
- Date: Fri, 07 Jul 1995 15:03:06 -0400
- From: christij@UNIX.ASB.COM(Joseph Christie)
- Subject: File 3--cybercensorship
-
- When I was a young child my momma read to me, a lot. She chose the
- books. When I got older the books I read were picked by her and my
- teachers. As I got older, I started to pick my own books from the ones
- made available to me by momma and my teachers.
-
- When I got a little older I was introduced to the public library. I
- picked out the books but they were always shown to momma for approval
- before I checked them out. As time went by, I started asking momma's
- approval less and less as my own tastes and preferrences developed but
- I still asked her opinion frequently.
-
- Momma was not very well educated and before the 8th grade I was
- reading things that she did not understand and had never been exposed
- to. Technical and science books as well as philosophy, religious texts
- other than the bible and some fiction that could be called "of
- questionable taste". She would sometimes look at what I was reading
- but I knew she didn't really understand much of it. She did not forbid
- me from reading things she didn't understand nor did she forbid me
- from reading those that she understood but did not approve, she had
- faith that she had instilled in me a good grounding for making my own
- value judgements. She knew I might sometimes make mistakes and also
- that sometimes I might choose to expose myself to things that she
- would not approve.
-
- I don't ever remember a time when momma wished that the government
- would step in and relieve her of the overwhelming burden of deciding
- what was acceptable for me to read. The term "family values" is
- bandied about more and more lately. Isn't responsibility one of the
- most important "family values" that we are expected to learn? We learn
- responsibility for ourselves, out pets, our family members. Much of
- what we learn while growing up centers around responsibility.
- Shouldn't parents demonstrate that responsibility by exercising
- control over their children rather than allowing some distant,
- faceless bureaucrat to dictate what is available to their family.
-
- When the discussion turns to the topic of adult material and children
- using computers, the politicians are saying that we are so incapable
- or so negligent in this particular instance that they must step in and
- tell us how to behave to protect our children from what the
- politicians don't understand themselves. How would these same parents
- feel if the government was trying to legislate that in order to become
- well rounded citizens, all children MUST be exposed to sexually
- explicit material by the age of say 7 or 8. It is the same principle
- just different particulars. We wouldn't have too much problem rallying
- support behind defeating that one though, would we?
-
- If the politicians were truly concerned about the welfare of children
- in this country their time and money could be better invested. How
- about some serious AIDS education? How about more money for public
- schools? How about let's not gut the school lunch program and the
- infant immunization programs? How about some real drug and alcohol
- education and treatment? More children die from tobacco and alcohol
- related death than from sex in this country, where's all the political
- outrage on this crisis?
-
- It is the parents themselves that must make the decisions about their
- own children and what they are exposed to as they grow up. Children
- are constantly barraged by sex in the media and in advertisements that
- surround them every day all day. Computers are just one more place
- they see it. Most of what the public and the politicians are outraged
- about is already illegal. Children being propositioned, children being
- lured away from home by perverts and pedophiles are all against laws
- already on the books. What we need is education not legislation. Teach
- the parents, don't write more laws. As Frank Zappa said, "We are a
- nation of laws, poorly written and randomly enforced."
-
- ------------------------------
-
- Date: Sun, 25 Jun 1995 22:07:15 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 4--(fwd) Hackers busted in Colorado
-
- ---------- Forwarded message ----------
-
- Here is the pathetic excuse for a headline article, as printed in the
- Denver Post:
-
- (Note: All typos are the fools who typed this up)
-
-
- ROCKY MOUNTAIN NEWS
- (Front Page Headline) COMPUTER-CRIME RING CRACKED (Monday June 19, 1995)
- Quartet accused of hacking into Arapahoe college's system,
- inciting illegal acts.
-
- ----------------------------------------------
- (Fourth Page Article) 4 ACCUSED IN COMPUTER HACKING CASE (By Marlys
- Duran) Suspects used equopment at college to incite criminal acts,
- officials say.
