kling@ICS.UCI.EDU (Rob Kling) (09/28/90)
[part II] COMPUTERIZATION IN SOCIETY -- ICS258 Rob Kling Fall 1990 Syllabus, (Draft 2.0) A first year graduate course: I. Introduction and Social Analysis of Computing: Week #1 (Sept 25-27) A discussion of social analysis in computer science, social controversies of computing and the literature about these topics. A. "Social Controversies About Computerization: An Introduction" from Computerization & Controversy:Value Conflicts and Social Choices -- Charles Dunlop and Rob Kling. New York:Academic Press (February 1991, expected). Note: All of the articles in this syllabus, except those with a *, will appear in this book. B. *"Usability vs. Computability" Rob Kling. C. *"Reading All About Computerization." Rob Kling, in Directions in Advanced Computer Systems, 1990 Doug Schuler (Ed.). Norwood, NJ:Ablex Pub. Co. (in press). II. THE ECONOMIC and ORGANIZATIONAL DIMENSIONS OF COMPUTERIZATION (Weeks 2 & 3) Oct 2, 4, 9, 11 A. The Economic Dimensions of Computerization: An Introduction -- Charles Dunlop and Rob Kling. from Computerization & Controversy:Value Conflicts and Social Choices B. Baily, Martin Neal. "Great Expectations: PCs and Productivity" PC Computing 2(4) (April 1989): 137-141. C. Feder, Barnaby J. "Getting the Electronics Just Right: Wells Fargo is a Case Study in How a Company can Exploit the Information Revolution." New York Times, Business Section, Sunday, June 4, 1989: pp 1,8. D. Frantz, Douglas. "B of A's Plans for Computer Don't Add Up." Los Angeles Times. (Sunday). February 8, 1988. E. Kling, Rob. "Social Analysis of Computing: Theoretical Perspectives in Recent Empirical Research" (from Computing Surveys) 12(1)(March 1980):61-110. (excerpt from Section 1, pp. 61-69). ... F. Salerno, Lynne. "Whatever Happened to the Computer Revolution?" Harvard Business Review 63(6) (Nov./Dec. 1985):129-138. G. Optional: 1. Kraemer, Kenneth. "Strategic Computing and Administrative Reform." 2. Rule, James and Paul Attewell. "What Do Computers Do?" Social Problems 36(3)(June 1989):225-241. III. COMPUTERIZATION AND THE TRANSFORMATION OF WORK (Weeks 4-5) Oct 16, 18, 23, 25. A. Zuboff, Shoshana. - Chapters 3,4,5 from In the Age of the Smart Machine: The Future of Work & Power. Basic Books, 1988. B. Computerization in Work: An Introduction - Charles Dunlop and Rob Kling from Computerization & Controversy:Value Conflicts and Social Choices C. Attewell, Paul. "Big Brother and the Sweatshop: Computer Surveillance in the Automated Office" Sociological Theory 5 (Spring 1987): 87-99. D. Bullen, Christine and John Bennett. "Groupware in Practice: An Interpretation of Work Experience" E. Ehn, Pelle. "The Art and Science of Designing Computer Artifacts." Scandinavian Journal of Information Systems. 1 (August 1989): 21-42. F. Guiliano, Vincent. "The Mechanization of Work" Scientific American 247 (September 1982), pp. 148-164. G. *Tom Jewett & Rob Kling: "The Work Group Manager's Role in Building Work Group Infrastructure" H. Perrole, Judith. "Intellectual Assembly Lines" Social Science Computer Review 2(3):(July -Sept. 1986):111-122. I. Recommended: 1. Kling, Rob and Suzanne Iacono ``Office Routine: The Automated Pink Collar" IEEE Spectrum (June 1984):73-76. 2. Mouritsen, Jan and Niels Bjorn-Anderson. "Understanding Third Wave Information Systems". IV. Computerization and SOCIAL CONTROL (Week 6) A. Computerization and Social Control: An Introduction -- Charles Dunlop and Rob Kling, from Computerization & Controversy:Value Conflicts and Social Choices. B. Rob Kling, "Value Conflicts in Computing Developments" Telecommunications Policy 7(1)(March 1983):12-34. (excerpt pp 12-24 (ending at "Computers and Schooling in the USA) and pg. 31 ("Value Conflicts in Different Computing Arenas In The USA.") C. Kenneth C. Laudon, "Comment on 'Preserving Individual Autonomy in an Information-Oriented Society'". In Lance J. Hoffman et. al. Computer Privacy in the Next Decade, New York: Academic Press (1980), pp. 89-95. D. Richard P. Kusserow, "The Government Needs Computer Matching to Root Out Waste and