L567: Gender and Computerization

 

 

Semester:

Spring 2006

Instructor:

Dr. Susan Herring

Time:     

T 1-3:45 p.m.

Office:

LI 037

Place:

LI 031

Phone:

856-4919 (voice mail)

Office hours:

T 4-6 p.m. and by appointment

Email:

herring @ indiana.edu

                                            

Class majordomo list: gencomp-l @ indiana.edu


In-class powerpoint presentations: Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 13 Week 14 Week 15

 

Required reading:

Photocopied articles to be made available electronically on ereserves (http://ereserves.indiana.edu/) or on print reserve in the SLIS library (articles in Cherny & Weise, Harcourt, and Kramarae books).

 

Recommended texts:

Cherny, L. & E. Weise, eds. (1996). wired_women. Seattle: Seal Press.

Harcourt, W., ed. (1999). women@internet: Creating New Cultures in Cyberspace. London: Zed Books.

Kramarae, C., ed. (1988). Technology and Women's Voices: Keeping in Touch. New York: Routledge.

 

1.    Background

Technology, with its associations with engineering, has traditionally been a mostly male preserve. Information technology (IT) continues this tradition. More men than women study computer science; design, implement, and administer computer networks; and—until quite recently—use the Internet. Moreover, girls and women still express less interest than boys and men in learning to program computers and in entering IT careers.

 

The IT "gender gap" takes on increasing social, political and economic importance as computerization spreads globally, pervading every aspect of human existence from medicine to education to grocery shopping. Democratic societies have an interest in ensuring equitable access to all of their members to the benefits of computing, out of fairness and in order to maximize the productive potential of the population as a whole. Practically speaking, female users may have different experiences, needs and perspectives from male users, such that when it comes to IT design and use, “one size” may not necessarily “fit all”. Finally, the Internet and the World Wide Web are attracting increasing numbers of female users, challenging the historically male culture of computing in interactive, online domains. More than ever before, IT professionals, educators, gender scholars and critics of science and technology are called upon to understand and act on these social contexts and dynamic trends.

 

2.    Course description

This course explores the history and mechanisms of—and alternatives to—traditional male control of computer technology, with special focus on information and communication technologies such as the Internet and the World Wide Web. Questions to be addressed include:

 

    How do computers come to be associated with masculine interests and aptitudes?

    What are the consequences of this association for females' and males' educational, work and leisure experiences?

    How is the association of computing with masculinity challenged now that computers have become widely accessible and easy to use? (cf. recent statistics that show that equal numbers of women and men in North America now use the Internet)

    What might computers and computer networks look like if they were designed by women?

    What factors prevent girls and women from acquiring technical skills and entering computing-related professions in numbers equal to men, and how might those factors be changed?

 

The course is based on readings and critical discussion, and is conducted in a part-lecture, part-discussion format in which opportunities to speak are available to all students in each class session. Students have the option of taking a final exam or writing a term paper as the primary basis for evaluating their performance in the course.

 

3.    Course objectives

The aim of this course is to explore in a critical, balanced, and nuanced manner issues related to gender and computers, with special focus on the "IT gender gap" and its current status in the Internet Age. As a result of completing this course, you should gain:

 

    an understanding of the role of gender as a social and historical force in shaping computer technology

    practical awareness of gender and computing issues in educational, workplace, recreational, and global contexts

    a critical perspective on gender and computer system design

    knowledge of possible interventions at the level of home environment, education, system design, and administrative policy

    enhanced skills in summarizing and synthesizing concepts from published scholarship.

 

4.    Student requirements

Readings and LiveJournals.  You are expected to read the assigned readings and keep a personal LiveJournal in which you write informal entries about each reading. An ideal entry is 1-2 paragraphs identifying the article's main claim(s), and commenting on or questioning some aspect of the article that is of interest to you. Your entries should be posted by 9 p.m. each Sunday. In addition, you are expected to comment on at least three of your classmates' entries by Monday or Tuesday each week. The Live Journals will extend the course conversation beyond the classroom, and let us move beyond discussing the readings during class time.

