skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Techniques of Use: Confronting value systems of productivity, progress, and usefulness in computing and design
This paper turns to one of HCI’s central value systems, i.e. its commitments to usefulness and the ideal that technology enables social progress, productivity, and excellence. Specifically, we examine how the seemingly “positive” ideal to make technology “useful” – i.e. to build systems and devices that advance social and technological progress – masks various forms of violence and injustice such as colonial othering, racist exclusions, and exploitation. Drawing from ethnographic research, we show how design and computing methods from design thinking to agile theory and entrepreneurial approaches in tech production and higher education are the latest techniques in the cultivation of useful bodies on behalf of the state, the corporation, the university, and the economy. Aligning with feminist, critical race and critical computing commitments, this paper offers a genealogical approach to show how injustice and violence endure, despite and because of a narrative of progress and positive change.  more » « less
Award ID(s):
1901171
PAR ID:
10226050
Author(s) / Creator(s):
;
Date Published:
Journal Name:
Proceedings of the ACM Conference on Human Factors in Computing Systems
ISSN:
0100-6940
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Despite the increasing number of women receiving bachelor’s degrees in computing (i.e., Computer Science, Computer Engineering, Information Technology, etc.), a closer look reveals that the percentage of Black women in computing has significantly dropped in recent years, highlighting the underrepresentation of Black women and its negative impact on broadening participation in the field of computing. The literature reveals that several K-16 interventions have been designed to increase the representation of Black women and girls in computing. Despite these best efforts, the needle seems to have barely moved in increasing the representation or the retention of Black women in computing. Instead, the primary goals have been to recruit and retain women in the CS pipeline using gender-focused efforts intended to increase the number of women who also identify as members of racialized groups. However, these gender-focused efforts have fallen short of increasing the number of Black women in computing because they fail to acknowledge or appreciate how intersectionality (the overlapping social constructs of gender, race, ethnicity, class, etc.) has shaped the lived experiences of Black women navigating the computing pipeline. Without honest dialogue about how power operates in the field of computing, the push for racial equality and social justice in CS education remains an elusive goal. Leveraging intersectionality as a critical framework to address systemic oppression (i.e., racism, gender discrimination, power, and privilege), we interview 24 Black women in different phases of the computing pipeline about their experiences navigating the field of computing. An intersectional analysis of Black women’s experiences reveals that CS education consists of saturated sites of violence in which interconnected systems of power converge to enact oppression. Findings reveal three primary saturated sites of violence within CS education: (1) traditional K-12 classrooms; (2) predominantly White institutions; and (3) internships as supplementary learning experiences. We conclude the article with implications for how the field of CS education can begin to address racial inequality that negatively impacts Black girls and women, thus contributing to a more equitable and socially just field of study that benefits all students. 
    more » « less
  2. Mitigating climate change and social injustice are critical, interwoven challenges. Climate change is driven by grossly unequal contributions to elevated greenhouse gas emissions among individuals, socioeconomic groups, and nations. Yet, its deleterious impacts disproportionately affect poor and less powerful nations, and the poor and the less powerful within each nation. This climate injustice prompts a call for mitigation strategies that buffer the poorest and the most vulnerable against climate change impacts. Unfortunately, all emissions mitigation strategies also reshape social, economic, political, and ecological processes in ways that may create climate change mitigation injustices—i.e., a unique set of injustices not caused by climate change, but by the strategies designed to stem it. Failing to stop climate change is not an answer—this will swamp all adverse impacts of even unjust mitigation in terms of the scope and scale of disastrous consequences. However, mitigation without justice will create uniquely negative consequences for the more vulnerable. The ensuing analysis systematically assesses how climate change mitigation strategies can generate or ameliorate injustices. We first examine how climate science and social justice interact within and among countries. We then ask what there is to learn from the available evidence on how emissions reductions, well-being, and equity have unfolded in a set of countries. Finally, we discuss the intersection between emissions reduction and mitigation justice through actions in important domains including energy, technology, transport, and food systems; nature-based solutions; and policy and governance. 
