Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
hacker_culture [2021/01/03 00:52]
ntnsndr Spring 2021 major revision
hacker_culture [2022/03/11 11:00] (current)
ntnsndr
Line 52: Line 52:
 The format of the exploit can vary based on the assignment. They might be primarily visual or primarily textual, or code. Show, don't just tell---provide screenshots,​ source code, and other forms of evidence. If they are not self-explanatory,​ include a [README](https://​en.wikipedia.org/​wiki/​README) text that explains the nature and rationale of the hack.  The format of the exploit can vary based on the assignment. They might be primarily visual or primarily textual, or code. Show, don't just tell---provide screenshots,​ source code, and other forms of evidence. If they are not self-explanatory,​ include a [README](https://​en.wikipedia.org/​wiki/​README) text that explains the nature and rationale of the hack. 
  
-Exploits need not and should not be lengthy; their value is in the adventuresomeness of their thinking, not their girth. Just be sure to engage ​with at least one assigned source from the week. Also: do not break the law.+Exploits need not and should not be lengthy; their value is in the adventuresomeness of their thinking, not their girth. Just be sure to include [[engagement with assigned sources|engagement ​with at least one assigned source]] from the week. Also: do not break the law.
  
 ### Objective 2: Teach ### Objective 2: Teach
Line 81: Line 81:
     * clear explanation of the Exploit along with supporting evidence     * clear explanation of the Exploit along with supporting evidence
     * creative implementation and stretching of skills     * creative implementation and stretching of skills
-    * sophisticated engagement with at least one of the module'​s assigned sources+    * sophisticated ​[[engagement ​with assigned sources|engagement]] ​with at least one of the module'​s assigned sources
   * Objective 2: 20 points   * Objective 2: 20 points
     * accessible and fun introduction to a skill and its significance (5 points)     * accessible and fun introduction to a skill and its significance (5 points)
Line 92: Line 92:
       * 1,​800-to-2,​000-word length, written clearly and with instructive illustrations       * 1,​800-to-2,​000-word length, written clearly and with instructive illustrations
       * comprehension of the hack and convincing, accessible analysis of it       * comprehension of the hack and convincing, accessible analysis of it
-      * impressive and documented research with both [[:​scholarly_sources|scholarly]] and primary sources +      * impressive and documented research with both [[:​scholarly_sources|scholarly]] and primary sources, [[:​citation_standards|appropriately cited]] 
-      * sophisticated engagement with at least two assigned sources+      * sophisticated ​[[engagement with assigned sources|engagement with at least two assigned sources]]
     * one-minute presentation,​ with a compelling slide, on the last day of class (5 points)     * one-minute presentation,​ with a compelling slide, on the last day of class (5 points)
  
Line 175: Line 175:
 ### 7. Remix ### 7. Remix
  
-  * Lawrence Lessig, "[\<​free_culture\>​](https://randomfoo.net/​oscon/​2002/​lessig/​)," ​O.Reilly Open Source Conference ​(July 242002)---watch Flash presentation if you can+  * Lawrence Lessig, "[Laws that Choke Creativity](https://www.youtube.com/watch?​v=7Q25-S7jzgs)," ​TED (November 152007)
   * Donna Haraway, "[A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century](https://​web.archive.org/​web/​20120214194015/​http://​www.stanford.edu/​dept/​HPS/​Haraway/​CyborgManifesto.html),"​ in _Simians, Cyborgs and Women: The Reinvention of Nature_ (Routledge, 1991)   * Donna Haraway, "[A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century](https://​web.archive.org/​web/​20120214194015/​http://​www.stanford.edu/​dept/​HPS/​Haraway/​CyborgManifesto.html),"​ in _Simians, Cyborgs and Women: The Reinvention of Nature_ (Routledge, 1991)
   * "​[Shenzhen:​ The Silicon Valley of Hardware](https://​www.youtube.com/​watch?​v=SGJ5cZnoodY),"​ _Wired_ (2016)   * "​[Shenzhen:​ The Silicon Valley of Hardware](https://​www.youtube.com/​watch?​v=SGJ5cZnoodY),"​ _Wired_ (2016)
Line 186: Line 186:
 * Johan Huizinga, "​Nature and Significance of Play as a Cultural Phenomenon,"​ in _[Homo Ludens: A Study of the Play-Element in Culture](http://​art.yale.edu/​file_columns/​0000/​1474/​homo_ludens_johan_huizinga_routledge_1949_.pdf)_ (Routledge, 1949 [1944]) * Johan Huizinga, "​Nature and Significance of Play as a Cultural Phenomenon,"​ in _[Homo Ludens: A Study of the Play-Element in Culture](http://​art.yale.edu/​file_columns/​0000/​1474/​homo_ludens_johan_huizinga_routledge_1949_.pdf)_ (Routledge, 1949 [1944])
 * Colin Milburn, "​[Introduction:​ All Your Base](https://​read.dukeupress.edu/​books/​book/​2523/​chapter/​1255204/​All-Your-Base),"​ in _Respawn: Gamers, Hackers, and Technogenic Life_ (Duke University Press, 2018) * Colin Milburn, "​[Introduction:​ All Your Base](https://​read.dukeupress.edu/​books/​book/​2523/​chapter/​1255204/​All-Your-Base),"​ in _Respawn: Gamers, Hackers, and Technogenic Life_ (Duke University Press, 2018)
-* Ezra Klein, "[I build a world with fantasy master N.K. Jemisin](https://​www.stitcher.com/show/​the-ezra-klein-show/​episode/i-build-a-world-with-fantasy-master-n-k-jemisin-55964162)," _The Ezra Klein Show_ (August 26, 2018)+* Ezra Klein, "[I build a world with fantasy master N.K. Jemisin](https://​radiopublic.com/Ezra/s1!8ed6a)," _The Ezra Klein Show_ (August 26, 2018)
  
