Department of Culture and Communication 
E38.2160.001.SP06: Values embodied in information & communication 
technologies 
Instructor: Helen Nissenbaum 
Mondays 4:55-7:05; 25-W4 C-16 
Virtually all parts of our lives are touched by computing and 
information technology. It mediates much private and public communication, 
interaction, and transaction, and forms the infrastructure for critical 
social and institutional functions such as commerce, banking and 
finance, utilities, national defense, education, entertainment, and more. 
Given the ubiquity of these systems and the confidence we have invested in 
them, it is important to step back and consider what the wholesale 
commitment to this technology means for moral, social, and political 
values. Our course undertakes this mission by investigating how computers and 
information systems promote and obscure the values to which we, 
individually and as societies are committed, values such as freedom, privacy, 
justice and autonomy. We call this investigation the study of values 
"embodied in" computer and information systems. 
The course follows two paths. The first takes us through social 
commentary and key works in the philosophy and social study of technology 
that seek to understand the rich and sometimes troubling relationship 
between development and deployment of technology, on the one hand, and 
social and political factors, on the other. We address questions such as: 
Does technology make the world better, or worse? Is technology neutral? 
Who should be in charge of directing technological development ? What 
is the role of scientists and engineers?  The second path directs us 
through the arena or information and communication technologies as we 
consider how the general questions and theories of the first path apply to 
ICT and new media. 
The course welcomes students with a variety of backgrounds, 
including technical computer science and engineering students interested in 
learning about social, political, and ethical implications of their field, 
as well as students with humanistic, social science, and communications 
backgrounds interested in learning about the technology behind 
digitally mediated communication and experience. 
Readings 
1) Available on Blackboard 
2) Weston, A, A Rulebook for Arguments. 3rd. edition (Indianapolis: Hackett Publishing Company, 2000) 
3) Norman, D. The Design of Everyday Things. New York: Doubleday, 1989 
Blackboard Course Homepage 
The course homepage includes the most up-to-date schedule as well as 
course requirements, readings, and announcements. In addition, you will 
find external links and an online discussion board.  
Requirements and Grading Policy 
Students are expected to attend all classes, complete assigned 
readings before class, and turn in readings responses each week. Grades will 
be assessed according to four criteria: participation (in-class, 
online, and written responses to readings), a short paper due mid-term, a 
collaborative project presentation, and a term paper. 
 
 ***To pass the class, students must pass each of the four elements.
 
25% Participation (attendance, in-class and online, responses to 
readings) 
15% Short paper (3-4 pp) 
20% Project presentation 
40% Term paper (12-15 pp)
 
  
| Schedule |  (Bibliographic details are available on Blackboard) |  
 |    |  
| Jan 23 |  Introduction and Course Overview |  
 |    |  
| Jan 30 |  The Landscape of Technology and Human Values |  
 |  Readings |  
 | Ellul, J. The “autonomy” of the technological phenomenon |  
 | Introna,L.& H. Nissenbaum, Shaping the web: Why the politics of search engines matters |  
 | Winner, L. Do artifacts have politics |  
 |    |  
| Feb 6 |  Technology as a force for good or evil |  
 | Readings |  
 | Weinberg, A.M. Can technology replace social engineering? |  
 | Postman, N. Five things we need to know about technological change |  
 | Dreyfus, H. Heidegger on gaining a free relation to technology |  
 | Barlow, J.P. Coming into the country |  
 |    |  
| Feb 13 |  Technological Alternatives |  
 | Readings |  
 | Heikkerö, T. Focal things and practices - in the west and in Japan |  
 | Johnson, D. & D. Post, The new civic virtue of the Internet |  
   | Mitcham, C. In memoriam: Ivan Illich: critic of professionalized 
design |  
   | Mumford, L. Authoritarian and democratic technics |  
 |    |  
| Feb 20 |  Values Embodied in Technology |  
     | Readings |  
     | Bowker, G. & L. Star, Sorting things out: classification and its 
consequences (excerpts) |  
     | Friedman, B & H. Nissenbaum, Bias in computer systems |  
     | Latour, B. Where are the missing masses? The sociology of a few 
mundane artifacts |   
     | Weber, R. Manufacturing gender in military cockpit design |  
 |    |  
| Feb 27 |  Social Construction of Technical Systems |  
     | Readings |  
     | Cowan, R. S. How the Refrigerator Got Its Hum |  
     | Hughes, T. Networks of power: electrification in western society, 1880-1930 |  
     | Joerges, B. Do politics have artefacts? |  
     | Pfaffenberger, B. Technological dramas |  
     | Pinch,T & W. Bijker, The social construction of facts and artifacts |  
 |    |  
| Mar 6 |  Social Constructivism and its Critics |  
     | Readings |  
     | Brey, P. Philosophy of technology meets social constructivism |  
     | MacKenzie D., and J. Wajcman. Introduction: The social shaping of technology |  
     | Winner, L. Upon opening the black box and finding it empty |  
 |    |  
| Mar 13 |  Midterm break (Spyware workshop March 16-17) |  
 |    |  
| Mar 20 |  Practices of Embedding Values I |  
 | Readings |  
 | Bentham, J. Panopticon; or the inspection house |  
 | Flanagan, M., D. Howe & H. Nissenbaum. Values in design: theory and practice. |  
 | Norman, D.  The design of everyday things (excerpts) |  
 |    |  
| Mar 27 |  Values: What Values? Whose Values? |  
 | Readings |  
 | Berlin, I. Two concepts of liberty |  
 | Constitution of the United States of America: Bill of Rights |  
 | Mitcham, C. Values and valuing |  
 | Nagel, T. The fragmentation of value |  
 |    |  
| Apr 3 |  The Case of the Internet |  
 | Readings |  
 | Abbate, J. Inventing the Internet |  
 | Agre, P. Peer-to-peer and the promise of Internet equality |  
 | Agre, P. Real-time politics: The Internet and the political process |  
 | Lessig, L. The law of the horse: what Cyberlaw might teach |  
 | Shirky, C. Social software and the politics of groups |  
 |    |  
| Apr 10 |  Practices of Embedding Values II |  
 | Readings |  
 | Friedman, B., P. Kahn, & A.  Borning. Value sensitive design and information systems |  
 | Sengers, P., Boehner, K., David, S. & Kaye, J. Reflective design |  
 | Perry, J., E. Macken, N. Scott, and J. McKinley, Disability, inability, and cyberspace |  
 |    |  
| Apr 17 |  Spillover |  
 |    |  
| Apr 24 |  Project presentations |  
 |    |  
| May 1 |  Project presentations |  
 
  
Course Project
 Teams of two or three – ideally, with diverse backgrounds -- will 
collaborate on course projects investigating connections between ICT 
systems and social, political, and/or ethical systems. Depending on 
members’ interests, expertise, and skills, teams may pursue projects ranging 
over a variety of topics and forms.  Some teams might describe and 
analyze particular systems, e.g. IM, Facebook, a particular video game, 
Wikipedia; or types of systems, e.g. auction sites, peer-production, email; 
or system fragments, e.g. specific interface features, access features, 
security features. Some teams might choose to include a design 
component, or even build a prototype of a particular system, or aspect of a 
system, indicating how their projects relate to a particular value or 
values. 
Each group will assign some sort of assignment for the class, e.g. 
an article to read, a system to try out, a website to visit, etc.   
Recommended steps: 
Select topic and collaborator(s)  
Decide on a focus 
Construct bibliography and select the assigment for the class 
Decide on presentation format 
Divide content between (among) collaborators for individual final 
papers. 
 |