Crossroadsxrds2017winter DL
Crossroadsxrds2017winter DL
Crossroadsxrds2017winter DL
Crossroads The ACM Magazine for Students W IN T ER 2017 V OL .24 • NO.2 XRDS.ACM.ORG
Human
to Human
Digital and Physical Barriers
to Changing Identities
Identifying Hate Speech
in Social Media
Gender and the Art
of Community Relations
INSPIRING MINDS
FOR 200 YEARS
Ada’s Legacy illustrates the depth
and diversity of writers, things, and
makers who have been inspired
by Ada Lovelace, the English
mathematician and writer.
The volume commemorates the
bicentennial of Ada’s birth in
December 1815, celebrating her
many achievements as well as
the impact of her work which
reverberated widely since the late
19th century. This is a unique
contribution to a resurgence in
Lovelace scholarship, thanks to the
expanding influence of women in
science, technology, engineering and
mathematics.
ACM Books is a new series of high quality books for the computer science community, published by
the Association for Computing Machinery with Morgan & Claypool Publishers.
Inviting Young
Scientists
Meet Great Minds in Computer
Science and Mathematics
As one of the founding organizations of the Heidelberg Laureate Forum
http://www.heidelberg-laureate-forum.org/, ACM invites young computer
science and mathematics researchers to meet some of the preeminent scientists
in their field. These may be the very pioneering researchers who sparked your
passion for research in computer science and/or mathematics.
These laureates include recipients of the ACM A.M. Turing Award, the Abel Prize,
the Fields Medal, and the Nevanlinna Prize.
The Heidelberg Laureate Forum is September 23–28, 2018 in Heidelberg, Germany.
This week-long event features presentations, workshops, panel discussions, and
social events focusing on scientific inspiration and exchange among laureates
and young scientists.
14
begin
5 LETTER FROM THE EDITORS
Multidisciplinary Systems
Engineering
By Jennifer Jacobs
7 INIT
Human to Human
By Alex Ahmed and Teresa Almeida
10 ADVICE
The Excessive Power of
Ctrl+C and Ctrl+V in CS Research
and Career Development
By Nisha Panwar and Shantanu Sharma
12 UPDATES
ADA ACM’s Role in
Diversifying Chapter Activities
By Anshuman Majumdar
14 CAREERS
Software is for Humans
By Jenn Schiffer
15 MILESTONES
Technology and Dating
By Alok Pandey
Image by Redpixel PL / Shutterstock.com
16 ACCOLADES
ElectroEuro
By Talia Kohen
18 BLOGS
Interfacing an FPGA with an
External Circuit and Applications
By Alexander DeForge
34 48 62
features end
22 FEATURE 38 FEATURE 54 LABZ
Can We Build the Cyborg Future Gender and the Art Social and Psychological Questions
We All Deserve? of Community Relations about Humans and Technology
By Ari Schlesinger By Lesley Mitchell By David M. Markowitz
By Adrian Scoică
64 BEMUSEMENT
On the Cover:
Image by Alicia Kubista/Andrij Borys Associates.
Multidisciplinary
Systems
Engineering
M
odern technological development emphasizes innovation. The success of an
algorithm, a device, or a piece of software is often directly equated with the amount
of impact it has on our world. The value our society places on innovation has led to a
great deal of research aimed at understanding specific factors involved in creating
powerful and meaningful technology. My dissertation research addressed a subdomain of
this topic by examining ways in which we might design computational tools for art and
design. My approach was to involve artists and designers directly in the development process
by creating programming models and I believe this question reflects the than men [2]. Following its release, the
tools specifically for them. Curiously, view of some engineers; the idea that memo was criticized by many in the
when this research was presented to programming is a highly specialized technology community. Unfortunate-
software developers, I was routinely domain where only a select few have ly, its messages were tacitly endorsed
asked a version of this question: “Do the skills and knowledge required to by other prominent technologists [2],
you really believe artists and designers create systems that benefit a wider and Damore’s firing from Google as a
want to program?” population. Clearly, not all program- result of his assertion was used as evi-
mers have this perspective. However, dence by some that the push for diver-
there are others in the tech commu- sity in technology had gone too far [3].
UPCOMING ISSUES
nity who believe efforts to increase It’s true individuals often exhibit
diversity in professional engineering different ways of thinking and possess
Spring 2018
lowers the bar for engineering hiring various aptitudes. It can feel like com-
[March issue] practices and hinder technological in- mon sense, therefore, to conclude tech-
Computers and Art novation [1]. A memo written by former nological innovation is best supported
Google employee James Damore, made through a merit-based technology
Summer 2018 public in August 2017, argued diversity industry with hiring practices aimed
[June issue] efforts at Google were counterproduc- at selecting people with the greatest
Online Personality, Pseudonymity, tive. Damore claimed, on average, “natural talent” for programming. Yet
women are biologically unsuited for closer examination of this argument
and Anonymity
the challenges of computer program- reveals two major problems.
Article deadline: March 1, 2018 ming because they have higher rates of First, portraying any industry as
anxiety and lower tolerance for stress a meritocracy often leads people to
world of formal systems and physical people who use their tools. It can dis- [1] Bowles, N. Push for gender equality in tech? Some
men say it’s gone too far. The New York Times.
things” by literally translating abstract pel unconstructive attitudes toward September 23, 2017; https://www.nytimes.
representations to concrete systems learners by demonstrating that new com/2017/09/23/technology/silicon-valley-men-
backlash-gender-scandals.html.
and artifacts that live in the world and creators, while inexperienced, posses [2] Conger, K. Exclusive: Here’s the full 10-page anti-
interact with people [5]. Turkle and strong design objectives, stylistic pref- diversity screed circulating internally at Google
[Updated]. Gizmodo. August 5. 2017; https://gizmodo.
Papert’s argument is borne out of the erences, and personal values. com/exclusive-heres-the-full-10-page-anti-
affect computing has on our world to- The capacity to investigate the at- diversity-screed-1797564320
day. Social-media platforms, gaming titudes and values of different com- [3] Kovach, S. Silicon Valley’s liberal bubble has burst, and
the culture war has arrived. Business Insider. 2017;
technologies, creative software, and munities and individuals is also an http://www.businessinsider.com/silicon-valleys-
countless other forms of software are important skill. Specifically, experi- liberal-bubble-has-burst-2017-8
as much defined by their algorithmic ence with methods of social science [4] Hitchens, C. Why women aren’t funny. Vanity Fair
(Jan. 2007); https://www.vanityfair.com/
qualities as they are by their interfac- research can help engineers under- culture/2007/01/hitchens200701
es, interactions, and the communities stand general values, practices, and [5] Turkle, S. and Papert, S. Epistemological pluralism
that make use of them. Similarly when attitudes of communities that use and the revaluation of the concrete. Journal of
Mathematical Behavior 11, 1 (March 1992).
these systems produce unexpected, their systems. Face-to-face interviews
undesirable, and sometimes harm- can provide invaluable insights for DOI: 10.1145/3155214
ful consequences, it is frequently the improvement of a system. Copyright held by author.
Human to Human
T
here’s a myth in tech oppressions operate at all almost invariably linked gies—who are largely white,
culture: A myth that levels of our society, empow- to specific ways of organiz- male, and able-bodied—-are
technology can solve ering some individuals over ing power and authority” lauded as benefactors who
any problem, bridge others. Technology can be a [1]. As an example, Winner are making the world a bet-
any gap, and create some- vehicle to perpetuate these writes the benefits—and ter place.
thing out of nothing. And, harms, as well as a tool for re- consequences—that nuclear Such a typecasting de-
supposedly, it has no politi- sistance. It can create oppor- energy brings to humanity nies true self-determination
cal allegiance or agenda. As tunities as well as deny them. will depend not only on the of disabled people because
students, it’s difficult to re- It is undeniably political. configuration of the hard- it contributes to a narrative
sist this allure—that we, as Designing systems “for ware itself, but also on how that denies personhood (in
future programmers and good”—such as those that the technology is situated favor of “problemhood”).
technologists, are going to support and mediate en- in social institutions. Nearly This prevents a more nu-
“make the world a better gagement between hu- 40 years after Winner made anced exploration of the
place.” HBO’s series “Silicon mans—supports positive that observation, our tech- ways our constructed social
Valley” perfectly satirized1 change, but only when such nologies have grown more environment can itself be
this false promise, as ficti- systems account for cultural complex and sprawling, yet disabling, oppressive, and
tious TechCrunch Disrupt values. Taking a humanistic simultaneously more per- exclusionary. It also prevents
presenters proudly claimed approach within technology- sonal and intimate. us from discussing how
they were “making the world led interventions is challeng- In her book Giving Voice, people’s access to assistive
a better place through scal- ing, but essential. As devel- Meryl Alper engages with technologies, or the training
able, fault tolerant distrib- opers, we cannot ignore how similar ideas in the context and resources to use them ef-
uted databases.” The show our designs and products of iPad apps for children who fectively, are distributed dif-
revealed not just how ridicu- impact human lives. cannot produce oral speech ferently based on race, class,
lous and hilarious tech com- In 1980, Langdon Win- (or have significant difficul- nationality, and other fac-
panies’ claims of social good ner wrote, “if we examine ty doing so) [2]. These apps, tors. If only privileged fami-
can be, but also how we can social patterns that com- which present a grid of picto- lies can use technology to
be complicit in them. prise the environments of grams that can be selected in guarantee better outcomes
The ways we relate to technical systems, we find order to create and “speak” for their children, is that
each other and to ourselves certain devices and systems sentences, can function as truly “social good”? Or is it
are constrained by our en- a child’s primary mode of oppression, in which power
vironments—our peers, our communication. Despite remains entrenched in the
culture, and artifacts in the appearing to be wholly ben- dominant strata of our soci-
world. Because of this, it’s eficial to users, such technol- ety? (In this issue, Joslenne
indisputable that technol- Being pioneers ogies (and the culture sur- Pena explores this idea in the
ogy impacts intimacy, iden-
tity, and relationships. This in our field rounding them) can act to
reproduce social inequalities
context of technology use in
K-12 schools.)
issue explores that deeply, requires us and power dynamics that op- Broadly, our issue ex-
with the understanding that
these impacts are deter- to ask difficult press disabled people. Alper
argues that news media of-
plores questions like: Of the
opportunities digital tech-
mined by patterns of power questions about ten portrays disabled people nology presents for support-
and dominance. In other
words, systemic racism, sex-
who benefits in terms of what they are per-
ceived to lack: as problems
ing positive expression, what
groups of people are being
ism, homophobia, trans- from our work waiting for a technological afforded them? Who is be-
phobia, ableism, and other
and who is solution. Simultaneously,
the engineers and design-
ing ignored, and who is being
negatively impacted? Whose
1 https://youtu.be/IXuFrtmOYKg ignored. ers behind the technolo- self-determination is con-
INIT
lems. This issue, “Human to line might have to deal with views about the sexualities of
Human,” highlights people potentially fraught relation- disabled people.
who are doing work to solve ships with family, friends, Joslenne Pena shares her
these problems: researchers, and employers; however, the graduate research in build-
activists, and those whose system can end up impeding ing technologies for K-12 in-
admin in her work as a gradu- a colloboration of traditional [1] Winner, L. Do artifacts have politics?
Daedalus, 121-136, (1980)
ate student of sociology. In quilting techniques and novel
[2] Alper, M. Giving voice: Mobile
this issue, she discusses a digital tools that led to posi- communication, disability, and
qualitative study that used in- tive expression. inequality. MIT Press. 2017.
