Values Embodied in Information & Communication Technologies

Spring 2004

 

Instructor: Helen Nissenbaum

 

Virtually all parts of our lives are touched by computing and information technology. It mediates much private and public communication, interaction, and transaction, and forms the infrastructure for critical social and institutional functions such as commerce, banking and finance, utilities, national defense, education, entertainment, and more. Given the ubiquity of these systems and the confidence we have invested in them, it is important to step back and consider what wholesale commitment to this technology means for moral, social, and political values. Our course undertakes this mission. We investigate how computers and information systems promote and obscure the values to which we, individually and as societies are committed, values such as freedom, privacy, justice and autonomy. We call this investigation the study of values “embodied in” computer and information system.

The course welcomes students with a variety of backgrounds, including technical computer science or engineering students interested in learning about social, political, and ethical implications of their field, as well as students with humanistic, social science, and communications backgrounds interested in learning about digital technologies touching virtually all parts of our lives.

The course has two parts. In the first, we cover a selection of works in the philosophy and social study of technology that seeks to understand the rich and sometimes troubling relationship between social and political factors, on the one hand, and development and deployment of technology, on the other. We address questions such as: Is technology neutral? Who should make decisions about technical developments? What is the role of scientists and engineers? Does technology make the world better, or worse?  The second part of the course is devoted to application of themes, theories, and principles, drawn from the first part, to controversial cases in information technology and new media, such as search engines, web-cookies, anonymity online, data mining, online dating, and the Internet and World Wide Web, themselves.

Although the course has been taught before in Culture and Communication, this is the first time it is cross-listed in Computer Science. Ideally, students with diverse backgrounds will collaborate on final projects, bringing different skills to the analysis of selected case studies.

 

Readings

 

Weekly Readings assigned from course readers and textbooks must be completed before each class meeting.

 

Course Reader: A course reader is available for purchase at the MacDougal Copy Center, 127 MacDougal Street (between W 3rd and 4th), Ph. 212-460-8591.

 

Katie Hafner and Matthew Lyon (1996) Where Wizards Stay up Late: The Origins of the Internet. New York: Touchstone Books

 

Lawrence Lessig (1999) Code and Other Laws of Cybersapce. New York: Basic Books

 

 

Course Requirements and Grading

 

60%       Research paper

40%       Classroom participation (Includes attendance, demonstrated familiarity with Readings, informal and formal contributions to classroom discussion, preparation of study questions, postings to Class online discussion board.)

 

In order to earn a passing grade for the course, students must earn passing grades in each of the two elements.

 

Course Homepage

 

The homepage serves as the hub of the class and should be checked regularly. It contains the following elements: the most up-to-date schedule; a discussion board for posting questions, ideas, and observations; links to relevant websites and Readings.

 

Schedule (Check course homepage regularly for updates.)

 

Part One:     Theories, Themes, and Concepts

 

1/20      Introduction

 

1/27      Technological Utopia/Dystopia

 

Reactions to the increasing prominence of large technological systems have been varied. Some, wildly optimistic, perceive technology as key to reducing human misery and resolving intractable social problems. Others predict dark scenarios of dehumanization and tyrannical domination by privileged technocrats.

 

Readings:

 

·          Florman, Samuel. "In Praise of Technology." Controlling Technology: Contemporary Issues. Ed. W. B. Thompson. Buffalo, NY: Prometheus Books, 1991, 148-156.

 

·          Weinberg, Alvin M. "Can Technology Replace Social Engineering." Controlling Technology: Contemporary Issues. Ed. W. B. Thompson. Buffalo, NY: Prometheus Books, 1991, 41-48.

 

·          Kramer, Mark. “The Ruination of the Tomato” In Controlling Technology: Contemporary Issues, W.B. Thompson (eds.) Buffalo, NY: Prometheus Books, 1991, 131-141

 

·          Kwitny, J. "The Great Transportation Conspiracy." Controlling Technology: Contemporary Issues. Ed. W. B. Thompson. Buffalo, NY: Prometheus Books, 1991, 265-274.

 

·          Feenberg, Andrew. Alternative Modernity: The Technical turn in Philosophy and Social Theory, Berkeley: University of California Press, 1995. Chapters 2,3

 

·          Feenberg, Andrew  “From Essentialism to Constructivism: Philosophy of Technology at the Crossroads” Technology and the Good Life? Ed, Higgs, Eric, Light, Andrew and Strong, David Chicago: University of Chicago Press, 2000, 294-315

 

2/3       Technological Determinism

 

Technological determinists are believed to hold the course of technological advancement to be inevitable, driven forward only by the internal forces of science and engineering themselves. According to this oversimplified rendering, technology affects people and societies in drastic ways but is immune, itself, to social forces. We will evaluate various versions of technological determinism, identifying themes that distinguish them from one another.

