Growing Platform of Hate

Total Page:16

File Type:pdf, Size:1020Kb

Growing Platform of Hate CONSUMER CREATIVITY AS A JOURNEY TOWARD A MORAL DESTINY: AN INVESTIGATION OF THE FREE/OPEN SOURCE SOFTWARE COMMUNITY by Tiebing Shi A thesis submitted to the School of Business In conformity with the requirements for the degree of Doctor of Philosophy Queen‘s University Kingston, Ontario, Canada November 2010 Copyright © Tiebing Shi, 2010 Abstract Drawing on Berman‘s (1972, 1988) political-cultural view of creativity, this thesis contextualizes consumer creativity in the context of a consumer community wrought with paradoxes and conflicts. Adopting a netnography methodology and empirically examining how individual free/open source software (FOSS) community members interpret their own creative activities, this thesis finds that consumer creativity is a journey toward a moral destiny, with morality arising from the interplay between rationalism and Romanticism and the cultural, historical baggage of these two ideological systems (e.g., sexism in the domains of science and art). Along this journey, individual FOSS community members (i.e., FOSS programmers) co-create and negotiate their common identity—a craftsperson who is a scientist, artist, and moral warrior, an identity embodied by FOSS, their creative product and a form of technology. This journey is both sweet and bitter and full of paradoxes and conflicts, all of which have rich implications about the power relationships within the community. On the one hand, FOSS programmers recreate a mythologized paradise where they re-merge with the natural world and return to human nature and where they are re-actualizing the moral values of freedom, public interests, and egalitarianism. On the other hand, in this community, sexism against female programmers is rampant; some programmers could perceive that their creativity is constrained and exploited by powerful project owners and thereby feel alienated, frustrated, and trivialized; individual programmers could confront each other due to their different technological preferences and doubt each other‘s motivations; and this community‘s creative process is infused with politics. ii This thesis (1) enriches the marketing literature on consumer creativity which is dominated by an instrumental perspective of creativity by introducing the moral dimension of consumer creativity; (2) contributes to the marketing literature which is dominated by the view that the creative process is enjoyable and harmonious by examining paradoxes and conflicts in the creative process; and (3) enriches the marketing literature on the impact of technology on human well-being and the natural environment by illustrating a contextualized view that the impact of a technology depends on the moral values of the creator and the user of this technology. iii Acknowledgement This thesis is a fruit of co-creation. However, it is a daunting task for me to list all the people who have encouraged, helped, and supported me and thereby, directly and indirectly, co-created with me during the whole process of developing and writing this thesis. To anyone I have left out, I apologize and give my thanks. I would like to thank my committee members—Peter Dacin, Sandy Staples—and my supervisor—Jay Handelman—for their valuable help in shaping this thesis and challenging my thinking. Huge thanks to Peter and Sandy for their advice and challenge, which have been truly helpful and highly appreciated. Special thanks to Jay for his insight, patience, kindness, and encouragement. His mentorship is unforgettable. I would also like to thank Martin Hand—my internal-external examiner—and Leyland Pitt—my external examiner—for their insightful feedback and willingness to serve on my committee. In addition to my committee, I would like to thank other professors who have taught me research skills and developed my passion about research, especially Julian Barling, Bill Cooper, Peggy Cunningham, Li-Jun Ji, and Jane Webster. My thanks also go to my PhD cohort; I have definitely benefited a lot from discussion with them. Zhengxin Sun‘s ideas about postmodernism and postconstructionism truly helped me to understand these complex theories. Terry Beckman‘s technical support greatly enhanced my relationship with my computer. I would also like to thank other wonderful people at the Queen‘s School of Business. The Monieson Centre, Queen‘s School of Business, gave me generous research funding. Yolande Chan, Andrew Barrett, Anne Beaubien, and Kate Minor have given me