-**Exploit: Build a world.** In the spirit of Jemisin'​s world-building,​ hack an imaginary world that doesn'​t exist yet. Make a map, tell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "​real"​ world does not? What is the same, and what is different? What does that world reveal about this one?+**Exploit: Build a world.** In the spirit of Jemisin'​s world-building,​ hack an imaginary world that doesn'​t exist yet. Make a map, tell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "​real"​ world does not? What is the same, and what is different? What does that world reveal about this one? [These "​laws"​](https://​www.raphkoster.com/​games/​laws-of-online-world-design/​the-laws-of-online-world-design/​) from a practicing game designer might help.
  
  
Line 203: Line 203:
  
   * Yochai Benkler, "[Peer Production, the Commons, and the Future of the Firm](https://​doi.org/​10.1177/​1476127016652606),"​ _Strategic Organization_ 15, no. 2 (May 2017)   * Yochai Benkler, "[Peer Production, the Commons, and the Future of the Firm](https://​doi.org/​10.1177/​1476127016652606),"​ _Strategic Organization_ 15, no. 2 (May 2017)
-  * Nathan Schneider, "[The Tyranny of Openness: What Happened to Peer Production?​](https://​ntnsndr.in/​tyranny), ​working paper (2020)+  * Nathan Schneider, "[The Tyranny of Openness: What Happened to Peer Production?​](https://​ntnsndr.in/​tyranny),​" _Feminist Media Studies_ ​(2021)
   * Coraline Ada Ehmke, "[The Dehumanizing Myth of Meritocracy](https://​modelviewculture.com/​pieces/​the-dehumanizing-myth-of-the-meritocracy),"​ _Model View Culture_ (May 19, 2015)   * Coraline Ada Ehmke, "[The Dehumanizing Myth of Meritocracy](https://​modelviewculture.com/​pieces/​the-dehumanizing-myth-of-the-meritocracy),"​ _Model View Culture_ (May 19, 2015)
  
-**Exploit: Submit a bug report or question to an open-source project.** Critical to any open-source project is the participation of the community. For those of us who are not amazing software engineers, one of the best (and most rewarding) ways of participating is through feedback. Identify which software that you use is open-source---Canvas and Hypothesis are a start---and try to find where the developers communicate with users. (It's usually in the Issues section of the project'​s GitHub page.) Write to them with a bug you've noticed or a feature you'd like to see. Keep in mind Raymond'​s essay on questions to help ensure your recommendation is usefully phrased and well researched.+**Exploit: Submit a bug report or question to an open-source project.** Critical to any open-source project is the participation of the community. For those of us who are not amazing software engineers, one of the best (and most rewarding) ways of participating is through feedback. Identify which software that you use is open-source---Canvas, Docs.plus, ​and Hypothesis are a start---and try to find where the developers communicate with users. (It's usually in the Issues section of the project'​s GitHub page.) Write to them with a bug you've noticed or a feature you'd like to see. Keep in mind Raymond'​s essay on questions to help ensure your recommendation is usefully phrased and well researched.
  