 

Readings

 

·          Heilbroner, Robert. “Do Machines Make History?” In Controlling Technology: Contemporary Issues, 2nd ed., E. Katz, A. Light, and W. Thompson (eds.) New York: Prometheus Books, 2003

 

·          Mumford, L. “Authoritzrian and Democratic Technics.” In Controlling Technology: Contemporary Issues, 2nd ed., E. Katz, A. Light, and W. Thompson (eds.) New York: Prometheus Books, 2003

 

·          Bimber, Bruce. "Three Faces of Technological Determinism." In Does Technology Drive History? The Dilemma of Technological Determinism, M.R. Smith and L. Marx (eds.) Cambridge, MA: MIT Press, 1998, 79-100.

 

·          Williams, R. “The Political and Feminist Dimensions of Technological Determinism.” In Does Technology Drive History? The Dilemma of Technological Determinism, M.R. Smith and L. Marx (eds.) Cambridge, MA: MIT Press, 1998.

 

2/10      Questioning the Neutrality Thesis

 

This segment critically evaluates the claim that technology is value-neutral and that its harms and benefits are the result not of good or bad technology but good or bad actions, people, and political systems.  “Guns don’t kill; people do”  -- or do they?

 

Readings

 

·          Winner, Langdon. "Do Artifacts Have Politics?" In The Social Shaping of Technology, 2nd ed., MacKenzie D. and Wajcman, J. (editors) Buckingham: Open University Press, 1999.

 

·          Latour, Bruno. "Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts." Shaping Technology/Building Society. Ed. W. Bijker and J. Law. Cambridge, MA: MIT Press, 1992. Pg. 225-258.

 

·          Bentham, Jeremy  “Panopticon; or the Inspection House The Panopticon Writings New  York: Verso, 1995, 31-34, 86-95

 

·          Weber, R. “Manufacturing Gender in Military Cockpit Design.” In MacKenzie, D., and J. Wajcman, eds.  1985. The Social Shaping of Technology . Milton Keynes: Open University Press.

 

·          Berg, A. and Lie, M. “Feminism and Constrivism: Do Artifacts Have Gender?” Science, Technology, & Human Values, Vol. 20, No. 3, (Summer 1995), 332-551

 

2/17      Social Construction of Technology

 

In a direct challenge to technological determinism, theories of social construction of technology hold that social, political, and cultural forces are as important as scientific and technological ones in explaining the shape of technical devices and systems. We examine a few prominent versions of social shaping or social construction of technology that have emerged from STS subfields, mainly in sociology, anthropology, and history.

 

Readings

 

·          Pinch, Trevor and W. Bijker. "The Social Construction of Facts and Artifacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other." Shaping Technology/Building Society. Ed. W. Bijker and J. Law. Cambridge, MA: MIT Press, 1992, 17-50.

 

·          MacKenzie D., and J. Wajcman. 1985. “Introduction: The Social Shaping of Technology.” In MacKenzie, D., and J. Wajcman, eds.  1985b. The Social Shaping of Technology . Milton Keynes: Open University Press.

 

·          Woolgar, S. “The Turn To Technology in Social Studies of Science,” Science, Technology, & Human Values, Vol. 16, No. 1 (Winter 1991) 20-50

 

·          Pfaffenberger, B. “Technological Dramas,” Science, Technology, & Human Values, Vol. 17, No. 3 (Summer, 1992), 282-312

 

·          MacKenzie D. “Theories of Technology and the Abolition of Nuclear Weapons.” In MacKenzie, D., and J. Wajcman, eds.  1985. The Social Shaping of Technology . Milton Keynes: Open University Press.

 

2/24      Social Construction: Critiques and rebuttals

 

Various debated have arisen within and about the development of this important approach to the study of technology. Detractors have argued that it neglects technology’s impacts; competitors accuse one another of holding positions either too extreme, or not extreme enough. Readings offer a small window into these discussions.

 

Readings

 

·          Winner, L.  1991.  "Upon Opening the Black Box and Finding it Empty: Social Constructivism and the Philosophy of Technology."  In Pitt, J., and E. Lugo, eds., The Technology of Discovery and the Discovery of Technology . Blacksburg, Va: Society for Philosophy and Technology.

 

·          Grint, K., and Woolgar, S.  1995.  "On Some Failures of Nerve in Constructivist and Feminist Analyses of Technology." Science,  Technology, & Human Values 20:286-310.

 

·          Brey, P. “Philosophy of Technology Meets Social Constructivism,” Techne: Journal for the Society for Philosophy and Technology, Vol 2, Nos. 3-4, Spring-Summer 1997

 

3/2       Values in Design: building better systems

 

One question to emerge from debates over social construction approaches is practical relevance, bluntly, whether these approaches have the capacity to make the world a better place by defining ways to make better technologies. This challenge is taken up by proponents of values-in-design, whose goals include establishment of values as a design criterion and construction of background theory and methodology.

