L567: Gender and Computerization

 

 

Semester:

Spring 2004

Instructor:

Dr. Susan Herring

Time:     

M 5:45-8:30 p.m.

Office:

LI 005 B

Place:

Library Bldg. Rm. 001

Phone:

856-4919 (voice mail)

Office hours:

M 4-5 p.m.; TH 4-5 p.m. and by appointment

Email:

herring @ indiana.edu

                                            

Class majordomo list: herring_gencomp @ indiana.edu

 

Required reading:

Photocopied articles to be made available electronically on ereserves (http://ereserves.indiana.edu/) or on print reserve in the SLIS library (articles in Cherny & Weise, Harcourt, and Kramarae books).

 

Recommended texts:

Cherny, L. & E. Weise, eds. (1996). wired_women. Seattle: Seal Press.

Harcourt, W., ed. (1999). women@internet: Creating New Cultures in Cyberspace. London: Zed Books.

Kramarae, C., ed. (1988). Technology and Women's Voices: Keeping in Touch. New York: Routledge.

 

1.    Background

Technology, with its associations with engineering, has traditionally been a mostly male preserve. Information technology (IT) continues this tradition. More men than women study computer science; design, implement, and administer computer networks; and—until very recently—use the Internet. Moreover, girls and women still express less interest than boys and men in learning to program computers and in entering IT careers.

 

The IT "gender gap" takes on increasing social, political and economic importance as computerization spreads globally, pervading every aspect of human existence from medicine to education to grocery shopping. Democratic societies have an interest in ensuring equitable access to all of their members to the benefits of computing, out of fairness and in order to maximize the productive potential of the population as a whole. Practically speaking, female users may have different experiences, needs and perspectives from male users, such that when it comes to IT design and use, “one size” may not necessarily “fit all”. Finally, the Internet and the World Wide Web are attracting increasing numbers of female users, challenging the historically male culture of computing in interactive, online domains. More than ever before, IT professionals, educators, gender scholars and critics of science and technology are called upon to understand and act on these social contexts and dynamic trends.

 

2.    Course description

This course explores the history and mechanisms of—and alternatives to—traditional male control of computer technology, with special focus on information and communication technologies such as the Internet and the World Wide Web. Questions to be addressed include:

 

    How do computers come to be associated with masculine interests and aptitudes?

    What are the consequences of this association for females' and males' educational, work and leisure experiences?

    How is the association of computing with masculinity challenged now that computers have become widely accessible and easy to use? (cf. recent statistics that show that equal numbers of women and men in North America now use the Internet)

    What might computers and computer networks look like if they were designed by women?

    What factors prevent girls and women from acquiring technical skills and entering computing-related professions in numbers equal to men, and how might those factors be changed?

 

The course is based on readings and critical discussion, and is conducted in a part-lecture, part-seminar format in which opportunities to speak are available to all students in each class session. Students have the option of taking a final exam or writing a term paper as the primary basis for evaluating their performance in the course.

 

3.    Course objectives

The aim of this course is to explore in a critical, balanced and nuanced manner issues related to gender and computers, with special focus on the "IT gender gap" and its current status in the Internet Age. As a result of completing this course, you should gain:

 

    an understanding of the role of gender as a social and historical force in shaping computer technology

    practical awareness of gender and computing issues in educational, workplace, recreational and global contexts

    a critical perspective on gender and computer system design

    knowledge of possible interventions at the level of home environment, education, system design and administrative policy

    enhanced skills in summarizing and synthesizing concepts from published scholarship.

 

4.    Student requirements

Readings.  You are expected to read the assigned readings and take informal reading notes on them (1-2 paragraphs identifying each article's main claim(s), and commenting on or questioning some aspect of the article that is of interest to you). The reading notes will help prepare you for class discussion, and will provide feedback that will enable me to conduct the course to better meet your interests and needs. Reading notes will be collected at the end of each class period. Therefore, you will need to print them on individual sheets of paper, rather than write them in a bound journal.

 

Observation reports. There will be three observation reports during the semester for which you will collect and present data related to gender and computerization based on first-hand observation. The reports should be 2-3 typed pages long, and may include appendices listing the instances observed.

 

Exam. There will be a comprehensive final take-home exam. The essay-type exam questions will be of a synthetic nature, requiring you to draw together, relate and apply key concepts from the readings and class discussions. A review sheet of key concepts will be distributed before the exam. You will have four days in which to write the final exam.

