<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-8027</journal-id>
<journal-title><![CDATA[LiminaR]]></journal-title>
<abbrev-journal-title><![CDATA[LiminaR]]></abbrev-journal-title>
<issn>1665-8027</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Ciencias y Artes de Chiapas, Centro de Estudios Superiores de México y Centroamérica]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-80272021000100057</article-id>
<article-id pub-id-type="doi">10.29043/liminar.v19i1.806</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[MUJERES HACKER, SABER-HACER Y CÓDIGO ABIERTO: TEJIENDO EL SUEÑO HACKFEMINISTA]]></article-title>
<article-title xml:lang="en"><![CDATA[HACKER WOMEN, KNOW-HOW, AND OPEN SOURCE: WEAVING THE HACKFEMINIST DREAM]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Soria-Guzmán]]></surname>
<given-names><![CDATA[Irene]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad del Claustro de Sor Juana  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<volume>19</volume>
<numero>1</numero>
<fpage>57</fpage>
<lpage>74</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-80272021000100057&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-80272021000100057&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-80272021000100057&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Este artículo da cuenta, de manera descriptiva, de algunas prácticas y saberes de las mujeres hacker en relación con el dominio y la apropiación de técnicas computacionales especializadas, a partir de una metodología feminista que supone la exploración situada de quien realiza esta investigación. Estos hallazgos, aunque aún en proceso de análisis, pretenden esbozar una posible apropiación tecnológica que aporte al movimiento feminista del siglo XXI, a través de los principios de la cultura hacker, para tejer una nueva y posible lucha hackfeminista.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This article gives a descriptive account of some of the practices and knowledge of women hackers in relation to the mastery and appropriation of specialized computational techniques, based on a feminist methodology that involves the situated exploration of the person conducting this research. These findings, although still in the process of analysis, aim to outline a possible technological appropriation that will contribute to the feminist movement of the 21st century, through the principles of hacker culture, to build a new and viable feminist hacker struggle.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[hackfeminismo]]></kwd>
<kwd lng="es"><![CDATA[cultura hacker]]></kwd>
<kwd lng="es"><![CDATA[tecnofeminismo]]></kwd>
<kwd lng="es"><![CDATA[mujeres y tecnología]]></kwd>
<kwd lng="es"><![CDATA[hacktivismo]]></kwd>
<kwd lng="es"><![CDATA[software libre]]></kwd>
<kwd lng="es"><![CDATA[apropiación tecnológica]]></kwd>
<kwd lng="en"><![CDATA[hacker feminism]]></kwd>
<kwd lng="en"><![CDATA[hacker culture]]></kwd>
<kwd lng="en"><![CDATA[techno-feminism]]></kwd>
<kwd lng="en"><![CDATA[women and technology]]></kwd>
<kwd lng="en"><![CDATA[hacktivism]]></kwd>
<kwd lng="en"><![CDATA[free software]]></kwd>
<kwd lng="en"><![CDATA[technological appropriation]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baroni Selaimen]]></surname>
<given-names><![CDATA[Graciela]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mujeres desarrolladoras de tecnologías: El desafío de las historias invisibles que viven entre ceros y unos]]></article-title>
<source><![CDATA[Internet en código femenino. Teorías y prácticas]]></source>
<year>2013</year>
<page-range>123-36</page-range><publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[La Crujía Ediciones]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blázquez Graf]]></surname>
<given-names><![CDATA[Norma]]></given-names>
</name>
<name>
<surname><![CDATA[Flores Palacios]]></surname>
<given-names><![CDATA[Fátima]]></given-names>
</name>
<name>
<surname><![CDATA[Ríos Everardo]]></surname>
<given-names><![CDATA[Maribel]]></given-names>
</name>
</person-group>
<source><![CDATA[Investigación feminista: epistemología, metodología y representaciones sociales]]></source>
<year>2012</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Centro de Investigaciones Interdisciplinares en Ciencias y Humanidades, Centro Regional de Investigaciones Multidisciplinarias-Universidad Nacional Autónoma de México]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boix]]></surname>
<given-names><![CDATA[Montserrat]]></given-names>
</name>
<name>
<surname><![CDATA[de Miguel]]></surname>
<given-names><![CDATA[Ana]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Los géneros en la red: Los ciberfeminismos. El ciberfeminismo social]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Almeida]]></surname>
