LIS 2970 / IST 2955 VALUES IN DESIGN Spring Semester

advertisement
 LIS 2970 / IST 2955 VALUES IN DESIGN Spring Semester 2011 Monday 3:00-­‐5:50 p.m., IS 501 Assistant Professor Cory Knobel Office: School of Information Sciences, Room 709 Phone: 412.624.9197 Email: cknobel@pitt.edu Skype: cory.knobel Office Hours: Monday 11:00 a.m. – 1:00 p.m. or by appointment Goals and Orientation for Values in Design The study of human values in the design of information systems and technology (VID, for short) takes place in many disciplines. Scholarship has recognized that our technological systems are not, by nature, neutral or free of human agency. The typical approach to discourse about values and technology takes place long after systems are deployed in the world and we can see social reaction and reconfiguration as a result of their existence. This course is a part of a growing movement to take the lessons gained from past examination of values surfaced by technology, and turn that knowledge back onto the process of technological design. As such, this is an emerging field without a clear roadmap. Throughout the course, we will engage with the ideas of individual and social values, different approaches to technological design, and some of the pressing issues that arise at this critical intersection. Sometimes we will struggle with them. Sometimes we will see something in a completely new way. These are all part of our work in contributing to the emerging roadmap, making it clearer both for ourselves, as well as a larger community. We will approach this inquiry in two primary ways. The first will be through reading relevant literature and writing about it. The second way will be actively deconstructing and designing technologies with mindful attention to the human values in play. Each week, we will read a number of articles that address different aspects of the VID topic. For most weeks, you will write a short paper (2.5 pages single-­‐spaced or 5 pages double spaced) that draws you into this theme1. We will spend time in class discussing what you have written and how you are developing your thoughts about values in design. We will also 1 Papers are due (hard copy) at the beginning of class. Late papers are not accepted. Final grade is based 50% on papers, 25% on participation, and 25% on the game project. All letter grades from A to C are used in this course, both on individual papers and in the determination of a final grade. be engaging a team project designing and developing games that promote a particular set of chosen values. These games will be premiered at the end of the semester in a public forum. Semester At-­‐a-­‐Glance Week 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Date 1/10/11 1/17/11 1/24/11 1/31/11 2/07/11 2/14/11 2/21/11 2/28/11 3/07/11 3/14/11 3/21/11 3/28/11 4/04/11 4/11/11 4/18/11 Theme What are values in design? Values in Systems Social Construction Values at Play Workshop I Technological Determinism The Politics of Technology Technology and Identity Values at Play Workshop II No Class: Pitt Spring Recess Tricky topics: Education Tricky topics: Science Tricky topics: Industry Residual Issues Wrap-­‐up Game Fair Required Texts Flanagan, M. (2009). Critical Play: Radical Game Design. MIT Press: Cambridge, MA. Nardi, B. (2010). My Life as a Night Elf Priest: An Anthropological Account of World of Warcraft. University of Michigan Press: Ann Arbor, MI. SCHEDULE OF READINGS AND WRITTEN ASSIGNMENTS The readings for this course can be found on the CourseWeb site in electronic format. The two books are available through Amazon.com or at many bookstores. (The Flanagan book is also available as a Kindle download.) Abbreviated titles of the assigned readings are below, and a full bibliography is found at the end of this document. The assignments are due at the beginning of the session in which they are assigned. You may want to bring two copies to class: one to hand in, and one for reference during discussion. The assumption is that you have read the articles before coming to class, as the assignments are typically focused on leveraging the course readings in some way. Students will be assigned to lead the discussions once the course gets underway. Further details will be described in class. Page 2 1. Introduction: What are Values in Design? | January 10 No assigned reading 2. Values in Systems | January 17 *Note – the University of Pittsburgh is closed on this day for observance of Dr. Martin Luther King’s birthday. We will make the decision as a class to find an alternative time to meet, as there will be material to cover. 1.
2.
3.
4.
Flanagan, Howe, & Nissenbaum (2005), Values in Design: Theory and Practice Sengers et al (2005), Reflective Design Friedman & Nissenbaum (1996), Bias in Computer Systems Williams & Edge (1996), The Social Shaping of Technology Assignment These four articles provide different perspectives on the definitions and roles of human and social values as they relate to technology design. Comparatively discuss the various theories and methods the authors explore. Which of the approaches particularly appeal to you (regardless of whether you feel you could pull of such an analysis yourself.) Why do these approaches seem useful? [Maximum 5 pages, double spaced] 3. Social Construction | January 24 1.
2.
3.
4.
