Free Essay

Cyberspace

In: Other Topics

Submitted By BrynnE
Words 1018
Pages 5
A Different Word: Subcultures in Cyberspace
Student’s Name
Institutional Affiliation

A Different Word: Subcultures in Cyberspace The way people organize, govern and create meaning in their lives is associated with social patterns that link to other cultures. This describes the study of sociocultural anthropology. This brief essay will examine: Egao, cyberpunk, queer and ethnic cyber-subcultures and relate them to sociocultural anthropology. This field of study as several concerns from the environment to health issues, however, the main in terms of cyber-subcultures deals with social change. Social change can be described as any event that causes a dramatic change immediately or over time. The presence of the Internet and cyberspace has already caused several changes in society.
Facebook (FB), Twitter and other social media sights have made it possible to connect with people from different states and countries in seconds. It also makes it possible to find lost friends and reconnect with distant family members. There are opportunities to play games, exchange video files and stream live footage. The possibilities are seemingly endless. Within this new frontier of freedom along with social media Egao can be found.
Egao
Egao can be defined as a cyber-subculture in satire with the mainstream (Zhang, 2010). It can be accessed from mobile phones and other electronic devices. There are several forms which include: text, audio, image, or video. This particular sub-culture has become a means of free expression for the younger generation of Chinese people. They can ridicule, criticize, and point out the ironic events that occur in their country or that their country has caused (Zhang, 2010). China is considered to be a strict country where everyone must adhere to the wishes of the State, this type of freedom can be considered dangerous. There is the possibility that these youth will one day challenge the laws and governing body of China which flies in the face of their traditions. If a movement does begin it will not stop with the Chinese government but it will spread to challenge the traditional concepts of Chinese society and family structure. The desire for freedom and change is a logical reason to join a cyber-subcultural such as Egao but what about cyberpunk. Cyberpunk Techno writers and artists are gritty individuals that see the world through a futuristic lens. Their purpose was to change the future of the world from what it was supposed to be to what it could be based on technological advances not yet created (Wark, 1992). The cyberpunk culture is extremely unique because it did not evolve from an external culture like Egao. Every member meets online only, sharing concepts and ideas. This means their location is always mobile and it can reach anywhere around the globe (Wark, 1992). This can be disturbing because human beings are social creatures and cyberpunks have limited social contact outside their cultural environment. It is possible to lose connection with the humanity cyberpunks are trying to make better. The future is not the focus of everyone in cyberspace sometimes the here and now take precedence. The queer and ethnic cyber-subcultures are right now oriented.
Queer and Ethic The queer community is a subculture within a subculture. This may sound complicated so here’s the breakdown: queer individuals reside within the lesbian, gay, bi-sexual, transgender (LGBT) umbrella and now they have found a place in cyberspace as a subculture. In our society there are several individuals who struggle with their sexuality and gender issues. There are safe groups where these individuals can receive support. There are some cases where these individuals want to explore themselves outside the usual channels and this is where cyber-subcultures like Gaydar Girls are born (Inter-Disciplinary, 2009). Those who are curious but are not yet ready to be exposed can use this cyber-subculture site as a place to meet potential partners and explore their sexuality. Continued positive support online may give these individuals the confidence to come out in real life society. Other sites similar to this one are not only a focus for queer youth but also for ethnic issues as well. It can be difficult looking for someone of the same sex to form a relationship, now add being LGBT and being a different race or having a different ethnic background. Websites like these may be one of the only places that racial and ethnic LGBT individuals feel safe (Inter-Disciplinary, 2009). They have great issues to consider such as their culture backgrounds, religious beliefs, and even family traditions. They are facing several cultures and demands at once which they may not be able to overcome.

Conclusion The traditional way that cultures are formed has been altered by technology. Egao for instance gave Chinese youth the voice to speak out against their country in a safe place. The Chinese government is concerned because traditions in the future may change because of this new found freedom. In other cases like cyberpunk there is no outside community, these individuals are linked together only online. The lack of real human contact can cause detachment issues and eventually cause harm to the society that desire to help. In terms of safety cyberspace provides a haven for queer and ethnic individuals that may be feel accepted in real life. It is also a means to gain support and begin to understand who they are. Acceptance is very important for any human being to grow. Change is something that cannot be stopped it can only be delayed.

