nature photo
CPL home > Classes
 
 
Papers
 
Projects
 
Classes
 
Affiliations
 
Biography
 
About Me
    

 

Syllabus for Informatics 161: Social Analysis of Computerization Spring 2008

This course will introduce you to the social analysis of computerization. You will learn how to think about computerization as a social phenomenon. This course will familiarize you with various social analytical approaches to the study of computerization. You will become acquainted with social analysis at various levels: from small groups to society.

Meeting Information

Location: Engineering Tower 204
Lecture Time: Tuesday and Thursday, 12:30pm - 1:50pm

There will be no discussion sections.

Instructor Information

Charlotte P. Lee
cplee@ics.uci.edu
Office: Donald Bren Hall 5074
Office Hours: Thursday 2:30pm to 4:30pm

Satyajit Das, Reader
satyajid@uci.edu
Office Hours: Thursday 10:30am to 12noon, DBH 5099

Yong Ming Kow, Reader
mail@kowym.com
Office Hours: Tuesday 2pm to 3:30pm, 
DBH 5099
 

Schedule

Date

Lecture Topic

Reading(s) Due

Deliverables: Assignment Due 

April 1

Course Introduction 

None

 

April 3

Utopian and Dystopian Visions

Kling, What is Social Informatics and Why Does It Matter. Sections 1, 4,  5.3.1, 5.4.1, and 6.0

 

April 8

 

Video: Hacking Democracy

Howcraft and Fitzgerald, From Utopia to Dystopia 


April 10


Computer Supported Cooperative Work (CSCW)

Ackerman, Challenge of CSCW

Assignment 1 (Now Due Monday April 14 @5pm)
 

April 15

 

 

Computer Supported Cooperative Work Grudin, J. Why Groupware Applications Fail


April 17

 

Organizations as Culture

Guest Speaker:
Marcel Blonk

 

Orlikowski, Learning from Notes


April 22

 


Cyberinfrastructure

Lee et al., Human Infrastructure of Cyberinfrastructure

 

April 24

 

Online or Networked Communities

Guest Speaker: Steve Abrams 

Malhotra et al., Evolution of a Virtual Community

  Assignment 2

April 29

 

Displacement and Disasters

Guest Lecture: Irina Shklovski

None


May 1

 

Instant Messaging and Blogging

Nardi et al. Why we blog.

Grinter and Palen, Instant Messaging in Teen Life

 

 

May 6


MIDTERM EXAM Lecture Slides - Powerpoint (optional reading):
Slides 1
Slides 2
Slides 3
Slides 4
Slides 5

 

May 8

Computer Games and Gaming

Guest Speaker: Silvia Lindtner

Ducheneaut et al. Alone together?

Huff, Gender, Software Design, and Occupational Equity

 

May 13

Method/Interviewing and Ethnography

None.


May 15

Understanding Research in Social Analysis of Computerization

Choosing Qualitative Research

 Assignment 3

May 20

 

Participatory Design

Guest Speaker: Matt Bietz

Bannon, From Human Factors to Human Actors

Kensing and Blomberg, Participatory Design
 



May 22

 

 Quiz on Readings

and meet in Assignment 4 Groups

Voida et. al, Personal Technologies

Electronic Frontier Foundation, RIAA vs. The People


 

May 27

 

Ubiquitous Computing and Privacy

Palen and Dourish, Unpacking Privacy for a Networked World

 

May 29


Team Presentations

None

Assignment 4

June 3

Team Presentations


None

Assignment 4

June 5
Design

Closing Remarks

Johnson and Miller, Dialogue on Responsiblity, Moral Agency, and IT Systems

Hughes et al.  From Ethnographic Record to System Design.

Final Papers Now Due on June 6 @5pm.


 

Assignments

Assignment 1: Analyzing Images (2 to 3 pages)

The purpose of this assignment is to get you to look closely at some ways in which technology is portrayed.

Find two images of computer/information technology.  One should be utopian, one dystopian.  These images can be from advertising, magazines, newspapers, articles, billboards, TV, movies, or even music.  For each of these images:

1) Indicate EXACTLY where you found it (in other words, which source, the date it was published, the name of the TV show or movie, channel, date, you get the idea).

2) Describe the technology presented and indicate if it is current, future, science fictional.

3) How is the technology presented?  What kind of people are affected by it and are presented as using it?  Who is the target audience (children, computer professionals, individuals, families, etc?).  What is the technology supposed to do to or for them?

4) What is the "real message" being presented?  Is it to get you to buy something, believe something, protest something, fear something?

5) How did you react to this image and did you believe what is being presented?  Why or why not?

Your write-up should NOT be in the Question and Answer format presented here, but should be written as a narrative.  Use these questions as a guide.