iv great support, which has helped me to finish this thesis. The people at the PhD/MSc Office always stand behind me, giving me any help whenever I need. Without the lasting help and support of Annette Lilly, Julie Gutelius Clarke, Teresa Touchette, and Lisa Rodrigues, I would not have reached this stage of my PhD journey. I would like to thank Zhenchang Cui, one of the teachers at my elementary school. His encouragement has been a source of strength for me for more than thirty years. Throughout my life, there are so many friends who have shared their insight with me. My thanks also go to them, especially Handong Chen, Luo He, Jiandong Li, Zhefeng Liu, Zhen Song, Yue Xu, Yongzhong Wang, Yonggang Zeng, and Yue Zhang, whose friendship supported me on my PhD journey. I would like to express my gratitude to all the FOSS community members who participated in my research. Their time and help have been highly appreciated. Without their contribution, finishing this thesis would be impossible. I also want to express my gratitude to those FOSS community members, whose postings, blogs, articles, and books are cited in this thesis; they are co-creators of this thesis, too. I wish to express my gratitude to my family, whose love and support always give me strength, especially my father whose will power, perseverance, and curiosity about new knowledge always stimulate me to stick to my goals and to learn new knowledge; and my mother who always reminds me that having a good rest is a precondition for studying efficiently. I also want to thank my wife who took charge of all home chores and cooked delicious food for me in the past years, allowing me to focus on my thesis. Finally, special thanks to my naughty son: playing with him was the best way for me to relax. v Table of Contents Abstract ………………………….………………………….…………….……………..ii Acknowledgement ……………………………………………………………………… iv Table of Contents ………………………………………………………………………...vi List of Figures ……………………………………………………………………………ix List of Tables ……………………………………………………………………………..x Chapter 1: Introduction ..………. …….………………………….…………………..…...1 Chapter 2: Review of Literatures on Creativity and Consumer Creativity ………….…...7 2.1 Creativity in Psychology Literature ………………………….……………………8 2.1.1 History of the Concept of Creativity …………………………………………9 2.1.2 The Personality View of Creativity ………………………………………....11 2.1.3 The Cognitive View of Creativity …………………………………………..14 2.1.4 A Biopsychosocial View of Creativity ……………………………………...16 2.1.5 The Group/Collective View of Creativity …………………………………..19 2.2 Consumer Creativity in the Marketing Literature ………………………………..26 2.2.1 The Personality Trait View of Creativity of Isolated Individual Consumers 32 2.2.2 The Psycho-Social View of Creativity of Isolated Individual Consumers …34 2.2.3 The Political-Cultural View of Creativity of Isolated Individual Consumers 38 2.2.3.1 The Liberatory Postmodern View of Consumer Creative Resistance ....38 2.2.3.2 The Manipulation View of Consumer Creative Resistance …………....40 2.2.3.3 The Evolution View of Consumer Creative Resistance ……………….41 2.2.4 Three Concepts Related to Community-based Consumer Creativity ……….43 2.2.4.1 The Concepts of Community and Consumer Community ……………..43 2.2.4.2 The Concept of Online Consumer Community …………..……………45 2.2.5 The Sociocultural View of Community-based Consumer Creativity ……….48 2.2.5.1 A Model of Developmental Progression of Individual to Collective Creativity ……………………………………………………………....49 2.2.5.2 A Framework of Collective Problem-Solving Process ………………...50 2.2.5.3 A Social-Experiential View of Learning and Knowledge-Building …..50 2.2.6 The Psycho-Social View of Motivations ……………………………………52 vi 2.2.7 The Sociocultural View of Motivations …………………………………….55 2.2.8 Summary of the Marketing Literature ………………………………………57 Chapter 3: A New Political-Cultural View ………………………….…………………61 3.1 A Brief Review of Berman‘s View of Creativity ………………………………...64 3.2 Intrapersonal Paradoxes and Conflicts at the Individual Level …………………..66 3.2.1 The Modern Self …………………………………………………………….67 3.2.2 Consumer Creativity and Intrapersonal Paradoxes/Conflicts ……………….68 3.3 The Conflicts at the Community Level …………………………………………..70 3.3.1 Competition among Individual Members …………………………………...70 3.3.2 The Conflict between Individual Members and Their Community ………...71 3.4 Paradoxes/Conflicts at the Society Level ………………………………………..75 3.5 Summary of Berman‘s View of Consumer Creativity …………………………..78 Chapter 4: Methodology ………………………….………………………….………...80 4.1 The Free/Open Source Software (FOSS) Community as Cultural Site …………81 4.2 Data Collection …………………………………………………………………..86 4.2.1 Direct Interviews ……………………………………………………………88 4.2.2 Online Archives of Selected Netnographic Sites …………………………...92 4.2.3 Artifacts ……………………………………………………………………..94 4.3 Ethical Issues …………………………………………………………………….94 4.4 Data Analysis …………………………………………………………………….95 Chapter 5: Findings ………………………….………………………….…………........96 5.1 Theme One: Recreating a Paradise in Cyberspace ………………………………98 5.1.1 Re-merging with the Natural World ……………………………………….100 5.1.2 Returning to Human Nature
