Word - Description

advertisement
INFO 380C: INFORMATION IN SOCIAL AND CULTURAL CONTEXT
Professor William Aspray
Fall 2011
This is a syllabus for both of my sections:
Unique number 28440, M 9 am – noon, UTA 1.208
Unique number 28445, Tu 6 – 9 pm, UTA 1.208
Office: UTA 5.432, catch me before or after class, or email for an appointment to
bill@ischool.utexas.edu. Office phone: 512 471 3877.
Teaching assistant: TBD
Catalog description:
Examines the role of information in human activities, particularly how it shapes and is
shaped by the social and cultural context. Considers how individuals, groups,
organizations, institutions, and society at large create, find, use, understand, share,
transform, and curate information.
Introduction:
This is a new course, required as part of the new masters curriculum. My feeling is that
there is no essential piece of information or theory that every one of our students must
know, but it is important that our students have a general understanding of the ways in
which information scholars study information and information technologies in social and
cultural context. Of the many different themes I could emphasize in the assigned
readings, I selected five:





Theory
Traditional Library, Archival, and Museum Studies
Digital Divide/Information Around the World
Privacy, Ethics, and Policy
Information Work and Workers
If the course were organized to have all the readings grouped together on any one of these
topics, we would have had approximately two to three weeks of reading for each bullet
listing above. Instead, I have spread these readings out over the entire semester. So in
any given week you are likely to have one or at most two papers about any given topic;
and most weeks we will have readings that address at least four of those bulleted themes.
Individual students who have a particular interest in one of these topics will have an
opportunity for further study of the topic through several of the course assignments.
Weekly readings and questions:
Except for the first and second weeks of the semester, there will be required readings
each week. The required readings will be posted on BlackBoard, so there are no books to
buy or papers to acquire for the class. Each week, you are expected to read the material
carefully, send two questions to me by email (bill@ischool.utexas.edu) - one question
from each of any two of the assigned readings - no later than three hours before the start
of class. The questions should be ones that will stimulate thoughtful class discussion. Be
prepared to discuss all the papers in class. Courteous, thoughtful, active participation in
the class discussion is expected. The weekly required readings are listed later in this
document.
Class presentation:
Later in this document you will find a list of books on the social and cultural study of
information, broadly conceived. It is not a complete list, but it represents a wide range of
topics and approaches. Each student in class will select one book from this list and make
a polished, 15-minute, in-class presentation of the major findings and be prepared to
answer questions/lead class discussion for an additional 5 minutes. You may not select a
book already selected by another student, so you should have several options in mind. I
will set up a lottery to decide the order in which students get to select their book.
Essay review:
Using this same book list, you will choose five books and write an essay review about
them. You should make your selection so that there is a common topic or theme or
method across the five books. The book that you presented about in class may not be
included in the five books, but any other book on the list may. (Thus, several students
may end up selecting some of the same books for their essay review.) Unless you tell me
privately that you do not want your essay review shared with the other students, I will
post it on BlackBoard as a resource for the other students.. You should not confer with
your fellow students about the selection of books; one of the things I will be interested to
see is how you develop a theme that connects your five books to one another. The
maximum length for your review is 1250 words.
Minute madness:
Later in this document you will also find a list of journal articles that are not part of the
assigned weekly readings. You will select one article from the list (again there will be
lottery to determine your selection order), and you will present a no-more-than 120
second discussion of the paper, followed by 60 seconds of quick Q&A on Minute
Madness Day (November 7/8).
Take-home essay:
Finally, you will be required to write an answer to a take-home essay question, which
will be due on December 2 at 5 PM. You will have no less than one week to answer the
question, and your answer may not exceed 750 words. You may consult your notes, any
of the assigned readings, or any publication on the list of books or additional articles.
You may not do a web search, library search, or discuss this assignment with anyone else,
including but not limited to the students in either section of the course.
Behavior:
You are expected to meet the customary guidelines for ethical and professional behavior
in this course.
Grading:
Grades will be determined as follows:
Weekly questions 15% (quality as well as turning them in on time matters)
Class participation 20%
Class Presentation 15%
Essay Review 25%
Minute Madness 10%
Take-home Essay 15%
Assigned reading:
Aug
29/30
First class meeting – no assigned reading
Sept
5/6
The Monday class does not meet this week (university holiday).
For the Tuesday class, there will be no assigned reading. We
will have a special event that Tuesday evening. The Tuesday
students are required to attend, the Monday students are
welcome but not required to attend.
Sept
12/13
 Heilbroner, R. (1967) “Do Machines Make History?”
Technology and Culture, Vol. 8, No. 3, 335.
 Wintroub, M. (1999). Taking stock at the end of the world:
Rites of distinction and practices of collecting in early
modern Europe. Studies in history and philosophy of
science, 30, 395–424.
 Kinney, B. (2010). The Internet, Public Libraries, and the
Digital Divide. Public Library Quarterly, 29(2), 104-161.
 Peter Drucker, "The Age of Social Transformation," The
Atlantic Monthly, November 1994. Available at:
http://www.theatlantic.com/past/docs/issues/95dec/chi
learn/drucker.htm
 Patton, J.W. (2000). “Protecting privacy in public?
Surveillance technologies and the value of public places.”
Ethics and Information Technology 2:181-187
Sept
19/20
Sept
26/27
Oct 3/4
 Marx, Leo. 1997. "Technology: The Emergence of a
Hazardous Concept". Social Research, Vol. 64, No. 3.
 Darnton, R. (1984). Philosophers trim the tree of
knowledge: the epistemological strategy of the
Encyclopédie. The great cat massacre and other episodes
in French cultural history, 191–215.
 Donat, E., Brandtweiner, R., & Kerschbaum, J. (2009).
Attitudes and the Digital Divide: Attitude Measurement as
Instrument to Predict Internet Usage. Informing Science,
1237-56.
 Garcia, A. C., Dawes, M. E., Kohne, M. L., Miller, F. M., &
Groschwitz, S. F. (2006) Workplace studies and
technological change. In B. Cronin (Ed.), Annual Review of
Library and Information Science, 40, 393-487.
