Jump to ContentJump to Main Navigation
Hacking DiversityThe Politics of Inclusion in Open Technology Cultures$
Users without a subscription are not able to see the full content.

Christina Dunbar-Hester

Print publication date: 2019

Print ISBN-13: 9780691192888

Published to Princeton Scholarship Online: May 2020

DOI: 10.23943/princeton/9780691192888.001.0001

Show Summary Details
Page of

PRINTED FROM PRINCETON SCHOLARSHIP ONLINE (www.princeton.universitypressscholarship.com). (c) Copyright Princeton University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in PRSO for personal use.date: 29 July 2021

History, Heresy, Hacking

History, Heresy, Hacking

Chapter:
(p.32) 2 History, Heresy, Hacking
Source:
Hacking Diversity
Author(s):

Christina Dunbar-Hester

Publisher:
Princeton University Press
DOI:10.23943/princeton/9780691192888.003.0002

This chapter provides a historical background of the cultural strands that intertwine to produce diversity advocacy in open-technology. It gives an overview of the history of women in computing, cyberfeminism, and hacking and FLOSS, while challenging conventional accounts of hacking. It also includes critiques to suggest that present-day diversity advocacy needs to be read as a recentering and redefinition of what counts as hacking and by extension, who counts as a hacker or technological agent more generally. National and global economic and labor currents are important contexts for understanding diversity advocacy. So, too, is the underarticulated history of hacking in which peripheral people and practices move to the center of the frame. At present, exhortations to “learn to code” are all but deafening.

Keywords:   diversity advocacy, open-technology, cyberfeminism, FLOSS, hacking, Kali Tal, Lilly Nguyen, computing

Princeton Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us.