ADVICE
V
arious types of plagiarism The height of verbatim plagiarism 1. Faulty tools. Many online plagia-
are common in academia. may be illustrated by the following rism detectors can only find verbatim
Namely, (i) word-by-word or real story. Jure Leskovec, Anand Ra- plagiarism, not paraphrasing plagia-
verbatim plagiarism: turning jaraman, and Jeffrey D. Ullman wrote rism. For example, Google Scholar does
contents into a carbon copy, (ii) para- a book entitled Mining of Massive not count a citation if a paper is not
phrasing plagiarism: copying the un- Datasets (2011). Since the book is properly cited in a new paper.
derlying meaning of the content in a available online, someone by the 2. Fake reviewers. In some plots, au-
“smart” manner by slightly tweaking name of Seyed Hossein Ahmadpa- thors first write a fake paper, and then
the tone of sentences, (iii) idea pla- nah simply copied the entire thing. submit fake reviewers’ information
giarism: capturing early/unpublished Seyed only changed two elements of that turns out to assign the paper for re-
ideas belonging to someone else, and the book: the title and the author’s view to the authors or to their friends.2
(iv) authorship plagiarism: masquer- name.1 Seyed used CreateSpace, Am- 3. A lot of papers and few reviewers.
ading as an original author of a differ- azon’s book-production facility, to Some top-notch journals/conferences
ent author’s work. Moreover, occasion- produce the hard copies, and made that promise to adhere to the standards
ally, reviewers may demand their own the fake book available on Amazon usually face a crisis of available review-
papers to be cited (no matter whether for $25. ers. Most authors wish to submit their
the references are relevant or not), Recently, we were assigned a pa- papers to good journals; however, the
leading to a new type of plagiarism per to review for a well-regarded lack of expert reviewers significantly
that we call “citation plagiarism.” In journal. The writing and contents impacts the review process.
this article, we mention three real pla- of the paper were extremely poor, 4. Time and effort. Some students
giarism stories, and show ways to re- which was not an unusual problem wish to complete their degrees quickly
duce incidents of plagiarism. It is not until we noticed that the authors’ without devoting significant effort.
our intention to blame or shame any affiliation was listed as MIT. It was An identical notion is also applicable
one journal, editor, reviewer, univer- unexpected to see MIT authors sub- to some faculty (usually at the begin-
sity, student, professor, or author. In- mitting a paper of that caliber, so ning of their career), who wish to pub-
stead we will give an account of three we investigated further. We discov- lish more to quickly earn a promotion.
plagiarism stories to demonstrate ered they were not actually enrolled These are the driving factors for plagia-
how insidious the problem is. at MIT, or any other U.S. university. rism in terms of manipulating data, al-
Recently, we were the victims of Since we were curious to know what gorithms, or system settings.
plagiarism. We found clear evidence went behind this blunder, we did not 5. Trust versus truth. Journals build
of paraphrasing plagiarism in a pub- reject the paper outright, but instead up the trust of researchers through im-
lished paper. It was a random online asked for a major revision. The only pact factors, which are, occasionally,
search that caught our eye. A familiar question that the authors responded false due to citation plagiarism and self-
figure was identical to one published in to was regarding their affiliation, citation (the number of citations from a
a paper from a couple of years ago. Cu- they claimed they mistakenly wrote journal article to articles published in
riosity lead us to discover 90 percent of in the wrong affiliation. the same journal). Moreover, numerous
the content of that randomly searched After reading these stories, a natural papers are submitted to journals for re-
paper was paraphrased from not only question arises in our mind: Why is pla- view. Hence, it is hard to accomplish a
our paper, but others (available online) giarism detection getting harder? There uniform review process in any journal
too. We approached the editor-in-chief might be various possible reasons: with a good impact factor.
of the journal of the newly published
paper, who found the same issue, lead- 1 See Prof. Jeffrey D. Ullman’s May 2017 2 http://retractionwatch.com/2017/04/20/
ing to a retraction of the paper, after Google+ post; https://plus.google. new-record-major-publisher-retracting-
some efforts. com/u/0/110300059908499284579 100-studies-cancer-journal-fake-peer-reviews/
Acknowledgments
So what now? Is this the end of good conferences, like SIGMOD and AIIDE, We are thankful to Prof. Jeffrey D. Ullman for providing
worthwhile feedback on this article and the full details
papers or an end of the existing ethical believe in the double-blind rule to sup- of his experience with plagiarism. We would also like to
system for the research or review com- port a fair review system. acknowledge Andy J. Hunsucker and Adrian Scoică for
their valuable feedback.
munity? Is there any solution to prevent 3. Why not publish reviews and ac-
plagiarism? In order to answer these knowledge reviewers? This could be an Biographies
questions, we need to first answer the influential step toward an honest re- Nisha Panwar is currently a post-doctoral scholar at
following questions: view process. After accepting a paper, University of California, Irvine. She did her Ph.D. within the
Department of Computer Science, Ben-Gurion University
1. What must an editor do? To pre- the journal would publish the reviews of the Negev, Israel. She received her M.Tech. in computer
vent authorship plagiarism, the edi- with the paper. In addition, rewarding engineering from the National Institute of Technology,
Kurukshetra, India in 2011. Her research interests include
tor must first verify authors and re- the best reviewers of the year/quarter/ security and privacy issues in IoT such as smart homes,
viewers (as suggested by the authors). volume would also help in improving buildings, vehicular networks, computer network and
communication, and distributed algorithms.
The editor may also investigate the review skills. Springer’s Distributed
reviews to some extent, and avoid Computing announced the first best re- Shantanu Sharma received his Ph.D. in computer
science in 2016 from Ben-Gurion University, Israel,
citation plagiarism by reviewers or viewer award in 2012.
Image by Sielan / Shutterstock.com
UPDATES
W
ith the vast amount of ap-
plications of computer
science, and its plethora
of sub-disciplines, the
discussion of diversity and student
chapters is inevitable. When it comes
to diversification of chapter activities,
the ADA ACM student chapter of ADA
University in Azerbaijan is making ex-
cellent progress. Their activities span
various sub-disciplines and applica-
tions of computer science.
Established in April 2016, the ADA
ACM team currently has 64 members
with a keen passion for computer
science and information technology.
The chapter seeks to unite students
from all over Azerbaijan studying
computer science and related fields,
and offer them workshops, courses,
excursions, and contests coordinated Prof. Jennifer Widom of Stanford University (center) with participants of the Ada’s
by experienced professionals in their Legacy ACM Celebration of Women in Computing at ADA University.
respective sectors.
Over the summer, the group or- tendees were given a presentation on at a local level in Baku, the capital city
ganized an excursion to Azerbaijan’s Azerbaijan’s satellites, AzerSpace-1 of Azerbaijan, most of their events are
main satellite ground control station, and AzerSky, followed by a site orienta- open to the public.
Azercosmos, which is the only satel- tion session to the main antennas and “Although we are called the ADA
lite control station in the Caucasus the radio signal processing stations. University ACM Student Chapter,” ex-
region. Since the satellite control sys- Although the participants in this ses- plaied Shahnur Isgandarli, chapter
tems are computer-based, the excur- sion were university students, most of chair, “we are not limited to the stu-
sion was especially beneficial for the ADA ACM’s events are not restricted dents of our university.” In April of
computer systems engineers. The at- to the student community. Operating this year, they held a day devoted to
programming in Python, one of the
most popular high-level, interpreted
ADA ACM at a Glance programming languages. Aptly named
School: ADA University PyDay, it was a one-day seminar that
Photo ©2017 by Shahin Abasaliyev
Chapter Name: ADA University ACM Student Chapter covered basic and intermediate level
Location: Baku, Azerbaijan Python, along with its web applica-
Facebook: https://fb.com/ada.acm.chapter tions. It was conducted by Jahangir
Date Established: April 4, 2016 Shabiyev, a software developer from
Officers: Shahnur Isgandarli (chair); Ziyaddin Sadigov (vice-chair); Sevinj Jafarli (trea- Sumaks LLC. Python being a general-
surer); Farid Ahmadov (membership chair); Dr. Araz Yusubov (faculty sponsor) purpose programming language that
Current Total Membership: 64 has modules and libraries for almost
any sub-discipline of computer sci-
S
jan. The conference brought together the Azerbaijan ACM chapter, helped XRD
S. AC
M.O
RG
D
more than a 100 students, researchers, organize a Google Hash Code team. 0 16
VO
L .2
2•
NO
.3
G2
R
R IN
SP
ents
Having a surprising coincidence with organized by Google for students and tud
X
S
for
zine
aga
C MM
the University’s initials, the conference industry professionals across Europe, Cro
ssro
a ds T
he A
is actually named after Augusta Ada the Middle East, and Africa. Partici- AC M.O
RG
D S.
N O .1
2•
L .2
VO
an English mathematician who is now Google. Before this, in November 2016, zine
for
Stu
den
ts
aga
MM
renowned for her work with Charles the group had also organized an event
ssro
ads Th
e AC
Cro
S
for n
women leaders in IT, along with Dr. Wi- ing a diverse set of activities in com- est atio abric
anif bric
A M ital Fa F XRD
S. AC
M
D
with Han
d
Dig ting
.4
in sa 2•
NO
t Pr end
dom, shared their experiences with the puting for students, as well as the local S of
br icat
ion L
MM
ER
20
1 6 V
O L .2
R
Fa SU
X
zine
On the same day, they also held a be more student chapters in Azerbai- The
AC MM
aga
ads
presentation by Dr. Widom titled “Big jan in the nearest future,” says Isgan- Cro
ssro
S
Data: Promises and Pitfalls.” It was darli, who is looking forward to more XRD
S. AC
M.O
RG
D
an instructional odyssey in which she collaborations and advancing comput-
O .2
•N
L .2 2
VO
15
20
TER
XR
W IN
The
ads
roundtables in the areas of big data, Cro
ssro
The
begin
CAREERS
W
e are witnessing more
people outside of the
tech industry using
code to solve problems.
I have met teachers who automated
grade calculations using macros and
spreadsheets, office managers who
built their own conference room
booking web apps, and even a magi-
cian who learned PHP so he could
implement a text messaging API to
enhance his act.
These people may not consider
themselves developers, but they’re us-
ing our tools, much like we use tools
to solve non-technical problems. With
this comes more responsibility when
we build our tools, both in regards to
user experience and the communities
we build around those experiences.
Yet, the bar is very low these days
for ethical tech that keeps humans in
mind, and creating a space where us-
ers feel comfortable asking for help
is a small, but impactful, step that
many companies can and should im-
plement. My experience in working
with the Glitch community is that be- diversity statistics (or the lack there- sometimes seems like consequences
ing nice is good for business. We are of), the disparity in pay wages, the are not enforced in industry, even
working on an in-browser editor that constant controversy loops around when laws are being broken. The hu-
allows anyone to tinker with code sexual harassment in the workplace, bris that comes with this lack of ac-
to create the apps of their dreams, and the many companies and apps countability is, I believe, one of the
but more importantly we are ac- we see come and go as they fail to biggest issues facing the tech indus-
tively building a friendly community meet the needs of society. Many of try today.
around the product. This gives people us are creating software for humans, You are entering an industry with-
Image by Redpixel PL / Shutterstock.com
of many backgrounds the ability to but this ends up being software that out a defined set of ethics and a lack
collaborate, ask for help, and learn inhibits us, either financially or cre- of accountability compared to other
from each other. atively, because it is software that fields, so it will become your respon-
And still, it is easy to take for grant- only benefits a certain class. sibility to create and maintain your
ed the importance of humans in our It was not until I left academia and own accountability. This personal
work. The tech industry has become became a web developer when I no- ethic is how I’ve survived as a wom-
complacent about its ability to not ticed a lack of accountability in rec- an in tech, despite the intensity and
think sociologically when designing ognizing the importance of helping amount of work it takes.
software. We witness this in company society when building technology. It As you begin sending out your
MILESTONES
Technology and
Dating
resume and applying for tech posi- Since its inception, the culture of dating has undergone quite
tions, remember that only in the last a change. From personal ads in a British newspaper in the late
five years are we slowly starting to 1600s to online platforms for virtually every city, religion, race,
see companies being held account- and sexual orientation in 2017, the idea of dating has evolved
able for breaches of ethics. More me- vastly because of technical advancements over the years.
dia outlets are covering crimes like
sexual harassment in tech, and social
media has provided marginalized
tech employees a space to be heard.
1959 The first attempt toward developing a
matchmaking service was made by Jim Harvey
and Phil Fialer. As a part of a class project for the Happy
Good tech can solve problems, like Families Planning Services, 49 men and women were matched
my grade calculation and conference using a punch card questionnaire and an IBM 650 mainframe
room booking examples, but it can computer.
also just be a communication channel
where it is safer to voice concerns and
ideas. Where our voices are a little bit
louder and more likely to be heard by
1965 The first computer-based dating service,
Operation Match, was started in the U.S. by a
few undergrads from Harvard. The users were asked to fill out
those who can create change. a paper-based questionnaire, which was transferred to punch
My final advice to students graduat- cards and then processed on an IBM 7090. Thereafter, users
ing into the tech industry is to not for- received a printout listing details of their matches.
get who you are solving problems for.
We don’t learn alone, regardless of
what industry we are in, so the tools
we build should reflect that. Use your
2000 Neil Clark Warren and Greg Forgatch founded
eHarmony, which is an online dating website
designed for single men and women looking for long-term
privilege to vocalize your ethics and relationships. The platform has members from more than 150
push those around, and even above, countries. It exclusively runs a relationship research facility to
you to do the same. Harness the pow- optimize its matching process.
er of social media to not only lift your-
self up, but others around you as well.
You will probably find, like I have, that
the most rewarding part of working in
2009 Compatible Partners, an online dating service
that serves the gay community, was launched
by eHarmony Inc. in response to a settlement with the State
tech is knowing the work you do helps of New Jersey. The lawsuit claimed eHarmony was in violation
everyone, which is what software is of the law prohibiting discrimination based on sexual
supposed to be doing after all. orientation.
—Alok
— Pandey
DOI: 10.1145/3155132
Copyright held by author. DOI: 10.1145/3155216 Copyright held by author.
ACCOLADES
ElectroEuro
A virtual coin that can decarbonize.
I
n 2017, General Electric (GE)—one rael, promoted the challenge on the Haim Bender, like Ran and Idan,
of the largest American compa- Facebook page of FemTech, a com- came from Israel. He studied math
nies specializing in oil and gas, munity in Israel for women in technol- and computer science at Tel Aviv Uni-
healthcare, aviation and software ogy with more than 1,000 members. I versity. Isaack Rasmussen, the only
development—and Eurelectric—a col- was the founder and CEO of FemTech, non-Israeli on the team, is a software
lective representing the electric industry and when I saw the announcement I developer with more than a decade of
across Europe—partnered to create the immediately thought of Sheryl Sand- experience. He is originally from Africa
Ecomagination Challenge Hackathon. berg’s words: “What would you do if and now resides in Denmark.
