Ed Tech I: Productivity Tools
Student Reports Signup
Section 10

Students will work in teams of two or three. Each team is responsible for reading one of the following and reporting on it to the class. Each team will prepare a 500-word summary of the article or chapter read and send it to all members of the class and the instructor by E-mail. Each team will be assigned a class meeting during which they will present a 5-minute oral report and lead a 5-minute class discussion of the reading.

  1. Anderson et al. 1994

  2. Ronald E. Anderson, Vicki Lundmark, Linda Harris, and Shon Magnan, "Equity in Computing," in Huff and Finholt, Social Issues in Computing: Putting Computing in Its Place, McGraw-Hill, 1994, pp. 352 - 385 (on reserve in the ERC).
     

     

    Team 2 - 

  3. Attewell 1987 and Grant et al. 1988

  4. Paul Attewell, "Big Brother and the Sweatshop: Computer Surveillance in the Automated Office," in Dunlop and Kling, Computerization and Controversy, Academic Press, 1991, pp. 236 - 256
     
    Team 3 -
  5. Oppenheimer, Todd, "The Computer Delusion," Atlantic Monthly, July, 1997,  pp. 45 - 62.

  6.  
     

    Team 4 -

  7. Borning 1987

  8. Alan Borning, "Computer System Reliability and Nuclear War," Communications of the ACM 30:2, 112-131, reprinted in Dunlop and Kling, 560-592; also reprinted in Computers in Battle, Will They Work?, Harcourt Brace Jovanovich, 1987, pp. 101 - 147. On reserve in the ERC.
     
     
    Team 5 - Wednesday,  Jan 28
  9. Burnham 1983 and Rule et al. 1983

  10. David Burnham, "Data Protection," Chapter 3 of The Rise of the Computer State, reprinted in Ermann, Williams and Gutierrez, Computers, Ethics, and Society, Oxford University Press, 1990, pp. 94 - 106.

    James B. Rule, Douglas McAdam, Linda Stearns, and David Uglow, "Documentary Identification and Mass Surveillance in the United States," in Huff and Finholt, pp. 445 - 461 (both in one packet on reserve in the ERC).
     

    Team 6 - Wednesday, Jan 28

  11. Bush 1945 and Greenberger 1964

  12. http://www2.theAtlantic.com/atlantic/atlweb/flashbks/computer/tech.htm.

    Read the overview, "The Technological Revolution", and the linked articles, "As We May Think" by Vannevar Bush and "The Computers of Tomorrow" by Martin Greenberger.
     
     

    Team 7 - Monday, Feb 2

  13. Carvin 1996

  14. http://edweb.gsn.org/

    "Trends in Education Reform," Andy Carvin.

    Be careful to follow all of the links. This is a true hyperbook, so you need to also be aware of the paths you are following. DO NOT TRY TO PRINT THIS AND READ IT OFF LINE!
     

    Team 8- Monday, Feb 2

  15. Cuban 1986

  16. Larry Cuban, "The Promise of the Computer," Chapter 4 of Teachers and Machines: The Classroom Use of Technology Since 1920, Teachers College, Columbia University, 1986, reprinted in Huff and Finholt, 445-461 (on reserve in the ERC).
     

    Team 9- Wed., Feb 4

  17. Jacky 1989

  18. Jonathan Jacky, "Safety-Critical Computing: Hazards, Practices, Standards, and Regulation," The Sciences, September/October 1989, reprinted in Dunlop and Kling, 612-646 (on reserve in the ERC).
     

    Team 10 - Wed., Feb 4

  19. Meltzer 1995, Richards 1989, and Van Gelder 1985

  20. Bonnie Meltzer, "Digital Photography--A Question of Ethics," Learning and Leading With Technology, 23(4) , pp. 18 - 21.

    Evelyn Richards, "Proposed FBI Crime Computer System Raises Questions on Accuracy, Privacy, The Washington Post, February 13, 1989, reprinted in Dunlop and Kling, pp. 436 - 438.

    Lidsy Van Gelder, "The Strange Case of the Electronic Lover," Ms. Magazine, October 1985, reprinted in Dunlop and Kling, 364-375 (all in one packet on reserve in the ERC).