Hist 8800: Topics in Digital History
Computer History and Ethics
fall 2023


Prof. Pamela Mack, pammack@clemson.edu, Hardin 006, office hours MWF 8-10, Thurs. 3-4, cell phone 864-710-3203 (texts preferred)
Class meets Thurs. 4 to 6:30 in Hardin 024

Course Description: This course explores the history of computing and recent ethical issues raised by information technology, with particular attention to ethics of data for digital historians.

suggestions for being a gentle academic
Student Learning Outcomes: By the end of the course students should be able to:

Course Requirements:

Attendance and Class Participation: Come to class prepared to discuss the readings. Participation points are determined by your contribution to the discussion. Doing careful readings of the texts, raising questions about what you’ve read, and contributing thoughtfully to class discussion will ensure success.  Please email me if you have to miss class; in advance if possible; missing more than one class may affect your grade. I will not regularly record classes on Zoom, but I can if someone is sick, see University health advice and services. If I don't arrive within 15 minutes of the start time of the class please check my office before you leave.

Reading Reflections will be done before class each week in Canvas in Thomas format. Instructions for Thomas format are in a file in Canvas.

Academic Integrity: As members of the Clemson University community, we have inherited Thomas Green Clemson's vision of this institution as a "high seminary of learning."  Fundamental to this vision is a mutual commitment to truthfulness, honor, and responsibility, without which we cannot earn the trust and respect of others.  Furthermore, we recognize that academic dishonesty detracts from the value of a Clemson degree.  Therefore, we shall not tolerate lying, cheating, or stealing in any form.

This includes representing someone else's work as your own or handing in the same paper to two different courses without permission of the instructors.  Be careful to avoid plagiarism--text you take from a web site, from a book, or written by a large language model (such as Chat GPT) must be either quoted with the source given or restated almost entirely in your own words, with the source given.  Note that the catalog defines as one form of academic dishonesty: "Plagiarism, which includes the intentional or unintentional copying of language, structure, or ideas of another and attributing the work to one’s own efforts."  Note the word unintentional--if you forget to put quote marks or a reference you can be found guilty of academic dishonesty even if it was not your intention to cheat.

It is cheating to cut and paste or otherwise copy portions of a argument paper, exam, or discussion board posting from a book, web site, or from a large language model, even if you change a few words, unless you quote and give the source.  It is poor writing for more than about 20% of a paper to consist of quotes. In most cases when you use specific material from any source you should paraphrase: cite the source and put the ideas into you own words (generally no more than 5 consecutive words should match the source but if the words are mostly the same it could still be plagiarism even if there aren't 5 consecutive words).

Laptops and Cell Phones:  Use of laptops, tablets and cell phones during class for purposes not related to this course is disrespectful to the instructor and distracting to other students.  You may use your devices to take notes during class or to look up further information on a topic being discussed.  Students using their devices during class may be called on to share what they are learning with the rest of the class.

Required reading is below. All books are available unlimited online from the library. In addition to the required reading for all, each week one student will make a presentation on a second book from the expanded list, putting it in conversation with the book assigned to all. Please sign up for a week of your choice on that list.

Weekly Schedule (expanded list is here):

Aug. 24: Introduction. Read before class: Wulf Kansteiner, "Digital Doping for Historians: Can History, Memory, and Historical Theory be Rendered Artificially Intelligent?" History and Theory 61 (Dec. 2022): 119-133, https://onlinelibrary.wiley.com/doi/full/10.1111/hith.12282 and Dave Karpf, "The Reverse-Scooby-Doo Theory of Tech Innovation," https://davekarpf.substack.com/p/the-reverse-scooby-doo-theory-of

Aug. 31: Setting the stage: Ruha Benjamin, Race After Technology
Sept. 7: Business machines: Campbell-Kelly et.al., Computer: A History of the Information Machine (3rd edition), Meredith Whittaker, "Origin Stories: Plantations, Computers, and Industrial Control," Logic(s) 19, https://logicmag.io/supa-dupa-skies/origin-stories-plantations-computers-and-industrial-control/
Sept. 14: Cold War: Paul N. Edwards, The Closed World: Computers and the politics of discourse in Cold War America. Cambridge: MIT Press, 1996
Sept. 21: Programming race and gender: Mar Hicks, Programmed Inequality: How Britain Discarded Women Technologists and Lost its Edge in Computing; Mar Hicks, "Hacking the Cis-tem," IEEE Annals of the History of Computing v. 41 (2019): 20-33.
Sept. 28: Personal computers: Laine Nooney, The Apple II Age: How the Computer Became Personal.
Oct. 5: The web: Change of book: Justin Smith-Ruiu, The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning ; David Weinberger, Everything is Miscellaneous (video), https://www.youtube.com/watch?v=43DZEy_J694. Thoughts for teaching the course again: A history of the internet would be useful here, but the Justin Smith book was an interestingly different philosophical approach.
Oct. 12: Crime and policing: Brian Jefferson, Digitize and Punish: Racial Criminalization in the Digital Age, Historiographical Essay due.
Oct. 19: Data ownership and Open Source: Christopher Tozzi and Jonathan Zittrain, For Fun and Profit: A History of the Free and Open Source Software Revolution; Practical Data Ethics, https://ethics.fast.ai/. If I were teaching the course again this topic would be Data Ownership and Ethics and the book would be: Lauren Klein, Data Feminism
Oct. 26: Archives: Linda Smith, Decolonizing Methodologies: Research and Indigenous Peoples;  J. T. Roane, Megan Femi-Cole, Preeti Nayak & Eve Tuck “The seeds of a different world are already alive in the everyday practices of ordinary Black and Indigenous people”: An interview with J.T. Roane, Curriculum Inquiry
Volume 52, 2022, https://doi.org/10.1080/03626784.2022.2052638
Nov. 2: Transparency and involving stakeholders: David Robinson, Voices in the Code.
Nov. 9: Large Language Models: Emily M. Bender,Timnit Gebru, Angelina McMillan-Major, Shmargaret Shmitchell, "On the Dangers of Stochiastic Parrots," https://dl.acm.org/doi/10.1145/3442188.3445922; Naomi Klein, "AI machines aren’t ‘hallucinating’ but their makers are" The Guardian, 8 May 2023,   https://www.theguardian.com/commentisfree/2023/may/08/ai-machines-hallucinating-naomi-kleinhttps://twitter.com/eripsa/status/1652377377891143681?s=43&t=t-13m4uWDO3ze-8Os3RWIQ, up to date articles to be decided later.
Nov. 16: Impact on history: Jason Steinhauer, History Disrupted
Nov. 30: Professional Ethics and Ethics Statements: Dangers and Opportunities of Technology call for proposals: https://www.neh.gov/program/dangers-and-opportunities-technology-perspectives-humanities; Brenda Leong, Evan Selinger, "Robot Eyes Wide Shut: Understanding Dishonest Anthropomorphism," Proceedings of the Association for Computing Machinery's Conference on Fairness, Accountability, and Transparency (2019): 299-308, 9 Feb 2021, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3762223
Dec. 7: Data Ethics Management Statement due, final meeting.




Creative Commons License
Topics in Digital History Syllabus by Pamela E. Mack is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License.