 

Observation reports. There will be three observation reports during the semester for which you will collect and present data related to gender and computerization based on first-hand observation. The reports should be 2-3 typed pages long, and may include appendices listing the instances observed.

 

Exam. There will be a comprehensive final take-home exam. The essay-type exam questions will be of a synthetic nature, requiring you to draw together, relate and apply key concepts from the readings and class discussions. A review sheet of key concepts will be distributed before the exam. You will have four days in which to write the final exam.

 

Term paper (OPTIONAL). Instead of taking the final exam, you may choose to write a 5,000-7,000 word term paper (excluding references and appendices) reporting on the results of original research on some aspect of gender and computerization. The topic need not be a phenomenon we have discussed in the course, but the analysis should be theoretically grounded in concepts from the course. Students wishing to write a term paper instead of taking the final exam should submit a one-page proposal by week 10 identifying the topic, research question, methods, data and preliminary observations on which the paper will be based. The final paper should follow the formal conventions for a publishable-quality research article, including footnotes and citations of scholarly work in APA (American Psychological Association) style.

 

There is an electronic discussion list for this course. You are expected to check your email at least twice between class meetings, including the evening before class for last-minute announcements and reminders. Interactive participation on the class list is encouraged, although it is not a requirement of the course.

 

5.    Student evaluation

 

The final grade for students enrolled in the course will be calculated as follows:

              

LiveJournal entries and class participation

 35%

Observation reports (3 x 10%)

 30%

Final exam or term paper

 35%

Total:

100%

Grading policies:

 

     Late LiveJournal entries will be counted once during the semester, no questions asked, provided they are posted by 5 p.m. Saturday before the next class meeting.

     LiveJournal entries and class participation will be graded with a check mark for each class meeting, to indicate that the requirement was met. Class participation means being willing and prepared to speak intelligently in class about the topics under discussion. (Note: this does NOT necessarily mean speaking a lot—you may be penalized if you habitually dominate class discussions.) Participation cannot be made up if you miss a class.

     Observation reports and the exam or term paper will be assigned letter grades (A, A-, B+, B, B-, C+, C, etc.). Generally speaking, an A denotes 'outstanding' work, a B is 'good', and a C is 'average' (but below the level expected for graduate-level work).

     Observation reports will be graded on the method of sampling, which should be clearly explained, and the quality and number of observations. High quality observations are systematic, insightful, and relate (as appropriate) to themes presented in the readings and class discussions.

     The final exam will be graded on quality (depth and accuracy) of understanding of key concepts; ability to extend, apply, and relate concepts beyond what was discussed in class; appropriate citation of sources; and clarity and organization of written presentation.

     The term paper (if you choose this option) will be graded on content—originality of the research question, appropriateness of the data and methods used to investigate the question, plausibility of your interpretations; and form—organization, clarity, and quality of written expression, and appropriate use of scholarly conventions such as citations and footnotes.

 

Statement on academic integrity:

 

Learning is a collaborative enterprise. However, plagiarism, copyright infringement, and other types of academic dishonesty will NOT be tolerated. To help you recognize plagiarism, the IU Writing Center has prepared a short guide: Plagiarism: What It is and How to Recognize and Avoid It. Please read this guide and refer to it when you produce your written assignments for this course.

 

6.    Tentative Course Schedule

(Note: All LiveJournal entries should be posted by 9 p.m. on the Sunday before class for that week's readings.)

 

----------------

Week 1 (1/10/06):

Introduction to course. Stereotypes about gender and computers: (Soft) nature vs. (hard) technology. The "gender gap" in the age of the Internet.

 

 

Create a LiveJournal and post a short introduction about yourself and your interests in gender and /or technology.
CLASS WILL NOT MEET FACE-TO-FACE.
Read article by Bentson, "Why women hate IT", in e-reserves, and respond to it in your LiveJournal.

                                      

----------------

Week 2 (1/17/06):

Historical contributions of women to technology. Women as users, women as inventors.

 

Browse:

Past notable women of computing. http://www.cs.yale.edu/homes/tap/past-women-cs.html

 

Read:

 

1. Davies, M. (1988). "Women clerical workers and the typewriter: The writing machine." In C. Kramarae (Ed.), Technology and Women’s Voices: Keeping in Touch (pp.29-40). New York: Routledge.

