Values in Information Technology and Digital Media
INFO 5325
Wednesday 9:30AM - 12:00PM
Fall 2016
Helen Nissenbaum, Information Science: Cornell Tech
About the course:
Computing, information technology, and digital media are integrated into all aspects of contemporary life including commerce, finance, education, politics, entertainment, communication, and social life. This project-based course studies these technologies through the lens of social, political, and ethical values investigating whether and how technical systems promote or impede values to which we, individually and as societies, are committed, values, such as liberty, privacy, autonomy, and justice. While we explore concepts and literatures, students will form collaborative groups, articulate projects and apply philosophical and social theories of technology to analyze, design, and possibly build systems to demonstrate connections between technology and values. Ideal project groups will be multidisciplinary and project goals and deliverables will be adjusted to the disciplinary and methodological strengths and skills.
The course welcomes students with varied backgrounds and skills with prior understanding of, and experience with either computing (e.g. programming, website creation, active blogging, etc.) or social, political, and ethical analysis is recommended. It assumes that students are deeply interested in ethical and political issues relating to digital technologies and digital media as they affect individual lives and societies – issues, such as privacy, intellectual property, freedom of speech, and social justice.
Intended Learning Outcomes
Students who successfully complete this course will be able to:
Recognize how and to what extent values are implicated in technical artifacts, incidentally or by design.
Engage critically with everyday technical systems.
Recognize instances of design that seem to elevate or obstruct certain values.
Engage actively with values embodied in particular systems or devices so as to recognized alternative designs with differing values implications.
Engage with fundamental concepts in the philosophy and social study of technology.
Critically analyze key social and political issues surrounding contemporary digital information systems and networks, e.g. privacy, intellectual property, freedom of speech.
Demonstrate conceptually or by prototype the values implications of particular design choices in particular systems.
An ability to think rigorously and systematically about values relevant to technical systems and features of systems.
Teaching and Learning Methodologies
Classes will comprise a variety of activity including instructor presentation, group discussion of readings, and individual and small group presentation of mini-projects. Instructor and group discussions will focus on concepts and arguments drawn from weekly reading assignments. After the first few foundation-setting class sessions, a segment of each class will be devoted to planning group projects: assembling students into collaborative pairs or threesomes, selecting topics, honing project goals, etc.
Reading
Course readings are essential to the class. It is crucial for all students to complete reading assignments before class meetings. I strongly encourage written notes annotated with page numbers, both to engage in discussion and, later, as sources written work. Students will be asked to post readings' responses to the course website. Readings vary considerably in discipline and level of difficulty; how challenging they are to students will depend on respective background familiarity with concepts, theories, and arguments. How much students benefit and learn from this course will depend heavily on how much efforts you invest in grappling and mastering the readings.
Grading Elements:
Participation: 20%
One in-class presentations and write-up; one special photo assignment 20%
Final project: design and presentation (group) 30%
Final project: essay (8-10) pages 30%
A passing grade is needed for each element of the course. Missed deadlines will result in grade deductions at Instructor’s discretion.
Schedule |
| |
Aug 24 | Introduction to the Course |
| We will review course: aims, mechanics, requirements, key concepts and projects. As a warm-up, we will watch the documentary Objectified.
Instructor will review past student projects to illustrate the nature and scope of required term projects. We will also discuss a number of possible project ideas that will be explored in later classes. We will also set up the schedule for in-class presentations that student-pairs will undertake at each session.
|
| Readings |
| Foster, E.M. "The Machine Stops," in The Oxford and Cambridge Review (November 1909).
| | |
Aug 31 | The Idea of Values in Technology |
| Langdon Winner's provocative thesis, that technologies have politics has inspired generations of scholars and designers, those who believe him right as well as those who would seek to disprove him. In this session, we study the article, critically, to understand the views it contradicts and the scope of its positive thesis. Winner's ideas serve as a jumping off point for other readings in this and future sessions. |
| Readings: |
| Winner, L. "Do Artifacts Have Politics?" The Whale and the Reactor. Chicago: The University of Chicago Press, 1986, 19-39 |
| Postman, N. "Five Things We Need to Know About Technological Change."
