What Was Privacy? - Sites at Penn State

advertisement
English 30.10 (Fall 2010)
What Was Privacy?
John T. Harwood
Classroom: 208 Thomas (8:00-9:15 AM, T-Th)
Office: 229 Computer Building
Office Hours: Contact Deb Dixon (dkt6@psu.edu)
Contact info: jth@psu.edu
(o) 814-863-0421 (h) 814-235-1198
Digital Life: www.personal.psu.edu/jth
Facebook: jtharwood
Flickr: flickr.com/photos/john_t_harwood
Linkedin: john-harwood
Delicious: johtharwood (hash tag #e30-privacy) Twitter: waverly (hash tag #e30-privacy)
Course Blog: https://protected.personal.psu.edu/jth/blogs/english_30_what_was_privacy/
To get to this blog, go to: https://blogs.psu.edu and log in
Information Form for Students:
https://spreadsheets.google.com/viewform?authkey=CK3d0YEL&hl=en&formkey=dC1PR3pGNW91S
Xo4ZFdrNXljbFBKbXc6MQ#gid=0
All email communication with me will occur via ANGEL.
Overview
This seminar explores the idea of privacy – what it once was, what it currently is, what it could become, and
what you would like it to become. The idea of privacy is a very hot topic today. Has Facebook changed its
privacy policies AGAIN? (By the way, what were they last week? What are my current settings anyway?) Or
Google’s Buzz. Did I really intend to have all of my email friends joined to my Buzz account? Some Colleges
at Penn State specifically advise students not to have a Facebook account even though it knows that 90% of
our students spend 4-5 hours per week on Facebook. Where’s the disconnect?
Two views of technology and society frame our boundaries as citizens.
1. We live in the great age of Cyber Promise: the Information Age, High-speed Internet, G4 wireless,
Bluetooth, RFID, bar codes, and gadgetry galore. We are nothing if not wired. We are continuously
connected to everyone and everything! Google, Yahoo, and Bing have democratized the control of
information, enabling a PSU scientist and a teenager in Bangladesh to drink from the same IT
fountain. They can debate on Wikipedia, and the youngster has a chance of having his voice heard
round the world. Entrepreneurs offer spectacular technologies for sharing all things digital
(YouTube, Facebook, flip cameras, cell phones, Skype, Twitter, Digg, Delicious, Flickr, blogs) with
anyone who has access to the Web. Geography is irrelevant; so are time zones. All you need is a
social compass, imagination, and curiosity. Through social communities and micro-blogs, we can
instantly find people who share our passions, who like to listen to our rants (and vice-versa),
fantasies, or peeves, or who just like to know what we’re doing. We use these liberating technologies
to communicate and collaborate – or just have fun. What could be better or more efficient? We use
technology to build a better world – become more international, respond instantly to crises like the
Haiti earthquake, mobilize political action groups, and interact with people we cannot see face to
face. Through these technologies, strangers become friends. Isn’t it worth trading a little bit of
privacy for a whole lot of community? And besides, most people think it’s smart to have a lot of
friends on Facebook or followers on Twitter – this is networking, and in a very difficult job market,
it’s who you know. Let’s face it: technology is essentially benign, and we should trust companies that
are bold enough to offer new products. If you can’t handle IT, go back into your cave! This is the
Harwood, Page 1
future, so get used to it. Digital natives, their kingdom having come, will rule the planet wisely. Fear
not: a new age beckons.
