INFO 380C: INFORMATION IN SOCIAL AND CULTURAL CONTEXT Professor William Aspray Fall 2011 This is a syllabus for both of my sections: Unique number 28440, M 9 am – noon, UTA 1.208 Unique number 28445, Tu 6 – 9 pm, UTA 1.208 Office: UTA 5.432, catch me before or after class, or email for an appointment to bill@ischool.utexas.edu. Office phone: 512 471 3877. Teaching assistant: TBD Catalog description: Examines the role of information in human activities, particularly how it shapes and is shaped by the social and cultural context. Considers how individuals, groups, organizations, institutions, and society at large create, find, use, understand, share, transform, and curate information. Introduction: This is a new course, required as part of the new masters curriculum. My feeling is that there is no essential piece of information or theory that every one of our students must know, but it is important that our students have a general understanding of the ways in which information scholars study information and information technologies in social and cultural context. Of the many different themes I could emphasize in the assigned readings, I selected five: Theory Traditional Library, Archival, and Museum Studies Digital Divide/Information Around the World Privacy, Ethics, and Policy Information Work and Workers If the course were organized to have all the readings grouped together on any one of these topics, we would have had approximately two to three weeks of reading for each bullet listing above. Instead, I have spread these readings out over the entire semester. So in any given week you are likely to have one or at most two papers about any given topic; and most weeks we will have readings that address at least four of those bulleted themes. Individual students who have a particular interest in one of these topics will have an opportunity for further study of the topic through several of the course assignments. Weekly readings and questions: Except for the first and second weeks of the semester, there will be required readings each week. The required readings will be posted on BlackBoard, so there are no books to buy or papers to acquire for the class. Each week, you are expected to read the material carefully, send two questions to me by email (bill@ischool.utexas.edu) - one question from each of any two of the assigned readings - no later than three hours before the start of class. The questions should be ones that will stimulate thoughtful class discussion. Be prepared to discuss all the papers in class. Courteous, thoughtful, active participation in the class discussion is expected. The weekly required readings are listed later in this document. Class presentation: Later in this document you will find a list of books on the social and cultural study of information, broadly conceived. It is not a complete list, but it represents a wide range of topics and approaches. Each student in class will select one book from this list and make a polished, 15-minute, in-class presentation of the major findings and be prepared to answer questions/lead class discussion for an additional 5 minutes. You may not select a book already selected by another student, so you should have several options in mind. I will set up a lottery to decide the order in which students get to select their book. Essay review: Using this same book list, you will choose five books and write an essay review about them. You should make your selection so that there is a common topic or theme or method across the five books. The book that you presented about in class may not be included in the five books, but any other book on the list may. (Thus, several students may end up selecting some of the same books for their essay review.) Unless you tell me privately that you do not want your essay review shared with the other students, I will post it on BlackBoard as a resource for the other students.. You should not confer with your fellow students about the selection of books; one of the things I will be interested to see is how you develop a theme that connects your five books to one another. The maximum length for your review is 1250 words. Minute madness: Later in this document you will also find a list of journal articles that are not part of the assigned weekly readings. You will select one article from the list (again there will be lottery to determine your selection order), and you will present a no-more-than 120 second discussion of the paper, followed by 60 seconds of quick Q&A on Minute Madness Day (November 7/8). Take-home essay: Finally, you will be required to write an answer to a take-home essay question, which will be due on December 2 at 5 PM. You will have no less than one week to answer the question, and your answer may not exceed 750 words. You may consult your notes, any of the assigned readings, or any publication on the list of books or additional articles. You may not do a web search, library search, or discuss this assignment with anyone else, including but not limited to the students in either section of the course. Behavior: You are expected to meet the customary guidelines for ethical and professional behavior in this course. Grading: Grades will be determined as follows: Weekly questions 15% (quality as well as turning them in on time matters) Class participation 20% Class Presentation 15% Essay Review 25% Minute Madness 10% Take-home Essay 15% Assigned reading: Aug 29/30 First class meeting – no assigned reading Sept 5/6 The Monday class does not meet this week (university holiday). For the Tuesday class, there will be no