Course
Issues and Objectives:
Contemporary American society features a wide range of data collection technologies that:
1) generate an unprecedented capacity to track and monitor people;
2) facilitate the aggregation, storage, and analysis of massive amounts of information about people;
3) enable wide-ranging forms of access to, communication of, and publication of this information;
4) be a primary factor in the management of everday life via relationships among power and control.
Governments, the organizations in which we work, study, and play, the businesses that provide us with products and services, and social networks of diverse origin and purpose collect, store, share/disseminate an ever-increasing amount of information about people and their activities. The collection of, access to, and management of this data plays a important role in the coordination of people in modern life. In some cases, the circulation of the information advantages people in obvious and purposive ways; in other instances the data-flow works against citizens’ best interests, often quite behind the scene. The future of life in America (not to mention within the global context) is to a large degree tied directly to data management practices.
To meet the course objectives students should be able to comprehend, identify, apply, and critically evaluate the contours of these and other related questions posed in the textbooks and activated in supplemental readings and class discussions:
-What are the key technologies at issue (e.g. web-based services, interactive tv, databases, cookies/trackers, biometrics, webcams, digital dossiers/drones/stingrays)?
-What key factors are responsible for driving the development of these technologies?
-What purposes are these technologies serving; whose purposes?
-What are some of the current and projected social, political, and moral consequences?
-How do we evaluate those consequences?
-What are the legal configurations surrounding these practices?
-How do privacy rights conflict with other important values, e.g. speech, efficiency, security, and accountability?
-How should we resolve these conflicts; what tradeoffs should we make?
-What steps should we, as individuals, as participants in data-driven industries, and we, in society, take to protect privacy (through technology, defensive action and policy)?
Requirements and Expectations:
-This Class meets in real time via ZOOM.
-You are expected to attend via audio and video.
-Quizzes take place at the START of class and may not be made up.
-Online office hours, TT 10:30-11:30 am and by appointment.
-I will notify you of changes to the syllabus via Sakai announcements and/or electronic mail.
-This course requires a minimum of 6 hours of school work, per week, Monday-Friday with additional time for papers on the weekends.
-This section DOES NOT meet the WI tag requirement so has not been submitted as WI. Therefore, it does not qualify as a WI course.
Texts:
Edward Lee Lamoureux, Privacy, Surveillance, and the New Media You. Peter Lang Publishers, 2016. Available in print and/or electronic versions.
At Lang Publishers
At Amazon
Articles & .pdf files on Sakai:
Daniel J. Solove. The Digital Person: Technology and Privacy in the Information Age. NYUP, 2004. [.pdf]
_____ The Future of Reputation: Gossip, Rumor, and Privacy on the Internet, Yale University Press, 2007. [.pdf]
_____"The Myth of the Privacy Paradox" [.pdf]
Soshnna Zuboff. from Surveillance Capitalism: Ch. 3, I-III [.doc], Ch. 3, IV-VI [.doc], Ch. 5, I-III, Chapter 16 [.pdf]
NYT_privacy_project.pdf (April-Dec. 2019 article titles w/URLs)
CCPA Fact Sheet.pdf
ccpa.pdf
GDPR_summary_chart.pdf
gdpr_Summary_dataiq
gdpr.pdf
You are also encouraged to forward articles/materials for inclusion in class discussions. I will post notifications to current articles. You are encouraged to engage with as much of the material as you wish. The more you read, the more you will learn and the more able you will be to participate in class discussion.
Grading:
300 ...................15 Quizzes (over daily readings and lectures) [15 x 20 each]
700 ....................4 papers [4 x 175 each]
A: 88.5%-100%; B:88.4-78.5; C: 78.4-68.5; D: 68.4-58.5; F:<58.5
Position Papers:
Four papers with due dates indicated on the syllabus. Late papers are NOT accepted. Although the papers are short and are (largely) about you, treat them seriously. Turn in researched/supported, polished, finished papers, not rough drafts or free-association think-pieces. Apply material from the course to each paper.
Each paper should be 5-7 pages, not counting reference lists; 1/2 inch margins, double spaced, 12 point font, no extra line spaces between paragraphs.
The purpose of the papers is for you to investigate/research/report how the assigned information practice/process interacts in your life. You are to learn all that you can about how it works, why it is used (etc.), how it connects to the conceptual literature, and it’s implications for privacy in your life.
You are not asked to write about privacy in general or privacy for "them" or about how things relating to privacy should be. The assignments are for you to examine the various ways you contact learn that privacy contacts your experience.
All papers MUST feature sections and section headings (that are, generally, content based rather than place holders: section headings should indicate the subject and thrust of the section). All sources should be carefully documented, and included in each assignment file, using the modified MLA style. Submit via Sakai/Assignments/Turnitin.
Microsoft Word documents only. I WILL NOT ACCEPT google docs or pages documents. I do not use google drive or anything linked to it. I don't accept papers via e-mail. Sakai assignments only.
Don’t forget that our library features kind and knowledgable librarians who are expert at suggesting effective and efficient research strategies for students working on papers. Bradley provides these professionals as a resource for BU students. You can reach them by phone and should take advantage of their expertise. I guarantee that they can do a better search than you can. Therefore, they can help you do better searching than you would without their help.