Email your assignment by Monday, April 14, 5pm to: 161spring2008@gmail.com

Assignment 2: Organizational Culture (2 pages)

The purpose of this assignment is to get give you experience in selecting and analyzing academic research articles.

Using Google Scholar, find an academic paper on organizational culture that you personally finding interesting or provocative.

1) Summarize the article, emphasizing the main points.

2) What is your reaction to the message of the article? Examples of things to write about include: How reading this article would change your behavior as an employee or manager; Three reasons why you don't believe the article and why; Three questions that this articles raises and how you might go about answering them. 

3) Pick two organizations (student, professional, academic, hobby) to which you currently belong or to which you previously belonged and compare their organizational cultures in terms of: a) how are new members recruited, b) how do new members learn how to participate and what the rules are, c) how is the organization managed, d) what behaviors are acceptable or unacceptable, e) how are members corrected if they engage in unacceptable behavior, f) who sits with whom during breaks and does organizational status (e.g. rank or function) play a role in the groupings?

Your write-up should NOT be in the Question and Answer format presented here, but should be written as a narrative.  Use these questions as a guide.

Email your assignment by 5pm to: 161spring2008@gmail.com

Assignment 3: Prospectus for Final Paper (2 to 3 pages)

The purpose of this assignment is to get you started on your final paper.

Write a 2 to 3 page prospectus that provides answers to the following:

  • Choose a contemporary topic on the social aspects of computerization that interests you
  • Find at least 3 academic journal articles or books on your chosen topic.
  • Based on what you have read, write a thesis statement and an introductory paragraph stating what your topic is and why it is of interest to society.
  • Summarize each article or book in your own words and describe how the articles relate to your thesis statement.
  • Conclude with a discussion of 3 questions that you are interested in answering more fully in your final paper after reading these articles.
  • At the end of your prospectus provide full citations. Choose a citation format in which to list all your papers. Common citation formats include MLA or APA or Chicago Style.

Email your assignment by 5pm to: 161spring2008@gmail.com

Assignment 4: Dramatize and Inform

Forming teams of 4 to 5 students, choose one topic on the social aspects of computerization about which to create a skit. Skits are usually comedic but you may also go with tragedy or drama. In order to save yourself time, you should choose a topic that you have already begun researching, such as for your final paper.

Create an 8 to 10 minute skit or dramatization illustrating different points of view about a topic. Examples of what you can do include courtroom drama, thriller, sitcom. The most important goal for your skit is to educate your audience about the complexities of your topic. Your skit should also be entertaining enough to keep your classmates awake. Every member of the team must have a speaking part.

After each class where skits are performed, the class will vote as to which team provided the most informative skit and all members of that team will receive 2 pts extra credit on top of regular credit for completing the assignment.

Final Paper

You will write a final paper in this class. The topic is open for either paper, but they should cover issues which clearly relate to the readings or lectures in the course. You should have already chosen your topic when you did Assignment 3. 

You are expected to relate your papers to the course readings and to include a reference list. A good tactic would be to compare and contrast the arguments or themes found in your readings. What is similar and what is different? Can you explain why there are differences? Conclude with a paragraph stating what you think is the future of your topic based on what you have read.

Excellent papers will cite at least 4 sources.

The paper will be at least 2600 words.

Email your assignment byJune 6 at 5pm to: 161spring2008@gmail.com

Grading

Class Participation: 5%

Assignment 1: 10%

Assignment 2: 10%

Assignment 3: 10%

Assignment 4: 10%

Quiz: 10%

Midterm Exam: 20%

Final Paper: 25%

Late assignments will be downgraded 1/3 of a letter grade per day.

Grades that fall on or near the border (e.g. A-/B+) will be decided at the instructor's discretion.

 

Bibliography

Ackerman, M. (2000). The intellectual challenge of CSCW: The gap between social requirements and technical feasibility. Human-Computer Interaction, 15(2/3), 179. [PDF]

Carroll, J. M. & Rosson, M. B. (2003). A trajectory for community networks. The Information Society, 19(5), 381. [PDF]

Dourish, P. (2004). Where the action is: The foundations of embodied interaction [PDF]

Dourish, P. In press. collective information practice: Exploring privacy and security as social and cultural phenomena Springer Berlin / Heidelberg. [PDF]

Ducheneaut, N., Yee, N., Nickell, E., & Moore, R. J. (2006). "Alone Together?": Exploring the Social Dynamics of Massively Multiplayer Online Games. Montreal, Quebec, Canada: ACM Press. [PDF]

Electronic Frontier Foundation. RIAA vs. the people: Two years later.

