ENG 354: Technology and Culture
Spring 2021

Assignments

term assignments | unit 1 | unit 2 | unit 3 | unit 4

Term Assignments

Technology and Narrative Blog Site

Format: A series of blog posts--see technical information below.

Due: throughout the term--see course schedule

Instructions:

For this assignment you will create multiple blog posts on your own blog site throughout the term. You will watch one season of a series from another culture that has a plot that focuses on some kind of technology and create at least six posts about your show over the duration of the term. Your blog posts should be entertaining, informative pieces about the series. You can (and should) include your personal opinions and reactions to the narrative you watch. You should also, over the course of the term, include these elements:

List of Shows
Student Title Platform Country Technology Genre Year
Lauren 3% Netflix Brazil technological inequality drama 2016
Kylie Ad Vitam Netflix France genetic engineering drama/mystery 2019
Ulises Better than Us Netflix Russia AI drama 2019
Jack Biohackers Netflix Germany genetic engineering drama/thriller 2020
Noelle The Bletchley Circle Prime Britain communication technology historical drama 2012
Cable Girls Netflix Spain communication technology historical drama/telenovella 2017
Garrett The Code Netflix Australia surveillance technology, hacking crime, thriller 2014
The Feed Prime Britain/USA communication technology/networking drama 2019
Kristin Humans Prime Britain AI drama 2015
Nick My Holo Love Netflix South Korea AI romance 2020
Noel Omniscient Netflix Brazil surveillance technology action/drama 2020
Alec Orphan Black Prime Canada/Britain genetic engineering/cloning action/drama 2013
Ryan Osmosis Netflix France dating technology drama/romance 2019
Kynlee Upload Prime USA virtual reality comedy/drama 2020
Chelsea You Are Wanted Prime Germany hacking/cyber attack drama/thriller 2017

Timeline

See the course schedule for exact dates.

Technical Information

Submit your blog posts by publishing them on your blog site in our class blog:

  1. Go to Blogger.com
  2. Click "Sign in" in the top right
  3. Use these credentials:
  4. ID: dmslourdessp21@gmail.com
  5. password: dmsengsp21
  1. Click the dropdown list in the top left corner and select your blog site

Customizing Your Theme

  1. Click on "Theme."
  2. Click on the basic theme you want to use from the options listed. You'll see the theme enlarged. If you like this option, proceed by clicking on the "Customize" button. If not, click the X and choose a different one.
  3. In the Customize area, click "Background" to change the image and/or color of the background image for the entire blog site.
  4. Use the "Advanced" area to make other changes

You can use the "Advanced" menus to examine and make changes to

Creating an individual post

When you are ready to write individual posts:

  1. Follow the instructions above to log in.
  2. Click on "Posts"
  3. Click on the button in the upper left that says [ + New Post ]
  4. Use the WYSIWYG editor to create your post.
  5. Click "Publish" to make your post live
  6. If you make additional changes, be sure to click "Update" to post those to the publically viewable page

Turning in your individual URL

To turn in your post:

  1. Publish your post using the orange Publish button in the upper right corner.
  2. If you make changes after you've published the post before you turn it in, use the orange Update button.
  3. On the screen where you edit the post, you'll see a section labeled "Permalink" on the right. Click Permalink
  4. Copy the link: this is the link you should turn in to Canvas

Note: the Permalink will not work if you have not published your post.

Evaluation Criteria

Blog Site

Your Blog Site should have

Individual Posts

Your Blog Posts should

Technology and Cultural Discourse Video Assignment

Format: composite video of 5:00-8:00 minutes posted online (see technical details below)

Due: Exam Week, 5/5 by midnight

Instructions:

By the end of the semester, you will create an informative composite video about some aspect of technology and culture. Your video should be well-researched and should include multiple components--e.g., voice over image, film clip, interview, etc. You may work individually or with a partner or group on this projet. If you work with others, you should divide the work to maximize group memebers' strengths, but everyone should be involved in the planning of the project and research for the content, and the workload should be divided evenly. And, you should take this opportunity to learn some new technology skills.