The challenge was to build digital solu- you were not afraid.” I decided to par- I was privileged to have been men-
tions to help decarbonize energy and ticpate. This would be my first competi- tored by another master’s student at Bar
transportation in Europe. The two-day tive hackathon. Ilan, Micah Shlain, who taught me the
hackathon was held in Berlin, Germany The formation of our team was a bit principles of software development. It
this past June, where more than 100 par- unorthodox. Before I formally selected was through this process that I was able
ticipants from around the world came the other members of the team, Ran to guide the team from idea to design to
together to solve two challenges: electri- Koretzki, a graduate student at the implementation.
fication and advanced manufacturing. Technion in Computer Science in Isra-
For the electrification challenge, the el, asked to join. We were the original A WINNING COMBINATION
goal was to develop solutions where core of the team, a true Cornell-Tech- We designed a decentralized virtual
things are powered by electricity. For nion alliance. Ran, whose technical ex- currency known as the “ElectroEuro”
example, solutions such as: renewable perience includes summer internships for trading energies through an en-
energy resource siting, electric heating with both Google and Facebook, served ergy bank in Europe, driving a low car-
and conversion to heat pumps analy- as the team’s CTO and developed most bon economy. The use of green energy
sis, electric vehicle charger siting, and of the solution’s technical architecture. would promote decarbonization, and
renewable energy integration. For the My role was the CEO of our team. monetization would make it accessible
advanced manufacturing challenge, I then added Idan Nesher, a user ex- and practical. The concept was to unite
the goal was to optimize existing manu- perience (UX) designer, to the team, Europe through electricity like the euro.
facturing processes. Sample solutions knowing the key to winning would be Our proposed currency is similar to Bit-
include: forecasting manufacturing de- a compelling presentation. As much as Coin in that it is universal and there is
lays based on parts complexity, detect- architecting an energy bank and virtual a finite quantity of it. The transaction
ing delay drifts, and optimizing critical currency system would win the hearts of of energy is carried out through it, and
production rescheduling. Both chal- the judges, the presentation would need it can be bought through goods that do
lenges sought solutions that drive the to be at the same professional level. not promote carbonization. The energy
decarbonization of Europe. The official Idan studied product design at the Avni bank consists of eight sources of energy
platform for both challenges was Predix, Institute in Tel Aviv, and subsequently ranked by the green-factor and stabil-
GE’s industrial Internet of Things (IoT) moved to Berlin and worked as a free- ity, respectively. The price of the energy
platform. It is described as a “software lance designer. He dove fast into the UX is based on two metrics: 1) the distance
platform for the collection and analysis design world, believing UX will be the to transport the energy (a fixed price),
of data from industrial machines.” future of all products since it is centered and 2) the quantity. A market is gener-
Our team competed in electrifica- on innovation. ated based on the surplus of energy per
tion, which was considered to be the Since seeing is believing, I added country and per energy source.
greater of the two challenges. two other developers to the team who Machine learning is used to pre-
would be able to do front-end devel- dict consumption, production, and
GETTING IN FORMATION opment in order to have a live demo cost, through a set of sensors that de-
Ira Blekhman, from GE Digital in Is- ready to show at the hackathon. tect features for each type of energy.
place because of the virtual currency, figuration is less politically driven and Shortly after graduating from Cornell ECE in 2006,
Talia Kohen went to work for Raytheon with a position
and it leads to the creation of a free more idealistic. Lastly, countries are focused on tracking and discrimination. She is currently
market. Big data optimality is materi- more autonomous than under OPEC. completing a master’s degree in computer science on
the evolution of words in the Google Books Corpus. She
alized through a large sensor network, OPEC regulates countries very strictly. has implemented three algorithms, two known, and
one she designed and later found in a textbook, and
which generates ample data for analy- It penalizes countries that under- with those has been able to analyze one billion lines
sis. Lastly, efficiency is achieved thanks produce by limiting their negotiation of text in two-and-a-half hours. Kohen independently
discovered Euler’s F-Vector by visualization. She has
to the collected big data that allows for power, and fines countries that overpro- received numerous awards and honors including: Anita
replacing or moving resources through- duce. Every country is individually in- Borg Birthday Celebration Director in Israel; a Google
OutStander; Google Anita Borg Scholarship for Women
out a network. clined to cheat by discounting its prices in Europe and the Middle East Finalist; Google Campus
Additionally, ElectroEuro offers po- and exceeding quotas. Ambassador; Microsoft Israel Women of Excellence
Program; Microsoft Excellence Summer Camp; ACM XRDS
litical and economic benefits: It makes We presented our pitch on a boat feature issue editor for the IoT Edition; IEEE International
green energy cheap, generates a free docked on the Westhafen Canal to a Radar Conference Poster Session Co-Chair and Steering
Committee; Raytheon Individual Performer Achievement
market, promotes production driven panel of judges. Several hours later, Award - Ionospheric study Raytheon Spot Award;
by revenue, and promotes autonomy near the conference venue for Minds + Raytheon Women’s Network MDC Site Representative; and
was a Delegate to Grace Hopper Conference for Women
for individual countries. Green energy Machines Europe, we found out we won In Computing. She is the CEO of FemTech, a community
is more affordable, because there is a first place in electrification, which was for women in STEM in Israel. Upon completion of her
master’s degree, Koehn plans to earn a Ph.D. in artificial
concerted effort to make it easier for 10,000 euros for the team! Everyone was intelligence.
both the producer and the consumer. surprised and delighted. We also won
For the consumer this means: lower- 3,000 euros for second place in the cat- DOI:10.1145/3157679
ing the price of green energy, creating egory of Predix development. © 2017 ACM 1528-4972/17/12 $15.00
The XRDS blog highlights a range of topics from conference coverage, to security
and privacy, to CS theory. Selected blog posts, edited for print, are featured in
every issue. Please visit xrds.acm.org/blog to read each post in its entirety. If you
are interested in joining as a student blogger, please contact us.
BLOGS
100,000 Between 1933 and 1945, authorities in Nazi Germany arrested an estimated
100,000 men for homosexuality, of which 50,000 were sentenced and
as many as 15,000 were sent to extermination camps. Even after this ordeal,
they were still considered criminals by the liberating Allied forces.
BLOGS
built differ, but not fundamentally. slice controller for this basic round robin scheduler.
The completed circuit, which was interfaced with the The Mojo IDE comes with code for simulating a CPU.
FPGA, has a variable clock rate by way of the potentiometer. There are some assembly-like instructions, which are
Each clock tick can both be seen with an LED, and heard provided, but any assembly-like instructions can be
from a simple speaker, and depressing a button makes the defined for a given application. Paired with a round robin
circuit live. Tapping voltage from the same spot as an LED scheduler and external clock, this is a test environment for
is how you extract the clock signal from this circuit. All haptic two-job logical concurrency.
that is required is an extra wire rooted at that spot with the There are additional files needed, which are also in the
other lead placed into one of the FPGA pinholes. XRDS github repository: modified_cpu.luc, modified_
instRom.luc, modifiedcpu_mojo_top.luc, and sliceclock.ucf.
A PROOF OF CONCEPT For this project, the majority of instRom.luc and
The Mojo v3 was the development board used for this cpu.luc were left intact. In modified_cpu.luc and modified_
project. The following is a disclaimer. These devices can be instRom.luc, the major changes were to allow a CPU to
expensive, and having the ability to download the neces- emulate logically concurrent behavior; it can be active or
sary software to develop on these devices is not straightfor- inactive and raises a “complete” flag. All the scheduling
ward. For the Mojo v3, there is no open source development was added to modifiedcpu_mojo_top.luc. Two CPUs are
alternative, and obtaining licensure with Xilinx to be able created and then managed with respect to an external
to build projects with Embedded Micro’s IDE will be an signal from PIN1. The constraints file sliceclock.ucf is
obstacle for some due to legal reasons. When deciding on nearly identical to pinIn.ucf.
a development board, it is recommended to follow through Once loaded, the FPGA will illuminate the first LED if
on all steps to be able to develop for the chip, up until actu- job1 completes first, or it will illuminate the second LED
ally loading a ROM onto the FPGA, before you buy. if job2 completes first. But when both jobs are complete,
The Mojo v3 contains the Spartan-6 FPGA chip. The all eight LED’s will illuminate. If no external circuit is
hardware definition language (HDL) Lucid was used in the interfaced, the first LED will light and nothing else will
embedded micro Mojo IDE version B1.3.6. Programming happen because job2 can never be active. When PIN1 has
at this level involves using signals, whose state does not voltage, job2 executes, and if PIN1 doesn’t have voltage,
persist between clock cycles, and flip-flop gates, whose job1 executes. If a circuit is interfaced, then all eight LED’s
state does persist between clock cycles. Both are accessed will illuminate instantly. This is because the instRom
as bit values or arrays of bit values. programs are short compared to the speed of the FPGA. A
The applicable files for this tutorial are modified_ further step would be to run more substantial programs
blinker.luc, modifiedblinker_mojo_top.luc, and pinIn.ucf, with this test environment.
which are located in the XRDS github repository at:
https://github.com/acmxrds/winter-2017/tree/master/blog. WRAPPING UP
Once loaded into the FPGA, the built-in LED’s will now When engineering or doing computer science at the hard-
blink in unison with the clock signal from the astable ware level, there is an option to gain intuition about your
multivibrator. The main changes were to the blinker.luc system haptically, and there is an option to develop con-
and pinIn.ucf files. In pinIn.ucf, the FPGA is instructed trols for your system externally. To do so requires develop-
to access PIN1 on the development board. In modified_ ing an interdisciplinary knowledge of electronics. All code
blinker.luc, the FPGA is instructed to treat PIN1 as an input presented is available in the XRDS github. Happy hacking!
signal. That input signal controls a case statement with two To replicate what was done here (and specifically for
cases, one for voltage and one for no voltage. In this setup, the Mojo v3), all that is required is opening a new project
each case sets the built-in LED’s to on or off. (“From Example,” “Blinker Demo,” or “Basic CPU”) and
making the modifications.
APPLICATION
What we now have is an external variable-interval clock and Biography
software that supports alternatively executing two sets of Alexander DeForge is a student at the University of Maryland University College, studying
computer science. He is primarily interested in systems, including operating systems,
code—the two cases. User-controlled logical concurrency computer networking, and other low level applications.
can be emulated in this FPGA for exactly two jobs. The ex-
ternal variable-interval clock can be used as a haptic time DOI: 10.1145/3155224 Copyright held by author.
In January 2018, the Journal of Human-Robot Interaction (JHRI) will become an ACM
publication and be rebranded as the ACM Transactions on Human-Robot Interaction (THRI).
To submit, go to https://mc.manuscriptcentral.com/thri
feature
Can We Build
the Cyborg Future
We All Deserve?
Knowing who we represent in HCI helps us understand
what is at stake. Intersectionality can help us do better.
By Ari Schlesinger
DOI: 10.1145/3155116
W
e are all cyborgs. No, not the “Terminator” Arnold Schwarzenegger kind;
we are a different type of cyborg. We are living in a world where the technology
we create is shaping who we are. When you think about it, the boundaries
between you and your technologies are fuzzy at best.
Most of us rely heavily on our tech to get through the day. Smartphones wake us up in the
morning with ringtones labeled oxygen, drip, and krypton. They let us swoon over perfectly
plated food pictures posted by someone we will never meet, halfway around the world. They
connect us to our friends through video chat, even if we’re in the same room. We see the
whole world through the high-megapixel lens of our smartphone. Whether your day is
shaped by a potential tweet, an Insta- tech is designed by and whom our experiences, user needs, user errors,
gram post, a Facebook message, or a tech is designed for. user practices, and user preferences.
Snap, you’re experiencing life as a cyborg. This means we need to talk about But who is this illusive user? Is it you,
The cyborg future is a networked human-computer interaction, or HCI for me, Laverne Cox, Katya Zamolod-
existence where you and your tech- short. HCI is a field dedicated to interfac- chikova, your weird relative, a tech
nolog y shape the world. Letting go es between people—often referred to bro, the Terminator?
of physical boundaries, where do as “users”—and computing technolo- When we’re talking about the user
you end and where does your smart- gies. This is a pretty broad field. HCI we’re talking about complex people
phone begin? The closing distance experts and practitioners have back- with differences from one another. I’m
between you and your phone is only grounds in design, computer science, willing to go out on a limb and say you
the tip of a giant, cyborg iceberg psychology, media studies, and more. and I have at least as many differences
(iceborg?). Think about it, if tech Likewise, HCI research covers a mas- as we have similarities. Some of these
is literally shaping who we are and sive variety of research styles, topics, differences relate to socially-situated
what the world is, it is an incredibly technologies, and users. Research cov- identity factors, like race, gender, sexu-
powerful tool that is being used to ers topics like user experiences with dif- ality, and class. Other differences arise
build our future. ferent application interfaces, anonymity from things we do, love, care about,
If we’re all cyborgs, living in a on social media sites, people’s password- work on, and know. All these differenc-
networked world co-constructed by sharing practices [1], and interactions es are instructive. They make the world
our tech, we need technology that is with artificially intelligent chatbots [2]. interesting. Can you imagine how bor-
designed by and for a wide variety of HCI is infatuated with the user. ing the world would be if everyone and
people. We need to know whom our We are constantly talking about user everything were exactly the same?
