SlideShare a Scribd company logo
CYBERFEMINISM   101
[object Object]
When I talk about  cyberfeminism  I am talking about the work of  artists  and  theorists  such as
VNS Matrix The Old Boys Network Faith Wilding and Critical Art Ensemble Sadie Plant SubRosa Rosie X Rosie Bradotti Linda Dement Sonya Rapoprt Sussana Paassonen Verena Kuni
You can find links to a lot of great cyberfeminist work at www.functionfeminism.com
History But first, to put their work in context, here is a bit of
Herstory Or rather
[object Object]
VNS   Matrix ,[object Object],In their 1991 Cyberfeminist Manifesto for the 21st Century (Pronounced Venus Matrix)
 
“ four bored girls decided to have some fun with art and French feminist theory… with homage to Donna Haraway they began to play around with the idea of cyberfeminism… Beginning as if by spontaneous combustion, from a few hot nodes in Europe, America and Australia, cyberfeminism became a viral meme infecting theory, art and the academy” As Julienne Pierce explained:
[object Object]
[object Object]
[object Object]
At around the same time in  Europe  The  Old Boys Network  was created by a group of women including Cornellia Solfrank, Faith Wilding, Yvonne Volkart and Helene von Oldenburg
The  OBN  still exists today. Check out their reading room at  www.obn.org  -  it is an excellent resource
It was the old boys network that really  set the terms  for cyberfeminism as a movement by holding the  First Cyberfeminist International
This was a conference within a conference -  Documenta X  - that was held in Kassel, Germany, in 1997
It was a one day session where women who had begun to work in this new field could get together, share ideas, talk about the  direction  they wanted to take cyberfeminism and address the question of a unified  definition  of cyberfeminism once and for all
But they did not define it
Well not in the traditional sense. They decided to avoid a rigid definition, or rather refused to create a definition that would force others to conform and instead they decided to create the  100 anti-theses
100 Anti-theses
100 Anti-theses 1. cyberfeminism is not a fragrance
100 Anti-theses 1. cyberfeminism is not a fragrance 63. cyberfeminism is not a wound
100 Anti-theses 1. cyberfeminism is not a fragrance 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe
100 Anti-theses 1. cyberfeminism is not a fragrance 100. cyberfeminism has not only one language 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe
100 Anti-theses 1. cyberfeminism is not a fragrance 100. cyberfeminism has not only one language 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe  14. cyberfeminism is not complete
100 Anti-theses 1. cyberfeminism is not a fragrance 100. cyberfeminism has not only one language 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe  14. cyberfeminism is not complete 83. cyberfeminism is not about boring toys for boring boys
100 Anti-theses 1. cyberfeminism is not a fragrance 100. cyberfeminism has not only one language 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe  14. cyberfeminism is not complete 68. cyberfeminism is not a single woman 83. cyberfeminism is not about boring toys for boring boys
100 Anti-theses 1. cyberfeminism is not a fragrance 100. cyberfeminism has not only one language 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe  14. cyberfeminism is not complete 68. cyberfeminism is not a single woman 83. cyberfeminism is not about boring toys for boring boys  30. cyberfeminism is not without connectivity
100 Anti-theses 1. cyberfeminism is not a fragrance 100. cyberfeminism has not only one language 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe  14. cyberfeminism is not complete 68. cyberfeminism is not a single woman 83. cyberfeminism is not about boring toys for boring boys  30. cyberfeminism is not without connectivity 65. cyberfeminismo no es una banana
The  100 anti-theses  is a list of statements describing what cyberfeminism is  not
The anti-theses range from  playful , eg.  1. cyberfeminism  is not a fragrance
To the more  serious  and instructive, eg.  100. cyberfeminism has  not only one language
So that is what it is  not .
But the  question  still feels unanswered
What  is  Cyberfeminism?
Yvonne Volkart  from the old boys network said:
"Cyberfeminism is a myth. A myth is a story of unidentifiable origin, or of different origins. A myth is based on one central story which is retold over and over in different variations. A myth denies  ONE  history as well as  ONE  truth, and implies a search for truth in the  SPACES , in the  DIFFERENCES BETWEEN  the different stories. Speaking about Cyberfeminism as a myth, is not intended to mystify it, it simply indicates that Cyberfeminism only exists in plural.”
So I am going to hold true to the vision of my cyberfeminist foremothers and not provide you with a  singular definition  either
However…
I  will  tell you some of the things that cyberfeminism  can  be, to add to what it is not
examine the relationships between women and technology Cyberfeminism can… critique at equality in cyberspace examine relationships between bodies and technology examine technology by engaging with it disrupt the perception of technology as ‘toys for boys’ challenge established perceptions of cyberspace seek to bring about change from within playfully address feminist issues directly address feminist issues subtly address feminist issues embrace technology be humorous be fun be active be collaborative be subversive
Cyberfeminism  can  be all these things, but any individual cyberfeminist work need not be  all  these things at once
examine the relationships between women and technology critique at equality in cyberspace examine relationships between bodies and technology examine technology by engaging with it disrupt the perception of technology as ‘toys for boys’ challenge established perceptions of cyberspace seek to bring about change from within playfully address feminist issues directly address feminist issues subtly address feminist issues embrace technology be humorous be fun be active be collaborative be subversive that would be a lot to ask
Still, I think there is even  more  to cyberfeminism
Cyberfeminism is not just the subject matter, but also the  approach  taken to examine that subject matter
So I have developed a  cyberfeminist methodology  based on the  art  and  theory  of established cyberfeminists
And thus I present…
The Five Rules  of Cyberfeminist Engagement*
The Five Rules  of Cyberfeminist Engagement* * Of course, these are my rules and you are welcome to use them, but as a cyberfeminist you are free to make your own if you want, in fact you are encouraged to do so
1. Remember the  feminism  in cyberfeminism
It is cyber feminism   after all So this means initially examining things through a traditional feminist lens
2. Engage
Cyberfeminism is very much connected to a DIY ethic. From the very beginning of the movement it has had a strong connection to art Most of the prominent cyberfeminists are both artists  as well as  theorists
Engagement  and  participation  are integral parts of what makes cyberfeminism a movement beyond a feminist critique of technology There are theorists, such as Donna Haraway and Judy Wajkman who have done some awesome work in the area of women and technology, but that doesn’t necessarily make them  cyberfeminists  as such
3. Hack
By this I mean, once you have engaged with the technology,  don’t settle  for things the way they appear It may not mean actual program hacking - although it certainly could - it means see what is there and take it and turn it into something that works for you.
Jon Ipolito said that electronic art was best described as ‘ creative misuse of technology ’ and I think that description is particularly fitting - which leads me to the fourth rule…
4. Playfully Subvert
I do wonder if this is a backlash against the perception of the humorless feminist, but there is a tradition for cyberfeminist works to be playful and fun while subversive with a serious message. Kind of lighthearted with a sting
And lastly…
5. Conspire and Collaborate And lastly…
This is an important one, because, while it is becoming more common, collaboration generally goes against preferred patriarchal methods of art practice where a lot of value is placed in the idea of  the auteur , and works being  touched  by the  hand of the master
However, when you are talking about  technology , and the  internet  in particular, the more femininely defined  collaborative  approach is increasingly suitable
what I mean by this is if you think about a craft vs art dichotomy - current uses of technology are more analogous to craft - more like  quilting  than an oil painting
So that is what I mean when I say  cyberfeminism
52 Acts of Cyberfeminism http: //fiftytwoacts . wordpress .com 1st January 2008 - 31st December 2008

More Related Content

What's hot

The frankfurt school
The frankfurt schoolThe frankfurt school
The frankfurt school
Lauren Guliasi
 
