Dreamtime

A snippet from some winter break reading from Morton (2013) about what he calls phasing in his study of Hyperobjects:

Morton, T. (2013). Hyperobjects: Philosophy and ecology after the end of the world. University of Minnesota Press.


Graph Stories

This semester I had the opportunity to help out in a few sessions of Matt Kirschenbaum’s Digital Studies graduate seminar. Matt wanted to include some hands on exercises collecting data from the Twitter API, to serve as a counterpoint to some of the readings on networks such as Galloway and Thacker’s The Exploit. I don’t think the syllabus is online, but if it becomes available I’ll be sure to link it here.


Seminar Week 14

In the final week of of the first part of INST 888 we discussed Information Technology and Communication for Development or ICT4D. We were visited by Arunesh Mathur, who is a future PhD student in the iSchool. We also read three papers on the subject: Toyama (2010), Wyche, Schoenebeck, & Forte (2013), Toyama (2013). Arunesh had worked previously at Microsoft Research in Bangalore, India on the development of an offline version of Wikipedia where bandwidth was limited. Kentaro Toyama, the author of two of the papers, helped found Microsoft Research in Bangalore. In addition Leah Findlater (our professor) spent some time at the same center.

Toyama, K. (2010). Human–computer interaction and global development. Foundations and Trends in Human-Computer Interaction, 4(1), 1–79.

Toyama, K. (2013). Our equal future: Does technology hold the key to a flatter world? The Atlantic. Retrieved from http://www.theatlantic.com/technology/archive/2013/05/our-equal-future-does-technology-hold-the-key-to-a-flatter-world/276337/

Wyche, S. P., Schoenebeck, S. Y., & Forte, A. (2013). Facebook is a luxury: An exploratory study of social media use in rural kenya. In Proceedings of the 2013 conference on computer supported cooperative work (pp. 33–44). Association for Computing Machinery.


Seminar Week 13

This week we looked at accessible technology design with our professor, Leah Findlater. Leah has done a pretty amazing job of remaining as neutral as possible to the topic of conversation each week, which isn’t easy to do without sacrificing vigorous discussion. So it was great to hear her present about accessible technology, which is a research area she is directly involved in, and cares deeply about.


Seminar Week 12

This week’s seminar topic was the Digital Humanities and we were visted by Elisabeth Bonsignore, who is a PhD student in the iSchool where she is researching transmedia storytelling. The readings we had included Kim, Lee, Thomas, & Dombrowski (2009), Gurzick et al. (2011), and Bonsignore et al. (2012). This was a special week for me, because DH is the mental space where I spend most of my work day in MITH. I’m particularly interested in connections that can be made between the work of the iSchool and MITH.

Bonsignore, E., Hansen, D., Kraus, K., Ahn, J., Visconti, A., Fraistat, A., & Druin, A. (2012). Alternate reality games: Platforms for collaborative learning. In Proceedings of the 10th international conference of the learning sciences, icls 2012 (Vol. 1, pp. 251–258).

Gurzick, D., White, K. F., Lutters, W. G., Landry, B. M., Dombrowski, C., & Kim, J. Y. (2011). Designing the future of collaborative workplace systems: Lessons learned from a comparison with alternate reality games. In Proceedings of the 2011 iConference (pp. 174–180). ACM.

Kim, J., Lee, E., Thomas, T., & Dombrowski, C. (2009). Storytelling in new media: The case of alternate reality games, 2001–2009. First Monday, 14(6). Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/2484/2199


Seminar Week 11

This week we focused on issues of privacy with Jessica Vitak after reading Palen & Dourish (2003), Vitak & Kim (2014) and Smith, Dinev, & Xu (2011). Of course privacy is a huge topic to tackle in a couple hours. But even this brief introduction was useful, and really made me start to think about how important theoretical frameworks are for the work I would like to do around appraisal in web archives.

Palen, L., & Dourish, P. (2003). Unpacking privacy for a networked world. In Proceedings of the sigchi conference on human factors in computing systems (pp. 129–136). Association for Computing Machinery.

Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016.

Vitak, J., & Kim, J. (2014). You can’t block people offline: Examining how facebook’s affordances shape the disclosure process. In Proceedings of the 17th acm conference on computer supported cooperative work & social computing (pp. 461–474). Association for Computing Machinery.


Music

She was a music I no longer heard, that rang in my mind, itself and nothing else, lost to all sense, but not perished, not perished.

Robinson (1980), p. 160.

Robinson, M. (1980). Housekeeping: A novel (1st ed.). Farrar, Straus; Giroux.



Dead Letter Revision

You may remember last week I provided a short example of using metaphor to give depth and life to some of my otherwise shallow and boring text. I’m not sure I acheived this, but it was a fun exercise for someone like me who likes playing with words. The crucial last step in Sword’s process is to share the reworked sentence with a friend to see if the reworked sentenece works, and to get feedback on how to make it better.


Seminar Week 10

This week’s readings were focused on Values in Design with Friedman & Nissenbaum (1997), Shilton, Koepfler, & Fleischmann (2014) and Borning & Muller (2012). We were fortunate to have Katie Shilton on hand to talk about her article, and values sensitive design in general.

Borning, A., & Muller, M. (2012). Next steps for value sensitive design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1125–1134). Association for Computing Machinery. Retrieved from https://dub.washington.edu/djangosite/media/papers/borning-muller-chi2012.pdf

Friedman, B., & Nissenbaum, H. (1997). Human values and the design of computer technology. In (pp. 330–347). Cambridge University Press.

Shilton, K., Koepfler, J. A., & Fleischmann, K. R. (2014). How to see values in social computing: Methods for studying values dimensions. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 426–435). Association for Computing Machinery.