Chicanx (including its lexical variants time of this research, there were nearly terms are talked about over time. His-
across the gender spectrum: Chicano, 14,000 ACM SIGCHI publications. This torically, the presence of these key-
Chicana, Chicanx, etc.). With these means that CHI papers focused on words is heavily skewed toward the
words, we were able to find previous these identity keywords represent only recent past; most of the publications
research in the ACM Digital Library 1 percent of ACM SIGCHI publications, are from the 2000s, with two during
(ACM DL) that would help us under- Although the 14,000 includes more the 1980s (1.43 percent), two during
stand who we’ve been designing for. than just CHI papers, the numbers are the 1990s (1.43 percent), 33 during the
At this point, you might be wonder- only slightly better if you include all the 2000s (23.57 percent), and 103 dur-
ing, what did the research find? Well, publications our searches gathered; ing 2010–2016 (73.57 percent). Even if
after querying the ACM DL, we ended there were a total of 309 hits, or 2.21 there isn’t as much research that is ex-
plicit about who the user is, there is a 1964, the year of the Civil Rights Act. argued if we want to build a better fu-
lot more now than there was even only Now, dismissing all black women em- ture for everyone, we must focus our
10 years ago. ployed at one company within a single attention on those who are marginal-
Although this is only a small per- year would appear to be discriminatory ized in intersectional ways. If we can
centage of CHI publications, by inves- right off the bat, but the court didn’t address the needs and struggles of the
tigating what is included in them and see it that way. Here’s what happened, individuals, we will have made strides
what is missing, we can learn how the women are a protected group under forward for everyone. This is absolutely
user is described and figure out how to employment law and black people are true when working toward building the
do better for building the cyborg future a protected group under employment cyborg future we all deserve.
we deserve. On further analysis of the law; however, these laws made no stip- Building a better future for HCI re-
final 140 publications, we found that ulation for people who are both black quires us to do more when it comes to
the focus on the umbrella categories— and women at the same time. As a re- the identity of the user. By centering
gender, race, and class—was not evenly sult, the court explained that because people with intersectional, margin-
distributed. Additionally, prior research GM still had (white) women employees, alized identities, we can break away
looked at some identities more than it wasn’t violating anti-discrimination from discriminatory practices that
others. Though there is some overlap, statues protecting women. The court render large portions of the popula-
the numbers reveal that 70 percent of also dismissed their claims for race tion invisible.
publications focused on gender, 12.12 discrimination, suggesting the wom- Intersectionality is an essential
percent on race, and 30 percent on class. en join a different lawsuit against GM framework for any work that interfaces
The focus on identity was unbalanced. based on race discrimination. But, with human identity. For this research,
It’s disheartening that certain iden- the plaintiffs, the black women suing, it’s important to ask how the publica-
tity attributes were the focus of so few countered that their case was specifi- tions we collected stack up. How many
publications; however, it is also encour- cally a problem of gender and race- focus on more than one identity cat-
aging that these percentages don’t add based discrimination, which would be egory within a single publication? In
up to 100 percent. Identity is not an ex- misrepresented in joining a race-based total, 24 papers focused on more than
clusive category. When thinking about case. Nevertheless, the court doubled- one umbrella identity category. While
users, HCI can and should also con- down and completely dismissed the encouraging, at the end of the day, most
sider gender, race, and class at the same case. The court concluded the govern- of the corpus didn’t fare this well. In
time. This is critical because identity is ment was not intending for a special order to build better technology, better
complicated; people do not experience category of black women to be pro- human-cyborg computer interactions,
just one identity attribute at a time. Put tected under the law since there was we all need to think about how intersec-
another way, your race, gender, and no employment law addressing these tional identities affect our work.
class co-exist at all times and these in- intersections of identity. The experi- Another identity-related shortcom-
tersections impact your experiences of ence of black women, who experience ing we uncovered was how papers about
the world. A person is not black on Mon- racism and sexism in combination, was gender often collapsed identity differ-
days and a woman on Fridays, nor are erased. ences in ways that make the experienc-
they white on Mondays and a man on There are clear, concrete, discrimi- es of some users invisible. It is great that
Fridays. This brings us to an important natory consequences when we fail to research considered gender, but gen-
topic, intersectionality. consider identity overlaps. Crenshaw der was often a shorthand for women,
Intersectionality is a flexible frame- which is only one of many gender iden-
work for analyzing identity attributes tities. Further, with intersectionality as
like gender, race, and class. It allows us a guiding framework, it becomes clear
to investigate how identity attributes that women as a category cannot ad-
impact one another, a person’s sur- equately address the experience of the
roundings, and larger social systems.
The term intersectionality was
When we understand many differences that exist within this
identity-construct. HCI should thus
coined in 1989 by legal scholar Kimber- how identity-based consider the wide spectrum of gender
lé Crenshaw [4]. But so far, this descrip-
tion is pretty abstract. What does it
discrimination identities that exist, not just narrow rep-
resentations of women.
mean in a more concrete way? In Cren- is designed into Taking intersectionality seriously
shaw’s article, she wrote about a 1976
lawsuit against the company General
our technologies, gives us an opportunity to improve
development at the intersection of hu-
Motors (GM), DeGraffenreid v. General we are able mans and computing. To build the
Motors, where five black women sued
GM for discriminatory practices. GM
to address cyborg future we need, we need to be
clearer about the identities of the user.
fired all its black women employees our shortcomings This includes working with people
hired after 1970 in a seniority-based lay-
off scheme; it’s important to note they
and develop whose identities have not been given
enough space in HCI. Our research
didn’t even hire black women before new paths. uncovered multiple identity areas that
the nearly 14,000 publications we are ing binary, cisgender categories (cis- [1] Singh, S., Cabraal, A., Demosthenous, C.,
Astbrink, G., and Furlong, M. Password Sharing:
pulling from, and HCI’s foundational gender meaning people whose gen- Implications for Security Design Based on Social
reliance on the user, it is truly remark- der identity is aligned with the gender Practice. In Proceedings of the SIGCHI Conference
on Human Factors in Computing Systems,
able that so few publications feature identity they were assigned at birth). ACM, New York, 2007, 895–904. http://doi.
keywords from common demographic Only a few papers mentioned trans org/10.1145/1240624.1240759
identity categories. If not with these identities. These publications were [2] Luger, E. and Sellen, A. Like Having a Really Bad PA:
The Gulf between User Expectation and Experience
common terms, how is the identity of focused exclusively on trans commu- of Conversational Agents. In Proceedings of the 2016
CHI Conference on Human Factors in Computing
the user represented? nities [5]. In other papers, however, Systems (CHI ‘16). ACM, New York, 2016, 5286-5297.
While there is a lot more work to do a side effect of this simplified repre- DOI: https://doi.org/10.1145/2858036.2858288
in building a cyborg future that priori- sentation of gender is the erasure of [3] Schlesinger, A., Edwards, W. K., and Grinter, R.
E. Intersectional HCI: Engaging Identity through
tizes the identity diversity of users, it trans identities. This erasure contrib- Gender, Race, and Class. In Proceedings of the 2017
is clear HCI is striving toward this fu- utes to widespread discrimination CHI Conference on Human Factors in Computing
Systems (CHI ‘17). ACM, New York, 2017, 5412-5427.
ture. Each year, more work is centered against transgender and gender non- DOI: https://doi.org/10.1145/3025453.3025766
on computing technology created by conforming folk, which puts their [4] Crenshaw, K. Demarginalizing the Intersection
and with people from many different, lives and wellbeing at continued risk. of Race and Sex: A black feminist critique of
antidiscrimination doctrine, feminist theory and
intersectional identity backgrounds. Intersectional HCI can help us do bet- antiracist Politics. University of Chicago Legal
While only a beginning, the 24 papers ter in building the human-computer Forum, 1989, 139–167.
with an intersectional focus covered in interactions we all deserve. [5] Haimson, O. L., Brubaker, J. R., Dombrowski, L., and
Hayes, G. R. Digital footprints and changing networks
our research are a good start. Many of The words we use to talk about during online identity transitions. In Proceedings
these publications were in-depth, quali- our users matter. Words are the main of the 2016 CHI Conference on Human Factors in
Computing Systems, ACM, New York, 2016, 2895–
tative studies into a particular intersec- medium we use to communicate our 2907. http://doi.org/10.1145/2858036.2858136
tional identity, like young black men or work. The words we choose can con- [6] Haraway, D. A Cyborg Manifesto: Science,
technology, and socialist-feminism in the late
homeless mothers. However, there were tinue to support structural, identity- twentieth century. In Simians, Cyborgs, and Women:
also a few papers that investigated mul- based discrimination, or they can The Reinvention of Nature. Routledge, New York,
1991, 149–181.
tiple identity categories quantitatively, draw attention to the intricacies, expe-
though in these publications identity riences, and needs of users as complex
Biography
categories were still investigated sepa- human-cyborgs.
Ari Schlesinger is a full-time cyborg and a Ph.D. student in
rately and then explained sequential- When it comes to the cyborg fu- human-centered computing at Georgia Tech. Schlesinger’s
ly—data on gendered presented first, ture we all deserve, we are clearly on research is focused on identity and infrastructure, looking
into how we can develop technology that builds just values
then data on race, then data on class. the right path. The CHI community is into multiple layers of a computational artifact. Find out
With this research at the roots, we can more at www.AriSchlesinger.com
thinking more about the user’s identity
continue to build and strengthen how than ever before. And, researchers are
identity is handled in HCI. increasingly communicating that iden-
© 2017 Copyright held by owners/authors.
There is more to intersectional HCI tity is something we need to address if Publication rights licensed to
than considering identity intersec- we are going to understand and design ACM 1528-4972/17/12 $15.00
Digital and
Physical Barriers
to Changing
Identities
Social media sites often erect barriers to changing identities online,
which can be similar to physical world barriers faced by marginalized
groups. How can social media be designed to enable rather than
constrain life changes?
By Oliver L. Haimson
DOI: 10.1145/3155118
P
eople with changing and marginalized identities often have a difficult time moving
around in the world. While my focus here is on transgender people, a marginalized
group that has been especially visible recently, many of these ideas can be
generalized to other marginalized populations. Transgender (or trans) is a term to
describe “people who move away from the gender they were assigned at birth, people who
cross over (trans-) the boundaries constructed by their culture to define and contain that
gender” [1]). As an everyday and tangible example of the sorts of physical barriers trans
people face, several states in the U.S. recently passed or considered legislation requiring
people to use public restrooms that correspond to the gender listed on their birth certificate.
Of course, public spaces do not literally and remove trans people from public you were allowed to use was at your
have “bathroom police” designating restrooms. home. This would mean you could not
who can and cannot enter; and even if Setting up legal and social barriers be on campus for longer than an hour
they did, such gatekeepers would find it against using public restrooms does not or two; you could not go to a museum
difficult to accurately determine some- sort people into categories in a simple, or a concert; you could not get a job.
one’s birth sex. However, such laws biological way. Instead, it creates a world The recent biographical film “Hidden
promote dangerous behaviors, giving where trans people cannot exist in pub- Figures,” set in the 1960s, includes sev-
legal justification for people to harass lic spaces. Imagine if the only bathroom eral scenes where the main character,
most cases, is neither nearby nor con- like Tumblr and Reddit—where you options, it is often the case that a
venient. Restroom discrimination is a can be anonymous, pseudonymous, survey asks a person to choose either
clear example of a physical barrier that or private by obscurity; that is, it is male or female, without any other op-
makes it difficult for a marginalized unlikely one’s parents would know tions. Maybe it’s a market research
group to exist in the physical world. Tumblr exists, think to search for survey for a car insurance company,
you, and be able to find your Tumblr in which case people for whom those
FROM PHYSICAL WORLD account. Online spaces are impor- categories don’t fit likely accept it as
TO DIGITAL WORLD tant means for people to find support a microaggression and move on. Yet
The online world is often posited as and information, ask questions and in other cases, limited gender op-
an antidote to such barriers. For ex- get answers, and see what it is like to tions feel harmful for some because
it signals that other people do not first name remains an outlier condi-
COMMUNICATIONSAPPS acknowledge their identity in the way
they prefer.
Inadequate gender options on
tion with no technological solution in
place. Financial identity management
is a case in which technology that fails
forms may seem like a small inconve- to handle identity change can have
nience, but considering the frequency devastating real-world consequences.
with which one is expected to fill out
demographic questionnaires, it can CHANGING IDENTITIES
be a substantial source of stress, par- ON SOCIAL MEDIA
ticularly in professional or healthcare Social media sites similarly often have
contexts. The examples I describe in- difficulty managing identity changes,
volve surveys that do not give enough in ways that affect people socially
options. However in other cases, sur- rather than financially. In contrast
veys or forms ask for too much infor- to the identity exploration and infor-
mation and require uncomfortable mation seeking that happens on sites
levels of disclosure, even when gender like Tumblr and Reddit for people
information is irrelevant to the con- exploring marginalized identities,
text. For an excellent article exam- Facebook stands in contrast. It is a
ining the nuances and complexities site inhabited by people’s “real life”
Access the of trans-inclusive survey design, see connections, where they are required
Bauer et al. [3]. to use their physical world name and
latest issue, As another barrier to technological identity,and where multiple accounts
inclusion for trans people and others are prohibited. This can cause sub-
past issues, embarking on life transitions, many stantial difficulty for people during
technological systems are not set up identity changes.