Recommended publications
  • Australian Open Source Industry & Community Report 2008
    The Australian Open Source Industry & Community Report 2008 Sponsors & Industry Community Map of Education & Supporters Respondents Skills 5 9 11 12 15 Careers & Innovation The Market Business Opinion Employment Development 17 19 19 21 23 Methodology. The Australian Open Source Industry & Community Report was Promotion commissioned and executed by Waugh Partners, with the financial support of sponsors, NICTA, IBM and Fujitsu. The Census was directly promoted through a national roadshow which traveled to every capital city, on several mailing lists including Linux We worked closely with psychometricians and statisticians provided by Australia, Open Source Industry Australia and user groups around the NICTA, our primary research partner, to ensure the end-to-end quality country, and through direct contact with Open Source community of the research. While our sponsors and supporters provided feedback members and companies. Indirect promotion included blogging, media at numerous points throughout the project lifecycle, this report is the coverage, and notification to members of the Australia Computer result of independent analysis by Waugh Partners. It is based on data Society, AIIA, OzZope and numerous other organisations. collected through a pair of online surveys held between October and December 2007. Projections Community We have been very careful to make conservative projections, particularly related to industry revenue. The community survey was aimed at “individuals who contribute to Open Source projects and communities in any capacity, not just Our projected industry and export revenue figures are based upon software development”, and received 315 complete and legitimate the projected industry size and spread of companies compared to the responses, with 66 incomplete.
    [Show full text]
  • Chris Gombos
    Chris Gombos Gender: Male Service: 203-257-4988 Height: 6 ft. 2 in. Mobile: 203-257-4988 Weight: 215 pounds E-mail: [email protected] Eyes: Blue Web Site: http://www.atbstunts... Hair Length: Regular Waist: 36 Inseam: 33 Shoe Size: 9.5 Physique: Athletic Coat/Dress Size: 45 Ethnicity: Caucasian / White Unique Traits: TATTOOS (Got Them) Photos Film Credits we own the night stunt cop 2929/james gray/ manny siverio college road trip stunt goon disney/roger kumble/manny siverio life before her eyes cop/driver 29/29/vladim perelman/manhy siverio friends with benefits( 2007) angry bar customer/ falls what were we thinking/gorman bechard abuduction stunt cia agent/ utility stunts john singleton/ brad martin violet & daisey man #4 stunts Geoffery fletcher/pete bucossi solomon grundy stunt double/ stunt coordinator wacky chan productions/ mattson tomlin/chris gombos nor'easter hockey coach/ hockey action noreaster productions/andrew coordinator brotzman/chris gombos brass tea pot cowboy / stunts chris columbo/ manny siverio The wedding Stunts Lionsgate/ justin zackham/ roy farfel Devoured Stunt double Secret weapon films/ greg Oliver / Curtis Lyons Generated on 09/24/2021 08:39:14 pm Page 1 of 3 Television Bored to death season 3 ep8 Stunt double Danny hoch Hbo / /Pete buccossi Law & order svu " pursuit" Stunt double Jery hewitt / Ian McLaughlin ( stunt coordinators ) jersey city goon #2/ stunts fx/daniel minahan/pete buccosi person of interest season 1 ep 2 rough dude#2 / stunts cbs/ /jeff gibson "ghost" Boardwalk empire season 2 ep Mike Griswalt/ stunts Hbo/ Timothy van patten/ steve 12 pope Onion news network season 2 ep Stunt driver/ glen the producer Comedy central / / manny Siverio 4 Onion news network season 2 ep Stunt reporter Comedy central / / manny Siverio 6 gun hill founding patriot1 / stunts bet/reggie rock / jeff ward blue bloods ep "uniforms" s2 joey sava / stunts cbs/ / cort hessler ep11 Person of interest ep firewall Stunts/ hr cop CBS / Jonah Nolan / jeff gibson Person of interest ep bad code Brad / stunts CBS/.