 

Term paper (OPTIONAL). Instead of taking the final exam, you may choose to write a 5,000-7,000 word term paper (excluding references and appendices) reporting on the results of original research on some aspect of gender and computerization. The topic need not be a phenomenon we have discussed in the course, but the analysis should be theoretically grounded in concepts from the course. Students wishing to write a term paper instead of taking the final exam should submit a one-page proposal by week 10 identifying the topic, research question, methods, data and preliminary observations on which the paper will be based. The final paper should follow the formal conventions for a publishable-quality research article, including footnotes and citations of scholarly work in APA (American Psychological Association) style.

 

There is a majordomo list for this course. You are expected to check your email at least twice between class meetings, including the afternoon before class for last-minute announcements and reminders. Interactive participation on the majordomo list is encouraged, although it is not a requirement of the course.

 

5.    Student evaluation

 

The final grade for students enrolled in the course will be calculated as follows:

              

Reading notes and participation

 30%

Observation reports (3 x 10%)

 30%

Final exam or term paper

 40%

Total:

100%

Grading policies:

 

      Late reading notes will be accepted once during the semester, no questions asked, provided they are turned in by 5 p.m. Saturday before the next class meeting. If you turn in late notes electronically, please send them as plain (ascii) text, rather than as an attachment.

      Reading notes and class participation will be graded with a check mark for each class meeting, to indicate that the requirement was met. Reading notes are to be handed in on the day the reading is discussed. Class participation means being willing and prepared to speak intelligently in class about the topics under discussion. (Note: this does NOT necessarily mean speaking a lot—you may be penalized if you habitually dominate class discussions.) In order to be able to speak intelligently about a topic, you will need to have done the readings for that topic before class. You will also need to be physically present and alert. Participation cannot be made up if you miss a class.

      Observation reports and the exam or term paper will be assigned letter grades (A, A-, B+, B, B-, C+, C, etc.). Generally speaking, an A denotes 'outstanding' work, a B is 'good', and a C is 'average' (but below the level expected for graduate-level work).

      Observation reports will be graded on the method of sampling, which should be clearly explained, and the quality and number of observations. High quality observations are systematic, insightful, and relate (as appropriate) to themes presented in the readings and class discussions.

      The final exam will be graded on quality (depth and accuracy) of understanding of key concepts; ability to extend, apply and relate concepts beyond what was discussed in class; appropriate citation of sources; and clarity and organization of written presentation.

      The term paper (if you choose this option) will be graded on content—originality of the research question, appropriateness of the data and methods used to investigate the question, plausibility of your interpretations—and form—organization, clarity and quality of written expression, and appropriate use of scholarly conventions such as citations and footnotes.

 

Statement on academic integrity:

 

Learning is a collaborative enterprise. However, plagiarism, copyright infringement, and other types of academic dishonesty will NOT be tolerated. To help you recognize plagiarism, the IU Writing Center has prepared a short guide: Plagiarism: What It is and How to Recognize and Avoid It. Please read this guide and refer to it when you produce your written assignments for this course.

 

6.    Tentative Course Schedule

(Note: All reading notes are due in class on the dates indicated for the readings.)

 

----------------

Week 1 (1/12/04):

Introduction to course. Stereotypes about gender and computers: (Soft) nature vs. (hard) technology. The "gender gap" in the age of the Internet.

 

 

(No readings for first class meeting)

                                          

----------------

Week 2 (1/19/04):

Martin Luther King, Jr. Day - Class does not meet.

 

----------------

Week 3 (1/26/04):

Historical contributions of women to technology. Women as users, women as inventors.

 

Browse:

Past notable women of computing. http://www.cs.yale.edu/homes/tap/past-women-cs.html

 

Read:

 

1. Davies, M. (1988). "Women clerical workers and the typewriter: The writing machine." In C. Kramarae (Ed.), Technology and Women’s Voices: Keeping in Touch (pp.29-40). New York: Routledge.

2. Rakow, L. (1988). "Women and the telephone: The gendering of a communication technology." In C. Kramarae (Ed.), Technology and Women’s Voices: Keeping in Touch (pp.207-228). New York: Routledge.

