11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

cyberspace <strong>and</strong> cyber culture 125involved in any crime, the seizure <strong>of</strong> its equipment <strong>and</strong>information threatened to put it out <strong>of</strong> business. Ultimately,Jackson prevailed in federal court, establishing that unconventionalmeans <strong>of</strong> expression such as games were entitledto First Amendment protection. In another high-pr<strong>of</strong>ilecase, computer scientist Daniel Bernstein sued <strong>and</strong> wonthe right to publish encryption s<strong>of</strong>tware <strong>and</strong> related papers,again extending First Amendment protections in the digitalworld.The EFF has also been involved in the dispute betweenusers <strong>of</strong> file-sharing services <strong>and</strong> the Recording IndustryInstitute <strong>of</strong> America (RIAA) over subpoenas <strong>of</strong> service providersseeking alleged illegal downloaders.Most recently, the EFF has exp<strong>and</strong>ed its efforts furtherwith regard to issues <strong>of</strong> government surveillance <strong>and</strong> theprosecution <strong>of</strong> computer crimes, such as collection <strong>and</strong> use<strong>of</strong> evidence.Center for Democracy <strong>and</strong> <strong>Technology</strong>Founded in 1994, the Center for Democracy <strong>and</strong> <strong>Technology</strong>(CDT) somewhat overlaps the EFF in interests, buthas a greater emphasis on the connections between onlineactivities <strong>and</strong> the political process. The organization’s firstmajor battle involved the <strong>Computer</strong> Decency Act. Whileintended by its proponents to ban obscenity <strong>and</strong> particularlychild pornography from the Internet, cyberspacerightsadvocates saw the law as vague, poorly written, <strong>and</strong>likely to deny access to material that is constitutionallyprotected for adults—an argument that the Supreme Courtultimately accepted in ACLU v. Reno (1997).More recently, the CDT has supported the free-speechrights <strong>of</strong> bloggers (see blogs <strong>and</strong> blogging), arguingthat they should be accorded journalistic rights (see alsojournalism <strong>and</strong> computers). Besides issue advocacy, theorganization’s overall focus is on developing public policythat recognizes the unique features <strong>of</strong> cyberspace <strong>and</strong> promotesfreedom <strong>of</strong> expression, protection <strong>of</strong> privacy, <strong>and</strong>widespread access to the Net (see also Internet accesspolicy).Electronic Privacy Information CenterAlso founded in 1994, the Electronic Privacy InformationCenter (EPIC) is a Washington, D.C.–based public interestresearch center devoted to privacy <strong>and</strong> civil libertiesissues. The group’s electronic newsletter EPIC Alert providesa useful summary <strong>of</strong> ongoing developments, cases,<strong>and</strong> issues. The organization also publishes regularlyupdated compendiums on developments in open government/freedom<strong>of</strong> information, privacy <strong>and</strong> human rights,<strong>and</strong> privacy law.(For online activists involved in general political issues<strong>and</strong> campaigns, see political activism <strong>and</strong> the Internet.)Further ReadingCenter for Democracy <strong>and</strong> <strong>Technology</strong>. Available online. URL:http://www.cdt.org/. Accessed September 10, 2007.Center for Democracy <strong>and</strong> <strong>Technology</strong>. “CDT: A Decade <strong>of</strong> InternetAdvocacy.” Available online. URL: http://www.cdt.org/mission/2006aao.pdf. Accessed September 10, 2007.Electronic Frontier Foundation. Available online. URL: http://www.eff.org/. Accessed September 10, 2007.Electronic Privacy Information Center. Available online. URL:http://www.epic.org/. Accessed September 10, 2007.Godwin, Mike. Cyber Rights: Defending Free Speech in the DigitalAge. Revised ed. Cambridge, Mass.: MIT Press, 2003.Privacy.org. Available online. URL: http://www.privacy.org/.Accessed September 10, 2007.cyberspace <strong>and</strong> cyber cultureThe term cyberspace first came to prominence whenit appeared in Neuromancer, a 1984 novel by science fictionwriter William Gibson. The word is a combination<strong>of</strong> “cyber” (meaning related to computers) <strong>and</strong> “space.”As another SF writer, Bruce Sterling, wrote in The HackerCrackdown (1993), cyberspace is “the place between thephones. The indefinite place out there, where the two <strong>of</strong> you,human beings, actually meet <strong>and</strong> communicate.”While the elite telegraphers <strong>of</strong> the 19th century <strong>and</strong>later telephone users first experienced the sense <strong>of</strong> disembodiedelectronic communication, it took the development<strong>of</strong> widespread computer terminals, personal computers,<strong>and</strong> connecting networks to create a sense <strong>of</strong> an ongoingplace in which people meet <strong>and</strong> interact. The first “villages”in cyberspace came into being during the 1970s asresearch networks (ARPA), <strong>and</strong> the Usenet newsgroups<strong>of</strong> UNIX users began to carry messages <strong>and</strong> news postings.During the 1980s, many more settlements began tolight up the map <strong>of</strong> cyberspace, ranging from cities (largeonline services such as The Source, BIX, <strong>and</strong> CompuServe)to thous<strong>and</strong>s <strong>of</strong> villages (tiny bulletin board systems runningon personal computers). (See online services <strong>and</strong>bulletin board systems.)Wherever human beings build communities, they shapeculture. The cyber culture that grew up in cyberspace hasfeatured many diverse str<strong>and</strong>s. Hackers (not originally apejorative term) had their distinctive hangouts <strong>and</strong> lingo.Bulletin board cultures varied from the hacker hardcore touser groups that tried to assist beginners. On the nascentInternet multiplayer game worlds called MUDs (Multi-UserDungeons) <strong>and</strong> Muses used words to create richly detailedfantasy cyberspaces. Together with chat rooms <strong>and</strong> conferencingsystems, they fostered virtual communities that,like physical communities, express a full range <strong>of</strong> humanbehavior (see blogs <strong>and</strong> blogging, conferencing systems,chat, social networking, texting <strong>and</strong> instantmessaging, <strong>and</strong> virtual community).While cyber culture shares the characteristics <strong>of</strong> otherhuman cultures, it also has unique characteristics that aredictated by the nature <strong>of</strong> the online, virtual medium. Sincethe online user reveals only what he or she chooses toreveal, identities can be fluid: playful or deceptive. Whilepeople are not physically vulnerable in cyberspace, theyare certainly emotionally vulnerable. (Virtual eroticism, or“cyber sex” has even led to virtual rapes.) The issue <strong>of</strong> protectingprivacy becomes important because sensitive personalinformation is constantly being exposed in order tocarry on commerce (see identity in the online world<strong>and</strong> privacy in the digital age.)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!