| | Nissenbaum, H. "How Computer Systems Embody Values," Computer, March 2001.
| | Weber, R. "Manufacturing Gender in Military Cockpit Design." The Social Shaping of Technology. Eds. MacKenzie, D. and J. Wajcman. Milton Keynes: Open University Press, 1985.
| | |
Sept 7 | Bias |
| One way that computers and other digital technologies may affect individuals and societies is by slanting outcomes in favor or some and against others. For those who are inclined to believe that technologies are "objective," coming to terms with bias in systems is a challenge. We examine the nature of bias in computer systems and focus on the case of search engines. |
| Readngs: |
| Friedman, B. & Nissenbaum, H. "Bias in Computer Systems." ACM Transactions on Information Systems 14:3 (1996): 330-347
| | Grimmelman, J. "Some Skepticism about Search Neutrality" The Next Digital Decade: Essays on the Future of the Internet (TechFreedom 2010)
| | Waters, R. "Unrest Over Google's Secret Formula", Financial Times, July 11, 2010
| | Mayer, M. "Do Not Neutralize the Web's Endless Search," Financial Times, July 14, 2010
| | Pasquale, F. "The Emperor's New Codes: Reputation and Search Algorithms in the Finance Sector," (draft) Presented at Governing Algorithms Conference, New York University 2013 [Sections I, II, and VI] | | |
Sept 14 | The Practical Turn |
| For some, the idea is obvious: if technical systems and devices embody values, the designers and creators of these technologies should be able to take a proactive stance and think about values in the process of developing technologies. In this session, we are introduced to this idea, which forms the premise of your projects. However, in the sessions that follow, this idea will be complicated by theoretically inspired challenges. |
| Readings: |
| Flanagan, M., D. Howe, and H. Nissenbaum, "Values at Play: Design Tradeoffs in Socially Oriented Games." In Information Technology and Moral Philosophy, Eds. Jeroen van den Hoven and John Weckert, Cambridge: Cambridge University Press, 2008.
| | Perry, J., Macken, E., Scott, N. and J. McKinley. "Disability, Inability, and Cyberspace." Human Values and the Design of Computer Technology. Ed. Batya Friedman. New York: Cambridge University Press, 1997. 65-90.
| | Howe, D. and H. Nissenbaum, "TrackMeNot: Resisting Surveillance in Web Search," In Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, Eds. I. Kerr, C. Lucock, and V. Steeves, Oxford: Oxford University Press, 2009.
| | |
Sept 21 | IT Bettering Humans? |
| Architecture and design have often reflected our aspirations from Jeremy Bentham's famous Panopticon design for prisons and schools to contemporary mobile devices, such as, Fitbits. In this week's readings, we will review some examples, at the same time as we seek to understand how technology may be engaged in mediating behavior change deemed positive. |
| Readings: |
| Bentham, Jeremy. "Panopticon; or the Inspection House." The Panopticon Writings. New York: Verso, 1995. 31-37. |
| Weinberg, Alvin M. "Can Technology Replace Social Engineering." Controlling Technology: Contemporary Issues. Ed. W. B. Thompson. Buffalo, NY: Prometheus Books, 1991. 41-48.
| | Benkler, Y. and H. Nissenbaum (2006), "Commons-based Peer Production and Virtue." Journal of Political Philosophy, 14(4), 394-419.
| | Froehlich, Jon, Tawanna Dillahunt, Predrag Klasnja, Jennifer Mankoff, Sunny Consolvo, Beverly Harrison, and James A. Landay. "Ubigreen: Investigating a Mobile Tool for Tracking and Supporting Green Transportation Habits." Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2009.