3. Gürer, D. (1995). "Pioneering women in computer science." Communications of the ACM 38 (1), 45-54.

4. Camp, T. (1997). "The incredible shrinking pipeline." Communications of the ACM 40 (10), 103-110. http://www.mines.edu/fs_home/ tcamp/cacm/paper.html

 

----------------

Week 4 (2/2/04):

Are females less interested than males in computers? Attitudes towards computers.

 

Read:

 

 

 

 

 

 

 

 

 

 

 

 

1. Turkle, S. (1988). "Computational reticence: Why women fear the intimate machine."  In C. Kramarae (Ed.), Technology and Women's Voices, 41-61.

2. Bentson, C. (2000). "Why women hate I.T." CIO Magazine, September 1.

3. Kramer, P. & S. Lehman (1990). "Mismeasuring women: A critique of research on computer avoidance." Signs 16(1), 158-172. http://www.cio.com/archive/090100_women.html

4. Ray, C. M., C. Sormunen, & T. M. Harris (1999). "Men's and women's attitudes toward computer technology: A comparison." Office Systems Research Journal 17(1), Spring. http://www.nyu.edu/education/alt/ beprogram/osrajournal/ray.PDF

 

Browse:

Ward, M. (2001). "Sexiest geek declared." http://news.bbc.co.uk/1/hi/sci/tech/1400333.stm. More information about Ellen Spertus and the "sexiest geek" contest: http://www.mills.edu/ACAD_INFO/MCS/SPERTUS/Geek/

 

----------------

Week 5 (2/9/04):              

The cultural construction of computing as gendered: Popular representations of computer users.

 

1st Observation Report:

 

Photocopy 10-15 advertisements from current magazines showing computers and humans, and describe how females and males are portrayed.  OR: Do the same for 10-15 current cartoons showing computers and humans.

 

Read:

 

1. Edwards, P. (1990). "The army and the microworld: Computers and the politics of gender identity."  (pp.102-127).

2. Michaleson, G. (1994). "Women and men in computer cartoons 1946-1982."  In A. Adam et al. (Eds.), Women, Work and Computerization.

3. Ware, M. & M. F. Stuck (1985). "Sex-role messages vis-à-vis microcomputer use: A look at the pictures." Sex Roles 13(3/4), 205-214.

4. Borsook, P. (1996). "The memoirs of a token: An aging Berkeley feminist examines Wired." In L. Cherny & E. Weise (Eds.), wired_women (pp.24-41). Seattle: Seal Press.

 

----------------

Week 6 (2/16/04):

Computing culture: Hackers, geeks, and nerds.

 

Browse:

Definition of a hacker. http://home.planet.nl/~faase009/Ha_hacker.html

The code of the geeks v.3.12. http://www.geekcode.com/geek.html - type

 

Read:

1. Hacker, S. (1990). "The culture of engineering." In S. Hacker, D. Smith, & S. Turner (Eds.), Doing it the Hard Way: Investigating Gender and Technology (pp. 111-112). London: Unwin Hyman.

2. Turkle, S. (1984). "Hackers: Loving the machine for itself." In The Second Self.  New York: Simon and Schuster.

3. Kendall, L. (1999). " 'The nerd within': Mass media and the negotiation of identity among computer-using males." The Journal of Men’s Studies 7(3), 353-369.

4. Gilboa, N. (1996). "Elites, lamers, narcs and whores: Exploring the computer underground." In In L. Cherny & E. Weise (Eds.), wired_women (pp.98-113). Seattle: Seal Press.

              

----------------

Week 7 (2/23/04):

Environmental and educational factors. Experiences of girls and boys with computing. Experiences of female students in computer science programs.

 

Read:

 

1. Krendl et al. (1989). "Children and computers: Do sex-related differences persist?" Journal of Communication 39(3), 85-93.

2. Shashaani, L. (1994). "Socioeconomic status, parents’ sex role stereotypes, and the gender gap in computing." Journal of Research on Computing in Education 26(4), 433-451.

3. Evard, Michele (1996). "So please stop, thank you: Girls online." In L. Cherny & E. Weise (Eds.), wired_women (pp.188-204).

4. Spertus, E. (1991). "Why are there so few female computer scientists?" [Skim entire article; read closely the sections and subsections on: "Ways that males and females are treated differently"; "The masculine environment"; "Problems with solutions"] http://www.ai.mit.edu/people/ellens/Gender/pap/pap.html

 

----------------

Week 8 (3/1/04):                             

Computer games as socialization into computer use. Gender stereotypes and stereotype breakers.