assigned reading. We will have a special event that Tuesday evening. The Tuesday students are required to attend, the Monday students are welcome but not required to attend. Sept 12/13 Heilbroner, R. (1967) “Do Machines Make History?” Technology and Culture, Vol. 8, No. 3, 335. Wintroub, M. (1999). Taking stock at the end of the world: Rites of distinction and practices of collecting in early modern Europe. Studies in history and philosophy of science, 30, 395–424. Kinney, B. (2010). The Internet, Public Libraries, and the Digital Divide. Public Library Quarterly, 29(2), 104-161. Peter Drucker, "The Age of Social Transformation," The Atlantic Monthly, November 1994. Available at: http://www.theatlantic.com/past/docs/issues/95dec/chi learn/drucker.htm Patton, J.W. (2000). “Protecting privacy in public? Surveillance technologies and the value of public places.” Ethics and Information Technology 2:181-187 Sept 19/20 Sept 26/27 Oct 3/4 Marx, Leo. 1997. "Technology: The Emergence of a Hazardous Concept". Social Research, Vol. 64, No. 3. Darnton, R. (1984). Philosophers trim the tree of knowledge: the epistemological strategy of the Encyclopédie. The great cat massacre and other episodes in French cultural history, 191–215. Donat, E., Brandtweiner, R., & Kerschbaum, J. (2009). Attitudes and the Digital Divide: Attitude Measurement as Instrument to Predict Internet Usage. Informing Science, 1237-56. Garcia, A. C., Dawes, M. E., Kohne, M. L., Miller, F. M., & Groschwitz, S. F. (2006) Workplace studies and technological change. In B. Cronin (Ed.), Annual Review of Library and Information Science, 40, 393-487. Blanchette, J.-F. and Johnson, D.G.. (2002). “Data retention and the Panoptic society: the social benefits of forgetfulness.” The Information Society 18:33-45 Langdon Winner, “Mythinformation,” The Whale and the Reactor Gould, S. J. (1985). The Hottentot Venus. In The flamingo's smile (pp. 291-305). W.W. Norton & Company. Seong-Jae, M. (2010). From the Digital Divide to the Democratic Divide: Internet Skills, Political Interest, and the Second-Level Digital Divide in Political Internet Use. Journal of Information Technology & Politics, 7(1), 22-35. MacIntosh-Murray, A., & Choo, C. W. (2005). Information behavior in the context of improving patient safety. Journal of the American Society for Information Science and Technology, 56(12), 1332-1345. Dourish, P. Anderson, K. (2006). Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction. 21, 319-342. Scott D.N. Cook, "The Structure of Technological Oct 10/11 Oct 17/18 Revolutions and the Gutenberg Myth," in Internet Dreams: Archetypes, Myths, and Metaphors, Mark Stefik, ed., 1997. Bennett, T. (1998). Speaking to the eyes: museums, legibility and the social order. The politics of display museums, science, culture, London-New York, Routledge, 25–35. Stevenson, S. (2009). Digital Divide: A Discursive Move Away from the Real Inequities. Information Society, 25(1), 1-22. Hutchins, E & Klausen, T. (1996). Distributed cognition in an airline cockpit. In Y. Engestrom and D. Middleton(Eds.), Cognition and communication at work. New York: Cambridge University Press Frost, Jeana H and Massagli, Michael P. (2008). Social Uses of Personal Health Information Within PatientsLikeMe, an Online Patient Community: What Can Happen When Patients Have Access to One Another’s Data. Journal of Medical Internet Research 10(3). Available online: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2553248 / Granovetter, Mark. 1973. “The Strength of Weak Ties.” The American Journal of Sociology 78:1360-1380. Haraway, D. (1984). Teddy bear patriarchy: Taxidermy in the garden of Eden, New York City, 1908-1936. Social Text, 20–64. James, J. (2011). Are Changes in the Digital Divide Consistent with Global Equality or Inequality? Information Society, 27(2), 121-128. William Aspray, IT Offshoring and American Labor, American Behavioral Scientist, vol. 53, no. 7, 962-982. Jones, M., Schuckman, A., and Watson, K. (2004) The Ethics of Pre-Employment Screening Through the Use of the Internet. http://www.ethicapublishing.com/3CH4.htm McPherson, Miller, Lynn Smith-Lovin and James Cook. 2001. “Birds of a Feather: Homophily in Social Networks.” Annual Review of Sociology Vol. 27, pp. 415-444. Sherman, D. J. (1994). Art, commerce, and the production of memory in France after World War I. Commemorations: The politics of national identity, 186–211. Wanda Orlikowski , Evolving With Notes: Organizational Change Around Groupware Technology, 1995, available at http://mit.dspace.org/bitstream/handle/1721.1/2577/S WP-3823-32948044-CCS-186.pdf?sequence=1 Oct 24/25 Oct 31/ Nov 1 Nov 7/8 Wanda Orlikowski, Learning from Notes: Organizational Issues in Groupware Implementation. Proceedings of the 1992 ACM Conference on Computer-supported Cooperative Work. Kuhn, Martin. Interactivity and Prioritizing the Human: A Code of Blogging Ethics. Journal of Mass Media Ethics, 22(1), 18–36 Barbakoff, A. Libraries Build Autonomy: A Philosophical Perspective on the Social Role of Libraries and Librarians. Library Philosophy and Practice v. 2010 (2010) David Neufeld, “Parks Canada, the Commemoration of Canada, and Northern Aboriginal Oral History,” pp. 7-30 in Paula Hamilton and Linda Shopes, eds. Oral History and Public Memories. Temple University Press, 2008. Warschauer, Mark and Morgan Ames. 2010. “Can One Laptop Per Child Save the World's Poor?”