2. Rakow, L. (1988). "Women and the telephone: The gendering of a communication technology." In C. Kramarae (Ed.), Technology and Women’s Voices: Keeping in Touch (pp.207-228). New York: Routledge.

3. Gürer, D. (1995). "Pioneering women in computer science." Communications of the ACM 38 (1), 45-54.

4. Camp, T. (1997). "The incredible shrinking pipeline." Communications of the ACM 40 (10), 103-110. http://www.mines.edu/fs_home/ tcamp/cacm/paper.html

 

----------------

Week 3 (1/24/06):

Are females less interested than males in computers? Attitudes towards computers.

 

Read:

 

1. Turkle, S. (1988). "Computational reticence: Why women fear the intimate machine."  In C. Kramarae (Ed.), Technology and Women's Voices, 41-61.

2. Kramer, P. & S. Lehman (1990). "Mismeasuring women: A critique of research on computer avoidance." Signs 16(1), 158-172.

3. Ray, C. M., C. Sormunen, & T. M. Harris (1999). "Men's and women's attitudes toward computer technology: A comparison." Office Systems Research Journal 17(1), Spring. http://www.osra.org/itlpj/raysormunenharris.PDF


Browse:

Ward, M. (2001). "Sexiest geek declared." http://news.bbc.co.uk/1/hi/sci/tech/1400333.stm. More information about Ellen Spertus and the "sexiest geek" contest: http://people.mills.edu/spertus/Geek/

 

----------------

Week 4 (1/31/06): 

The cultural construction of computing as gendered: Popular representations of computer users.

 

1st Observation Report:

 

Photocopy 10-15 advertisements from current magazines showing computers and humans, and describe how females and males are portrayed.  OR: Do the same for 10-15 current cartoons showing computers and humans.

 

Read:

 

1. Edwards, P. (1990). "The army and the microworld: Computers and the politics of gender identity."  (pp.102-127).

2. Michaleson, G. (1994). "Women and men in computer cartoons 1946-1982."  In A. Adam et al. (Eds.), Women, Work and Computerization.

3. Ware, M. & M. F. Stuck (1985). "Sex-role messages vis-à-vis microcomputer use: A look at the pictures." Sex Roles 13(3/4), 205-214.

4. Borsook, P. (1996). "The memoirs of a token: An aging Berkeley feminist examines Wired." In L. Cherny & E. Weise (Eds.), wired_women (pp.24-41). Seattle: Seal Press.

 

----------------

Week 5 (2/7/06):

Computing culture: Hackers, geeks, and nerds.

 

Browse:

Definition of a hacker. http://www.iwriteiam.nl/HackerDef.html

The code of the geeks v.3.12. http://www.geekcode.com/geek.html - type

 

Read:

1. Hacker, S. (1990). "The culture of engineering." In S. Hacker, D. Smith, & S. Turner (Eds.), Doing it the Hard Way: Investigating Gender and Technology (pp. 111-112). London: Unwin Hyman.

2. Turkle, S. (1984). "Hackers: Loving the machine for itself." In The Second Self.  New York: Simon and Schuster.

3. Kendall, L. (1999). " 'The nerd within': Mass media and the negotiation of identity among computer-using males." The Journal of Men’s Studies 7(3), 353-369.

4. Gilboa, N. (1996). "Elites, lamers, narcs and whores: Exploring the computer underground." In In L. Cherny & E. Weise (Eds.), wired_women (pp.98-113). Seattle: Seal Press.

              

----------------

Week 6 (2/14/06):

Environmental and educational factors. Experiences of girls and boys with computing. Experiences of female students in computer science programs.

 

Read:

 

1. Krendl et al. (1989). "Children and computers: Do sex-related differences persist?" Journal of Communication 39(3), 85-93.

2. Shashaani, L. (1994). "Socioeconomic status, parents’ sex role stereotypes, and the gender gap in computing." Journal of Research on Computing in Education 26(4), 433-451.

3. Evard, Michele (1996). "So please stop, thank you: Girls online." In L. Cherny & E. Weise (Eds.), wired_women (pp.188-204).