    [Show full text]
  • Adam Tornhill — «Your Code As a Crime Scene
    Early praise for Your Code as a Crime Scene This book casts a surprising light on an unexpected place—my own code. I feel like I’ve found a secret treasure chest of completely unexpected methods. Useful for programmers, the book provides a powerful tool to smart testers, too. ➤ James Bach Author, Lessons Learned in Software Testing You think you know your code. After all, you and your fellow programmers have been sweating over it for years now. Adam Tornhill uses thinking in psychology together with hands-on tools to show you the bad parts. This book is a red pill. Are you ready? ➤ Björn Granvik Competence manager Adam Tornhill presents code as it exists in the real world—tightly coupled, un- wieldy, and full of danger zones even when past developers had the best of inten- tions. His forensic techniques for analyzing and improving both the technical and the social aspects of a code base are a godsend for developers working with legacy systems. I found this book extremely useful to my own work and highly recommend it! ➤ Nell Shamrell-Harrington Lead developer, PhishMe By enlisting simple heuristics and data from everyday tools, Adam shows you how to fight bad code and its cohorts—all interleaved with intriguing anecdotes from forensic psychology. Highly recommended! ➤ Jonas Lundberg Senior programmer and team leader, Netset AB After reading this book, you will never look at code in the same way again! ➤ Patrik Falk Agile developer and coach Do you have a large pile of code, and mysterious and unpleasant bugs seem to appear out of nothing? This book lets you profile and find out the weak areas in your code and how to fight them.
    [Show full text]
  • Securing Linux
    466_HTC_Linux_FM.qxd 10/2/07 10:05 AM Page iii How to Cheat at Securing Linux Mohan Krishnamurthy Eric S. Seagren Raven Alder Aaron W. Bayles Josh Burke Skip Carter Eli Faskha 466_HTC_Linux_FM.qxd 10/2/07 10:05 AM Page iv Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Elsevier, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. PUBLISHED BY Syngress Publishing, Inc.
    [Show full text]
  • Linux Conf Australia 報告
    Linux Conf Australia 報告 http://lca2007.linux.org.au/ 須崎有康 Linux 3大カンファレンスの一つ • Ottawa Linux Symposium – http://www.linuxsymposium.org • LinuxKongress – www.linux-kongress.org • 歴史 – Melbourne, 1999 (known as CALU) http://www.linux.org.au/conf/1999/ – Sydney, 2001 http://www.linux.org.au/conf/2001/ – Brisbane, 2002 http://www.linux.org.au/conf/2002/ – Perth, 2003 http://www.linux.org.au/conf/2003/ – Adelaide, 2004 http://www.linux.org.au/conf/2004/ – Canberra, 2005 http://www.linux.org.au/conf/2005/ – Dunedin, 2006 New Zealand http://www.linux.org.au/conf/2006/ – Sydney, 2007http://lca2007.linux.org.au スケジュール • 2007/01/15-16 Mini Conf Debian GNOME Education Embedded Virtualization MySQL Research Debian GNOME Education Gaming Kernel PostGresS OpenOffice. LinuxChix QL org • 2007/01/17-19 Linux Conf Australia 本会議 – 会場:Univ New South Wales (Sydney) – 参加者 1,000人ぐらい? – 有名人:Linux Torvalds, Andrew S. Tanenbaum (招待講演), Andrew Morton, Ted Ts’o, Rusty Russell, Andrew Tridgell –NTT藤田さん、筑波大 表さん、VA Linux Simon さん、AIST 八木、須崎、 • メジャーな人(Linus, Morton)は来ているが、Ottawa Linux Symposiumのような北米(IBM, Intel, RedHat )の組織的な参加がない。日本も無い。 MiniConf – 私が主に出たトラック – Virtualization (Sponsor HP) • http://virtminiconf.linux.hp.com/program • 予想外にメジャーなものがない。LCA本会議のほうが メジャーな発表あり。CFP(2006/12)の関係? –Kernel • http://lca2007.linux.org.au/Miniconfs/Kernel • Linus, Andrew Morton が参加。 MiniConf Virtualization • 1100-1140 Xen Image Manager - Jonathan Oxer – Local storage ではなく、external storage のマネージャ (build, demolish, propagete) – Node, VM, Image 毎の Config (Memory, Disk, CPU) – http://jon.oxer.com.au/xim/
    [Show full text]
  • Refactoring-Javascript.Pdf
    Refactoring JavaScript Turning Bad Code into Good Code Evan Burchard Refactoring JavaScript by Evan Burchard Copyright © 2017 Evan Burchard. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotion- al use. Online editions are also available for most titles (http://oreilly.com/ safari). For more information, contact our corporate/institutional sales depart- ment: 800-998-9938 or [email protected]. • Editors: Nan Barber and Allyson MacDonald • Production Editor: Kristen Brown • Copyeditor: Rachel Monaghan • Proofreader: Rachel Head • Indexer: Ellen Troutman-Zaig • Interior Designer: David Futato • Cover Designer: Karen Montgomery • Illustrator: Rebecca Demarest • March 2017: First Edition Revision History for the First Edition • 2017-03-10: First Release See http://oreilly.com/catalog/errata.csp?isbn=9781491964927 for release details. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Refactoring JavaScript, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. While the publisher and the author have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the pub- lisher and the author disclaim all responsibility for errors or omissions, includ- ing without limitation responsibility for damages resulting from the use of or re- liance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work con- tains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof com- plies with such licenses and/or rights.
