Communication Studies 454Communication and TechnologySummer 2001: June 4 - July 13
Course Introduction:Over the past twenty to thirty years, there has been an explosion in research on the "information age" from a variety of scholarly perspectives. This course is designed to prepare students to understand and participate in this scholarly process of understanding the relationships between communication and technology.Lessig insists that cyberspace (like any social world) is “built, not found.” Likewise, Steven Johnson asserts that cyberspace is “symbolic from the bottom up.” As communication scholars we understand the social construction of reality - that our institutions, norms and practices spring from and contribute to the social system we live in. We know that the decisions we make are formed through the lens of ideology - what we believe to be true, what we take for granted, and what we envision for our future. These will be our premises as we examine the impact of new technologies on human communication. Marshall McLuhan's suggestion that culture and technology are inextricably intertwined has significant implications for the current fascination with the "information age." Politicians, corporate media spokespersons, and scholars alike have joined in the chorus pronouncing the information age the final revolution in human social, political, and economic institutions. As we begin the twenty-first century, we are bombarded with the discourse of "cyberspace," "virtual reality," the "information superhighway," "electronic communities," etc., but the media offer little in the way of a frame of reference from which to evaluate the various claims being made about these developments in communication technology. In spite of all the "hype," or perhaps because of it, a field of truly critical scholarly perspectives on technological change has emerged in communication studies research. This course will introduce students to this scholarship, attempting to make sense of the technological revolution from a critical perspective that is both historically informed and technologically astute. We will engage some of the following questions, among others:
1. TheoryThe theoretical component of this course will involve a set of reading and discussion assignments and lectures. Reading assignments will expose students to a variety of theoretical approaches to the issues associated with technology and communication. This course starts with the assumption that communication is a social phenomenon. Thus, special emphasis will be devoted to the social and cultural implications of technology. In lectures and chat sessions I will attempt to situate the readings historically and isolate key issues that arise for discussion. Chat and newsgroup discussions will explore these issues and questions in greater depth. Student participation in these discussions is a significant part of your overall grade.
2. PracticeThis course is all online. We will construct a virtual classroom in cyberspace and your success depends on your ability to meet and effectively participate online. It is assumed that students are familiar with and have access to the Internet. Very little class time will be spent on basic internet training, so if you come to class without at least a passing familiarity with the internet, please be prepared to become familiar with the technology on your own time. The skills you need (basic electronic mail, news, chat, and world wide web access) are easy to learn quickly, and the computers and software to access these services are available to students on campus.The university offers students free accounts on the CSUN UNIX shell, which you will be able to use for email and for access to the internet. You have paid for these resources already in your tuition, so take advantage of what is offered. This service is most reliable when you work on campus from one of CSUN's computer labs. Please be aware that these free CSUN accounts are not always reliable when dialing up from home. I recommend that you have two means of access to the internet - your campus account and a commercial Internet Service Provider (ISP). Thus, if one server is busy you can get to class using the other. Please Note: It is the student's responsibility to master the mysteries of email, newsgroups and posting to the web before assignments are due; the assignment must be successfully posted to receive credit. Therefore, students are strongly encouraged to consult the tips for posting online assignments and the internet style guide before assignments are due. For best results, please compose your essay offline and save it to disk before attempting to post it online. Also, use the "for practice only" section of the newsgroup to test before posting the assignment.
We will be using online quizzes, a newsgroup and chat rooms on our WebCT site, electronic mail, and a series of pages on the World Wide Web. Some of the reading assignments will come from the links on the course schedule as well.
3. ScholarshipThe final component of the course, scholarship, will be an ongoing aspect of both of the above components. This process will begin with your Topic Report and culminate in a your Final Research Project. See the assignments page for specifics on these and other assignments. Your research should address some topic of significance to communication in the information age, and ideally the topic will fit within the student's own areas of scholarly interest. I have posted some suggestions for topics; these are not exhaustive but meant to get you thinking.
Required Texts and Resources:Steven Johnson, Interface Culture: How New Technology Transforms the Way we Create and Communicate. NY: Basic Books, 1997.Lawrence Lessig, Code and Other Laws of Cyberspace. NY: Basic Books, 1999. Additional required and recommended readings are available as links in the course schedule.
Attendance and ParticipationAttendance and informed participation is required for all scheduled chat sessions listed on the course syllabus. The student alone is responsible for attending classes and finding out what was missed when s/he is unable to attend. I will not respond to emails or other messages whose content is some variant of "I can't make it to class today; are we doing anything important?" - or - "Will you tell me what I missed?" You should make your own decisions about your own life priorities, but do not expect the course to wait for you.Additionally, it is up to you to come to class prepared to participate as a citizen -- to listen attentively to others, to engage critically and creatively the perspectives of others, and to contribute meaningfully to discussions of the course materials. This means having all of the reading done when it is due, turning in assignments on time, and actively listening to and participating with your classmates and your instructor. Finally, I am aware that the technological means for connecting to the online world are slightly less stable than the Los Angeles freeways. There may be technological difficulties that prevent us from meeting in our virtual world. The professor will attempt to prepare contingency plans to cover most cyber-disasters, but students will not be penalized for the failure of computer systems beyond their control. That said, however, "I couldn't connect" is not a valid reason for missing online classes when all other students have connected. If you have frequent difficulties connecting to the Internet from home aside from CSUN computer facility outages, it is highly recommended that you plan to be at computers on campus for these meetings.
Academic HonestyCheating and plagiarism will not be tolerated. If you are caught cheating or plagiarizing in any form, you will receive a failing grade for the course and will be reported to the university for appropriate action. I take this very seriously, and will prosecute to the fullest extent allowed. If you are uncertain what constitutes cheating, please consult your current university catalog, student handbook, or therapist.Academic honesty is expected and required. Academic dishonesty defrauds all those who depend on the integrity of University courses and is a serious offense covered by Section 41301, Title 5 of the California Administrative Code. This section of the Code is published in the University Catalog, Schedule of Classes, and the Student Handbook.
Supplementary Texts and Resources: *I'm sure there are more current resources available. The graduate students in the class will inform us of them as they find them.Harley Hahn and Rick Stout, The Internet Complete Reference (Berkeley, California: Osborne, 1994).This is a useful reference manual for UNIX-shell based connection to the Internet (such as CSUN's "huey" systems). There are many other such manuals that may be useful to students new to the Internet, although this one is highly recommended by the instructor (it is pretty dated though). It costs about $30-40 and can be found in most stores that sell computer books. It is for students starting this course without a knowledge of the basic Internet protocols (in other words, if words like FTP, HTTP, HTML, telnet, gopher, etc. are totally incomprehensible to you, you may wish to purchase this book).Michael F. Hordeski, The Illustrated Dictionary of MicroComputers (Blue Ridge Summit, PA: TAB Books, 1990). A comprehensive guide to terms and phrases you may encounter while learning to use the Internet. This one is a bit dated; I suggest you browse a bookstore with computer shelves for a similar reference that is more recent. For students new to the frequent use of computers, such a reference will be a useful guide to computer jargon, which is often mystifying and complex. Again, this information is also freely available on the Internet.Eric Raymond, ed., The New Hacker's Dictionary(Cambridge: MIT, 1991). Similar to above but much more readable and useful for the Internet. This is a printed copy of the "jargon file" that is available all over the internet and can be searched via the WWW for a word or phrase. |
Reference
webopedia
Tech News wired
Resources tec soc
Activism Journals Media who owns
what
CSUN |