    more » « less
  3. The social impacts of computer technology are often glorified in public discourse, but there is growing concern about its actual effects on society. In this article, we ask: how does “consent” as an analytical framework make visible the social dynamics and power relations in the capture, extraction, and labor of data science knowledge production? We hypothesize that a form of boundary violation in data science workplaces—gender harassment—may correlate with the ways humans’ lived experiences are extracted to produce Big Data. The concept of consent offers a useful way to draw comparisons between gender relations in data science and the means by which machines are trained to learn and reason. Inspired by how Big Tech leaders describe unsupervised machine learning, and the co-optation of “revolutionary” rhetoric they use to do so, we introduce a concept we call “techniques of invisibility.” Techniques of invisibility are the ways in which an extreme imbalance between exposure and opacity, demarcated along fault lines of power, are fabricated and maintained, closing down the possibility for bidirectional transparency in the production and applications of algorithms. Further, techniques of invisibility, which we group into two categories—epistemic injustice and the Brotherhood—include acts of subjection by powerful actors in data science designed to quell resistance to exploitative relations. These techniques may be useful in making further connections between epistemic violence, sexism, and surveillance, sussing out persistent boundary violations in data science to render the social in data science visible, and open to scrutiny and debate. 
    more » « less
  4. We aim to understand, from a motivational perspective, how Black undergraduate women in computing make sense of their intersectional computing experiences. We examine their motivation to major in computing, their experiences as Black women in computing, and how these vary across institutional contexts. A sample of 77 Black undergraduate women in computing programs (computer science, computer engineering, information systems, information technology, and software engineering) from diverse college settings was recruited to participate in the study. Participants responded to an online survey that included several Likert-scale measures for identity, motivation and retention variables, demographic questions, and two open-ended questions:andWhat is it like for you to be a Black female student in computing? Findings.Key themes that emerged from our quantitative and qualitative analyses revealed the range of motivational factors driving Black undergraduate women to study computing and the nuances across their intersectional experiences in the computing education context. Additionally, Black undergraduate women located in HBCU computing education contexts demonstrated both similar and unique perspectives and experiences compared to their counterparts in non-HBCU settings. Conclusions.In addition to the isolation, pressure, power dynamics and epistemic violence experienced by Black women in the intersectional computing education context, the findings of this study display the unique cultural-social-psychological strengths of Black women in their positive valence and resilience, as well as their joy, empowerment, and achievement in computing. Increasing and complicating our knowledge of the motivations and intersectional experiences of Black women in undergraduate computing education, as well as understanding when and how their beliefs and perspectives vary across institutional context, will better inform efforts to retain them and promote their success both in college and into their careers. 
    more » « less
  5. Abstract Schools are often encouraged to foster a positive climate to reduce adolescent violence, but evidence on the effectiveness of this approach varies significantly. This study investigates the roots of this variation by testing alternative hypotheses about how positive school-level climate and school-level student friendship network density interact to shape adolescent violence perpetration. Research on informal social control and network closure suggests that the violence-reducing association of positive school climate will be enhanced among schools where students are more densely tied through their friendships. Research on youth conflict and subversion of control suggests the opposite. These hypotheses are tested with data from Waves I-II of the National Longitudinal Study of Adolescent to Adult Health (n = 11,771; 49% Female; Age mean = 15.04, SD = 1.60). Consistent with the conflict/subversion hypothesis, analyses indicate that the inverse association between positive school climate and adolescent violence is only evident among schools with a very low density of friendship ties. Strikingly, however, there is evidence that a more positive school climate is associated with increases in violence among youth attending schools with a high density of friendship ties. These findings suggest that efforts to reduce violence by fostering cohesion among youth in their schools and other social contexts can be undermined by youth network processes. 
    more » « less