BLOG@CACM, to handle identity change well. Lars The difficulty of identity changes is
MacKenzie’s recent article uncovered compounded by the network of people
News, and the ways credit agencies’ data systems who remain on one’s Facebook net-
more. (mis)handle the financial records of
people changing gender [4]. Such sys-
work over time, even after those people
are no longer meaningful in one’s life.
tems, which use technology to impose The algorithmically curated news feed
financial decisions with real conse- seems to slowly fade people away over
quences (such as being denied hous- time if one does not interact with them
ing, loans, and credit), have difficulty frequently, but these old friends and
handling a person who used to have acquaintances remain on one’s friends
one name and now has another. In list. When disclosing life events and
many cases, these systems and com- changes, one’s status update may pop
Available for iPad, panies “out” people as trans to poten- up in old friends’ feeds if certain words
iPhone, and Android tial employers and landlords, make are used (“I’m excited to announce…”)
people’s credit histories inaccessible or if enough people respond saying
to them, and even flag people as fraud- “Congratulations!” [5].
ulent when they attempt to access Disclosing a new identity, par-
their own finances. Such systems have ticularly one that is stigmatized and
clearly adapted to adequately handle places one in a marginalized group,
someone who changes their surname can be especially difficult given the
after marriage; yet changing one’s wide range of connections from the
past who remain on one’s friends list:
Available for iOS, people from high school, former co-
Android, and Windows workers, and people whom one bare-
ly even remembers. Going through
http://cacm.acm.org/
about-communications/
As people move one’s friends list and unfriending
based on anticipated reactions to,
mobile-apps from one life for instance, a gender transition, is
stage to another, a common practice but emotionally
exhausting. Many people appreciate
technological the ability to make mass disclosures,
systems must and disclose a life event to everyone
at once rather than through a series
move with them. of one-on-one conversations. How-
cord of supporting lesbian, gay, bisex- ly think of whom they want to com- [1] Stryker, S. Transgender History. Seal Press, 2009.
ual, transgender, and queer (LGBTQ) municate with. As people fade out of [2] Turkle, S. Life on the Screen. Simon and Schuster, 1995.
rights. Yet intention is not enough; one’s life, they are no longer thought [3] Bauer, G. R., Braimoh, J., Scheim, A. I., and Dharma, C.
Transgender-inclusive measures of sex/gender for
technology must be built to support of and thus not included in one’s au- population surveys: Mixed-methods evaluation and
recommendations. PLOS ONE 12, 5 (2017).
changing identities, and identities in dience for personal snaps. Yet Snap-
[4] Mackenzie, L. Z. The afterlife of data identity,
which the present and the past may chat also allows people to share con- surveillance, and capitalism in trans credit
be in conflict. This is not easy. tent using “Stories,” a way to share reporting. TSQ: Transgender Studies Quarterly 4, 1
(2017), 45–60.
content with people in one’s broader
[5] Tufekci, Z. Why Twitter should not algorithmically
RETHINKING BARRIERS network. Snapchat is one successful curate the timeline. The Message. Sept. 4, 2014;
AND BOUNDARIES example of a social medium that en- https://medium.com/message/the-algorithm-
giveth-but-it-also-taketh-b7efad92bc1f
Everyone faces transitions throughout ables different levels of sharing with-
[6] Haimson, O. L., and Hoffmann, A. L. Constructing and
their lives, from teenager to adult, sin- out mandating that one’s network enforcing “authentic” identity online: Facebook, real
gle to married, college student to pro- stick around over time. names, and non-normative identities. First Monday
21, 6 (2016).
fessional, or employed to retired. Many Design decisions that enable and
may also experience other intersect- sometimes encourage content to be
ing exciting, tragic, or confusing life shared with fewer people do not align Biography
events and identity changes. As people with many social media sites’ goals, Oliver L. Haimson is a Ph.D. candidate in the Informatics
cross through boundaries between life which tend to involve users sharing Department at University of California, Irvine’s Bren School
of Information and Computer Sciences. He conducts social
stages, technological systems must more content with more people. Us- computing research focused on how people present and
move barriers out of the way. Barriers ers have diverse goals when using disclose changing identities on social media during life
transitions. Through his research, he hopes to impact
include things like one-account-per- social media: Many of them wish to technological inclusion of marginalized users.
person rules, or difficulty dealing with share more content with more people,
past content (for example, having to while others prefer to share content
un-tag every old photo manually). It with limited audiences. Often the
may be one profile cannot represent same person has each of these goals
© 2017 Copyright held by owners/authors.
a person throughout their lifespan; in different contexts and with differ- Publication rights licensed to ACM
the one-profile-per-person model that ent content. It is not easy to design 1528-4972/17/12 $15.00
Disability-Disclosure
Preferences and
Practices in Online
Dating Communities
Based on a cooperative research project, this article explores the experience of
dating online with a disability, contextualized with an overview of the historical
connection between disability and asexuality. It concludes with ideas for
decoupling this inaccurate association through online dating platforms.
By Cynthia L. Bennett
DOI: 10.1145/3155120
M
y first attempt at online dating started with me swiping through photos on my
phone in search of the best ones. I decided on an array from my travels; they
would make me look like I’ve had a variety of life experiences, right? Next was
the text profile. I had heard few matches bothered reading this part, but I had to
write something. The alternative, leaving the profile empty, might have been disastrous
for my mental health. “I’m blind,” I began. I had read numerous articles online and talked
to friends with disabilities about the mean comments and ignorant questions matches
often asked about their disabilities, leading me to believe leaving the profile blank when
my photos show my disability would result in similar treatment.
Back to composing my text pro- social science literature. I was trying disabled woman’s experience telling
file, I wrote seemingly hundreds of to self-present, or show a version of her Tinder matches about her disabil-
sentences, all beginning with that my most attractive self—a person who ity, and the horrifying ableist messages
phrase. I settled on, “I’m blind. I’m has visited six different countries. But (i.e., disability-based discrimination
happy to answer questions, but I am I was also negotiating how to self-dis- or prejudice) she received from her
not your inspiration, charity, or edu- close, or share a truth. I know from matches [1]. Typical messages includ-
cation and it will not be our only topic countless personal experiences of ed inappropriate questions about her
of conversation.” A bit harsh, but I ignorance or ill treatment, that blind- intimate relationships and criticisms
couldn’t chance getting any messages ness would be very new to or problem- such as she should only date other peo-
like the ones my friends received. atic for some potential dates. ple who use wheelchairs. After reading
Looking back, I was negotiating In early 2016, I posted an article to the stories themselves, my colleagues
some concepts well documented in my online social network about one and paper [2] co-authors John, Kiley,
including how they choose to self- visually apparent in-person, while ple identifying as having a disability,
present and self-disclose and how invisible disabilities are not. We used impairment, mental health condi-
online daters, both disabled and non- these terms to understand peoples’ tion, or as being deaf. The second
disabled, prefer to learn about their expectations for disability-related group consisted of people who did
potential partners’ disabilities. disclosure while online dating, where not identify with any of those catego-
the intent is to eventually meet in- ries—we referred to them as “nondis-
OUR STUDY person. The second concept is called abled” in line with other disability
Throughout this project, we have “dys-appearance” [4], and it explains studies scholars. While we use the
consulted the field of disability stud- how we move in and out of noticing term “disability” in this article to re-
fer to anyone who did identify within Our second strongest theme was choose what matches to answer rath-
those categories, we opened our re- using disclosure as a method for fil- er than disclosing to everyone who
cruitment description to make sure tering out ableist matches. In this views their profile.
labels did not interfere with us learn- way, our disabled participants typi-
ing about people’s experiences. In cally considered disclosure helpful POSITIONING DISABILITY
fact, we used this approach for most both for the recipient of such informa- POSITIVELY
of our demographic questions, such tion, as well as for themselves, helping Our paper also invited more research
as disability description, gender, them to avoid matches who would not at the intersection of disability and
race, and sexual orientation. By be accepting of their disability. For online dating. Looking back at our
adopting the approach of leaving de- example, a 24-year-old woman with a findings, another theme emerges:
mographic information open to allow chronic illness shared her reason for Positive encounters by our disabled
participants to describe themselves disclosing: “I’d much rather be open participants meant disability was
freely, we were able to learn richer de- about my health and have them freak not mentioned or that it was treated
tails about our participants’ identi- out online, than have used up some of neutrally. For example, one 36-year-
ties too. (We recommend other re- the little energy I do have going to meet old female heterosexual with physi-
searchers take a similar flexible someone who I’m not even sure would cal disabilities described her most
approach to help their participants concider [sic] a relationship with me positive encounter online dating: “He
feel better represented.) because of my circumstances.” We asked me about my life and interests
We asked our participants with called this “strategic dys-appearance” instead of my disability.” A 39-year-
disabilities to share their most re- since it is intentional dys-appearance old blind gay male described his
cent, most positive, and most nega- for our disabled participants’ benefit. most positive experience as, “Meet-
tive experiences with online dating Though they found a way to view dis- ing someone that didn’t have issue
and to explain how they disclose their closure positively, it still meant they with my blindness at all.” These ex-
disability to potential dates. Both dis- might not be disclosing disability in periences suggest disability might
abled and nondisabled participants the way they preferred. be more complex than a negative
were asked to share their experiences With these findings, we offered trait best handled by strategically
encountering people with disabilities some design suggestions to improve dys-appearing it through self-dis-
while online dating and to write how disclosure experiences for online dat- closure. But they also suggest posi-
they preferred a disabled match dis- ers with disabilities. Allowing people tive experiences were characterized
close their disability. to filter based on matches’ answers by neutral, not necessarily positive,
Findings and design suggestions. to questions around disability, for treatment of a disability. This invites
Two strong themes emerged about example, may allow disabled online further questions. Was it unimport-
disability-related disclosure. First, daters to filter out potential ableist ant because the disabled partner dis-
most participants, irrespective of matches without explicitly disclosing closed in the way the match preferred?
disability status, felt they should a disability in their profile. Second, Another finding worth further un-
know about a disability right away in line with previous research on us- packing is our disabled online daters
when online dating rather than dis- ing ambiguity in design to encour- found disclosure of physical disabili-
covering it when meeting in person. age open discussion on potentially ties helpful for a practical purpose—
A 27-year-old heterosexual female difficult subjects, like HIV status [5], for planning accommodations. This
shared, “I would prefer physical dis- building ambiguity into design could combined with the neutral experi-
abilities be disclosed in the profile, help disabled daters to disclose more ences marking our disabled partici-
mental disabilities disclosed after a on their terms. For example, if their pants’ most positive encounters begs
few dates.” One difference between answer to disability-related questions the question of whether this neutral
our disabled and nondisabled partic- is “ask me,” disabled daters could or practical preference for disclosure
ipants was the reason for this prefer- tells the whole story. For example,
ence. Most nondisabled participants future work could ask how disabled
considered disclosure of visible dis- people appreciate their disabilities.
abilities a reasonable expectation
they did not need to justify further.
Historic and These questions can help us under-
stand how to design experiences for
In contrast, some disabled partici- present-day online daters that allow them to share
pants wanted people with visible dis-
abilities to disclose so they could pre-
examples what they like about being disabled,
and how to represent disability in
pare accommodations. For example, contribute online dating promotional materials
a 25-year-old bisexual woman with
anxiety and depression mentioned,
to continued that highlight these positive aspects.
contribute to continued disbelief first place. [1] Parisi, K. I Told My Tinder Matches about My Disability
– And Got the Worst Reaction. Refinery 29. Feb. 11,
that disabled people can be sexual. Similar to opening up disclosure 2016; http://www.refinery29.com/disabled-tinder
Recall the woman I referenced earlier methods, online dating platforms can [2] Porter, J. R., Sobel, K., Fox, S. E., Bennett, C. L.,
who is regularly asked on Tinder how broaden what types of people we con- and J. A. Kientz. 2017. Filtered out: Disability
disclosure practices in online dating communities.
she has intimate relationships. sider datable. Initial improvements In Proceedings of the ACM on Human-Computer
Online dating platforms can help could come in the form of adhering to Interaction 1, 87. 2 (November 2017). DOI: https://
doi.org/10.1145/3134722
decouple this inaccurate association established accessibility guidelines, [3] United States Census Bureau. Nearly 1 in 5 people
between disability and asexuality. but further exposure could occur by have a disability in the U.S., Census Bureau reports.
Press release. July 25, 2012; https://www.census.
The first step is access. Our respon- increasing representation of disabled gov/newsroom/releases/archives/miscellaneous/
dents and media narratives provided daters in ads and popular media. cb12-134.html
experiences of online dating. What is [4] Paterson, K. and B. Hughes. Disability studies
and phenomenology: The carnal politics
missing are people who do not have CONCLUSION of everyday life. Disability & Society 14, 5
these experiences, possibly because Our project at the intersection of (September 1999), 597-610. DOI: http://dx.doi.
org/10.1080/09687599925966
they have tried and cannot access online dating and disability has
[5] Handel, M. J. and I. Shklovski. Disclosure, ambiguity
online dating platforms, or because emerged with exciting possibili- and risk reduction in real-time dating sites. In
personal experiences and these very ties for designing online dating ex- Proceedings of the 17th ACM International Conference
on Supporting Group Work (GROUP ‘12). ACM,
narratives shy them away from at- periences to be more inclusive. We New York, 2012, 175-178. DOI: http://dx.doi.
tempting to date online. For example, showed how social norms around org/10.1145/2389176.2389203
my attempts to date online are quite disclosing disabilities, based on [6] Quarmby, K. Sex, lives, and disability –What can
disabled bodies teach us about sex, and why
few, but not for the reason most would whether they are visible in-person, should we listen? Mosaic. March 3, 2015; https://
expect. As a blind woman, I imagined extend to online dating communi- mosaicscience.com/story/sex-disability
Leveraging Personal
Experience for
Academic Research
and Outreach
Use your individuality to build your career path whether it leans
toward academia, outreach, or both. The existing underlying threads
between your experiences and the pursuit of research problems
might surprise you.