 

Guest lecture:

 

Elena Bertozzi, Telecommunication

 

2nd Observation Report:

 

Go to a store where computer-related toys and games are sold and describe all of the products targeted at children. OR: Go to a video arcade and describe the themes and graphics of each game.

 

Read:

 

1. Gorriz, C. & C. Medina (2000). "Engaging girls with computers through software games." Communications of the ACM, January 43(1), 42-49.

2. Subramanyam, K. & P. Greenfield (1998). "Computer games for girls: What makes them play?" In J. Cassell & H. Jenkins (Eds.),  From Barbie to Mortal Kombat: Gender and Computer Games (pp. 46-71). Cambridge, MA: MIT Press.

3. Jenkins, H. (1998). "'Complete freedom of movement'': Video games as gendered play spaces." From Barbie to Mortal Kombat: Gender and Computer Games. Cambridge: MIT Press. http://web.mit.edu/21fms/www/faculty/henry3/pub/complete.html

4. Brown, J. (1997). "All-girl Quake clans shake up boys' world." [short] http://www.wired.com/news/culture/0,1284,1885,00.html

              

----------------

Week 9 (3/8/04):

System design and human-computer interaction. Can machines be gendered?

 

Read:

 

1. Benston, M. (1989). "Feminism and system design: Questions of control." In The Effects of Feminist Approaches on Research Methodologies, W. Tomm (ed.), pp.205-223. Calgary: Wilfred Laurier  University Press.

2. McDonough, J. P. (1999). "Designer selves: Construction of technologically mediated identity within graphical, multiuser virtual environments." Journal of the American Society for Information Science 50 (10), 855-869. 

3. Eisenberg, A. (2000). "Mars and Venus, on the Net: Gender stereotypes prevail." The New York Times, October 12.  [short] http://www-personal.si.umich.edu/~rfrost/ courses/SI110/readings/ Gendered_Web_Voices.pdf

4. Herring, S. et al. (2002). "Designing for community: The effects of gender representation in videos on a Web site." Proceedings of the 35th Hawaii International Conference on System Sciences. Los Alamitos: IEEE Press.

5. Honey et al. (1991). "Girls and design." Transformations 2(2), 77-.

 

----------------

 

SPRING BREAK

 

 

----------------

Week 10 (3/22/04):           

Computer-mediated communication on the Internet (Part I). Potential and struggle.

 

Read:

 

1. Light, J. (1995). "The digital landscape: New space for women?" Gender, Play and Culture 2(2), 133-146.

2. Herring, S. (1993). "Gender and democracy in computer-mediated communication." Electronic Journal of Communication 3(2). http://ella.slis.indiana.edu/~herring/ejc.txt

3. Camp, L. Jean (with Anita Borg) (1996). "We are geeks, and we are not guys: The systers mailing list." In L. Cherny and E. R. Weise (Eds.), Wired_Women: Gender and New Realities in Cyberspace (pp.114-125). Seattle: Seal Press.

4. Dibell, J. (1998). "A rape in cyberspace. (Or TINYSOCIETY, and how to make one)." Chapter One of My Tiny Life. http://www.juliandibbell.com/texts/bungle.html

5. Spertus, E. (1996). "Social and technical means for fighting on-line harassment." http://www.mills.edu/ACAD_INFO/MCS/SPERTUS/Gender/ glc/glc.html

 

----------------

Week 11 (3/29/04):

Computer-mediated communication on the Internet (Part II). Gender, identity, and sexuality.

 

Read:

 

1. Bruckman, A. (1993). "Gender swapping on the Internet."

http://www.cc.gatech.edu/elc/papers/bruckman/gender-swapping- bruckman.pdf

2. McRae, S. (1996). "Coming apart at the seams: Sex, text and the virtual body." In L. Cherny and E. Weise (Eds.), Wired_Women (pp.242-263). Seattle: Seal Press.

3. Egan, J. (2000). "Lonely gay teen seeking same." The New York Times Magazine, Dec. 10. http://www.nytimes.com/library/magazine/home/20001210mag- online.html

4. Hall, K. (1996). "Cyberfeminism."  In S. Herring(ed.), Computer-Mediated Communication: Linguistic, Social and Cross-Cultural Perspectives.