References
Inter-Disciplinary. (2009). Session 3: Cyber-Subcultures. Retrieved April 3, 2013 from http://www.inter-disciplinary.net/critical-issues/cyber/cybercultures/project-archives/4th/session-3-cyber-subcultures/ Wark, M. (1992 December 1). Cyberpunk from subculture to mainstream. Retrieved April 3,
2013 from http://cyber.eserver.org/cyberpnk.txt
Zhang, L. (2010 June 21). "Carnival in Cyberspace: Egao as a Chinese Internet Subculture"
Paper presented at the annual meeting of the International Communication Association, Suntec Singapore International Convention & Exhibition Centre, Suntec City, Singapore Online <PDF>. 2012-12-04 from http://www.allacademic.com/meta/p402916_index.html

Similar Documents

Free Essay

Cyberspace

...living. Today, technology has become very advanced, dealing with worldwide problems in a more efficient manner. However, many are abusing this breakthrough invention because internet users are not aware of the vital connection that the real world has with the virtual world. In the article “Character Education for Cyberspace: Developing Good Netizens” by Andrew J. Milson and Beong-Wan Chu, human’s actions opposing from the real world is explained. Furthermore, in the article “We Need to Learn to Become Digital Citizens,” by Nick Harkaway, the connection between the real world and the virtual world is clarified and the importance of becoming a smart internet user is expressed. This paper will illustrate the authors’ claims in emphasizing the dangers of the virtual world that humans are ignorant toward by asserting claims sub claims, and examples to express their purpose. The main argument of the article, “Character Education for Cyberspace: Developing Good Netizens” by Andrew J. Milson and Beong-Wan Chu, is that cyberspace allows people to communicate and say words that they would not say or do in real life. Milson and Chu state, “In the most complex sense, cyberspace may be conceived as a parallel world where people can conduct ordinary activities without engaging in the physical acts traditionally associated with such activities” (Milson and Chu 1). They are saying that the internet gives people the opportunity to talk to one another and speak their minds without having to do...

Words: 1796 - Pages: 8

Free Essay

Why Microsoft's Craig Mundie Worries About Weapons of Mass Disruption Current Event Ii

...Why Microsoft's Craig Mundie Worries About Weapons Of Mass Disruption We live in a world were computers are quickly becoming ubiquitous.Chances are that you have one in your pocket right now. There are also a few controlling your car, the traffic lights on the streets, and plenty other ones you might not be aware about. The professional world has not been immune to this phenomenon. Computer have been able to shrink our world in to what Marshall McLuhan referred as a global village (Understanding Media 1964). We are at a point were it is just as easy to move information locally as it is globally, thus transforming the business environment and making business happen faster than ever before. As computers become more common place in our life, people like Craig Mundie (Senior advisor to Microsoft CEO Steve Ballmer), are becoming concerned about what happens when people with access to technology want to cause harm. Craig tells us that there are basically five types of malevolent things people can do in the cyber world. These are: malicious mischief, crime, espionage, warfare, and terrorism. And they can be perpetrated by: amateurs, pros, and governments. Mundie spends a lot of time talking to world leaders about current issues regarding internet security and where this field is headed in the future. Mundie is most alarmed about what he calls “weapons of mass disruption” he states that “on the Internet, things can happen so fast, at such a high scale, I believe no country has...

Words: 959 - Pages: 4

Premium Essay

Cyber Warfare

...Computers have modernized terrorism in the same way cyber terrorism revolutionized information warfare. There is no distinct definition of Cyber terrorism; however, its threat is as real as waging war but with weapons of automation. Terrorists have begun to exploit the availability of information with the malicious intent to sabotage; conversely, there are those who are not quite sure if information warfare - cyber terrorism is an actual threat. This research paper will briefly explore the history of cyber terrorism, the friend the internet has been to terrorist and how we can make the internet safer through vigilant tactics of prevention and deterrence. It will also expose the truth about cyber terrorism for the skeptic, reasons not to discount the threat, and why it is paramount their mind is changed. Information Warfare-Cyber Terrorism Did you know there were 18 cybercrime victims every second, 1058 every minute, approximately 64,000 per hour, and 1.5 million per day, that affected over 556 million people within the last year (Norton , 2012)? The internet has made it possible for terrorists to gather our public information and use it against us. As the internet matures so does the terrorist, finding ways to cripple and intimidate. The internet and terrorists have become a real hazard to the health of the cyber world. The government has implemented several organizations to help combat cyber terrorism but have not given it a clear concise definition. Skeptics...

