Book Reviews (the Cultures of Computing by Susan Leigh Starr; Cultures of Internet: Virtual Spaces, Real Histories, Living Bodies by Rob Shields, Editor)

By Mason, Bruce Lionel | Ethnologies, Annual 1999 | Go to article overview

Book Reviews (the Cultures of Computing by Susan Leigh Starr; Cultures of Internet: Virtual Spaces, Real Histories, Living Bodies by Rob Shields, Editor)


Mason, Bruce Lionel, Ethnologies


The Cultures of Computing. By Susan Leigh Starr, editor. (Oxford: Blackwell, 1996. Reprint. 282 p., Index, bibliography, ISBN 0-631-19282-4.)

Cultures of Internet: Virtual Spaces, Real Histories, Living Bodies. By Rob Shields, editor. (London: SAGE, 1996. Pp. viii + 196, index, bibliography, ISBN 0-8039-7519-8.)

According to Rob Shields, editor of Cultures of Internet, the Internet is "Over-hyped, over-sensationalized...[and] under-examined" (p. ix). I am not sure I agree with the latter part; these two books represent the latest in the burgeoning wave of publications dealing with the ways in which computing, computers and culture inter-relate. However, despite two very similar titles, the anthologies present two very different perspectives.

Susan Leigh Star's The Cultures of Computing is already into its second printing and she describes it as having "four major themes: computers as a medium for building communities and networks; computers as a way of stretching and redefining specific cultural practices; problems in representing cultural practices for computing; questions of power and cultural conflict in the various worlds of computing" (p. 8). This description reads like that of an overstretched compiler and, sure enough, the anthology seems somewhat out of control as well as already out of date. This is a slightly harsh summary of an occasionally invigorating set of articles, but on the whole I found the anthology to be turgid going.

Susan Leigh Star's introduction is one of the high points of the collection and symptomatic of it; occasionally brilliant insight is lost in decontexualized esoterica and a frantic attempt to make things fit. For example, she spends a fair amount of the introduction detailing the "Geek Code," one of the more fascinating folkloric creations to come out of the Internet. Essentially, the code consists of a series of symbols that encode information about a user. For example if I were to sign my email Bruce Mason t+, then a reader could track down a Geek Code and decipher the "t+" as "Star Trek is a damn fine TV show and is one of the only things good on television anymore" (Star, p. 18). Her reporting of the code is fine, but she fails to ground her discussion to any extent, commenting only that it draws from a long association of computing professionals with the image of "the nerd" (p. 20). She gives us no clear idea whether the Geek Code is ever used and, if so, by whom, when, to whom and so on. As with Barbara Kirshenblatt-Gimblet's recent article on forms of Internet folklore (1995), Star substitutes some fun data for analysis. On the other hand I found her analysis of being "homed" and then, by extension, of being "wired" to be very stimulating. Drawing on the feminist perspective that "every marked category implies its opposite" (p. 22), she first deconstructs the state of being homeless then reconstructs its opposite being "homed:" for example, she claims that "being homed means I do not risk arrest in the process of conducting my bodily functions (eating, sleeping, passing waste);" (p. 25). She then extends this analysis to the "consensual hallucination" (Gibson 1984) of cyberspace in order to examine what it means to be "wired," the emic term for being connected to the Net. Such thoughtful scholarship is precisely the type of analysis that often goes out of the window in the desire to publish something to do with the Internet while it is still a hot topic.

With a few exceptions, the primary focus of this anthology centres on the use of computers in working environments. Two of the articles come from the Computer Supported Cooperative Work project (CSCW) at the University of Sussex in the U.K. According to Mike Hale in his article (p. 103-17), this project exists in a borderland between industry and academia and has pioneered a line of research into software ethnography. This exploration of how workers use computers and programs in the work environment is remarkably similar to Michael Owen Jones's conception of "corporate ethnography" and vulnerable to the same charges. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Book Reviews (the Cultures of Computing by Susan Leigh Starr; Cultures of Internet: Virtual Spaces, Real Histories, Living Bodies by Rob Shields, Editor)
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.