1 of 5

Journey Toward Eliminating Oppressive Language

EDUCAUSE IT Communications CG Coffee Shop

With the support of many other CGs…�Oct. 6, 2020

2 of 5

Panelists

SARA STUBBS

University of Oregon

SCOTT EMERY

Oregon State University

JOEL F. W. PRICE

Swarthmore College

STAN NORTH MARTIN

NC State University

Moderator

With thanks to GREG STAUFFER, U of Colorado Boulder, for the back-end support

3 of 5

Resource Document

Thanks to those who contributed! �Please continue to add to it...

4 of 5

Potential Alternative Terminology

  • whitelist → allow list or approved
  • blacklist → block list or denied
  • master/slave → primary/replica, � parent/child, active/passive,� primary/secondary, trunk/branch
  • whitehat hacker → ethical hacker
  • blackhat hacker → criminal, unethical hacker
  • gray hat hacker → hacktivist
  • grandfather → legacy

  • blackbox → closed box, mystery box
  • whitebox → open box, clear box
  • red team → cyber offense
  • white team → cyber exercise cell
  • yellow team → DevSecOps team
  • gray beard → the individual’s name
  • mob programming → team, swarm, troop
  • whitespace → empty space

Gathered from multiple sources...

5 of 5

Contact info