Document

advertisement
Manifold Analyses on the E-Concepts of Cyberspace and Virus as Metaphors
Assist. univ. drd. Anca Irinel TELEOACĂ
Universitatea “Dunarea de Jos”, Galaţi
1. Introduction
Linguists and researchers of varied domains (language philosophers and
psycho/sociolinguists) closely linked to the main objectives of Linguistics have also centered their
focus on the language of computer users who share a vast repository of information within another
kind of environment, possibly less intimidating than the real world, the virtual setting.
This paper is a two-part investigation of a linguistic phenomenon at the interface between
users and computer systems, namely the non-physical terrain created by them, with the aim of
showing some specific metaphorical instances that users (un)consciously encounter within the
frames of the computer world.
The approach on metaphor and the concept of cyberspace is a modern one since the world of
computers is continuously taken new shapes and contents. Moreover, myths and metaphors seem to
intermingle in a virtual environment purposefully designed for users’ understanding.
The second part of the paper is based on analyzing the concept of virus in relation to
metaphor because computer virus as a metaphor generates other action metaphors, like: infect,
detect, sterialize, etc., proving to be an umbrella metaphor that could organize an entire electronic
system of coherent meanings.
Final Remarks will put an illusionary end to the paper since the complex lexical phenomena
of the computer language is perpetually changing and taking new facets.
2. Metaphor and the Concept of Cyberspace
In order to comprehend any new technology, people regularly describe it in terms already
familiar to them. This happens when scientists try to explain what Internet is and bring into focus
the relation of similarity with an electronic space controlled by humans; hence, the cyberspace
metaphor. Cyberspace is located somewhere behind a computer screen and presents the world
simulation of beyond the screen; a necessary condition for a user to find himself in the cyberspace
is a phone line connection. When you want to get out and return to your real space the only thing
you have to do is to hang up when finished.
The cyberspace metaphor can have a manifold analysis:
Firstly, according to Richards’ theories on meaning, we can use the terms vehicle1 and tenor2 in
order to better understand the metaphoricity of space implied in the word cyberspace. The term
cyberspace3, or the vehicle, is a combination of the morphemes: “cyber4” – that grows to be a
computer-related marker assuming the meaning of ‘that which belongs to the digital world’ – and
space which covers the meaning of physical territory, and connotes several aspects, like:
1
The Philosophy of Rhetoric, Oxford University Press, 1964.
Idem., ibid.
3
It was coined in the early 1980s by science fiction writer William Gibson in his trilogy of novels about futuristic
computer users who are able to leave their bodies and ride through cyberspace; it represents Gibson’s vision of a
global computer network, linking all people, machines and sources of information in the world, and through which one
could move or ‘navigate’ as through a virtual space.(Susan Herring, Computer-Mediated Communication. Linguistic,
Social Cross-Cultural Perspectives. John Benjamins Publishing Company, Amsterdam/Philadelphia, 1996, p.161)
4
It comes from the Greek “kybern” which means to steer.(Webster’s Encyclopedic Unabridged Dictionary of the
English Language, ibid., p.359)
2
- first, a space has a virtually infinite extension, including so many things that they can never be
grasped all at once; a good example is the already existing collections of electronic data on the
Internet, meaning that cyberspace deals mostly with speed, access and manipulation of information;
- second, space connotes the idea of movement, of being able to go to a variety of places.
The idea of movement without limitations is conveyed by the web interface indication to go to a
site or to follow a URL5 link.
[Go To ...]
Figure 1
Metaphor verbs like navigate, tour, visit, surf, return, are examples of metaphors where nonphysical processes are compared to physical, spatial ones. They are, in fact used to either download
or display web pages the user is interested in. But, as I stated before, such interface verb metaphors
are especially created - by their designers - to facilitate the user’s understanding of the new
technology.
- and third, a space has some kind of geometry, implying concepts such as distance, direction
and dimension.
Nowadays, the combining form, cyber, has got a new connotation, as of being virtual; it
connotes both the idea of navigation through a space of electronic data, and of control which is
achieved by manipulating those data.
The exploration on cyberspace does not find its end here, it is further scrutinized, this time
included in the last group of Lakoffian conceptual metaphors, the structural metaphors.