 Blanchette, J.-F. and Johnson, D.G.. (2002). “Data
retention and the Panoptic society: the social benefits of
forgetfulness.” The Information Society 18:33-45
 Langdon Winner, “Mythinformation,” The Whale and the
Reactor
 Gould, S. J. (1985). The Hottentot Venus. In The
flamingo's smile (pp. 291-305). W.W. Norton & Company.
 Seong-Jae, M. (2010). From the Digital Divide to the
Democratic Divide: Internet Skills, Political Interest, and
the Second-Level Digital Divide in Political Internet Use.
Journal of Information Technology & Politics, 7(1), 22-35.
 MacIntosh-Murray, A., & Choo, C. W. (2005). Information
behavior in the context of improving patient safety.
Journal of the American Society for Information Science and
Technology, 56(12), 1332-1345.
 Dourish, P. Anderson, K. (2006). Collective Information
Practice: Exploring Privacy and Security as Social and
Cultural Phenomena. Human-Computer Interaction. 21,
319-342.
 Scott D.N. Cook, "The Structure of Technological




Oct
10/11





Oct
17/18



Revolutions and the Gutenberg Myth," in Internet Dreams:
Archetypes, Myths, and Metaphors, Mark Stefik, ed.,
1997.
Bennett, T. (1998). Speaking to the eyes: museums,
legibility and the social order. The politics of display
museums, science, culture, London-New York, Routledge,
25–35.
Stevenson, S. (2009). Digital Divide: A Discursive Move
Away from the Real Inequities. Information Society, 25(1),
1-22.
Hutchins, E & Klausen, T. (1996). Distributed
cognition in an airline cockpit. In Y. Engestrom and D.
Middleton(Eds.), Cognition and communication at work.
New York: Cambridge University Press
Frost, Jeana H and Massagli, Michael P. (2008). Social
Uses of Personal Health Information Within
PatientsLikeMe, an Online Patient Community: What Can
Happen When Patients Have Access to One Another’s
Data. Journal of Medical Internet Research 10(3).
Available online:
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2553248
/
Granovetter, Mark. 1973. “The Strength of Weak Ties.” The
American Journal of Sociology 78:1360-1380.
Haraway, D. (1984). Teddy bear patriarchy: Taxidermy in
the garden of Eden, New York City, 1908-1936. Social
Text, 20–64.
James, J. (2011). Are Changes in the Digital Divide
Consistent with Global Equality or Inequality? Information
Society, 27(2), 121-128.
William Aspray, IT Offshoring and American Labor,
American Behavioral Scientist, vol. 53, no. 7, 962-982.
Jones, M., Schuckman, A., and Watson, K. (2004) The
Ethics of Pre-Employment Screening Through the Use of the
Internet. http://www.ethicapublishing.com/3CH4.htm
McPherson, Miller, Lynn Smith-Lovin and James Cook.
2001. “Birds of a Feather: Homophily in Social Networks.”
Annual Review of Sociology Vol. 27, pp. 415-444.
Sherman, D. J. (1994). Art, commerce, and the production
of memory in France after World War I. Commemorations:
The politics of national identity, 186–211.
Wanda Orlikowski , Evolving With Notes: Organizational
Change Around Groupware Technology, 1995, available at
http://mit.dspace.org/bitstream/handle/1721.1/2577/S
WP-3823-32948044-CCS-186.pdf?sequence=1


Oct
24/25





Oct 31/
Nov 1





Nov 7/8


Wanda Orlikowski, Learning from Notes: Organizational
Issues in Groupware Implementation. Proceedings of the
1992 ACM Conference on Computer-supported
Cooperative Work.
Kuhn, Martin. Interactivity and Prioritizing the Human: A
Code of Blogging Ethics. Journal of Mass Media Ethics,
22(1), 18–36
Barbakoff, A. Libraries Build Autonomy: A Philosophical
Perspective on the Social Role of Libraries and
Librarians. Library Philosophy and Practice v. 2010 (2010)
David Neufeld, “Parks Canada, the Commemoration of
Canada, and Northern Aboriginal Oral History,” pp. 7-30
in Paula Hamilton and Linda Shopes, eds. Oral History
and Public Memories. Temple University Press, 2008.
Warschauer, Mark and Morgan Ames. 2010. “Can One
Laptop Per Child Save the World's Poor?”. Journal of
International Affairs 64, 1: 33-51.
Perry. J. et al. Disability, Inability, and Cyberspace. (1998)
From Batya Friedman (ed). Designing Computers for
People: Human Values and the Design of Computer
Technology. Stanford, CA: CSLI Publications.
Hedstrom, M., & King, J. L. (2006). Epistemic
Infrastructure in the Rise of the Knowledge Economy. In
B. Kahin & D. Foray (Eds.), Advancing knowledge and the
knowledge economy. The MIT Press.
Nissenbaum, Helen. 2001. “How Computer Systems
Embody Values”. IEEE Computer 34:3.
Zerubavel, E. (1996). Social memories: Steps to a
sociology of the past. Qualitative Sociology, 19(3), 283–
299.
Waddington, David. Locating the wrongness in ultra-violent
video games. Ethics and Information Technology 9:2 (July
2007): 121-128.
Janet Vertesi, Mind the Gap: The London Underground
Map and Users' Representations of Urban Space; Social
Studies of Science, Feb 01, 2008; 38: 7-33.
Baym, N.K. (2005). Amateur experts: international fan
labor in Swedish independent music.
International*Journal*of*Cultural*Studies. 12: 1-17
Resnick, P. (2000) Beyond bowling together: Sociotechnical
capital. Chapter 29 in HCI in the New Millenium, ed.
John M. Carroll. AddisonWesley, 247-272.
Akrich, M. (1992). The De-Scription of Technical Objects.
In J. Bijker & J. Law (Eds.), Shaping Technology /
Building Society. Cambridge, MA: MIT Press.
Nov
14/15
Nov
21/22
 Beth Kolko and Cynthia Putnam. Computer Games in the
Developing World: The Value of Non-Instrumental
Engagement with ICTs, or Taking Play Seriously.
International Conference on Information and
Communication Technologies and Development, 2009.
Full Paper.