You may work on any topic related to our course topics you wish, and you may address technical, conceptual, representational, or other aspects of the technology you focus on but you should have a clear, specific, well-researched focus for your video.

Your completed video will be uploaded to our class YouTube channel (see technical details below).

Timeline:

See the course schedule for specific dates.

Video Editing Software:

You may use any video capture technology (cell phone, iPad, computure camera, etc.) and any video editing/compositing software you wish, as long as you produce a final product that can be uploaded to our YouTube channel. Some links and information is provided below for video editing software. There are plenty of free options to choose from.

Technical Information:

1. Log on to YouTube with the following credentials:

ID: dmslourdessp21@gmail.com
password: dmsengsp21

2. Click the account icon in the upper right corner.

3. Click "YouTube Studio" from the list

4. Once in the Studio area, you can create and upload videos.

5. Check the settings:

Resources

Sources for Free Images

Sources for Free Audio

Evaluation Criteria:

Your video will be evaluated on the following criteria:

Topic and Work Plan

Format: Word processed file
Due: midnight, Wednesday 2/24

Instructions:

Submit a 3-4 sentence description of your proposed topic. Be sure to explain what technology you will be addressing, your specific focus, and the interaction(s) between technology and culture that will be addressed.

Your work plan should:

Design Plan

Format: Word processed file, images, video clips, slide show, as applicable
Due: midnight, Friday 3/12

Instructions:

Your design plan should indicate the proposed structure for your video. At this stage, you may still be researching, but you should have an idea of the components you will use (voice over image, interview, talking head, etc.). This assignment is meant to prompt you to plan the structure of your video and ensure that the scope is appropriate. Your plan should include a list of components in order with approximations of the duration for each component.

You should also submit descriptions of components (or links to them or the actual files) and an indication of whether the component has been created or is still "to do." There is no right or wrong, I just want to get a sense of your progress.

Annotated Bibliography

Format: Word processed file
Due: midnight, Friday 3/26

Instructions:

Create a list of your sources with a brief description of each. Each entry should start with an MLA format citation for the source followed by a paragraph of summary. The list overall should be alpha by author last. See the Purdue OWL (includes citation generator) for additional guidance on MLA format. At least 5 sources should be included.

In-Class Assignments--General Information

Format: In-class activity and worksheet

Due: various--see course schedule for specific dates

Description

In-class assignments will be used to apply concepts from reading and viewing. It is important to complete reading and viewing before class in order to be successful on these assignments. Some in-class assignments may require additional advance preparation--be sure to check the course schedule: assignments that require preparation beyond reading and viewing are marked with an *. If an in-class assignment is not entirely completed, I may ask you to finish it outside of class. In that event, the deadline for assignment submission will be announced in class.

Unit 1: Imitation and Representation

In-Class #1: Theory of Technology

Part 1. Identification

Work with your group to answer your assigned questions below.

Carah and Louw, Media and Society pp. 27-30

  1. Group A: Explain this statement in your own words: "Representations are social productions: their meaning depends on who creates and circulates them, the cultural schema within which that circulation takes place, and who receives them" (27).
  2. Group B:Explain this statement in your own words: "The question is not always about whether or not representations are accurate, but how they subtly frame events in ways that position individuals in the social order" (27)
  3. Group C: Explain the difference between the post-modern view and hegemonic view of representation (27-28).
  4. Group D: Define in your own words dominant, negotiated, and oppositional representations (29).
  5. Group A and Group B: Explain this statement in your own words: "encoders with power are encoders seeking to build power" (30).
  6. Group C and Group D: Explain the conditions necessary for "encoders opposed the ruling hegemony" to have any power (30).