3. Lakoffian Metaphors and Cyberspace
The second analysis on cyberspace as metaphor leads us to the idea that it could, as well, be a
conceptual blend because the metaphor blends features of computers with those of linguistic space
to produce a new conceptual entity: CYBERSPACE IS LANGUAGE. This type of metaphor belongs
to the third group of expressions described by Lakoff and Johnson, consisting of metaphors based
on the projection of a determinate, well-structured experiential area into an indefinite, unstructured
notional domain.
The reference to cybernetics6 is also important in the following respect: it defines itself as a
science of information and communication, therefore, cyberspace may be defined as the joint
network of all existing communication channels and information connecting people and machines.
The tenor, or the underlying situation referred to in the metaphor, is the strange but real
connection between an electric network of telephones and computers. The geometry of space can be
found in the network of links, nodes, paths and references characterizing a hypertext, i.e., a
collection of interlinked data, which is, by all means, a radically new information technology. Any
phenomenon which takes place is a result of electronic transformations of linguistic events.
Cyberspace is language because it is written by it and navigable by it. The navigation tools are
nothing else but pieces of software, i.e., programming language, which creates information that can
be shared, transmitted, interpreted by a large number of computers.
Therefore, having got thus far by explaining the full meaning of the term cyberspace, the
following semantic markers are added [+virtual], [+human-controlled] and [+language-based].
Language itself is dynamic and it is continuously changed inside the electronic space. The language
in the cyberspace absorbs neologisms – moreover, digital communities can develop dialects and
local slang - and finds ways among several protocols and interfaces which build cyberspace. There
is a mutual relationship between language and cyberspace – Web browsers and interfaces are
language-based -, in which one influences and modifies the other and vice versa, in an ongoing
stream of information.
5
short for Resourse Locator, the global address of documents and other resources on the World Wide Web. (Phillip
Margolis, Computer & Internet Dictionary Random House, 1999, p. 582.
6
The term was coined by Norbert Weiner, a mathematician at the Massachusetts Institute of Technology in 1943.
(Flavell, Linda and Roger, The Chronology of Words and Phrases, Kyle Cathie Limited, 1999, p. 303).
Thirdly, cyberspace can also be considered an oxymetaphor7, in the sense that, although
cyberspace points to spatial aspects, as users can have long conversations in a chatroom, or send
messages from their inboxes, one of its main functions is to limit distances as possible as it could
be, and change all concept of distance, spacing and separation into an instant present. Unlike real
space, exploring cyberspace does not require any physical movement other than pressing keys on a
keyboard or moving a mouse on a pad. This may lead us to another structural conceptual metaphor
TIME IS SPACE.
To conclude, “this figuration of Internet as a kind of cyber-territory works to undermine the
symbolic distance between the metaphoric and the real. It abandons the real for the hyperreal by
presenting an increasingly real simulation of a comprehensive and comprehendible world”. 8 For
example, there are programs that are designated to create a special feeling when playing in
cyberspace, and I mean here software games that produce physical sensations like ones in physical
reality in some ways. And this happens because of a visual, auditory, and even tactile feedback that
makes cyberspace like real world.
4. Cyberspace and Myths
Another aspect of the cyberspace concept to be highlighting next is its synonymic relation to
the word net whose metaphorical extensions are different from the ones of cyberspace in a Web
context. Therefore, I shall analyze the net metaphor as related to another kind of systematic
correlations within our experience, a new perspective that brings humanity closer to holiness. To do
so, I will be interested in showing the remote meanings of the word net, starting from the Gospels,
in which <<nets symbolize divine instrumentality>> moving to gather up mankind and bringing
<<the just into the kingdom of Heaven>>.9 In oriental folklore, the deities make use of holy nets to
catch them in their meshes, and in Christian religion, there is a story about two brothers who were
called - by God - to be Fishermen’s Souls.
