ABSTRACT

The word “hacker” today conjures an image of a lonesome and shadowy figure in a basement, maliciously gaining access to personal computers to steal money or information. In reality, the term predates this narrow view, which can more accurately be described as a “security hacker” or “black hat hacker.” In truth, “hacking” enjoyed positive connotations for most of its tenure as a word. Activism can be upgraded, shared, open-sourced, blocked by firewalls, zipped, copied, and deleted. It is written in different languages, networked, maintained by a rotating cast of characters, and parts of it get infinitely reconfigured and reused in new projects. Accessibility and software go hand in hand; people's users must be able to access the software in order for it to be useful. Traditionally, people use a mouse and keyboard to interact with a computer, but the goal in this case was to expand this accessibility to people with limited mobility.