Hist 8800: Topics in Digital
History
Computer History and Ethics
fall 2023
Prof. Pamela Mack, pammack@clemson.edu,
Hardin 006, office hours MWF 8-10, Thurs. 3-4, cell phone
864-710-3203 (texts preferred)
Class meets Thurs. 4 to 6:30 in Hardin 024
Course Description: This course explores the
history of computing and recent ethical issues raised by
information technology, with particular attention to ethics of
data for digital historians.
Student Learning Outcomes: By the end of the
course students should be able to:
assess important themes in the history of
computing
analyze the historiography of the history of
computing
appraise how digital tools have been used
for harm, including issues of race and gender
evaluate the appropriate role of
stakeholders
assess ethical issues in the handling of
data and information and write a sample ethics statement
for a grant proposal
Course Requirements:
attendance and class participation 10%
presentations 10%
reading reflections 20%
historiographical essay 30%
Data Ethics Management Statement 30%
Attendance and Class Participation: Come to class
prepared to discuss the readings. Participation points are
determined by your contribution to the discussion. Doing
careful readings of the texts, raising questions about what
you’ve read, and contributing thoughtfully to class
discussion will ensure success. Please
email me if you have to miss class; in advance if possible;
missing more than one class may affect your grade. I will
not regularly record classes on Zoom, but I can if someone
is sick, see University
health advice and services.
If I don't arrive within 15 minutes of the start time of the
class please check my office before you leave.
Reading Reflections will be done before class
each week in Canvas in Thomas format. Instructions for
Thomas format are in a file in Canvas.
Academic Integrity: As members
of the Clemson University community, we have inherited Thomas
Green Clemson's vision of this institution as a "high seminary
of learning." Fundamental to this vision is a mutual
commitment to truthfulness, honor, and responsibility, without
which we cannot earn the trust and respect of others.
Furthermore, we recognize that academic dishonesty detracts
from the value of a Clemson degree. Therefore, we shall
not tolerate lying, cheating, or stealing in any form.
This includes representing someone else's work as your
own or handing in the same paper to two different courses
without permission of the instructors. Be careful to
avoid plagiarism--text you take from a web site, from a
book, or written by a large language model (such as Chat
GPT) must be either quoted with the source given or restated
almost entirely in your own words, with the source
given. Note that the catalog defines as one form of
academic dishonesty: "Plagiarism, which includes the
intentional or unintentional copying of language, structure,
or ideas of another and attributing the work to one’s own
efforts." Note the word unintentional--if you forget
to put quote marks or a reference you can be found guilty of
academic dishonesty even if it was not your intention to
cheat.
It is cheating to cut and paste or otherwise copy
portions of a argument paper, exam, or discussion board
posting from a book, web site, or from a large language
model, even if you change a few words, unless you quote and
give the source. It is poor writing for more than
about 20% of a paper to consist of quotes. In most cases
when you use specific material from any source you should
paraphrase: cite the source and put the ideas into you own words
(generally no more than 5 consecutive words should match the
source but if the words are mostly the same it could still
be plagiarism even if there aren't 5 consecutive words).
Laptops and Cell Phones: Use of laptops,
tablets and cell phones during class for purposes not related
to this course is disrespectful to the instructor and
distracting to other students. You may use your devices
to take notes during class or to look up further information
on a topic being discussed. Students using their devices
during class may be called on to share what they are learning
with the rest of the class.
Required reading is below. All books are
available unlimited online from the library. In
addition to the required reading for all, each week one
student will make a presentation on a second book from the
expanded list, putting it in conversation with the
book assigned to all. Please sign up for a week of your
choice on that list.
Aug. 31: Setting the stage: Ruha Benjamin, Race
After TechnologySept. 7: Business machines: Campbell-Kelly et.al.,
Computer: A History of the Information Machine (3rd
edition), Meredith Whittaker, "Origin
Stories: Plantations, Computers, and Industrial Control," Logic(s)
19, https://logicmag.io/supa-dupa-skies/origin-stories-plantations-computers-and-industrial-control/. Sept. 14: Cold War: Paul N. Edwards, The Closed
World: Computers and the politics of discourse in Cold War
America. Cambridge: MIT Press, 1996 Sept. 21: Programming race and gender: Mar Hicks, Programmed
Inequality: How Britain Discarded Women Technologists and
Lost its Edge in Computing; Mar
Hicks, "Hacking the Cis-tem," IEEE Annals of the History
of Computing v. 41 (2019): 20-33. Sept. 28: Personal computers: Laine
Nooney, The Apple II Age: How the Computer
Became Personal. Oct. 5: The web:Change of book: Justin
Smith-Ruiu, The Internet Is Not
What You Think It Is: A History, a Philosophy, a Warning; David Weinberger,
Everything is Miscellaneous (video), https://www.youtube.com/watch?v=43DZEy_J694.
Thoughts for teaching the course again: A history of the
internet would be useful here, but the Justin Smith book was
an interestingly different philosophical approach. Oct. 12: Crime and policing: Brian Jefferson, Digitize
and Punish: Racial Criminalization in the Digital Age, Historiographical
Essay due. Oct. 19: Data ownership and Open Source: Christopher
Tozzi and Jonathan Zittrain, For Fun and
Profit: A History of the Free and Open Source Software
Revolution; Practical Data Ethics, https://ethics.fast.ai/.
If I were teaching the course again this topic would be Data
Ownership and Ethics and the book would be: Lauren
Klein, Data Feminism Oct. 26: Archives: Linda Smith, Decolonizing
Methodologies: Research and Indigenous Peoples; J. T. Roane, Megan Femi-Cole, Preeti Nayak
& Eve Tuck “The seeds of a different world are
already alive in the everyday practices of ordinary Black and
Indigenous people”: An interview with J.T. Roane, Curriculum
Inquiry
Volume 52, 2022, https://doi.org/10.1080/03626784.2022.2052638 Nov. 2: Transparency and involving stakeholders: David
Robinson, Voices in the Code. Nov. 9: Large Language Models: Emily M.
Bender,Timnit Gebru, Angelina McMillan-Major, Shmargaret
Shmitchell, "On the Dangers of Stochiastic
Parrots," https://dl.acm.org/doi/10.1145/3442188.3445922;
Naomi Klein, "AI machines aren’t
‘hallucinating’ but their makers are" The Guardian, 8 May
2023, https://www.theguardian.com/commentisfree/2023/may/08/ai-machines-hallucinating-naomi-klein;
https://twitter.com/eripsa/status/1652377377891143681?s=43&t=t-13m4uWDO3ze-8Os3RWIQ,
up to date articles to be decided later. Nov. 16: Impact on history: Jason Steinhauer, History
DisruptedNov. 30: Professional Ethics and Ethics Statements: Dangers
and Opportunities of Technology call for proposals:https://www.neh.gov/program/dangers-and-opportunities-technology-perspectives-humanities;
Brenda Leong, Evan Selinger, "Robot
Eyes Wide Shut: Understanding Dishonest Anthropomorphism," Proceedings
of the Association for Computing Machinery's Conference on
Fairness, Accountability, and Transparency (2019):
299-308, 9 Feb 2021, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3762223 Dec. 7: Data Ethics Management Statement due, final
meeting.