Inf380C: Information in Social and Cultural Context Student-Led Reading Discussion with Active Learning Activity Sign-Up List Week 4/oct 1: Asking: What Question(s) Might the Following Readings Help us Frame?



Download 25.69 Kb.
Date conversion19.10.2016
Size25.69 Kb.
INF380C: Information in Social and Cultural Context

Student-Led Reading Discussion with Active Learning Activity

Sign-Up List
Week 4/OCT 1: Asking: What Question(s) Might the Following Readings Help us Frame?

***Student-Led Readings: #1; #2; #3



  • Akrich, M., “The De-Scription of Technical Objects,” In J. Bijker and J. Law, eds., Shaping Technology / Building Societyhttp://www.utexas.edu/news/2012/07/19/study-energy-benefits-potential-algae-fuels/ (Cambridge, MA: MIT Press, 1992). (EBook)

Student: ________________________________________________________________

  • Barbakoff, A. , “Libraries Build Autonomy: A Philosophical Perspective on the Social Role of Libraries and Librarians,” Library Philosophy and Practice (2010). Available at: http://www.webpages.uidaho.edu/~mbolin/barbakoff.htm

Student: _________________________________________________________________

  • Best, M. L. and K. Wade, “The Internet and Democracy: Global Catalyst or Democratic Dud?,” Bulletin of Science Technology Society 6 (2) (2009). Available at: http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/12-InternetDemocracy.pdf

Student: _________________________________________________________________

Week 5/OCT 8: Asking: What Question(s) Can the Following Readings Help us Frame?

***Student-Led Readings: #4; #5, #6; #7



  • Jaeger, Paul T., John Carlo Bertot, Christine M. Kodama, Sarah M. Katz, and Elizabeth J. DeCoster, “Describing and Measuring the Value of Public Libraries: The Growth of the Internet and the Evolution of Library Value,” First Monday 16 (11) (November 2011). Available at:

http://www.firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3765/3074

Student: _________________________________________________________________



  • Latour, B., “Where are the Missing Masses?” In The Sociology of a Few Mundane Artifacts. Shaping Technology/Building Society: Studies in Sociotechnical Change (1992), 225–258. Available at: http://www.bruno-latour.fr/sites/default/files/50-MISSING-MASSES-GB.pdf

Student: _________________________________________________________________

  • Star, Susan Leigh and James R. Griesemer, “Institutional Ecology, ‘Translations’ and Boundary Objects: Amateurs and Professionals in Berkeley’s Museum of Vertebrate Zoology, 1907-1939,” Social Studies of Science, 19 (3) (August 1989): 387-420. (JSTOR)

Student: _________________________________________________________________

  • Warschauer, Mark and Morgan Ames, “Can One Laptop Per Child Save the World’s Poor?” Journal of International Affairs 64 (1) (2010): 33-51. Available at: http://jia.sipa.columbia.edu/can-one-laptop-child-save-worlds-poor

Student: _________________________________________________________________

Week 6/OCT 15: Seeking: How Can the Following Readings Help Us Find Our Way?

***Student-Led Readings: #8; #9, #10



  • Bennett, T. , “Speaking to the Eyes: Museums, Legibility and the Social Order,” In The Politics of Display Museums, Science, Culture (London-New York: Routledge, 1998), 25–35. Available at: http://rfrost.people.si.umich.edu/courses/MatCult/content/Bennett.pdf

Student: _________________________________________________________________

  • Drucker, Peter, “The Age of Social Transformation,” The Atlantic Monthly (November 1994). Available at: http://www.theatlantic.com/past/docs/issues/95dec/chilearn/drucker.htm

Student: _________________________________________________________________

  • Heilbroner, R., “Do Machines Make History?” Technology and Culture 8 (3) (1967): 335. (JSTOR)

Student: _________________________________________________________________

  • Waddington, David, “Locating the Wrongness in Ultra-Violent Video Games,” Ethics and Information Technology 9 (2) (July 2007): 121-128. Available fulltext through Springer, linked under databases on lib.utexas.edu

Student: _________________________________________________________________

Week 7/OCT 22: Seeking: How Can the Following Readings Help Us Find Our Way?

