Chapter 3. Playing with tech
Now that you have a sense of the different elements to consider when organising a convening and holding a conversational space, we bet all you’ll want to do now is cram your agenda with juicy feminist tech activities! If you are looking for tips and examples of hands-on activities that lift the lid on tech using a feminist politics, this chapter is for you! Though before we get under the hood of technology and the possibilities that learning hold, you may be asking, why include hands-on learning activities in a conversation about the FPIs?
- Intro
- Feminist Practices and Politics of Technology
- Hands-on activities for igniting conversation!
- Hands-on activities for subversion using technology!
Intro
Now that you have a sense of the different elements to consider when organising a convening and holding a conversational space, we bet all you’ll want to do now is cram your agenda with juicy feminist tech activities! If you are looking for tips and examples of hands-on activities that lift the lid on tech using a feminist politics, this chapter is for you! Though before we get under the hood of technology and the possibilities that learning hold, you may be asking, why include hands-on learning activities in a conversation about the FPIs?
Depending on who you invite to your conversation, there may be participants in the room who are not familiar with certain types of technology. Some may have had negative experiences of violence and harassment when using technology. Others may not have ready access to digital devices, or may feel that technology is complicated, confusing or not for them.
Hands-on activities about technology hold the power to confront fears that your participants might have around using technology. They also create a safe environment in which to explore, discover, play and find joy using technology! This breaks dominant narratives that participants might have around technology not being for them, and can spark curiosity and deepen their understanding of how technology relates to their activism and their lives.
What we will explore in this chapter: | This section is for you if: |
Feminist practices and politics of technology |
|
Hands-on activities for igniting conversation |
|
Hands-on activities for subversion using technology |
|
Ready to jump in? Let’s go!
Feminist Practices and Politics of Technology
The Feminist Practices and Politics of Technology is an approach to running technology-related activities. We know that a feminist practice of technology cannot be devoid of a feminist analysis of the politics of technology. The Feminist Practices and Politics of Technology are a set of principles that put the politics into practice! These principles can help you choose what activities to include in your conversation, and also help you decide on the best approach for carrying those activities out.
Why are the Feminist Practices and Politics of Technology important when hosting a conversation about the Feminist Principles of the Internet?
-
Like the FPIs, these principles ensure that the experiences of women, gender-diverse and queer folks with technology remain at the centre of our exploration and interrogation of technology and its development.
-
When these principles are applied to how we run our activities, they ensure that those activities are not only about the technical or practical elements of technology, but mainly about the political, social, economic and cultural paradigms that shape and affect the technical and practical elements.
-
Finally, these principles remind us that how we teach about technology must be adapted to the needs and priorities of those who are learning – not the other way around – and consider the diversity of ways in which knowledge and experiences are shared.
Feminist Practices and Politics of Technology core principles
Participation and inclusivity:
-
Since you as the facilitator have as much to learn from your participants as they do from you, design your conversation in a way that encourages exchange and discussion! This gives space for different opinions and experiences to emerge.
-
Remember there are various ways of learning and communicating! Choose activities that accommodate different learning styles.
Safety:
-
Create an environment where participants feel safe to ask questions, raise issues and feel they can share information without being rejected, belittled or divulged without their consent. Discuss with folks what they need to feel safe when going through your event’s Principles for Participation (Chapter 2)
-
Take time to go through the risks associated with using digital technologies. Before embarking on a new activity, participants need to be informed of possible dangers, such as risks to their privacy when using social networking sites, for example.
-
Integrate care into the practice of activities. Remember that care looks different for different people, and depends on who we are and where we are located in our lives and contexts. Be mindful of any stress that shows up in the room and address it where possible, so that everyone can show up fully for the collective during each activity.
Grounded in participants’ realities:
-
Base conversations on the needs and realities of your participants. Take into account the contexts of your participants, the kinds of technologies folks use, and the ways in which they experience technology when deciding on what activities to include.
Appropriate, sustainable technologies:
Transparency and openness:
-
Remember that you have your own agenda when hosting a local conversation. Make your goals apparent to your participants.
-
When planning the agenda of your conversation, include processes in which the expectations and goals of participants are surfaced and integrated into the agenda. These processes can take place either before or at the start of your event.
Creativity and strategy:
-
Use the conversation as a space to look at technologies strategically and creatively! Figure out collectively how folks can appropriate them in ways that enhance their activism and lives.
Emphasis on the roles of women, gender diverse and queer folks in technology:
-
Be aware that many folks have been erased from the histories of technology. Your conversation is the perfect space to correct this misrepresentation. When talking about technology, highlight the contributions that women, gender diverse and queer folks have made to technology development. Ask participants of some of the women, gender diverse and queer folks they know who have shaped technology! Raising these examples is a powerful way of showing participants how much technology is meant for and is shaped by women, gender diverse and queer folk around the world.