Fraud", CACM, Vol. 27, No. 6 (June, 1984), pp. 542-545. E. Privacy Protection Study Commission, Personal Privacy in an Information Society, U.S. Government Printing Office (1977), pp. 3-37. F. Evelyn Richards, "Proposed FBI Crime Computer System Raises Questions on Accuracy, Privacy . . .", The Washington Post, February 13, 1989. G. James B. Rule et. al, "Preserving Individual Autonomy in an Information-Oriented Society". In Lance J. Hoffman et. al. Computer Privacy in the Next Decade, New York: Academic Press (1980), pp. 65-87. H. John Shattuck, "Computer Matching is a Serious Threat to Individual Rights", CACM, Vol. 27, No. 6 (June, 1984), pp. 538-541. I. Recommended: 1. Roger C. Clarke, "Information Technology and Dataveillance", CACM, Vol. 31, No. 5 (May, 1988), pp. 498-512. V. Doing Social Analysis in Concrete Settings -- part I (Week 7) A. *"Defining the Boundaries of Computing Across Complex Organizations" Rob Kling. in Critical Issues in Information Systems, R. Boland and R. Hirschheim (eds.). John-Wiley. (1987). B. *Bill Curtis, et. al. "A Field Study of the Software Design Process for Large Systems," Comm. of the ACM,31(11):1268-1287, November 1988. C. Recommended 1. Perrow, Charles. Complex Organization: A Critical Essay. VI. SECURITY AND RELIABILITY IN CRITICAL TASK PERFORMANCE (Week 8) A. Security and Reliability: An Introduction -- Charles Dunlop and Rob Kling, from Computerization & Controversy:Value Conflicts and Social Choices. B. Alan Borning, "Computer System Reliability and Nuclear War". CACM, Vol 30, No. 2 (February, 1987), pp. 112-131. C. Peter J. Denning, "Computer Viruses". American Scientist, Vol. 76 (May-June, 1988), pp. 236-238. D. Jonathan Jacky, "Safety-Critical Computing: Hazards, Practices, Standards and Regulation". E. David Lorge Parnas, "Software Aspects of Strategic Defense Systems". Originally published in American Scientist, Vol. 73, No. 5, pp. 432-440. Reprinted in CACM, Vol. 28, No. 12 (December, 1985), pp. 1326-1335. F. Brian Cantwell Smith, "The Limits of Correctness". Report No. CSLI-85-35 CSLI(Stanford). Also printed in the ACM SIG journal Computers and Society, combined Vol. 14, No. 4 and Vol. 15, Nos. 1, 2, 3 (Winter / Spring / Summer / Fall, 1985), pp. 18-26. G. RISKS-FORUM DIGEST excerpts H. Clifford Stoll, "Stalking the Wily Hacker". CACM, Vol. 31, No. 5 (May, 1988), pp. 484-497. I. Recommended: 1. Perrow, Charles. - Normal Accidents: Living with High Risk Technologies. Basic Books. 1984. (especially chapters 1,2,3,9) VII. Doing Social Analysis in Concrete Settings -- part II (Week 9) A. Recommended 1. Perrow, Charles. Complex Organization: A Critical Essay. VIII. ETHICAL PERSPECTIVES AND PROFESSIONAL RESPONSIBILITIES (Week 10) A. Jackall, Robert. - Moral Mazes: The World of Corporate Managers. Oxford University Press, pbk. 1988. (especially chapters 2,3,5,8) B. Ethical Perspectives and Professional Responsibilities: An Introduction -- Charles Dunlop and Rob Kling, from Computerization & Controversy:Value Conflicts and Social Choices. C. "ACM Code of Professional Conduct". Reprinted in Deborah G. Johnson and John W. Snapper (eds.), Ethical Issues in the Use of Computers. Belmont, California: Wadsworth Publishing Company (1985), pp. 31-34. D. Carl Barus, "Military Influence on the Electrical Engineering Curriculum Since World War II". IEEE Technology and Society Magazine, Vol. 6, No. 2 (June, 1987), pp. 3-9. E. John Ladd. "Computers and Moral Responsibility: A Framework for Ethical Analysis" Section 11 of The Information Web: Ethical and Social Implications of Computer Networking. Carol Gould (ed). Boulder Colo., Westview Press. (1989). (pp. 207- 227). F. Recommended: 1. Terry Winograd, "Some Thoughts on Military Funding". The CPSR Newsletter, Vol. 2, No. 2 (Spring, 1984), pp. 1-3. 2. Joseph Weizenbaum, Computer Power and Human Reason, Section 10. San Francisco: W. H. Freeman and Company (1976), pp. 258-280 + Notes to Section 10, pp. 286-287. 3. Rob Kling, "Computer Abuse and Computer Crime as Organizational Activities". Computer / Law Journal, Vol. II, No. 2 (Spring, 1980). -20-