In our technological society, the appearance of the Internet 10 is considered a very important
event in our lives, having a great impact on human experience, as well as the religious cults have
had on humankind along the history. Nowadays, the Net (used as the short form of the Internet11)
has become an important symbol of the globalization concept - , since it connects millions of
computers and users altogether. It belongs to a divine origin, like everything else, because it fulfills
everyone’s wishes, like traveling anywhere with no need of money or real transportation, or reading
anything from the web pages especially designed to this purpose, or communicating to whomever
by sending messages or even using your own voice, and so forth. This is the positive aspect of the
Net. However, there is the reversed coin, in the sense that, you might feel trapped into a network of
good and bad wills. We seem to get addicted to it, and, consequently, not being able to survive if
this, one day, might suddenly vanish. This would mean that it is impossible to escape from this
universe and from the laws which govern them. In a similar way we are bounded to live on the
Earth and its surrounding universe dreaming of better places, like living in Heaven. People often
think and dream of their Gods. In Persian tradition, for instance, the net takes another facet, the
opposite, this time, of the former analyzed above. It is not the divine tool but one made of humans
in order to capture God12, or to put it in your own way, a spiritual entity.
Let us take now synthesize the whole human experience of getting entrapped, spiritually or not,
which can be metaphorically conceptualized as: NET IS AN ENTITY.
It is an oxymoron used as a metaphor; for example, McLuhan’s “global village” is an oxymetaphor, in the sense that a
village is a very small and intimate community, whereas any global institution is inevitably quite large and impersonal.
(Herring Susan, ibid., p.35).
8
Jean Baudrillard, The Ecstasy of Communication. New York, Semiotext(e), 1988.
9
Jean Chevallier and Alain Gheerbrant, A Dictionary of Symbols, BLACKWELL Reference, USA, 1994, p. 698.
10
obs.: The Internet has more than 100 million user worldwide, and that number is growing rapidly. More 100 countries
are linked into exchanges of data, news and opinions. (Philip E Margolis, ibid., p.283).
11
As anyone already knows, it is a clipped word, meaning: International Network.
12
Cf. Jean Chevallier and Alain Gheerbrant, op. cit., p. 699.
7
Going on with the divine origin of the Internet, I shall embark upon a step by step exploration of
the Apple13 metaphor in the Net. In doing this, I shall start by saying that I have often found myself
asking about the similarities between the ordinary apple-tree and computers. From the start, I must
say that going deeper into the meaning analysis of apple, we cannot think of anything else but of the
prototypical fruit which is The Apple, that fruit known by humankind as the fruit of immortality,
of discord and <<of the image of the richness, sweetness and savour of the Word of God>>. 14
During the mankind’s history, it has been employed symbolically in several senses, which,
apparently distinct, are in fact interrelated.
Firstly, it is known as a key to both knowledge, as Adam and Eve found themselves naked in
Heaven after having a bite, and to life and immortality (never attained). On the other hand, the
Apple Computer15 was meant to open a new path to knowledge, that is, to bring to computer users
the most sophisticated technologies and innovations, like graphical user interface16, built-in
networking, or plug-and-play expansion17, and many others. Biting the forbidden fruit, the
prototypical humans, Adam and Eve, have acquired the spiritual power of knowing and
understanding their surroundings.
Secondly, it is a key to freedom because ‘eating the apple’ meant abuse of the intellect to gain
knowledge of evil, abuse of the senses to lust after evil, and abuse of freedom to commit evil. In this
sense, to give only an example, the computer war games provide a hundred percent of liberty for
each player to destroy his virtual enemy, which, more or less, represents the knowledge of doing
evil and the ability to carry out the most secret passions hidden in our souls.
The rounded shape of the apple comes to reinforce the man’s lust after evil symbolizing the
Earth-bound passions and their fulfillment. In this sense, Divine prohibition was meant to warn
humanity against being mastered by those passions, which would show the way to a materialistic
way of life, as contrasting with the spiritualized existence, which is the path of progressive
development. The Apple is, therefore, the symbol of that knowledge of being placed under the
commitment of making a choice between the Earth-bound passions and that of spirituality18. On the
other hand, taken positively both metaphors, the net and the apple metaphors, into our
consideration, we may say that by inventing the cyberspace – by eating from the fruit of knowledge
- like God created the Universe in seven days, the man wanted to surpass himself to reach a superior
level of existence. Thus, he has become the ‘Supreme Designer’ of his own world governed by rules
and laws of his own Judgment.
5. ‘Pandora’s Box’ in Cyberspace
In order to proceed to the analysis of the computer virus19 metaphor as a master metaphor of
other types of sub-metaphorical words, I would like to make some references on two terms that are
important parts of our study.
