Date |
Topic |
Readings |
[0] Sept 10 @ 8:30pm |
Course Overview |
|
[1] Sept 14-18 |
Digital Explosion |
- BITS Ch 1
- TBL Ch 1-2
- Assignment: Choose a quote from the BITS reading that
focuses on how the "digital explosion" has impacted
society. Write a response to this quote. You may defend
or refute the author's position.
- Extra reading (highly recommended, not required):
|
[2] Sept 21-25 |
Social Networks and Social Media |
- HCE Ch 1
- NYT: Tale of a Lost Cellphone (2006)
- Assignment: Online social networks and social media
have changed the way information is shared. These
readings describe how an online social network (MySpace)
and other forms of social media were used to change the
outcome of a seemingly "trivial" crime. The story
"illustrates the kinds of changes--some good, some bad,
most too complex to label--that are affecting the ways
groups assemble and cooperate" (HCE pg 14). React to
this story. Were you surprised by the outcome? Should
Evan have been able to "reset the priorities" (HCE pg
14) of the NYPD? The author of HCE claims that the story
is "unrepeatable" (HCE pg 11). Do you agree? Do you
think the same outcome would have occurred today (9
years later)?
- Extra material (recommended, not required):
|
[3] Sept 28-Oct 2
|
Privacy and Information Access
|
- BITS Ch 2
- Police Use of GPS is Ruled Unconstitional (2012) [PDF]
- Assignment: The authors describe many (disturbing?)
examples of how advancements in technology have improved
surveillance techniques and allowed more information
about us to be shared and viewed by both Big Brother and
Little Brother. They also claim that the
technology itself isn't to blame, but rather the accessibility
of the information. "Public" information like
voter records has always been public, but the fact that
you can now access that information from the privacy of
your own home (i.e., via the Web) has caused us to
sacrifice our privacy. One could argue, however,
that accessibility has not impacted privacy, since the
information was always available. We are simply
more aware of it now. Similarly, one could argue
that this increased accessibility and surveillance is a
good thing, since, to quote the authors, "being watched
also means we are being watched over" (BITS pg
71). Reflect on these controversial issues.
Be sure to take a stance on one of the aforementioned
topics and argue why your stance is correct/valid.
- Extra reading (highly recommended, not required):
|
[4] Oct 5-9 |
Electronic File Formats |
|
[5] Oct 12-16 |
No meetings this week |
- Readings days and Mtn Day!
|
[6] Oct 19-23 |
Search Engines |
- BITS Ch 4
- Assignment: On pg 159, the authors state: "The creation and redistribution of
power is an unexpected side effect of the search industry. Should any
controls be in place, and should anyone ... watch over the industry?" Respond
to this quote. As always, be sure to take a strong, decisive stance, and
provide support for your claims.
- Extra reading (highly recommended, not required):
|
[7] Oct 26-30 |
Governments and Google |
- Search, Ch 8
- TBL Ch 3-4
- Assignment: Choose one of the following two topics to write about this week.
1) Throughout the first half of this semester, most of you argued for
at least some amount of goverment-backed Internet censorship and regulation. The author of The Search
points out some potentially alarming ways in which the government can legally gain
access to Google's data in the interest of "public safety" as specified in the PATRIOT Act.
How do you feel about this? Is this a reasonable price to pay for safety? [Note: Many of you
have already discussed this topic during previous meetings. If you don't feel like
you have anything else to say, try the next topic.]
2) Google's relationship with
China has been extremely volatile. After deciding to at least partially comply
with the Chinese goverment's rules regarding Internet censorship in 2005, they later
left China in 2010 largely due to ethical concerns over censorship and a massive
cyber attack. Five years later in 2015, Google recently announced a (partial)
return to China with the planned opening of a new Android
app store for the Chinese market. Discuss this complex relationship. Did Google make the
right choices (morally and/or economically)?