2. The commercial interests of the Internet and the controlling interests of the State, especially after
9/11, have essentially eliminated any vestige of personal privacy. We shouldn’t expect it in airports;
our cities (and State College) bristle with video surveillance. The Patriot Act gave unprecedented
powers for the government to monitor voice and data traffic about people inside and outside the US:
cyber-wiretaps are the norm, not the exception. On the personal side, all data about us is sharable and
has been commoditized. My Genome is probably for sale; I have already had my DNA analyzed by
PSU researchers for my racial background – and who knows where that data has gone and who is
using it and for what purpose? For a very small investment of time or money, anyone can discover
almost everything about each person in this class: health issues (for the student, family, or friends),
including the genetic predisposition to major illnesses, financial status (and risks), legal history;
educational performance, social contacts, and your contacts’ contacts (this is a vertiginous mise en
abyme, the black hole of social network analysis, the point where all technologies have jumped the
shark). That rough beast slouching toward Bethlehem, as Auden would say, is a cyborg tracking you
via GPS. Spyware, malware, scareware, phishing, hacking, bots, Trojans, RFID, full-body scans at
the airports, RFID, implanted chips: what do they all have in common except the terrifying power of
IT to strip you of your identity? When Big Brother comes knocking, he already knows who’s there:
it’s you. Avoid any contact with a digital self, and if you have one already, ctrl-alt-del it. Scott
McNealy, former president of Sun, said in 1999, ―You have zero privacy anyway. Get over it.‖ Buy a
copy of the Turner Diaries, and then tune out, drop out, and go dark. ―Light after light goes out / And
universal darkness covers all‖ (Alexander Pope, 1743). Your safest way to live is off the grid.
A false dichotomy? Let’s find out what lies between these extremes, and what is possible outside of them. We
will explore this semester the continuum of meanings that surround privacy, including secrets, private life,
exposure, exhibitionism, FERPA, public life, social isolation, interior life, TMI, spying, surveillance,
monitoring, HIPPA, digital personae, the wisdom of crowds, e-discovery, individuality, and social control.
We will read widely, write frequently, debate openly, share generously, and explore vigorously a range of
technical, economic, and ethical issues that affect the world we live in now and the world that we are creating.
Our primary texts will range from a classic 1921 Russian novel (We) to current books about the state of
information technology – and privacy. We will consider both utopian and dystopian perspectives and want to
know what the world looks and feels like from all sides, and in fact you’ll have a chance to create your own
Nation and implement your views about privacy vs. security. Finally, I will want you to take a stand and
propose actions that Penn State should take about its own privacy policies and practices – and maybe more
than that. Should the US have a national privacy law (as many countries have)? And if so, what are its key
elements? What are the stakes?
Learning Outcomes
English 30 is a course in argumentation. You will need to be skillful at understanding audience, purpose, and
rhetorical strategies for negotiating the ―rhetorical triangle.‖ You will:


analyze and experiment with lots of rhetorical strategies
evaluate the success of arguments (narrative, process analysis, causal analysis, encomium, rebuttal,
cultural analysis, manifesto, satire, invective, and mock-form of any of these)
English 30 (Fall, 2010), page 2


assess the quality and use of sources and evidence in argument
contribute effectively to group projects (as leader, follower, contributor, and reflector)
Bottom line: were you persuaded? Why? What would it take for someone to change your mind about
something important?
Owner’s Manual: Some Assembly Required
(1) Class Preparation. Before each class period, the assigned team will post in ANGEL three significant
questions that we should address. These will not be ―graded‖ or returned, but they will count significantly in
your class participation and will be used extensively in discussion on the second and third days we cover a
book.
(2) Attendance and Time Management. You are expected to (a) attend all classes, (b) complete all
readings, (c) participate in class discussion in class and online, (d) contribute effectively in team assignments
and activities, and (e) complete all ―Proposals‖ and ―Drafts‖ at the beginning of class on the dates scheduled.
If you do not have the proposals and drafts as scheduled, then you cannot participate in class workshops.
Attendance will be taken at all classes. You are subject to a grade penalty if you miss more than three (3)
classes without a formal medical excuse. Late papers? Don’t even think about it. A due date is a moment in
time, not a hope for the future.