Pacey, "The Culture of Technology" pp. 95-102

  1. Group A: Explain what is meant by technological neutrality (96)
  2. Group B: Explain why the fact that technology is a "part of life" argues against the notion of neutrality in Pacey's view (97)
  3. Group C: Explain in your own words the concept of technology-practice (98-99)
  4. Group D: How, in Pacey's view, can the significant cultural values in an example of technology-practice be uncovered? (100-102)

Part 2. Application

Carah and Louw, Media and Society pp. 27-30

  1. All: Part of Carah and Louw state that "Representations takes place within context of power relations" (27). Think of a specific example that illustrates (or refutes) this principle and explain.
  2. All: Find an example online or think of one that you can explain of a representation that demonstrates a dominant message framing.
  3. Group B and Group C: Find an example online or think of one that you can explain that demonstrates a negotiated message framing (be sure to indicate who is doing the encoding and decoding).
  4. Group A and Group D: Find an example online or think of one that you can explain that demonstrates an oppositional message framing.

Pacey, "The Culture of Technology" pp. 95-102

Identify an example (ideally rooted in your own experience) of how a specific technology-practice related to digital media demonstrates background values.

In-Class #2: Physical Limitations of Technology

Part 1. Identification

All: List physical properties of early photography and film that affected the use of these technologies, as explained in "Was this Photograph Staged" and "Why Movies Went from 15 minutes to 2 hours":

Shelangoskie, "Rethinking Propiety in the Age of Instantaneous Photography"

  1. Group A: List the cultural anxieties about photography stated in the article in your own words (722, 725-27):
  2. Group B: List at least 3 of the technical innovations that changed photographic practice mentioned, and explain how they changed photographic practice (722-723, 728)
  3. Group C: Explain in your own words how a camera fiend was different from an ordinary amateur photographer, and why this distinction is important (723-724, 725-26):
  4. Group D: Explain in your own words the concept of Victorian-era propriety and why it was culturally significant (723-724)
  5. All: Explain how the novel Camera Fiend used fictional elements to illustrate exaggerated versions of actual anxieties about photographic technology (at least 2 explained examples) (729-735 (-minus) optional sections)
  6. All: Explain the tools used to attempt to contain/regulate the practices of camera fiends (736-738)

Part 2. Application and Analysis

Hornung, "Spoilt Negative"

  1. Group A: What anxieties about photography are demonstrated in this short story? How are they similar/different/related to the anxieties mentioned in my article?
  2. Group B: What elements of conventional Victorian propriety are important in this short story? Explain--and be sure to note the ways in which propriety is maintained and the ways in which it is disrupted/violated.
  3. Group C: How does propriety function in this story compared to my discussion of propriety Hornung's novel?
  4. Group D: Identify the technical elements of photographic practice that are illustrated in this story. Explain how they are important to the narrative and to the cultural idea of photographic practice overall (in this cultural context).
  5. All: What anxieties and techncial limitations operate around photographic representation today? Explain.

Méliès, "Journey to the Moon"

In class viewing: Méliès, "Journey to the Moon"

Work on your assigned segment of the silent film "Journey to the Moon"

  1. Summarize the main plot events in your segment of the film.
  2. An obvious limitation of this medium is the lack of sound for conveying meaning, yet you were able to summarize the plot of your segment. Identify at least 3 visual cues/details that helped convey the meaning that you decoded, and explain how they helped you understand meaning.
  3. What existing dominant cultural discourses are apparent in this film? (your segment or the whole)
  4. What existing cultural anxieties are apparent in this film (your segment or the whole)
  5. What new narratives are available because of the representational possibilities of the newly available technology of film?

In-Class #3: Cognitive Limitations of Technology

Part 1. Theory

Work with your group to answer the questions about Hall's "The Whites of Their Eyes: Racist Ideologies and the Media" below.

  1. Group A: Explain in your own words the definition of ideology that Hall is using (90).
  2. Group B: Explain in your own words the main ideas of the first point Hall makes about ideologies: "ideologies do not cosist of isolated and seaparate concepts..." etc (90)
  3. Group C: Explain in your own words the main ideas of the second point Hall makes about ideologies: "ideological statements are made by individuals..." etc. (90)
  4. Group D: Explain in your own words the main ideas of the third point Hall makes about ideologies: "ideologies 'work' by constructing for their subjects positions of identification and knowledge..." etc. (90-91)
  5. All: Explain how communication media are related to ideology, and give a specific example.