 Jenna Hartel, Information in the Hobby of Gourmet
Cooking: Four Contexts. Chapter 7 in William Aspray and
Barbara M. Hayes, Everyday Informaton. MIT Press, 2011.
 Levy, D., “Where’s Waldo? Reflections on Copies and
Authenticity in a Digital Environment,” in Authenticity in
a Digital Environment, edited by Abby Smith. Washington,
CLIR, 1999.
http://www.clir.org/pubs/abstract/pub92abst.html
 Trevor J. Pinch; Wiebe E. Bijker. The Social Construction of
Facts and Artifacts: Or How the Sociology of Science and
the Sociology of Technology Might Benefit Each Other ;
Social Studies of Science, Vol. 14, No. 3 (Aug., 1984), pp.
399-441.
 Latour, B. (1992). Where are the missing masses? The
sociology of a few mundane artifacts. Shaping
technology/building society: Studies in sociotechnical
change, 225–258.
 Best, M. L., & Wade, K. (2009). The Internet and Democracy:
Global catalyst or democratic dud? Bulletin of Science
Technology Society, 6(2).
 Catherine Marshall, Digital Copies and a Distributed
Notion of Reference in Personal Archives. In Megan
Winget and William Aspray, Digital Media: Technological
and Social Challenges of the Interactive World. Scarecrow
Press, 2011.
 Mary Niles Maack, "Books and Libraries as Instruments
of Cultural Diplomacy In Francophone Africa During the
Cold War." Libraries & Culture 36 (Winter 2001):58-86.
 Klein, H., Kleinman, D. The Social Construction of
Technology: Structural Considerations, Science,
Technology & Human Values January 1, 2002 27: 28-52.
 Dresang, E. T. Intellectual Freedom and Libraries:
Complexity and Change in the Twenty-First-Century
Digital Environment. The Library Quarterly v. 76 no.
2 (April 2006) p. 169-92
 Genevieve Bell, The Age of the Thumb: A Cultural Reading
of Mobile Technologies from Asia, Knowledge, Technology,
and Policy 19, 2, pp. 41-47
 Susan Leigh Star and James R. Griesemer, Institutional

Nov
28/29





Ecology, ‘Translations’ and Boundary Objects: Amateurs
and Professionals in Berkeley’s Museum of Vertebrate
Zoology, 1907-1939. Social Studies of Science, August
1989 vol. 19 no. 3 387-420.
Alistair Black and Antony Bryant, Knowledge Management
and Diplomacy. First Monday, vol. 16, no. 1-3, January
2011.
Latour, Bruno. (1995) Mixing humans and nonhumans
together: The sociology of door-closer. In S.L.Star (Ed.),
Ecologies of knowledge: work and politics in science and
technology (pp. 257-277). SUNY Press. Online in Social
Problems, Vol. 35, No. 3, Special Issue: The Sociology of
Science and Technology, Jun., 1988
Woolwine, D. E. Libraries and the Balance of Liberty and
Security. Library Philosophy and Practicev. 2007 (2007) p.
1-17
Genevieve Bell, No More SMS From Jesus: Ubicomp,
Religion, and Techno-Spiritual Practices. Ubicomp 2006,
Lecture Notes in Computer Science 4206/2006, pp. 141158.
Bowker G. (1996). The History of Information
Infrastructures: the Case of International Classification of
Disease. Information Processing and Management. 32(1),
49-61.
Philip Doty, Privacy, Reading, and Trying Out Identity: The
Digital Millennium Copyright Act and Technological
Determinism. In William Aspray and Philip Doty, eds.
Privacy in America. Scarecrow, 2011.
Book List for Class Presentation and Essay Review:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Janet Abbate, Inventing the Internet (MIT, 1999).
A. Abbott, The System of Professions (Chicago, 1988)
Atsushi Akera, Calculating a Natural World (MIT 2008)
A. Allen, Why Privacy Isn’t Everything: Feminist Reflections on
Personal Accountability (Rowman & Littlefield, 2003)
A. Allen, Unpopular Privacy: What Must We Hide? (Oxford, 2011)
M. Anchordoguy, Computers INC: Japan’s Challenge to IBM
(Harvard, 1990)
Stanley Aronowitz and William DiFazio, The Jobless Future: SciTech and the Dogma of Work (Minnesota, 1995)
W. Aspray, Chasing Moore’s Law (SciTech, 2004)
W. Aspray and Paul Ceruzzi, eds. The Internet and American
Business (MIT, 2008)
10.
W. Aspray and B.M. Hayes, eds. Everyday Information (MIT,
2011)
11.
W. Aspray, F. Mayadas, and M. Vardi, Globalization and the
Offshoring of Software (ACM, 2006)
12.
C. Avgerou, C. Ciborro, and F. Land. The Social Study of
Information and Communication Technology: Innovation, Actors, and
Contexts (Oxford, 2004)
13.
Stephen Baker, The Numerati (Houghton Mifflin Harcourt,
2008)
14.
Matthew Battles, Library: An Unquiet History (Norton, 2004)
15.
N. Basbanes, Among the Gently Mad: Strategies and
Perspectives for the Book Hunter in the 21st Century (Henry Holt
2003)
16.
N. Basbanes, Patience and Fortitude (Harper Perennial, 2003)
17.
J. Bastian and B. Alexander, Communities and Their Archives
(Facet, 2009)
18.
N. Baym, Personal Connections in the Digital Age (Polity
2010)
19.
K. Benedict, Ethics and the Archival Profession (SAA, 2003)
20.
J. Beniger, The Control Revolution (Harvard 1986)
21.
Y. Benkler, The Wealth of Networks (Yale 2007)
22.
W. Bijker, P. Hughes and T. Pinch, eds., The Social
Construction of Technological Systems (MIT 1987)
23.
A. Bishop, N. van House, P. Buttenfield, B. Schatz, Digital
Library Use: Social Practice in Design and Evaluation (MIT 2003)
24.
A. Black, A New History of the English Public Library: Social
and Intellectual Contexts, 1850-1914 (Leicester, 1996)
25.
Alistair Black, D. Muddiman, and H. Plant, The Early
Information Society (Ashgate 2007)
26.
A. Black, S. Pepper, and K. Bagshaw, Books, Buildings, and
Social Engineering (Ashgate 2009)
27.
