kling@ICS.UCI.EDU (Rob Kling) (07/19/90)
==================================== SYLLABUS COMPUTERIZATION IN SOCIETY -- ICS131 Fall 1989 Rob Kling Department of Information and Computer Science University of California, Irvine (September 1989) (rev. 3/90) The readings come from a new book, Computerization and Controversy: Value Conflicts and Social Choices by Charles Dunlop and Rob Kling (ed.) which will be published by Academic Press late in 1990. We are providing the articles and about 150 pages of analytical introductions in packets of photocopies which you can purchase at Kinko's. I. Sept 27-29: INTRODUCTION TO THE SOCIAL STUDY OF COMPUTERIZATION - Week #1 A. Sept. 27 -- Today we discuss the orientation of this course, the work you will do, and the organization of activities. 1. Reading: "Usability vs. Computability: Social Perspectives Held by Computer Specialists" by Rob Kling. Paper presented at 1989 IFIP Conference. B. Sept 29 -- Film: Now the Chips are Down. II. Oct. 3-5: THE DREAMS OF TECHNOLOGICAL UTOPIANISM -- Week #2 Are we witnessing a "computer revolution" or living in an "information society?" This week we examine some fundamental images about the role of computers in social life. A. Assignment: Oct 3 (written assignment #1 described) B. Readings: Computerization and Controversy -- Chapter B1 Introduction to THE DREAMS OF TECHNOLOGICAL UTOPIANISM -- Charles Dunlop and Rob Kling Feigenbaum, Edward and Pamela McCorduck. Fifth Generation: Artificial Intelligence and Japan's Computer Challenge to the World. Excerpts: Prologue, Experts in Silicon, Section 7 (Speculations in Knowledge Futures), Epilogue. Grudin, Jonathan. "Why CSCW Applications fail: problems in the Design and Evaluation of Organizational Interfaces." 1988 CSCW conference. Kling, Rob and Suzanne Iacono "Making a Computer Revolution" -- Journal of Computing and Society 1(1). Poppel, Harvey L. "Office Automation -- Who Needs it?" Harvard Business Review 60(6)(#82)(Nov-Dec 1982): 146-155. Sculley, John -- "The Relationship Between Business and Higher Education: A Perspective on the Twenty-first Century." Communications of the ACM 32(9) (September 1989):1056-1061. III. Oct 10-12: THE ECONOMIC AND ORGANIZATIONAL DIMENSIONS OF COMPUTERIZATION - Week #3 This week we will examine how computer technologies shape and are shaped by organizations. Organizations, such as IBM, DEC, Honeywell and Apple, are the primary vendors of computing equipment and it is difficult to understand the behavior of the computer industry without some insight into the internal dynamics of organizational life. Organizations are still the primary consumers of computer-based products, and it is also difficult to understand computerization without some insight into the dynamics of organizational life. We will examine principles of organizational behavior, and then examine computerization in light of them. A. Assignments: Oct 10 (written assignment #1 due); Oct 12 (written assignment #2 described) B. Readings: Computerization and Controversy -- Chapter B2 Introduction to "THE ECONOMIC AND ORGANIZATIONAL DIMENSIONS OF COMPUTERIZATION" -- Charles Dunlop and Rob Kling Baily, Martin Neal. "Great Expectations: PCs and Productivity" PC Computing 2(4) (April 1989): 137-141. Feder, Barnaby J. "Getting the Electronics Just Right: Wells Fargo is a Case Study in How a Company can Exploit the Information Revolution." New York Times, Business Section, Sunday, June 4, 1989: pp 1,8. Miller, Michael J. "PCs and Productivity: Where's the Payoff?" Infoworld 11(38) (Sept 18, 1989), pp59, 62. Rule, James and Paul Attewell. "What Do Computers Do?" Social Problems 36(3)(June 1989):225-241. Salerno, Lynne. "Whatever Happened to the Computer Revolution?" Harvard Business Review 63(6) (Nov./Dec. 1985):129-138. Kling, Rob. "Social Analysis of Computing" (from Computing Surveys 1980) (excerpt, Sections 1-2). ... IV. Oct 17-19: COMPUTERIZATION IN WORK - Week #4 Computerization is a complex social and technical process for making social activities depend upon computers. How does computerization alter the character of office life and jobs in offices? A. Assignment: Oct 19: Assignment #2 due B. Film: "Computers in Context" (Oct 17).? (or in week #9) C. Readings: Computerization and Controversy -- Chapter C1 Introduction to COMPUTERIZATION IN WORK -- Charles Dunlop and Rob Kling Attewell, Paul "Big Brother and the Sweatshop" Theoretical Sociology. Gasser, Les. "The Integration of Computing and Routine Work." ACM Transactions on Office Information Systems. 