By Joslenne Peña
DOI: 10.1145/3155122
I
recently finished pursing a research project called “Evaluation of a Technology
Education Pipeline Project” with my advisor and colleagues. The purpose of this
project was to develop and analyze an online community built for the iTech Academy
Summer Camps, which took place at Penn State’s College of IST campus. My broader
inspiration for this project stemmed from my personal background. I am a first-generation
Hispanic college student, from a low-income family. I wanted to give younger students the
opportunities I never had, ranging from available software and technology to concepts.
The iTech Academy offers four different week-long camps for high-school and middle-school
children. The camps aim to broaden interest and participation in computer technology
careers. Our research goal was to un- I taught web development and robot- scholarships, grants, and other fund-
derstand the effectiveness of the iTech ics courses to local high-school and ing opportunities. I always viewed
Academy camps and related online middle-school students in the area. my demographical background and
community, and to concentrate the Their devotion and ambition to learn, my general identity as a detriment.
camps’ efforts in exposing students especially that of younger female stu- For me, surpassing the norm was
to STEM disciplines earlier in their dents, truly amazed me. This research abnormal. Pursuing a four-year de-
education careers. We performed an brought me back to the beginning of gree was unfamiliar. Now imagine,
online community analysis, and as- my academic career. an advanced degree? Certainly, out
sessed pre-and-post information that of the ordinary. It is was no surprise
we acquired through surveys. (See Ar- NEVER UNDERESTIMATE that when I told my mother I wanted
Image by Xi Xin Xing
itajati et al. for an early paper on our YOUR PERSONAL EXPERIENCE to continue schooling she was con-
work [1].) While I was mostly involved The process of checking boxes un- cerned. This was more uncharted
as a researcher, I also had the oppor- der certain categories is something I territory. Was it not enough that I un-
tunity to participate as an instructor. am accustomed to when applying for derwent four years of undergraduate
developers and help them retain stu- CONCLUSION [1] Aritajati, C., Rosson, M. B., Pena, J., Cinque, D., and
Segura, A. A Socio-cognitive analysis of summer
dents in STEM disciplines. Research I hope to see future educational tech- camp outcomes and experiences. In Proceedings
shows a loss in interest is due to dis- nologists, researchers, and designers of the 46th ACM Technical Symposium on Computer
Science Education. ACM, New York, 2015, 581–586.
engagement or a lack of comprehen- practice creative freedom and incor- [2] Master, A., Cheryan, S., and Meltzoff, A. N. Computing
sion, which is typically the instructors’ porate personal experience into their whether she belongs: Stereotypes undermine girls’
interest and sense of belonging in computer science.
responsibility [2, 3], This endeavor fol- work. I challenge them to reflect on Journal of Educational Psychology 108, 3 (2016),
lows a more indirect approach than di- past moments and perhaps utilize 424–437.
rectly observing students. I discovered them as motivation, or even use them [3] Wang, J., Hong, H., Ravitz, J., and Ivory, M. Gender
differences in factors influencing pursuit of
some interesting findings regarding to materialize a research project. Fur- computer science and related fields. In Proceedings
communities of practice within the thermore, I would love to see students of the 2015 ACM Conference on Innovation and
Technology in Computer Science Education. ACM,
instructor ecosystem [4]. For instance, and teachers with more access to mod- New York, 2015, 117–122.
many instructors are inclined to learn- ern educational tools for learning, es- [4] Peña, J., Shih, P. C., and Rosson, M. B. Scenario-
ing new teaching methods and tech- pecially those in urban or disadvan- based design of technology to support teaching in
inverted classes. IConference 2016 Proceedings.
nologies. They realize this is impera- taged communities. Serious progress iSchools, Grandville, MI, 2016.
tive not only for their skill set, but also has been made, but there is much
to engage and retain students. In the more to be done. Biography
first phase of the research, I explored It important to acknowledge the in- Joslenne Peña is a Ph.D. candidate in the College of
Information Sciences and Technology at Penn State-
their views on teaching practices and dividuals who overcome uncontrolla- University Park. She is also under assignment as a
the role of technology. The next steps ble obstacles to enable learning in the research associate in the Human Centered Systems
group at Honeywell Aerospace. Her research interests are
involved observing interactions in the classroom; they should receive the nec- human-computer interaction, human factors psychology,
classroom with students in STEM dis- essary tools required to enhance their and computer science education. She holds diversity and
outreach near and dear to her heart.
ciplines, and understanding the re- methods of teaching. Teachers should
lationships in the classroom, as well have the freedom to select the technol-
as the technologies that are used and ogies they believe are most appropriate © 2017 ACM 1528-4972/17/12 $15.00
Gender and
the Art of
Community
Relations
Aspects of one’s personal identity can change the way you experience
being part of a community, especially if you are in a minority group.
The author reports on her experiences of conducting research with
women who participate in the Debian Linux project.
By Lesley Mitchell
DOI: 10.1145/3155124
A
fter nearly two decades working as a professional systems administrator, I took a
career break to complete my dissertation in philosophy. As it turned out, I wasn’t
done with academia when I handed it in. My dissertation had taken a dry and
theoretical look at the clash between traditional theories of personhood and
personal identity in political philosophy, which are deeply rooted in the ideas of men writing
in the 17th and 18th centuries, with those stemming from the work of modern feminist
philosophers from the 1960s on- What caught my imagination was My research, and subsequent disser-
wards. I realized the practical upshot the different experiences people have tation, explored the impact of gender
of these theoretical tensions was play- within groups based on their visible on the experiences of women in geek
ing out across almost every area of my and invisible identity traits. That is to communities. I chose to focus on the is-
life, but most particularly within geek say, the things other people use to de- sue of gender because it is the area most
communities. This prompted me to fine, or pigeonhole, you. These include familiar to me from my own personal
change my focus. My studies in sociol- things like skin color, gender markers experiences, and where I had the most
ogy allowed me to research the effects like body shape or facial hair, or the relevant previous academic training.
of identity, particularly gender iden- use of a wheelchair or hearing aids. However, there exist many other iden-
Images by Ollyy / Shutterstock.com
tity, within a community that I know Also relevant are other more subtle tities that can lead to marginalization
and love—the Debian Linux project. cues, such as accent and dialect, which within these communities. Further-
The process not only gave me the op- may be used to label the speaker in more, while Debian is a global project
portunity to gain insights into the ex- terms of class, race, or native tongue. and has participants from around the
periences of the women I interviewed, While mode of dress and the amount of world, it functions primarily as an An-
but also allowed and encouraged me gestures used when speaking may be glophone community and participa-
to reflect on my own relationship with seen as indicative of particular genders tion is somewhat skewed toward North
gender and geek culture. or sexualities. America and Europe. Thus the social
norms of the group tend to be those of sonal identity, rather than imposing the the EU] women are under-represented
modern Western society as found in term as an external label on people who relative to men, making up less than
those regions. are unwilling to claim it. One problem 45 percent of scientists and engineers”
with this approach comes from clashes [1]. It’s harder to get reliable figures for
GENDER AND GEEK CULTURE between the stereotypical image of a F/LOSS communities and the fan bases
My interpretation of the term “geek” is geek in modern Western culture, and of geek media. One area in which the
a positive and inclusive one. That is, any the negative connotations that it still demographics are noticeably differ-
person who is passionately interested retains in some social groups, with oth- ent from this male-dominated trend is
and committed to learning a signifi- er aspects of one’s identity. This leads video gaming, where the annual studies
cant amount about a particular topic. some people to reject the identity or produced by the Entertainment Soft-
For me, people can be geeks about any label of geek, while otherwise partak- ware Association show the gender split
topic, be it music, sports, or knitting. ing in the interests and actions that the of gamers is now approximately 50:50.
However, in order to more closely align identity implies. Women over 18 are a significantly larger
with the common usage of the term, for An online image search for the term proportion of the market than teenage
my dissertation and this article, I limit geek produces pictures and cartoons of boys, who tend to be expected to be the
the term to two broad groups: firstly, bespectacled, white, young-ish males main consumers [2].
those involved with computers, com- using pieces of technology with unfash- I knew growing up that, while none
puter science and information technol- ionable, and even outlandish, hairstyles of my friends shared my interests, there
ogy, and science and engineering; and, and clothing. Much further down the were other geeks in the world, even if
secondly, the creators and fans of “geek results, one may find the occasional im- none of them seemed to look like me.
media,” such as comic books, graphic age of a man of color or a white woman. I even had some understanding that
novels, science fiction, fantasy, horror Contemporary media provides further groups of geeks came together to form
and related genres in all formats. The examples: Sheldon Cooper from “The communities, even before this was eas-
first group might include, for example, Big Bang Theory,” Eliot Alderson from ily facilitated by the rise of the inter-
people working in STEM roles, makers “Mr. Robot,” or Harold Finch from “Per- net and the web. I knew too, because
and hackers, and Free/Libre and Open son of Interest.” It should, however, be all the portrayals of geeks that I saw
Source Software (F/LOSS) developers noted, unlike earlier examples of this always included references to a larger
and users. The second might include genre, men of color and white women community. I was fortunate not to be
authors and other creatives involved in can be found playing supporting geek tormented by my peers for my outland-
the production of geek media, as well roles on these television shows. ish interests, though I was certainly
as cosplayers and other convention at- Where demographic data is avail- considered odd in the all-girls high
tendees, fan fiction writers, and so on. able this stereotype is reinforced. For school that I attended. It was at univer-
I have been many types of geek in example, several major U.S.-based sity where I first found myself in a male-
my life. I got my first computer for my technology companies—including Mi- dominated environment, one of only a
eighth birthday, and, almost imme- crosoft, Apple, Google, Twitter, and handful of women in a course of more
diately, started to teach myself how to Facebook—have made this data pub- than a hundred. However, it was also at
code. My reading list has leaned toward licly available. In all cases the technical university that I first connected with a
science fiction and fantasy novels ever workforce is predominantly male, with geek community. I not only discovered
since. I grew up watching “Battlestar four or more men for every woman. mailing lists dedicated to TV shows,
Galactica” (the original!), “Star Trek: While the 2015 “She Figures” study, and chat rooms and message boards
The Next Generation,” “Twin Peaks,” funded by the European Union, found filled with like-minded people. I also
“The X Files” and “Stargate SG-1.” I’ve “in more than half of the countries [in found a group of people who used and
been to and run conventions for “Star- programmed the same type of comput-
gate,” written fanfic, dressed up in cos- er that I did and would regularly meet
tume, met the cast, and been on the up in person to talk about “all things
set, too. My undergraduate degree is Acorn.” (Acorn was a British designer
in chemistry. I have worked in a techni- It is easier to hide and producer of a series of computers
cal role for general businesses and at
highly specialized IT firms. I have al-
indicators of one’s in the ‘80s and ‘90s, which were par-
ticularly dominant in the educational
ways claimed, and to some extent taken gender online market, but also as home computers.
pride, in my geek identity. However, not
every person who fits into the categories
behind masculine These were some of the first devices to
use the now ubiquitous ARM RISC pro-
I have mentioned necessarily consid- or ungendered cessors and, combined with the RISC
ers themselves to be a geek, and many
who do embrace the geek identity, like
nicknames and OS operating system. Acorn spawned a
dedicated following of users and devel-
me, are participants in many different avatars, than it is opers. Some of this community contin-
geek activities. I prefer to consider only
those people who choose to incorporate
when meeting face- ues to exist even now, nearly 20 years on
from the cancellation of the final Acorn
the idea of being a geek into their per- to-face. branded computer.)
was poor due to the variable nature of this, and in line with Foucault’s propos- [1] European Commission, She Figures 2015.
Publications Office of the European Union,
internet connections. For example, one al of the connectedness of power rela- Luxembourg, 2016.
participant’s home bandwidth was not tions and resistance, these women built [2] Essential Facts About the Computer and Video Game
sufficient for video calls, so she con- their own support and mentoring net- Industry. Entertainment Software Association.