The Panopticon
The PanopticonThe Panopticon
The Panopticon
Mark Deuze
 
The culture industry
The culture industryThe culture industry
The culture industrymsesoman
 
Intro to media studies
Intro to media studiesIntro to media studies
Intro to media studies
Trupti Mistry
 
cyberfeminism
cyberfeminismcyberfeminism
cyberfeminism
Sneha Agravat
 
Structuralism and Post Structuralism
Structuralism and Post StructuralismStructuralism and Post Structuralism
Structuralism and Post Structuralism
Lily Morgan
 
Postmodernism
Postmodernism Postmodernism
Postmodernism
Bertie Rogers
 
Postmodernism
PostmodernismPostmodernism
Postmodernism
Kirsten Lodge
 
What is Digital Activism?
What is Digital Activism?What is Digital Activism?
What is Digital Activism?
Mer Joyce
 
Social constructionism of technology
Social constructionism of technologySocial constructionism of technology
Social constructionism of technologyFlorence Paisey
 
Frankfurt school theory
Frankfurt school theoryFrankfurt school theory
Frankfurt school theory
Lamiyə Pənahova (Lamiya Panahova)
 
NPF561: Class 2: Media and Ideology
NPF561: Class 2: Media and IdeologyNPF561: Class 2: Media and Ideology
NPF561: Class 2: Media and Ideology
alex bal
 
Feminism
FeminismFeminism
Feminism
Elle Sullivan
 
Key Concepts in Media Studies Lecture 2 Mass culture/ mass society theory
Key Concepts in Media Studies Lecture 2 Mass culture/ mass society theoryKey Concepts in Media Studies Lecture 2 Mass culture/ mass society theory
Key Concepts in Media Studies Lecture 2 Mass culture/ mass society theory
Marcus Leaning
 
Guy Debord
Guy DebordGuy Debord
Guy Debord
Sam Law
 
Technological determinism theory powerpoint
Technological determinism theory powerpointTechnological determinism theory powerpoint
Technological determinism theory powerpoint
Elaine Humpleby
 
Stuart Hall Theories of representation 1.pptx
Stuart Hall Theories of representation 1.pptxStuart Hall Theories of representation 1.pptx
Stuart Hall Theories of representation 1.pptx
RafaelPerezOlivan
 
Africa lecture #6
Africa lecture #6Africa lecture #6
Africa lecture #6
bwellington
 

What's hot (20)

The frankfurt school
The frankfurt schoolThe frankfurt school
The frankfurt school
 
SociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared ResourceSociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared Resource
 
The Panopticon
The PanopticonThe Panopticon
The Panopticon
 
The culture industry
The culture industryThe culture industry
The culture industry
 
Intro to media studies
Intro to media studiesIntro to media studies
Intro to media studies
 
cyberfeminism
cyberfeminismcyberfeminism
cyberfeminism
 
Structuralism and Post Structuralism
Structuralism and Post StructuralismStructuralism and Post Structuralism
Structuralism and Post Structuralism
 
Postmodernism
Postmodernism Postmodernism
Postmodernism
 
Postmodernism
PostmodernismPostmodernism
Postmodernism
 
What is Digital Activism?
What is Digital Activism?What is Digital Activism?
What is Digital Activism?
 
Social constructionism of technology
Social constructionism of technologySocial constructionism of technology
Social constructionism of technology
 
Frankfurt school theory
Frankfurt school theoryFrankfurt school theory
Frankfurt school theory
 
NPF561: Class 2: Media and Ideology
NPF561: Class 2: Media and IdeologyNPF561: Class 2: Media and Ideology
NPF561: Class 2: Media and Ideology
 
Feminism
FeminismFeminism
Feminism
 
Key Concepts in Media Studies Lecture 2 Mass culture/ mass society theory
Key Concepts in Media Studies Lecture 2 Mass culture/ mass society theoryKey Concepts in Media Studies Lecture 2 Mass culture/ mass society theory
Key Concepts in Media Studies Lecture 2 Mass culture/ mass society theory
 