-
- Arapahoe County - Hackers calling themselves "The New Order" allegedly
- gained access to the Arapahoe Community College computer and used it
- to distribute tips on how to committ crimes.
-
- One man operated a computer bulletin board on which
- contributors from throughout the world exchanged how-to information on
- crimes ranging from credit-card fraud to high-tech burglary,
- authorities said.
-
- Computers were seized from the homes of four hackers, ranging
- in age from 15 to 21. Secret Service experts were called in to help
- crack the computer files.
-
- Investigators found software for breaking passwords, lists of
- private passwords for several computer systems, instructions for
- cellular telephone fraud, private credit reports, lists of credit-card
- numbers and electronic manuals on how to make bombs and illegal drugs.
-
- In a 97-page affidavit detailing the 18-month investigation,
- investigator John Davis of the Arapahoe district attorney's office
- said that the hackers "operate with an attitude of indifference to the
- rights and privacy of others and have made efforts to teach and
- involve others in their criminal enterprise."
-
- ((Remainder deleted))
-
- ------------------------------
-
- Date: Fri, 16 Jun 1995 07:01:20 +0200
- From: Maurice Hendrix <mhe@CRAY-3.XS4ALL.NL>
- Subject: File 5--A response to a spammer (fwd)
-
- From--Hanno Liem <hardware@xs4all.nl>
-
- ((MODERATORS' NOTE: The following post was a response to a spammer who
- complained about the cancelling of his posts. The spammer was not
- Canter and Siegel, but the comments are a perfect respose to C&S's
- complaints about cancelling spam)).
-
- > This evidently was in regards to a post sent to several pertinent
- > mailing lists, including one I operate here at my own site,
-
- When people do this I always like to say in a Monty Python manner:
-
- You do not get it. I will tell you. I hope you will get it.
-
- You spammed.
-
- We do not like spam. Spam is bad. Spam hurts the net. We like the net.
- So we do not like spam. In fact, we hate spam.
-
- What is spam? Spam is the same thing lots and lots of times.
-
- What is lots and lots? We will not tell you. Why? We think you might
- post one less, and then say it is not spam. But we will tell you this:
- count the things on your hands and feet. It is near that.
-
- What is spam not? Spam is not a bad post. Spam is not a bad post lots
- and lots of times. Spam is not a post in the wrong place. Spam is not
- a bad post in the wrong place lots and lots of times.
-
- Spam is the same thing lots and lots of times.
-
- We do not care what is in a spam. We do not care if it is in the right
- place or the wrong place. If we cared, that would be bad. If we did not
- like a post, we could say it is bad, so it is spam. Or we could say it
- is in the wrong place, so it is spam. That would be worse than spam. So
- we say a thing is spam if it is the same thing lots and lots of times.
-
- One more time: spam is the same thing lots and lots of times.
-
- Why is spam bad? The more times it is there, the more room it takes
- on each site's disk, and the more time it takes to get it to all of
- the sites. It should take just a small bit of room on each site's
- disk, and take just a small bit of time to get there. So spam is a
- lot of waste.
-
- Why else is spam bad? The more times it is there, the more times we
- have to see it. Some folks pay for their news by the note, or by the
- byte, or by how much time it takes them to get it. Some have to pay
- for each post in a group they read, and their site does not care if
- they read the post. So spam is not fair.
-
- Why else is spam bad? Spam makes folks mad. They post notes and say
- that they are mad. Lots and lots of notes. We call these notes
- "flames." So spam makes lots and lots of flames.
-
- Why is a small spam bad? Some folks think that if a small thing is
- not bad, then the same thing big is not bad too. So if a small spam
- is not yelled at, then there will be lots and lots of big spams.
-
- What did you do? You sent the same thing lots and lots of times. So
- you spammed. Spam is bad.
-
- We do not care what you said. We do not care if it was in the right
- place. You sent the same thing lots and lots of times. That is spam.
- That is bad.
-
- Some folks like to get rid of spam when they see it. We think that is
- good. We like them. We think they are good.
