HSS 371

Professor D. Schmüdde

Spring Semester 2018

Atari Mega STE

HSS 371 A: Computers & Society

http://beyondtheframe.digital/computersandsociety/  

Professor David Schmudde

d@schmud.de


Morton 105 Tuesday 2:00pm-4:30pm

Office Hours Tuesday 4:30-5:30 and by appointment

 

Course Description

We are going to examine the politics and culture embodied by powerful technology. This includes internet governance (multi-stakeholderism, online communities, decentralization vs. centralization), ethical issues in computing (hacking, artificial intelligence, participatory design), privacy, intellectual property, and the global digital divide.  

 

Course and Program Objectives and Outcomes

College of Arts & Letters Objectives

  1. Students will demonstrate an awareness of ethical responsibility and the societal impact of their future profession.
  2. Students will demonstrate a fuller understanding of the traditional humanities and social sciences through an understanding of their relation to the study of sciences and technology.
  3. Students will demonstrate an awareness of cultures and societies other than their own.
  4. Students will demonstrate writing and public speaking skills.
  5. Students will demonstrate a love of learning in the liberal arts for its own sake.
  6. Students will demonstrate leadership and team skills.

Social Sciences Program Outcomes

  1. Philosophical foundation. The student will understand the underlying theories and methods used in political science, psychology, and sociology and be able to apply them in individual and team directed research.
  2. Historical foundation. The student will understand the evolution of the disciplines of the social sciences in concrete cause and effect relationships, and be able to discern schools of interpretation over time.
  3. Research. The student will be able to design and conduct research in the social sciences using appropriate theories for the disciplines of political science, psychology and sociology. Quanitification techniques as well as theoretical constructs will be employed in doing thesis research and data collection.
  4. Tools. The student will be proficient in computing technologies necessary for the specific discipline.
  5. Professionalism. The student will achieve a high degree of knowledge, accountability, and where warranted, certification in professional practice.
  6. Leadership. The student will be able to develop plans for research projects on a professional level.
  7. Teamwork. The student will be able to contribute to research activity as part of working team member, and facilitate cooperation among the members of the team resulting in a successful project.
  8. Communication. The student will enhance written and oral presentation skills using a variety of mean to convey significant ideas and proposals.
  9. Ethics. The student will understand and abide by professional standards of ethics appropriate to the discipline on a professional level.
  10. Social Issues. The student will place into modern social context information derived from research such that the relationship between theory and practice are manifest.
  11. Lifetime learning. The student will be treated as a professional with a lifelong investment in one's field of study, and a professional goal of continuing self-assessment and self-improvement.

HSS 371 course outcomes

  • This course will enrich your understanding of the history of computing and networks. (2)
  • This course will help you think in greater depth about some ethical dilemmas of computing. (9)
  • This course will teach you to think more critically about connections between computers, networks, and political power. (10)

Additionally, HSS 371 contributes to three of the outcomes for students in the Stevens BS in Computer Science

  • [BS-CS E responsibility] An understanding of professional, ethical, legal, security, and social issues and responsibilities.
  • [BS-CS F communicate] An ability to communicate effectively with a range of audiences.
  • [BS-CS G impact] An ability to analyze the local and global impact of computing on individuals, organizations, and society. 

 

Class Requirements

Textbooks to Purchase

Grades and Course Policies

Quizzes and Summary (34%)

Quiz

There will be a short quiz on each week's Preliminary Reading at the beginning of most classes.

  • Quizzes are only ever administered at the beginning of the class.
    • If you anywhere in space and time outside of this classroom, you will miss the quiz.
    • The quizzes are not offered at any other time; this class cannot accommodate your schedule.
  • The lowest quiz grade is dropped.
    • Miss a class or simply bomb a quiz - don't sweat it!
    • Miss a class or simply bomb a quiz - don't make it a habit.

There is no attendance grade. There is no participation grade. Just do the reading and come to class on time.

Summary

Each week two students will be required to collaborate on a class summary. The summary will include what was covered and discussed in this class.

This is due by Friday evening, i.e. you have four days to complete the assignment.

Purpose:
  • An outline of what was covered through the semester and a reference point for the final exam.
  • They encourage special attention given once a semester to a specific topic for the assigned students.
  • They provide me a record of what was covered and discussed.

I will post the summary each week for everyone's benefit.

Requirements:
  • The summary should be 1100-2000 words.
  • File:
    • Submit as a .html. Feel free to develop in a word processor and then export as an html document.
    • Must be formatted as:
      • Syntax: week#-summary-lname1-lname2.html
      • Example: week5-summary-davies-smith.html (i.e. students "Davies" and "Smith" turn in their "week 5" summary)
  • The two student's notes should be completely synthesized as one.
  • Use a combination of complete sentences and bullet points.
  • Please include notes on:
    • Quiz review
    • Subject of the lecture
    • Conflicting opinions given in the class discussion

Examples: http://beyondtheframe.digital/computersandsociety/pages-output/summary-examples/

The use of graphics and illustrations is highly encouraged.

