Show simple item record

dc.contributor.authorKelly, Liam Patricken_US
dc.date.accessioned2014-03-14T20:50:53Z
dc.date.available2014-03-14T20:50:53Z
dc.date.issued2003-12-12en_US
dc.identifier.otheretd-12292003-162010en_US
dc.identifier.urihttp://hdl.handle.net/10919/36477
dc.description.abstract

Langdon Winner's article "Do Artifacts Have Politics?" (1986) has become a classic piece within Science and Technology Studies. While Winner was certainly not the first to consider the inherently political qualities of technology, his article has assumed the role of a touchstone for both supporters and critics of the idea that artifacts embody political and social relationships. In the chapters that follow, I shall try to answer Winner and his critics, by studying a particular technology that I believe to be capable of shedding some much-needed light on the issue. My aim is provide a restatement of Winner's question in the pages that follow, with the hope of getting past such problematic terms as "embodiment" and "encapsulation." My hope is to make the issue itself clearer, so that we can get to the heart of how technology, values, and human beings systematically interact.

I shall utilize in my discussion computer network scanning software. I shall first discuss the background to the question "Do Artifacts Have Politics?" and then describe some of the ethical and political forces alive in the computer security world. Next I shall closely examine two particular pieces of network scanning software and describe their interactions in terms of political and ethical motivations. Finally, I shall use this case study as a basis for a broader discussion of how values may be better conceived in terms of complex interactive systems of human beings and technologies.

en_US
dc.publisherVirginia Techen_US
dc.relation.haspartthesis-2004-01-08-1105.pdfen_US
dc.rightsI hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to Virginia Tech or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report.en_US
dc.subjectphilosophy of technologyen_US
dc.subjecttechnological momentumen_US
dc.subjectinformation securityen_US
dc.subjecttechnology and valuesen_US
dc.titleHacking Systems, Hacking Values: Interactive Theories For An Interactive Worlden_US
dc.typeThesisen_US
dc.contributor.departmentScience and Technology Studiesen_US
dc.description.degreeMaster of Scienceen_US
thesis.degree.nameMaster of Scienceen_US
thesis.degree.levelmastersen_US
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen_US
thesis.degree.disciplineScience and Technology Studiesen_US
dc.contributor.committeechairPitt, Joseph C.en_US
dc.contributor.committeememberJohnson, Deborahen_US
dc.contributor.committeememberHirsh, Richard F.en_US
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-12292003-162010/en_US
dc.date.sdate2003-12-29en_US
dc.date.rdate2005-01-12
dc.date.adate2004-01-12en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record