    [Show full text]
  • 1 Combinatorial Methods in Testing
    1 Combinatorial Methods in Testing Developers of large software systems often notice an interesting phenomenon: if usage of an application suddenly increases, components that have been working correctly develop previously undetected failures. For example, the application may have been installed with a different OS or DBMS system from what was used previously, or newly added customers may have account records with combinations of values that have not occurred before. Some of these rare combinations trigger failures that have escaped previous testing and extensive use. Such failures are known as interaction failures, because they are only exposed when two or more input values interact to cause the program to reach an incorrect result. 1.1 Software Failures and the Interaction Rule Interaction failures are one of the primary reasons why software testing is so difficult. If failures only depended on one variable value at a time, we could simply test each value once, or for continuous-valued variables, one value from each representative range. If our application had inputs with v values each, this would only require a total of v tests – one value from each input per test. Unfortunately, the situation is much more complicated than this. Combinatorial testing can help detect problems like those described above early in the testing life cycle. The key insight underlying t-way combinatorial testing is that not every parameter contributes to every failure and most failures are triggered by a single parameter value or interactions between a relatively small number of parameters (for more on the number of parameters interacting in failures, see Appendix B).
    [Show full text]
  • When and Why Your Code Starts to Smell Bad (And Whether the Smells Go Away)
    This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSE.2017.2653105, IEEE Transactions on Software Engineering When and Why Your Code Starts to Smell Bad (and Whether the Smells Go Away) Michele Tufano1, Fabio Palomba2, Gabriele Bavota3 Rocco Oliveto4, Massimiliano Di Penta5, Andrea De Lucia2, Denys Poshyvanyk1 1The College of William and Mary, Williamsburg, VA, USA 2University of Salerno, Fisciano (SA), Italy, 3Universita` della Svizzera italiana (USI), Switzerland, 4University of Molise, Pesche (IS), Italy, 5University of Sannio, Benevento (BN), Italy [email protected], [email protected], [email protected] [email protected], [email protected], [email protected], [email protected] Abstract—Technical debt is a metaphor introduced by Cunningham to indicate “not quite right code which we postpone making it right”. One noticeable symptom of technical debt is represented by code smells, defined as symptoms of poor design and implementation choices. Previous studies showed the negative impact of code smells on the comprehensibility and maintainability of code. While the repercussions of smells on code quality have been empirically assessed, there is still only anecdotal evidence on when and why bad smells are introduced, what is their survivability, and how they are removed by developers. To empirically corroborate such anecdotal evidence, we conducted a large empirical study over the change history of 200 open source projects. This study required the development of a strategy to identify smell-introducing commits, the mining of over half a million of commits, and the manual analysis and classification of over 10K of them.
    [Show full text]
  • Why Are There So Few Women in Linux? Women Stay Gramme That Runs a Computer
    ict section HOWTO Encourage Women in Linux By Val Henson The Operating System or OS is the most important pro Why are there so few women in Linux? Women stay gramme that runs a computer. Computers must have an out of Linux for many of the same reasons they operating system to run or manage other programmes. The stay out of computing in general, plus a few rea OS performs basic tasks such as handling input and out sons specific to Linux. Many excellent books and research put to and from attached hardware devices. It keeps track papers have investigated this topic in depth, but we can offiles and directories on the disk and controls peripheral only summarise the top reasons why women avoid comput devices such as disk drives and printers. The OS also en ing as a whole. We'll also debunk some common theories sures that different programmes and users running at the about why women stay out of computing in general. same time do not interfere with each other and that unau thorised users do not access the system. Let's start by examining two of the most common expla nations why there are so few women in computing:"Women Currently, almost everyone in the entire computing just aren't interested in computers," and 'Women aren't as world uses Windows OS, Mac OS, UnixOS and other pro smart as men." The problem with the statement'Women just prietary softwares developed by IT conglomerates such as aren't interested in computers" is that it doesn't actually say Microsoft, Apple, and Sun Microsystems.
