Course Schedule

Week 1Week 2Week 3Week 4Week 5Week 6Week 7Week 8Week 9Week 10

Weeks/Dates Topics Readings & Assignments Due
Week 1
Tuesday, January 5
Introduction
No readings
  Thursday, January 7
What is an information issue?

No readings

Week 2 Tuesday, January 12
Sociotechnical approaches

Readings: Gillespie, Tarleton. Wired Shut: Copyright and the Shape of Digital Culture. Cambridge, MA: MIT Press, 2007. [Read chapter 3, "The Speed Bump."]

Assignment 3a: Groups identified

  Thursday, January 14
Information Society

Readings: Three selections from Webster, F., Ed. (2004). The Information Society Reader. London, Routledge. (Please read them in the following order.)

  1. Introduction (Frank Webster)
  2. Cyberspace and the American Dream (Esther Dyson et al.)
  3. Who Will Be in Cyberspace? (Langdon Winner)

Assignment 3b: Information issue identified

Week 3 Tuesday, January 19
Copyright-1: Intro

Readings: Crews, K. D. (2006). Copyright Law for Librarians and Educators: Creative Strategies and Practical Solutions. Chicago, ALA. [Read chapters 1-3, 5-8]

Assignment 1: Exploration of information issue due

Assignment 3c: Plan of action prepared

 

Thursday, January 21
Copyright-2: Sociotechnics

Readings: Gillespie, T. (2007). Wired Shut: Copyright and the Shape of Digital Culture. Cambridge, MA, MIT Press. [Read Chapter 1 & 2]
Week 4 Tuesday, January 26
Group project reports

No readings

 

Thursday, January 28
Copyright-3: History

Readings:

Hesse, Carla. "Books in Time." In The Future of the Book, edited by Geoffrey Nunberg, 21-33. Berkeley: University of California Press, 1996.

Rose, Mark. Authors and Owners: The Invention of Copyright. Cambridge, Massachusetts: Harvard University Press, 1993. [Read Chapter 1]

Woodmansee, Martha. "On the Author Effect: Recovering Collectivity." In The Construction of Authorship: Textual Appropriation in Law and Literature, edited by Martha Woodmansee and Peter Jaszi, 15-28. Durham: Duke University Press, 1994.

Week 5

Tuesday, February 2
Introduction to ethics

Readings: Haidt, J. (2006). The Happiness Hypothesis: Finding Modern Truth in Ancient Wisdom. New York: Basic Books. [Read chapter 8]

 

Thursday, February 4
Professionalization

MId-course evaluation

Readings:

Johnson, D. G. (2001). Computer Ethics, Third Edition. New Jersey, Prentice Hall. [Read Chapter 3]

Crawford, W., & Gorman, M. (1995). Future Libraries: Dreams, Madness and Reality. Chicago: ALA. [Read Chapter 1]

Week 6 Tuesday, February 9
Professional ethics

Assignment 3e: Draft of initial sections of report due

  Thursday, February 11
Privacy-1: What is privacy?

Readings:

Moore, A. D. (2003). Privacy: Its Meaning and Value. American Philosophical Quarterly, 40(3), 215-227.

Schwartz, B. (1968). The Social Psychology of Privacy. The American Journal of Sociology, 73(6), 741-752.

Week 7 Tuesday, February 16
Group project reports
 
 

Thursday, February 18
Privacy-2: Government, workplace, and consumer perspectives

Readings:

Baase, S. (2008). A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet. Upper Saddle River, NJ: Pearson/Prentice Hall. [Read selections from chapter 2]

Week 8 Tuesday, February 23
Cyber-Security (Prof. Barbara Endicott-Popovsky)

Readings/viewings:

Watch the video at http://www.stophcommerce.com

Drogin, B. (2010). In a doomsday cyber attack scenario, answers are unsettling. Los Angeles Times. [Available at http://www.latimes.com/news/nation-and-world/la-na-cyber-attack17-2010feb17,0,305928.story]

Endicott-Popovsky, B., Ryan, D., & Fincke, D. (2005). The New Zealand Hacker Case: A Post Mortem. Paper presented at the Proceedings of the Safety and Security in a Networked World: Balancing Cyber-Rights & Responsibilities Conference.

[Time permitting, read this too] Endicott-Popovsky, B., & Frincke, D. (2006). Adding the Fourth "R": A Systems Approach to Solving the Hacker's Arms Race. Paper presented at the Proceedings of the 2006 Symposium, 39th Hawaii International Conference on System Sciences.

 

Thursday, February 25
Acceleration and overload

Readings: Levy, D. M. (2007). "No Time to Think: Reflections on Information Technology and Contemplative Scholarship." Ethics and Information Technology 9(4).

Week 9

Tuesday, March 2
Acceleration and overload (continued)

Readings:

Thorngate, W. (1988). On Paying Attention. In W. J. Baker, L. P. Mos, H. V. Rappard & H. J. Stam (Eds.), Recent Trends in Theoretical Psychology (pp. 247-263). New York: Springer-Verlag.

Kabat-Zinn, J. (2005). Coming to Our Senses: Healing Ourselves and the World Through Mindfulness. New York: Hyperion. [Read pp. 143-161]

  Thursday, March 4
Indigenous perspectives on intellectual property (Prof. Cheryl Metoyer)

Reading: Nason, J. D. (1997). Native American Intellectual Property Rights: Issues in the Control of Esoteric Knowledge. In B. Z. a. P. V. Rao (Ed.), Borrowed Power: Essays on Cultural Appropriation New Brunswick, NJ: Rutgers University Press.

Assignment 2b: Personal reflection on course (now due by 10pm on Sunday, March 7)

Week 10

Tuesday, March 9
Final group project presentations

No readings
  Thursday, March 11
Final group project presentations

No readings

Assignment 3g: Final group project report due

top of page



OverviewScheduleAssignmentsGrading



Last updated: Friday, 26-Feb-2010 07:40:43 PST
© 2010 Information School of the University of Washington
All rights reserved