2017; http://www.theesa.com/article/2017-
nected from a local coffee shop instead, works. This was within Debian in the essential-facts-computer-video-game-industry/
with all the background noise that im- form of the Debian Women sub-project, [3] Coleman, G.Coding Freedom: The Ethics and
Aesthetics of Hacking. Princeton University Press,
plies. When complete, the transcripts but also outward to other women in New Jersey, 2013.
were analyzed. I tried to see if any com- different technology and open source [4] Arjona, L., Langasek, P., and Ruiz, M. Women
mon themes appeared and whether communities experiencing similar in Debian 2013. DebConf13. August 2013;
http://penta.debconf.org/dc13_schedule/
similar experiences were apparent, problems. attachments/243_women_in_debian_2013.pdf
either related to the areas I described
previously or ones the participants had LOOKING FORWARD Biography
raised themselves. As I had promised the women who Despite dreams of being a marine biologist or an
All my participants were positive participated in my research, I was in astronaut, or possibly both, during her childhood,
Lesley Mitchell studied chemistry and then became a
about their overall experiences with the attendance at DebConf 17 in Mon- career systems administrator. Later, while looking for
a way to stretch her mind further, she stumbled into
Debian project, frequently bringing up treal. I gave a talk explaining my re- the study of philosophy and then sociology, focusing
the good friendships and other rela- search, and had a number of fruitful on the relationships between individuals, identity, and
communities. In her spare time, she has been known
tionships they had found and built in discussions with community mem- to help run science fiction conventions, cook elaborate
the community. There was, however, a bers around these topics. The trip also meals, take copious photographs of inanimate object,
and wave a sword about. She is inseparable from both her
darker side. While only one participant allowed me to meet, hug, and eat with small, black cat and her hat.
suggested she had been on the receiv- friends with whom I speak with on a
ing end of a serious gender-based inci- daily basis, but hadn’t seen for years © 2017 ACM 1528-4972/17/12 $15.00
It’s hard to put the ACM Student Research Competition experience into words, but we’ll try…
“The ACM SRC gave me an amazing opportunity to present “It is a wonderful experience to attend the ACM SRC, where you
my research at the first conference I ever attended. I can collect insightful feedback, shape your presentation skills
met with talented students, discovered their work, and and make outstanding peer friends. I will definitely appreciate
discussed interesting ideas with them. The feedback I this learning experience throughout my professional career.”
received from expert researchers allowed me to place my Xiaoqing Xu
work in the broader picture and it helped me steer my University of Texas at Austin | ICCAD 2016
research accordingly. It was a great experience, and I would
recommend it to any young researcher.”
“It was a fantastic and memorable experience to participate
Lisa Nguyen Quang Do in SRC. Writing the abstract, preparing the poster, and
Fraunhofer IEM | PLDI 2016
presenting your ideas to the audience and convincing them is
challenging but rewarding and builds up your confidence and
“The experience of pitching your own research and ideas, communication skills. SRC is a really nice event where you can
regardless of how bold they might be, is an important stage of meet the experts from various fields, exchange your ideas,
each young researcher’s career. SRC was one such opportunity. and gain valuable feedback on your research. Go, SRC!”
It allowed me to present my research topic to a highly skilled Ting Su
panel of researchers and educators, and provided me with East China Normal University, China | ICSE 2016
significant feedback and discussion regarding my work.”
MHD Yamen Saraiji “The ACM SRC was a great opportunity to discuss my research
Keio University | SIGGRAPH 2016
with experts in my area. The constructive feedback I received
gave me new ideas and pushed my thesis work forward. It
“The ACM SRC was an incredible chance to start a conversation was also an invaluable experience in terms of practicing
with various experts in technology. I not only gained valuable presentation and communication skills that would serve me
feedback on my work, but I was also able to learn more about well in my future career.”
my future in research: the process of applying to grad school, Arik Hadas
the best and worst aspects of research, and more.” Open University of Israel | Modularity 2016
Jess Cherayil
Wellesley College | SPLASH 2016
Check the SRC Submission Dates:
“The SRC was a very enriching and enjoyable experience. http://src.acm.org/submissions.html
The insights and constructive feedback I received from judges
and attendees broadened my understanding in the field and
encouraged me to continue working on the topic.”
Mirko Gelsomini
Politecnico di Milano | ASSETS 2016
Reflecting on
Robots, Love,
and Poetry
Finding the poetry in programming and
the algorithms in poems
By Margaret Rhee
DOI: 10.1145/3155126
A
s the poet William Carlos Williams writes, “A poem is a small (or large) machine
made of words” [1]. The intersection of poetry with machines is provoking on
interaction. The conversation, as ephemeral as it may be, is a human-human
interaction also conducive to consider. As we contemplate how technology informs
human-human interactions, it may be useful to reflect on human-human interaction and
engagement with literature, namely with words. The cybernectics of these kinds of relations
never stops short of being astonishing.
I write science fictional poetry about be human. The robot offers us so many larities and slippage between the two—
robots, and my first poetry book Love, questions to grapple with, in our urgen- poetry and AI—I hoped would frame
Robot was published this fall [2]. Writing cy for humanity, compassion, empathy, the collection and urge the exploration
about robots poetically sprung from a and justice. Could we think of robots as of poetry, love, and AI. Without being
conversation when I was a graduate stu- entities that evoke more compassionate engaged with robots and technology
dent. At the time, I worked with several characteristics than humans? Could we as a cultural history, my poetry would
roboticist-artists, namely Ken Goldberg think of robots as object-choices of de- have lacked the grounding and the lack
who served on my dissertation com- sire, or more compassionate lovers? of imagination that AI theory, computer
mittee. I also worked with Eric Paulos Research then inspired my poetry. science, and other fields could offer.
on tangible media. While my scholarly For example, my poetry on robot love Graduate study is a time of deep
work centers on culture and difference draws upon Alan Turing’s question, thinking, training, and development. It
as an analytical and historical project, “Can machines think?” As a poet, I is also a time for conversations. When I
their work and others in robotics and switched the “think” to “love.” In addi- reflect back on my graduate experience,
computer science opened up my artistic tion, there is the question of the son- I fondly remember the importance of
explorations. Currently, I am a visiting net and artificial intelligence (AI) that conversations that are paradisciplinary.
assistant professor in media study. As Turing poses. Could a machine write Not only across the humanities and so-
someone studying media and litera- poetry? Would it then prove humanity? cial sciences, but the sciences as well.
ture, I cannot ignore the current digital On the other hand, I was researching Not conversations that begin by talking,
age as a societal phenomenon. poetics and learned about how we can but with questions. Not the performance
Philosophically, I am interested in think of poetic forms, such as the son- of knowledge, but perhaps the opposite.
how robots teach us what it means to net, as machines. The uncanny simi- The desire to develop by engaging.
lies awake with the robot? What does it mean for a robot to be run down enough to “sleep” or even be replaced? Many of
the poems in the first section of the book are accompanied by algorithm poems that also speak to the circumstances of the
poem through code. I hope readers can think about algorithm as language, and poetics as programming.
As a graduate student, I sat next to graduate training, but beyond it, mak-
INTER ACTIONS a postdoctoral roboticist. Since I was ing your own work unique and a contri-
a poet, I had various poetry related fli- bution to our larger world.
ers, books, and posters around. My new Friedrich Kittler surveyed how the
neighbor asked me, upon seeing the gramophone, film, and typewriter
photograph I had of Langston Hughes— transformed language and writing
the celebrated African American poet during the 19th century. I want to re-
of the Harlem Renaissance—who was flexively ask, how in our current digital
in the photograph. I began telling him, age of ephemeral spaces foster the ex-
when he kindly responded, “I know who change and development of intellectual
he is. I write poetry too.” He not only and creative thought/acts? Exploring
created robots, he wrote poetry, and robot poetics for me, has led to ques-
even took graduate courses in poetry. tions around the poem and machine
ACM’s Interactions magazine I was studying robots, but I was not yet intersectionally.
explores critical relationships writing poetry about robots, until my In going back to Turing, and his test
between people and new friend offered another way of hy- on artificial intelligence. His article,
technology, showcasing bridity. Together, we wrote poetry and “Computing Machinery and Intelli-
emerging innovations and exchanged poems, remembering the gence” [3] refers to the sonnet as an in-
industry leaders from around humanities and science divides are ar- dication of the human or the machine:
the world across important bitrary, or that transgression should Q: Please write me a sonnet about the
applications of design thinking and can occur. subject of the Fourth Bridge.
and the broadening field of At the time, prompted by our con- A: Count me out on this one. I could
interaction design. versation, I began to find poetry never write poetry.
about robots was an interesting way If we are entering a time where
Our readers represent a growing to engage and question demarcations machines can write poetry, but human
community of practice that is of difference through the science beings are denied basic rights and au-
of increasing and vital global fictional. It was also a reprieve from tonomy in the service of political agen-
importance. scholarly research. In every sense, the das, then the insistence on our own
robot love relations in Love, Robot are humanity feels important. Collabora-
queer relations, but not explicitly so. tion, conversation, and creativity inter-
“Queer” is an academic and political vene in the siloing of way of thinking
term that most often refers to LGBT and training. As humans, engaging in
issues or identity. But it also refers to these interactions that foster thought
non-normativity, and an embracing feels important to design with humans
of the edges that trouble the norm. In in mind. Perhaps my overall point is
many ways, worldbuilding into science regardless of our interests in comput-
fictional worlds allows us to transgress er science, the computer and poetry
boundaries, and robots offer us queer may have much more in common than
visions of our futures. Thus, writing we could imagine. And that imagina-
the robot poems was a reprieve. It was tion can help world build in the ways
refreshing to take a different turn from we need.
my academic writing, which deals pret-
ty centrally with issues of difference References
(race, class, sexuality), and to explore [1] Williams. C.W. Introduction. Selected Essays of William
Carlos Williams. New Directions, New York, 1969.
how science fiction poetry can ask
[2] Rhee, M. Love, Robot. The Operating System, New
questions about difference through York, 2017.
To learn more about us, worldbuilding.
visit our award-winning website [3] Turing, A. Computer machinery and intelligence.
Mind 49 (1950), 433-460.
http://interactions.acm.org We have the freedom to recreate our
worlds through science and technology.
Follow us on Literal human-human interactions and
Biography
To subscribe: imaginative transgressions between collection, Love, Robot (The Operating System, 2017). As
a scholar, she is at work completing her first monograph,
http://www.acm.org/subscribe humans and machines. Conversations How We Became Human: Race, Robots, and the Asian
and questions that engage with art, sci- American Body. She received her Ph.D. from UC Berkeley in
ethnic and new media studies in 2014, and held academic
ence, and technology spark new ideas appointments at the University of Oregon, and UCLA.
Currently, she is a visiting assistant professor in the
Association for to shape your own work in directions Department of Media Study, University at Buffalo SUNY,
Computing Machinery you may not have imagined. It also may and a visiting scholar at the A/P/A Institute at NYU.
give you permission to nurture inter-
ests that may not exist within your own © 2017 ACM 1528-4972/17/12 $15.00
46
IX_XRDS_ThirdVertical_V02.indd 1 12/5/17 3:25 PM XRDS • W IN T ER 2 017 • V OL .24 • NO.2
Check out the new acmqueue app
FREE TO ACM MEMBERS
acmqueue is ACM’s magazine by and for practitioners,
bridging the gap between academics and practitioners
of computer science. After more than a decade of
providing unique perspectives on how current and
emerging technologies are being applied in the field,
the new acmqueue has evolved into an interactive,
socially networked, electronic magazine.
Q
uilting is about making connections and establishing relationships between different
parts. The craft process involves sewing several textile layers together to create a thicker
padded fabric. However, in the case of our recent involvement in the Partnership Quilt,
the connections also emerged on a collaborative level. The collective act of sewing
simple rosettes and quilting blocks turned into an interactive piece of art by bringing
different and disparate expert knowledge together. We as human computer interaction (HCI)
researchers and interaction designers worked alongside the quilting designers from Six Penny
Memories,a as well as staff and service users from Changing Lives,b specifically Girls are Proud
Photo courtesy of Angelika Strohmayer and Janis Meissner
(GAP) and the Male Action Project (MAP). Changing Lives is a U.K. based charity focused on
those deemed “vulnerable”—the we combined elements of social-care was taught in schools in the North
homeless, people suffering from ad- practice, professional quilting skills, East of England, and many of those
diction, and the unemployed. The as well as interaction design tools to who put a stitch in the quilt had previ-
GAP/MAP projects specifically provide produce a living archive of experiences ously done this in their childhood, but
people-focused services to support from the women GAP supports, along- the type of teaching they spoke of rare-
those engaged in sex work, survival side those who support them. ly happens anymore. Many different
sex, or anyone experiencing sexual ex- techniques were used to construct the
ploitation. Through this collaboration, THE FIRST STITCH quilt, such as English paper-piecing,
The quilt is contextualized in local applique, machine-quilting, and tie-
a https://six-penny.com histories of craft and women’s work. quilting. Using these traditional tech-
b http://www.changing-lives.org.uk Quilting used to be something that niques, the women “[were] carrying on
share personal well-being strategies integrated their traditional skills into sew them onto his pillow, to which she
focused on self care (e.g. sewing). Al- the digital layer of the quilt. Six Penny responded: “He won’t let us! He car-
most simultaneously, Six Penny Mem- Memories were able to quilt the sensors ries them around everywhere. They
ories were introduced to the project. we made from tinfoil and wires sol- go in his pocket, in his school bag, he
They are a duo of professional quilters dered to paper onto the fabric, and at- just carries them everywhere.” Anoth-
and designers who have written sev- tached a small pocket as the new home er woman stated the quilt “needs to be
eral books, appeared on quilting TV, for the BARE Conductive Touchboard used, doesn’t it?”, urging us all to con-
and have authored hundreds of quilt- (a commercial microcontroller special- tinue to interact with it.
ing patterns. ized for capacitive touch sensing). A Twelve extracts from the recordings
week later, the charity staff and women were cureated to be shared with the
PUTTING THE PIECES TOGETHER from GAP also visited the shop to ex- wider public through the touch inter-
We organized two days to come togeth- plore the audio-recordings triggered by action on the quilt: When one of the
er as part of what we called “Quilting interacting with the finished quilt. rosettes on the quilt is touched, one
Extravaganzas” to sew fabric hexagons In the end, the quilt was construct- of the audio files starts to play. Four of
The quilt was a chance for the local reflection from when we were nearing Angelika Strohmayer is a Ph.D. student in the Centre for
Doctoral Training in Digital Civics at Open Lab, Newcastle
women to sit together quietly during the end of the project: University. She is interested in the ways in which digital
the drop-in session, while carrying out Caseworker: “I bet [the sewing] technologies can be designed for support services to aid
their service delivery while simultaneously being useful for
an activity. It was, however, also an op- chilled you out a bit…” advocacy work and the sex worker rights movement.
portunity for people to stay in touch GAP client: “It did, ‘cause at the Janis Meissner is also a Ph.D. student in the Centre for
Doctoral Training in Digital Civics at Open Lab, Newcastle
after these drop-ins. The first Quilt- time I refused medication as well, so University. As maker technologies give individuals an
ing Extravaganza day took place more […] it was the only thing I focused on. opportunity to develop their own objects and tools,
Janis is interested in exploring the ways in which these
than a month after the caseworker who ‘Cause all the other stuff was negative, technologies can empower different communities.
had been a driving force in starting the and that was positive.”
project was moved to work at a differ- On top of these personal experi- © 2017 Copyright held by authors
ent drop-in center. As such, the day was ences of making the quilt and the 1529-4972/17/12
Sara Mauskopf
Innovative Thinking in
the Service of Parents
DOI: 10.1145/3155218
Having graduated from MIT with a “I’d never considered MIT before, MIT in order to stay close to theoretical
perfect GPA, and kickstarted her career because I had previously thought it was computer science, her life would take a
with high-profile jobs at four of Silicon for people smarter than me. I didn’t yet another unexpected turn.