| | |
Sept 28 | Affordance and Constraint |
| This session again focuses on how technology engages users to produce certain reactions and outcomes. The work of Donald Norman, one of the founders of the field of usability studies, reveals how technologies are understood by people and through this understanding selectively affords and constrains certain behaviors. Although Norman does not deal with values, his work is instructive for all designers, including those who wish to make values one of the considerations in their designs. |
| Readings: |
| Gibson, J. "The Theory of Affordances." The Ecological Approach to Visual Perception, Hillsdale, New Jersey: Lawrence Erlbaum Associates, Publishers, 127-143.
| | Norman, Donald. The Design of Everyday Things, New York: Doubleday, 1989, 1-33, 81-104.
| | Photo gallery of everyday things: affordances and constraints.
| | |
Oct 5 | Persuading and Provoking Critical Reflection |
| There are various ways that technology may "embody" social, ethical, and political values. In some instances, it is to afford and constrain behaviors, in others it is to suggest desired outcomes. For proponents of design for critical reflection, the goal is to provoke thought and awareness and through thought and awareness to strive for ideals and positive human, social, and environmental values. |
| Readngs: |
| Sengers,P., Boehner, K., David, S. and Kaye, J. "Reflective Design," Proceedings of the 4th Decennial Conference on Critical Computing, 2005, 49-58
| | Fogg, B. J., Gregory Cuellar, and David Danielson. "Motivating, influencing, and persuading users." The human-computer interaction handbook: fundamentals, evolving technologies and emerging applications, L. Erlbaum Associates Inc., Hillsdale, NJ (2002).
| | Irani, L. C., and M. Six Silberman. "Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical Turk." Proceedings of the SIGCHI Conf. on Human Factors in Computing Systems, 2013.
| | |
Oct 12 | No class |
| |
Oct 19 | Sociotechnical Imbroglios |
| Some philosophers of technology resist the sharp distinction between humans, on the one hand, and technology, on the other. Instead, they argue we should think of a complex of sociotechnical systems where the actors are sometimes interchangeably technical or biological. Actor-Network Theory subscribes to this core idea. Whether or not one accepts all of its precepts, there is value in many of the constituent insights. |
| Readings: |
| Johnson, J. (B. Latour) "Mixing Humans and Nonhumans Together: The Sociology of a Door-Closer." Social Problems, Vol. 35, No. 3, Special Issue: The Sociology of Science and Technology (Jun., 1988), pp. 298-310 |
| Lessig, L. "The Law of the Horse: What Cyberspace Might Teach," Harvard Law Rev. 113, 501 (1999).
| | Kerr, I. "Digital Locks and the Automation of Virtue." From Radical Extremism" to "Balanced Copyright": Canadian Copyright and the Digital Agenda. Toronto, ON: Irwin Law, 247-303, 2010.
| | Rubinstein, I. and N. Good, "Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents," Berkeley Technology Law Journal, Vol 28:1333.
| | Selections from The Living Internet (especially Internet, Web, Email MUDs: History, Design, Use).
| | Privacy Awareness App
| | |
Oct 26 | Sociotechnical Imbroglios II |
| Some philosophers of technology resist the sharp distinction between humans, on the one hand, and technology, on the other. Instead, they argue we should think of a complex of sociotechnical systems where the actors are sometimes interchangeably technical or biological. Actor-Network Theory subscribes to this core idea. Whether or not one accepts all of its precepts, there is value in many of the constituent insights. |
| Readings: |
| Johnson, J. (B. Latour) "Mixing Humans and Nonhumans Together: The Sociology of a Door-Closer." Social Problems, Vol. 35, No. 3, Special Issue: The Sociology of Science and Technology (Jun., 1988), pp. 298-310 |
| Lessig, L. "The Law of the Horse: What Cyberspace Might Teach," Harvard Law Rev. 113, 501 (1999).
| | Selections from The Living Internet (especially Internet, Web, Email MUDs: History, Design, Use).