    [Show full text]
  • The-Art-Of-Readable-Code.Pdf
    The Art of Readable Code Dustin Boswell and Trevor Foucher Beijing • Cambridge • Farnham • Köln • Sebastopol • Tokyo The Art of Readable Code by Dustin Boswell and Trevor Foucher Copyright © 2012 Dustin Boswell and Trevor Foucher. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mary Treseler Indexer: Potomac Indexing, LLC Production Editor: Teresa Elsey Cover Designer: Susan Thompson Copyeditor: Nancy Wolfe Kotary Interior Designer: David Futato Proofreader: Teresa Elsey Illustrators: Dave Allred and Robert Romano November 2011: First Edition. Revision History for the First Edition: 2011-11-01 First release See http://oreilly.com/catalog/errata.csp?isbn=9780596802295 for release details. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The Art of Readable Code, the image of sheet music, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc., was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
    [Show full text]
  • Digital Anthropology
    Digital Anthropology Digital Anthropology Edited by Heather A. Horst and Daniel Miller London • New York English edition First published in 2012 by Berg Editorial offi ces: 50 Bedford Square, London WC1B 3DP, UK 175 Fifth Avenue, New York, NY 10010, USA © Heather A. Horst & Daniel Miller 2012 All rights reserved. No part of this publication may be reproduced in any form or by any means without the written permission of Berg. Berg is an imprint of Bloomsbury Publishing Plc. Library of Congress Cataloging-in-Publication Data A catalogue record for this book is available from the Library of Congress. British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. ISBN 978 0 85785 291 5 (Cloth) 978 0 85785 290 8 (Paper) e-ISBN 978 0 85785 292 2 (institutional) 978 0 85785 293 9 (individual) www.bergpublishers.com Contents Notes on Contributors vii PART I. INTRODUCTION 1. The Digital and the Human: A Prospectus for Digital Anthropology 3 Daniel Miller and Heather A. Horst PART II. POSITIONING DIGITAL ANTHROPOLOGY 2. Rethinking Digital Anthropology 39 Tom Boellstorff 3. New Media Technologies in Everyday Life 61 Heather A. Horst 4. Geomedia: The Reassertion of Space within Digital Culture 80 Lane DeNicola PART III. SOCIALIZING DIGITAL ANTHROPOLOGY 5. Disability in the Digital Age 101 Faye Ginsburg 6. Approaches to Personal Communication 127 Stefana Broadbent 7. Social Networking Sites 146 Daniel Miller PART IV. POLITICIZING DIGITAL ANTHROPOLOGY 8. Digital Politics and Political Engagement 165 John Postill – v – vi • Contents 9. Free Software and the Politics of Sharing 185 Jelena Karanović 10.
    [Show full text]
  • The Great Methodologies Debate: Part 2
    ACCESS TO THE EXPERTS The Journal of Information Technology Management January 2002 Vol. 15, No. 1 The Great Methodologies Debate: Part 2 Resolved “Today, a new debate rages: agile software Traditional methodologists development versus rigorous software are a bunch of process- development.” dependent stick-in-the-muds who’d rather produce flawless Jim Highsmith, Guest Editor documentation than a working system that meets business needs. Opening Statement Rebuttal Jim Highsmith 2 Lightweight, er, “agile” methodologists are a bunch of glorified hackers who are going to be in for a heck of a surprise Agile Software Development Joins the when they try to scale up their “Would-Be” Crowd “toys” into enterprise-level Alistair Cockburn 6 software. The Bogus War Stephen J. Mellor 13 A Resounding “Yes” to Agile Processes — But Also to More Ivar Jacobson 18 Agile or Rigorous OO Methodologies: Getting the Best of Both Worlds Brian Henderson-Sellers 25 Big and Agile? Matt Simons 34 Opening Statement by Jim Highsmith Who wants to fly a wet beer mat? rigorous (or whatever label one expect significant variations in the What is the opposite of a Bengal chooses) methodologies a others. High-level CMM organiza- tiger? For answers to these and chaordic perspective, collab- tions tout their ability to achieve other intriguing questions, read on! orative values and principles, and their planned goals most of the barely sufficient methodology. A time (99.5% was reported in one As Ive read through the articles chaordic perspective arises from article on a new Level 5 organiza- for the two methodology debate the recognition and acceptance of tion [1]).
    [Show full text]