C. Borgman, Scholarship in the Digital Age (MIT, 2007)
28.
C. P. Bourne and T. Bellardo Hahn, A History of Online
Information Services (MIT, 2003)
29.
G. Bowker, Memory Practices in the Sciences (MIT 2005)
30.
G. Bowker and S. L. Star, Sorting Things Out (MIT, 1999)
31.
Brabazon, T., (ed.), The Revolution Will Not Be Downloaded –
Dissent in the digital age, (Chandos, 2008)
32.
S. Braman, Change of State: Information, Policy, and Power
(MIT, 2006)
33.
Breazeal, Cynthia. Designing Sociable Robots. (MIT, 2002)
34.
G. Brock , The US Computer Industry (Ballinger 1975)
35.
Brooks, Rodney. Flesh and Machines: How Robots Will
Change Us. (Vintage, 2002)
36.
J. Seeley Brown and Paul Duguid, The Social Life of
Information (Harvard Business, 2002)
37.
E. Brynjolfsson and A. Saunders, Wired for Innovation: How
Information is Reshaping the Economy (MIT, 2010)
38.
P. Boczkowski. Digitizing the News (MIT, 2004)
39.
F. Cameron and S. Kenderdine, Theorizing Digital Cultural
Heritage (MIT, 2010)
40.
Carr, Nicholas G., Does IT Matter? (Harvard Business, 2004)
41.
Karin Knorr Cetina, Epistemic Cultures (Harvard, 1999)
42.
A. Chandler and J. Cortada, A Nation Transformed by
Information: How Information has Shaped the United States from
Colonial Times to the Present (Oxford 2003)
43.
J. Cohoon and W. Aspray, eds. Women and Information
Technology (MIT 2006)
44.
J. Cortada, ed. Rise of the Knowledge Worker (ButterworthHeinemann 1998)
45.
J. Cortada, How Societies Embrace Information Technology
Wiley/IEEE Computer Society 2009
46.
J. Cortada, Information Technology as Business History
(Greenwood 1996)
47.
J. Cortada, Before the Computer (Princeton, 2000)
48.
J. Cortada, The Digital Hand (3 vols, Oxford, 2003, 2005,
2007)
49.
R. Coyne, The Tuning of Place: Sociable Spaces and Pervasive
Digital Media (MIT, 2010)
50.
Luciana D'Adderio, Inside the Virtual Product: How
Organizations Create Knowledge through Software (Research
Studies Press, 2004)
51.
R. Darnton, The Case for Books (Public Affairs, 2010)
52.
C. Davidson and D. Goldberg, The Future of Thinking:
Learning Institutions in a Digital Age (MIT 2010)
53.
M. Deuze, Media Work (Polity, 2007)
54.
S. Douglas, Inventing American Broadcasting (Johns
Hopkins, 1989)
55.
P. Dourish, Where the Action Is: Foundations of Embodied
Interaction (Bradford/MIT 2004)
56.
P. Dourish and G. Bell, Divining a Digital Future: Mess and
Mythology in Ubiquitous Computing (MIT, 2011)
57.
G. Downey, The machine in me: An anthropologist sits among
computer engineers (Routledge, 1998).
58.
Paul Edwards, A Vast Machine: Computer Models, Climate
Data, and the Politics of Global Warming (MIT 2010)
59.
Paul Edwards, The Closed World: Computers and the Politics
of Discourse in Cold War America (MIT, 1997)
60.
J. English-Lueck, Cultures@Silicon Valley. Palo Alto:
(Stanford, 2002)
61.
N. Ensmenger, The Computer Boys Take Over: Computers,
Programmers, and the Politics of Technical Expertise (MIT 2010)
62.
C. Fischer, America Calling: A Social History of the Telephone
to 1940 (California 1992)
63.
K. Flamm, Creating the Computer (Brookings, 1988)
64.
D. Forsythe, Studying Those Who Study Us: An
Anthropologist in the World of Artificial Intelligence, (Stanford, 2001)
65.
D. Garrison, Apostles of Culture: The Public Librarian and
American Society, 1876-1920 (Free Press, 1979)
66.
Barbara Garson, The Electronic Sweatshop (Penguin, 1989)
67.
D. Grier, When Computers Were Human (Princeton, 2007)
68.
Hackett, E.J., Amsterdamska, O., Lynch, M., and Wajcman,
J., eds. The Handbook of Science and Technology Studies. (MIT,
2008)
69.
David Hakken, Cyborgs@Cyberspace? An Ethnographer
Looks to the Future, (Routledge, 1999)
70.
David Hakken, The Knowledge Landscapes of Cyberspace
(Routledge, 2003)
71.
Kristine C. Harper, Weather by the Numbers: The Genesis of
Modern Meteorology (MIT, 2008)
72.
Verne Harris and Terry Cook, Archives and Social Justice: A
South African Perspective (SAA, 2007)
73.
Kathryn Henderson, On Line and On Paper: Visual
Representations, Visual Culture, and Computer Graphics in Design
Engineering (MIT, 1998)
74.
C. Hess and E. Ostrom, Understanding Knowledge as a
Commons: From Theory to Practice (MIT, 2006)
75.
C. Hamilton et al, eds. Refiguring the Archive (Springer,
2002)
76.
K. Hayles, How We Became Posthuman (Chicago, 1999).
77.
M. Hindman, The Myth of Digital Democracy (Princeton,
2008)
78.
Hinds, P.J., Kiesler, S., eds. Distributed Work (MIT, 2002).
79.
M. Hobart and Z. Schiffman, Information Ages: Literacy,
Numeracy, and the Computer Revolution (Johns Hopkins, 2000)
80.
P. Howard, The Digital Origins of Dictatorship and Democracy:
Information Technology and Political Islam (Oxford, 2010)
81.
Edwin Hutchins, Cognition in the Wind (Bradford, 1996)
82.
H. Jenkins, Convergence Culture: Where Old and New Media
Collide (NYU, revised 2008)
83.
M. Ito, Engineering Play: A Cultural History of Children’s
Software (MIT, 2009)
84.
R. Jimerson, Archives Power (ALA, 2009)
85.
Y Kafai et al. Beyond Barbie and Mortal Combat: New
Perspectives on Gender and Gaming (MIT, 2011)
86.