. Journal of International Affairs 64, 1: 33-51. Perry. J. et al. Disability, Inability, and Cyberspace. (1998) From Batya Friedman (ed). Designing Computers for People: Human Values and the Design of Computer Technology. Stanford, CA: CSLI Publications. Hedstrom, M., & King, J. L. (2006). Epistemic Infrastructure in the Rise of the Knowledge Economy. In B. Kahin & D. Foray (Eds.), Advancing knowledge and the knowledge economy. The MIT Press. Nissenbaum, Helen. 2001. “How Computer Systems Embody Values”. IEEE Computer 34:3. Zerubavel, E. (1996). Social memories: Steps to a sociology of the past. Qualitative Sociology, 19(3), 283– 299. Waddington, David. Locating the wrongness in ultra-violent video games. Ethics and Information Technology 9:2 (July 2007): 121-128. Janet Vertesi, Mind the Gap: The London Underground Map and Users' Representations of Urban Space; Social Studies of Science, Feb 01, 2008; 38: 7-33. Baym, N.K. (2005). Amateur experts: international fan labor in Swedish independent music. International*Journal*of*Cultural*Studies. 12: 1-17 Resnick, P. (2000) Beyond bowling together: Sociotechnical capital. Chapter 29 in HCI in the New Millenium, ed. John M. Carroll. AddisonWesley, 247-272. Akrich, M. (1992). The De-Scription of Technical Objects. In J. Bijker & J. Law (Eds.), Shaping Technology / Building Society. Cambridge, MA: MIT Press. Nov 14/15 Nov 21/22 Beth Kolko and Cynthia Putnam. Computer Games in the Developing World: The Value of Non-Instrumental Engagement with ICTs, or Taking Play Seriously. International Conference on Information and Communication Technologies and Development, 2009. Full Paper. Jenna Hartel, Information in the Hobby of Gourmet Cooking: Four Contexts. Chapter 7 in William Aspray and Barbara M. Hayes, Everyday Informaton. MIT Press, 2011. Levy, D., “Where’s Waldo? Reflections on Copies and Authenticity in a Digital Environment,” in Authenticity in a Digital Environment, edited by Abby Smith. Washington, CLIR, 1999. http://www.clir.org/pubs/abstract/pub92abst.html Trevor J. Pinch; Wiebe E. Bijker. The Social Construction of Facts and Artifacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other ; Social Studies of Science, Vol. 14, No. 3 (Aug., 1984), pp. 399-441. Latour, B. (1992). Where are the missing masses? The sociology of a few mundane artifacts. Shaping technology/building society: Studies in sociotechnical change, 225–258. Best, M. L., & Wade, K. (2009). The Internet and Democracy: Global catalyst or democratic dud? Bulletin of Science Technology Society, 6(2). Catherine Marshall, Digital Copies and a Distributed Notion of Reference in Personal Archives. In Megan Winget and William Aspray, Digital Media: Technological and Social Challenges of the Interactive World. Scarecrow Press, 2011. Mary Niles Maack, "Books and Libraries as Instruments of Cultural Diplomacy In Francophone Africa During the Cold War." Libraries & Culture 36 (Winter 2001):58-86. Klein, H., Kleinman, D. The Social Construction of Technology: Structural Considerations, Science, Technology & Human Values January 1, 2002 27: 28-52. Dresang, E. T. Intellectual Freedom and Libraries: Complexity and Change in the Twenty-First-Century Digital Environment. The Library Quarterly v. 76 no. 2 (April 2006) p. 169-92 Genevieve Bell, The Age of the Thumb: A Cultural Reading of Mobile Technologies from Asia, Knowledge, Technology, and Policy 19, 2, pp. 41-47 Susan Leigh Star and James R. Griesemer, Institutional Nov 28/29 Ecology, ‘Translations’ and Boundary Objects: Amateurs and Professionals in Berkeley’s Museum of Vertebrate Zoology, 1907-1939. Social Studies of Science, August 1989 vol. 19 no. 3 387-420. Alistair Black and Antony Bryant, Knowledge Management and Diplomacy. First Monday, vol. 16, no. 1-3, January 2011. Latour, Bruno. (1995) Mixing humans and nonhumans together: The sociology of door-closer. In S.L.Star (Ed.), Ecologies of knowledge: work and politics in science and technology (pp. 257-277). SUNY Press. Online in Social Problems, Vol. 35, No. 3, Special Issue: The Sociology of Science and Technology, Jun., 1988 Woolwine, D. E. Libraries and the Balance of Liberty and Security. Library Philosophy and Practicev. 2007 (2007) p. 1-17 Genevieve Bell, No More SMS From Jesus: Ubicomp, Religion, and Techno-Spiritual Practices. Ubicomp 2006, Lecture Notes in Computer Science 4206/2006, pp. 141158. Bowker G. (1996). The History of Information Infrastructures: the Case of International Classification of Disease. Information Processing and Management. 32(1), 49-61. Philip Doty, Privacy, Reading, and Trying Out Identity: The Digital Millennium Copyright Act and Technological Determinism. In William Aspray and Philip Doty, eds. Privacy in America. Scarecrow, 2011. Book List for Class Presentation and Essay Review: 1. 2. 3. 4. 5. 6. 7. 8. 9. Janet Abbate, Inventing the Internet (MIT, 1999). A. Abbott, The System of Professions (Chicago, 1988) Atsushi Akera, Calculating a Natural World (MIT 2008) A. Allen, Why Privacy Isn’t Everything: Feminist Reflections on Personal Accountability (Rowman & Littlefield, 2003) A. Allen, Unpopular Privacy: What Must We Hide? (Oxford, 2011) M. Anchordoguy, Computers INC: Japan’s Challenge to IBM (Harvard, 1990) Stanley Aronowitz and William DiFazio, The Jobless Future: SciTech and the Dogma of Work (Minnesota, 1995) W. Aspray, Chasing Moore’s Law (SciTech, 2004) W. Aspray and Paul Ceruzzi, eds. The Internet and American Business (MIT, 2008) 10. W. Aspray and B.M. Hayes, eds. Everyday Information (MIT, 2011) 11. W. Aspray, F. Mayadas, and M. Vardi, Globalization and the Offshoring of Software (ACM, 2006) 12. C. Avgerou, C. Ciborro, and F. Land. The Social Study of Information and Communication Technology: Innovation, Actors, and Contexts (Oxford, 2004) 13. Stephen Baker, The Numerati (Houghton Mifflin Harcourt, 2008) 14. Matthew Battles, Library: An Unquiet History (Norton, 2004) 15. N. Basbanes, Among the Gently Mad: Strategies and Perspectives for the Book Hunter in the 21st Century (Henry Holt 2003) 16. N. Basbanes, Patience and Fortitude (Harper Perennial, 2003) 17. J. Bastian and B. Alexander, Communities and Their Archives (Facet, 2009) 18. N. Baym, Personal Connections in the Digital Age (Polity 2010) 19. K. Benedict, Ethics and the Archival Profession (SAA, 2003) 20. J. Beniger, The Control Revolution (Harvard 1986) 21. Y. Benkler, The Wealth of Networks (Yale 2007) 22. W. Bijker, P. Hughes and T. Pinch, eds., The Social Construction of Technological Systems (MIT 1987) 23. A. Bishop, N. van House, P. Buttenfield, B. Schatz, Digital Library Use: Social Practice in Design and Evaluation (MIT 2003) 24. A. Black, A New History of the English Public Library: Social and Intellectual Contexts, 1850-1914 (Leicester, 1996) 25. Alistair Black, D. Muddiman, and H. Plant, The Early Information Society (Ashgate 2007) 26. A. Black, S. Pepper, and K. Bagshaw, Books, Buildings, and Social Engineering (Ashgate 2009) 27. C. Borgman, Scholarship in the Digital Age (MIT, 2007) 28. C. P. Bourne and T. Bellardo Hahn, A History of Online Information Services (MIT, 2003) 29. G. Bowker, Memory Practices in the Sciences (MIT 2005) 30. G. Bowker and S. L. Star, Sorting Things Out (MIT, 1999) 31. Brabazon, T., (ed.), The Revolution Will Not Be Downloaded – Dissent in the digital age, (Chandos, 2008) 32. S. Braman, Change of State: Information, Policy, and Power (MIT, 2006) 33. Breazeal, Cynthia. Designing Sociable Robots. (MIT, 2002) 34. G. Brock , The US Computer Industry (Ballinger 1975) 35. Brooks, Rodney. Flesh and Machines: How Robots Will Change Us. (Vintage, 2002) 36. J. Seeley Brown and Paul Duguid, The Social Life of Information (Harvard Business, 2002) 37. E. Brynjolfsson and A. Saunders, Wired for Innovation: How Information is Reshaping the Economy (MIT, 2010) 38. P. Boczkowski. Digitizing the News (MIT, 2004) 39. F. Cameron and S. Kenderdine, Theorizing Digital Cultural Heritage (MIT, 2010) 40. Carr, Nicholas G., Does IT Matter? (Harvard Business, 2004) 41. Karin Knorr Cetina, Epistemic Cultures (Harvard, 1999) 42. A. Chandler and J. Cortada, A Nation Transformed by Information: How Information has Shaped the United States from Colonial Times to the Present (Oxford 2003) 43. J. Cohoon and W. Aspray, eds. Women and Information Technology (MIT 2006) 44. J. Cortada, ed. Rise of the Knowledge Worker (ButterworthHeinemann 1998) 45. J. Cortada, How Societies Embrace Information Technology Wiley/IEEE Computer Society 2009 46. J. Cortada, Information Technology as Business History (Greenwood 1996) 47. J. Cortada, Before the Computer (Princeton, 2000) 48. J. Cortada, The Digital Hand (3 vols, Oxford, 2003, 2005, 2007) 49. R. Coyne, The Tuning of Place: Sociable Spaces and Pervasive Digital Media (MIT, 2010) 50. Luciana D'Adderio, Inside the Virtual Product: How Organizations Create Knowledge through Software (Research Studies Press, 2004) 51. R. Darnton, The Case for Books (Public Affairs, 2010) 52. C. Davidson and D. Goldberg, The Future of Thinking: Learning Institutions in a Digital Age (MIT 2010) 53. M. Deuze, Media Work (Polity, 2007) 54. S. Douglas, Inventing American Broadcasting (Johns Hopkins, 1989) 55. P. Dourish, Where the Action Is: Foundations of Embodied Interaction (Bradford/MIT 2004) 56. P. Dourish and G. Bell, Divining a Digital Future: Mess and Mythology in Ubiquitous Computing (MIT, 2011) 57. G. Downey, The machine in me: An anthropologist sits among computer engineers (Routledge, 1998). 58. Paul Edwards, A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming (MIT 2010) 59. Paul Edwards, The Closed World: Computers and the Politics of Discourse in Cold War America (MIT, 1997) 60. J. English-Lueck, Cultures@Silicon Valley. Palo Alto: (Stanford, 2002) 61. N. Ensmenger, The Computer Boys Take Over: Computers, Programmers, and the Politics of Technical Expertise (MIT 2010) 62. C. Fischer, America Calling: A Social History of the Telephone to 1940 (California 1992) 63. K. Flamm, Creating the Computer (Brookings, 1988) 64. D. Forsythe, Studying Those Who Study Us: An Anthropologist in the World of Artificial Intelligence, (Stanford, 2001) 65. D. Garrison, Apostles of Culture: The Public Librarian and American Society, 1876-1920 (Free Press, 1979) 66. Barbara Garson, The Electronic Sweatshop (Penguin, 1989) 67. D. Grier, When Computers Were Human (Princeton, 2007) 68. Hackett, E.J., Amsterdamska, O., Lynch, M., and Wajcman, J., eds. The Handbook of Science and Technology Studies. (MIT, 2008) 69. David Hakken, Cyborgs@Cyberspace? An Ethnographer Looks to the Future, (Routledge, 1999) 70. David Hakken, The Knowledge Landscapes of Cyberspace (Routledge, 2003) 71. Kristine C. Harper, Weather by the Numbers: The Genesis of Modern Meteorology (MIT, 2008) 72. Verne Harris and Terry Cook, Archives and Social Justice: A South African Perspective (SAA, 2007) 73. Kathryn Henderson, On Line and On Paper: Visual Representations, Visual Culture, and Computer Graphics in Design Engineering (MIT, 1998) 74. C. Hess and E. Ostrom, Understanding Knowledge as a Commons: From Theory to Practice (MIT, 2006) 75. C. Hamilton et al, eds. Refiguring the Archive (Springer, 2002) 76. K. Hayles, How We Became Posthuman (Chicago, 1999). 77. M. Hindman, The Myth of Digital Democracy (Princeton, 2008) 78. Hinds, P.J., Kiesler, S., eds. Distributed Work (MIT, 2002). 