Emphasis on our control of technology:
-
Do not be hesitant to dive deeply into the ways in which you and your participants can take control of the internet and technologies.
-
Provoke curiosity among participants around how technologies work – not only how they can be used – by integrating hands-on tech activities into your conversation agenda.
Fun!
-
Simply put, have fun at your event! Remember that having fun is political, because it breaks down barriers that negatively affect folks’ relationships to and control over technology. Fun enables ownership of technology and our online spaces and sustains curiosity and joy.
Now that we know how to frame the way we talk about technology with our participants, and how to approach the selection and facilitation of activities, let’s take a look at a few examples of hands-on activities designed and practiced by feminist trainers from around the world!
Hands-on activities for igniting conversation!
Image Source: Feminist Internet City Conversation in Harare, 2017. Photograph by Fungai Machirori
Conversation is an important means for surfacing different perspectives and experiences about technology. The following activities create spaces for small and larger group discussions that can help folks to deepen their understanding of how technology relates to their environment and their lives.
Read on to learn about:
Hosting an Install Party! [to be completed]
By (person), (country)
Overview |
An Install Party is a gathering, firstly, to have fun, but also to collectively install free operating systems on the computers of participants. Using CDs or USB sticks, participants work together to replace their computers’ proprietary operating systems with operating systems from a GNU/Linux distribution. If a problem arises, it is solved by the whole group, although there are usually more experienced installers present to support the process.
If we compare our body to a computer, we could also consider ourselves to be made up of a physical part, like the hardware, and software, which would be the content of our brain and the subjectivity or codes and values that constitute us. Just as hardware and software in a computer communicate with each other through a series of protocols, so our physical bodies and identities are permeated by specific programmes. For example, the dominant operating system on our computers could be Windows, which is organised on the basis of user dependency on corporations, where copying and the modification of code is forbidden. We could understand heteronormativity as a cultural operating system that runs through our bodies, which, just like Windows, is not easy to modify, because its codes have not been opened and seek to preserve binary divisions of gender.
In the same way that an Install Party brings people together to install free operating systems on their computers, this activity brings people together to uninstall dominant cultural systems from our bodies and install alternative cultural systems around gender and other parts of our identity that are open and allow us to share, copy and modify them!
Who is this activity for? [To be completed] |
Getting started |
Materials needed:
Preparation: |
The activity |
The aim of the activity is to make new versions of the concepts that affect, classify and construct us, so that we can adapt them to our experience and replicate them in other spaces. It is a way of hacking what has been given to us as unchangeable and closed, and replacing those systems with concepts that are open and modifiable.
Some basic concepts to share with participants:
Activity step-by-step [to be completed] |
Using metaphor surrounding the body and territory!
By (person), (country)
Overview |
|
Getting started |
Materials needed:
Preparation: |
The activity |
|
Feminist Dada Technopoetry!
By Juliana, Colombia
Overview |
Texts are not neutral. Whether technical, narrative, essay or principles, they are written with a limited set of words supposedly known by those to whom these texts are intended. Breaking those texts and approaching them word by word, asking questions about how they are composed, is a way to consciously think and reflect on a particular topic.
Creating with these words without necessarily knowing their context or even their meaning (quite common with technical terminology) is an opportunity to imagine and create a new meaning for them. Can we build a feminist internet from scratch? Probably not, but dada poetry and collage has taught us how to transform reality using what we have and recycling it.
Using an arbitrary word set while thinking about a possible feminist internet may help us to reject some traditional assumptions and freely create their meanings and contexts. This activity uses collage as a way of exploring code, creating texts and unpacking technical terms. It is an analytical and joyful activity. We want to identify the different origins and intentions of words used and create not only new texts but images of possible scenarios.
It has been practiced by trainers in Mexico, Toronto, New York and Bogotá.
Who is this activity for? Participants for this activity have been (non-tech) feminist activists, techies and digital rights activists. Basic literacy (reading and writing) in the language of the event is required for this activity. No other technical expertise is needed. |
Getting started |
Materials needed:
If the activity is conducted in-person:
If the activity is conducted online:
Preparation:
If the activity is conducted online:
You can also invite participants to bring their own word sets and image materials to contribute, however, this may confuse the exercise. It is up to you if you decide whether to introduce other materials or not. |
The activity |
This activity can be run at any moment during a workshop, even during a break time.