4. Spertus, E. (1991). "Why are there so few female computer scientists?" [Skim entire article; read closely the sections and subsections on: "Ways that males and females are treated differently"; "The masculine environment"; "Problems with solutions"] http://people.mills.edu/spertus/Gender/pap/pap.html

5. Herring, S. C. Ogan, C., Ahuja, M., & Robinson, J. C. (In press, 2006). "Gender and the culture of computing in applied IT education." Encyclopedia of Gender and Information Technology. Hershey, PA: Information Science Publishing. http://ella.slis.indiana.edu/~herring/gite.pdf

 

----------------

 

Week 7 (2/21/06): 

Computer games as socialization into computer use. Gender stereotypes and stereotype breakers.



 

2nd Observation Report:

 

Go to a store where computer-related toys and games are sold and describe all of the products targeted at children. OR: Go to a video arcade and describe the themes and graphics of each game.

 

Read:

 

1. Gorriz, C. & C. Medina (2000). "Engaging girls with computers through software games." Communications of the ACM, January 43(1), 42-49.

2. Subramanyam, K. & P. Greenfield (1998). "Computer games for girls: What makes them play?" In J. Cassell & H. Jenkins (Eds.),  From Barbie to Mortal Kombat: Gender and Computer Games (pp. 46-71). Cambridge, MA: MIT Press.

3. Jenkins, H. (1998). "'Complete freedom of movement': Video games as gendered play spaces." From Barbie to Mortal Kombat: Gender and Computer Games. Cambridge: MIT Press. http://web.mit.edu/cms/People/henry3/complete.html

4. Bryce, J., & Rutter, J. (2002). "Killing like a girl: Gendered gaming and girl gamers' visibility." Computer Games and Digital Cultures-Conference Proceedings. http://www.digiplay.org.uk/media/cgdc.pdf

5. Castronova, T. (2003). "The price of 'man' and 'woman': A hedonic pricing model of avatar attributes in a synthetic world." CESIFO Working Paper no. 957, Category 4: labour markets. http://papers.ssrn.com/sol3/papers.cfm?abstract_ id=415043 [Click below abstract to download paper.]


Browse:

Brown, J. (1997). All-girl Quake clans shake up boys' world. http://www.wired.com/news/culture/0,1284,1885,00.html

 
----------------

  Week 8 (2/28/06):         

System design and human-computer interaction. Can machines be gendered?

 

Read:

 

1. Benston, M. (1989). "Feminism and system design: Questions of control." In The Effects of Feminist Approaches on Research Methodologies, W. Tomm (ed.), pp.205-223. Calgary: Wilfred Laurier  University Press.

2. McDonough, J. P. (1999). "Designer selves: Construction of technologically mediated identity within graphical, multiuser virtual environments." Journal of the American Society for Information Science 50 (10), 855-869. 

3. Herring, S. et al. (2002). "Designing for community: The effects of gender representation in videos on a Web site." Proceedings of the 35th Hawaii International Conference on System Sciences. Los Alamitos: IEEE Press.

4. Honey et al. (1991). "Girls and design." Transformations 2(2), 77-.

5. Beckwith, L., & Burnett, M. (2004). Gender: An important factor in end-user programming environments? Proceedings of IEEE Symposium on Visual Languages and Human-Centric Computing Languages and Environments, Rome, Italy. ftp://ftp.cs.orst.edu/pub/burnett/vlhcc04.gender.pdf


Browse:

Eisenberg, A. (2000). "Mars and Venus, on the Net: Gender stereotypes prevail." The New York Times, October 12.  [short] http://ntac.org/news/00/10/12nyt.html

      

----------------

Week 9 (3/7/04):           

Computer-mediated communication on the Internet (Part I). Potential and struggle.

 

Read:

 

1. Light, J. (1995). "The digital landscape: New space for women?" Gender, Play and Culture 2(2), 133-146.

2. Herring, S. (1993). "Gender and democracy in computer-mediated communication." Electronic Journal of Communication 3(2). http://ella.slis.indiana.edu/~herring/ejc.txt

3. Camp, L. Jean (with Anita Borg) (1996). "We are geeks, and we are not guys: The systers mailing list." In L. Cherny and E. R. Weise (Eds.), Wired_Women: Gender and New Realities in Cyberspace (pp.114-125). Seattle: Seal Press.

