Dangerous protocols
nayafia.substack.com
Dangerous protocols
when computer scientists rely on their own limited intuitions to design systems, rather than engage theories that show how identities are “enacted, contextual, imaginative, and infrastructural,” they are likely to perpetuate patterns of discrimination and disenfranchisement.