Valley’s more iconic brands: Google, think I was smart enough to go there, I “During my senior year, I just burned
YouTube, Twitter, and Postmates, Sara just knew I was someone who worked out. I was studying so hard, and always
Mauskopf’s story became all the more hard. But then I heard all of these kids trying to do everything perfectly, that
impressive when she decided to walk who were going to apply, and I was doing it was just exhausting. So when Google
away from salaried life and bravely the same math program as they, so I extended me a job offer, I decided to
launch her own startup, Winnie. thought that if they can do it, then I take a break from school and just go
It therefore felt like no small privilege can do it too,” she reminisced, adding for it. They seemed like a really fun
to interview her and, in the process, she visited the MIT campus after the company, with lots of young people
share with current and aspiring computer summer school was over, and she just like me, and it was on the other
science students some the good, immediately recognized it as the right side of the country in a completely new
the bad, and the difficult lessons and place for her. environment. I figured I could always go
perspectives she gained along the way. “MIT offered me a place, so I back to MIT for a Ph.D. if I wanted that,”
accepted, and I enrolled thinking at the she explained. Even though she thought
MATH GEEK DISCOVERS time that I was going to major in math,” she would eventually move back to her
COMPUTER SCIENCE she confessed, adding she was unaware native East Coast, it’s been 10 years
Although Mauskopf now resides at the at the time that she had yet to discover since she moved to California and she
heart of the global tech industry, her early her true passion. loves it so much that she’s not planning
school years were not stereotypically “With time, all the other kids that I on moving back anytime soon.
spent tweaking software, but rather talked to—and all of my friends—were “I think San Francisco was a really
in the pursuit of a more abstract form doing this new thing called computer good fit for me, and a new start. Starting
of logic. She grew up in the suburbs of science. And it looked like a lot of fun,” my first job at Google was also very nice,
Philadelphia, where she had been drawn she recalled. In the beginning she felt because Google had a sort of collegiate
to mathematics for as far as back as she slightly jealous of how they would solve feel to it, especially back in the day.
could remember. She would dedicate all hard problem sets and work on cool People would eat dinner together, and
her spare time to pursue the subject. technical projects together, while she play volleyball, so it kind of felt like an
“I was always interested in math was mostly on her own. After having extension of college in a way. It made
growing up. I didn’t know anything about attended a career night for math majors, the transition to adult life really easy,”
computer science, or that it might be and realized she wasn’t excited about she explained, pointing out she is very
related or interesting to me, but I truly any of the advertised options there, she grateful to have started her career with
loved math, and was very driven to be decided to follow her heart and enrolled a company that takes such good care of
the best at it. It was sort of my hobby,” in the introductory CS class, which she their employees.
she bemusedly reminisced. aced. “The class had a final project for However, after having spent more
Consequently, toward the end of high which they picked winners, and I was one than three years with Google, during
school she envisioned her ideal future of the winners. Then I realized that I was which she learned how to help a tech
university major in this field, and decided good at it, and I liked it, and I switched company navigate the tumult of the
to attend an elite summer program for majors,” she proudly remembered. 2008 financial crisis, Mauskopf began
math and science sponsored by the She would go on and later graduate to realize that she was ready for a new
state of Pennsylvania on the Carnegie with a perfect GPA, a rare feat at one of the challenge. She had begun using a new
Mellon University campus. In a dramatic best technical universities in the world. social platform called Twitter, and she
boost of confidence, it was at this really liked it, so she applied for a job
summer school that she met colleagues LIFE IN SILICON VALLEY there and she was offered her dream
who talked about applying to MIT for Though Mauskopf felt personally very job as a product manager. She decided
college, which inspired and emboldened happy in academia, and had originally to take a leap of faith and accept.
her to prove herself there. planned on doing a graduate degree at “Everyone thought I was crazy. I joined
Word art depicting areas of interest for the Stanford Social Media Lab.
T
laborations bet ween technolog y
he Social Media Lab at Stan- series of automated text analyses re- scholars and practitioners are needed
ford Universit y evaluates vealed systematic differences in how to address this new frontier.
communication and psycho- fraudulent scientists write their re- I am a researcher in the Social Me-
logical questions about hu- search reports compared to genuine dia Lab primarily focusing on how
MediaX at Stanford University
mans and technology. Our lab has scientists. The data suggest language language reveals what people are
several notable areas of research. patterns may be one way to diagnose thinking, feeling, and experiencing
One major area investigates the the scientific fraud problem that has psychologically. I combine computa-
linguistic traces of digital media to received substantial academic atten- tional social science (e.g., gathering
reveal social and psychological dy- tion. A second area of work evaluates and analyzing language data through
namics, including deception, persua- how people conceptualize social net- automated means) with media stud-
sion, and well-being. For example, a working sites, particularly their folk ies to understand how language re-
H
ate speech refers to state- vary from person to person, and it can be numerical labels from our data file (see
ments that attack or delegiti- tricky to find and represent the contextual Listing 1).
mize particular groups of people elements that distinguish hate speech. A classifier is a program that distin-
based on a demographic guishes different classes of objects using
category—race, gender, religion, sexual GETTING LABELED DATA labeled examples. It works by using
orientation, and so on. For social media What constitutes hate speech? There is features of the examples that help
platforms, like Facebook and Twitter, hate no clear objective definition of hate distinguish between the classes. Features
speech that specifically encourages speech, making its identification a are measurable values, such as the length
violence against a group is explicitly subjective task. A natural way to answer of a post, the number of times an
prohibited in the terms of service. this question is to show people examples offensive word appears in it, or the
However, these media platforms are large of texts that may be hate speech and have presence of a URL. In our work, we refer to
and hard to moderate, so those rules them decide what is and is not hate the set of input features as an array X, and
cannot fully prevent hateful posts, nor do speech. This enables us to construct a the correct labels as y. This formalization
they regulate other kinds of hate speech. corpus of data that are labeled into is referred to as “supervised machine
To mitigate this problem, machine different classes. In our example, we use learning,” because we infer a decision
learning can be used to identify potential an existing dataset of 24,783 tweets.1 model from labeled data and evaluate our
hate speech in larger collections of text. Each tweet was labeled by crowd workers: performance on the basis of these labels.
This problem is closely tied to spam 1,430 examples of (0) HATE speech,
filtering, a classic problem in text 19,190 examples of (1) OFFENSIVE USING LEXICONS
classification and natural language speech, and 4,163 examples of (2) An obvious starting point to identify hate
processing. NON-OFFENSIVE speech. Note the classes speech is to use offensive words and slurs
Based on past work in automatic hate are imbalanced: Though all the labeled as features. We can use a lexicon, a
speech detection [1], included is a brief tweets were potentially hateful, only 5 vocabulary list corresponding to some
tutorial on using Python, specifically percent were classified as such by the particular attribute, to choose a list of
scikit-learn [2], on a set of tweets to majority of crowd workers. We first load words that might help us distinguish hate
distinguish between hate speech and the text of these tweets and these speech from other posts. Hatebase.org
other text. We also describe some of the has an extensive list of terms used in hate
challenges in solving this task efficiently. speech.2 Our example lexicon includes a
1 A CSV of the data can be found here: https://
In the process, we demonstrate the github.com/t-davidson/hate-speech-and-of-
small sample of words commonly
complexity of the problem; definitions of fensive-language/blob/master/data/labeled_ associated with sexism, racism, and
what specifically constitutes hate speech data.csv homophobia. There are different ways to
convert a lexicon into features. In this
Listing 1. case, for each document, we are going to
use as features the number of instances
import pandas of each word as well as the total count of
data_url = 'https://raw.githubusercontent.com/t-davidson/hate-speech-
words in the lexicon. For a lexicon of 10
and-offensive-language/master/data/labeled_data.csv'
data = pandas.read_csv(data_url) words, we’ll have 11 features per tweet
tweets = data['tweet'] (see Listing 2).
y = data['class'] There are many algorithms for training
text classifiers, many of which are
implemented in scikit-learn and can
Listing 2. be swapped out for each other pretty
easily. To start, we are going to use a
import numpy as np logistic regression classifier, which is a
tokens = [re.split("[^a-zA-Z]*", tweet.lower()) for tweet in tweets]
simple model that works well with small
X_lexicon = np.zeros((len(tweets), len(hate_lexicon) + 1))
for i, tweet in enumerate(tweets):
for j, term in enumerate(hate_lexicon):
X_lexicon[i,j] = tweet.count(term) 2 A CSV based on the Hatebase lexicon can be
X_lexicon[:,-1] = X_lexicon.sum(axis=1) found here: https://github.com/t-davidson/
hate-speech-and-offensive-language/tree/
master/lexicons/hatebase_dict.csv
the first step, it takes a large matrix and downweight terms in the feature matrix if [1] Davidson, T., and Warmsley, D., and Macy, M. and I.
Weber. Automated hate speech detection and the
finds three matrices with specific they occur in a large number of docu- problem of offensive language. In Proceedings of
properties whose product equals the ments (see Listing 8). ICWSM ‘17, Montreal, Canada. 2017, 512–515.
original large matrix. In the second step, it Using 20-dimensional LSA representa- [2] Pedregosa, F., Varoquaux, G., Gramfort, A., Michel,
V., Thirion, B., Grisel, O., and M. Blondel et al.
removes all but the top few dimensions of tions of a weighted word-document Scikit-learn: Machine learning in Python.
Journal of Machine Learning Research 12
the matrix that contribute the most to matrix along with the original count (Oct. 2011), 2825-2830.
matching the original large matrix. If we features, we obtain the best accuracy yet,
choose dimension 20, LSA will return for a of 88.25 percent.3 Upon inspection, we Biographies
document-word matrix a 20-column notice that while we only have 26.9 Alexandra Schofield is a Ph.D. candidate in computer
matrix U with one row per document, a percent recall of the hate speech class science at Cornell University. Her research focuses on
practical methods for experts outside computer
20-by-20 matrix Σ with only entries on (0), we can obtain 93.64 percent recall on science to use distributional semantic models for text
the diagonal, and a 20-column matrix V offensive tweets (1) and 84.5 percent mining.
with one row per word, such that UΣV T is recall of other tweets (2) without the Thomas Davidson is a Ph.D. student in the Department
of Sociology at Cornell University. He is currently
as close a reconstruction possible of the working on a dissertation using social network analysis
original matrix. and natural language processing to study political
3 Because the TruncatedSVD algorithm is debates on social media.
If we treat this model as a black box, probabilistic, this accuracy can fluctuate, but
the important part is that for each over many trials it averages between 88.2 DOI: 10.1145/3155212 © 2017
document and word, LSA outputs a and 88.4 percent ACM 1528-4972/17/12 $15.00
BEMUSEMENT
Inner Gollum
Source: http://www.phdcomics.com/synd/c/phd091517hswy.tif
Time Travel Thesis
Source: https://imgs.xkcd.com/comics/time_travel_thesis.png
SUBMIT A PUZZLE
Can you do better?
Bemusements would like your puzzles and mathematical games
(but not Sudoku). Contact [email protected] to submit yours!
M
Association for
Computing Machinery
&C
2 Penn Plaza, Suite 701
New York, NY 10121-0701, USA
Phone: +1-212-626-0658
Email: [email protected]
M
Morgan & Claypool
Publishers
&C
1210 Fifth Avenue, Suite 250
San Rafael, CA 94901, USA
Phone: +1-415-462-0004
Email: [email protected]
IntelligenceCareers.gov/NSA