J. Kallinikos, The Consequences of Information: Institutional
Implications of Technological Change (Edward Elgar, 2008)
87.
G. Kunda, Engineering Culture: Control and Commitment in a
High-Tech Corporation (Temple 2nd ed., 2006))
88.
R. David Lankes, The Atlas of New Librarianship (MIT, 2011)
89.
B. Laurel, Computers as Theater (Addison Wesley 2003)
90.
J. Lave and E. Wenger, Situated Learning (Cambridge, 1991)
91.
L. Lessig, Code Version 2.0 (Basic Books, 2006)
92.
L. Lessig, Remix (Penguin, 2008)
93.
Frank Levy and Richard Murnane, The New Division of
Labor: How Computers are Creating the Next Job Market (Princeton,
2005)
94.
David Levy, Scrolling Forward: Making Sense of Documents in
the Digital Age (Arcade, 2003)
95.
Alison Lewis, Questioning Library Neutrality (Library Juice
Press, 2008).
96.
J. Light, From Warfare to Welfare: Defense Intellectuals and
Urban Problems in Cold War America (Johns Hopkins 2003)
97.
L. Liverouw, Alternative and Activist New Media (Polity 2011)
98.
M. Lynch and S. Woolgar, Representation in Scientific Practice
(MIT, 1990)
99.
F. Machlup, Knowledge: Its Creation, Distribution, and
Economic Significance (2 vols., Princeton, 1980, 1982)
100.
F. Machlup and U. Mansfield, eds. The Study of Information:
Interdisciplinary Messages (Wiley, 1983)
101.
D. MacKenzie, Knowing Machines (MIT, 1998)
102.
D. MacKenzie and J. Wajcman, The Social Shaping of
Technology (McGraw Hill Education/Open University, 1999)
103.
J. Margolis, Stuck in the Shallow End: Education, Race, and
Computing (MIT 2010)
104.
C. Marvin, When Old Technologies Were New Oxford, 1990)
105.
P. Menzel, Peter and F. D’Aluisio,. 2000. Robo Sapiens:
Evolution of a New Species (MIT, 2000)
106.
R.K. Molz, Civic Space/Cyberspace: The American Public
Library in the Information Age (MIT, 2001)
107.
Nick Monfort and Ian Bogost, Racing the Beam (MIT, 2009)
108.
K. Montgomery, Generation Digital (MIT, 2009)
109.
J. Murray, Hamlet on the Holodeck: The Future of Narrative in
Cyberspace (MIT, 1998)
110.
Bonnie Nardi, A Small Matter of Programming: Perspectives on
End User Computing (MT, 1993)
111.
F. Nebeker, Calculating the Weather (Academic Press, 1995)
112.
H. Nissenbaum, Privacy in Context (Stanford Law Books,
2009)
113.
H. Nissenbaum and M. Price, eds. Academy and the Internet
(Peter Lang, 2004)
114.
D. Noble, Forces of Production: A Social History of Industrial
Automation (Knopf, 1984)
115.
D. Nye, Technology Matters (MIT, 2007)
116.
W. Ong, Orality and Literacy (Routledge, 2nd ed. 2002)
117.
Julian Orr, Talking About Machines: An Ethnography of a
Modern Job (Cornell, 1996)
118.
John Pateman and John Vincent, Public Libraries and Social
Justice (Ashgate, 2010)
119.
M. Porat, The Information Economy (U. Michigan Library
reprint, 1977).
120.
Mark Poster, Information Please: Culture and Politics in the
Age of Digital Machines (Duke, 2006)
121.
M. Proctor, C. Cook, and M.G. Williams, eds. Political
Pressure and the Archival Record (SAA, 2005)
122.
Jeremy Rifkin, The End of Work: The Decline of the Global
Labor Force and the Dawn of the Post-Market Era (Tarcher, 1996)
123.
M. Rubin and M. Huber, The Knowledge Industry in the
United States, 1960-1980 (Princeton, 1986).
124.
S. Shapin, A Social History of Truth (Chicago, 1995)
125.
C. Shapiro and H. Varian, Information Rules: A Strategic
Guide to the Network Economy (Harvard Business School Press,
1998)
126.
O. Shy, The Economics of Networked Industries (Cambridge
2001).
127.
D. Solove, Understanding Privacy (Harvard, 2010)
128.
D. Solove, The Future of Reputation: Gossip, Rumor, and
Privacy on the Internet (Yale, 2008)
129.
Clay Spinuzzi, Tracing Genres through Organizations: A
Sociocultural Approach to Information Design (MIT, 2003)
130.
S. L. Star, Ecologies of Knowledge (SUNY, 1995)
131.
M. Stefik, ed., Internet Dreams: Archetypes, Myths, and
Metaphors (MIT, 1997)
132.
Mitchell Stevens, The Rise of the Image, The Fall of The Word
(Oxford, 1998)
133.
C. Sunstein, Infotopia (Oxford, 2008)
134.
Robert S. Taylor, Value-Added Processes in Information
Systems (Ablex, 1986)
135.
Michael Thomas, Deconstructing Digital Natives (Routledge
2011)
136.
Stefan Thomke, Experimentation Matters: Unlocking the
Potential of New Technologies for Innovation (Harvard Business,
2003)
137.
P. Thompson, R. Parker and P. Boreham, New Technology @
Work (Routledge, 2008)
138.
David Trend, ed., Reading Digital Culture (Wiley-Blackwell,
2001)
139.
Sherry Turkle, Simulation and its Discontents (MIT, 2009)
140.
Ullman, Ellen. (1997) Close to the Machine: Technophilia and
Its Discontents (City Lights, 2nd ed. 2001)
141.
J. van den Hoven and J. Weckert, eds. Information
Technology and Moral Philosophy (Cambridge, 2009)
142.
Jose van Dijck, Mediated Memories in the Digital Age
(Stanford, 2007)
143.
H. Varian, J. Farrell, and C. Shapiro, The Economics of
Information Technology (Cambridge, 2005).
144.
M. Warschauer, Technology and Social Inclusion (MIT, 2004)
145.
S. C. Watkins, The Young and the Digital (Beacon 2010)
146.
Weber, Steven, The Success of Open Source (Harvard, 2005)
147.