Guy Debord
Guy DebordGuy Debord
Guy Debord
 
Technological determinism theory powerpoint
Technological determinism theory powerpointTechnological determinism theory powerpoint
Technological determinism theory powerpoint
 
The public sphere
The public sphereThe public sphere
The public sphere
 
Stuart Hall Theories of representation 1.pptx
Stuart Hall Theories of representation 1.pptxStuart Hall Theories of representation 1.pptx
Stuart Hall Theories of representation 1.pptx
 
Africa lecture #6
Africa lecture #6Africa lecture #6
Africa lecture #6
 

Viewers also liked

Cyberfeminism Sadie Plant Nonidentity to Posthumanity
Cyberfeminism Sadie Plant Nonidentity to PosthumanityCyberfeminism Sadie Plant Nonidentity to Posthumanity
Cyberfeminism Sadie Plant Nonidentity to Posthumanity
ClintonSmith
 
Types of feminism
Types of feminismTypes of feminism
Types of feminism
Muhammad Ali Saqib
 
Gendersystems
GendersystemsGendersystems
Gendersystems
Deidre Rose
 
Cyberpunk Sci-Fi
Cyberpunk Sci-FiCyberpunk Sci-Fi
Cyberpunk Sci-Fi
Kiran Jonnalagadda
 
Example cyberpunk noir
Example cyberpunk noirExample cyberpunk noir
Example cyberpunk noirewolterb
 
Lecture 20 - Cyberpunk and Biopunk
Lecture 20 - Cyberpunk and BiopunkLecture 20 - Cyberpunk and Biopunk
Lecture 20 - Cyberpunk and Biopunk
Patrick Mooney
 
Mind the Gap: On Gender And Technology
Mind the Gap:  On Gender And TechnologyMind the Gap:  On Gender And Technology
Mind the Gap: On Gender And Technology
Memi Beltrame
 

Viewers also liked (8)

Cyberfeminism Sadie Plant Nonidentity to Posthumanity
Cyberfeminism Sadie Plant Nonidentity to PosthumanityCyberfeminism Sadie Plant Nonidentity to Posthumanity
Cyberfeminism Sadie Plant Nonidentity to Posthumanity
 
Types of feminism
Types of feminismTypes of feminism
Types of feminism
 
Gendersystems
GendersystemsGendersystems
Gendersystems
 
Cyberpunk101
Cyberpunk101Cyberpunk101
Cyberpunk101
 
Cyberpunk Sci-Fi
Cyberpunk Sci-FiCyberpunk Sci-Fi
Cyberpunk Sci-Fi
 
Example cyberpunk noir
Example cyberpunk noirExample cyberpunk noir
Example cyberpunk noir
 
Lecture 20 - Cyberpunk and Biopunk
Lecture 20 - Cyberpunk and BiopunkLecture 20 - Cyberpunk and Biopunk
Lecture 20 - Cyberpunk and Biopunk
 
Mind the Gap: On Gender And Technology
Mind the Gap:  On Gender And TechnologyMind the Gap:  On Gender And Technology
Mind the Gap: On Gender And Technology
 

Similar to Cyberfeminism 101

Handwriting Without Tears - Easy Teaching Tools
Handwriting Without Tears - Easy Teaching ToolsHandwriting Without Tears - Easy Teaching Tools
Handwriting Without Tears - Easy Teaching Tools
Jenna Welch
 
4.4 How To Organize And Arrange - Hu
4.4 How To Organize And Arrange - Hu4.4 How To Organize And Arrange - Hu
4.4 How To Organize And Arrange - Hu
Nathan Mathis
 