Part 2. Identification

Work with your group to answer the questions related to the resources below. Indicate which resources informed each of your responses:

  1. List and describe some of the abilities of advanced representation and artificial intelligence technologies
  2. What are some practical/technological challenges and limitations on the development of technologies that imitate advanced human cognitive function?
  3. What does the example of Microsoft's racist AI demonstrate about how human ideologies can function as a limitation on the development of technology? Explain at least one significant consequence of this limitation.

Part 3. Analysis

In-Class Viewing:

Answer these questions after watching the "Short Film Written Entirely By AI":

  1. What elements of the narrative demonstrated coherence and logical progression? -- list and briefly describe:
  2. What elements of the narrative did not make sense (i.e. conform to agreed upon discursive rules of narrative)? -- list and briefly describe:
  3. Was the storytelling in this example constrained by ideology in any way? Explain your answer:
  4. What did you think about this film as a demonstration of the cognitive abilities of artificial intelligence?

Unit 2: Communication and Community

In-Class #4: Cultural Discourse Framing (and Taming) New Technologies

Part 1. Theory

  1. Group A: Explain at least 2 differences between the telegraph services offered by private companies and the expectations of services offered by the government if telegraphs were nationalized.
  2. Group B: Give at least 2 specific examples of how advocates of nationalization framed telegraphy to overcome financial objections
  3. Group C: Describe some of the cultural anxieties contemporaries had over women working in the public sphere. Explain how these concerns were addressed in period telegraph discourse.
  4. Group D: Explain how the marriage plot was used to tame unruly/threatening elements of telegraph practice in the text analyzed in my article.

Part 2. Application

Playing with Fire

  1. Map the technology practice of telegraphy in this story--what are the technical, cultural, organizational features of the technology demonstrated in this story.
  2. Explain the typical romance plot that this story invokes. Then, identify the potential disruptions to romantic conventions caused by telegraph practice in this story:
  3. Explain how the ending of this story demonstrates an oppositional representation and/or subversive discourse. If the ending of "Telegraph Girl" (the story analyzed in my article) demonstrates how the conventional marriage plot can tame disruptive elements of technology practice, what does the ending of this story demonstrate? Explain.

Romance of a Telegraph Wire

  1. In this story, the personified telegraph wire narrator argues that the very rules of narrative have been changed by the telegraph: "As if ideas were still needed in the nineteenth century! Nowadays, if you wish to write romances, you no longer invent, but experience them!" (203). Explain the new cultural logic of narrative the telegraph wire promotes. Evaluate the potential for disruption of this narrative logic--in other words, how successful is the telegraph wire's story as a competing means of constructing a compelling story?
  2. Explain how the telegraph's romance changes the form of narration from a conventional story. Evaluate this new form--what is its potential and its limitations for effective storytelling?

Part 3. Reflection

  1. List aspects of modern-day communication technologies that have the potential to threaten existing conventions--and these may be cultural discursive conventions, conventions of form, or conventions of narrative.
  2. Choose 2 examples and explain the threat and the mechanisms that are used to constrain, contain, retulate, or tame the technology.
  3. Evaluate the effectiveness of the attempts to constrain technology practice in these cases.

Part 4. Personal Reflection (complete in your own notes)

  1. Describe the representation of technology in the show you have been watching
  2. List ways that the technology practice demonstrated in the show are important to the story being told, the narrative; classify elements mentioned as technical, cultural, or organizational (or combination)
  3. Reflect on how the technology practice affects the narrative:

In-Class #5: Social Media and Discourse Transformation

Part 1. Identification

Work with your group to answer your assigned questions below.