(3) Written work. Five formal papers of 4-5 double-space pages are required. Formal proposals for Papers 4
and 5 are required. Graded papers will be returned within a week and probably sooner. ―Proposals‖ and
―Drafts‖ are to be carefully written and properly proofread. You benefit most from drafts if they represent
serious effort towards a final product, not a sloppy beginning. Take them seriously. I am a first-rate editor,
but this isn’t my role. I am your rhetorical coach. For every paper you submit, please follow this file name
convention: Harwood, Paper #1 (September 24, 2010). Bring a hard copy to class – stapled and double
spaced.
(4) Scholarly and Web Resources. This course does not require extensive use of the library, but you will
need to know your way around the CAT, including some of its many databases. The University Libraries
offer introductory tours early in the semester: take advantage of the opportunity. Using Pattee-Paterno
skillfully and efficiently can make a big positive difference to your grades during the next four years.
Documentation, however, is required, and we will use the MLA style sheet to cite printed and digital
resources. Refworks (http://www.libraries.psu.edu/psul/researchguides/matbytype/refworks.html) will help
you manage your bibliographical data.
(5) Plagiarism. Penn State defines academic integrity as the pursuit of scholarly activity in an open, honest
and responsible manner. All students should act with personal integrity, respect other students’ dignity, rights
and property, and help create and maintain an environment in which all can succeed through the fruits of their
efforts (Faculty Senate Policy 49-20). Dishonesty of any kind will not be tolerated in this course.
Dishonesty includes, but is not limited to, cheating, plagiarizing, fabricating information or citations,
facilitating acts of academic dishonesty by others, having unauthorized possession of examinations,
submitting work of another person or work previously used without informing the instructor, or tampering
with the academic work of other students. Students who are found to be dishonest will receive academic
English 30 (Fall, 2010), page 3
sanctions and will be reported to the University’s Judicial Affairs office for possible further disciplinary
sanction. I reserve the right to use Turnitin (http://turnitin.psu.edu).
The English department has a clear policy and definition that have been in place since 1980
(https://www.courses.psu.edu/engl/engl030_jth/PLAGIARI.html). Simply put, your work MUST be your
own. If you are uncertain about what use of a source is permissible, or what kinds of help you can obtain from
friends, ask me. Plagiarism is a serious offence: you can fail a course or be expelled from the university for it.
Don’t be a fool: the risks are serious, the potential gain is slight.
(6) Disability Access. Penn State encourages qualified people with disabilities to participate in its programs
and activities and is committed to the policy that all people shall have equal access to programs, facilities, and
admissions without regard to personal characteristics not related to ability, performance, or qualifications as
determined by University Policy or by state or federal authorities. If you anticipate needing any type of
accommodation in this course or have questions about physical access, please tell me as soon as possible.
(7) Teams. We will make extensive use of teams. Be prepared to lead, follow, and role play. There will be
five team projects. Teams will be arbitrarily assigned to the ―Utopian‖ (Red) and ―Dystopian‖ (Blue)
perspectives. The presentations in December will be the culmination of rhetorical preparation throughout the
course.
These are the topics for the team projects. The goal is to collaboration, not competition. The dates and
content will be explained in class.
Team Project 1
NationState:
Ideas &
Consequences
Team Project 2
Images as
Argument
Team Project 3
Delicious and the
Power of Sharing
Team Project 4
Wikipedia as
Social
Knowledge
Team Project 5
Red and Blue
Debate
Team Project 1 NationState: Ideas and Consequences.
What can you learn about creating a whole new kind of world based on assumptions that you choose?
Welcome to http://www.nationstates.net/ and the world of Jennifer Government. You will individually
―experience‖ your new nation and create individual reflections – as teams, you’ll reach some conclusions.
For this project you will be expected to:
1. Create and track your simulated world on Nationstates
2. Post a daily reflection on the course blog (What was privacy)
3. Review and comment on the reflections of your classmates
4. Complete a summary paper
Note: Refer to the course schedule and Housekeeping item #6 for additional details such as due dates and
posting to the course blog.