-
- When they get rid of spam, they get rid of all of it. They do not try
- to think if some of the posts are in the wrong place and just get rid
- of those ones. That would be bad. As bad as to say that a post is
- spam if they did not like it. No, they get rid of all of them. That
- is the right way to get rid of spam.
-
- Not all folks think we should do this. There are a few, like Dave
- Hayes, who think spam should be left there, that we should all be free
- to spam and spam and spam. But there are lots and lots more who think
- spam should be got rid of.
-
- Why are we mad at you? You spammed. But there is more: when we said
- we were mad, you said you did not spam. And you said few of us were mad.
- And you said your spam was not bad because it was in the right place.
- And you said that we should not get rid of it. Or that we should not get
- rid of the ones in the right place.
-
- You said you will do it no more. We do not know if we think that is
- true. Why? You said things that we think are bad. You did things that
- we think are bad. So we do not trust you. We think you might do it the
- next time you think of a thing you want lots and lots of folks to hear.
-
- How can you make us think you will do it no more, and that you are good
- folks?
-
- (1) Say that what you did was spam.
- (2) Say that what you did was bad.
- (3) Say that you feel bad since you did this bad thing.
- (4) *Then* say that you will do it no more.
-
- Then we might trust you. Then we might not be mad at you.
-
- That is not too hard for you to get, is it?
-
- ------------------------------
-
- Date: Thu, 29 Jun 1995 10:33:07 -0500
- From: m-atkinson@NWU.EDU(Michael A. Atkinson)
- Subject: File 6--Exon is unknown to the public
-
- It seems that most of the general public have no idea about the Exon
- Bill, aka the Communications Decency Act.
-
- My mother is a well-informed liberal lawyer in New York City.
- Speaking with her on the telephone last night, I asked her what she
- thought of Exon. Her response: "Huh?"
-
- She had heard of it, of course. She thought it was a great idea,
- because it would Protect The Children. Naturally, she was appalled
- when I told her what it really is about.
-
- Clearly, to get the issues out in the open where they belong, we need
- better national media involvement. If we could get the national media
- to believe (as I do) that Exon is the first step in a massive
- trouncing of the First Amendment, we would hopefully be able to
- mobilize public opinion, and defeat it.
-
- ------------------------------
-
- Subject: File 7--TIS CFP FYI
- Date: Fri, 14 Jul 1995 12:16:33 -0700
- From: Rob Kling <kling@ICS.UCI.EDU>
-
- CALL FOR PAPERS --
- The Information Society (an International
- Journal)
-
- http://www.ics.uci.edu/~kling/tis.html
-
-
- Information and Call for Papers for "The Information Society"
- journal, published quarterly by Taylor & Francis
- Titles of articles published in Vol. 9 (1993) and Vol. 10 (1994)
- Subscription Form
-
- Revised [7/5/95]
- -----------------------------------------------------------
-
- THE INFORMATION SOCIETY
- An International Journal
-
- An "information technology revolution" that can stimulate
- significant social change is clearly underway. The exponential
- growth in computational capability per unit dollar will continue at
- least for the next several decades. Communication bandwidth is
- undergoing simultaneous exponential growth. Connectivity among
- individuals, companies and nations is forming what some are
- calling cyberspace and virtual communities and new forums and
- formats for electronic publishing, communication and commerce.
- Since wealth, power and freedom of action derive from control
- over, access to, and effective use of, information and expertise, the
- shifting organization of information technologies and social life --
- large scale and small scale -- is a major concern. These combined
- trends have stimulated discussions the relationships between
- technological change and social change. The term Information
- Society has been a key marker for many of these studies and
- discussions.
-
- "The Information Society" journal, published since 1981, is a
- key forum for thoughtful analysis of the impacts, policies, system
- concepts, methodologies and cultural change related to these
- trends. It is a refereed journal that publishes scholarly articles,
- position papers, short communications and book reviews.