Carah and Louw Ch 11

  1. Group A: Explain the differences among these types of communication: broadcast media, interactive media, social media.
  2. Group B: Explain these practices of interactive and social media and why they are important: searching, showing, presencing, and archiving.
  3. Group C: Explain the difference between broadcast gatekeepers and algorithmic gatekeepers.
  4. Group D: Explain how network asymmetry can lead to filter bubbles; be sure to explain what a filter bubble is.

Marwick and boyd --To See and Be Seen--

phatic communication
communication that serves a social function rather than communicating information--e.g. saying "goodbye" to end a conversation
  1. Group A: Define micro-celebrity and explain the difference between meme celebrity and micro-celebrity (see 525-526)
  2. Group B: Explain how "celebrity practice reinforces unequal power differenetials" (527)
  3. Group C: Explain what parasocial interaction is and how Twitter (and other social media) changes the dynamic of typical parasocial interaction (see 527-528)
  4. Group D: Explian the difference between authenticity and sincerity (see 530-531)

Part 2. Analysis

  1. List social media platforms that you are familiar with/use
  2. Describe the conventions/rules for posting--what limitations and capabilities are there? Indicate in particular those that are specific to the platform.
  3. Describe the characteristics of a communicator with celebrity/micro-celebrity/power on this platform.
  4. Explain how these conventions/rules affect communication interactions.
  5. Identify the cues for expressing sincerity and/or authenticity on these platforms, and explain how relevant/significant these types of expression are (i.e.: does it matter if people are sincere or authentic on the platform?)

Part 3. Experiment

  1. Discuss with your group and choose a cultural discourse you want to explore
  2. Go to Twitter
  3. Use the Advanced Search to find results related to your discourse. You can set any of the restriction elements you wish, but record the exact parameters of your search here:
  4. Analyze the top results for "Anywhere" and then for "Near You"; consider elements such as these:

Part 4. Reflection

  1. Now that you understand more about the theory of social communication, what do you think about the potential and the power of technological practice in this area?
  2. What do you think about your own participation in this type of social discourse?

In-Class #6: Experiments in Crowd Sourcing

Part 1. Crowd Voting

Classification

Work with your group to classify galaxies with Galaxay Zoo. Classify at least 5 galaxies, then answer the questions below.

Classification Reflection:

  1. Why do you think this is a task that needs human participation? Explain, based on your experience with the task and what we've learned about the capabilities of AIs.
  2. What did you think about this experience: list at least 3 adjectives you'd use to describe it--and explain.
  3. In what ways did this task train you? Explain.
  4. Do you think this task is equitable in terms of what the scientists get from your participation and what you get for participating? Explain.

Gamification

With your group, play the ArtiGo Game and then reflect on the results.

When told to START click on the ArtiGo Game link and work through the 5 images. Then answer the questions below.

Gamification Reflection:

  1. Why do you think this is a task that needs human participation? Explain, based on your experience with the task and what we've learned about the capabilities of AIs.
  2. What did you think about this experience: list at least 3 adjectives you'd use to describe it--and explain.
  3. In what ways did this task train you? Explain.
  4. Do you think this task is equitable in terms of what the scholars get from your participation and what you get for participating? Explain.

Part 2. Crowd Creation

Resources

Content Creation

For this experiment, we will be helping the Toledo Lucas County Public Library make use of their image resource in the crowd source platforms Wikimedia and Wikipedia.

Login

Login Link

  1. Login with the information above
  2. Review the images, and as you're looking at them, think about where these images might fit as illustrations, examples, or useful visual representations. Make a list, and be sure to note which specific image(s) might fit with specific topics.
  3. Find articles about the topics in your list and add the images (see technical information below).