***Student-Led Readings: #11; #12; #13





  • Klein, H. and D. Kleinman, “The Social Construction of Technology: Structural Considerations, Science,” Technology & Human Values 27 (January 1, 2002): 28-52. (JSTOR)

Student: _________________________________________________________________

  • Sherman, D. J., “Art, Commerce, and the Production of Memory in France after World War I,” In Commemorations: The Politics of National Identity (1994), 186–211. Available at: http://rfrost.people.si.umich.edu/courses/MatCult/content/Sherman_Memorials.pdf

Student: _________________________________________________________________

  • Vertesi, Janet, “Mind the Gap: The London Underground Map and Users’ Representations of Urban Space,” Social Studies of Science 38 (Feb 1, 2008): 7-33. (JSTOR)

Student: _________________________________________________________________

  • Woolwine, D. E., “Libraries and the Balance of Liberty and Security,” Library Philosophy and Practice. (2007): 1-17. Available at: http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1147&context=libphilprac

Student: _________________________________________________________________

  • Hartel, Jenna, “Information in the Hobby of Gourmet Cooking: Four Contexts,” In William Aspray and Barbara M. Hayes, eds., Everyday Information (MIT Press, 2011). (EBook)

Student: _________________________________________________________________

Week 8/OCT 29: Making: How Can the Following Readings Help Us Understand Our Role(s) in Creating Information?

***Student-Led Readings: #14; #15; #16; #17



  • Black, Alastair and Antony Bryant, “Knowledge Management and Diplomacy,” First Monday 16 (1-3) (January 2011). Available at: http://www.firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3339/2757

Student: _________________________________________________________________

  • Doty, Philip, “Privacy, Reading, and Trying Out Identity: The Digital Millennium Copyright Act and Technological Determinism,” In William Aspray and Philip Doty, eds., Privacy in America (Scarecrow Press, 2011). (EBook)

Student: _________________________________________________________________

  • Kolko, Beth and Cynthia Putnam, “Computer Games in the Developing World: The Value of Non-Instrumental Engagement with ICTs, or Taking Play Seriously,” International Conference on Information and Communication Technologies and Development, 2009. Available at: http://dub.washington.edu/djangosite/media/papers/Kolko_Putnam_2009.pdf

Student: _________________________________________________________________

  • Kuhn, Martin, “Interactivity and Prioritizing the Human: A Code of Blogging Ethics,” Journal of Mass Media Ethics, 22(1): 18–36. Available at: http://myweb.facstaff.wwu.edu/karlberg/498/readings/Kuhn.pdf

Student: _________________________________________________________________

  • Resnick, P., “Beyond Bowling Together: Sociotechnical Capital,” In John M. Carroll, ed., HCI in the New Millenium (AddisonWesley, 2000), 247-272. Available at: https://www.socialtext.net/data/workspaces/socialmediaberkeley/attachments/syllabus:20071225213123-0-32017/files/ResnickSTK.pdf

Student: _________________________________________________________________

Week 9/NOV 5: Making: How Can the Following Readings Help Us Understand Our Role(s) in Creating Information?

***Student-Led Readings: #18; #19; #20



  • Blanchette, J.-F. and D. G. Johnson, “Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness,” The Information Society 18 (2002):33-45. Available at: http://polaris.gseis.ucla.edu/blanchette/papers/is.pdf

Student: _________________________________________________________________

  • Dresang, E. T., “Intellectual Freedom and Libraries: Complexity and Change in the Twenty-First-Century Digital Environment,” The Library Quarterly 76 (2 )(April 2006): 169-92. (JSTOR)

Student: _________________________________________________________________



  • Haraway, D., “Teddy Bear Patriarchy: Taxidermy in the Garden of Eden, New York City, 1908-1936,” Social Text (1984): 20–64. (JSTOR)

Student: _________________________________________________________________

  • Maack, Mary Niles, “Books and Libraries as Instruments of Cultural Diplomacy In Francophone Africa During the Cold War,” Libraries & Culture 36 (Winter 2001): 58-86. (JSTOR)

Student: _________________________________________________________________

Week 10/NOV 12: Having: How Can the Following Readings Help us Understand Our Roles in Sheltering/Having Information?