Words: 3494 - Pages: 14

Free Essay

International Security

...International Security: Cyber Warfare – notes 10/3/12 * Review * Drones * What is Cyber Warfare? * Cyberspace: Interconnected network of information systems * Cyber warfare: using cyber capabilities to disrupt information in computers of another state * Inexpensive, just need to create unique computer code * Types * Denial of Service (DoS) * Goal: shut down network * Method: flood networkd with so many extra requests it overloads * Variant: Distributed (DDoS) attack from many infected bots * “carpet bomb in cyberspace” * Variant: Permanent (PDoS) * Damagers hardware * Malicious Programs * Goal: Disrupt of gain control of target computer * Method: Open a back door for remote access * Types: * Virus: Attached to file, self-replicates * Worm: Self-replicates, travels unaided * Trojan Horse: Apparently harmless program with code inside to gain system control * Logic bomb: * Goal: Coordinate timing of an attack * Method: Watch for specific event or predetermined time to trigger malicious code * Digital Manipulation * Goal: misinform/deceive audience * Method: Digitally alter images/audio * Extent: Real-time video, voice morphing * Cyber Espionage * Definition: Using cyber capabilities to acquire information about another...

Words: 406 - Pages: 2

Premium Essay

Cyber

...CYBER WARFARE Student’s Name Institution of Affiliation CYBER WARFARE Cyber warfare is also commonly referred to as the cyber attack. It involves both the attacks and the counter cyber warfare. By definition, it is an intentional breaching of a person’s or community computer system with an intended to fraud money or steal knowledge from the system. Therefore, it involves manipulation of the computer systems, disabling or to wipe out the aggregate information contained in the system of equipment. It has thus been a stern challenge in the economic and national and the world security. As thus, it has become a primary concern for all business people protecting their ideas not to be leaked, in the military due to the protection of national security and also by the government which has to keep it a secret of all what is happening within it. The issue of the cyber attacks has not been one event but something that has occurred over time as a result of inventions and innovations by the governments and security agencies. It was triggered by the need to safeguard one's interests and at the same time keep secrets that if they leak the competitors or the enemies can use them against you. One of the periods that can be credited to giving birth to the period of developments that led to cyber attacks is 1918 all the way to 1939 whereby there was increased military revolution. One of these advances was the use of modern aircraft, weapons, and military strategies and, of course, the technology...

Words: 1263 - Pages: 6

Premium Essay

Network Security

...ENTERPRISE INFORMATION SECURITY BY CRAIG CANNON MELBOURNE, FLORIDA JANUARY 25TH 2013 In her article “Cyber Security without Cyber War”, Mary Ellen O’Connell does a brilliant job in giving the reader an overall view of the debate concerning which government should have primary responsibility of the internet when it comes to the legal authority of cyberspace. She begins the article by citing two major players in this debate: the U.S. Military with its rules and legislation vs. NATO and its international law. According to O’Connell, the USA feels that the military should have primary responsibility over the internet since it has the largest number of technical experts and legal authorities with respect to cyberspace than anyone else in the world. Many in the international community would disagree with allowing the US military to police the internet. They raise the question: What legal rules would be used to guide the military in its supervision of the internet. They believe that using international law is the best way to govern cyberspace usage. (Johnson, 1996) Still others favor the US military’s Cold War strategy of deterrence as a way of patrolling the internet. These that favor the US military option feel that the US should not observe international laws with respect to the internet at all. One major scenario based question that has been raised is in the event of a cyber-attack how would international law apply the use of force...

Words: 1872 - Pages: 8

Free Essay

Management

...[pic] MASTER OF MANAGEMENT CORPORATE GOVERNANCE, ETHICS AND VALUES GSGM7253 TERM PAPER Issues and challenges in cyber ethic PREPARED BY: |MEOR NORULAZMI BIN MAT SALLEH |MD1409MD0030 | Contents Introduction 2 Literature Review 3 Recommendations 6 Conclusion 8 References 10 Introduction This article will highlight the issue and challenges in cyber ethic. It will cover general outlined the concept of cyber ethic and tries to relate it with the globalization of internet which was a way of living nowadays. Have you noticed that the whole world is now watching the same movies, listening to the same music and reading the same books? Of course not 100%, but the majority of the people on the planet do it the same thing as mentioned above. Why these activities happen, whereas they live not at the same location or place? This is what we call it as internet culture. Since the 1990’s, the Internet has a revolutionary impact on our culture. People around the world, start to use communication by instant messaging, electronic mail, interactive video call. Also, watching a movie, discussion and shopping they're using a World Wide Web or website.   Today, internet become part of living. I define frequent use of the Internet as...