-
- "The Information Society" is a multidisciplinary journal whose
- audiences include policy- and decision-makers and scientists in
- government, industry and education; managers concerned with the
- effects of the information revolution on individuals, organizations
- and society; and scholars with an interest in the relationship
- between information technologies, social/organizational life, and
- social change.
-
- The Information Society is undergoing a transition under the
- leadership of its new Editor-in-Chief, Rob Kling. This CFP lists
- some of the members of the new editorial board. The journal's
- editorial board will be experimenting with new electronic and
- paper formats, including a web server for abstracts and tables of
- contents. In addition, we are experimenting with a policy to allow
- authors to identify 5 people who may recieve copies of the issue in
- which their article appears.
-
- Rob Kling is soliciting individual articles and proposals from
- people who wish to organize and edit special issues. He is
- interested in provocative analytical articles or empirical studies
- that are written to advance our understanding of the relationships
- between information technology, related social practices and
- policies, and social change. TIS articles are typically 4,000-7,500
- words long, and are written vividly with coherent analyses and
- minimal jargon. TIS also publishes shorter "position statements"
- of up to 2,000 words and debates in a new section, called "The
- Forum."
-
- Among the topics addressed within the journal are:
-
- * changing National Information Infrastructures, especially as
- they influence cultural expectations and social practices,
-
- * the politics of change in National Information
- Infrastrustures,
-
- * the implications of the coming surge in electronic data
- interchange (EDI) and electronic commerce among
- businesses globally,
-
- * the ability of companies to "outsource" portions of their
- information processing to different countries around the
- world, creating transborder data flow issues for the countries
- involved and increasing the rapidity with which jobs migrate
- globally,
-
- * meanings and implications of political/economic systems
- that are based on universal access to baseline information
- services or fees-for-all-services,
-
- * options for, and implications of, various forms of "electronic
- democracy",
-
- * the rise of "virtual communities" of persons worldwide
- engaging in "many-to-many" communication among their
- participants, irrespective of borders or corporate structures,
-
- * the role of place and space in visions and practice of digital
- libraries and electronic forums,
-
- * cultural changes in relation to cyberspace -- both empirical
- studies and studies of their representation in popular
- culture,
-
- * the structure of the information industries, including
- markets, industrial alliances, the character of work, and
- management-labor relations,
-
- * ethical dimensions in the development and use of new
- information technologies; and
-
- * gender issues in the development and use of new information
- technologies.
-
-
- Articles published in Vol. 9 (1993) and Vol 10( 1994) include:
-
- Kling, R., Dunlop, C. Controversies about computerization and
- the character of white collar worklife. 9(1), 1993.
-
- Calantone, R.J., Holsapple, C.W., Johnson, L.E. Communication
- and communication support: an agenda for investigation.
- 9(1), 1993.
-
- Schoonmaker, S. Trading on-line: information flows in advanced
- capitalism. 9(1), 1993.
-
- Arthur, C. Zen and the art of ignoring information. 9(1), 1993.
-
- Mankin, D. Review of Peter G.W. Keen, "Shaping the future:
- business design through information technology". 9(1), 1993.
-
- Kling, R. Organizational analysis in computer science. 9(2), 1993.
-
- Bikson, T.K., Law, S.A. Electronic mail use at the World Bank:
- messages from users. 9(2), 1993.
-
- Bikson, T.K., Law, S.A. Electronic information media and records
- management methods: a survey of practices in United
- Nations organizations. 9(2), 1993.
-
- Martin, W.J., McKeown, S.F. The potential of information and
- telecommunications technologies for rural development. 9(2),
- 1993.
-
- Lincoln, T.L., Essin, D.J., Ware, W.H. The electronic medical
- record: a challenge for computer science to develop clinically
- and socially relevant computer systems to coordinate
- information for patient care and analysis. 9(2), 1993.
-
- Kling, R., Covi, L. Review of Lee Sproull and Sara Kiesler
- "Connections: New ways of working in the networked
- organization". 9(2), 1993.
-
- Ware, W. The New Faces of Privacy. 9(3), 1993.