Technical Information

  1. choose a category from the TLCPL image collection below to find an image to add to an article.
  1. Parks: Park incategory:"Media contributed by Toledo-Lucas County Public Library"
  2. Buildings: Building incategory:"Media contributed by Toledo-Lucas County Public Library"
  3. Industry: Industry incategory:"Media contributed by Toledo-Lucas County Public Library"
  4. Schools: School incategory:"Media contributed by Toledo-Lucas County Public Library"
  5. Floods: Flood incategory:"Media contributed by Toledo-Lucas County Public Library"
  6. Snow: Snow incategory:"Media contributed by Toledo-Lucas County Public Library"
  7. All the Images: Category:Media contributed by Toledo-Lucas County Public Library
  1. Click on the title of the image
  2. If cropping is needed, click on the "Crop Tool" on the left menu list, and crop as demonstrated in the video
  3. Be sure after cropping to save the file as a new image by selecting Upload as New File
  4. Select the full name of the file, including the File:
    **Note: be sure to also copy the file name into our log for TLCPL
  5. Go to the regular Wikipedia page
  6. Search for a page where you would like to insert the image
  7. Click on the "Edit" tab
  8. Use the visual editor to insert the image as shown in the video.
    **Note: be sure to also copy the page title and URL into our log for TLCPL
  9. Provide a clear, accurate caption and alternate text as prompted
  10. Explain your changes as shown in the video to ensure the changes are accepted as legitimate
  11. Note which image you placed in which page(s)
  12. Repeat until time is called for the activity

Reflection and Analysis

Discuss with your group:

  1. How did content creation compare to the classification voting contributions you made in the first 2 experiments? Explain.
  2. What did you think about this experience: list at least 3 adjectives you'd use to describe it--and explain.
  3. In what ways did this task train you? Explain.
  4. Do you think this task is equitable in terms of what the scholars get from your participation and what you get for participating? Explain.
  5. What do you think about ideas of authorship after participating in this task? Explain.

Presentation 1: Video Game Debate

Part 1. Visualizing History

Work with your group to create a visual representation of the history of video games based on the information in Ivory, "A Brief History of Video Games" pp. 1-21. You can use a timeline format, but you do not have to as long as your visualization

Groups will display and explain their visualizations in the first part of class.

Part 2. Presentation

Format: in-class presentation of 10-15 minutes; visual optional

Work with your group to create a presentation and engage in debate about video games based on your assigned reading.

Your presentation should include the following:

Note: All group members should have a spoken part in the group's initial presentation

After the initial presentations, groups will ask each other questions and engage in discussion and debate on this topic.

Unit 3: Law and Order

In-Class #7: Technology in the News: Analyzing the Discourse of Disruption

Part 1. Discourse Analysis: Cultural Framing

Work with your group on your assigned text as indicated below.

  1. List some phrases from your article where the technology at hand is described
  2. Evaluate each phrase in the list as positive, neutral/factual, or negative. Be prepared to explain your classifications.
  3. Explain (in your own words) key ideas about the technology that are emphasized
  4. Describe the attitude toward the technology that is dominant in your piece
  5. Based on your responses in 1-4 above, explain how this techology is framed within the contemporary cultural discourse

Part 2. Discursive Change

Work with your group on your assigned texts as indicated below.

In both of these cases, the second article is published after the first, and at the time of the second article about your technology, the discourse has changed.

Group A and Group C: note that the Head book came out in 1849, while the "Government and the Telegraphs" article was published shortly after nationalization--and remember what you learned in my article in Week 5 about the discourse surrounding nationalization.

Group B and Group D: note the dates of the two "Spirit Photographs" article, and do consider the fact that these 2 articles ran with the same headline.

  1. Describe the changes in how the technology is framed from the earlier article to the later article.
  2. Explain factors that could account for this change
  3. Evaluate this change in discursive framing, and be sure to explain why this change is significant.

In-Class #8: Internet Security and Deepfakes

Part 1. Experiment

Reference: Vox, "Why Coronavirus Scammers Can Send Fake Emails from the WHO" (8:30 mins)

  1. Explain in your own words what the DMARC protocol is and why it is important for entities to participate:
  2. Use the Valimail DMARC Monitor (featured in the Vox video). and test our University domain--lourdes.edu. Write the results here:
  1. check the domain vox.com to see a well-configured example.
  2. test business domains--maybe the company you work for or others that you're just interested in, at least 3. Note the results here:
  3. check the lourdes.edu domain. Note the results here:
  1. Considering what you've learned about DMARC, do you think that our University should change its DMARC policy? Explain why or why not:

Part 2. Identification

Work with your group on the questions below.