Words: 2841 - Pages: 12

Free Essay

Cybersecurity

...Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 February 2012 Authors’ Note F or the last year, the John L. Thornton China Center and the 21st Century Defense Initiative at Brookings have convened a working group on cybersecurity and U.S.-China relations, which the two authors organized and co-chaired. The research was motivated by our sense that: 1) the many policy issues involved in cybersecurity, especially in its impact on foreign relations, were already significant and would grow rapidly in importance in the coming years; 2) that such issues, if not well managed, could provide a major source of international friction, especially in U.S.-China relations; and 3) the newness of the field added a particularly complicating factor, making cybersecurity one of the most important but least understood emerging flashpoints in global security. A key aspect of the effort was to convene several dozen knowledgeable Americans from both the private and public sector, including the civilian government, military, corporate, think tank, and university communities. With such dynamic and fast-changing events playing out, the Brookings project not only sought to study the key issues in cybersecurity and how they impact U.S.-China relations, but also to break down some of the organizational and bureaucratic stovepipes that have limited...

Words: 17963 - Pages: 72

Free Essay

Cyberterrorism

...Cyber terrorism Assignment #10 6/15/2012 TS 5999 Table of Contents Abstract………………………………………………………2 Introduction…………………………………………………..3 What is Cyberterrorism?....................................................3-4 History…………………………………………………………4 Examples of cyberterrorism…………………………………4-6 Level of cyber terror capability ……………………………..6 Figure 1……………………………………………………….7 Prevention of cyberterrorism……………………………….7-8 Conclusion ……………………………………………………..8 Reference ……………………………………………………...9-10 Abstract Cyberterrorism has increasing become one of the most significant threats nationally and internationally. Being that the internet makes it easier for terrorist to communicate, organize terrorist cells, share information, plan attacks; the internet also is used to cyber terrorist acts. Since the September 11th terror attacks on the US, American have remained on high alert for possibly another terror attack. The government has many action plans ready in the event that they get wind of another attack or an attack happens. Law enforcement has received training in terrorism prevention and detection techniques, granted terrorist are always looking for ways to improve their methods of attack. This paper will look at all the different aspects of cyberterrorism and review the different cases of cyberterrorism nationally and internationally. Introduction The use of computers and the internet have been an important part of our daily lives. Computers and the internet makes...

Words: 1895 - Pages: 8

Premium Essay

Cyber Terrorism

...CYBER TERRORISM Table Of Contents Section Page Abstract----------------------------------------------------------3 Introduction-----------------------------------------------------4 Premise----------------------------------------------------------5 Research Methodology----------------------------------------5 Research Results-----------------------------------------------6 Critical Analysis------------------------------------------------9 Conclusion-------------------------------------------------------30 Appendix---------------------------------------------------------31 Bibliography----------------------------------------------------56 Abstract FBI cyber security division computers are hacked into at the same time that known hackers capable of performing this have their computers hacked into and are blown up when they hit certain keys on their computer keyboards. Traffic lights and the transportation systems are then hacked into and total gridlock and chaos ensure. Wall Street is then affected and cyber money is thought to be dwindling away. This is known as a Fire Sale which has 3 steps. In the first step transportation is shut down then finance and finally, in the third step, utilities are affected. As expected, the media broadcast the government’s next move to everyone including the terrorists. As it turns out, the leader of the terrorists is a former DOD software programmer that had warned...

Words: 4562 - Pages: 19

Free Essay

Living in the Age of Cyber Attacks and Cyber Warfare

...Living in the Age of Cyber Attacks and Cyber Warfare UMUC   If you asked the average person on the street about cybersecurity and cyber warfare, they would probably say they don’t know much about it other than the fact that it involves computers. In fact, for anyone outside of the cybersecurity industry, the closest thing to cyber warfare that they may have experienced was their viewing of the movie War Games, or the fourth installment of the Die Hard series, Live Free or Die Hard. While those movies had a profound impact on the lives of the characters in the script, the audience probably thought it was merely fiction, not fully based on fact. In Live Free or Die Hard, John McClain (played by the indefatigable Bruce Willis) is attempting to stop a domestic cyber-terrorist who is acting out on a vendetta against the United States. The cyber-terrorist is successful in launching an online attack to overload and destroy a power grid that left much of America’s East Coast in darkness. When I first saw this movie, I was curious if an attack like that was really possible; however, most people around me just labeled the movie as “Hollywood’s overactive imagination”. With cyber attacks literally having the ability to affect lives in a nanosecond, it is vital that everyone understand what cyber attacks entail, the impact of these cyber attacks on a domestic and international scale, and knowing what to expect in the future while living in a world dominated by virtual experiences...