Webster, Frank, Theories of the Information Society (Taylor &
Francis, 2nd ed. 2002)
148.
E. Wenger, Communities of Practice (Cambridge, 1999)
149.
W. Wiegand, The Politics of an Emerging Profession: The
American Library Association (Greenwood, 1986)
150.
W. Wiegand, Uncovering Labour in Information Revolutions,
1750-2000 (Cambridge, 2004)
151.
J. Willinsky, The Access Principle: The Case for Open Access
to Research and Scholarship (MIT, 2009)
152.
A. Wright, Glut: Mastering Information Through the Ages
(Cornell, 2008)
153.
T. Wu, The Master Switch: The Rise and Fall of Information
Empires (Knopf, 2010)
154.
J. Yates, Control Through Communication: The Rise of System
in American Management (Johns Hopkins, 1993)
155.
J. Yates, Structuring the Information Age: Life Insurance and
Technology in the Twentieth Century (Johns Hopkins 2005)
156.
JoAnne Yates and John Van Maanen, eds., Information
Technology and Organizational Transformation (Sage, 2000)
157.
J. Yost, The Computer Industry (Greenwood 2005)
158.
M. Zeegers and D. Barron, Gatekeepers of Knowledge: A
Consideraton of the Library, the Book and the Scholar in the
Western World (Chandos 2010)
159.
S. Zuboff, In the Age of the Smart Machine: The Future of
Work and Power (Basic, 1989)
160.
Lisa Zunshine, ed. Introduction to Cognitive Cultural Studies
(Johns Hopkins, 2010)
Articles for Minute Madness:
1. Biagioli, M. (1990). Galileo the Emblem Maker. Isis, 230–258.
2. Jaron Lanier, You Are Not a Gadget: A Manifesto (Knopf, 2010), pp. 3-23.
3. Yates, J., & Orlikowski, W. (1992). Genres of organizational communication: A
structurational approach to studying communication and media. Academy of
Management Review, 17:299-326.
4. STERNE, J. & LEACH, J. (2005) The Point of Social Construction and the Purpose
of Social Critique. Social Epistemology 19: pp. 283-285.
5. Law, John. Notes on the Theory of the Actor Network: Ordering, Strategy and
Heterogeneity. Center for Science Studies, Lancaster University, 1992.
6. Wynn, B. (1992). Misunderstood Misunderstanding: Social Identities and Public
Uptake of Science. Public Understanding of Science vol. 1, no. 3 July 1992, pp.
281-304.
7. Briscoe, F. & Safford, S. (2008). The Nixon-in-China effect: activism, imitation and
the institutionalization of contentious practices, Administrative Science
Quarterly, 53: 460-491.
8. Downey, G. (2001), Virtual webs, physical technologies, and hidden workers: The
spaces of labor in information internetworks, Technology and Culture 42: 20935
9. Kim, E., Lee, B., & Menon, N. M. (2009). Social welfare implications of the digital
divide. Government Information Quarterly, 26(2), 377-386.
10. Duff, A. S. (2011). The Rawls-Tawney theorem and the digital divide in
postindustrial society. Journal of the American Society for Information Science &
Technology, 62(3), 604-612.
11. DiMaggio, Paul, Eszter Hargittai, W. Russell Neuman, and John P. Robinson.
2001. “Social Implications of the Internet.” Annual Review of Sociology 27:307336.
12. Mathew, Ashwin J. and Coye Cheshire. 2010. “The New Cartographers: Trust
and Social Order within the Internet Infrastructure.” Presented at the 38th
Telecommunications Policy Research Conference.
13. Simon, H. (1991). Bounded rationality and organizational learning. Organization
Science, Special Issue: Organizational Learning: Papers in Honor of (and by)
James G. March, 2:125-134
14. Suchman, L. (1995). Making work visible. Communications of the ACM, 38: 56ff.
15. Brown, J.S and Duguid, P. (1991). Organizational learning and communities-ofpractice: Toward a unified view of working, learning, and innovation.
Organization Science, Special Issue: Organizational Learning: Papers in Honor of
(and by) James G. March, 2:40-57.
16. Perlow, L., Porter, J. (2009). Making Time Off Predictable and Required. The
Harvard Business Review. Oct, 102-109.
17. Osterloh, Margit and Bruno S. Frey. 2000. “Motivation, Knowledge Transfer, and
Organizational Forms.” Organization Science 11:538-550.
18. Yrjö Engeström, Expansive Visibilization of Work: An Activity-Theoretical
Perspective, Computer Supported Cooperative Work, v.8 n.1-2, p.63-93, Feb.
1999.
19. Malone, T., & Crowston, K. (1994). The interdisciplinary study of coordination.
ACM Computing Surveys, 26: 87-119.
20. Cramton, C. D. (2001). The mutual knowledge problem and its consequences for
dispersed collaboration. Organization Science, 12: 346- 371.
21. Baltes, B.B. et al. (2002). Computer-mediated communication and group
decision making: A meta-analysis. Organizational Behavior and Human Decision
Processes, 87:156-179.
22. Birnholtz, J., Bietz, M. (2003). Data at Work: Supporting Sharing in Science and
Engineering. GROUP ‘03. 339-348.
23. Ackerman, Mark S. 2000. “The intellectual challenge of CSCW: the gap between
social requirements and technical feasibility.” Human Computer Interaction
15:179-203.
24. Jessica Miller , Batya Friedman , Gavin Jancke and Brian Gill. Value tensions in
design: The value sensitive design, development, and appropriation of a
corporation's groupware system. Conference on Supporting Group Work, 2007.
Full Paper.
25. Community, Consensus, Coercion, Control: CS*W or How Policy Mediates Mass
Participation. Travis Kriplean , Ivan Beschastnikh , David W. McDonald and
Scott A. Golder. Conference on Supporting Group Work, 2007.
26. Predrag Klasnja , Sunny Consolvo , Tanzeem Choudhury , Richard Beckwith
and Jeffrey Hightower Exploring Privacy Concerns about Personal Sensing.
Pervasive, 2009.
27. Tamara Denning , Cynthia Matuszek , Karl Koscher , Joshua R. Smith and
Tadayoshi Kohno. A Spotlight on Security and Privacy Risks with Future
Household Robots: Attacks and Lessons. International Conference on Ubiquitous
Computing, 2009.
