Spring 2017

STS 3561 - Computing Cultures

Bibliography of course readings

The course readings are available on-line or will be handed out in class. To access many of these readings through the links, you will need to be on the Cornell network, or logged in to the Cornell library through a proxy using your NetID. If you have trouble with the links, look up the eJournal through the Cornell library site and search for the specific issue.

Ananny, Mike. “The Curious Connection Between Apps for Gay Men and Sex Offenders.” The Atlantic, April 14, 2011.

Bowker, Geoffrey C., and Susan Leigh Star. “The Case of Race Classification and Reclassification under Apartheid.” In Sorting Things Out: Classification and Its Consequences, 195-225. Cambridge, MA: MIT Press, 1999.

Boyd, Danah, and Kate Crawford. “Critical Questions for Big Data.” Information, Communication & Society 15, no. 5 (June 2012): 662–79.

Boyd, Danah. “The Politics of ‘Real Names.’” Communications of the ACM 55, no. 8 (August 1, 2012): 29-31.

Brunton, Finn, and Helen Nissenbaum. “Vernacular Resistance to Data Collection and Analysis: A Political Theory of Obfuscation.” First Monday 16, no. 5 (April 26, 2011).

Crawford, Kate. Think Again: Big Data. Foreign Policy, May 10, 2013.

David, Shay, and Trevor Pinch. “Six Degrees of Reputation: The Use and Abuse of Online Review and Recommendation Systems.” First Monday 11, no. 3 (2006).

Duhigg, Charles. “How Companies Learn Your Secrets.” The New York Times, February 16, 2012, sec. Magazine.

Edgerton, David. The Shock of the Old: Technology and Global History since 1900. London: Profile Books, 2006, pp. 1-27 (Chapter 1: Significance).

Edwards, Paul N. “Y2K: Millennial Reflections on Computers as Infrastructure.” History and Technology 15, no. 1–2 (September 1, 1998): 7–29.

Family Educational Rights and Privacy Act (FERPA).” Guides, June 2, 2014. [EXCEPRTS].

Gabrys, Jennifer. Digital Rubbish: A Natural History of Electronics. Ann Arbor: University of Michigan Press, 2011, chapter 3, ‘Shipping and Receiving,’ pp. 74-100.

Gillespie, Tarleton. “The Relevance of Algorithms.” In Media Technologies, edited by Tarleton Gillespie, Pablo Boczkowski, and Kirsten Foot. Cambridge, MA: MIT Press, 2013.

Graham-Cumming, John, The Greatest Machine That Never Was. TEDxImperialCollege, 2012.

Grier, David Alan. “Human Computers: The First Pioneers of the Information Age.” Endeavour 25, no. 1 (March 1, 2001): 28–32.

Introna, Lucas D., and Helen Nissenbaum. “Shaping the Web: Why the Politics of Search Engines Matters.” The Information Society 16, no. 3 (2000): 169–85.

Irani, Lilly C., and M. Six Silberman. “Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical Turk.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 611–20. CHI ’13. New York, NY, USA: ACM, 2013.

Law, John. “Seeing Like a Survey.” Cultural Sociology 3, no. 2 (July 6, 2009): 239–56.

Lunenfeld, Peter. The Secret War Between Downloading and Uploading: Tales of the Computer as Culture Machine. Cambridge, MA: The MIT Press, 2011, pp. 142-178 (Chapter: Generations).

Marwick, Alice E., and Danah Boyd. “Networked Privacy: How Teenagers Negotiate Context in Social Media.” New Media & Society 16, no. 7 (November 1, 2014): 1051–67

Nippert-Eng, Christena. “Privacy in the United States: Some Implications for Design.” International Journal of Design 1, no. 2 (2007): 1–10.

Nissenbaum, Helen. “A Contextual Approach to Privacy Online.” Daedalus 140, no. 4 (2011): 32–48.

Rosenberg, Daniel. “Data Before the Fact.” In Raw Data Is an Oxymoron, edited by Lisa Gitelman, 15–40. Cambridge, MA: MIT Press, 2013.

Scott, James C. Seeing like a State: How Certain Schemes to Improve the Human Condition Have Failed. New Haven, CT: Yale University Press, 1998, pp. 64-71 (Section on surnames).

Singh, Ranjit and Steven Jackson. “Seeing Like an Infrastructure.” Unpublished manuscript.

Star, Susan Leigh, and Martha Lampland. “Reckoning with Standards.” In Standards and Their Stories: How Quantifying, Classifying, and Formalizing Practices Shape Everyday Life, edited by Martha Lampland and Susan Leigh Star, 3–24. Ithaca: Cornell University Press, 2008.

Star, Susan Leigh, and Karen Ruhleder. “Steps toward an Ecology of Infrastructure: Design and Access for Large Information Spaces.” Edited by JoAnne Yates and John Van Maanen. Information Systems Research 7, no. 1 (1996): 111–34.

Star, Susan Leigh, and Anselm Strauss. “Layers of Silence, Arenas of Voice: The Ecology of Visible and Invisible Work.” Computer Supported Cooperative Work (CSCW) 8, no. 1–2 (1999): 9–30.

Starosielski, Nicole. “Warning: Do Not Dig’: Negotiating the Visibility of Critical Infrastructures.” Journal of Visual Culture 11, no. 1 (April 1, 2012): 38–57.

Sweeney, Latanya. “Discrimination in Online Ad Delivery.” Communications of the ACM 56, no. 5 (May 1, 2013): 44.

Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. Simon & Schuster Trade, 1995, pp. 102-124 (Chapter 4: Taking Things at Interface Value).

Woolgar, Steve. “Configuring the User: The Case of Usability Trials.” The Sociological Review 38, no. S1 (May 1, 1990): 58–99.

Woolgar, Steve. “Five Rules of Virtuality.” In Virtual Society? Technology, Cyberbole, Reality, edited by Steve Woolgar, 1–22. Oxford: Oxford University Press, 2002.

Wyatt, Sally. “Non-Users Also Matter: The Construction of Users and Non-Users of the Internet.” In: How Users Matter: The Co-Construction of Users and Technology, edited by Nelly Oudshoorn and Trevor Pinch, 67–79. Cambridge and London: MIT Press, 2003.