Initialise (Key Ideas)

  • Brian Alleyne


This chapter sets out the key terms and concepts that shape this book. This chapter defines geeks, hackers, culture, and social relations and then moves on to outline the idea of distinctive geek culture. This chapter then discusses the methodology and source materials that informed this work.


Geek Hacker Geek culture Narrative 


  1. Abbott, H. P. (2008). The Cambridge Introduction to Narrative (2nd ed.). Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  2. Alberts, G., & Oldenziel, R. (Eds.). (2014). Hacking Europe: From Computer Cultures to Demoscenes. Springer: London.Google Scholar
  3. Alleyne, B. (2015). Narrative Networks: Storied Approaches in a Digital Age. Thousand Oaks: SAGE Publications.CrossRefGoogle Scholar
  4. Banks, S. P., & Banks, A. (Eds.). (1998). Fiction and Social Research: By Ice or Fire. Thousand Oaks: SAGE Publications Ltd.Google Scholar
  5. Barthes, R. (1993a). Introduction to the Structural Analysis of Narrative. In S. Sontag (Ed.), A Roland Barthes Reader (pp. 351–295). London: Vintage.Google Scholar
  6. Barthes, R. (1993b). Myth Today. In S. Sontag (Ed.), A Barthes Reader (pp. 93–149). London: Vintage.Google Scholar
  7. Berger, R. J., & Quinney, R. (2005). Storytelling Sociology: Narrative as Social Inquiry. Boulder, CO: Lynne Rienner Publishers.Google Scholar
  8. Bergman, G., & Lambert, J. (2010). Geektionary: From Anime to Zettabyte, An A to Z Guide to All Things Geek. Adams Media.Google Scholar
  9. Berry, D. M. (2007). The Contestation of Code: A Political Economy of Free Software and Open Source. Brighton: University of Sussex.Google Scholar
  10. Bettelheim, B. (1991). The Uses of Enchantment: The Meaning and Importance of Fairy Tales (New ed.). New York: Penguin.Google Scholar
  11. Boynton, R. (2005). The New New Journalism: Conversations with America’s Best Nonfiction Writers on Their Craft. New York: Vintage Books.Google Scholar
  12. Bruner, J. (1991). The Narrative Construction of Reality. Critical Inquiry, 18, 1–21. Retrieved from Scholar
  13. Campbell, J. (1993). The Hero with a Thousand Faces. London: Fontana.Google Scholar
  14. Carrithers, M. (1992). Why Humans Have Cultures: Explaining Anthropology and Social Diversity. Oxford: Oxford University Press.Google Scholar
  15. Chatman, S. (1978). Story and Discourse: Narrative Structure in Fiction and Film. Ithaca, NY: Cornell University Press.Google Scholar
  16. Coleman, G. (2012). Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton: Princeton University Press.CrossRefGoogle Scholar
  17. Denzin, N. (1997). Interpretive Ethnography: Ethnographic Practices for the 21st Century. Thousand Oaks and London: Sage.CrossRefGoogle Scholar
  18. Downey, J., & Fenton, N. (2003). New Media, Counter Publicity and the Public Sphere. New Media & Society, 5(2), 185.CrossRefGoogle Scholar
  19. Downing, J. (2001). Radical Media: Rebellious Communication and Social Movements. Thousand Oaks, CA and London: Sage Publications.Google Scholar
  20. Eagleton, T. (2016). Culture. New Haven, CT: Yale University Press.Google Scholar
  21. Edwards, K. (2005). An Economic Perspective on Software Licenses – Open Source, Maintainers and User-Developers. Telematics and Informatics, 22(1–2), 111–133. Retrieved from Scholar
  22. Elliott, J. (2005). Using Narrative in Social Research: Qualitative and Quantitative Approaches. London: SAGE.CrossRefGoogle Scholar
  23. Fairclough, N. (2003). Analysing Discourse: Textual Analysis for Social Research. London: Routledge.CrossRefGoogle Scholar
  24. Fairclough, N. (2010). Critical Discourse Analysis: The Critical Study of Language (2nd ed.). Harlow: Longman.Google Scholar
  25. Feineman, N. (2005). Geek Chic: The Ultimate Guide to Geek Culture. Corte Madera, CA: Gingko Press.Google Scholar
  26. Fuller, M. (Ed.). (2017). How to Be a Geek: Essays on the Culture of Software. Cambridge, UK and Malden, MA: Polity Press.Google Scholar
  27. Galloway, A. R., & Thacker, E. (2007). The Exploit: A Theory of Networks. Minneapolis: University of Minnesota Press.Google Scholar
  28. Goto, S. T. (1997). Nerds, Normal People, and Homeboys: Accommodation and Resistance Among Chinese American Students. Anthropology & Education Quarterly, 28(1), 70–84. Retrieved from
  29. Hatch, J. A., & Wisniewski, R. (1995). Life History and Narrative: Questions, Issues, and Exemplary Works. In J. A. Hatch & R. Wisniewski (Eds.), Life History and Narrative. London: Falmer.Google Scholar
  30. Haywood, D. (2013). The Ethic of the Code: An Ethnography of a ‘Humanitarian Hacking’ Community. The Journal of Peer Production, 3, 1–10. Retrieved from
  31. Jenkins, R. (2014). Social Identity (4th ed.). New York: Routledge.CrossRefGoogle Scholar
  32. Jordan, T. (2004). Hacktivism and Cyberwars: Rebels with a Cause? New York, NY: Routledge.Google Scholar
  33. Jordan, T. (2008). Hacking: Digital Media and Technological Determinism. Cambridge: Polity.Google Scholar
  34. Jordan, T. (2017). A Genealogy of Hacking. Convergence, 23(5), 528–544. Scholar
