Abstract:Hackers emerge in the information revolution with the computer as the leader. Hackers share many similarities with punks, phreaks, and swordsmen, but what is different about them is that hackers affirm their appeal for independence, emphasize technical tendency, and moral objectives. “Hacker’s mirror” is a metaphor for the function of sci-fi movies, which contains three possible meanings: the mirror used by the director to project the image of the hacker, the mirror used by the audience to observe and recognize the hacker, and the mirror used by the hacker to project or understand the world. It is reflective of the specific way hackers observe the world, because this way is not only characteristic of the hacker’s image, but also the starting point to understand hackers, and could be valuable for hackers’ introspection. The above-mentioned method is characterized by seeing the daylight from the darkness ( “黑”), seeing the subject from the object (“客”), and seeing the reality from the virtual world (“镜”). With the further development of information revolution, hackers in the creative production of sci-fi movies may have more diverse images due to wider scope, internal differentiation and role changes.
黄鸣奋. 从反文化、救世主到安全专家:科幻电影的黑客想象[J]. 《深圳大学学报》(人文社科版), 2020, 37(2): 5-9.
HUANG Ming-fen. Changes in the Image of Hackers in Sci-fi Movies: from Anti-culture Figures to Saviors and then to Security Experts. , 2020, 37(2): 5-9.
[1] Yinger,J.Milton.Contraculture and Subculture[J].American Sociological Review. Issue,1960(25): 625-635. [2] Roszak,Theodore.Making of a Counter Culture: Reflections on the Technocratic Society and Its Youthful Opposition[M].Berkeley, CA: University of California Press 1968. [3] 孙伟平.黑客:因特网上的迷途羔羊(二)[J].微电脑世界,2000,(18):52. [4] Emmanuel,Goldstein.Dear Hacker: Letters to the Editor of 2600[M].Indianapolis, Ind. Wiley Pub,Inc.,2010. [5] 霍布斯邦.盗匪:从罗宾汉到水浒英雄[M].郑明萱译.台北:麦田出版股份有限公司,1998.190. [6] 王小东. 信息时代的侠客[J].软件,1998,(1):26. [7] 吴伯凡. 数字时代的知识与暴力(下)[J].微电脑世界,1999,(34):100. [8] Joyce, Mary. 2009. An Introduction to Digital Activism[CEB/OL].http://www.slideshare.net/MaryCJoyce/introduction-to-digital-activism. Accessed 23 Nov 2011. [9] Diamond, Larry.2010. Liberation Technology[J].Journal of Democracy,Vol.21,69-83. [10] Schrage, Michael.Playing God in Your Basement[J].The Washington Post. January 31,1988. [11] Critical Art Ensemble.Molecular Invasion[M].New York:Autonomedia,2002. [12] Unsigned.Scientists, Be on Guard .. ET Might be a Malicious Hacker[EB/OL].2005.https://www.theguardian.com/technology/2005/nov/25/news.research.2019-6-3. [13] 张楚. 黑客与侠客[J].互联网周刊,1999,(43):52. [14] Taylor,Paul.Them and us: The Hack and Hacking Culture.1999[C]. In Cybercultures: Critical Concepts in Media and Cultural Studies, Vol.III.Edited by David Bell. Lodnon;New York: Routledge, 2006,252-288. [15] Nana.一共有10种黑客你是哪一种?[EB/OL] https://www.aqniu.com/news-views/23523.html.2019-6-3.