Technology and Delegation, Fall 2017

From Techdel
Jump to: navigation, search

Note: See Technology and Delegation, Fall 2018 for an updated version of this syllabus

This is the syllabus for the Fall 2017 INFO 239 Technology and Delegation Lab, taught by Deirdre K. Mulligan (dmulligan@berkeley) and Richmond Wong (richmond@ischool).

(See also the 2016, 2015, 2013, 2011, 2010 and 2009 versions.)

Class meeting
Tuesday and Thursday 3:30-5:00 PM; 202 South Hall
Office hours
Deirdre: Wednesday 2:30-3:30, 303b South Hall
Richmond: by appointment, South Hall or nearby coffee shops
mailing list
#techdel on Slack
(email Richmond if you have problems joining either)

Course description

Themistocles said his infant son ruled all Greece -- "Athens rules all Greece; I control Athens; my wife controls me; and my infant son controls her." Thus, nowadays the world is controlled by whoever buys advertising time on Dora the Explorer.
XKCD highlights technology and delegation.

Technology is often put forth as inevitable progress toward modernization and as a value-neutral means for implementing the policies of law, agency rules, or corporate planning. The introduction of technology increasingly delegates responsibility for some function — sensing, sensemaking, deciding, acting — to technical actors. These handoffs of function between people, processes and technologies are rarely as inconsequential as they are initially made out to be. Often these shifts reduce traditional forms of transparency—as black boxes embed rules and make decisions less visible—and challenge traditional methods for accountability.

Meanwhile, policymakers are asking those who design technology to build-in values such as privacy and fairness—handing off some responsibility for their expression and protection. It is rarely a simple case of a function being handed wholesale from people to technology, or one technology to another; but rather a complicated interleaving in which a value is shaped and constrained by multiple modes of regulation.

We will draw on a wide range of literature, including: design, science and technology studies, computer science, law, and ethics, as well as primary sources in policy, standards and source code. We will explore the interaction between technical design and values including: privacy, accessibility, fairness, and freedom of expression. We will investigate approaches to identifying the value implications of technical designs and use methods and tools for intentionally building in values at the outset. And we will be not only critical, but also constructive: this lab will give us a hands-on opportunity to try out technologies for ourselves and experiment with building alternatives that address rights and values.


First, we will look at the theory and examples of the effects of technological delegation on public policy values; next, we will review and test the practices, tools and methodologies to design for values we care about; and finally, we will consider some ongoing case studies to discover what affirmative agenda or common principles we can elicit for embedding values in design.

Typically, Tuesday meetings will be discussions based on the readings and Thursday meetings more lab exercises, but this will vary.

Week 0: Introduction

Thursday, August 24th

We will introduce the content and methods of the course, and introduce ourselves to one another.

Read, or skim over if you've read it before:

  • Winner, Langdon. "Do Artifacts Have Politics?" Daedalus, Vol. 109, No. 1, Modern Technology: Problem or Opportunity? (Winter, 1980), pp. 121-136 The MIT Press on behalf of American Academy of Arts & Sciences

Week 1: Artifacts and Politics

Tuesday, August 29th; Thursday, August 31st
(Richmond away this week)



Guest leader Nick Doty
browsing the Web, a poor man’s overview of Internet and Web architecture

Week 2: What Things Regulate

Tuesday, September 5th; Thursday, September 7th


Lab: Guest leader Nick Doty

Let’s try out Tor! And some other self-help privacy browser tools. (To what threat models do they apply?)
  • BEFORE CLASS: Install Tor Browser on your laptop, or Orfox on your Android device. For your laptop, we recommend installing the stable version, English version. Click on the appropriate version for your browser and install like you would any other program. If successful you should end up with a new web browser application/program
  • What is #torstrike? (tw: sexual assault)
  • What's another privacy self-help tool that you've used?

Week 3: How Things Regulate

Tuesday, September 12th; Thursday, September 14th
(Richmond away Tues & Thurs and Deirdre away Thursday)


Lab: (Deirdre and Richmond are out, do this in the classroom or at a location of your choosing--but do it!)