Pinch & Bijker (1992), The Social Construction of Facts and Artifacts Winner (1993), Upon Opening the Black Box and Finding It Empty Brey (1997), Philosophy of Technology Meets Social Constructivism Star (1999), The Ethnography of Infrastructure Assignment This week’s readings discussed several artifacts and how their social positioning affects the ways in which we understand them. Choose a technological artifact of interest to you and map out the various social values that position it and the groups in which it resides. Be sure to annotate and explain your map with accompanying text. [Maximum 5 pages, double spaced] 4. Values at Play – Workshop I | January 31 1. Flanagan (2009), Critical Play: Radical Game Design Assignment Flanagan describes an alternative to the traditional game design model called “Critical Play Game Design.” How might you use this model to deconstruct an existing game so that you may modify it to incorporate new values-­‐based components? Choose a game that you know well and discuss how you would use the critical play approach to understand and modify the game. [Maximum 5 pages, double spaced] 5. Technological Determinism | February 7 1. Latour (1991), Technology is Society Made Durable 2. David (1985), Clio and the Economics of QWERTY Page 3 3. Page (2005), An Essay on the Existence and Causes of Path Dependence 4. Ryan (2009), The Sociotechnical Infrastructures of Virtual Worlds Assignment Latour, David, and Page engage a discussion about how historical choices made in the design of technologies shape our uses of them in enabling and constraining ways. Use the ideas presented in the first three articles to critique Ryan’s discussion of virtual world infrastructure. [Maximum 5 pages, double spaced] 6. The Politics of Technology | February 14 1.
2.
3.
4.
Winner (1988), Do Artifacts Have Politics? Pfaffenberger (1992), Technological Dramas Joerges (1999), Do Politics Have Artefacts? Introna & Nissenbaum (2000), Shaping the Web: Why the Politics of Search Engines Matters Assignment The four readings for this week are in a discourse with each other about the relationship between technological artifacts and embedded social values. Discuss the points of confluence and dissonance among these articles. Based on a thoughtful exploration of these articles, what do you think about the role of the political in technology? How would you design a technology to promote a political ideal? Alternatively, how would you examine a political ideal to construct a relevant technological artifact? 7. Technology and Identity | February 21 1. Perry et al (1997), Disability, Inability, and Cyberspace 2. Weber (1999), Manufacturing Gender in Military Cockpit Design 3. Edwards (1990), The Army and the Microworld: Computers and the Politics of Gender Identity 4. Irani et al (2010), Postcolonial Computing: A Lens on Design and Development Assignment Read through the descriptions of player races and classes in World of Warcraft (WoW)(http://us.battle.net/wow/en/game/) and tell us what you notice about representations of identity in the descriptions (both textual and graphical). Draw from the week’s readings to comment on values that are both highlighted and left unaddressed in the WoW cast of characters. [Maximum 5 pages, double spaced] 8. Values at Play – Workshop II | February 28 1. Nardi (2010), My Life as a Night Elf Priest Assignment Come to class prepared to discuss your reactions to Nardi’s book. Specifically, think about the social values embedded in WoW and the infrastructure of the game (in terms of previous weeks’ topics.) We will then be walking through Second Life as an alternative virtual world. Think about how the values of WoW’s infrastructure can be applied to modify aspects of SL. 9. NO CLASS – PITT SPRING RECESS | March 7 Page 4 10. Tricky Topics: Education | March 14 1. Amory (1999), The Use of Computer Games as an Educational Tool 2. Hayes (2008), Making Computer Games and Design Thinking Assignment Do some independent research on games that have been developed as educational tools. Choose one and engage a values-­‐based analysis, suggesting modifications that shift the embodied or represented values. [Maximum 5 pages, double spaced] 11. Tricky Topics: Science | March 21 1. Stapleton (2005), The Art of Nurturing Citizen Scientists through Mixed Reality 2. Goodchild (2007), Citizens as Sensors: The World of Volunteered Geography Assignment Do some independent research on games that have been developed as tools for involving non-­‐scientists in modern scientific practice. Choose a research field of interest to you and find a project underway within that field. Sketch and suggest a game that would invite citizen scientists to engage with this type of work. [Maximum 5 pages, double spaced] 12. Tricky Topics: Industry | March 28 1. Wyld (2010), A Virtual Explosion or SNAFU is Always Better than a Real One 2. Stuckey (2009), Virtual Environments Overview Assignment IBM’s “Virtual Rehearsal Studio” (described in the Stucky reading) is a virtual environment to facilitate business and industrial/government training. Discuss the assumptions