Unit One: Section A Duel in the Cyberspace Teacher: YANG Zhiting Attendants: Students of Class 7, Grade 2001 Place: Multimedia Classroom 8-5 Duration of Time: 50 min. Objectives for This Class a) To inform the students of the background information b) To give opportunities for understanding the important elements of story c). Have an analysis of the organization of Duel in Cyberspace Teaching Procedures I. Introduction of Background information A. Origin of the word “Cyberspace” “Cyberspace: A consensual hallucination experienced daily by billions of legitimate operators, in every nation, by children being taught mathematical concepts...A graphical representation of data abstracted from the banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the non-space of the mind, clusters and constellations of data. Like city lights, receding…” --William Gibson, Neuromancer B. Hacker Old School Hackers: Script Kiddies, or Cyber-Punks: Professional Criminals, or Crackers: Coders and Virus Writers: C. IP Spoofing II. Understanding the elements of story A. Definition of the literary form “story”. B. Characteristics of story consciously made definite formal development firmness in construction unity in plot, theme, character, tone, mood, even, occasionally, in style C. Ways of getting closer to story point of view character plot structure D. Point of view Two main kinds narrator as a participant (writing in the first person) narrator as a non-participant (writing in the third person) E. Characters Protagonist Antagonist F. Plot elements: Time Place Character Background Conflict Crisis Resolution J. Conflict Essential patterns of conflict: Ÿ character against character Ÿ character against society Ÿ character vs. some material force Ÿ character vs. some supernatural entity H. Crisis and Denouement I. Structure III. Understanding the organization of the story: Duel in Cyberspace A. The first section conflict main characters background information a. someone broke into the narrator’s computers b. The log file summaries were stolen c someone was challenging the narrator d. the narrator was going to take action B. The second section Measures I took --- put digitized phone messages on the Internet as a bait --- keep in touch with FBI --- set up monitoring system Compare and Contrast ---- in common a fascination with computers ---- in discrepancy write technical programs for company sentenced to prison C. The third section How did the man get caught ---- monitor from NETCOM ---- found he was logging on ---- reported to FBI D. The fourth section The result of the duel. ---- My first face-to-face meeting with my opponent IV. Online Reading Go through the articles “the Online World” and “the Hacking”. V. Review the Internet Security Issue A. Watch the movie “Cyberspace” B. Prepare for group discussion questions for next Class How do people make good use of internet in their work and daily life. Tell a story about hacker or cyber-theft to share with the class. How to protect computer system