-
- Soe, L.L., Markus, M.L. Technological or social utility?
- Unraveling explanations of email, vmail, and fax use. 9(3),
- 1993.
-
- Orlikowski, W.J. Learning from Notes: organizational issues in
- groupware implementation. 9(3), 1993.
-
- Katz, J.E. and Hyman, M.H. Dimensions of concern over telecom
- privacy in the United States. 9(3), 1993.
-
- Chen, Z. Intelligence and discovery in an information society: an
- essay in memory of Derek de Solla Price. 9(3), 1993.
-
- Allen, J.P. Review of "Microcomputers in African development:
- critical perspectives". 9(3), 1993.
-
- =====================
-
- Camp, L. Jean and J.D. Tygar. 1994. "Providing Auditing While
- Protecting Privacy." The Information Society. 10(1):59-71.
-
- Clarke, Roger. 1994. "Electronic Support for the Practice of
- Research." The Information Society.10(1):25-42.
-
- Lind. Mary, R. and Robert W. Zmud. 1994. "Employee
- Information Processing Behaviors Before and After a
- Corporate Downsizing." The Information Society. 10(1):43-58.
-
- Webster, Frank. 1994. "What Information Society?" The
- Information Society. 10(1):1-24.
-
- Agre, Philip E. 1994. "Surveillance and Capture: Two Models of
- Privacy." The Information Society. 10(2):101-128.
-
- Agre, Philip E. 1994. "Understanding the Digital Individual." The
- Information Society. 10(2):73-76.
-
- Allen, Jonathan P. 1994. "Mutual Control in the Newly Integrated
- Work Environments." The Information Society. 10(2):129-138.
-
- Clarke, Roger. 1994. "The Digital Persona and Its Application to
- Data Surveillance." The Information Society. 10(2):77-92.
-
- Hill, William C. and James D. Hollan. 1994. "History-Enriched
- Digital Objects: Prototypes and Policy Issues." The
- Information Society. 10(2):139-145.
-
- Kilger, Max. 1994. "The Digital Individual." The Information
- Society. 10(2):93-100.
-
- Chartrand, Robert Lee and Robert C. Ketcham. 1994.
- "Opportunities for the Use of Information Resources and
- Advanced Technologies in Congress: A Study for the Joint
- Committee on the Organized Congress." (A Consultant
- Report). The Information Society. 10(3):181-222.
-
- Kling, Rob. 1994. "Reading "All About" Computerization: How
- Genre Conventions Shape Nonfiction Social Analysis." The
- Information Society. 10(3):147-172.
-
- Wilson, Francis A. and John N. Wilson. 1994. "The Role of
- Computer Systems in Organizational Decision Making." The
- Information Society. 10(3):173-180.
-
- Fogelman, Martin. 1994. "Freedom and Censorship in the
- Emerging Electronic Environment." The Information Society.
- 10(4):295-303.
-
- Kraemer, Kenneth L., Dedrick, Jason and Sheryl Jarman. 1994.
- "Supporting the Free Market: Information Technology Policy
- in Hong Kong." The Information Society. 10(4):223-246.
-
- Lee, Laurie Thomas and Robert LaRose. 1994. "Caller ID and the
- Meaning of Privacy." The Information Society. 10(4):247-266.
-
- Mowshowitz, Abbe. 1994. "Virtual Organization: A Vision of
- Management in the Information Society." The Information
- Society. 10(4):267-288.
-
- Walsham, Geoff. 1994. "Virtual Organization: An Alternative
- View." The Information Society. 10(4):289-292.
-
- Mowshowitz, Abbe. 1994. "Reply to Walsham's Critique." The
- Information Society. 10(4):293-294.