4(3)(July 1986): 205-225. Guiliano, Vincent "The Mechanization of Work" Scientific American September 1982. Kling, Rob and Suzanne Iacono ``Changing Office Technologies and the Transformation of Clerical Jobs." in Technology and the Transformation of White Collar Work Robert Kraut (ed.) Chapter 4. Perrole, Judith "Intellectual Assembly Lines:The Rationalization of Managerial, Professional and Technical Work" Computers and the Social Sciences. 2(3):(July -Sept. 1986):111-122. V. Oct 24-26: COMPUTERIZATION AND SCHOOLING -- Week #5 A. Readings: Computerization and Controversy -- Chapter C2 Introduction to COMPUTERIZATION AND SCHOOLING -- Charles Dunlop and Rob Kling Garfinkel, Simson L. -- A Second Wind for Athena: The Experiment Scheduled to Finish in 1988 in Some Ways Just Beginning. The Best of Technology Review 1989 pp. 27-31 Kling, Rob -- Commentary: The New Wave of Computing in Colleges and Universities: A Social Analysis. SIGCUE Outlook 1986 pp. 8-14 Schank, Roger. Selection from The Cognitive Computer. "Computers at School" pp 200-212. Tucker, Marc -- Computers in the Schools. Speech given by Marc S. Tucker in January 1985 to the Association of American Publishers at their Annual Meeting in Ryetown, New York. 1985 pp. 76-93 VI. Oct 31 - Nov 2: SOCIAL RELATIONS IN ELECTRONIC COMMUNITIES -- Week #6 A. Midterm: B. Readings: Computerization and Controversy -- Chapter C3 Introduction to SOCIAL RELATIONS IN ELECTRONIC COMMUNITIES -- Charles Dunlop and Rob Kling Peter J. Denning, "A New Paradigm for Science". American Scientist, Vol. 75 (November-December, 1987), pp. 572-573. James R. Beniger, "Information Society and Global Science". The Annals of The American Academy of Political and Social Science, Vol 495 (January, 1988), pp. 14-28. Sara Kiesler, Jane Siegel, and Timothy W. McGuire, "Social Psychological Aspects of Computer-Mediated Communication". American Psychologist, Vol, 39, No. 10 (October, 1984), pp. 1123-1134. (not in packet #1) Judith A. Perrolle, "Conversations and Trust in Computer Interfaces". (not in packet #1) Fred W. Weingarten and D. Linda Garcia, "Public Policy Concerning the Exchange and Distribution of Scientific Information". The Annals of The American Academy of Political and Social Science, Vol 495 (January, 1988), pp. 61-72. Lindsy Van Gelder, "The Strange Case of the Electronic Lover: A Real-Life Story of Deception, Seduction, and Technology". Ms., Vol. XIV, No. 4 (October, 1985), pp. 94, 99, 101-104, 117, 123, 124. [not in packet #1] replaced by: "The French are Falling in Love with their Computers, and Through Them. Justine du Lacy. VII. Nov. 7-9: SOCIAL CONTROL AND PRIVACY -- Week #7 Does the use of computerized communication and information systems often lead to "invasions of personal privacy"? What do "matching," "profiling," and "fair information practices" mean in the context of computerized technologies and privacy? A. Assignment: Nov 7: Written assignment #3 described. B. Readings: Computerization and Controversy -- Chapter D1 Introduction to SOCIAL CONTROL AND PRIVACY -- Charles Dunlop and Rob Kling Roger C. Clarke, "Information Technology and Dataveillance", CACM, Vol. 31, No. 5 (May, 1988), pp. 498-512. Rob Kling, "Value Conflicts in Computing Developments" Telecommunications Policy 1983. Kenneth C. Laudon, "Comment on 'Preserving Individual Autonomy in an Information-Oriented Society'". In Lance J. Hoffman et. al. Computer