My Favorite Teacher Essay For All Classes - Englishfun.In
My Favorite Teacher Essay For All Classes - Englishfun.InMy Favorite Teacher Essay For All Classes - Englishfun.In
My Favorite Teacher Essay For All Classes - Englishfun.In
Nicole Jones
 
First Class How To Write Introd. Online assignment writing service.
First Class How To Write Introd. Online assignment writing service.First Class How To Write Introd. Online assignment writing service.
First Class How To Write Introd. Online assignment writing service.
Jennifer Letterman
 
14 August Celebration Essay In Urdu
14 August Celebration Essay In Urdu14 August Celebration Essay In Urdu
14 August Celebration Essay In Urdu
Barbara Taylor
 
An Essay On Nature - Study Thinks
An Essay On Nature - Study ThinksAn Essay On Nature - Study Thinks
An Essay On Nature - Study Thinks
Miles Priar
 
How To Write An Essay Examples Telegraph
How To Write An Essay Examples  TelegraphHow To Write An Essay Examples  Telegraph
How To Write An Essay Examples Telegraph
Susan Migliaccio
 
What Is Research Proposal
What Is Research ProposalWhat Is Research Proposal
What Is Research Proposal
Amanda Sanchez
 
Best Scholarship Essays Writing Company
Best Scholarship Essays Writing CompanyBest Scholarship Essays Writing Company
Best Scholarship Essays Writing Company
Ann Montgomery
 
Critical Essay Brighton Rock
Critical Essay Brighton RockCritical Essay Brighton Rock
Critical Essay Brighton Rock
Damaris Tur
 
How To Become A Better Writer 10 Ways That Will Wo
How To Become A Better Writer 10 Ways That Will WoHow To Become A Better Writer 10 Ways That Will Wo
How To Become A Better Writer 10 Ways That Will Wo
Angela Shin
 
How To Write Descriptive Essays The Crafted Word
How To Write Descriptive Essays  The Crafted WordHow To Write Descriptive Essays  The Crafted Word
How To Write Descriptive Essays The Crafted Word
Lori Gilbert
 
9 Best Research Paper Examples Research Paper Samples ...
9 Best Research Paper Examples Research Paper Samples ...9 Best Research Paper Examples Research Paper Samples ...
9 Best Research Paper Examples Research Paper Samples ...
Mandy Froemming
 
Cyber Disorder
Cyber DisorderCyber Disorder
Cyber Disorder
Viral Parmar
 
How Would You Start Off A Persuasive Essay
How Would You Start Off A Persuasive EssayHow Would You Start Off A Persuasive Essay
How Would You Start Off A Persuasive Essay
Emily Garcia
 
How To Write A Thesis For A Persuasive Essay
How To Write A Thesis For A Persuasive EssayHow To Write A Thesis For A Persuasive Essay
How To Write A Thesis For A Persuasive Essay
Toni Craven
 
How To Write A Thesis For A Persuasive Essay
How To Write A Thesis For A Persuasive EssayHow To Write A Thesis For A Persuasive Essay
How To Write A Thesis For A Persuasive Essay
Vanessa Wilcox
 
Persuasive Essay Writing - An Extensive Step By Ste
Persuasive Essay Writing - An Extensive Step By StePersuasive Essay Writing - An Extensive Step By Ste
Persuasive Essay Writing - An Extensive Step By Ste
Ashley Smith
 
Allegory Of The Cave Essay. Platos allegory of the cave essay topics - mfacou...
Allegory Of The Cave Essay. Platos allegory of the cave essay topics - mfacou...Allegory Of The Cave Essay. Platos allegory of the cave essay topics - mfacou...
Allegory Of The Cave Essay. Platos allegory of the cave essay topics - mfacou...
Lisa Cartagena
 

Similar to Cyberfeminism 101 (20)

Cyborgs Powerpoint
Cyborgs PowerpointCyborgs Powerpoint
Cyborgs Powerpoint
 
Handwriting Without Tears - Easy Teaching Tools
Handwriting Without Tears - Easy Teaching ToolsHandwriting Without Tears - Easy Teaching Tools
Handwriting Without Tears - Easy Teaching Tools
 