 

----------------

Week 12 (4/5/04):             

Gender on the World Wide Web. Uses of the Web. Visual representations of females and males. Women's portals.

 

3rd Observation Report:

 

Find 10-15 commercial websites which display images of humans (photographs and/or graphics), and describe how females and males are portrayed.  OR: Go to a graphical chat environment and describe the avatars in use.

 

Read:

 

1. Arnold, J. & Miller, H. (1999). "Gender and web home pages." http://ess.ntu.ac.uk/miller/cyberpsych/cal99.htm

2. Kibby, M. (1997). "Babes on the Web: Sex, identity and the home page." Razón y Palabra 9(2). http://www.cem.itesm.mx/dacs/publicaciones/logos/anteriores/n9/ babe.htm

3. Herring, S. & Martinson, A. (2003). "Representational bias in Web pornography." [To be provided by instructor]

4. Brown, J. (2000). "What happened to the Women’s Web?" Salon, August 25. http://www.salon.com/tech/feature/2000/08/25/womens_web/

 

----------------

Week 13 (4/12/04):

Gendered impacts of computers on office work, telework, and IT-intensive professions.

 

Read:

 

1. Iacono, S. & R. Kling (1984). "Office routine: The automated pink collar." IEEE Spectrum, 73-76.

2. Calabrese, A. (1994). "Home-based telework and the politics of private woman and public man: A critical appraisal." In U. Gattiker (Ed.), Women and Technology (pp.161-199). New York: Walter de Gruyter.

3. Lie, M. (1995). "Technology and masculinity: The case of the computer." The European Journal of Women’s Studies 2: 379-394.

4. Harris, R. (2000). "Squeezing librarians out of the middle: Gender and technology in a threatened profession." Women, Work and Computerization: Charting a Course to the Future. Proceedings of the 7th International Conference on Women, Work and Computerization. Vancouver, British Columbia: June 2000. E. Balka, and R. Smith (pp. 250-259). Boston: Kluwer Academic Publishing.

 

Optional reading (useful overview):

Genderreach. (n.d.) "Impact of information technology on women's work." http://www.genderreach.com/pubs/it/sections3_4.pdf

 

----------------

Week 14 (4/19/04):

Gender and globalization of the Internet.

 

Read:

 

1. Pastore, M. (2001). "Internet remains a man's domain." [short] http://cyberatlas.internet.com/big_picture/demographics/article/ 0,,5901_809341,00.html

2. Hafkin, N. & N. Taggart (2001). "Gender, information technology, and developing countries: An analytic study." http://www.usaid.gov/wid/pubs/it01.htm

3. Inayatullah, S. & I. Milojevic (1999). "Exclusion and communication in the information era: From silences to global conversation."  In women@internet, ed. by W. Harcourt.

4. Lennie, J. et al. (1999). "Empowering on-line conversations: A pioneering Australian project to link rural and urban women." In women@internet, ed. by W. Harcourt.

5. Wheeler, D. (2001). "Women, Islam, and the Internet: Findings in Kuwait." In Culture, Technology, Communication: Towards an Intercultural Global Village, C. Ess (ed.), pp.158-182.

6. Howe, R. (1999). "Cyber feminism in Japan." http://www.macteks.com/PDF/Japaneseinternet.pdf

 

----------------

Week 15 (4/26/04):

Postmodern imaginings; practical interventions.

 

Read:

 

1. Haraway, D. (1991). "A cyborg manifesto: Science, technology, and socialist feminism in the late twentieth century." In Simians, Cyborgs, and Women: The Reinvention of Nature (pp.149-181). New York: Routledge.

2. Lynch, D. (2000). "High tech gender bending: Computer scientist Lynn Conway debunks gender gap myths." [short] http://abcnews.go.com/ sections/tech/WiredWomen/wiredwomen.html

3. Blum, L. (2001). "Transforming the culture of computing at Carnegie Mellon." http://www-2.cs.cmu.edu/~lblum/PAPERS/ TransformingTheCulture.pdf

4. Frieze, C. & L. Blum (2001). "Building an effective computer science student organization: The Carnegie Mellon women@scs action plan." http://www-2.cs.cmu.edu/~lblum/PAPERS/women@scsActionPlan.pdf

 

----------------

Week 16 (5/3/04):

Take-home final exam (or term paper) due by 5 p.m.

              

----------------