Words: 2352 - Pages: 10

Free Essay

Change Managment

...Cyber Terrorism Mahesh kanneboina Wilmington University Abstract The Internet is the global connection of interconnected computer networks where information can be shared among users around the world. But these days the Internet is not secure as the fundamental mechanics of the Internet are well known to many people and leading to long-standing security issues caused by the bad people who could build a “cyber nuke” to take down the network. This paper discusses about the cyber terrorism where a hacker or terrorist attacks the confidential websites of the nation and gets the important information for their activities. This cyber terrorism came into light after the 9/11 attack on WTC and from then the media focused its attention on Cyber security that has reflected public policy concerns worldwide about this topic. Security of Internet and BGP The Internet is where every network is able to reach every other network. According to industry analysts, there are 794 million people online world-wide and it is expected to be more in the coming years. This represents a lot of data interchange. But many small businesses, and even large organizations, do not know how to protect their sensitive data, thus making it easy for criminals. Online Security is a growing concern for governments around the world. Border Gateway Protocol (BGP) is the protocol which makes core routing decisions on the Internet, but unfortunately, BGP is not secure because some network administrator...

Words: 2007 - Pages: 9

Free Essay

Cyber Crimes

...The internet has changed how organizations conduct business. Within moments information exchange occurs and a profit is made. It has changed how crimes are investigated and solved by law enforcement agencies. Unfortunately, it has also changed how criminals conduct their crimes- through cyberspace. President Obama, Sony executives, Target organization and many of its’ customers have all been victims of some form of cyber crimes. This writer will provide a brief overview of the six types of cybercrimes and the economic loss as it affects America’s businesses. TYPES OF CYBER CRIME The growth and availability of technology has resulted in cyber attacks becoming a major concern for governments worldwide (Dzielinski, 2014). Small companies along with the larger corporations are now being targeted. A recent survey reported that more than one-third of small companies have been victims of some form of cyber attacks (Dzielinski, 2014). Approximately 75 percent of these companies were unable to recover their stolen data. The Central Intelligence Agency (CIA) has classified cyber crimes into six categories; fraud, computer trespassing, hardware hijacking, bullying-harassment-stalking, spam, and cyber warfare. Financial fraud is considered to be the most common of the six cyber attacks. The Target Corporation, the third largest U.S. retailer, and its customers were affected in 2013 (Target Corporation, 2013). Despite in place security measures, Target failed to detect...

Words: 1600 - Pages: 7

Premium Essay

Cyberwarfare

..."War is no longer a lively adventure or expedition into romance,matching man to man in a test of the stout-hearted. Instead, it is aimed against the cities mankind has built. Its goal is their total destruction and devastation." - General Dwight D. Eisenhower, Edinburgh, Scotland, October 3, 1946 Discuss the key concepts and ideas of cyberwarfare INTRODUCTION Significant of Paper Methodology of Paper Cyberwar is warfare, hostile influence which is fought in cyberspace. Cyberwar is netwar by the military. It includes hackers, listeners of communications systems, van Elckradiation115 listeners and so on. Cyberwar consists of information terrorism, semantic attack, simulation warfare and Gibson warfare. Typically Cyberwar is warfare, or hostile influence between attack- and defence programs in computers, computer networks and communication systems. For many, the term cyber war conjures up images of deadly, malicious programmes causing computer systems to freeze, weapon systems to fail, thwarting vaunted technological prowess for a bloodless conquest. This picture, in which cyber war is isolated from broader conflict, operates in an altogether different realm from traditional warfare and offers a bloodless alternative to the dangers and costs of modern warfare, is attractive but unrealistic. Such a scenario is not beyond the realm of possibility, but it is unlikely. Cyber warfare will almost certainly have very real physical consequences. Computer technology differs from other...

Words: 5055 - Pages: 21

Free Essay

Cybersecurity and Cyberwar

...Jimmy R Najjar Captain Denton ROTC MS 1.5 Class (Book Report) December 11, 2015 Cybersecurity and Cyberwar: What the world needs to know After everything that has been happening in the world, from the 9/11 takedown of the twin towers, to the shooting in Paris almost a month ago, the world has been drawn to attention to the extent of surveillance and cyber-espionage practiced by the US government, not only in relation to suspected terrorists but also in relation to the ordinary citizen. After reading Cybersecurity and Cyberwar, I feel like it comes at an interesting time in the history of security services world-wide, when the extent of inter-connectivity of every agency, corporation and individual makes cyber-surveillance easier to put into effect. The authors are experts in their field: Peter Singer is Senior Fellow and Director of the Center for 21st Century Security and Intelligence at the Brookings Institution, a former coordinator of Obama's defence policy task-force during the 2008 campaign and author of three other books on aspects of warfare. Allan Friedman is also a well-known expert in the field of information security and cyber-security, formerly Research Director for the Center for Technology Innovation at the Brookings Institution, and currently Visiting Scholar at George Washington University's Cyber Security Policy Research Institute. In other words, this is an authoritative text. In Cybersecurity and Cyberwar,...

Words: 1488 - Pages: 6