79. M. Hobart and Z. Schiffman, Information Ages: Literacy, Numeracy, and the Computer Revolution (Johns Hopkins, 2000) 80. P. Howard, The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam (Oxford, 2010) 81. Edwin Hutchins, Cognition in the Wind (Bradford, 1996) 82. H. Jenkins, Convergence Culture: Where Old and New Media Collide (NYU, revised 2008) 83. M. Ito, Engineering Play: A Cultural History of Children’s Software (MIT, 2009) 84. R. Jimerson, Archives Power (ALA, 2009) 85. Y Kafai et al. Beyond Barbie and Mortal Combat: New Perspectives on Gender and Gaming (MIT, 2011) 86. J. Kallinikos, The Consequences of Information: Institutional Implications of Technological Change (Edward Elgar, 2008) 87. G. Kunda, Engineering Culture: Control and Commitment in a High-Tech Corporation (Temple 2nd ed., 2006)) 88. R. David Lankes, The Atlas of New Librarianship (MIT, 2011) 89. B. Laurel, Computers as Theater (Addison Wesley 2003) 90. J. Lave and E. Wenger, Situated Learning (Cambridge, 1991) 91. L. Lessig, Code Version 2.0 (Basic Books, 2006) 92. L. Lessig, Remix (Penguin, 2008) 93. Frank Levy and Richard Murnane, The New Division of Labor: How Computers are Creating the Next Job Market (Princeton, 2005) 94. David Levy, Scrolling Forward: Making Sense of Documents in the Digital Age (Arcade, 2003) 95. Alison Lewis, Questioning Library Neutrality (Library Juice Press, 2008). 96. J. Light, From Warfare to Welfare: Defense Intellectuals and Urban Problems in Cold War America (Johns Hopkins 2003) 97. L. Liverouw, Alternative and Activist New Media (Polity 2011) 98. M. Lynch and S. Woolgar, Representation in Scientific Practice (MIT, 1990) 99. F. Machlup, Knowledge: Its Creation, Distribution, and Economic Significance (2 vols., Princeton, 1980, 1982) 100. F. Machlup and U. Mansfield, eds. The Study of Information: Interdisciplinary Messages (Wiley, 1983) 101. D. MacKenzie, Knowing Machines (MIT, 1998) 102. D. MacKenzie and J. Wajcman, The Social Shaping of Technology (McGraw Hill Education/Open University, 1999) 103. J. Margolis, Stuck in the Shallow End: Education, Race, and Computing (MIT 2010) 104. C. Marvin, When Old Technologies Were New Oxford, 1990) 105. P. Menzel, Peter and F. D’Aluisio,. 2000. Robo Sapiens: Evolution of a New Species (MIT, 2000) 106. R.K. Molz, Civic Space/Cyberspace: The American Public Library in the Information Age (MIT, 2001) 107. Nick Monfort and Ian Bogost, Racing the Beam (MIT, 2009) 108. K. Montgomery, Generation Digital (MIT, 2009) 109. J. Murray, Hamlet on the Holodeck: The Future of Narrative in Cyberspace (MIT, 1998) 110. Bonnie Nardi, A Small Matter of Programming: Perspectives on End User Computing (MT, 1993) 111. F. Nebeker, Calculating the Weather (Academic Press, 1995) 112. H. Nissenbaum, Privacy in Context (Stanford Law Books, 2009) 113. H. Nissenbaum and M. Price, eds. Academy and the Internet (Peter Lang, 2004) 114. D. Noble, Forces of Production: A Social History of Industrial Automation (Knopf, 1984) 115. D. Nye, Technology Matters (MIT, 2007) 116. W. Ong, Orality and Literacy (Routledge, 2nd ed. 2002) 117. Julian Orr, Talking About Machines: An Ethnography of a Modern Job (Cornell, 1996) 118. John Pateman and John Vincent, Public Libraries and Social Justice (Ashgate, 2010) 119. M. Porat, The Information Economy (U. Michigan Library reprint, 1977). 120. Mark Poster, Information Please: Culture and Politics in the Age of Digital Machines (Duke, 2006) 121. M. Proctor, C. Cook, and M.G. Williams, eds. Political Pressure and the Archival Record (SAA, 2005) 122. Jeremy Rifkin, The End of Work: The Decline of the Global Labor Force and the Dawn of the Post-Market Era (Tarcher, 1996) 123. M. Rubin and M. Huber, The Knowledge Industry in the United States, 1960-1980 (Princeton, 1986). 124. S. Shapin, A Social History of Truth (Chicago, 1995) 125. C. Shapiro and H. Varian, Information Rules: A Strategic Guide to the Network Economy (Harvard Business School Press, 1998) 126. O. Shy, The Economics of Networked Industries (Cambridge 2001). 127. D. Solove, Understanding Privacy (Harvard, 2010) 128. D. Solove, The Future of Reputation: Gossip, Rumor, and Privacy on the Internet (Yale, 2008) 129. Clay Spinuzzi, Tracing Genres through Organizations: A Sociocultural Approach to Information Design (MIT, 2003) 130. S. L. Star, Ecologies of Knowledge (SUNY, 1995) 131. M. Stefik, ed., Internet Dreams: Archetypes, Myths, and Metaphors (MIT, 1997) 132. Mitchell Stevens, The Rise of the Image, The Fall of The Word (Oxford, 1998) 133. C. Sunstein, Infotopia (Oxford, 2008) 134. Robert S. Taylor, Value-Added Processes in Information Systems (Ablex, 1986) 135. Michael Thomas, Deconstructing Digital Natives (Routledge 2011) 136. Stefan Thomke, Experimentation Matters: Unlocking the Potential of New Technologies for Innovation (Harvard Business, 2003) 137. P. Thompson, R. Parker and P. Boreham, New Technology @ Work (Routledge, 2008) 138. David Trend, ed., Reading Digital Culture (Wiley-Blackwell, 2001) 139. Sherry Turkle, Simulation and its Discontents (MIT, 2009) 140. Ullman, Ellen. (1997) Close to the Machine: Technophilia and Its Discontents (City Lights, 2nd ed. 2001) 141. J. van den Hoven and J. Weckert, eds. Information Technology and Moral Philosophy (Cambridge, 2009) 142. Jose van Dijck, Mediated Memories in the Digital Age (Stanford, 2007) 143. H. Varian, J. Farrell, and C. Shapiro, The Economics of Information Technology (Cambridge, 2005). 