 

Readings

 

·          Friedman, Batya and Helen Nissenbaum. "Bias in Computer Systems." Human Values and the Design of Computer Technology. Ed. Batya Friedman. New York: Cambridge University Press, 1997, 21-40.

 

·          Nissenbaum, Helen. “How Computer Systems Embody Values” Computer, Vol. 34, Number 3, March 2001, 120-118

 

·          Friedman, B. and Kahn, P. H., Jr.  (2003).  "Human values, ethics and design".  In J. Jacko and A. Sears (Eds.), Handbook of Human-Computer Interaction (pp. 1177 - 1201).  Mahwah, NJ: Lawrence Erlbaum Associates.

 

·          Donald Norman, The Design of Everyday Things, New York: Doubleday, 1989 (excerpts)

 

·          Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999, Chapters 2, 5, 7.

 

3/9       Values

 

Here, we take up the foundational question of what do we mean when we talk of values. What the values are that technology may promote or suppress and what is the source of their importance?

 

Readings

 

·          T.D.J. Chappell, Understanding Human Goods: A Theory of Ethics. Edinburgh: Edinburgh University Press, 1998. Chapters 1, 2.

 

·          Constitution of the United States of America (esp. Bill of Rights)

·          http://lcweb2.loc.gov/const/const.html

 

·          Nagel, Thomas. “The Fragmentation of Value” Mortal Questions. Cambridge, MA: Cambridge University Press, 1979, 128-141

 

·          Taylor, Charles. The Diversity of Goods” Moral Philosophy: Selected Readings 2nd ed. Ed. Sher, George, forth Worth: Harcourt Brace Publishers, 1996, 581-593

 

3/16      Spring Break

 

3/23      More Values

 

Difficult and recurring questions about values are whether they are subjective or objective, universal or relative. We discuss some of the fundamental alternatives, focusing on what it means for technology and values to commit to one or other of them.

 

Readings:

 

·          Michael Philips, Chapter 3 “The Formal Conception of the Good” In Between Universalism and Skepticm: Ethics as Social Artifact, New York: Oxford University Press, 1994

 

·          Harman, Gilbert. “Is There a Single True Morality?” Explaining Value and Other Essays in Moral Philosophy.  Oxford: Clarendon Press, 2000, 77-99

 

·          Gilligan, Carol  “In a Different Voice”  Moral Philosophy: Selected Readings 2nd ed. Ed. Sher, George, forth Worth: Harcourt Brace Publishers, 1996, 581-593

 

Part Two:     Applications

 

In this part of the course, we jointly select several cases for special study. Choices include: The Internet, World Wide Web, socially controversial Web protocols (e.g. PICS, P3P), Peer-to-Peer systems, online dating services and other social systems, computing for the disabled, search engines, UrbanSim, Radio Frequency ID Tags, and others.

 

3/30      Case Studies

4/6        Case Studies

4/13      Case Studies

4/20      Case Studies

4/27      Case Studies


 

Sample Readings:

 

·          Hafner and Lyon, Where Wizards Stay Up Late: The Origins of the Internet (1999) New York: Touchstone Books

 

·          Abbate, Janet. Inventing the Internet. Cambridge, MA: MIT Press, 1999, chapters 3 and 4, pp. 83-145.

 

·          Lessig, L. Code and Other Laws of Cyberspace. New York: Basic Books, 1999.

 

·          Berners-Lee, T. and Frischetti, M. Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web by  its Inventor.  San Francisco: Harper, 1999, 7-66

 

·          Agre, P. and Mailloux, C. “Social Choice About Privacy: Intelligent Vehicle-Highway Systems in the United States.” In Human Values and the Design of Computer Technology. Ed. Batya Friedman. New York: Cambridge University Press, 1997.

 

·          Friedman, B. and Kahn, P. H., Jr.  (2003).  "Human values, ethics and design".  In J. Jacko and A. Sears (Eds.), Handbook of Human-Computer Interaction (pp. 1177 - 1201).  Mahwah, NJ: Lawrence Erlbaum Associates.

 

·          Hockenberry, John. “This is the Story of the Most Fearless Entrepreneur Ever, The Human Brain” Wired Magazine, August 2001, 99-105

 

·          L. Introna and H. Nissenbaum, "Defining the Web: The Politics of Search Engines" IEEE Computer, Vol. 33, No. 1, Jan. 2000: 54-62.

 

·          Nissenbaum, Helen. “How Computer Systems Embody Values” Computer, Vol. 34, Number 3, March 2001, 120-118

 

·          Perry, John, Macken, E., Scott, N. and J. McKinley. "Disability, Inability, and Cyberspace." Human Values and the Design of Computer Technology. Ed. Batya Friedman. New York: Cambridge University Press, 1997, 65-90.

 

Email Helen Nissenbaum
Need Help? Web-Master