References

  1. Group A: Explain in your own words what Biagioli means by "postproduction misconduct" (see 16334)
  2. Group B: Explain in your own words the difference between manipulations that are fraudulent and yet authentic and those that are fraudulent copies, and explain why this difference is important (see Biagioli 16335)
  3. Group C: Explain in your own words what Biagioli means by "recursive fraud" (see 16635)
  4. Group D: Why, according to Biagioli, are 2nd and 3rd tier journals more likely to accept fraudulent submissions? Explain in your own words. (see 16335)
  5. Group A: Explain in your own words what a infodemic is (see Yamaoka-Enkerlin 725)
  6. Group B: Explain what GAN stands for and the basic principle behind this type of machine learning (see Yamaoka-Enkerlin 726-7).
  7. Group C: Explain in your own words what a deepfake is and how it is different from other forms of image manipulation (see Yamaoka-Enkerlin 726)
  8. Group D: Explain what a cheapfake is, and how it is related, but distinct from a deepfake (see Yamaoka-Enkerlin 727-8)
  9. Group A: Explain the difference between misinformation, malinformation, and disinformation.
  10. Group B: List (in your own words) the threats and risks on the individual level identified by Yamaoka-Enkerlin that deepfakes and cheapfakes pose (see 731-32):
  11. Group C: List (in your own words) the threats and risks on the institutional level identified by Yamaoka-Enkerlin that deepfakes and cheapfakes pose (see 732-33):
  12. Group D: Explain what this quote from the ACLU Yamaoka-Enkerlin cites means, and why this idea is significant: "focusing on deepfakes is like looking through a straw" (Wizner qtd. in Yamaoka-Enkerlin 729)

Part 2. Analysis

1. The BuzzFeed deepfake video of Barack Obama, released in 2018, was one of the first examples of this technology to draw mainstream attention to this technology and to its perils. Review this video and then answer the questions below.

BuzzFeedVideo. You Won’t Believe What Obama Says In This Video! 😉

  1. How does the video frame the content (consider elements such as the title of the video as well as elements within the content)
  2. How does the video signal/demonstrate that the image of Obama has been manipulated? Do you think these strategies are effective for conveying the video is not authentic? Explain.
  3. The purpose of the video is arguably to act as a warning against deepfake technology: is it effective for this purpose? Explain why/why not.

2. Visit Sensity Deepfake-Detection and perform the following experiment:

  1. Test this URL: https://youtu.be/bPhUhypV27w. Note the results:
  2. Find other images and videos to test. Record the URL or page title you tested and the results

If you're prompted to log in, use the credentials below:

Based on this experience, what do you think about the ability to make manipulated images vs. the abilty to detect them? Explain.

Part 3. Discourse Analysis

The NBC News and BBC News videos are both intended to inform the public about deepfakes, but they take very different approaches. Analyze your assigned video.

  1. How is the topic framed in your video?
  2. What strategies are used to convey information? In addition to content, evaluate visual effects/appeal, the presenter of information, etc.
  3. Based on these elements, what is the purpose of the video you are analyzing?
  4. Is the video effective in achieving its purpose? Explain
  5. Based on your evaluation of effectiveness, what might this suggest about the broader question of addressing the dangers of new technologies effectively in public forums?