4.4 How To Organize And Arrange - Hu
4.4 How To Organize And Arrange - Hu4.4 How To Organize And Arrange - Hu
4.4 How To Organize And Arrange - Hu
 
My Favorite Teacher Essay For All Classes - Englishfun.In
My Favorite Teacher Essay For All Classes - Englishfun.InMy Favorite Teacher Essay For All Classes - Englishfun.In
My Favorite Teacher Essay For All Classes - Englishfun.In
 
First Class How To Write Introd. Online assignment writing service.
First Class How To Write Introd. Online assignment writing service.First Class How To Write Introd. Online assignment writing service.
First Class How To Write Introd. Online assignment writing service.
 
14 August Celebration Essay In Urdu
14 August Celebration Essay In Urdu14 August Celebration Essay In Urdu
14 August Celebration Essay In Urdu
 
An Essay On Nature - Study Thinks
An Essay On Nature - Study ThinksAn Essay On Nature - Study Thinks
An Essay On Nature - Study Thinks
 
How To Write An Essay Examples Telegraph
How To Write An Essay Examples  TelegraphHow To Write An Essay Examples  Telegraph
How To Write An Essay Examples Telegraph
 
What Is Research Proposal
What Is Research ProposalWhat Is Research Proposal
What Is Research Proposal
 
Best Scholarship Essays Writing Company
Best Scholarship Essays Writing CompanyBest Scholarship Essays Writing Company
Best Scholarship Essays Writing Company
 
Critical Essay Brighton Rock
Critical Essay Brighton RockCritical Essay Brighton Rock
Critical Essay Brighton Rock
 
How To Become A Better Writer 10 Ways That Will Wo
How To Become A Better Writer 10 Ways That Will WoHow To Become A Better Writer 10 Ways That Will Wo
How To Become A Better Writer 10 Ways That Will Wo
 
How To Write Descriptive Essays The Crafted Word
How To Write Descriptive Essays  The Crafted WordHow To Write Descriptive Essays  The Crafted Word
How To Write Descriptive Essays The Crafted Word
 
9 Best Research Paper Examples Research Paper Samples ...
9 Best Research Paper Examples Research Paper Samples ...9 Best Research Paper Examples Research Paper Samples ...
9 Best Research Paper Examples Research Paper Samples ...
 
Cyber Disorder
Cyber DisorderCyber Disorder
Cyber Disorder
 
How Would You Start Off A Persuasive Essay
How Would You Start Off A Persuasive EssayHow Would You Start Off A Persuasive Essay
How Would You Start Off A Persuasive Essay
 
How To Write A Thesis For A Persuasive Essay
How To Write A Thesis For A Persuasive EssayHow To Write A Thesis For A Persuasive Essay
How To Write A Thesis For A Persuasive Essay
 
How To Write A Thesis For A Persuasive Essay
How To Write A Thesis For A Persuasive EssayHow To Write A Thesis For A Persuasive Essay
How To Write A Thesis For A Persuasive Essay
 
Persuasive Essay Writing - An Extensive Step By Ste
Persuasive Essay Writing - An Extensive Step By StePersuasive Essay Writing - An Extensive Step By Ste
Persuasive Essay Writing - An Extensive Step By Ste
 
Allegory Of The Cave Essay. Platos allegory of the cave essay topics - mfacou...
Allegory Of The Cave Essay. Platos allegory of the cave essay topics - mfacou...Allegory Of The Cave Essay. Platos allegory of the cave essay topics - mfacou...
Allegory Of The Cave Essay. Platos allegory of the cave essay topics - mfacou...
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