-
-
- EDITORIAL BOARD
- (partial listing, 7/5/95)
-
- Phil Agre Department of Communications
- University of California, San Diego
- Jonathan Allen Department of Engineering
- Cambridge University (UK)
- Tora Bikson RAND Corporation
- Santa Monica, Ca
- Geoffrey Bowker Library and Information Science
- University of Illinois, Urbana
- Christine Borgman Library and Information Science
- University of California, Los Angeles
- Lewis Branscomb Kennedy School of Government
- Harvard University
- Su-Shing Chen Information Technology and
- Organizations
- National Science Foundation
- Andrew Clement Faculty of Information Studies
- University of Toronto
- Karen Coyle Department of Library Automation
- University of California
- Mary Culnan Department of Information Systems
- Georgetown University
- Batya Friedman Department of Computer Science
- Colby College
- Vijay Gurbaxani Graduate School of Management
- University of California, Irvine
- Suzanne Iacono Department of Information Systems
- Boston University
- Pertti Jarvinen Department of Information Systems
- University of Tampere (Finland)
- Kenneth Kraemer Center for Research on IT and
- Organizations and
- Graduate School of Management
- University of California, Irvine
- Gary T. Marx Department of Sociology
- University of Colorado, Boulder
- Richard O. Mason School of Management
- Southern Methodist University
- Mark Poster Department of History
- University of California, Irvine
- Marc Rotenberg Electronic Privacy Information Clearinghouse
- Washington, DC
- Jorge Schement School of Communication
- Rutgers University
- Doug Schuler Computer Professionals for Social
- Responsibility
- Seattle, Wa
- Rick Weingarten Computing Research Association
- Washington, DC
- Rolf Wigand School of Information Studies
- Syracuse University
- SUBMITTING A PAPER
-
- Please send five copies of each manuscript to the Editor-in-Chief.
-
-
- For manuscript format details (double spaced, single sided, etc.),
- contact the Editor-in-Chief, see the inside back cover of an issue
- of the journal or read the instructions file on the journal's web
- page:(URL http://www.ics.uci.edu/~kling/tis.html).
-
- (Note: TIS can accept some manuscipts via electronic submission.
- But this must be done with the permission and in coordination
- with the Editor-in-Chief, to insure that the electronic mansucsript
- exchange will be workable).
-
- Editor-in-chief:
- Professor Rob Kling
- Center for Research on
- Information Technology and Organizations
- 320 Berkeley Place
- University of California, Irvine
- Irvine, Ca 92717-4650
- tel: (714) 824-5160 fax: (714)824-8096
- email - internet: kling@ics.uci.edu http://www.ics.uci.ed
- u/~kling
-
- To subscribe, the following form may be clipped and mailed to the
- address below:
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- THE INFORMATION SOCIETY
- Published quarterly, ISSN 0197-2243
-
- ___ Please enter my institutional subscription to Volume 11
- (1995) at US$99
- ___ Please enter my personal subscription to Volume 11
- (1995) at US$49
- ___ Please send me a free sample copy
-
- Payment options:
-
- ___Check/Money Order Enclosed (please make checks payable
- to Taylor & Francis, in U.S. funds only)
- ___ Please charge my: ___ VISA __ MC ___ Amex
-
- Card # ________________________________ Exp date: __
- Signature: ________________________________________
- Telephone: ____________________________________
- (required for credit card purchases)
-
- or BILL TO: (please print)
-
- Name ____________________________________________
- Institution__________________________________________
- Address______________________________________________
- City_________________________________________________
- State ____________________ Zip _______________
-
- SHIP TO (if different):
-
- Name_________________________________________________
- Institution __________________________________________
- Address ______________________________________________
- City _________________________________________________
- State _______________________ Zip _______________
-
- Mail this form to: Taylor & Francis Inc.
- 1900 Frost Road, Suite 101
- Bristol PA 19007-1598
- toll free: 1-800-821-8312
- or fax: 1-215-785-5515
-
-
- Outside the U.S. contact: Taylor & Francis Ltd.
- Rankine Road
- Basingstoke, Hampshire
- RG24 0PR, United Kingdom
- tel: +44 (0) 256 840366
- fax: +44 (0) 256 479438
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 8--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.61
- ************************************
-
-