144. M. Warschauer, Technology and Social Inclusion (MIT, 2004) 145. S. C. Watkins, The Young and the Digital (Beacon 2010) 146. Weber, Steven, The Success of Open Source (Harvard, 2005) 147. Webster, Frank, Theories of the Information Society (Taylor & Francis, 2nd ed. 2002) 148. E. Wenger, Communities of Practice (Cambridge, 1999) 149. W. Wiegand, The Politics of an Emerging Profession: The American Library Association (Greenwood, 1986) 150. W. Wiegand, Uncovering Labour in Information Revolutions, 1750-2000 (Cambridge, 2004) 151. J. Willinsky, The Access Principle: The Case for Open Access to Research and Scholarship (MIT, 2009) 152. A. Wright, Glut: Mastering Information Through the Ages (Cornell, 2008) 153. T. Wu, The Master Switch: The Rise and Fall of Information Empires (Knopf, 2010) 154. J. Yates, Control Through Communication: The Rise of System in American Management (Johns Hopkins, 1993) 155. J. Yates, Structuring the Information Age: Life Insurance and Technology in the Twentieth Century (Johns Hopkins 2005) 156. JoAnne Yates and John Van Maanen, eds., Information Technology and Organizational Transformation (Sage, 2000) 157. J. Yost, The Computer Industry (Greenwood 2005) 158. M. Zeegers and D. Barron, Gatekeepers of Knowledge: A Consideraton of the Library, the Book and the Scholar in the Western World (Chandos 2010) 159. S. Zuboff, In the Age of the Smart Machine: The Future of Work and Power (Basic, 1989) 160. Lisa Zunshine, ed. Introduction to Cognitive Cultural Studies (Johns Hopkins, 2010) Articles for Minute Madness: 1. Biagioli, M. (1990). Galileo the Emblem Maker. Isis, 230–258. 2. Jaron Lanier, You Are Not a Gadget: A Manifesto (Knopf, 2010), pp. 3-23. 3. Yates, J., & Orlikowski, W. (1992). Genres of organizational communication: A structurational approach to studying communication and media. Academy of Management Review, 17:299-326. 4. STERNE, J. & LEACH, J. (2005) The Point of Social Construction and the Purpose of Social Critique. Social Epistemology 19: pp. 283-285. 5. Law, John. Notes on the Theory of the Actor Network: Ordering, Strategy and Heterogeneity. Center for Science Studies, Lancaster University, 1992. 6. Wynn, B. (1992). Misunderstood Misunderstanding: Social Identities and Public Uptake of Science. Public Understanding of Science vol. 1, no. 3 July 1992, pp. 281-304. 7. Briscoe, F. & Safford, S. (2008). The Nixon-in-China effect: activism, imitation and the institutionalization of contentious practices, Administrative Science Quarterly, 53: 460-491. 8. Downey, G. (2001), Virtual webs, physical technologies, and hidden workers: The spaces of labor in information internetworks, Technology and Culture 42: 20935 9. Kim, E., Lee, B., & Menon, N. M. (2009). Social welfare implications of the digital divide. Government Information Quarterly, 26(2), 377-386. 10. Duff, A. S. (2011). The Rawls-Tawney theorem and the digital divide in postindustrial society. Journal of the American Society for Information Science & Technology, 62(3), 604-612. 11. DiMaggio, Paul, Eszter Hargittai, W. Russell Neuman, and John P. Robinson. 2001. “Social Implications of the Internet.” Annual Review of Sociology 27:307336. 12. Mathew, Ashwin J. and Coye Cheshire. 2010. “The New Cartographers: Trust and Social Order within the Internet Infrastructure.” Presented at the 38th Telecommunications Policy Research Conference. 13. Simon, H. (1991). Bounded rationality and organizational learning. Organization Science, Special Issue: Organizational Learning: Papers in Honor of (and by) James G. March, 2:125-134 14. Suchman, L. (1995). Making work visible. Communications of the ACM, 38: 56ff. 15. Brown, J.S and Duguid, P. (1991). Organizational learning and communities-ofpractice: Toward a unified view of working, learning, and innovation. Organization Science, Special Issue: Organizational Learning: Papers in Honor of (and by) James G. March, 2:40-57. 16. Perlow, L., Porter, J. (2009). Making Time Off Predictable and Required. The Harvard Business Review. Oct, 102-109. 17. Osterloh, Margit and Bruno S. Frey. 2000. “Motivation, Knowledge Transfer, and Organizational Forms.” Organization Science 11:538-550. 18. Yrjö Engeström, Expansive Visibilization of Work: An Activity-Theoretical Perspective, Computer Supported Cooperative Work, v.8 n.1-2, p.63-93, Feb. 1999. 19. Malone, T., & Crowston, K. (1994). The interdisciplinary study of coordination. ACM Computing Surveys, 26: 87-119. 20. Cramton, C. D. (2001). The mutual knowledge problem and its consequences for dispersed collaboration. Organization Science, 12: 346- 371. 21. Baltes, B.B. et al. (2002). Computer-mediated communication and group decision making: A meta-analysis. Organizational Behavior and Human Decision Processes, 87:156-179. 22. Birnholtz, J., Bietz, M. (2003). Data at Work: Supporting Sharing in Science and Engineering. GROUP ‘03. 339-348. 23. Ackerman, Mark S. 2000. “The intellectual challenge of CSCW: the gap between social requirements and technical feasibility.” Human Computer Interaction 15:179-203. 24. Jessica Miller , Batya Friedman , Gavin Jancke and Brian Gill. Value tensions in design: The value sensitive design, development, and appropriation of a corporation's groupware system. Conference on Supporting Group Work, 2007. Full Paper. 25. Community, Consensus, Coercion, Control: CS*W or How Policy Mediates Mass Participation. Travis Kriplean , Ivan Beschastnikh , David W. McDonald and Scott A. Golder. Conference on Supporting Group Work, 2007. 26. Predrag Klasnja , Sunny Consolvo , Tanzeem Choudhury , Richard Beckwith and Jeffrey Hightower Exploring Privacy Concerns about Personal Sensing. Pervasive, 2009. 