Resources:

If you are interested in experimenting with your own deepfakes, there is some free, open-source software available. Note: these programs are large and require some computing power and patience:

In-Class #9: Personal Privacy Inventory*

Part 0. Terms

Define the following; the article where the term can be found is listed in [] after the term:

Part 1. Discussion

  1. Group A: List specific examples of benefits of digital surveillance (passive and active) that were mentioned in this week's reading and viewing:
  2. Group B: List specific examples of privacy issues that were mentioned in this week's reading and viewing:
  3. Group C: List specific examples of regulation of privacy / surveillance that were mentioned in this week's reading and viewing:
  4. Group D: Explain how power dynamics come into play in issues of privacy and surveillance--who has the power? Are there any ways to change the dynamic? What are the consequences of (or potential consequences) of abuse of power in these situations?
  5. All: How do you rank the costs vs. the benefits of digital surveillance in our daily lives? Explain.
  6. Together: Lynskey quotes an expert who argues "Government regulation is the only thing that is going to halt more damaage" from companies' invasive data collection and surveillance practices [see links to examples of regulations and regulators in Resources below]. Do you agree? Explain.
  7. Together: Lipschultz notes that "Databases are part of an interactive media system that doesn't need to control populations with ideas and beliefs ... but rather controls by watching and responding to them" (242). How does this represent a break from traditional forms of ideological control like propaganda? Choose one of the social media sites you belong to and think about what would be in your database record--what are examples of some of the fields?

Part 2. Personal Privacy Inventory

a. *Advanced Preparation:

Before class in Week 11, list for yourself all of the social media services you use and any personal assistants. For each one, check the privacy settings; make note of:

b. Discussion

Answer the following questions based on your home inventory of your privacy settings.

  1. Before this assignment, had you checked your privacy settings on your various social media and digital assistants? If yes, how frequently; if no, why not?
  2. What did you note (surprising? interesting?) about the privacy settings you reviewed? You can speak generally or give specific example(s).
  3. Were there any aspects of platforms or devices that you didn't like after you saw the privacy settings but could not change? Explain.
  4. After completing this inventory, how comfortable do you feel about the data that you are contributing to the internet and how it is used by various companies? Explain.

Resources

Unit 4: Nature, Nurture, and Narrative

In-Class #10: Discussion--Nature, Nurture, and Narrative

In this exercise, we will work to summarize and integrate some of the main technology systems we have worked on during the term:

Part 1: Example--Telegraphy

  1. Define the scope of the technology "species"
  2. Fill in column 1 describing the phases of technology development and diffusion
  3. Fill in column 2 identifying an example of a cultural discourse or representation that algins with each phase
  4. Fill in column 3 explain the technology practice for your discourse/representation example
Concept Alignment: Development, Diffusion, Discourse, Practice
Technology Diffusion Phase Cultural Narrative/Discourse Types Technology Practice
Invention example of discourse or representation: cultural, organizational, and technical practice:
De-Mystification example of discourse or representation: cultural, organizational, and technical practice:
Familiarization example of discourse or representation: cultural, organizational, and technical practice:
Innovation example of discourse or representation: cultural, organizational, and technical practice:

Part 2: Try It Yourself

  1. Define the scope of the technology "species"
  2. Fill in column 1 describing the phases of technology development and diffusion
  3. Fill in column 2 identifying an example of a cultural discourse or representation that algins with each phase
  4. Fill in column 3 explain the technology practice for your discourse/representation example
Concept Alignment: Development, Diffusion, Discourse, Practice
Technology Diffusion Phase Cultural Narrative/Discourse Types Technology Practice
Invention example of discourse or representation: cultural, organizational, and technical practice:
De-Mystification example of discourse or representation: cultural, organizational, and technical practice:
Familiarization example of discourse or representation: cultural, organizational, and technical practice:
Innovation example of discourse or representation: cultural, organizational, and technical practice:

Part 3: Discussion

1. Think back through the reading and viewing you've done this term and brainstorm ideas about nature, nurture, and narrative:

2. Share your ideas as part of our class discussion.

Resources

Presentation 2: Final Project Topic

Format: 5 minute presentation; video component required

Instructions:

Choose a 3 minute clip of your draft video to show to the class. Show the clip, and then explain:

Presentation 3: Series Blog

Format: 5 minute presentation; visual optional

Instructions:

Prepare a presentation about the series you've been blogging about during the term that includes the following:

Resources

Video Editing

Images and Image Editing

Sources for Copyright Free Images:

Image Editing Software

Deep Fake Software