DRAFT / August 21, 2014

ANTH 395:

Work, Technology, and Society: An IT Perspective

Fall 2014

David W. Haines,

Robinson B322, 993-3600,

Office hours: Mondays through Thursday: 12:00 –12:30 p..m. (or by appointment)

Course overview

This course provides an introduction to the anthropology of work, technology, and society, with emphasis on information technology. The course covers both the conceptual issues of IT and also a range of specific IT-related skills, particularly a basic understanding of computer machinery, the conventional array of desktop office packages, the logic of automated processing, the basics of web design, and the development and use of databases. Course work will include lecture, discussion, ethnographic exercises on how people relate to technology, and practical skill-based work with computers and software programs.

In terms of practical skills, by the end of this course you should have a better general knowledge of the hardware and software aspects of computers and the pro’s and con’s of command- versus menu-driven approaches. The central skills, however, involve web sites (design, development, updating) and data-bases (especially the logic and operation of relational databases and structured query language). If we have some time, we will also take a general look at statistical analysis software.

You will also be required at various points during the course to consider a variety of ethical issues regarding the structure and use of information technology. These issues range from simple courtesy in electronic communication to potentially serious violations of personal privacy. In between lie such issues as proper crediting of other people’s work, the legalities of computer use, and the questions of fair competition in the computer industry.

This course meets the university’s general education requirement for information technology – including the ethics component.

Prerequisites

Anthropology 114 and 60 hours completed, or permission of instructor

Basic knowledge of computers and “office” software

Already activated student email and web accounts

Requirements

In addition to reading, for each week there will be either or both of:

  • a written paper (usually two-pages double-spaced or sometimes just a one-page outline); these must be handed in
  • a computer-based task; documentation must be handed in

More detail on the computer-based tasks will be available in class and on line.

It is absolutely essential that you remain up-to-date on all of these. You cannot successfully complete (i.e., pass) this courseunless you can complete all these requirements.

There may also be periodic quizzes on the readings – but no tests otherwise.

.

Grading

40 percent for miscellaneous writing assignments

40 percent for check-off of completed computer tasks

20 percent for class participation, reading readiness, quizzes if applicable

Materials

Most of the exercises in this class will be based on software in the Microsoft Office suite (including Access). Familiarity with Internet Explorer (or another web browser)and Dreamweaver will also be needed. This software should be available on university computers to which you will have access.

There are two required texts. Both are available in paper and in e-book versions. Buy or download these before leaving the U.S.

The Jungleby Upton Sinclair

Computer: A History of the Information Machine 3rd Edition by Martin Campbell-Kelly, William Aspray, Nathan Ensmenger, and Jeffrey R.Yost – 3rd edition is indeed required.

You may want to obtain at least a general manual for Microsoft Office and specific manuals for Access and Dreamweaver. Older, discounted versions of these manuals will probably be adequate as long as you are comfortable with the programs’ built-in help systems to update the information.

DRC Note

If you are a student with a disability and you need academic accommodations, you should see me and also contact the Disability Resource Center (DRC) at 993-2474. All academic accommodations must be arranged through the DRC.

Schedule

1: Week of Sep 1Work, technology, and society

Do:One-page outline of the greatest areas of potential for recent information technology and the greatest dangers

2: Week of Sep 8People and machines

Read:The Jungle: First third

Do:Twopages on observation of human/machine interaction

3: Week of Sep 15People and computers

Read:The Jungle: Second third

Do:Two pages on observation of human/computer interaction

4: Week of Sep 22Introduction to the computer (creation of a binary logic and procedure; development of a box and interface; nature and implications of operating systems)

Read:The Jungle: Remainder

Computer: Chapter 1

Task 1:Set up a back-up batch file

5: Week of Sep 29More on computer hardware and operating systems

Read:Computer: Chapters 2 & 3

Do:Twopages on what a computer is and what it is capable of (including potential, limitations, and dangers)

Task 2:Develop system for transferring files to your web site

6: Week of Oct 6Getting things done (how programs work and how programs can be used in production processes)

