中国365bet中文官网

Specific subjects of study or work

Information technology and software development

Background:

Some workers in software development and information technology have been pushing for technical documentation to use more inclusive terminology. During racial protests starting in 2020 after George Floyd鈥檚 murder, this movement gained more momentum, and technology professionals began suggesting alternatives for terms such as 鈥渕aster鈥� and 鈥渟lave,鈥� which were commonly used to describe a variety of hierarchical systems and which can normalize and trivialize slavery when used metaphorically (see also 鈥淎void language that perpetuates racial or ethnic stereotypes or is rooted in violence against these groups鈥�). Groups such as the have looked at terminology holistically, reviewing whether terms exclude people on the basis of gender, disability, and other factors.

The for inclusive language, as has the , a branch of the Academy of Motion Picture Arts and Sciences. Several universities have followed suit and developed their own inclusive language projects, such as the and .

Using more inclusive terms can make people feel more welcome and accepted and be clearer鈥攗sing straightforward terms instead of metaphors makes the meaning more widely understood. In some instances, regardless of whether a term is exclusionary, a replacement is more precise. For example, people have debated whether 鈥渄ummy value鈥� is ableist鈥攚hether it reinforces stereotypes against people with disabilities because of the historical use of 鈥渄ummy鈥� as an insult. But an alternative, regardless of whether 鈥渄ummy value鈥� is exclusionary. Similarly, some groups also think violent words like "kill" and "nuke" should be replaced because their violent associations are distracting, but on top of that, alternatives like 鈥渉alting a process鈥� and 鈥渄eleting files鈥� are more direct.

Recommendation:

See the table below for a selection of terms to use in place of problematic ones in IT. This is not a comprehensive list of all exclusionary terms in IT or software. Rather, the list is intended to highlight the main problematic terms and spark reflection on the impact of language used in IT. When deciding when to replace terms, think critically about whether the term excludes people or reinforces stereotypes and whether an alternative would be clearer. Consider adopting a set of principles, like the , to help guide decisions about terminology.

Avoid

Use

Notes

black box

closed box

mystery box

Context:听 A device, system, or object that produces useful information without revealing any information about its internal workings

See also 鈥淎void associating 鈥榖lack鈥� or darkness with bad, and 鈥榳hite鈥� or lightness with good.鈥�

blacklist and whitelist

block list and allow list

reject list and accept list

prohibit list and permit list

deny list and safe list

(or any combination of these)

Context: Permissions, publishing

See also 鈥淎void associating 鈥榖lack鈥� or darkness with bad, and 鈥榳hite鈥� or lightness with good.鈥�

cripple

hinder

Context: Cybersecurity

See also 鈥淎void using disability-related terms to describe something negative.鈥�

dark pattern

deceptive pattern

Context: Thread signaling, user interface and user experience design

See also 鈥淎void associating 鈥榖lack鈥� or darkness with bad, and 鈥榳hite鈥� or lightness with good.鈥�

dummy value

placeholder value

sample value

Context: Testing

male and female connectors

plug and socket

Context: Hardware

Note: Framing 鈥渕ale鈥� and 鈥渇emale鈥� as opposites enforces the gender binary. See also 鈥淣ot implying that gender is a binary construct.鈥�

man hours

person hours

Context: Resourcing and scheduling

See also 鈥淕ender-neutral language.鈥�

man in the middle

attacker in the middle

machine in the middle

Context: Cryptographic attacks

See also 鈥淕ender-neutral language.鈥�

master and slave

primary and secondary

main and replica

parent and child

Context: Hierarchal services

See also 鈥淎void language that perpetuates racial or ethnic stereotypes or is rooted in violence against these groups.鈥�

mom test, girlfriend test

test with novice users

usability test

Context: User testing

Note: Associating a mom or girlfriend with beginners perpetuates the stereotype that women aren鈥檛 skilled with technology.

sanity check

quick check

confidence check

coherence check

Context: Quality control

See also 鈥淎void using disability-related terms to describe something negative.鈥�

agile lead

agile team facilitator

Scrum leader

Scrum facilitator

Context: Project or product management

See also 鈥淎void language that perpetuates racial or ethnic stereotypes or is rooted in violence against these groups.鈥�

webmaster

web product owner

Context: Website development

See also 鈥淎void language that perpetuates racial or ethnic stereotypes or is rooted in violence against these groups.鈥�

white hat, black hat, and gray hat

benign, malicious, and hacktivist

Context: Security hacking

See also 鈥淎void associating 鈥榖lack鈥� or darkness with bad, and 鈥榳hite鈥� or lightness with good.鈥�


Resources on inclusive language for specific subjects of study or work

  • .
  • Knodel, M., and N. ten Oever. Internet Engineering Task Force Internet-Draft draft-knodel-terminology-10, July 11, 2022.
  • Lee, Angeline. Medium, Aug. 19, 2020.
  • UK Finance, EY, and Microsoft. . 2021.
  • University of Washington. Last modified Aug. 8, 2022.