We love eBooks
    Baixar So you want to write fiction about hackers, crackers, computer security, and the minds of cyberstalkers? (English Edition) pdf, epub, eBook
    Editora

    So you want to write fiction about hackers, crackers, computer security, and the minds of cyberstalkers? (English Edition)

    Por Anne Hart

    Sobre

    For fiction writers and journalists: How do you write suspense or action fiction (or investigative journalism with ardent fact-checking) about cyberstalkers, hackers, and crackers or cyber security training, hiring, firing, and adventure-action? You could write that the cyberstalkers in your fiction story (or news writing) want to maintain their dignity. Will they be the protagonists or antagonists in your novel, story, or news feature?

    As antagonists, they want reasonable answers from their victims. When your protagonist gives an emotional response, it escalates their obsession. You also may wish to read the article, “Best Place to land a Job Today is Thwarting Hackers,” by Tim Johnson, McClatchy Washington Bureau, published October 7, 2016. See: http://www.newsobserver.com/news/nation-world/national/article106788532.html

    On another note: How can fiction writers portray those who thwart and those who break security when it applies to computers and other electronic devices?

    Real cyberstalkers experience a surge of amphetamine-like substances in their systems. Your avatar in virtual reality portrayed as the e-vil (electronic villains as compared to evil) ones, could be illustrated by you in imagery or words as experiencing a similar grid of power, such as imagery of lights ‘dying’ down a Christmas tree or lamp post. Are your fictional characters in a place where metal turns to virtual flesh in a salty sea of sensation, sanity, and space?

    Stalking replaces talking or balking. "Bad guy" avatars are not Mr. or Ms. Conversationalists. They opt for introverted sensing with thinking. They perceive and adapt, and when they run out of skills for adapting, they obsess.

    Victims usually are demanding or begging for respect, or have achieved such eminence that they no longer need to use body language to ask for respect. The e-vil avatar can't get respect without skill, but the underlying doubt regarding competence undermines so that when someone else asks for respect, the avatar explodes using anger to get power, control, and domination through remote e-terror.

    The victims of aberrant avatars see computers as an appliance, like a toaster or oven. The avatars of clean-shaven highways see computers as a way to have power over, to harness, and control nature through technology they curb to meet their needs.

    Cyberstalkers are high in intelligence and view the type of digital fiction that contains character mood regulators. Entertainment as escape allows their avatars to manipulate, penetrate, and conquer anything from virtual worlds to the opposite sex along with and corporations of money, eminence, achievement, beauty, and power.

    Female cyberstalkers "envelope" their victims' computers with obsession focused on the "I lose when you win" attitude, but their male counterparts "penetrate" computer systems to gain a "core identity" that's lacking within.

    In an effort to gain a core identity with the computer, the cyberstalker falls in love with the desire to destroy the victim with the hardware in order to validate their own worth. In reality, the cyberstalker is a walking avatar. Regardless of gender, the aberrant avatar will say, "If only I could be you, I would be competent."

    It's this inner-directed thinking spiral, a failure phobia, that focuses on accomplishments, wealth, fame, or public exposure in the media. That's why the e-terrorist and cyberstalker single out high-profile authors in the media with strong opinions. Your cyberstalker becomes an avatar whose identity is submerged in that of another person (or another avatar online.)

    Life becomes a video game in which the two avatars duke it out online for the prize of accomplishment and competence. The stalker wants a connection. The victim wants a break. If the connection fails online, the stalker lacks any development in the sense of self. The cyberstalker is like an avatar with no sense of self on which to fall back, no one to lean on except imaginat
    Baixar eBook Link atualizado em 2017
    Talvez você seja redirecionado para outro site

    Relacionados com esse eBook

    Navegar por coleções