***Student-Led Readings: #21; #22; #23; #24



  • Dourish, P. and K. Anderson, “Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena,” Human-Computer Interaction 21 (2006): 319-342. Available at: http://www.dourish.com/publications/2006/DourishAnderson-InfoPractices-HCIJ.pdf

Student: _________________________________________________________________

  • Marshall, Catherine, “Digital Copies and a Distributed Notion of Reference in Personal Archives. In Megan Winget and William Aspray, eds., Digital Media: Technological and Social Challenges of the Interactive World (Scarecrow Press, 2011). Available at: http://www.csdl.tamu.edu/~marshall/Digital-Media-Marshall.pdf

Student: _________________________________________________________________

  • Neufeld, David, “Parks Canada, the Commemoration of Canada, and Northern Aboriginal Oral History,” In Paula Hamilton and Linda Shopes, eds., Oral History and Public Memories (Temple University Press, 2008), 7-30. (EBook)

Student: _________________________________________________________________

  • Wintroub, M., “Taking Stock at the End of the World: Rites of Distinction and Practices of Collecting in Early Modern Europe,” Studies in History and Philosophy of Science 30 (1995): 395–424. Available at: http://www.rfrost.people.si.umich.edu/courses/MatCult/content/Wintroub_Collecting.pdf

Student: _________________________________________________________________

Week 11/NOV 19: Making: How Can the Following Readings Help Us Understand Our Role(s) in Creating Information?

***Student-Led Readings: #25; #26; #27



  • Bell, Genevieve, “No More SMS From Jesus: Ubicomp, Religion, and Techno-Spiritual Practices. Ubicomp 2006,” Lecture Notes in Computer Science 4206/2006: 141-158. Available at: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CFIQFjAA&url=http%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fdownload%3Fdoi%3D10.1.1.88.6858%26rep%3Drep1%26type%3Dpdf&ei=LnkVUImEN8a46gHigoDIBg&usg=AFQjCNG37YiP07zK-f3LOJ5DLIjUn5OthQ

Student: _________________________________________________________________

  • Frost, Jeana H. and Michael P. Massagli, “Social Uses of Personal Health Information Within PatientsLikeMe, an Online Patient Community: What Can Happen When Patients Have Access to One Another’s Data,” Journal of Medical Internet Research 10 (3) (2008). Available at: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2553248/

Student: _________________________________________________________________

  • Hutchins, E. and T. Klausen, “Distributed Cognition in an Airline Cockpit,” In Y. Engestrom and D. Middleton, eds., Cognition and Communication at Work (New York: Cambridge University Press, 1996). Available at: http://hci.ucsd.edu/102a/readings/cockpit-cog.pdf

Student: _________________________________________________________________

  • Perry. J. et al, “Disability, Inability, and Cyberspace,” In Batya Friedman, ed., Designing Computers for People: Human Values and the Design of Computer Technology (Stanford, CA: CSLI Publications, 1998). Available at: http://pdf.aminer.org/000/239/996/a_new_approach_to_providing_gui_access_for_blind_people.pdf

Student: _________________________________________________________________

Week 12/NOV 26: Making: How Can the Following Readings Help Us Understand our Role(s) in Creating Information?

***Student-Led Readings: #28; #29; #30



  • Jones, M., A. Schuckman, and K. Watson. The Ethics of Pre-Employment Screening Through the Use of the Internet. (2004). Available at: http://www.ethicapublishing.com/3CH4.htm

Student: _________________________________________________________________

  • MacIntosh-Murray, A. and C. W. Choo, “Information Behavior in the Context of Improving Patient Safety,” Journal of the American Society for Information Science and Technology 56 (12) (2005): 1332-1345. Available fulltext through the Library Literature & Information Science database linked from lib.utexas.edu

Student: _________________________________________________________________

  • McPherson, Miller, Lynn Smith-Lovin, and James Cook, “Birds of a Feather: Homophily in Social Networks,” Annual Review of Sociology 27 (2001): 415-444. (JSTOR)

Student: _________________________________________________________________

  • Patton, J. W., “Protecting Privacy in Public? Surveillance Technologies and the Value of Public Places,” Ethics and Information Technology 2 (2000): 181-187. Available at: http://www.its.ohiou.edu/bernt/ITS351/protecting%20privacy%20in%20public%20spaces.pdf

Student: _________________________________________________________________


The database is protected by copyright ©ininet.org 2016
send message

    Main page