- Extra reading (highly recommended, not required):
|
[8] Nov 2-6 |
Network Graphs |
- NCM Ch 2
- Assignment: Problem Set. Please complete the problems at the end of Chapter 2. Start early! They require some thought. Be aware that problem 3
is very tricky. Think about it and write down your thoughts, and we will work on it together next week.
Note that everyone must complete the problem set. You may discuss the problems with your classmates,
but you must write up your own, individual solutions. You should bring your solutions with you to our
meeting next week. We will discuss the solutions, and then I will collect your work. Make sure you explain
your solutions. Also, if you work with anyone else, make sure you give them credit!
- Extra material (recommended, not required):
|
[9] Nov 9-13 |
Cryptography |
- BITS Ch 5
- TBL 11
- Assignment: On page 193 of BITS the authors raise an interesting question: "As encryption becomes as ordinary a tool for
personal messages as it already is for commercial transactions, will the benefits to personal privacy, free expression, and human
liberty outweigh the costs to law enforcement and national intelligence, whose capacity to eavesdrop and wiretap will be
at an end?" Should encrypted email become the default option? Remember that encrypted email requires you and anyone you communicate
with to use special software that is capable of decrypting encrypted messages. As always, be sure to take a strong, decisive stance, and
provide support for your claims.
- Crypto slides
- Extra reading (highly recommended, not required):
|
[10] Nov 16-20 |
Digital Copyright Wars |
- Midterms available in my office on Monday, Nov 16.
- Final project details. Email me your proposals by
Nov 20th!
- BITS Ch 6
- To allow more time for midterm preparation, this week everyone
will submit a short (1-2 pages) response to the reading.
- Assignment: This week's reading discusses many problems related to
digital copyright enforcement. Choose a specific controversial issue or quote
from the BITS reading and respond or react to it.
- Extra reading (highly recommended, not required):
|
[11] Nov 23-27 |
Thanksgiving |
- No meetings this week!
- Midterm Due before break (or Wednesday, Nov 25th at 5pm).
|
[12] Nov 30-Dec 4 |
Peer-to-Peer Technologies |
- P2P Ch 8
- The reading is a bit technical this week--do
not get bogged down in the low level details. Also note that the reading was published in
2001. Technology has changed since then, but this was the height of P2P innovation.
- Assignment: Should software companies that develop P2P technologies, like Gnutella, be held
liable for the actions of their users? Gnutella (and software that implements the same protocol,
such as LimeWire) is really nothing more than a system for sharing files. It could be used to
share personal files legally, such as recipes or family photos. The controversy is somewhat analogous to the gun
control controversy: proponents of gun control believe guns should be banned just because some people
use them to do bad things. Should the software developers be held accountable for the actions of their users?
Why or why not? What are the key differences between these technologies and legal non-P2P alternatives (like
Spotify and Pandora)?
- Extra reading (highly recommended, not required):
|
[13] Dec 7-11 |
Anonymity in Social Media |
- Skim BITS Ch 7
- Read BITS Conclusion
- Don't Ban Yik Yak (2015)
- Why Your College Campus Should Ban Yik Yak (2014)
- This week everyone will submit a short (1-2 pages) response to the reading.
- Assignment: There is speculation that Yik Yak will be banned on Purple Air in the near future. There is much controversy
surrounding the app. Some feel that it is used in dangerous ways to anonymously target/threaten people. Others think banning it would be
a violation of free speech. Do you think Yik Yak should be banned on college campuses? Summarize the issue, and as always, take a
stance. You can all bring your papers with you to our meetings this week. You do not need to send them to me in advance.
- Also, if you have any remaining thoughts about the course that you'd like to share, please feel free to do so!
- Extra reading (highly recommended, not required):
|
[-] Dec 10 @ 12:30pm |
Group Lunch |
- Lunch at Sushi Thai Garden!
|
[-] Dec 18th @ 5pm |
Final Project or Paper Due |
|