Read:Computer: Chapters 4 & 5

Do:One-page outline with two or three examples of useful social programs that could be automated

7: Week of Oct 13Time for management(rethinking what it means to get things

done)

Read:Computer: Chapters 6 & 7

8. Week of Oct 20Getting things done (designing an automated system)

Read:Computer: Chapters 8 & 9

Task 3:Develop a general design for automating a specific social program and outline the instructions that would have to be given to a computer

9:Week of Oct 27Database structure and management (relational databases, transaction processing, and analytical processing—especially SQL)

Read:Computer: Chapter 10

Read/review:Browse through a database manual or two. What can actually be done with databases and database programs?

Task 4:Design a database in Access (with multiple tables) to handle all the needed information for the test program and develop the first table

______

ANTH 395, Fall 2014– Page 1

10: Week of Nov 3Data (structure and volume)

Read:Computer: Chapter 11

Task 5:Expand that data base with at least two more tables.

11: Week of Nov 10Analysis (what do the data mean?)

Read:Computer: Chapter 12

Do:List of five specific questions that could be asked of this database and how the queries would be constructed

Discuss:Identify the specific ways in which this collection of data could infringe on people=s privacy. Is any of this information sensitive? Who could obtain it and use it for other than its official purpose?

12: Week of Nov 17Production (putting the data into action)

Task 6:Use the data as the basis for mass correspondence (through Word)

13: Week of Nov 24Summarizing and calculating data (spreadsheets and statistical packages)

Task 7:Create a portal for your web site

Do:Twopages assessing the test program overall, your particular version of it, and the lessons you think it provides about automated processing

14: Week of Dec 1Social implications of computer use and computer production

Discuss:Final discussion on ethical issues in information technology (see attached statement from the Technology-across-the-Curriculum project)

15: Week of Dec 8Final discussion

Do:Threepagesasyour summary analysis of work, technology, and society

______

ANTH 395, Fall 2014– Page 1

Guidelines for Ethical Behavior in the Use of Technology

adopted by Technology Across the Curriculum

Information technology provides powerful tools that can help users be more productive and more effective in many areas of work and social interaction. However, given the rapid rate of change in this arena, the standards of ethical behavior for using technology are not always clear. These guidelines express a set of expectations for technology use. They are intended to help the George Mason community understand what it means to use technology in a way that respects the rights of all users and follows accepted legal, security, and privacy practices in the use of technology. To behave ethically with respect to the use of technology means:

  1. To use university technology resources in a way consistent with the mission of the university, the university=s Honor Code, and the university=s Responsible Use of Computing policy.
  2. To respect the copyright and intellectual property rights of others by not misappropriating electronic goods or services, by not copying material without permission, and by properly citing any material that is the work of another.
  3. To respect the privacy of others by not using electronic tools to read others= files or access their date without permission, to monitor others covertly or to observe others= private behavior without permission, to harass others electronically, or to misrepresent oneself in electronic communication or to assume the electronic identity of another person.
  4. To conduct electronic communication in a professional manner, treating other people with respect, being truthful and accurate in communication, and taking responsibility for messages sent electronically.
  5. To use technology resources in a socially responsible manner including reporting any crimes involving computers or computer security vulnerabilities to the appropriate university authorities.
  6. To protect the integrity of the university=s technology resources by protecting passwords (keeping them confidential and not sharing them with others), not exploiting security vulnerabilities, and taking normal security precautions such as keeping antiviral software up to date and not downloading files which may damage university resources or tampering with settings in university-maintained technology resources.
  7. To abide by state, federal, and international laws related to the use of technology.

References

George Mason University=s Responsible Use of Computing:

ACM Code of Ethics:

IEEE Code of Ethics:

The Ten Commandments of Computer Ethics:

Codes of Conduct/Practice/Ethics from Around the World:

Anne Marchant, Anne Agee, Dee Ann Holisky

______

ANTH 395, Fall 2014– Page 1