The success of the activity lies in remembering that the preparation is both directive and arbitrary. In selecting the word set, you are controlling the system and are in no way neutral. However, allow yourself and the participants to let go, play and enjoy the activity. |
Hands-on activities for subversion using technology!
Want to get down and dirty with tech? Touching, holding, pulling apart, building and using technological devices themselves can be a powerful means for exploring unknowns, taking up space and subverting using technology. The following activities can help folks gain confidence handling technology and realise their own capabilities in shaping tech!
Read on to learn about:
-
Even machines dream: Feminist robots for Twitter, by Stef from Brazil!
-
Proud Dyke.tech - a master of web technologies, by Maja from Slovenia!
Even machines dream: Feminist robots for Twitter
Overview |
This activity entails making one (or many) feminist robot(s) for Twitter using generative grammar constructs.
A bot (or robot) is a computer programme that automatically performs repetitive tasks over the internet. Normally, these bots perform simple tasks. When they act together, it is often called a ‘bots farm.’ When used on Twitter, they are rarely influential, but they do help generate trending topics – the topics that Twitter considers ‘hot’ at a certain moment – or generate noise about a topic.
Making and using feminist robots on Twitter is a playful way of making feminist ‘noise’ online, and creating a feminist internet.
Generative grammar, which will be used to create our bots, is a linguistic theory that regards grammar as a system of rules. It generates exactly those combinations of words that form grammatical sentences in a given language.
Who is the activity for? |
Getting started |
Materials needed:
Preparation:
|
The activity |
The activity can be run either in-person or online. Make sure that participants each have the materials needed as stipulated above. Remember to set a time limit for each step of the activity.
{ "origin": ["Good day for #action# #something# with #object# #where#"] ,"action": ["explode","leave","kill","?","?","?","?"] ,"something": ["Facebook","patriarchy","the machista","?","?","?"] ,"object": ["scissors","encryption","?","?","?","?","?"] ,"where": ["in the kitchen","in the car","?","?","?"]
}
|
Proud Dyke.tech - a master of web technologies
By Maja, Slovenia (https://www.22nds.com)
Overview |
Dyke‧tech is a web page where nine web development challenges are featured. They are ordered by their complexity and while participants are solving them they learn about web technologies.
Project DYKE‧tech originates from the LGBTIQ community in Slovenia. It was first presented at LGBTIQ in Tech meetup and is an English version of Lezba‧si – a lesbian who masters computer science – as defined in Slovenian LGBTQ dictionary. It is a fun way of exploring web development while being creative, exploring functionalities of web browsers and sharing tips on how to solve the challenges.
The activity has been practiced in Ljubljana, Slovenia and Berlin, Germany.
Who is this activity for? The activity is best suited for web developers or those who are curious how websites are built and already have at least a little knowledge about web development. |
Getting started |
Materials needed: Laptop (not mobile phone) is needed to be able to look into source code of web pages. Preferably using Mozilla Firefox browser.
Preparation: No preparation for participants is needed. Facilitator should solve the challenges on website https://www.22nds.com/dyketech/ before the activity to be able to help participants and be familiar of concepts used in modern web development (browser, source code, design, JavaScript, RegEx, cookies, search engines, data, images). |
The activity |
The facilitator should give a little intro into the activity (also available at https://www.22nds.com/dyketech/about-the-project/) and make sure all participants have web site https://www.22nds.com/dyketech/ opened in Mozilla Firefox browser.
There are several ways this activity can be run and the choice is based on the proficiency of participants’ web development skills:
1. If all participants have a lot of experience and knowledge, facilitator can block 20 minutes and let everyone start solving the challenges. After 20 minutes everybody shares their progress and if there is anybody that was unable to progress they get additional support to solve the challenge. If needed participants get another 20 minutes to tackle the challenges. Afterwards a review of all the challenges should be made and participants share how they solved it. If some challenges are still unsolved then the facilitator helps with tips (not solutions!) and motivates participants to solve the challenge together.
2. If participants are not web developers, but would like to learn about web technologies, then the challenges should be solved together by the whole group. For every challenge one of the participants is selected to read out loud the text on the web site (the tip that hints where the solution is) and think about the strategies of solving the challenge. Other participants can help and share their thoughts and possible solutions until they find the solution and all group progresses to the next challenge and ultimately solves all challenges. Facilitator should help with tips when the group gets stuck and when participants reach solution facilitator can also point out alternative ways of solving the challenge.
At the end of the activity participants and facilitator can have a discussion about which other challenges could be implemented, what they had learned and which web technology they would like to learn more about in the future. |
Taking apart your computer!
By (person), (country)
Overview |
|
Getting started |
|
The activity |
|