Open Access. Powered by Scholars. Published by Universities.®
- Keyword
Articles 1 - 2 of 2
Full-Text Articles in Higher Education
The Other Stares Back: Why “Visual Rupture” Is Essential To Gendered And Raced Bodies In Networked Knowledge Communities, Anita August
The Other Stares Back: Why “Visual Rupture” Is Essential To Gendered And Raced Bodies In Networked Knowledge Communities, Anita August
English Faculty Publications
This chapter addresses the Other’s Stare of gendered and raced bodies who visually rupture and resist their discursive formation in Networked Knowledge Communities (NKCs). New multimodal texts described as “texts that exceed the alphabetic and may include still and moving images, animations, color, words, music and sound” (Takayoshi & Selfe, 2007, p. 1), contribute greatly to the situated nature of knowledge production by NKCs in the postmodern “network society” (Castells, 1996). NKCs are learning communities that “proactively participate in building and advancing knowledges” (Gurung, 2014, p. 2). While NKCs are idealized as sites for progressive socio-political transformation, this chapter argues …
Visuality And The Difficult Differences In Networked Knowledge Communities, Anita August
Visuality And The Difficult Differences In Networked Knowledge Communities, Anita August
English Faculty Publications
This chapter argues that as Networked Knowledge Communities (NKCs) become increasingly the way knowledge is constructed, represented, and circulated, visuality in information-based societies is also being shaped, and shaped by, the interactive and collective ideologies of digital technology environments. Like the written text, which constructs and imposes hegemonic ideals of identity through discursive practices, visual representations of identities also serve as powerful discursive reservoirs of subordinating representations. By focusing on NKCs as an epistemic space that reflects, recirculates, and reacts to bodies of knowledge produced by the institutions of power in the larger social culture, this chapter examines the vulnerability …