{"id":676,"date":"2012-06-08T10:42:46","date_gmt":"2012-06-08T10:42:46","guid":{"rendered":"http:\/\/asc-cybernetics.org\/2012\/?page_id=676"},"modified":"2012-06-12T16:19:32","modified_gmt":"2012-06-12T16:19:32","slug":"growing-boundary-objects-among-transcontextual-feminisms","status":"publish","type":"page","link":"https:\/\/asc-cybernetics.org\/2012\/?page_id=676","title":{"rendered":"Growing Boundary Objects: Among Transcontextual Feminisms"},"content":{"rendered":"<p>Participant: Katie King<br \/>\nAffiliation: Women\u2019s Studies, University of Maryland<br \/>\nFormat: Presentation and Conversation<br \/>\n<a href=\"http:\/\/asc-cybernetics.org\/2012\/?page_id=95\">Themes<\/a>: recursion, paradigm, praxis<\/p>\n<p>Bateson found himself among people from a range of knowledge worlds as he traveled among communities academic, new age, religious, artistic, and entrepreneurial. Today we use the term transdisciplinary to describe such movements. (Thompson Klein 2004) How we know anything, Bateson famously said, means that in \u201cthe pronoun we, I of course included the starfish and the redwood forest, the segmenting egg, and the Senate of the United States.\u201d (Bateson 1979:4)<br \/>\nNot surprisingly communication tangles are something he endured, analyzed, humorously told stories about, and otherwise worked among reflectingly and recursively. His paradigm-altering work on double bind theory considered carefully how \u201cboth those whose life is enriched by transcontextual gifts and those who are impoverished by transcontextual confusions are alike in one respect: for them there is often a \u2018double take.\u201d A falling leaf [or] the greeting of a friend\u2026is not \u2018just that and nothing more.\u2019\u201d (1972:272)<\/p>\n<p>Such reflective analysis of \u201cthe transcontextual syndrome\u201d inspired feminist theorist Susan Leigh Star, who, in a last essay before her sudden death in 2011, defined her concept \u201cboundary objects\u201d as \u201corganic infrastructures\u201d that address \u201c\u2018information and work requirements\u2019 as perceived locally and by groups that wish to cooperate.\u201d (Star 2010:602; Star &#038; Griesemer 1989, Star &#038; Ruhleder 1996, Bowker &#038; Star 1999)<\/p>\n<p>Feminists and Bateson-style systems analysts should find in Star\u2019s work an inspiration for practices for \u201cgrowing\u201d boundary objects, for inverting paradigms presuming that first we build consensus and then we can cooperate. Star offers us \u201csteps toward an ecology of infrastructure\u201d sensitive to anomaly. \u201cHaunting social justice\u201d are, she says, \u201cthe battles and dramas between\u2026 the standardized and the wild.\u201d (Star 2010:614) A recursive humor makes clear that the concept of boundary object is itself a boundary object\u2026.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Participant: Katie King Affiliation: Women\u2019s Studies, University of Maryland Format: Presentation and Conversation Themes: recursion, paradigm, praxis Bateson found himself among people from a range of knowledge worlds as he traveled among communities academic, new age, religious, artistic, and entrepreneurial. &hellip; <a href=\"https:\/\/asc-cybernetics.org\/2012\/?page_id=676\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":26,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-676","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/pages\/676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=676"}],"version-history":[{"count":3,"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/pages\/676\/revisions"}],"predecessor-version":[{"id":837,"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/pages\/676\/revisions\/837"}],"up":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=\/wp\/v2\/pages\/26"}],"wp:attachment":[{"href":"https:\/\/asc-cybernetics.org\/2012\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}