about social values (both individual and organizational) that are embedded in the environment they propose. Do you think their understanding of social interaction in virtual worlds is reasonable? Discuss the advantages and limitations of their project with an eye toward values and incentives to participate. [Maximum 5 pages, double spaced] 13. Tricky Topics: Residual Issues | April 4 1. Mumford (1964), Authoritarian and Democratic Technics 2. Dreyfus (1995), Heidegger on Gaining a Free Relation to Technology 3. Brewer & Dourish (2008), Storied Spaces: Cultural Accounts of Mobility, Technology, and Environmental Knowing 14. Final Commentary on Values in Design | April 11 No readings assigned Assignment Bring a sheet of “talking points” to class this week. You should be ready to talk about four different things. First, what is the best article you read in the course and why is it the best article? Second, what did you find out about the role of social values in the design of technology that surprised you over the course of the semester? Third, how do you think that focusing on values in technological design will affect the way you approach your Page 5 information career moving forward? Fourth, what readings that you were exposed to this semester do you wish you had read earlier? Why? [Be prepared to hand in a copy of your talking points.] 15. Game Fair | April 18 No readings assigned Assignment Be ready to demo your game to a public audience. Page 6 ACADEMIC INTEGRITY Students in this course are required and expected to comply with the University of Pittsburgh’s Policy on Academic Integrity (see SIS policy below). Anti-­‐plagiarism software may be used to monitor for instances of plagiarism in student submissions. Any student suspected of violating this policy for any reason during the term will be required to participate in the procedural process, initiated at the instructor level, as outlined in the University Guidelines on Academic Integrity. If it is determined that a student has violated the policy on academic integrity, he or she will fail the course. Academic Integrity (for full SIS policy and information on Adjudication see http://www.ischool.pitt.edu/about/academic-­integrity.php) Students and Faculty Obligations and Hearing Procedures This document supplements the University of Pittsburgh's Guidelines on Academic Integrity. No attempt to use it should be made without consulting the parent document. Effective September 1991 and Revised September 1995 Academic Integrity: Student Obligations | Academic Integrity: Faculty Obligations (See Also: Pitt's Guidelines on Academic Integrity) ACADEMIC INTEGRITY: STUDENT OBLIGATIONS I. STUDENT OBLIGATIONS A student has an obligation to exhibit honesty and to respect the ethical standards of the library and information professions in carrying out his or her academic assignments. Without limiting the application of this principle, a student may be found to have violated this obligation if he or she:* 1. Refers during an academic evaluation to materials or sources or employs devices not authorized by the instructor. 2. Provides assistance during an academic evaluation to another person in a manner not authorized by the instructor. 3. Receives assistance during academic evaluation from another person in a manner not authorized by the instructor. 4. Engages in unauthorized possession, buying, selling, obtaining, or using a copy of any materials intended to be used as an instrument of academic evaluation in advance of its administration. 5. Acts as a substitute for another person in any academic evaluation process. 6. Utilizes a substitute in any academic evaluation procedure. 7. Practices any form of deceit in an academic evaluation proceeding. 8. Depends on the aid of others in a manner expressly prohibited by the instructor, in the research, preparation, creation, writing, performing, or publication of work to be submitted for academic credit or evaluation. 9. Provides aid to another person, knowing such aid is expressly prohibited by the instructor, in the research, preparation, creation, writing, performing, or publication of work to be submitted for academic credit or evaluation. 10. Presents as one's own, for academic evaluation, the ideas, representations, or words of another person or persons without customary and proper acknowledgement of Page 7 sources. 11. Submits the work of another person in a manner which represents the work to be one's own. 12. Knowingly permits one's work to be submitted by another person without the instructor's authorization. 13. Attempts to influence or change one's academic evaluation or record for reasons other than achievement or merit. 14. Indulges, during a class (or examination) session in which one is a student, in conduct which is so disruptive as to infringe upon the rights of the instructor or fellow students. 15. Fails to cooperate, if called upon, in the investigation or disposition of any allegation of dishonesty pertaining to another student, or any other breach of a student's obligation to exhibit honesty. 