CSCI 102T

The Socio-Techno Web

Home | Calendar | Labs | CS@Williams

Calendar

The table below lists the topics we will discuss and the readings associated with each topic. Readings should be completed before their associated tutorial meeting.

The main writer is responsible for writing a 3-4 page (900-1200 words) paper responding to the readings. As the main writer, you should incorporate external articles from other sources (i.e., popular press) to support and strengthen your views and arguments. The paper must be posted to the website that you will develop by 9:00am the day before our tutorial meeting. In other words, if your tutorial meeting is at noon on Wednesday, the paper must be posted by 9:00am on Tuesday.

The respondent is responsible for writing a 1-2 page (no more than 500 words) critique of the main writer's paper. The critique should briefly summarize the main argument of the paper, and raise questions about the main writer's stance. As the respondent, you should play devil's advocate, and write a response that defends an opposing view. Like the main writer, you should incorporate external articles from other sources (i.e., popular press) to support and strengthen your views and arguments. You should post your response to your website before your scheduled tutorial meeting.

Slides or videos (when used) will be posted after each meeting. Click on the topic to access the slides (on campus only). Info about the proxy server can be found here.

Any future topics or assigned readings are subject to change. If you plan to work ahead more than a week or two, please check with your instructor first.

Book references:

Date Topic Readings
[0] Sept 10 @ 8:30pm Course Overview
[1] Sept 14-18 Digital Explosion
[2] Sept 21-25 Social Networks and Social Media
  • HCE Ch 1
  • NYT: Tale of a Lost Cellphone (2006)
  • Assignment: Online social networks and social media have changed the way information is shared. These readings describe how an online social network (MySpace) and other forms of social media were used to change the outcome of a seemingly "trivial" crime. The story "illustrates the kinds of changes--some good, some bad, most too complex to label--that are affecting the ways groups assemble and cooperate" (HCE pg 14). React to this story. Were you surprised by the outcome? Should Evan have been able to "reset the priorities" (HCE pg 14) of the NYPD? The author of HCE claims that the story is "unrepeatable" (HCE pg 11). Do you agree? Do you think the same outcome would have occurred today (9 years later)?
  • Extra material (recommended, not required):
[3] Sept 28-Oct 2
Privacy and Information Access
[4] Oct 5-9 Electronic File Formats
[5] Oct 12-16 No meetings this week
  • Readings days and Mtn Day!
[6] Oct 19-23 Search Engines
[7] Oct 26-30 Governments and Google
[8] Nov 2-6 Network Graphs
  • NCM Ch 2
  • Assignment: Problem Set. Please complete the problems at the end of Chapter 2. Start early! They require some thought. Be aware that problem 3 is very tricky. Think about it and write down your thoughts, and we will work on it together next week. Note that everyone must complete the problem set. You may discuss the problems with your classmates, but you must write up your own, individual solutions. You should bring your solutions with you to our meeting next week. We will discuss the solutions, and then I will collect your work. Make sure you explain your solutions. Also, if you work with anyone else, make sure you give them credit!
  • Extra material (recommended, not required):
[9] Nov 9-13 Cryptography
[10] Nov 16-20 Digital Copyright Wars
[11] Nov 23-27 Thanksgiving
  • No meetings this week!
  • Midterm Due before break (or Wednesday, Nov 25th at 5pm).
[12] Nov 30-Dec 4 Peer-to-Peer Technologies
  • P2P Ch 8
  • The reading is a bit technical this week--do not get bogged down in the low level details. Also note that the reading was published in 2001. Technology has changed since then, but this was the height of P2P innovation.
  • Assignment: Should software companies that develop P2P technologies, like Gnutella, be held liable for the actions of their users? Gnutella (and software that implements the same protocol, such as LimeWire) is really nothing more than a system for sharing files. It could be used to share personal files legally, such as recipes or family photos. The controversy is somewhat analogous to the gun control controversy: proponents of gun control believe guns should be banned just because some people use them to do bad things. Should the software developers be held accountable for the actions of their users? Why or why not? What are the key differences between these technologies and legal non-P2P alternatives (like Spotify and Pandora)?
  • Extra reading (highly recommended, not required):
[13] Dec 7-11 Anonymity in Social Media
[-] Dec 10 @ 12:30pm Group Lunch
  • Lunch at Sushi Thai Garden!
[-] Dec 18th @ 5pm Final Project or Paper Due