Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Life hacking

View through CrossRef
<p>This dissertation intervenes in the larger academic and popular discussion of hacking by looking at life hacking. In essence, life hacking presumes that your life is amenable to hacks the same way a computer system might be. As both a metaphor and a practice, life hacking occupies a popular but under-analyzed position in contemporary American culture. The recent broadening of the computer term “hacking” to encompass all of life’s activities suggests the degree to which people are increasingly thinking about everything in computational terms. Life hacking is important to attend to precisely because it reveals how the rhetoric of hacking and the subjectivity of the hacker have become normalized. This rhetoric and subject position carry particular valences, valences that are deeply rooted in Western culture, including especially a way of thinking about the world that David Golumbia calls “computationalism.” In a computerized world, hacking becomes the preferred “way of seeing.” But, significantly, it is a way of seeing that is in line with long traditions in U.S. culture of self-making and technofetishism. In order to show this, I trace life hacking’s metamorphoses through three critically important and interlinked realms—life hacking, digital minimalism, and prof hacking—before concluding by looking briefly at a fourth—pickup artists. This dissertation seeks to identify how these different instances of life hacking relate to each other, to trace how life hacking has changed over time, and to explain how life hacking broadly speaking is best viewed as an episode not only in the larger history of hacking but in the larger history of American culture.</p>
Title: Life hacking
Description:
<p>This dissertation intervenes in the larger academic and popular discussion of hacking by looking at life hacking.
In essence, life hacking presumes that your life is amenable to hacks the same way a computer system might be.
As both a metaphor and a practice, life hacking occupies a popular but under-analyzed position in contemporary American culture.
The recent broadening of the computer term “hacking” to encompass all of life’s activities suggests the degree to which people are increasingly thinking about everything in computational terms.
Life hacking is important to attend to precisely because it reveals how the rhetoric of hacking and the subjectivity of the hacker have become normalized.
This rhetoric and subject position carry particular valences, valences that are deeply rooted in Western culture, including especially a way of thinking about the world that David Golumbia calls “computationalism.
” In a computerized world, hacking becomes the preferred “way of seeing.
” But, significantly, it is a way of seeing that is in line with long traditions in U.
S.
culture of self-making and technofetishism.
In order to show this, I trace life hacking’s metamorphoses through three critically important and interlinked realms—life hacking, digital minimalism, and prof hacking—before concluding by looking briefly at a fourth—pickup artists.
This dissertation seeks to identify how these different instances of life hacking relate to each other, to trace how life hacking has changed over time, and to explain how life hacking broadly speaking is best viewed as an episode not only in the larger history of hacking but in the larger history of American culture.
</p>.

Related Results

The Economics of Hacking
The Economics of Hacking
Hacking is becoming more common and dangerous. The challenge of dealing with hacking often comes from the fact that much of our wisdom about conventional crime cannot be directly a...
A Network Defense System for Detecting and Preventing Hacking
A Network Defense System for Detecting and Preventing Hacking
Many computing systems have recently suffered significantly from hacking and preventing hacking is important in protecting business, sensitive information and every day network com...
(Im)possible Futures
(Im)possible Futures
In a Western post – Cold War era, the pharmaceutical industry, state, and capitalism have merged to regulate gender and sexual normativity. According to Paul Preciado in Testo Junk...
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Ethical Hacking is a proactive approach to cybersecurity that involves authorizing and systematically testing information systems to find vulnerabilities before they can be exploit...
A Review Paper on Ethical Hacking
A Review Paper on Ethical Hacking
An ethical hacker is the network specialist & computer who pounce some security systems on the behalf of its possessor seeking amenability that could be exploited by a maliciou...
Ethical Hacking and Hacking Attacks
Ethical Hacking and Hacking Attacks
Nowadays, as all the information is available online, a large number of users are accessing it. Some of them use this information to gain knowledge, while others use it to learn ho...
Body Hacking and Conceptions of Corporeality
Body Hacking and Conceptions of Corporeality
This paper is the culmination of my independent research into the phenomenon of "body hacking": DIY techno-body modification that typically involves the surgical embedding of elect...
Critical Values Robust to P-hacking
Critical Values Robust to P-hacking
Abstract P-hacking is prevalent in reality but absent from classical hypothesis-testing theory. We therefore build a model of hypothesis testing that accounts for p-...

Back to Top