Grinter, R. E., & Palen, L. (2002). Instant messaging in teen life. CSCW '02: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work, New Orleans, Louisiana, USA. 21-30. [PDF]

Grudin, J. (1989). Why groupware applications fail: Problems in design and evaluation. Information Technology People, 4(3), 245. [PDF]

Grudin, J., & Palen, L. Why groupware succeeds: Discretion or mandate? ACM Conf. Computer-Supported Cooperative Work ECSCW'95, Stockholm, Sweden. [PDF]

Howcroft, D., & Fitzgerald, B. "from Utopia to Dystopia: The Twin Faces of the Internet" [PDF]

Huff, C. (2002). Gender, software design, and occupational equity. SIGCSE Bulletin, 34(2), 112. [PDF]

Hughes, J., Randall, D., & Shapiro, D. (1993). From ethnographic record to system design: Some experiences from the field. Computer Supported Cooperative Work, 1(3), 123. [PDF]

Johnson, D. G., & Miller, K. W. (2006). A dialogue on responsibility, moral agency, and IT systems. SAC '06: Proceedings of the 2006 ACM Symposium on Applied Computing, Dijon, France. 272-276. [PDF]

Kensing, F., & Bloomberg, J. (1998). Participatory design: Issues and concerns. Computer Supported Cooperative Work, 7(3/4), 167. [PDF]

Kling, R. (1999). What is social informatics and why does it matter. D-Lib Magazine, 5(1), 1.

Lievrouw. (2003). Information and equity. Annual Review of Information Science and Technology, 37(1), 499. [PDF]

Mackay, & et al. (2000). Reconfiguring the user: Using rapid application development. Social Studies of Science, 30(5), 737. [PDF]

Malhotra, A., Gosain, S., & Hars, A. (1997). Evolution of a virtual community: Understanding design issues through a longitudinal study. ICIS '97: Proceedings of the Eighteenth International Conference on Information Systems, Atlanta, Georgia, United States. 59-74. [PDF]

Nardi, B. A., Schiano, D. J., Gumbrecht, Michelle, Swartz, & Luke. (2004). Why we blog. Communications of the ACM, 47(12), 41. [PDF]

Resnick, P., Bikson, T., Mynatt, E., Puttnam, R., Sproull, L., & Wellman, B. (2000). Beyond bowling together: SocioTechnical capital. CSCW '00: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, Philadelphia, Pennsylvania, United States. 363. [PDF]

Voida, A., Grinter, R. E., Ducheneaut, N., Edwards, W. K., & Newman, M. W. (2005). Listening in: Practices surrounding iTunes music sharing. CHI '05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Portland, Oregon, USA. 191-200. [PDF]

Optional Readings

Agre, P. E. (1997). Toward a critical technical practice: Lessons learned in trying to reform AI. In G. Bowker, L. Gasser, L. Star & B. Turner (Eds.), Bridging the great divide: Social science, technical systems, and cooperative work ()Erlbaum.

Asaro, P. M. (2000). Transforming society by transforming technology: The science and politics of participatory design. Accounting, Management, and Information Technologies, 10(4), 257.

Button, G., & Dourish, P. (1996). Technomethodology: Paradoxes and possibilities. CHI '96: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vancouver, British Columbia, Canada. 19-26. from http://doi.acm.org/10.1145/238386.238394

Fisher, D. R., & Wright, L. M. (2001). On utopias and dystopias: Toward an understanding of the discourse surrounding the internet. Journal of Computer-Mediated Communication, 6(2)

Mackay, H., & Gillespie, G. Extending the social shaping of technology approach: Ideology and appropriation

Wellman, B., & Hogan, B. (2004). The internet in everyday life. In W. S. Bainbridge (Ed.), Berkshire encyclopedia of human-computer interaction (pp. 389-389-397). Great Barrington, MA: Berkshire Publishing.

 

Policies

The instructor reserves the right to change the syllabus at any time.

Add/drop: The last day to drop this course is the end of the second week of classes. 

Respect: This class involves significant in-class discussion of topics on which you and your classmates may have differences in opinion. Please be respectful of others at all times.

Academic honesty: Please familiarize yourself with the latest UCI academic honesty policy: http://www.editor.uci.edu/catalogue/appx/appx.2.htm. The consequences of academic dishonesty are not worth the risks.

Technology in class: Please turn off all cell phones/pagers/etc. before the beginning of each class. 

Correspondence: We will send course announcements by email to the official course mailing list, so you should check your email regularly. Note that this mailing list goes to the email address that the registrar has for you (your UCInet ID). If you prefer to read your Email on another account, you should set your UCInet account to forward your Email to your preferred account (you can do this on the web at http://phwww.cwis.uci.edu/cgi-bin/phupdate).

Assignments: All written assignments should use standard formatting – Times style font size 12 or Arial/Tahoma style font size 10, 8.5x11in paper, 1" margins, double spaced. Paper copies of each assignment should be turned in at the end of class on the day listed on the course outline below.

back to cpl home