[comp.society] Syllabus of Graduate Seminar on Social Analysis of Computing

kling@ICS.UCI.EDU (Rob Kling) (09/28/90)

[part II]

 COMPUTERIZATION IN SOCIETY --  ICS258
 Rob Kling
 Fall 1990

 Syllabus, (Draft 2.0)

 A first year graduate course:


    I. Introduction and Social Analysis of Computing: Week #1 (Sept 25-27)

       A discussion of social analysis in computer science, social
       controversies of computing and the literature about these topics.

       A. "Social Controversies About Computerization: An Introduction"
          from Computerization & Controversy:Value Conflicts and Social
          Choices  -- Charles Dunlop and Rob Kling. New York:Academic Press
          (February 1991, expected). Note: All of the articles in this
          syllabus, except those with a  *,  will appear in this book.

       B. *"Usability vs. Computability" Rob Kling.

       C. *"Reading All About Computerization." Rob Kling, in Directions in
          Advanced Computer Systems, 1990 Doug Schuler (Ed.). Norwood,
          NJ:Ablex Pub. Co. (in press).


   II. THE ECONOMIC and ORGANIZATIONAL DIMENSIONS OF COMPUTERIZATION
                                  (Weeks 2 & 3) Oct 2, 4, 9, 11

       A. The Economic Dimensions of Computerization: An Introduction --
          Charles Dunlop and Rob Kling. from Computerization &
          Controversy:Value Conflicts and Social Choices

       B. Baily, Martin Neal. "Great Expectations: PCs and Productivity" PC
          Computing 2(4) (April 1989): 137-141.

       C. Feder, Barnaby J. "Getting the Electronics Just Right: Wells Fargo
          is a Case Study in How a Company can Exploit the Information
          Revolution." New York Times, Business Section, Sunday, June 4,
          1989: pp 1,8.

       D. Frantz, Douglas. "B of A's Plans for Computer Don't Add Up." Los
          Angeles Times. (Sunday). February 8, 1988.

       E. Kling, Rob. "Social Analysis of Computing: Theoretical
          Perspectives in Recent Empirical Research" (from Computing
          Surveys) 12(1)(March 1980):61-110.  (excerpt from Section 1, pp.
          61-69). ...

       F. Salerno, Lynne. "Whatever Happened to the Computer Revolution?"
          Harvard Business Review 63(6) (Nov./Dec. 1985):129-138.

       G. Optional:

          1. Kraemer, Kenneth. "Strategic Computing and Administrative
             Reform."

          2. Rule, James and Paul Attewell. "What Do Computers Do?" Social
             Problems 36(3)(June 1989):225-241.

  III. COMPUTERIZATION AND THE TRANSFORMATION OF WORK (Weeks 4-5)
                                                 Oct 16, 18, 23, 25.

       A. Zuboff, Shoshana. - Chapters 3,4,5 from In the Age of the Smart
          Machine: The Future of Work & Power. Basic Books, 1988.

       B. Computerization in Work: An Introduction - Charles Dunlop and Rob
          Kling from Computerization & Controversy:Value Conflicts and
          Social Choices

       C. Attewell, Paul.  "Big Brother and the Sweatshop: Computer
          Surveillance in the Automated Office" Sociological Theory 5
          (Spring 1987): 87-99.

       D. Bullen, Christine and John Bennett. "Groupware in Practice: An
          Interpretation of Work Experience"

       E. Ehn, Pelle. "The Art and Science of Designing Computer Artifacts."
          Scandinavian Journal of Information Systems. 1 (August 1989):
          21-42.

       F. Guiliano, Vincent. "The Mechanization of Work" Scientific American
          247 (September 1982), pp. 148-164.

       G. *Tom Jewett & Rob Kling: "The Work Group Manager's Role in
          Building Work Group Infrastructure"

       H. Perrole, Judith. "Intellectual Assembly Lines" Social Science
          Computer Review 2(3):(July -Sept. 1986):111-122.

       I. Recommended:

          1. Kling, Rob and Suzanne Iacono ``Office Routine: The Automated
             Pink Collar" IEEE Spectrum (June 1984):73-76.

          2. Mouritsen, Jan and Niels Bjorn-Anderson.  "Understanding Third
             Wave Information Systems".


   IV. Computerization and SOCIAL CONTROL (Week 6)

       A. Computerization and Social Control: An Introduction -- Charles
          Dunlop and Rob Kling, from Computerization & Controversy:Value
          Conflicts and Social Choices.

       B. Rob Kling, "Value Conflicts in Computing Developments"
          Telecommunications Policy 7(1)(March 1983):12-34. (excerpt pp 12-24
          (ending at "Computers and Schooling in the USA) and pg. 31 ("Value
          Conflicts in Different Computing Arenas In The USA.")

       C. Kenneth C. Laudon, "Comment on 'Preserving Individual Autonomy in
          an Information-Oriented Society'".  In Lance J. Hoffman et. al.
          Computer Privacy in the Next Decade, New York:  Academic Press
          (1980), pp. 89-95.

       D. Richard P. Kusserow, "The Government Needs Computer Matching to
          Root Out Waste and Fraud", CACM, Vol. 27, No. 6 (June, 1984), pp.
          542-545.