<given-names><![CDATA[Virgilio]]></given-names>
</name>
<name>
<surname><![CDATA[Baeza Yates]]></surname>
<given-names><![CDATA[Ricardo]]></given-names>
</name>
<name>
<surname><![CDATA[Camarena]]></surname>
<given-names><![CDATA[María Inés]]></given-names>
</name>
<name>
<surname><![CDATA[Almeida]]></surname>
<given-names><![CDATA[Virgilio]]></given-names>
</name>
<name>
<surname><![CDATA[Baeza Yates]]></surname>
<given-names><![CDATA[Ricardo]]></given-names>
</name>
<name>
<surname><![CDATA[Camarena]]></surname>
<given-names><![CDATA[María Inés]]></given-names>
</name>
</person-group>
<source><![CDATA[The Role of Humanity in the Information Age: an Ibero-American Perspective]]></source>
<year>2002</year>
<publisher-loc><![CDATA[Santiago ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de Chile]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cox]]></surname>
<given-names><![CDATA[Geoff]]></given-names>
</name>
<name>
<surname><![CDATA[McLean]]></surname>
<given-names><![CDATA[Alex]]></given-names>
</name>
</person-group>
<source><![CDATA[Speaking Code: Coding as Aesthetic and Political Expression]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cruells López]]></surname>
<given-names><![CDATA[Eva]]></given-names>
</name>
<name>
<surname><![CDATA[Vergés Bosch]]></surname>
<given-names><![CDATA[Núria]]></given-names>
</name>
<name>
<surname><![CDATA[Haché]]></surname>
<given-names><![CDATA[Alex]]></given-names>
</name>
</person-group>
<source><![CDATA[Pueblos. Revista de Información y Debate]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Federici]]></surname>
<given-names><![CDATA[Silvia]]></given-names>
</name>
</person-group>
<source><![CDATA[Calibán y la bruja: Mujeres, cuerpo y acumulación originaria]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Traficantes de Sueños]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haché]]></surname>
<given-names><![CDATA[Alex]]></given-names>
</name>
<name>
<surname><![CDATA[Cruells López]]></surname>
<given-names><![CDATA[Eva]]></given-names>
</name>
<name>
<surname><![CDATA[Vergés Bosch]]></surname>
<given-names><![CDATA[Núria]]></given-names>
</name>
</person-group>
<source><![CDATA[Mujeres programadoras y mujeres hackers. Una aproximación desde Lela Coders]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Harding]]></surname>
<given-names><![CDATA[Sandra]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[¿Una filosofía de la ciencia socialmente relevante? Argumentos en torno a la controversia sobre el punto de vista feminista]]></article-title>
<source><![CDATA[Investigación feminista, epistemología, metodología y representaciones sociales]]></source>
<year>2010</year>
<page-range>39-68</page-range><publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Centro de Investigaciones Interdisciplinares en Ciencias y Humanidades, Centro Regional de Investigaciones Multidisciplinarias-Universidad Nacional Autónoma de México]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Himanen]]></surname>
<given-names><![CDATA[Pekka]]></given-names>
</name>
</person-group>
<source><![CDATA[La ética del hacker y el espíritu de la era de la información]]></source>
<year>2002</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Levy]]></surname>
<given-names><![CDATA[Steven]]></given-names>
</name>
</person-group>
<source><![CDATA[Hackers: Heroes of the Computer Revolution]]></source>
<year>1984</year>
<publisher-loc><![CDATA[Garden City ]]></publisher-loc>
<publisher-name><![CDATA[Anchor Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martín]]></surname>
<given-names><![CDATA[Mario Toboso]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Entre el uso y el no uso de la tecnología: un enfoque discursivo de la apropiación tecnológica]]></article-title>
<source><![CDATA[Intersticios. Revista Sociológica de Pensamiento Crítico]]></source>
<year>2013</year>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>201-14</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McKenzie]]></surname>
<given-names><![CDATA[Wark]]></given-names>
</name>
</person-group>
<source><![CDATA[A Hacker Manifesto]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Harvard ]]></publisher-loc>
<publisher-name><![CDATA[President and Fellows of Harvard College]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Natansohn]]></surname>
<given-names><![CDATA[Graciela]]></given-names>
</name>
</person-group>
<source><![CDATA[Internet en código femenino. Teorías y prácticas]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[La Crujía Ediciones]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Piñeiro]]></surname>