16. Violates the canons of ethics of the library and information professions. Page 8 Full Bibliography Week 1 No assigned readings Week 2 Flanagan, M., Howe, D., and Nissenbaum, H. (2005). “Values in Design: Theory and Practice.” Working Paper. Sengers, P., Boehner, K., David, S., and Kaye, J. (2005). “Reflective Design.” Proceedings of the 4th Decennial ACM Conference on Critical Computing. Friedman, B., and Nissenbaum, H. (1996). “Bias in Computer Systems.” ACM Transactions on Information Systems. Vol. 14, No. 3: 330-­‐347. Williams, R., and Edge, D. (1996). “The social shaping of technology.” Research Policy. Vol. 25: 865-­‐899. Week 3 Pinch, T., and Bijker, W. (1992). “The Social Construction of Facts and Artifacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other.” in Bijker & Law (eds.), Shaping Technology/Building Society. MIT Press: Cambridge, MA. Winner, L. (1993). “Upon Opening the Black Box and Finding It Empty: Social Constructivism and the Philosophy of Technology.” Science, Technology, & Human Values. Vol. 18, No. 3: 362-­‐378. Brey, P. (1997). “Philosophy of Technology Meets Social Constructivism.” Digital Libraries & Archives. Vol. 2, No. 3-­‐4. Star, S. L. (1999). “The Ethnography of Infrastructure.” American Behavioral Scientist. Vol. 43, No. 3.” 377-­‐391. Week 4 Flanagan, M. (2009). Critical Play: Radical Game Design. MIT Press: Cambridge, MA. Week 5 Page 9 Latour, B. (1991). “Technology is Society Made Durable.” in Law (ed.), A Sociology of Monsters: Essays on Power, Technology, and Domination. Routledge: London, UK. David, P. (1985). “Clio and the Economics of QWERTY.” The American Economic Review. Vol. 75, No. 2, Papers and Proceedings of the Ninety-­‐Seventh Annual Meeting of the American Economic Association: 332-­‐337. Page, S. E. (2005). “An Essay on the Existence and Causes of Path Dependence.” Working Paper. Ryan, M. E. (2009). “The Sociotechnical Infrastructure of Virtual Worlds.” in D. Heider (ed.), Living Virtually: Researching New Worlds. Peter Lang Publishers: New York, NY. Week 6 Winner, L. (1988). “Do Artifacts Have Politics?” in L. Winner, The Whale and the Reactor. University of Chicago Press: Chicago, IL. Pfaffenberger, B. (1992). “Technological Dramas.” Science, Technology, & Human Values. Vol. 17, No. 3: 282-­‐312. Joerges, B. (1999). “Do Politics Have Artefacts?” Social Studies of Science. Vol. 29, No. 3: 411-­‐
431. Introna, L., and Nissenbaum, H. (2000). “Shaping the Web: Why the Politics of Search Engines Matter.” The Information Society. Vol. 16: 169-­‐185. Week 7 Perry, J., Macken, E., Scott, N., and McKinley, J. (1997). “Disability, Inability and Cyberspace.” in B. Friedman (ed.), Human Values and the Design of Computer Technology. Cambridge University Press: New York, NY. Weber, R. (1999). “Manufacturing Gender in Military Cockpit Design.” in D. MacKenzie and J. Wajcman (eds.), The Social Shaping of Technology, Second Edition. Open University Press: Buckingham, UK. Edwards, P. (1990). “The Army and the Microworld: Computers and the Politics of Gender Identity.” Signs. Vol. 16, No. 1: 102-­‐127. Irani, L., Vertesi, J., Dourish, P., Philip, K., and Grinter, R. (2010). “Postcolonial Computing: A Lens on Design and Development.” CHI 2010, April 10-­‐15, 2010, Atlanta, GA. Week 8 Nardi, B. (2010). My Life as a Night Elf Priest: An Anthropological Account of World of Warcraft. University of Michigan Press: Ann Arbor, MI. Page 10 Week 9 No assigned readings Week 10 Amory, A., Naicker, K., Vincent, J., and Adams, C. (1999). “The use of computer games as an educational tool: identification of appropriate game types and game elements.” British Journal of Educational Technology. Vol. 30, No. 4: 311-­‐321. Hayes, E., and Games, I. (2008). “Making Computer Games and Design Thinking: A Review of Current Software and Strategies.” Games and Culture. Vol. 3, No. 3-­‐4: 309-­‐322. Week 11 Stapleton, C. (2005) “The Art of Nurturing Citizen Scientists Through Mixed Reality.” ISMAR '05 Proceedings of the 4th IEEE/ACM International Symposium on Mixed and Augmented Reality Goodchild, M. (2007). “Citizens as Sensors: The World of Volunteered Geography.” GeoJournal. Vol. 69: 211-­‐221. Week 12 Wyld, D. (2010). “A Virtual Explosion or SNAFU is Always Better Than a Real One: Exploring the Use of Virtual Worlds for Simulation and Training…and Developing the Leaders of Tomorrow.” in M. Iskander et al. (eds.) Technological Developments in Education and Automation. Springer Science + Business Media: New York, NY. Stucky, S. Shaw, B., and Ark, W. (2009). “Virtual Environments Overview.” Air Force Research Laboratory Information Directorate & IBM Almaden Research Center. Week 13 Mumford, L. (1964). “Authoritarian and Democratic Technics.” Technology and Culture. Vol. 5, No. 1: 1-­‐8. Dreyfus, H. (1995). “Heidegger on Gaining a Free Relation to Technology.” in Feenberg and Hannay (eds.), Technology and the Politics of Knowledge. Indiana University Press: Bloomington, IN. Page 11 Brewer, J., and Dourish, P. (2008) “Storied Spaces: Cultural Accounts of Mobility, Technology, and Environmental Knowing.” International Journal of Human-­Computer Studies. Page 12 
Download