       E. Privacy Protection Study Commission, Personal Privacy in an
          Information Society, U.S. Government Printing Office (1977), pp.
          3-37.

       F. Evelyn Richards, "Proposed FBI Crime Computer System Raises
          Questions on Accuracy, Privacy . . .", The Washington Post,
          February 13, 1989.

       G. James B. Rule et. al, "Preserving Individual Autonomy in an
          Information-Oriented Society".  In Lance J. Hoffman et. al.
          Computer Privacy in the Next Decade, New York:  Academic Press
          (1980), pp. 65-87.

       H. John Shattuck, "Computer Matching is a Serious Threat to Individual
          Rights", CACM, Vol. 27, No. 6 (June, 1984), pp. 538-541.

       I. Recommended:

          1. Roger C. Clarke, "Information Technology and Dataveillance",
             CACM, Vol. 31, No. 5 (May, 1988), pp. 498-512.


    V. Doing Social Analysis in Concrete Settings -- part I (Week 7)

       A. *"Defining the Boundaries of Computing Across Complex
          Organizations" Rob Kling. in  Critical Issues in Information
          Systems, R. Boland and  R. Hirschheim (eds.). John-Wiley. (1987).

       B. *Bill Curtis, et. al.  "A Field Study of the Software Design
          Process for Large Systems," Comm. of the ACM,31(11):1268-1287,
          November 1988.

       C. Recommended
          1. Perrow, Charles. Complex Organization: A Critical Essay.


   VI. SECURITY AND RELIABILITY IN CRITICAL TASK PERFORMANCE (Week 8)

       A. Security and Reliability: An Introduction -- Charles Dunlop and Rob
          Kling, from Computerization & Controversy:Value Conflicts and
          Social Choices.

       B. Alan Borning, "Computer System Reliability and Nuclear War".  CACM,
          Vol 30, No. 2 (February, 1987), pp. 112-131.

       C. Peter J. Denning, "Computer Viruses".  American Scientist, Vol. 76
          (May-June, 1988), pp. 236-238.

       D. Jonathan Jacky, "Safety-Critical Computing:  Hazards, Practices,
          Standards and Regulation".

       E. David Lorge Parnas, "Software Aspects of Strategic Defense
          Systems". Originally published in American Scientist, Vol. 73, No.
          5, pp. 432-440. Reprinted in CACM, Vol. 28, No. 12 (December,
          1985), pp. 1326-1335.

       F. Brian Cantwell Smith, "The Limits of Correctness". Report No.
          CSLI-85-35  CSLI(Stanford).  Also printed in the ACM SIG journal
          Computers and Society, combined Vol. 14, No. 4 and Vol. 15, Nos. 1,
          2, 3 (Winter / Spring / Summer / Fall, 1985), pp. 18-26.

       G. RISKS-FORUM DIGEST excerpts

       H. Clifford Stoll, "Stalking the Wily Hacker".  CACM, Vol. 31, No. 5
          (May, 1988), pp. 484-497.

       I.  Recommended:

          1. Perrow, Charles. - Normal Accidents: Living with High Risk
             Technologies.  Basic Books. 1984. (especially chapters 1,2,3,9)


  VII. Doing Social Analysis in Concrete Settings -- part II (Week 9)

       A. Recommended
          1. Perrow, Charles. Complex Organization: A Critical Essay.


 VIII. ETHICAL PERSPECTIVES AND PROFESSIONAL RESPONSIBILITIES (Week 10)

       A. Jackall, Robert. - Moral Mazes: The World of Corporate Managers.
          Oxford University Press, pbk. 1988. (especially chapters 2,3,5,8)

       B. Ethical Perspectives and Professional Responsibilities: An
          Introduction -- Charles Dunlop and Rob Kling, from Computerization
          & Controversy:Value Conflicts and Social Choices.

       C. "ACM Code of Professional Conduct".  Reprinted in Deborah G.
          Johnson and John W. Snapper (eds.), Ethical Issues in the Use of
          Computers.  Belmont, California:  Wadsworth Publishing Company
          (1985), pp. 31-34.

       D. Carl Barus, "Military Influence on the Electrical Engineering
          Curriculum Since World War II".  IEEE Technology and Society
          Magazine, Vol. 6, No. 2 (June, 1987), pp. 3-9.

       E. John Ladd. "Computers and Moral Responsibility: A Framework for
          Ethical Analysis"  Section 11 of  The Information Web: Ethical and
          Social Implications of Computer Networking. Carol Gould (ed).
          Boulder Colo., Westview Press. (1989). (pp. 207- 227).

       F. Recommended:

          1. Terry Winograd, "Some Thoughts on Military Funding".  The CPSR
             Newsletter, Vol. 2, No. 2 (Spring, 1984), pp. 1-3.

          2. Joseph Weizenbaum, Computer Power and Human Reason, Section 10.
             San Francisco:  W. H. Freeman and Company (1976), pp. 258-280 +
             Notes to Section 10, pp. 286-287.

          3. Rob Kling, "Computer Abuse and Computer Crime as Organizational
             Activities".  Computer / Law Journal, Vol. II, No. 2 (Spring,
             1980).
-20-