All Academic, Inc. Research Logo

Info/CitationFAQResearchAll Academic Inc.
Document

Of Viruses and Victims: Framing the Internet, 1988-1990
Unformatted Document Text:  O F V IRUSES AND V ICTIMS : F RAMING THE I NTERNET , 1988-1990 15 Figure 1 - Metaphorical Frames for the Internet Words and phrases used to describe the Internet and its users I. Biological/Organic “virus” “worm” “infected” injected “crippling” computers would become “catatonic” “paralyzed” virus was “planted” “plagued” need to “cleanse” systems solution is an “antidote” virus “disabled” computers scourge replicate reproduce eradicate propagate quarantine II. Military/Conflict “attack” “defuse a mysterious malady” “full-scale assault” virus “infiltrates” “invasion” “invader sabotage” battled vulnerable target fight the programs launched III. Crime Morris described as an “intruder” virus “penetrated” other systems a “rogue” program (dishonest) virus “steals” information “insidious virus “ (treacherous) “break-in” exploited escape detection renegade tampered illicit unauthorized vandal IV. Accident “gone awry” “out of control” “chaos” program “ran amok” went “haywire” sped madly out of control spread like wildfire quirk multiply madly Frankenstein Got out of hand Havoc Crashed mistake V. Scientific “design error” virus was an “experiment” virus was “research” “programming error” defect

Authors: Patnode, Randall. and Michels, Tara.
first   previous   Page 15 of 20   next   last



background image
O
F
V
IRUSES AND
V
ICTIMS
: F
RAMING THE
I
NTERNET
, 1988-1990 15
Figure 1 -
Metaphorical Frames for the Internet
Words and phrases used to describe the Internet and its users
I. Biological/Organic
“virus”
“worm”
“infected”
injected
“crippling”
computers would become “catatonic”
“paralyzed”
virus was “planted”
“plagued”
need to “cleanse” systems
solution is an “antidote”
virus “disabled” computers
scourge
replicate
reproduce
eradicate
propagate
quarantine

II. Military/Conflict
“attack”
“defuse a mysterious malady”
“full-scale assault”
virus “infiltrates”
“invasion”
“invader
sabotage”
battled
vulnerable
target
fight the programs
launched
III. Crime
Morris described as an “intruder”
virus “penetrated” other systems
a “rogue” program (dishonest)
virus “steals” information
“insidious virus “ (treacherous)
“break-in”
exploited
escape detection
renegade
tampered
illicit
unauthorized
vandal

IV. Accident
“gone awry”
“out of control”
“chaos”
program “ran amok”
went “haywire”
sped madly out of control
spread like wildfire
quirk
multiply madly
Frankenstein
Got out of hand
Havoc
Crashed
mistake

V. Scientific
“design error”
virus was an “experiment”
virus was “research”
“programming error”
defect


Convention
Convention is an application service for managing large or small academic conferences, annual meetings, and other types of events!
Submission - Custom fields, multiple submission types, tracks, audio visual, multiple upload formats, automatic conversion to pdf.
Review - Peer Review, Bulk reviewer assignment, bulk emails, ranking, z-score statistics, and multiple worksheets!
Reports - Many standard and custom reports generated while you wait. Print programs with participant indexes, event grids, and more!
Scheduling - Flexible and convenient grid scheduling within rooms and buildings. Conflict checking and advanced filtering.
Communication - Bulk email tools to help your administrators send reminders and responses. Use form letters, a message center, and much more!
Management - Search tools, duplicate people management, editing tools, submission transfers, many tools to manage a variety of conference management headaches!
Click here for more information.

first   previous   Page 15 of 20   next   last

©2012 All Academic, Inc.