Midterm Project (33%)

Computer History and Contemporary Conflict

Requirements

Contextualize a contemporary issue within the history of computers.

One essay of about 1500 words (1400-1500 words acceptable, including all notes and references)

  1. Source one article, essay, or academic paper from the last three years. This article should clearly outline a contemporary source of conflict (i.e. privacy, the digital divide, etc...).
  2. Research the broad history of this issue and highlight milestones. For example, in cryptography you might include the Roman Caesar cipher (circa 50 B.C.E.), the German Enigma (1920s), etc..
  3. Cite and contextualize the arguments made in the original essay with historical precedence.
    • Explain what makes the situation similar to historical events
    • Explain what makes the situation unique to the 21st century.
  4. Based on the facts illustrated in the essay, offer what you think is the best path forward.
Evaluation
  • Historical examination must be both thorough and concise: cite everything you think is relevant and nothing more.
  • Arguments must be supported by specific evidence.
  • Proper grammar and spelling required.

Final (33%)

Final exam covering the entirety of the course. You will reference class summaries and your notes from your reading to prepare for this examination.  

 

Around Stevens

Writing and Communications Center

The College of Arts & Letters maintains the Writing & Communications Center at Stevens in Morton 210. Their office hours are Monday-Friday, 11 am - 5 pm. You can stop in or make an appointment to get help with your papers, presentations, and all other work you do at Stevens.

Honor Board Policies

You should by now be familiar with The Honor System at the Stevens Institute of Technology. It is your responsibility to uphold the ideals set forth in the Honor System Constitution. Specific student responsibilities include:

  • Maintaining honesty and fair play in all aspects of academic life at Stevens;
  • Writing and signing the pledge, in full, on all submitted academic work;
  • Reporting any suspected violations to an Honor Board member or to the Dean of Student Development;
  • Cooperating with the Honor Board during investigations and hearings.

If you ever have questions about how to interpret the Honor System in relation to your work in my class, please get in touch with me.

Students with disabilities

If you require special accommodations due to a disability, or if you need individual arrangements should the building be evacuated, you must inform the office of Student Counseling and Psychological Services, Dr. Angelica M. Diaz-Martinez, Director, in the Howe Center, 7th floor (x5177), and complete the Faculty Contact Form. Once you have done so, you should ask to meet with me so that we can work out any special arrangements that may be necessary.  

 

Schedule

This is subject to change. Please refer to the website each week!

Introduction (Big Ideas)

Week 1 — Culture (23/Jan)

  • Lecture: Atari, Missile Command, and the Cold War
  • Discussion: Does immersive gaming and media pose a threat to society?
  • Preliminary Reading: none

Further Reading

Week 2 — Politics (30/Jan)

Contemporary Issues

Week 3 — NSA Nation (6/Feb)

  • Lecture: The Church Committee
  • Discussion: Should personal privacy be as valued as social safety?
  • Preliminary Reading: Watch Part 1 of Frontline’s United States of Secrets

Further Reading

Week 4 — Media (13/Feb)

  • Lecture: The Medium is the Message: Newspaper/Radio/TV/Internet
  • Discussion: Is Fake News an inevitable byproduct of the current digital landscape?
  • Preliminary Reading:

Further Reading

History

Week 5—Computer History I (20/Feb)

Week 6—Computer History II (27/Feb)

Week 7 - Computer History III (6/Mar)

Section A: Midterm Due!

Week 8 — Computer History IV (20/Mar)

Section B: Midterm Due!

Contemporary Issues Revisited

Week 9 — Internet Governance and Cyberlibertarianism (27/Mar)

Further Viewing

  • All Watched Over By the Machines of Loving Grace by Adam Curtis

Week 10 — Internet Governance and Cyberlibertarianism (3/Apr)

  • Lecture: Computing and Social Movements: Cyberlibertarianism II
  • Discussion: Is it ethical to restrict the free flow of information?
  • Preliminary Reading:

Week 11 — Second Machine Age (10/Apr)

Week 12 — GNU, FOSS, and Licensing (17/Apr)

  • Lecture: MIT, Hacking, and Intellectual Property
  • Discussion: Have you stolen intellectual property? (What are some ideas to enforce the value of ephemeral property or at least compensate/encourage invention?)
  • Preliminary Reading: Hackers by Steven Levy (Chapter 2: The Hacker Ethic)

Further Reading

Week 13 — Computers & Art (24/Apr)

  • Lecture: The Digital Canon
  • Discussion: Are videogames art?
  • Preliminary Reading:
    • Better Science Trough Art by Richard P. Gabriel and Kevin J. Sullivan
    • Wasting Time on the Internet by Kenneth Goldsmith (Chapter 8: The Writer as Meme Machine)

Week 14 - Final (01/May)

  • Lecture: none
  • Preliminary Reading: none