Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery

dc.contributor.authorLockridge, Timothy Alanen
dc.contributor.committeechairGeorge, Diana L.en
dc.contributor.committeememberPowell, Katrina M.en
dc.contributor.committeememberSelfe, Cynthiaen
dc.contributor.committeememberEvia Puerto, Carlosen
dc.contributor.committeememberFowler, Shelli B.en
dc.contributor.departmentEnglishen
dc.date.accessioned2017-04-06T15:45:14Zen
dc.date.adate2012-04-26en
dc.date.available2017-04-06T15:45:14Zen
dc.date.issued2012-03-29en
dc.date.rdate2016-10-07en
dc.date.sdate2012-04-10en
dc.description.abstractThis dissertation uses a case study of 2600: The Hacker Quarterly to consider how the practices of a hacker public might be theorized as a rhetorical activity. The project is contextualized within a history of hacking (building from a narrative that centers on Levy's 1984 book Hackers) and within the arc of recent copyright legislation, specifically the Digital Millennium Copyright Act (DMCA) and the 2011-12 Stop Online Piracy Act (SOPA) debates. Within this framework, the dissertation examines how specific patterns and cases within 2600 might further our understanding of the rhetorical canons of memory and delivery and of dissent in digital spaces. Specifically, the project presents three practices of memory at work in 2600: Aggregating, Fingerprinting, and Narrating. Drawing on the work of Collin Gifford Brooke and Mary Carruthers, among others, the dissertation examines how texts printed in 2600 present memory not as an inert technology but rather as a practice and a pedagogy—a response to the increasing commercialization of technology. The dissertation then uses Jim Porter's techne of digital delivery to analyze three specific moments in 2600's history (the 1985 U.S. Government raid on New Jersey hackers, the E911 lawsuit, and the DeCSS narrative), illustrating how our spaces of textual production have become increasingly regulated and commercialized and considering how that regulation/commercialization affects our understanding of ownership, circulation, and the public sphere. Building on Michel de Cereteau's concept of strategies and tactics and Michael Warner's theory of (counter)publics, the dissertation ultimately argues that a history of hacker publics offers one way to reconceptualize and reintegrate theories and technologies of digital circulation into our scholarly work and curricular goals.en
dc.description.degreePh. D.en
dc.identifier.otheretd-04102012-182831en
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-04102012-182831/en
dc.identifier.urihttp://hdl.handle.net/10919/77355en
dc.language.isoen_USen
dc.publisherVirginia Techen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectCirculationen
dc.subjectHackingen
dc.subjectDistributionen
dc.subjectMemoryen
dc.subjectDeliveryen
dc.titleBeyond Invention: How Hackers Challenge Memory & Disrupt Deliveryen
dc.typeDissertationen
dc.type.dcmitypeTexten
thesis.degree.disciplineRhetoric and Writingen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.leveldoctoralen
thesis.degree.namePh. D.en

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
etd-04102012-182831_Lockridge_TA_D_2012.pdf
Size:
7.22 MB
Format:
Adobe Portable Document Format