  35. Kahn, R., & Kellner, D. (2004). New Media and Internet Activism: From the ‘Battle of Seattle’ to Blogging. New Media & Society, 6(1), 87–95. Scholar
  36. Kelty, C. (2005). Geeks, Social Imaginaries, and Recursive Publics. Cultural Anthropology, 20(2), 185–214. Scholar
  37. Kelty, C. M. (2008). Two Bits: The Cultural Significance of Free Software and the Internet. Durham: Duke University Press.CrossRefGoogle Scholar
  38. Kendall, L. (2000). ‘Oh No! I’m a Nerd!’: Hegemonic Masculinity on an Online Forum. Gender and Society, 14(2), 256–274. Retrieved from
  39. Kendall, L. (2011). ‘White and Nerdy’: Computers, Race, and the Nerd Stereotype. Journal of Popular Culture, 44(3), 505–524. Scholar
  40. Kennedy, K. (2015). Medieval Hackers. Cincinnati and North Charleston: Punctum Books CreateSpace Independent Publishing Platform [Distributor]. Retrieved from
  41. Kramer, M., & Call, W. (2007). Telling True Stories: A Nonfiction Writers’ Guide from the Nieman Foundation at Harvard University. New York: Plume Books.Google Scholar
  42. de Laat, P. B. (2005). Copyright or Copyleft?: An Analysis of Property Regimes for Software Development. Research Policy (In Press, Corrected Proof). Retrieved from
  43. Lawler, S. (2013). Identity: Sociological Perspectives (2nd ed.). Cambridge: Polity Press.Google Scholar
  44. Lemert, C. (1994). Dark Thoughts About the Self. In C. Calhoun (Ed.), Social Theory and the Politics of Identity. Oxford: Blackwell.Google Scholar
  45. Levy, S. (2010). Hackers: Heroes of the Computer Revolution – 25th Anniversary Edition (1st ed.). Newton: O’Reilly Media.Google Scholar
  46. Lin, Y., & University of York. (2004). Hacking Practices and Software Development: A Social Worlds Analysis of ICT Innovation and the Role of Free/Libre Open Source Software. York: University of York.Google Scholar
  47. Lovink, G. (2011). Networks Without a Cause: A Critique of Social Media. Cambridge: Polity.Google Scholar
  48. Manovich, L. (2013). Software Takes Command. London: Bloomsbury Academic.Google Scholar
  49. Maxwell, J. A. (2005). Qualitative Research Design: An Interactive Approach (2nd ed.). Thousand Oaks: Sage Publications Inc.Google Scholar
  50. McCain, J., Gentile, B., & Campbell, W. K. (2015). A Psychological Exploration of Engagement in Geek Culture. PLoS One, 10(11), e0142200. Scholar
  51. Mills, C. W. (2000). The Sociological Imagination. Oxford: Oxford University Press.Google Scholar
  52. Oswell, D. (Ed.). (2010). Cultural Theory (Four-Volume Set). Sage Publications Ltd.Google Scholar
  53. Polkinghorne, D. E. (1988). Narrative Knowing and the Human Sciences (L. Langsdorf, Ed.). Albany: State University of New York Press.Google Scholar
  54. Richardson, L. (1990a). Narrative and Sociology. Journal of Contemporary Ethnography, 19(1), 116–135. Scholar
  55. Richardson, L. (1990b). Writing Strategies: Reaching Diverse Audiences. Thousand Oaks: Sage Publications Inc.CrossRefGoogle Scholar
  56. Riessman, C. K. (2008). Narrative Methods for the Human Sciences. Thousand Oaks: SAGE Inc.Google Scholar
  57. Schrock, A. R. (2016). Civic Hacking as Data Activism and Advocacy: A History from Publicity to Open Government Data. New Media & Society, 18(4), 581–599. Scholar
  58. Smith, P., & Riley, A. (2008). Cultural Theory: An Introduction (2nd ed.). Malden, MA and Oxford: Wiley-Blackwell.Google Scholar
  59. Söderberg, J. (2008). Hacking Capitalism: The Free and Open Source Software Movement. London: Routledge.Google Scholar
  60. Sorell, T. (2015). Human Rights and Hacktivism: The Cases of Wikileaks and Anonymous. Journal of Human Rights Practice, 7(3), 391–410. Scholar
  61. Stromberg, P. G. (1990). Ideological Language in the Transformation of Identity. American Anthropologist, 92(1), 42–56. Retrieved from Scholar
  62. Stromberg, P. G. (2008). Language and Self-Transformation: A Study of the Christian Conversion Narrative (New ed.). Cambridge University Press.Google Scholar
  63. Tanczer, L. M. (2016). Hacktivism and the Male-Only Stereotype. New Media & Society, 18(8), 1599–1615. Scholar
  64. Turner, F. (2006). From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism. Chicago, IL: University of Chicago Press.CrossRefGoogle Scholar
  65. Vogler, C. (2007). The Writer’s Journey: Mythic Structure for Writers. Studio City, CA: Michael Wiese Productions.Google Scholar
  66. Webster, L., & Mertova, P. (2007). Using Narrative Inquiry as a Research Method: An Introduction to Using Critical Event Narrative Analysis in Research on Learning and Teaching (New ed.). London: Routledge.CrossRefGoogle Scholar
  67. Williams, R. (1990). Keywords: A Vocabulary of Culture and Society (Fourth impression 1990). London: Fontana Press.Google Scholar
  68. Woo, B. (2018). Getting a Life: The Social Worlds of Geek Culture. Kingston: McGill-Queen’s University Press.Google Scholar

Copyright information

© The Author(s) 2019

Authors and Affiliations

  • Brian Alleyne
    • 1
  1. 1.Department of SociologyGoldsmiths, University of LondonLondonUK

Personalised recommendations