27. Tamara Denning , Cynthia Matuszek , Karl Koscher , Joshua R. Smith and Tadayoshi Kohno. A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons. International Conference on Ubiquitous Computing, 2009. 28. T. Scott Saponas , Jonathan Lester , Carl Hartung , Sameer Agarwal and Tadayoshi Kohno. Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing. USENIX Security, 2007. 29. Kling, R. (1994). Reading “All About” Computerization: How Genre Conventions Shape Non-Fiction Social Analysis. The Information Society. 10(3), 147-172. 30. S. Star and K. Ruhleder. Steps Toward an Ecology of Infrastructure: Complex Problems in Design and Access for Large-Scale Collaborative Systems. Proeedings of the 1994 ACM Conference on Computer Supported Cooperative Work. 31. Flanagan, Mary, Daniel C. Howe, and Helen Nissenbaum. 2008. “Embodying Values in Technology: Theory and Practice.” In Information Technology and Moral Philosophy. Jeroen van den Hoven and John Weckert (Eds). Cambridge University Press. 32. Sengers, P., McCarthy, J., and Dourish, P. 2006 Reflective HCI: HCI: articulating an agenda for critical practice. In CHI '06 Extended Abstracts on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). CHI '06. ACM, New York, NY, 1683-1686. 33. James Hollan, Edwin Hutchins, and David Kirsh. Distributed cognition: toward a new foundation for human-computer interaction research. ACM Transactions on Computer- Human Interaction, Volume 7, Issue 2 (June 2000) 34. Orlikowski, W. (1992). The Duality of Technology: Rethinking the Concept of Technology in Organizations. Organization Science. 3(3), 398-427. 35. Morana Alac. Working with Brain Scans: Digital Images and Gestural Interaction in fMRI Laboratory. Social Studies of Science, Aug 01, 2008; 38: 483-508. 36. Elizabeth Churchill, “Sugared Puppy-Dog Tails: Gender and Design, Interactions, March - April 2010. 37. Geroski, P.A. 2000. “Models of technology diffusion”, Research Policy 29:603625. 38. Christina Courtright, “Context in Information Behavior Research” Annual Review of Information Science and Technology, Vol. 41 (2007). 39. Greg Downey, Human Geography and Information Studies. Annual Review of Information Science and Technology, Vol. 41 (2007). 40. Lisa P. Nathan , Batya Friedman , Predrag Klasnja , Shaun K. Kane and Jessica Miller. Envisioning Systemic Effects on Persons and Society Throughout Interactive System Design. Designing Interactive Systems, 2008. 41. Ribes, D. and Finholt, T. (2009), The long now of technology infrastructure: articulating tensions in development., Journal of the Association for Information Systems, 10: 375-398. 42. Lisa Nathan. Ecovillages, Values, and Information Technology: Balancing Sustainability with Daily Life in 21st Century America. Conference on Human Factors in Computing Systems, 2008. 43. Ryan, Dan. 2006. “Getting the Word Out: Notes on the Social Organization of Notification.” Sociological Theory 24:228-254. 44. Barak, A., and J. Suler. (2008) Reflections on the psychology and social science of cyberspace. In A. Barak (Ed.), Psychological aspects of cyberspace: Theory, research, applications. Cambridge, UK: Cambridge University Press. 45. Ducheneaut, N., & Watts, L. A. (2005). In search of coherence: A review of e-mail research. Human-Computer Interaction, 20:11-48. 46. Turel, O., Serenko, A. (2010). Viewpoint: Is Mobile E-mail Addiction Overlooked? Communications of the ACM. 53(5), 41-43. 47. McKenna, Katelyn, and John A. Bargh. 2000. “Plan 9 From Cyberspace: The Implications of the Internet for Personality and Social Psychology.” Personality and Social Psychology Review 4. 48. Batya Friedman , Alan Borning , Janet Davis , Brian Gill , Peter H. Kahn , Travis Kriplean and Peyina Lin. Laying the Foundations for Public Participation and Value Advocacy: Interaction Design for a Large Scale Urban Simulation. International Conference on Digital Government Research, 2008. 49. R. Grinter and L. Palen. Instant Messaging in Teen Life. 2002 ACM Conference on Computer Supported Cooperative Work. 50. Grinter R.E. and M. Eldridge (2001). Y do tngrs luv 2 txt msg? In Proceedings of the Seventh European Conference on Computer-Supported Cooperative Work ECSCW ‘01. Bonn, Germany. Kluwer Academic Publishers, pp. 219-238. 51. Travis Kriplean , Ivan Beschastnikh and David W. McDonald. Articulations of WikiWork: Uncovering Valued Work in Wikipedia through Barnstars. Computer Supported Cooperative Work, 2008. 52. Eric Paulos et al. Citizen Science: Enabling Participatory Urbanism. In Urban Informatics: Community Integration and Implementation. 53. Stone, B. (2009). Breakfast Can Wait. The Days First Stop is Online. The New York Times. Retrieved from: http://www.dourish.com/classes/readings/FamiliesTechnology-NYT.pdf 54. Boast, R., Bravo, M., Srinivasan R. (2007). Return to Babel: emergent diversity, digital resources, and local knowledge , The Information Society 23: 395-403. 55. Wellman, B. et al. (2001). Computer networks as social networks. Science, 293(14 September), 2031-2034. 56. Ellis, D., Oldridge, R. & Vasconcelos, A. (2004). Community and virtual community. Annual Review of Information Science and Technology, 38: 145-168. 57. Antin, Judd and Coye Cheshire. 2010. Readers and not Free-Riders: Reading as a Form of Participation in Wikipedia. Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work. 58. Cheshire, Coye and Karen S. Cook. 2004. "The Emergence of Trust Networks Under Uncertainty: Implications for Internet Interactions." Analyze and Kritik, Vol 26. 