Team Project 2 Images as Argument
Every picture tells a story. Sometimes an image can convey more meaning than the written or spoken word.
A still image can, at times, be more powerful that a video. This project will require you to identify, tag, and
English 30 (Fall, 2010), page 4
share images and videos that you find compelling and persuasive. As a team, you will draw conclusions about
the power and peril of images as persuasive tactics. Use the hash tag e30-Privacy.
For this project you will be expected to:
1. Identify persuasive images/videos
2. (Team Exercise) Embed images/videos on the course blog (What was privacy)
3. Complete a summary paper
Note: Refer to the course schedule and Housekeeping items #1 and #2 for additional details such as due dates,
Delicious, hash tags, and posting to the course blog.
Team Project 3 Delicious and the Power of Sharing
Shirky argues for ―cognitive surplus,‖ but what could be done with the surplus if we mobilize our time and
passions collectively and wisely? We will tag and annotate Web resources related to the central themes of our
course – this is all preparation for the final debates and papers. Each of us will tag 20 resources that touch on
privacy or other themes raised in this class. Collectively, then we will have nearly 500 very current resources.
What changes as a result of this surplus? We will use the course hash tag, e30-Privacy, for the assignment.
Refer to the House Keeping section of the syllabus for more information on social bookmarking and
Delicious.
For this project you will be expected to:
1. Use Delicious to tag and annotate resources
2. (Team Exercise) Participate in the course debate
3. Complete a summary paper
Note: Refer to the course schedule and Housekeeping items #1 and #2 for additional details such as due dates,
Delicious, hash tags, and annotation.
Team Project 4 Wikipedia as Social Knowledge
Each team will create at least one new Wikipedia entry and edit three others – all on topics relevant to the
course. I will want you individually to create a Wikipedia entry for yourself and reflect on what happens. I
will then want you collectively to create an entry for me – and reflect on what happens. Finally, I will want
you to digest as a team the ―discussion‖ portion of a contested Wikipedia article. What’s going on here? What
is knowledge? Where does authority lie?
For this project you will be expected to:
1. Create an entry on Wikipedia
2. Edit other entries
3. (Team Exercise) Post a reflection on the course blog (What was privacy)
4. Complete a summary paper.
Note: Refer to the course schedule and Housekeeping items #1, #3 and #2 for additional details such as due
dates, Wikipedia, and posting to the course blog.
English 30 (Fall, 2010), page 5
Team Project 5 Red and Blue Debates. Drawing on the resources created for and consumed in the course,
each team will propose that XXXX should be done to enhance privacy or to prevent XXXX. I will assign
specific topics to each team two weeks before the end of the class.
Grades
Taking English 30 (as opposed to English 15) will not hurt your grade. Grading standards for writing in the
two courses are identical. The English department expects average grades to be far higher in English 30:
historically, most sections end up roughly half A’s and half B’s. Lower grades can, however, be easily
achieved. Note that there is no grade curve: you are not competing against each other. If all of you deserve
A’s (a statistical improbability, but conceivable), then you will all get A’s. Conversely, if you all deserve C’s,
then that is what you will get.
Your grade will be principally determined by the quality of the work you do in November and December.
This course is designed to change the way you write—and to reward improvement.
Category
Weight
Paper 1
5%
(Definition)
Paper 2
10%
(Analysis)
Paper 3
15%
(Comparison)
Category
Paper 4 (Refutation)
Weight
20%
Paper 5 (Proposal)
25%
Contribution to Class
20%
Final Exam
5%
Textbooks
Barry, Max. Jennifer Government (Vintage: ISBN 1-4000-3092-7)
Orwell. George. 1984 (Signet: ISBN 978-0-451-52493-5)
Garfinkel. Simson. Database Nation (O-Reilly: ISBN 0-596-00105-3)
Shirky, Clay. Here Comes Everybody (Penguin: ISBN 978-0143114949)
Zamiatin, Yevgeny. We (Modern Library: ISBN 978-0-8129-7462-1)
Zittrain, Jonathan. The Future of the Internet – and How to Stop It (PDF – DO NOT BUY THIS BOOK.)