Despite of the fact that both computers and humans share the same semantic features as being
(+animate, + having intelligence, +vulnerable), they are also distinctive according to the following
semantic features that are central keys in our analysis:
 In point of their existence:
Humans
Computers
13
It represents a symbol of the city of New York, also known as The Big Apple.
Idem, ibid., p. 35.
15
A personal computer company founded by Steven Jobs and Steve Wozniak in 1976. (Philip E. Margolis, Dicţionar
P.C., NEMIRA, Bucureşti,1997, p. 17.)
16
First introduced in 1983. Many components of the Macintosh GUI have become de facto standards and can be found
in other operating systems, such as Microsoft Windows. (Computer &Internet Dictionary, idem., Random House
Webster, 3rd Edition, 1999, p. 23).
17
In 1985. It refers to the ability of a computer system to configure expansion boards and other devices automatically.
(idem., ibid., p.434.).
18
Cf. Jean Chevallier and Alain Gheerbrant, ibid., pp. 36-37.
19
A software program that attaches itself to other programs.
14
[+living]
[-living]
 In point of their origin:
Humans
Computers
[God’s creation]
[man-made]
The last distinctive features share the same experiential basis, in the sense that, both designers
of humans and computers wanted to reach perfection, but something happens in the process, and
consequently, flaws have appeared in conception. In God’s creation, there was the Apple, in man’s
creation, the Virus. Their interlink leads to a new world, the one of Apple Computers which is
meant to open a new path into the most sophisticated technologies and innovations within the 20th
century because, as I stated above, the Apple metaphor is a key to both knowledge and freedom of
choice to do good or evil. Consequently, my approach will take into consideration the negative
connotations of the prototypical fruit as it is related to the virus metaphor. As for instance, once
humans have gained the knowledge of evil, they transpose their actions not only into the real life
but also into the one made by them, into their own creations. On the other hand, the abuse of
freedom to commit evil is transferred into the world of computers by the creation of the computer
viruses.
The concept behind the first malicious computer programs was described years ago in the
Computer Recreations column of Scientific American. In the case of the computer intruder of
November 1988, there was a choice of two main vehicles: the worm20 or the virus.
As Richards puts it, each metaphor results from the interaction between two parts: its
vehicle, which is the word selected, and its tenor, the underlying situation. A powerful metaphor
identifies two separate domains in such a way that we become able to investigate one domain by
tracing the implications of the other domain. To exemplify, the word virus21 has moved from the
biology field into the world of Information System: a virus becomes naturally part of the system
from which it has been generated. Consequently, if the worm was chosen as the vehicle, how this
would shed light on the tenor or the underlying situation? The worm metaphor would become
obscure because of the connotations implied: worms appear at night after a rainy day, they are good
for fishing and they are to be observed on putrefying organic materials. On the other part, the virus
metaphor is still at work because with the virus as vehicle, many aspects of the tenor were revealed
using related terms.
The metaphor of the computer virus22 was adopted because of the similarity in form,
function and consequence with biological viruses that attack the human system.
First of all, they are external entities to the systems (human or computer) they are going to
infect and cannot survive independently; each virus has its own characteristic features or own set of
symptoms. Consequently, to be easily recognized and fought, the viruses are given names.
In point of their purpose, they need a host to infect. The host can be regarded from another
semantic perspective than [-/+living], in the sense that, human cells and the computer software may
be viewed as the informational structure of both systems, since virus attacks the nucleus of a living
cell and replaces the existing DNA code with its own. We say the same about the computer
systems, that is, the computer virus makes copies of itself by using all available memory and
20
The spread of the clogging behaviour made engineers think that the intruder was, in fact, a worm, a selfcontained program designed to invade and disable computers. In computer terminology, the rogue program
that invaded ARPANET was a worm. (Susan Herring, ibid.)
21
The word comes from the Latin virus, referring to poison and other noxious things.