59. Two special issues of Archival Science on archives and power. The intro can be found at http://www.mendeley.com/research/archives-records-and-power-themaking-of-modern-memory/ 60. Chan, Anita 2004 “Coding Free Software, Coding Free States: Free Software Legislation and the Politics of Code in Peru.” Anthropological Quarterly 77(3) 61. Coombe, Rosemary J., & Andrew Herman 2004 “Rhetorical Virtues: Property, Speech, and the Commons on the World-Wide Web.” Anthropological Quarterly 77 (3). 62. Golub, Alex 2004 “ Copyright and Taboo.” Anthropological Quarterly 77 (3). 63. Kelty, Christopher M. 2004 “Culture’s Open Sources: Software, Copyright, and Cultural Critique.” Anthropological Quarterly 77(3). 64. Bohn, J. et al. Living in a World of Smart Everyday Objects – Social, Economic, and Ethical Implications. Human and Ecological Risk Assessment 10: 2004. 763785. 65. Brey, P., “Virtual Reality and Computer Simulation,” in Himma and Tavani (2008). In K. Himma and H. Tavani (2008), Handbook of Information and Computer Ethics. 66. Calkins, M. Rippers, Portal Users, and Profilers: Three Web Based Issues for Business Ethicists. Business and Society Review: 107:61 (Spring 2002): 61-75. 67. Canellopoulou-Botti, M. and Himma, K. E., “The Digital Divide: Prospects for the Future,” in Himma and Tavani (2008), Handbook of Information and Computer Ethics. 68. Chadwick, R. The Icelandic database – do modern times need modern sagas? British Medical Journal 319: 7207 (1999). Available:http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=1127047 69. Chesney, T., “An empirical examination of Wikipedia’s credibility,” First Monday 11(November 2006). http://firstmonday.org/issues/issue11_11/chesney/index.html 70. Clifford L., “Authenticity and Integrity in the Digital Environment: An Exploratory Analysis of the Central Role of Trust,” In Authenticity in a Digital Environment, edited by Abby Smith. Washington, CLIR, 1999. http://www.clir.org/pubs/abstract/pub92abst.html 71. Collins, L. “Pixel Perfect: Pascal Dangin’s Virtual Reality,” The New Yorker, May 12, 2008, pp. 94-103. 72. Consalvo, M. (2007). Cheating: Gaining advantage in videogames (pp. 83-128). Cambridge, MA: MIT Press. 73. Ess, Charles. ‘‘Lost in translation’’?: Intercultural dialogues on privacy and information ethics. Ethics and Information Technology 7:1 (March 2005):1-6 74. Feenberg, A. (1999). Democratizing technology. In Questioning technology. (pp. 131-47). New York: Routledge. 75. Glaser, Anja Ebersbach-Markus. Towards Emancipatory Use of a Medium: The Wiki. International Journal of Information Ethics 2 (2004) 76. Grodzinsky, F., Tavani, Herman. P2P Networks and the Verizon v. RIAA Case: Implications for Personal Privacy and Intellectual Property Ethics and Information Technology 7:4 (December 2005): 243-250. 77. Hausmanninger T. Controlling the Net: Pragmatic action or ethics needed?", International Review of Information Ethics 1:1 (June 2004). Available:http://www.i-r-i-e.net/issue1.htm#hausmanninger, 78. Kaplan, D. M. (2004). Introduction. In Readings in the philosophy of technology. (pp. xiii- xvi). Lanham: Rowman & Littlefield Publishers, Inc. 79. Lockton, V. Rosenberg, Richard. RFID: The Next Serious Threat to Privacy. Ethics and Information Technology: 7: 4 (December 2005): 221-231. 80. Logan, P.Y. and Clarkson, A. Teaching students to hack: curriculum issues in information security. Proceedings of the 36th SIGCSE technical symposium on computer science education. (2005): 157-161. 81. Manion, M. and Goodrum, A. Terrorism or civil disobedience: toward a hacktivist ethic. Computers and Society, 30:2 (June 2002): 14-19. 82. Moor, J. H., “Why we need better ethics for emerging technologies,” Ethics and Information Technology (2005) 7:111-119. 83. Newman, S., et. al. Copyright: Moral Rights, Fair Use, and the Online Environment. Journal of Information Ethics 13:2 (Fall 2004): 38-57 84. Reynolds, R. Playing a ‘Good’ Game: A Philosophical Approach to Understanding the Morality of Games (2002). http://www.igda.org/articles/rreynolds_ethics.php 85. Schuler, Doug. Computer Professionals and the Next Culture of Democracy. Communications of the ACM 44:1 (January 2001): 52-57. 86. Spinello, R.A., Tavani, H.T. The Internet, ethical values, and conceptual frameworks: an introduction to Cyberethics ACM SIGCAS Computers and Society 31:2 (June 2001) :5 – 7 87. Stajano, F.(2003). Security for whom? The shifting security assumptions of pervasive computing. Lecture notes in computer science. 88. Strong, D., & Higgs, E. (2000). Borgmann's philosophy of technology. In Technology and the good life? (pp. 19-37). Chicago & London: University of Chicago Press. 89. Verrugio, G., Operto, F. Robotethics: a bottom-up interdisciplinary discourse in the fieldof applied ethics in robotics. International Review of Information Ethics 6:2 (December2006): 3-8. 90. Wilson, C. Internet Privacy for Sale: A Viable Option When Legislation, Litigation, and Business Self-Regulation Are Ineffective in Curbing the Abuses of online consumers' privacy. Journal of Information Ethics, 14(1), 29-43. 91. Hope Olson's work on the social ramifications of information organization as Library Trends, 56 (2): 509-41. 2007. 92. Mazzocchi, F., et. al., S.R. Rangnathan's [i.e. Ranganathan's] PMEST Categories: Analyzing Their Philosophical Background and Cognitive Function. Information Studies v. 16 no. 3 (July 2010) p. 133-47. 93. Carpenter, M., et. al., Envisioning the Library's Role in Scholarly Communication in the Year 2025.Portal v. 11 no. 2 (April 2011) p. 659-81 94. Fischer, C. C. A Value-Added Role for Reviewers in Enhancing the Quality of Published Research. Journal of Scholarly Publishing v. 42 no. 2 (January 2011) p. 226-3 Revised 24 June 2011