| | |
Nov 2 | What, Whose Values in Technology |
| A question of concern is what values we are talking about when we recommend that designers taking values into consideration in the systems they create. This question is particularly important for global IT and digital networks whose uses and effects spread across the globe and across nations and cultures. |
| Readings: |
| Berlin, I. "The Crooked Timber of Humanity." (1991) The Crooked Timber of Humanity: Chapters in the History of Ideas. Ed. H. Hardy. New York: Knopf, 1-19. |
| [optional] Nagel, T. "The Fragmentation of Value." Mortal Questions. Cambridge, MA: Cambridge University Press, 1979. 128-141.
| | Case: Constitution of the United States of America: Bill of Rights.
| | |
Nov 9 | Social Construction of Technology |
| Against the idea that technology, itself, is political social constructivists argue that social factors alone are responsible for the political direction of systems and devices. Social constructivist might resist "the practical turn," saying it is impossible for technology design to have determinate effects that are social in nature. This week and in weeks following we will examine several versions of this position, starting with SCOT (social construction of technology), associated primarily with Wiebe Bijker and Trevor Pinch. |
| Readings: |
| Pinch, Trevor & W. Bijker. [selections] "The Social Construction of Facts and Artifacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other." Shaping Technology/Building Society. Ed. Bijker & Law. Cambridge, MA: MIT Press, 1992 [pp. 404-409;410-419;421-425;426-428].
| | Gillespie, Tarleton. "The Politics of 'Platforms'." New Media & Society 12, no. 3 (2010): 347-64.
| | Van Oost, E. "Materialized Gender: How Shavers Configure the Users' Femininity and Masculinity." How Users Matter: The Co-Construction of Users and Technologies. Eds. Oudshoorn, N. and T. Pinch, Cambridge, MA: The MIT Press, 2003, 193-208.
| | Introna, L. "Algorithms, Performativity, and Governability." Draft presented at the Conference on Governing Algorithms, New York University 2013
| | |
Nov 16 | Technological Dramas |
| "Technological dramas" is in the family of social constructivist theories that disputes Langdon Winner's attributions of politics in technology. In addition to the article by Bryan Pfaffenberger, the key theorist of technological dramas, we will think through cases in which this approach can lend insight into the design and development of IT and media systems. |
| Readings: |
| Pfaffenberger, B. "The Social Meaning of the Personal Computer: Or, Why the Personal Computer Revolution Was No Revolution," Anthropological Quarterly, 61:1 (1988:Jan) 39-47.
| | [pages 282-286] Pfaffenberger, B. "Technological Dramas," Science, Technology & Human Values, 17/3 (1992) 282-312.
| | Tufekci, Z and C. Wilson, "Social Media and the Decision to Participate in Political Protest: Observations from Tahrir Square," Journal of Communication, 2012, 1-17.
| | Gillespie, T. "Can an algorithm be wrong? Twitter Trends, the specter of censorship, and our faith in the algorithms around us" LIMN, Issue 2, Crowds and Clouds, March 27 2012
| | Search Engine Watch, "Google Reveals More Government Censorship Requests," June 19, 2012 http://searchenginewatch.com/article/2185571/Google-Reveals-More-Government-Search-Censorship-Requests
| | Antidefamation League, "Google Search Ranking of Sites Not Intentional" http://archive.adl.org/rumors/google_search_rumors.asp
| | http://www.technologyreview.com/view/425280/new-media-and-the-people-powered-uprisings/
| | http://dmlcentral.net/blog/zeynep-tufekci/networked-politics-tahrir-taksim-there-social-media-fueled-protest-style
| | |
Nov 23 | Tyranny of the Technical |
| The concerns expressed in this session's readings are not wholesale rejections of technology as sources of evil. Instead, they caution us against wholesale embrace of technical solutions for social problems. |
| Readings: |
| Morozov, Evgeny. "Solutionism and its Discontents," in To Save Everything, Click Here: The Folly of Technological Solutionism. Public Affairs Store, 2013.
| | |
Nov 30 | Project Presentations and Demos |
| |
| |
|