Cyberfeminism 101

  • 2.
  • 3. When I talk about cyberfeminism I am talking about the work of artists and theorists such as
  • 4. VNS Matrix The Old Boys Network Faith Wilding and Critical Art Ensemble Sadie Plant SubRosa Rosie X Rosie Bradotti Linda Dement Sonya Rapoprt Sussana Paassonen Verena Kuni
  • 5. You can find links to a lot of great cyberfeminist work at www.functionfeminism.com
  • 6. History But first, to put their work in context, here is a bit of
  • 8.
  • 9.
  • 10.  
  • 11. “ four bored girls decided to have some fun with art and French feminist theory… with homage to Donna Haraway they began to play around with the idea of cyberfeminism… Beginning as if by spontaneous combustion, from a few hot nodes in Europe, America and Australia, cyberfeminism became a viral meme infecting theory, art and the academy” As Julienne Pierce explained:
  • 12.
  • 13.
  • 14.
  • 15. At around the same time in Europe The Old Boys Network was created by a group of women including Cornellia Solfrank, Faith Wilding, Yvonne Volkart and Helene von Oldenburg
  • 16. The OBN still exists today. Check out their reading room at www.obn.org - it is an excellent resource
  • 17. It was the old boys network that really set the terms for cyberfeminism as a movement by holding the First Cyberfeminist International
  • 18. This was a conference within a conference - Documenta X - that was held in Kassel, Germany, in 1997
  • 19. It was a one day session where women who had begun to work in this new field could get together, share ideas, talk about the direction they wanted to take cyberfeminism and address the question of a unified definition of cyberfeminism once and for all
  • 20. But they did not define it
  • 21. Well not in the traditional sense. They decided to avoid a rigid definition, or rather refused to create a definition that would force others to conform and instead they decided to create the 100 anti-theses
  • 23. 100 Anti-theses 1. cyberfeminism is not a fragrance
  • 24. 100 Anti-theses 1. cyberfeminism is not a fragrance 63. cyberfeminism is not a wound
  • 25. 100 Anti-theses 1. cyberfeminism is not a fragrance 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe
  • 26. 100 Anti-theses 1. cyberfeminism is not a fragrance 100. cyberfeminism has not only one language 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe
  • 27. 100 Anti-theses 1. cyberfeminism is not a fragrance 100. cyberfeminism has not only one language 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe 14. cyberfeminism is not complete
  • 28. 100 Anti-theses 1. cyberfeminism is not a fragrance 100. cyberfeminism has not only one language 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe 14. cyberfeminism is not complete 83. cyberfeminism is not about boring toys for boring boys
  • 29. 100 Anti-theses 1. cyberfeminism is not a fragrance 100. cyberfeminism has not only one language 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe 14. cyberfeminism is not complete 68. cyberfeminism is not a single woman 83. cyberfeminism is not about boring toys for boring boys
  • 30. 100 Anti-theses 1. cyberfeminism is not a fragrance 100. cyberfeminism has not only one language 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe 14. cyberfeminism is not complete 68. cyberfeminism is not a single woman 83. cyberfeminism is not about boring toys for boring boys 30. cyberfeminism is not without connectivity
  • 31. 100 Anti-theses 1. cyberfeminism is not a fragrance 100. cyberfeminism has not only one language 63. cyberfeminism is not a wound 55. cyberfeminisme n'est pas une pipe 14. cyberfeminism is not complete 68. cyberfeminism is not a single woman 83. cyberfeminism is not about boring toys for boring boys 30. cyberfeminism is not without connectivity 65. cyberfeminismo no es una banana
  • 32. The 100 anti-theses is a list of statements describing what cyberfeminism is not
  • 33. The anti-theses range from playful , eg. 1. cyberfeminism is not a fragrance
  • 34. To the more serious and instructive, eg. 100. cyberfeminism has not only one language
  • 35. So that is what it is not .
  • 36. But the question still feels unanswered
  • 37. What is Cyberfeminism?
  • 38. Yvonne Volkart from the old boys network said:
  • 39. "Cyberfeminism is a myth. A myth is a story of unidentifiable origin, or of different origins. A myth is based on one central story which is retold over and over in different variations. A myth denies ONE history as well as ONE truth, and implies a search for truth in the SPACES , in the DIFFERENCES BETWEEN the different stories. Speaking about Cyberfeminism as a myth, is not intended to mystify it, it simply indicates that Cyberfeminism only exists in plural.”
  • 40. So I am going to hold true to the vision of my cyberfeminist foremothers and not provide you with a singular definition either
  • 42. I will tell you some of the things that cyberfeminism can be, to add to what it is not
  • 43. examine the relationships between women and technology Cyberfeminism can… critique at equality in cyberspace examine relationships between bodies and technology examine technology by engaging with it disrupt the perception of technology as ‘toys for boys’ challenge established perceptions of cyberspace seek to bring about change from within playfully address feminist issues directly address feminist issues subtly address feminist issues embrace technology be humorous be fun be active be collaborative be subversive
  • 44. Cyberfeminism can be all these things, but any individual cyberfeminist work need not be all these things at once
  • 45. examine the relationships between women and technology critique at equality in cyberspace examine relationships between bodies and technology examine technology by engaging with it disrupt the perception of technology as ‘toys for boys’ challenge established perceptions of cyberspace seek to bring about change from within playfully address feminist issues directly address feminist issues subtly address feminist issues embrace technology be humorous be fun be active be collaborative be subversive that would be a lot to ask
  • 46. Still, I think there is even more to cyberfeminism
  • 47. Cyberfeminism is not just the subject matter, but also the approach taken to examine that subject matter
  • 48. So I have developed a cyberfeminist methodology based on the art and theory of established cyberfeminists
  • 49. And thus I present…
  • 50. The Five Rules of Cyberfeminist Engagement*
  • 51. The Five Rules of Cyberfeminist Engagement* * Of course, these are my rules and you are welcome to use them, but as a cyberfeminist you are free to make your own if you want, in fact you are encouraged to do so
  • 52. 1. Remember the feminism in cyberfeminism
  • 53. It is cyber feminism after all So this means initially examining things through a traditional feminist lens
  • 55. Cyberfeminism is very much connected to a DIY ethic. From the very beginning of the movement it has had a strong connection to art Most of the prominent cyberfeminists are both artists as well as theorists
  • 56. Engagement and participation are integral parts of what makes cyberfeminism a movement beyond a feminist critique of technology There are theorists, such as Donna Haraway and Judy Wajkman who have done some awesome work in the area of women and technology, but that doesn’t necessarily make them cyberfeminists as such
  • 58. By this I mean, once you have engaged with the technology, don’t settle for things the way they appear It may not mean actual program hacking - although it certainly could - it means see what is there and take it and turn it into something that works for you.
  • 59. Jon Ipolito said that electronic art was best described as ‘ creative misuse of technology ’ and I think that description is particularly fitting - which leads me to the fourth rule…
  • 61. I do wonder if this is a backlash against the perception of the humorless feminist, but there is a tradition for cyberfeminist works to be playful and fun while subversive with a serious message. Kind of lighthearted with a sting
  • 63. 5. Conspire and Collaborate And lastly…
  • 64. This is an important one, because, while it is becoming more common, collaboration generally goes against preferred patriarchal methods of art practice where a lot of value is placed in the idea of the auteur , and works being touched by the hand of the master
  • 65. However, when you are talking about technology , and the internet in particular, the more femininely defined collaborative approach is increasingly suitable
  • 66. what I mean by this is if you think about a craft vs art dichotomy - current uses of technology are more analogous to craft - more like quilting than an oil painting
  • 67. So that is what I mean when I say cyberfeminism
  • 68. 52 Acts of Cyberfeminism http: //fiftytwoacts . wordpress .com 1st January 2008 - 31st December 2008