New York Times (we will read this and discuss particular kinds of argumentation)
Used copies are fine! We will also make extensive use of online resources and Web sites.
Provisional Schedule: Subject to Change
Date
8-24
Readings
Tasks
8-26
Database
Team 1:
Activities
Syllabus, housekeeping procedures, introduction to
rhetoric
Brief history of privacy in the ancient world and the
English 30 (Fall, 2010), page 6
Date
8-31
9-2
9-7
9-9
9-14
9-16
9-21
9-23
9-28
Readings
Nation (ch.
1-3)
Database
Nation (ch.
4-6)
Database
Nation (ch.
7,8,10)
Database
Nation (ch. 11)
Tasks
Questions
Team 2:
Questions
Activities
early modern period; topoi for definitions;
assignment of topic for paper #1.
Introduction to blogs, Delicious tags, and
e-portfolios (Jeff Swain, guest lecturer).
Strategies for defining *anything*: 50 ways to talk
about privacy; discussion of the survey results on
privacy law
Reflections on
Activity: bring laptops; create your own simulated
the database
world (http://www.nationstates.net/) and track it for
nation – and
14 days. Post a daily reflection on what has
digital identity,
happened in your nation. Paper #2 will be a
2010.
reflection on this experience and will reflect your
critique of Barry’s novel, Jennifer Government.
Taking the Pulse Peer Review for Paper #1
of the Teams
Guest Lecture
Paper #1 Due (submitted in ANGEL). Bring hard
by Sarah
copies to class along with the PEER reviewed copies
Morrow, PSU
of your paper. Each team should have at least ONE
Privacy Officer good question to ask Sarah and each team will write
up a summary of her presentation and what you
LEARNED.
Barry, Jennifer Teams 4-5:
Government
Questions
Barry, Jennifer Team 6:
Selected Readings; Activity: bring laptops and
Government
Questions
create an ―argument of images‖ (images of Big
Brother). This is a team project.
Barry, Jennifer
What is CAPITALIZM vs. CAPITALISM?
Government
Facebook and
Privacy
Facebook and
Peer Review
Privacy
9-30
Bb
meeting
10-5
Orwell, 1984
10-7
Orwell, 1984
10-12
Orwell, 1984
Team 3:
Questions
Team 1:
Questions
Team 2:
Questions
Team 3:
Questions
Paper #2 Due. Introduction of topic for paper #3:
surveillance and safety: how to balance?
Comparison of 2 movies of 1984
Introducing Delicious and the power of sharing;
analysis of exemplary arguments;
Bring laptops to class; one-minute paper topic
proposals; comparison of how 2 movies end
English 30 (Fall, 2010), page 7
Date
10-14
Readings
Orwell, 1984
Tasks
11-4
Shirky,
Everybody
Shirky,
Everybody
Shirky,
Everybody
Shirky,
Everybody
Zamiatin, We
11-9
Zamiatin, We
Team 6:
Questions
Team 1:
Questions
Team 2:
Questions
Team 3:
Questions
Team 4:
Questions
Team 5:
Questions
10-19
10-21
10-26
10-28
11-2
11-11
11-16
11-18
11-30
12-2
12-7
12-9
TBD
Current Topics
Zittrain,
Future …
Internet, ch. 9
Zittrain,
Future …
Internet
Team
Presentations
(Red)
Team
Presentations
(Blue)
Peroration and
Housekeeping
Blue Book
Final Exam
Activities
Comparative Everything (politics, economics,
anatomy, religion); 1984 and surveillance; the world
after 9/11; and Mr. Tang’s argument that Orwell is
way too pessimistic (he survived the cultural
revolution)
Peer Review for Paper #3
Paper #3 Due; introduction to utopian views of IT
Activity: bring laptops. Contribute at least 150
words to a Wikipedia article related to this course
Peer Review for Paper #4
Paper #4 Due
Team 1:
Questions
Team 2:
Questions
Activity: bring laptops
Review for the
final exam
Paper #5 Due
House Keeping
English 30 (Fall, 2010), page 8
You will need to know how social media sites work, and you will also want to take full advantage of PSU
resources. A short list includes:
1. Accounts on the following social collaboration sites: YouTube (http://www.youtube.com), Google
Docs (http://docs.google.com), Flickr (http://www.flickr.com),Wikipedia
(http://www.wikipedia.org/), Delicious (http://delicious.com/), Gmail (https://mail.google.com), and
Twitter (http://twitter.com/). I will want to know your ―name‖ on Twitter so that I can track you; you
can track me as ―waverly‖ (http://twitter.com/waverly). For this course we will use the hash tag
―#e30-privacy‖ on Twitter and ―e30-Privacy‖ on other sharing sites such as YouTube, Delicious,
and Flickr. (Refer to housekeeping item #2).