<given-names><![CDATA[Erik]]></given-names>
</name>
</person-group>
<source><![CDATA[The Aesthetics of Code: On Excellence in Instrumental Action]]></source>
<year>2003</year>
<publisher-loc><![CDATA[Estocolmo ]]></publisher-loc>
<publisher-name><![CDATA[Royal Institute of Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rivera Cusicanqui]]></surname>
<given-names><![CDATA[Silvia]]></given-names>
</name>
</person-group>
<source><![CDATA[Un mundo ch&#8217;ixi es posible. Ensayos desde un presente en crisis]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Tinta Limón]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rovira]]></surname>
<given-names><![CDATA[Guiomar]]></given-names>
</name>
</person-group>
<source><![CDATA[Activismo en red y multitudes conectadas. Comunicación y acción en la era de internet]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Barcelona ]]></publisher-loc>
<publisher-name><![CDATA[Icaria]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stallman]]></surname>
<given-names><![CDATA[Richard M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Software libre para una sociedad libre]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Traficantes de Sueños]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stiegler]]></surname>
<given-names><![CDATA[Bernard]]></given-names>
</name>
</person-group>
<source><![CDATA[La técnica y el tiempo]]></source>
<year>2002</year>
<publisher-loc><![CDATA[Hondarribia ]]></publisher-loc>
<publisher-name><![CDATA[Hiru]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tabet]]></surname>
<given-names><![CDATA[Paola]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las manos, los instrumentos, las armas]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Curiel]]></surname>
<given-names><![CDATA[Ochy]]></given-names>
</name>
<name>
<surname><![CDATA[Falquet]]></surname>
<given-names><![CDATA[Jules]]></given-names>
</name>
</person-group>
<source><![CDATA[El patriarcado desnudo. Tres feministas materialistas]]></source>
<year>2005</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Brecha Lésbica]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Terrell]]></surname>
<given-names><![CDATA[Josh]]></given-names>
</name>
<name>
<surname><![CDATA[Kofink]]></surname>
<given-names><![CDATA[Andrew]]></given-names>
</name>
<name>
<surname><![CDATA[Middleton]]></surname>
<given-names><![CDATA[Justin]]></given-names>
</name>
<name>
<surname><![CDATA[Rainear]]></surname>
<given-names><![CDATA[Clarissa]]></given-names>
</name>
<name>
<surname><![CDATA[Murphy-Hill]]></surname>
<given-names><![CDATA[Emerson]]></given-names>
</name>
<name>
<surname><![CDATA[Parnin]]></surname>
<given-names><![CDATA[Chris]]></given-names>
</name>
<name>
<surname><![CDATA[Stallings]]></surname>
<given-names><![CDATA[Jon]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Gender differences and bias in open source: Pull request acceptance of women versus men]]></article-title>
<source><![CDATA[PeerJ Computer Science]]></source>
<year>2017</year>
<volume>3</volume>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<article-title xml:lang=""><![CDATA[The Jargon File (version 4.4.7)]]></article-title>
<source><![CDATA[The Jargon File]]></source>
<year>2003</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<collab>UNESCO</collab>
<source><![CDATA[Descifrar el código: La educación de las niñas y las mujeres en ciencias, tecnología, ingeniería y matemáticas (STEM)]]></source>
<year>2019</year>
<publisher-name><![CDATA[Organización de las Naciones Unidas para la Educación, la Ciencia y la Cultura]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vergés Bosch]]></surname>
<given-names><![CDATA[Nuria]]></given-names>
</name>
<name>
<surname><![CDATA[Cruells Lopez]]></surname>
<given-names><![CDATA[Eva]]></given-names>
</name>
<name>
<surname><![CDATA[Haché]]></surname>
<given-names><![CDATA[Alex]]></given-names>
</name>
</person-group>
<source><![CDATA[Descifrando el Código LeLa: Accesos, usos y deseos de las mujeres tecnólogas]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wajcman]]></surname>
<given-names><![CDATA[Judith]]></given-names>
</name>
</person-group>
<source><![CDATA[El tecnofeminismo]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Valencia ]]></publisher-loc>
<publisher-name><![CDATA[Universitat de València]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wiener]]></surname>
<given-names><![CDATA[Norbert]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybernetics: Control and communication in the animal and the machine]]></source>
<year>1948</year>
<publisher-loc><![CDATA[Hoboken, Nueva Jersey ]]></publisher-loc>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