  
Line 230: Line 230:
 ### 13. Weary giants ### 13. Weary giants
  
-  * John Perry Barlow, "[A Declaration of the Independence of Cyberspace](https://www.eff.org/cyberspace-independence)" (February 81996)+  * Neal Stephenson, "[The Great Simoleon Caper](http://content.time.com/time/​subscriber/​printout/​0,​8816,​982610,​00.html)" (March 11995)
   * Pia Mancini, "​[Cities as Open Collectives](https://​www.youtube.com/​watch?​v=S74uMkmNdh0),"​ OuiShare Fest (2017)   * Pia Mancini, "​[Cities as Open Collectives](https://​www.youtube.com/​watch?​v=S74uMkmNdh0),"​ OuiShare Fest (2017)
-  * Andrew Leonard, "[How Taiwan’s Unlikely Digital Minister Hacked the Pandemic](https://​www.wired.com/​story/​how-taiwans-unlikely-digital-minister-hacked-the-pandemic/​),​ _Wired_ (July 23, 2020)+  * Andrew Leonard, "[How Taiwan’s Unlikely Digital Minister Hacked the Pandemic](https://​www.wired.com/​story/​how-taiwans-unlikely-digital-minister-hacked-the-pandemic/​),​" ​_Wired_ (July 23, 2020)
  
 **Exploit: Improve or subvert a government process.** Look for old-world inefficiencies,​ combat them with hacks. Where are governments needlessly burdening people? How do bureaucratic processes waste time and resources? [Explore the field of civic tech](https://​civictech.guide/​). Apply your hacking skills toward devising a strategy that solves the problem, whether those in power like it or not. **Exploit: Improve or subvert a government process.** Look for old-world inefficiencies,​ combat them with hacks. Where are governments needlessly burdening people? How do bureaucratic processes waste time and resources? [Explore the field of civic tech](https://​civictech.guide/​). Apply your hacking skills toward devising a strategy that solves the problem, whether those in power like it or not.
Line 239: Line 239:
 ### 14. Gentrification ### 14. Gentrification
  
-  * Mark Zuckerberg, "[The Hacker Way](https://​www.wired.com/​2012/​02/​zuck-letter/​)," ​_Wired_ ​(February 1, 2012)+  * Mark Zuckerberg, "[The Hacker Way](https://​money.cnn.com/​2012/​02/​01/technology/​zuckerberg_ipo_letter/​index.htm)," ​_CNN Money_ ​(February 1, 2012)
   * Alessandro Delfanti and Johan Söderberg, "​[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](http://​www.ephemerajournal.org/​contribution/​repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism),"​ _Ephemera_ 18, no. 3 (2018)   * Alessandro Delfanti and Johan Söderberg, "​[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](http://​www.ephemerajournal.org/​contribution/​repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism),"​ _Ephemera_ 18, no. 3 (2018)
   * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://​www.wired.com/​story/​now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/​),"​ _Wired_ (January 31, 2018)   * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://​www.wired.com/​story/​now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/​),"​ _Wired_ (January 31, 2018)
Line 258: Line 258:
   * [Hack_Curio](https://​hackcur.io/​)   * [Hack_Curio](https://​hackcur.io/​)
   * [Hacker News](https://​news.ycombinator.com/​)   * [Hacker News](https://​news.ycombinator.com/​)
-  * _[Hackernoon](https://​hackernoon.com/​)_+  * _[Hacker News, The](https://​thehackernews.com/​)_ 
 +  * _[Hacker Noon](https://​hackernoon.com/​)_
   * _[Krebs on Security](http://​krebsonsecurity.com/​)_   * _[Krebs on Security](http://​krebsonsecurity.com/​)_
   * _[Lifehacker](http://​lifehacker.com/​)_   * _[Lifehacker](http://​lifehacker.com/​)_
Line 269: Line 270:
   * [r/​unixporn](https://​www.reddit.com/​r/​unixporn/​)   * [r/​unixporn](https://​www.reddit.com/​r/​unixporn/​)
   * _[xkcd](https://​xkcd.com/​)_   * _[xkcd](https://​xkcd.com/​)_
 +  * _[Zero Day](https://​zetter.substack.com/​)_
  
 --- ---