buy viagra super active<\/a><\/div>\nhiefly been associated with software development. This is now changing as new walks of life are being explored with a hacker mindset, thus bringing back to memory the origin of hacking in hardware development. Now as then, the hacker is characterised by an active approach to technology, undaunted by hierarchies and established knowledge, and finally a commitment to sharing information freely. In this special issue of Critical Studies in Peer Production, we will investigate how these ideas and practices are spreading. Two cases which have caught much attention in recent years are open hardware development and garage biology. The creation of hacker\/maker-spaces in many cities around the world has provided an infrastructure facilitating this development. We are looking for both empirical and theoretical contributions which critically engage with this new phenomenon. Every kind of activity which relates to hacking is potentially of interest. Some theoretical questions which might be discussed in the light of this development include, but are not restricted to, the politics of hacking, the role of lay expertise, how the line between the community and markets is negotiated, how development projects are managed, and the legal implications of these practices. We welcome contributions from all the social sciences, including science & technology studies, design and art-practices, anthropology, legal studies, etc.<\/p>\n
Interested authors should submit an abstract of no more than 500 words by July 20, 2011. Authors of accepted papers will be notified by July 31. All papers will be subject to peer review before being published.<\/p>\n
Abstracts should be sent to delfanti@sissa.it.<\/p>\n
Critical Studies in Peer Production (CSPP) is a new open access, online journal that focuses on the implications of peer production for social change. <\/p>\n\n","protected":false},"excerpt":{"rendered":"
Deadline: July 20, 2011 Bio-punks, open hardware, and hackerspaces Edited by: Johan S\u00f6derberg and Alessandro Delfanti Call: 500-word abstract Both theoretical and empirical contributions accepted During the past two decades, hacking has c buy viagra super active hiefly been associated with software development. This is now changing as new walks<\/p>\n
Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8],"tags":[],"_links":{"self":[{"href":"http:\/\/peerproduction.net\/editsuite\/wp-json\/wp\/v2\/posts\/131"}],"collection":[{"href":"http:\/\/peerproduction.net\/editsuite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/peerproduction.net\/editsuite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/peerproduction.net\/editsuite\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/peerproduction.net\/editsuite\/wp-json\/wp\/v2\/comments?post=131"}],"version-history":[{"count":22,"href":"http:\/\/peerproduction.net\/editsuite\/wp-json\/wp\/v2\/posts\/131\/revisions"}],"predecessor-version":[{"id":726,"href":"http:\/\/peerproduction.net\/editsuite\/wp-json\/wp\/v2\/posts\/131\/revisions\/726"}],"wp:attachment":[{"href":"http:\/\/peerproduction.net\/editsuite\/wp-json\/wp\/v2\/media?parent=131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/peerproduction.net\/editsuite\/wp-json\/wp\/v2\/categories?post=131"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/peerproduction.net\/editsuite\/wp-json\/wp\/v2\/tags?post=131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}