22
On November 4, 1988, computers around the ARPANET(the direct ancestor of the Internet) began acting
strangely. They were fed up with extraneous data, became sluggish and finally clogged completely. The odd
behaviour spread in a matter of hours, to about 6,ooo computers across the country and overseas. The
system, it appeared, had been attacked by an unknown intruder. The engineers responsible for ARPANET
security thought, at first, the intruder was a virus. (Herring Susan, op. cit., p.179)
bringing the system to a halt.23 Computer viruses can insert themselves in another program, taking
control over it or adversely affecting the function of the program. In its biological meaning the
activity of a virus is closely connected with the functioning of a body cell. Thus, computer viruses
are similar to their biological viruses: a half-way point between life and non-life. They have the
minimum requirements of all known living creatures: like their biological counterparts, computer
viruses can spread rapidly and self-replicate systematically; they have enough intelligence to
recognize their environment as friendly or hostile, and to take corresponding actions. They also try
to be like the living viruses in the way they must adapt through mutation to the development of
resistance within a system: the designer of a computer virus must upgrade his creation in order to
overcome its resistance (antiviral programs) or to take advantage of the weakness or loophole found
within the system. Computer viruses also act like biologics in the way they can be set off: they can
be virulent from the outset of the infection or they can be activated by a specific event (logic
bomb)24. But computer viruses can also be triggered at a specific time (time bomb).
On the other hand, in point of their consequences, the presence of a virus is either evident, as
for instance, it can provoke serious damage and disfunctions of the system, or, most viruses act
inoffensively towards a host-system until their specific conditions met; and when this happens, all
they are doing is to slightly drain the resources of the computer they have invaded (the boot
segment, the operating system, one or more of the application programs) until they are diagnosed
by computer analysts.
Computer viruses can be understood by people by using some of the medical terminology,
which points to some of the verb metaphors in computer terminology generated by their master
metaphor.
Verb
metaphor
contract
Verb
metaphor
spread
Master
metaphor
virus
Verb
metaphor
repair
Verb
metaphor
infect
Figure 2
The computer industry25 has expanded the metaphor to include now terms like, inoculation,
infection/disinfection, quarantine and sanitation. If your system gets infected by a computer virus
you can quarantine it until you can call someone experienced in viral cleanup who can detect its
presence onto your system and disinfect it by inoculating an anti-virus (program). Computer viruses
are similar to human viruses in the way they can be contracted, as in the table below:
23
Phillip E. Margolis, Computer $ Internet Technology Dictionary, Third Edition, Random House, 2000, p. 597.
Logic bombs are usually spread by disgruntled employees. They see this as a way to right wrongs done to them by the
company.
25
News stories explained that about 6,ooo computers were infected as the virus proved to be virulent and highly
contagious. NASA isolated its computers from the infected network and quarantined them. Attempts were made to
sterialize the network and programmers struggled to develop a vaccine, and to inoculate against new attacks. (Phillip E.
Margolis, ibid.)
24
POSSIBLE CONTAMINATION OF BOTH TYPES OF HUMAN AND COMPUTER VIRUSES
Human Viruses can be spread through:
respiratory passages
direct contact
biting insects
Computer Viruses are spread via:
contaminated disks
downloaded software
Email; Internet
Consequently, a viral infection has more than three core components:
 a trojan component: An infected program does something unwanted in certain
circumstances;
 a dormancy component: The viral infection may conceal itself indefinitely. Trojans, too,
may use dormancy to conceal their presence, but with a virus dormancy (or, equivalently,
unnoticed Trojan damage) is essential for the effectiveness of their third component:
 an infective component: infected programs infect further programs, which then behave in a
similar way;
 a survival component; crucial to the long-term practical success of a virus is that it can infect
in some sense faster than it can be eliminated.
On the other hand, the choice of giving names to virus is metaphorical because their names
are borrowed from different domains, for instance games, to be transferred to the computer
environment. A virus like Ping-Pong26 causes a ping-pong effect on the screen; it makes characters
to move along the screen and reflects from other characters and borders of the screen. A
Backdoor.Netbus, is a hidden remote administration utility, a kind of thief acting backdoors, and
steals files or, even worse, damages installed software. Another virus, Form27, as its names implies,
processes a dummy cycle while pressing on the keys. Christmas Tree28 outputs an image of the
Christmas Tree and then sends copies of itself to all the network users whose addresses are in the
corresponding system files NAMES and NETLOG.