A hash tag is defined as a tag embedded in a message posted on a microblogging service, consisting
of a word within the message prefixed with a hash sign, #. Providing a tag to content you add to the
web allows us to aggregate it, bring it all together, as a class for review and feedback. For example,
you can view all the images for the class uploaded to Flickr by going to the site and entering the tag,
e30-privacy, in the search field.
2. We will use Delicious (http://delicious.com/) as our social bookmarking tool. According to
Wikipedia, Social bookmarking is a method for Internet users to organize, store, manage
and search for bookmarks of resources online. Unlike file sharing, the resources themselves
aren't shared, merely bookmarks that reference them. Descriptions may be added to these
bookmarks in the form of metadata, so that other users may understand the content of the
resource without first needing to download it for themselves. Such descriptions may be free
text comments, votes in favour of or against its quality, or tags that collectively or
collaboratively become a folksonomy. Folksonomy is also called social tagging, "the
process by which many users add metadata in the form of keywords to shared content" For
this class we will use the tag e30-Privacy.
3. Wikipedia (http://en.wikipedia.org) is a free, web-based, collaborative, multilingual
encyclopedia project supported by the non-profit Wikimedia Foundation. Its 15 million
articles have been written collaboratively by volunteers around the world, and almost all of
its articles can be edited by anyone with access to the site. Wikipedia was launched in 2001
and is currently the largest and most popular general reference work on the Internet.
4. Our course blog is https://protected.personal.psu.edu/jth/blogs/english_30_what_was_privacy/.
5. Media Commons at Penn State (http://mediacommons.psu.edu/) provides a variety of services to
help you envision, produce, and publish creative and effective multimedia projects. You have access
to experienced consultants, training opportunities, and audio/video production facilities.
6. The Blogs at Penn State (http://blogs.psu.edu/) is a simple to use tool that empowers you to publish
online quickly and easily. Simply stated, it is a website that you can easily update and contribute to
from anywhere you have an Internet connection. A blog is a place for personal reflection, a place to
take notes, share pictures, publish your movies, and more. The FIRST step is to acquire your blogs
space. Go to https://blogs.psu.edu and log in. Then I can add you to the course blog.
7. E-portfolios at Penn State (http://portfolio.psu.edu/) are dynamic, developmental spaces representing
your professional "self" on the Web. They are becoming standard practice for academics, students,
and professionals and typically include examples of skills and achievements, as well as a reflective
blog element. Here at Penn State we use the Blogs @ Penn State platform to create e-Portfolios
English 30 (Fall, 2010), page 9
because it is easy to use and allows you to update and contribute to your e-Portfolio wherever you
have an Internet connection.
8. RefWorks at Penn State Penn State
(http://www.libraries.psu.edu/psul/researchguides/matbytype/refworks.html) a citation software and
bibliographic management tool. It is Web-based and can be used from any location.
English 30 (Fall, 2010), page 10
Download