Hacking DiversityPub Date : 2020-12-31DOI: 10.1515/9780691194172-007
{"title":"4. Crafting and Critique: Artifactual and Symbolic Outputs of Diversity Advocacy","authors":"","doi":"10.1515/9780691194172-007","DOIUrl":"https://doi.org/10.1515/9780691194172-007","url":null,"abstract":"","PeriodicalId":220225,"journal":{"name":"Hacking Diversity","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125260886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"History, Heresy, Hacking","authors":"Christina Dunbar-Hester","doi":"10.2307/j.ctvhrd181.6","DOIUrl":"https://doi.org/10.2307/j.ctvhrd181.6","url":null,"abstract":"This chapter provides a historical background of the cultural strands that intertwine to produce diversity advocacy in open-technology. It gives an overview of the history of women in computing, cyberfeminism, and hacking and FLOSS, while challenging conventional accounts of hacking. It also includes critiques to suggest that present-day diversity advocacy needs to be read as a recentering and redefinition of what counts as hacking and by extension, who counts as a hacker or technological agent more generally. National and global economic and labor currents are important contexts for understanding diversity advocacy. So, too, is the underarticulated history of hacking in which peripheral people and practices move to the center of the frame. At present, exhortations to “learn to code” are all but deafening.","PeriodicalId":220225,"journal":{"name":"Hacking Diversity","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131023970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"To Fork or Not to Fork:","authors":"","doi":"10.2307/j.ctvhrd181.7","DOIUrl":"https://doi.org/10.2307/j.ctvhrd181.7","url":null,"abstract":"","PeriodicalId":220225,"journal":{"name":"Hacking Diversity","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116411602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Putting Lipstick on a GNU?","authors":"Christina Dunbar-Hester","doi":"10.2307/j.ctvhrd181.11","DOIUrl":"https://doi.org/10.2307/j.ctvhrd181.11","url":null,"abstract":"This chapter explores social identity and multiple conceptions of who might embody the missing diversity in open-technology cultures, from the perspectives of diversity advocates. It discusses gender, race, and ethnicity. It also proposes that representation has its limits as a project of empowerment and suggests that workplace relations to some degree constrain the criticism that advocates express. The chapter focuses on how advocates for diversity in open-technology cultures define the identity categories around which they rally. It is evident that they hope to deepen an association between certain categories of social identity and certain forms of technological belonging. Contemporary social studies of technology treat technology as neither wholly socially determined nor as conforming to or flowing from an internal rational logic.","PeriodicalId":220225,"journal":{"name":"Hacking Diversity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128328899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}