• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • Tagged with
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

資訊時代的科技、權力與自由─網路空間、黑客精神與Foucault的逾越問題

曹家榮, TSAU, CHIA-RONG Unknown Date (has links)
本文的目的在於,藉由參照Foucault的觀點以探討資訊時代的科技/權力問題,並且試圖將黑客精神置於“逾越”的關鍵位置上,藉以討論其逾越的可能與不可能。首先,本文從一個較為抽象的層次出發,藉由Heidegger的技術觀與Foucault的權力觀之討論,提出一種科技/權力的觀點。本文認為在Heidegger對於現代科技的分析,以及在Foucault對於知識/權力關係的看法中,他們都描繪著一種人們深陷於其中的被限定(limited)關係,是故,本文認為可以藉由Foucault的權力觀來探討潛在於科技之中的權力作用。接著,本文藉由Jordan的討論,使得科技/權力的概念在更具體的分析層次上成為可能。簡言之,Jordan認為當各種科技被發明、製造出來時,它的設計實際上是被嵌入各種既有的價值規範,故進而便在使用者之間形成權力關係的網絡。 討論完科技/權力的基礎概念之後,本文選擇了網路空間(cyberspace)此一領域藉以更深入地分析科技/權力之運作形式。本文藉由三個討論的問題,來分析網路空間中的科技/權力作用:這三個問題可以簡略地陳述為:1)誰來決定?或如何決定?2)便利=控制?3)檢查!確定的個體?在討論中,本文認為,一種“確定性的控制”做為價值理念持續地藉由網路空間資訊科技的普及而滲透著,藉由各種形式,它運作出科技/權力的常規化效果,並藉以區分、形成優劣勢的權力關係。此外,確定性控制同時也表現在資訊科技強大的監看能力上,這樣的監看在今天已使得全然的可見性徹底地降臨在個體的身上。最後,不僅是因為確定性控制的價值取向形成了優劣勢的權力關係,經由監看科技的中介,更形成了觀看與被觀看的不對等地位。 藉由Foucault的觀點所形成的三個提問,我們描繪出網路空間中科技/權力作用的圖像,面對這樣的科技/權力作用,Foucault所謂的逾越如何可能?最後,本文將此一問題的討論置放在黑客的身上。本文試圖探問,具有著自由、熱情的天性的黑客們是否有實踐逾越的可能性?從對於黑客歷史的考察中,本文發現這是一部持續地在為自由而戰鬥的歷史。但這並不意味著黑客便已然實踐了對於科技/權力的逾越,至少現在仍未如此。至於黑客是否具有逾越的可能性?本文以為這答案並不是單一的,一方面,本文相信黑客們的自由精神確實是逾越科技/權力的重要條件,且他們仍持續地在戰鬥著,若是從對於加諸於黑客自身的科技/權力界線之逾越來看,黑客們大有可為;但另一方面,若從逾越做為人類集體之事業來看,要說黑客有能力獨力地將其推廣、傳散,便似乎是種過於樂觀的期待。而我們或許需要的是其他更多參與的力量。 / In this thesis, the author attempts to inquire the questions about technologies/power in the informational age through referring to Foucault, and to place the crucial importance on the spirit of Hackers for Foucault’s practice of transgression. In the first place, the author addresses the idea of technologies/power which is shaped in the synthesis of Heidegger’s notion of technology and Foucault’s notion of knowledge/power. They similarly depict human relations as limited ones. Following that the author expounds how the idea of technologies/power is possible on the concrete level through adopting Jordan’s discussion. In a word, Jordan addresses that the technologies have been embedded some kinds of values in them as soon as they were produced. After addressing the essential idea of technologies/power, the author chooses the cyberspace to analyze the operation of technologies/power in depth. There are three questions inquired here. 1) Who decides? Or how to decide? 2) Convenience = Control? 3) Examination! Determinate individuals? In these discussions, the author claims that a value of “determinate control” has penetrated the cyberspace through the technological dependence of individuals. By many ways, the technologies/power in cyberspace operates the effect of normalization so as to discriminate the power relations. In the end, the author discusses how the practice of Foucault’s transgression is possible in this network of technologies/power. Referring to Foucault’s ontology of presence and expectation of special intellectuals, the author places crucial importance on the spirit of Hackers. But the author also claims that although the history of Hackers is really a struggle process toward more freedom, we still have not seen the practice of transgression yet. And maybe what we need is more participation of others in the future.

Page generated in 0.0281 seconds