4. Dibell, J. (1998). "A rape in cyberspace. (Or TINYSOCIETY, and how to make one)." Chapter One of My Tiny Life. http://loki.stockton.edu/~kinsellt/stuff/dibbelrapeincyberspace.html

5. Spertus, E. (1996). "Social and technical means for fighting on-line harassment." http://people.mills.edu/spertus/Gender/glc/glc.html


----------------


SPRING BREAK

----------------

Week 10 (3/21/06):

Computer-mediated communication on the Internet (Part II). Gender, identity, and sexuality.

 

Read:

 

1. Bruckman, A. (1993). "Gender swapping on the Internet."

http://www.cc.gatech.edu/elc/papers/bruckman/gender-swapping- bruckman.pdf

2. McRae, S. (1996). "Coming apart at the seams: Sex, text and the virtual body." In L. Cherny and E. Weise (Eds.), Wired_Women (pp. 242-263). Seattle: Seal Press.

3. Subrahmanyam, K., Greenfield, P. M., and Tynes, B. (2004). "Constructing sexuality and identity in an online teen chat room." Applied Developmental Psychology 25, 651-666. http://www.cdmc.ucla.edu/downloads/Constructing%20sexuality.pdf

4. Egan, J. (2000). "Lonely gay teen seeking same." The New York Times Magazine, Dec. 10. http://www.nytimes.com/library/magazine/home/20001210mag- online.html

5. Hall, K. (1996). "Cyberfeminism."  In S. C. Herring (Ed.), Computer-Mediated Communication: Linguistic, Social and Cross-Cultural Perspectives. Amsterdam: Benjamins.

 

----------------

Week 11 (3/28/06):        

Gender on the World Wide Web. Uses of the Web. Visual representations of females and males. Women's portals. Weblogs.

 

3rd Observation Report:

 

Find 10-15 websites of the same genre which display images of humans (photographs and/or graphics), and describe how females and males are portrayed.  OR: Go to a graphical chat environment and describe the avatars in use.

 

Read:

 

1. Rickert, A., & Sacharow, A. (2000). "It's a woman's World Wide Web." Media Metrix and Jupiter Communications report. http://www.rcss.ed.ac.uk/sigis/public/backgrounddocs/womenontheweb2000.pdf

2. Brown, J. (2000). "What happened to the Women’s Web?" Salon, August 25. http://www.salon.com/tech/feature/2000/08/25/womens_web/

3. Kibby, M. (1997). "Babes on the Web: Sex, identity and the home page." Razón y Palabra 9(2). http://www.cem.itesm.mx/dacs/publicaciones/logos/anteriores/n9/ babe.htm

4. Raphael, C., Bachen, C., et al. (2006). "Portrayals of information and communication technology on World Wide Web sites for girls." Journal of Computer-Mediated Communication, 11(3). http://ella.slis.indiana.edu/~herring/raphael.pdf

5. Herring, S. C., Kouper, I., Scheidt, L. A., and Wright, E. (2004). "Women and children last: The discursive construction of weblogs." In: L. Gurak, S. Antonijevic, L. Johnson, C. Ratliff, and J. Reyman (Eds.), Into the Blogosphere: Rhetoric, Community, and Culture of Weblogs. University of Minnesota. http://blog.lib.umn.edu/blogosphere/women_and_children.html

 

----------------

Week 12 (4/4/06):

Gendered impacts of computers on office work, telework, and IT-intensive professions.

 

Read:

 

1. Stanworth, C. (2000). "Women and work in the Information Age." Gender, Work and Organization, 7 (1), 20-32. http://ella.slis.indiana.edu/~herring/stanworth.pdf

2. Calabrese, A. (1994). "Home-based telework and the politics of private woman and public man: A critical appraisal." In U. Gattiker (Ed.), Women and Technology (pp. 161-199). New York: Walter de Gruyter.

