All Academic, Inc. Research Logo

Info/CitationFAQResearchAll Academic Inc.
Document

Of Viruses and Victims: Framing the Internet, 1988-1990
Unformatted Document Text:  O F V IRUSES AND V ICTIMS : F RAMING THE I NTERNET , 1988-1990 9 The properties of the ontological metaphor in particular enabled the crime frame. Morris’s crime is hard to imagine; all that comes to mind is a young man hunched over a computer terminal. As the media repeatedly observed, Morris took nothing and no one was physically harmed. In a sense, all Morris did was set things in motion. Yet, the crime metaphor was important in understanding Morris’s actions. It presented the Internet as something that could be victimized, something that could be broken into and vandalized. In the process, much of the responsibility for the “crime” was shifted from Morris to the virus itself. In the 81 news stories analyzed for this study, the references to the virus acting autonomously (i.e., “the virus copied itself,” “the virus entered”) numbered 212, compared with 136 references to Morris as the primary actor. The virus was also framed in military terms, with the virus “attacking,” “invading,” and “infiltrating” computer systems. This frame may be explained in part because the virus entered a number of computer systems used by the military, among them the Lawrence Livermore National Laboratory in California. The Los Angeles Times, in particular, emphasized the military frame, even though the threat of the virus to military information was probably nil. “Nuclear weapons and the ‘Star Wars’ defense system are designed at Livermore,” the Times reporter wrote in the second paragraph of the initial virus story, “but information about those projects is kept in supercomputers that are physically and electronically separate from other computers at the laboratory” (Maugh II, 1988). The military frame, like the crime frame, favors simple formulations of good vs. bad, us vs. them. It also presents the technology as an ideological battleground, a prize to be taken from the enemy (in this case, computer hackers) in a titanic struggle. Military metaphors suggest a larger battleground than crime metaphors and imply the

Authors: Patnode, Randall. and Michels, Tara.
first   previous   Page 9 of 20   next   last



background image
O
F
V
IRUSES AND
V
ICTIMS
: F
RAMING THE
I
NTERNET
, 1988-1990 9
The properties of the ontological metaphor in particular enabled the crime frame.
Morris’s crime is hard to imagine; all that comes to mind is a young man hunched over a
computer terminal. As the media repeatedly observed, Morris took nothing and no one
was physically harmed. In a sense, all Morris did was set things in motion. Yet, the crime
metaphor was important in understanding Morris’s actions. It presented the Internet as
something that could be victimized, something that could be broken into and vandalized.
In the process, much of the responsibility for the “crime” was shifted from Morris to the
virus itself. In the 81 news stories analyzed for this study, the references to the virus
acting autonomously (i.e., “the virus copied itself,” “the virus entered”) numbered 212,
compared with 136 references to Morris as the primary actor.
The virus was also framed in military terms, with the virus “attacking,”
“invading,” and “infiltrating” computer systems. This frame may be explained in part
because the virus entered a number of computer systems used by the military, among
them the Lawrence Livermore National Laboratory in California. The Los Angeles Times,
in particular, emphasized the military frame, even though the threat of the virus to
military information was probably nil. “Nuclear weapons and the ‘Star Wars’ defense
system are designed at Livermore,” the Times reporter wrote in the second paragraph of
the initial virus story, “but information about those projects is kept in supercomputers that
are physically and electronically separate from other computers at the laboratory”
(Maugh II, 1988). The military frame, like the crime frame, favors simple formulations of
good vs. bad, us vs. them. It also presents the technology as an ideological battleground, a
prize to be taken from the enemy (in this case, computer hackers) in a titanic struggle.
Military metaphors suggest a larger battleground than crime metaphors and imply the


Convention
Convention is an application service for managing large or small academic conferences, annual meetings, and other types of events!
Submission - Custom fields, multiple submission types, tracks, audio visual, multiple upload formats, automatic conversion to pdf.
Review - Peer Review, Bulk reviewer assignment, bulk emails, ranking, z-score statistics, and multiple worksheets!
Reports - Many standard and custom reports generated while you wait. Print programs with participant indexes, event grids, and more!
Scheduling - Flexible and convenient grid scheduling within rooms and buildings. Conflict checking and advanced filtering.
Communication - Bulk email tools to help your administrators send reminders and responses. Use form letters, a message center, and much more!
Management - Search tools, duplicate people management, editing tools, submission transfers, many tools to manage a variety of conference management headaches!
Click here for more information.

first   previous   Page 9 of 20   next   last

©2012 All Academic, Inc.