28. T. Scott Saponas , Jonathan Lester , Carl Hartung , Sameer Agarwal and
Tadayoshi Kohno. Devices That Tell On You: Privacy Trends in Consumer
Ubiquitous Computing. USENIX Security, 2007.
29. Kling, R. (1994). Reading “All About” Computerization: How Genre Conventions
Shape Non-Fiction Social Analysis. The Information Society. 10(3), 147-172.
30. S. Star and K. Ruhleder. Steps Toward an Ecology of Infrastructure: Complex
Problems in Design and Access for Large-Scale Collaborative Systems.
Proeedings of the 1994 ACM Conference on Computer Supported Cooperative
Work.
31. Flanagan, Mary, Daniel C. Howe, and Helen Nissenbaum. 2008. “Embodying
Values in Technology: Theory and Practice.” In Information Technology and Moral
Philosophy. Jeroen van den Hoven and John Weckert (Eds). Cambridge
University Press.
32. Sengers, P., McCarthy, J., and Dourish, P. 2006 Reflective HCI: HCI: articulating
an agenda for critical practice. In CHI '06 Extended Abstracts on Human Factors
in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). CHI '06.
ACM, New York, NY, 1683-1686.
33. James Hollan, Edwin Hutchins, and David Kirsh. Distributed cognition: toward
a new foundation for human-computer interaction research. ACM Transactions
on Computer- Human Interaction, Volume 7, Issue 2 (June 2000)
34. Orlikowski, W. (1992). The Duality of Technology: Rethinking the Concept of
Technology in Organizations. Organization Science. 3(3), 398-427.
35. Morana Alac. Working with Brain Scans: Digital Images and Gestural Interaction
in fMRI Laboratory. Social Studies of Science, Aug 01, 2008; 38: 483-508.
36. Elizabeth Churchill, “Sugared Puppy-Dog Tails: Gender and Design, Interactions,
March - April 2010.
37. Geroski, P.A. 2000. “Models of technology diffusion”, Research Policy 29:603625.
38. Christina Courtright, “Context in Information Behavior Research” Annual Review
of Information Science and Technology, Vol. 41 (2007).
39. Greg Downey, Human Geography and Information Studies. Annual Review of
Information Science and Technology, Vol. 41 (2007).
40. Lisa P. Nathan , Batya Friedman , Predrag Klasnja , Shaun K. Kane and Jessica
Miller. Envisioning Systemic Effects on Persons and Society Throughout
Interactive System Design. Designing Interactive Systems, 2008.
41. Ribes, D. and Finholt, T. (2009), The long now of technology infrastructure:
articulating tensions in development., Journal of the Association for Information
Systems, 10: 375-398.
42. Lisa Nathan. Ecovillages, Values, and Information Technology: Balancing
Sustainability with Daily Life in 21st Century America. Conference on Human
Factors in Computing Systems, 2008.
43. Ryan, Dan. 2006. “Getting the Word Out: Notes on the Social Organization of
Notification.” Sociological Theory 24:228-254.
44. Barak, A., and J. Suler. (2008) Reflections on the psychology and social science
of cyberspace. In A. Barak (Ed.), Psychological aspects of cyberspace: Theory,
research, applications. Cambridge, UK: Cambridge University Press.
45. Ducheneaut, N., & Watts, L. A. (2005). In search of coherence: A review of e-mail
research. Human-Computer Interaction, 20:11-48.
46. Turel, O., Serenko, A. (2010). Viewpoint: Is Mobile E-mail Addiction Overlooked?
Communications of the ACM. 53(5), 41-43.
47. McKenna, Katelyn, and John A. Bargh. 2000. “Plan 9 From Cyberspace: The
Implications of the Internet for Personality and Social Psychology.” Personality
and Social Psychology Review 4.
48. Batya Friedman , Alan Borning , Janet Davis , Brian Gill , Peter H. Kahn , Travis
Kriplean and Peyina Lin. Laying the Foundations for Public Participation and
Value Advocacy: Interaction Design for a Large Scale Urban Simulation.
International Conference on Digital Government Research, 2008.
49. R. Grinter and L. Palen. Instant Messaging in Teen Life. 2002 ACM Conference
on Computer Supported Cooperative Work.
50. Grinter R.E. and M. Eldridge (2001). Y do tngrs luv 2 txt msg? In Proceedings of
the Seventh European Conference on Computer-Supported Cooperative Work
ECSCW ‘01. Bonn, Germany. Kluwer Academic Publishers, pp. 219-238.
51. Travis Kriplean , Ivan Beschastnikh and David W. McDonald. Articulations of
WikiWork: Uncovering Valued Work in Wikipedia through Barnstars. Computer
Supported Cooperative Work, 2008.
52. Eric Paulos et al. Citizen Science: Enabling Participatory Urbanism. In Urban
Informatics: Community Integration and Implementation.
53. Stone, B. (2009). Breakfast Can Wait. The Days First Stop is Online. The New
York Times. Retrieved from:
http://www.dourish.com/classes/readings/FamiliesTechnology-NYT.pdf
54. Boast, R., Bravo, M., Srinivasan R. (2007). Return to Babel: emergent diversity,
digital resources, and local knowledge , The Information Society 23: 395-403.
55. Wellman, B. et al. (2001). Computer networks as social networks. Science,
293(14 September), 2031-2034.
56. Ellis, D., Oldridge, R. & Vasconcelos, A. (2004). Community and virtual
community. Annual Review of Information Science and Technology, 38: 145-168.
57. Antin, Judd and Coye Cheshire. 2010. Readers and not Free-Riders: Reading as
a Form of Participation in Wikipedia. Proceedings of the 2010 ACM Conference on
Computer Supported Cooperative Work.
58. Cheshire, Coye and Karen S. Cook. 2004. "The Emergence of Trust Networks
Under Uncertainty: Implications for Internet Interactions." Analyze and Kritik,
Vol 26.