To conclude, the virus metaphor has several advantages:
 it relieves the client from the feeling of responsibility for such kind of dysfunctions,
attributing them to external forces (viruses);
 it encourages the user-client to cooperate and undertake actions and seek for some help
from a professional;
 it gives the feeling of controlling the change (recovery from illness) as the description
following the virus characteristics;
 it may also give, depending on the ‘pathological picture’, the possible time perspective of
the treatment.
6. Final Remarks
The research carried out to this point is still far from providing a thorough investigation on
the link between metaphors and the Computer Science. Still it represents an adventure only on a
part of the matrix of our computer-based world and may lead to several conclusions:
26
www.virus.com
Obs.: This is a very dangerous virus. It hits boot-sector of floppy disks during an access to them and Boot-sector of
the hard disk on a reboot from an infected floppy disk. It acts only on the 16th of every month, containing the text: The
FORM-Virus sends greetings to everyone who's reading this text.
28
Obs.: From the 24th to the 31st of December it displays a Christmas tree. In December of 1987, there was the first
total epidemics of the network due to this virus; it paralyzed the entire network, which was over-flooded with copies of
it.
27
First, interface metaphors are employed by program designers in order to make the system
easier to learn and use. In doing this, the efficiency of the system is taken for granted by its users,
and both the designers and the respective program consumers’ feelings are UP.
With regard to the theoretical analysis submitted above it becomes evident that the use of
metaphors in relation to an e-language needs further research to detect other culture-dependent
metaphors, like the conceptualization of the web as a sea adventure or a shopping dilemma, or like
the Internet as a huge information highway, etc. This leads us to the second conclusion that
metaphors can provide action, entertainment, by appealing to our common knowledge of the world.
Thirdly, the source metaphors emphasize aspects of the target metaphor while
downplaying other important aspects. As for instance, when using the metaphor CYBERSPACE IS
JOURNEY, some aspects of the cyberspace are highlighted ( e.g. tour, visit, etc), while other
aspects are hidden, as for instance, when ‘cybering’ users do not go anywhere, moreover, they sit
and press keys to reach (enter) the destination they feel like exploring. Furthermore, if navigators
of the virtual environment were disembodied and fragmented subjects who existed as mere
collections of aliases and agents, what can be then the use of metaphor within the cyberspace? What
is then the use of so many openings, entries, exits and returns to the initial point, like home?
Last but not least, metaphors are connotative carriers since they work by transferring a
system of associated meanings from the metaphor source to the metaphor target. In the conceptual
metaphor – CYBERSPACE IS LANGUAGE -, we transfer our common knowledge of language and
its communicative purpose to the domain of cyberspace. The result is that we think of computers as
being informative and instructive.
Bibliography
1. Forsythe, Kathleen, Cathedrals in the Mind; the architecture of metaphor in understanding
learning, in: Metaphor in Cognitive Linguistics, Raymond Gibbs, Jr. Steen J. Gerard., vol.175,
John Benjamins Publishing Company, Amsterdam/Philadelphia, 1999.).
2. Margolis, Philip E., Dicţionar P.C., NEMIRA, Bucureşti, 1997.
3. Margolis, Philip E., Computer &Internet Dictionary, Random House Webster, 3rd Edition,
1999.
4. Baudrillard, Jean, The Ecstasy of Communication. New York, Semiotext(e), 1988.
5. Chevallier, Jean and Gheerbrant, Alain, A Dictionary of Symbols, BLACKWELL
Reference, USA, 1994.
6. Herring, Susan, Computer-Mediated Communication. Linguistic, Social Cross-Cultural
Perspectives, John Benjamins Publishing Company, Amsterdam/Philadelphia, 1996.
7. Webster’s Encyclopedic Unabridged Dictionary of the English Language,
GRAMERCY, 1994.
8. Richards, I. A., The Philosophy of Rhetoric, Oxford University Press, 1964.
9. Lakoff, George, Johnson, Mark, Metaphors We Live By, Chicago Press, 1980.
10. Flavell, Linda and Roger, The Chronology of Words and Phrases, Kyle Cathie Limited,
1999.
11. An A-Z of Computing Jargon and Concepts, Penguin Books, 2001.
Electronic References
1. John M. Lawler, Metaphors We Compute By, http://www.ling.lsa.imich.edu/jlawler/
2. The History of Cybertext, http://www.victorianweb.org./cpace/ht/
3. http://www.virus.com
Download