Privacy in the Next Decade, New York: Academic Press (1980), pp. 89-95. Richard P. Kusserow, "The Government Needs Computer Matching to Root Out Waste and Fraud", CACM, Vol. 27, No. 6 (June, 1984), pp. 542-545. Privacy Protection Study Commission, Personal Privacy in an Information Society, U.S. Government Printing Office (1977), pp. 3-37 [with footnotes deleted]. Evelyn Richards, "Proposed FBI Crime Computer System Raises Questions on Accuracy, Privacy . . .", The Washington Post, February 13, 1989. [Posted on RISKS-FORUM Digest, Vol. 8, No. 27 (February 16, 1989).] RISKS contributions by Martin Minow from Volume 8, Issue 30 (February 24, 1989), and by Les Earnest, John McCarthy, and Jerry Hollombe [3 separate contributions] from Volume 8, Issue 31 (February 27, 1989). James B. Rule et. al, "Preserving Individual Autonomy in an Information-Oriented Society". In Lance J. Hoffman et. al. Computer Privacy in the Next Decade, New York: Academic Press (1980), pp. 65-87. John Shattuck, "Computer Matching is a Serious Threat to Individual Rights", CACM, Vol. 27, No. 6 (June, 1984), pp. 538-541. VIII. Nov 14-16: SECURITY AND RELIABILITY IN CRITICAL TASK PERFORMANCE -- Week #8 A. Assignment: Nov 14: Written assignment #3 due. B. Readings: Computerization and Controversy -- Chapter D2 Introduction to SECURITY AND RELIABILITY IN CRITICAL TASK PERFORMANCE -- Charles Dunlop and Rob Kling Alan Borning, "Computer System Reliability and Nuclear War". CACM, Vol 30, No. 2 (February, 1987), pp. 112-131. Peter J. Denning, "Computer Viruses". American Scientist, Vol. 76 (May-June, 1988), pp. 236-238. Jonathan Jacky, "Safety-Critical Computing: Hazards, Practices, Standards and Regulation". David Lorge Parnas, "Software Aspects of Strategic Defense Systems". Originally published in American Scientist, Vol. 73, No. 5, pp. 432-440. Reprinted in CACM, Vol. 28, No. 12 (December, 1985), pp. 1326-1335. Brian Cantwell Smith, "The Limits of Correctness". Issued as Report No. CSLI-85-35 by the Center for the Study of Language and Information (Stanford University), and marked Copyright 1985 by Brian Cantwell Smith. Also printed in the ACM SIG journal Computers and Society, combined Vol. 14, No. 4 and Vol. 15, Nos. 1, 2, 3 (Winter / Spring / Summer / Fall, 1985), pp. 18-26. RISKS-FORUM DIGEST excerpts Clifford Stoll, "Stalking the Wily Hacker". CACM, Vol. 31, No. 5 (May, 1988), pp. 484-497. "Computers and War: If Knowledge is Power, Where is Responsibility?" Jack Buesmanns and Karen Wieckert. CACM. IX. Nov 21-23: SOCIAL DIMENSIONS OF DESIGN -- Week #9. A. Assignment: Nov 21: Written assignment #4 described. B. Film: "Computers in Context" (or Oct 17?). (distributed by California Newsreel) C. Readings: Computerization and Controversy -- Chapter E1 Readings to be selected for packet #2. X. Dec 5-7: ETHICAL PERSPECTIVES AND PROFESSIONAL RESPONSIBILITIES -- Week #10. A. Assignment: Dec 5: Written assignment #4 due. B. Readings: Computerization and Controversy -- Chapter E2 Introduction to ETHICAL PERSPECTIVES AND PROFESSIONAL RESPONSIBILITIES -- Charles Dunlop and Rob Kling "ACM Code of Professional Conduct". Reprinted in Deborah G. Johnson and John W. Snapper (eds.), Ethical Issues in the Use of Computers. Belmont, California: Wadsworth Publishing Company (1985), pp. 31-34. Carl Barus, "Military Influence on the Electrical Engineering Curriculum Since World War II". IEEE Technology and Society Magazine, Vol. 6, No. 2 (June, 1987), pp. 3-9. Rob Kling, "Computer Abuse and Computer Crime as Organizational Activities". Computer / Law Journal, Vol. II, No. 2 (Spring, 1980), pp. ??-??. Reprinted in Computers and Society, 12 (1982), pp. 12-24. Terry Winograd, "Some Thoughts on Military Funding". The CPSR Newsletter, Vol. 2, No. 2 (Spring, 1984), pp. 1-3. Joseph Weizenbaum, Computer Power and Human Reason, Chapter 10. San Francisco: W. H. Freeman and Company (1976), pp. 258-280 + Notes to Chapter 10, pp. 286-287. ====================================