3. Truman, G., & Baroudi, J. J. (1994). Gender differences in the Information Systems managerial ranks: An assessment of potential discriminatory practices. MIS Quarterly, 18 (2), 129-142. http://ella.slis.indiana.edu/~herring/truman.pdf

4. Harris, R. (2000). "Squeezing librarians out of the middle: Gender and technology in a threatened profession." Women, Work and Computerization: Charting a Course to the Future. Proceedings of the 7th International Conference on Women, Work and Computerization. Vancouver, British Columbia: June 2000, ed. by E. Balka, and R. Smith (pp. 250-259). Boston: Kluwer Academic Publishing.

5. Lie, M. (1995). "Technology and masculinity: The case of the computer." The European Journal of Women’s Studies, 2, 379-394.

 

Optional reading (long but interesting):

Wright, R., & Jacobs, J. J. (1994). "Male flight from computer work: A new look at occupational resegregation and ghettoization." American Sociological Review, 59 (4), 511-536. http://ella.slis.indiana.edu/~herring/wright.pdf

 

----------------

Week 13 (4/11/06):

Gender and globalization of the Internet. Is there a "digital divide"?

 

Read:

 

1. Hafkin, N. & N. Taggart (2001). "Gender, information technology, and developing countries: An analytic study." http://learnlink.aed.org/Publications/Gender_Book/executive_summary/1gender_foreword.htm

2. Inayatullah, S. & I. Milojevic (1999). "Exclusion and communication in the information era: From silences to global conversation."  In women@internet, ed. by W. Harcourt.

3. Lennie, J. et al. (1999). "Empowering on-line conversations: A pioneering Australian project to link rural and urban women." In women@internet, ed. by W. Harcourt.

4. Wheeler, D. (2001). "Women, Islam, and the Internet: Findings in Kuwait." In Culture, Technology, Communication: Towards an Intercultural Global Village, C. Ess (ed.), pp.158-182.

5. Lagesen, V. A. (2005). "A cyber-feminist utopia? Perceptions of gender and computer science among Malaysian women computer science students." In Extreme Makeover: The Making of Gender and Computer Science. Trondheim. http://ella.slis.indiana.edu/~herring/lagesen.pdf


Browse:

Pastore, M. (2001). "Internet remains a man's domain." http://cyberatlas.internet.com/big_picture/demographics/ar ticle/ 0,,5901_809341,00.html and "Europe, U.S. on Different Sides of the Gender Divide." http://www.clickz.com/stats/sectors/demographics/article.php/3095681

 

----------------

Week 14 (4/18/06):

What can be done? Postmodern imaginings; practical interventions.

 

Read:

 

1. Haraway, D. (1991). "A cyborg manifesto: Science, technology, and socialist feminism in the late twentieth century." In Simians, Cyborgs, and Women: The Reinvention of Nature (pp.149-181). New York: Routledge.

2. Braidotti, R. (1996). "Cyberfeminism with a difference." New Formations, 29 (Autumn), 9-25. http://www.let.uu.nl/womens_studies/rosi/cyberfem.htm

3. Wilding, F. (2003). "Where is feminism in cyberfeminism?" http://www.andrew.cmu.edu/user/fwild/faithwilding/wherefem.pdf

4. Herring, S. C., & Marken, J. (2006). "Implications of gender consciousness for students in IT." Paper presented at the Annual Meeting of the American Educational Research Association, San Francisco, CA, April 10. http://ella.slis.indiana.edu/~herring/aera.l567.pdf

5. Blum, L. (2001). "Transforming the culture of computing at Carnegie Mellon." http://www-2.cs.cmu.edu/~lblum/PAPERS/ TransformingTheCulture.pdf and Frieze, C. & L. Blum (2001). "Building an effective computer science student organization: The Carnegie Mellon women@scs action plan." http://www.cs.cmu.edu/~cfrieze/paper.html>


Browse:

Lynch, D. (2000). "High tech gender bending: Computer scientist Lynn Conway debunks gender gap myths." http://votum.nl/leestafel/detailpages/ALL/233.html

 

----------------

 Week 15 (4/25/06):               Oral presentations of research papers. Review.


----------------

Week 16 (5/01/06):

Take-home final exam (or research paper) due by 5 p.m.

              

----------------