59. Two special issues of Archival Science on archives and power. The intro can be
found at http://www.mendeley.com/research/archives-records-and-power-themaking-of-modern-memory/
60. Chan, Anita 2004 “Coding Free Software, Coding Free States: Free Software
Legislation and the Politics of Code in Peru.” Anthropological Quarterly 77(3)
61. Coombe, Rosemary J., & Andrew Herman 2004 “Rhetorical Virtues: Property,
Speech, and the Commons on the World-Wide Web.” Anthropological Quarterly
77 (3).
62. Golub, Alex 2004 “ Copyright and Taboo.” Anthropological Quarterly 77 (3).
63. Kelty, Christopher M. 2004 “Culture’s Open Sources: Software, Copyright, and
Cultural Critique.” Anthropological Quarterly 77(3).
64. Bohn, J. et al. Living in a World of Smart Everyday Objects – Social, Economic,
and Ethical Implications. Human and Ecological Risk Assessment 10: 2004. 763785.
65. Brey, P., “Virtual Reality and Computer Simulation,” in Himma and Tavani
(2008). In K. Himma and H. Tavani (2008), Handbook of Information and
Computer Ethics.
66. Calkins, M. Rippers, Portal Users, and Profilers: Three Web Based Issues for
Business Ethicists. Business and Society Review: 107:61 (Spring 2002): 61-75.
67. Canellopoulou-Botti, M. and Himma, K. E., “The Digital Divide: Prospects for the
Future,” in Himma and Tavani (2008), Handbook of Information and Computer
Ethics.
68. Chadwick, R. The Icelandic database – do modern times need modern sagas?
British Medical Journal 319: 7207 (1999).
Available:http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=1127047
69. Chesney, T., “An empirical examination of Wikipedia’s credibility,” First Monday
11(November 2006).
http://firstmonday.org/issues/issue11_11/chesney/index.html
70. Clifford L., “Authenticity and Integrity in the Digital Environment: An
Exploratory Analysis of the Central Role of Trust,” In Authenticity in a Digital
Environment, edited by Abby Smith. Washington, CLIR, 1999.
http://www.clir.org/pubs/abstract/pub92abst.html
71. Collins, L. “Pixel Perfect: Pascal Dangin’s Virtual Reality,” The New Yorker, May
12, 2008, pp. 94-103.
72. Consalvo, M. (2007). Cheating: Gaining advantage in videogames (pp. 83-128).
Cambridge, MA: MIT Press.
73. Ess, Charles. ‘‘Lost in translation’’?: Intercultural dialogues on privacy and
information ethics. Ethics and Information Technology 7:1 (March 2005):1-6
74. Feenberg, A. (1999). Democratizing technology. In Questioning technology. (pp.
131-47). New York: Routledge.
75. Glaser, Anja Ebersbach-Markus. Towards Emancipatory Use of a Medium: The
Wiki. International Journal of Information Ethics 2 (2004)
76. Grodzinsky, F., Tavani, Herman. P2P Networks and the Verizon v. RIAA Case:
Implications for Personal Privacy and Intellectual Property Ethics and
Information Technology 7:4 (December 2005): 243-250.
77. Hausmanninger T. Controlling the Net: Pragmatic action or ethics needed?",
International Review of Information Ethics 1:1 (June 2004).
Available:http://www.i-r-i-e.net/issue1.htm#hausmanninger,
78. Kaplan, D. M. (2004). Introduction. In Readings in the philosophy of technology.
(pp. xiii- xvi). Lanham: Rowman & Littlefield Publishers, Inc.
79. Lockton, V. Rosenberg, Richard. RFID: The Next Serious Threat to Privacy.
Ethics and Information Technology: 7: 4 (December 2005): 221-231.
80. Logan, P.Y. and Clarkson, A. Teaching students to hack: curriculum issues in
information security. Proceedings of the 36th SIGCSE technical symposium on
computer science education. (2005): 157-161.
81. Manion, M. and Goodrum, A. Terrorism or civil disobedience: toward a hacktivist
ethic. Computers and Society, 30:2 (June 2002): 14-19.
82. Moor, J. H., “Why we need better ethics for emerging technologies,” Ethics and
Information Technology (2005) 7:111-119.
83. Newman, S., et. al. Copyright: Moral Rights, Fair Use, and the Online
Environment. Journal of Information Ethics 13:2 (Fall 2004): 38-57
84. Reynolds, R. Playing a ‘Good’ Game: A Philosophical Approach to Understanding
the Morality of Games (2002).
http://www.igda.org/articles/rreynolds_ethics.php
85. Schuler, Doug. Computer Professionals and the Next Culture of Democracy.
Communications of the ACM 44:1 (January 2001): 52-57.
86. Spinello, R.A., Tavani, H.T. The Internet, ethical values, and conceptual
frameworks: an introduction to Cyberethics ACM SIGCAS Computers and Society
31:2 (June 2001) :5 – 7
87. Stajano, F.(2003). Security for whom? The shifting security assumptions of
pervasive computing. Lecture notes in computer science.
88. Strong, D., & Higgs, E. (2000). Borgmann's philosophy of technology. In
Technology and the good life? (pp. 19-37). Chicago & London: University of
Chicago Press.
89. Verrugio, G., Operto, F. Robotethics: a bottom-up interdisciplinary discourse in
the fieldof applied ethics in robotics. International Review of Information Ethics
6:2 (December2006): 3-8.
90. Wilson, C. Internet Privacy for Sale: A Viable Option When Legislation,
Litigation, and Business Self-Regulation Are Ineffective in Curbing the Abuses of
online consumers' privacy. Journal of Information Ethics, 14(1), 29-43.
91. Hope Olson's work on the social ramifications of information organization
as Library Trends, 56 (2): 509-41. 2007.
92. Mazzocchi, F., et. al., S.R. Rangnathan's [i.e. Ranganathan's] PMEST
Categories: Analyzing Their Philosophical Background and Cognitive
Function. Information Studies v. 16 no. 3 (July 2010) p. 133-47.
93. Carpenter, M., et. al., Envisioning the Library's Role in Scholarly
Communication in the Year 2025.Portal v. 11 no. 2 (April 2011) p. 659-81
94. Fischer, C. C. A Value-Added Role for Reviewers in Enhancing the Quality of
Published Research. Journal of Scholarly Publishing v. 42 no. 2 (January
2011) p. 226-3
Revised 24 June 2011
Download