Also remember that, in many instances, resources published in print are superior to materials published only online. Research materials found using our academic databases are far superior to resources found using a basic Google search. The library homepage features a portal to Google Scholar that also provides access to scholarly literature.
You may use our textbook and readings amoung the support materials for your paper, but I do not envision these assignments as opportunities for you to merely recycle materials that we’ve read. Only paper 3 is a research paper. None are "reading reports/summaries." The papers are SELF-analysis that applies the material presented in the course. I expect the writing to be informed by the readings and class activities, but the papers are about how those insights work in YOUR life. Do not bother writing papers about how THEY (someone else) should act or what THEY could do. These are about YOU.
Paper 1: Locate yourself on the field of play. Include sections about collection, storage, and analysis of data by (1) government and by (2) commercial enterprises. Identify the habits/practices that leave you open to surveillance and data collection. YOU MUST INDICATE A SPECIFIC YARDLINE USING THE AMERICAN FOOTBALL FIELD METAPHOR.
Paper 2: Social media and the future of your reputation ("oh I/you just HAVE to be on/use XYZ" vs "the internet never forgets").
Paper 3: Your privacy philosophy in a philosopher or two (this one requires you to find a philosopher or two with something to say about privacy. Check the philosophers with me, for approval, before writing.
Paper 4: Specific recommendations for improving your privacy architecture: Where, on the field (from lecture one and paper 1), do you want to play? What steps are you going to take to get there? [p.s. if you propose to move beyond the 50 yard line, you'd have to be off all social media, not use a smart phone, seldom (if ever) use G.P.S., and use (mostly) secure Tor-based browsers. Less than this, don't claim that you'd cross the 50 to the other side of the field). YOU MUST INDICATE A SPECIFIC YARDLINE USING THE AMERICAN FOOTBALL FIELD METAPHOR.
Special
considerations:
BU Coronavirus website information: <https://www.bradley.edu/sites/coronavirus/>
There
is a Sakai site for grades and for your papers, class resources and class email.
In general, electronic devices (other than your laptop) are not allowed in class. However, you may use electronic reading devices in class for electronic versions of the readings. You may NOT multi-task during class. If you do, I will ask you to leave the ZOOM meeting/class day. Turn cellular devices to vibrate or silent.
All students
are responsible to the same syllabus schedule, regardless of outside or
BU-sponsored activities.
Student Access Services:
Any student who feels s/he may need an accommodation based on the impact of a disability should contact me privately to discuss your specific needs. Students requesting accommodations must register with Student Access Services located at 100 Heitz Hall and provide appropriate documentation to verify eligibility. You can reach the SAS at (309) 677-3654 or find more information at the Student Access Services website.
In accordance with University procedures, if you have a documented disability and require accommodations to obtain equal access in this course, please contact me privately to discuss your specific needs. You must be registered with Student Access Services located at 100 Heitz Hall. You can reach the SAS at (309) 677-3654 or find more information at the Student Access Services website.
Please address any special needs or special accommodations with me at the beginning of the semester. Those seeking accommodations based on documented disabilities should register with Student Access Services. The Office is located at 100 Heitz Hall and the phone number is (309) 677-3654. More information is also available at the Student Access Services website.<http://www.bradley.edu/offices/student/sas/>
Please do not call (home, 672-5878; cell 635-2605) after 8pm unless there is an emergency. Official office hours
are listed on the syllabus and will be done via teleconference (skype or ichat/facetime). I prefer video teleconferences to phone calls. My e-mail address
is <ell@bradley.edu>, also for facetime; skype: dredleelam. I do not use text messaging.
Policy
regarding e-mail communication about grades:
As a matter of the CFA’s policy to protect student privacy
and in accordance with the Family Educational Rights and Privacy Act,
questions and concerns regarding grades must be presented in face to face teleconferences or
in a written letter.
Policy regarding student inability due to an illness:
When missing assignments (needing to turn in an assignment late in this class) due to illness, it is
the student’s responsibility to provide documentation to verify the student's illness, unless the Office
of the Associate Provost for Student Affairs informs an instructor of
the basis for the accommodation. Students may sign an informational release form at Student Health; the document enables faculty to verify treatment at the Clinic. Letters from private physicians are also accepted.
Plagiarism merits an “F” on the activity and disciplinary action. DON’T copy the work of others and DO document sources properly. Turnitin is licensed by the university. Students are responsible for knowing the Bradley University policy available here: http://www.bradley.edu/academic/undergradcat/20102011/overview-archeating.dot. Information about Turnitin and plagiarism prevention is available on the Bradley Turnitin website --http://www.bradley.edu/irt/turnitin/
In accordance with University policies, the CFA does not condone the use of pirated software. Details of the University policies are articulated at <http://www.bradley.edu/irt/policies/5.04.html>; further, the Student Handbook, at item 6 <http://www.bradley.edu/campuslife/studenthandbook/policies/conduct/>, forbids the possession of stolen goods. Students in violation of these policies can expect enforcement via the university procedures regarding conduct.ks)