By yourself or with a partner, create something that makes what you believe to be a fair use of a copyrighted work and upload it to a platform or your choice
Explore the platforms TOS/EULA, controls, affordances, defaults, etc. Consider in light of the readings.
Be prepared to report on your experience

Week 4: Values

Tuesday, September 19th; Thursday, September 21st



Week 5: Designing for Rights, Designing for Justice

Tuesday, September 26th; Thursday, September 28th



(Nick Merrill to guest lead)
Let’s think about values around human rights, social justice, and care with biosensing technologies.
Optional Reading:

Week 6: Democracy, Transparency, Due Process

Tuesday, October 3rd; Thursday, October 5th



No Class
Optional Reading:
  • Citron, Danielle Keats, Technological Due Process. U of Maryland Legal Studies Research Paper No. 2007-26; Washington University Law Review, Vol. 85, pp. 1249-1313, 2007. READ § I.A., II.B.2, III.C.2. (Access through UC Berkeley proxy.)

Week 7: Code and Standards

Tuesday, October 10th; Thursday, October 12th



Guest leader Nick Doty (Deirdre may be out)
  • Let's pick an ongoing standard-setting conversation and try to understand it.
  • Examples: HTML5, Do not track, etc


Week 8: Collaboration & Governance

Tuesday, October 17th; Thursday, October 19th




Let’s get up to speed with Wikipedia, and look at various Wikipedia tools and community pages.

Week 9: Values in Design & Value Centered Design

Tuesday, October 24th; Thursday, October 26th

For Tuesday - prepare 1 slide and 30-60 seconds to share your idea(s) for the final project (send a PDF slide to Richmond before class)


Review these readings from prior weeks:


Bellotti, V., & Sellen, A. (1993). Design for privacy in ubiquitous computing environments. In Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13–17 September 1993, Milan, Italy ECSCW’93 (pp. 77-92). Springer Netherlands.


  • Apply the envisioning cards or other values in design tools to brain-computer interface authentication ("passthoughts") and other sensing technologies

Week 10: User Centered Design

Tuesday, October 31st; Thursday, November 2nd
Richmond away Thurs (research & privacy practices workshop)


Lab: Guest Noura Howell

  • Let's do some design exercises applying UCD/HCD methods toward final project ideas

Week 11: Speculative & Critical Design

Tuesday, November 7th; Thursday, November 9th


  • Sengers, Phoebe, Kirsten Boehner, Shay David, and Joseph “Jofish” Kaye. 2005. “Reflective Design.” In Proceedings of the 4th Decennial Conference on Critical Computing: Between Sense and Sensibility, 49–58. CC ’05. New York, NY, USA: ACM.
  • Dunne, Anthony, and Fiona Raby. 2001. Design Noir: The Secret Life of Electronic Objects. Springer Science & Business Media. Section 4.
  • Sims, Christo. "DESIGN, DESIGN AS POLITICS." The Routledge Companion to Digital Ethnography (2017)


Using “design noir” and design thinking to generate and explore project ideas.

Week 12: Privacy Assessments

Tuesday, November 14th; Thursday, November 16th
(Deirdre away Tues & Thurs, IEEE Ethics Symposium; Richmond away Thursday)

Guest Lecturers Sean Brooks CLTC, Mary Moreshed (hopefully) Read:

Additional Recommended Readings:

Lab: Guest Leader Joanne McNaab, former-Head of Privacy Office State of CA Attorney Generals Office

As a small group, take one of these decisional tools and a spec or product and apply the review process.
As a small group, try applying the privacy analytic cards to a spec or product

Week 13: Algorithms, Fairness, Opacity & Accountability

Tuesday, November 21nd; [no Thursday class, Thanksgiving]



No Lab, Happy Thanksgiving!

  • Web Content Accessibility Guidelines (WCAG) 2.0.” December 2008.
  • Koponen, Jarno M. 2015. “We Need Algorithmic Angels.” Techcrunch.
  • Ananny, Mike. "Toward an Ethics of Algorithms Convening, Observation, Probability, and Timeliness." Science, Technology & Human Values 41.1 (2016): 93-117.
  • Neyland, Daniel. "Bearing account-able witness to the ethical algorithmic system." Science, Technology & Human Values 41.1 (2016): 50-76. All
  • Cecilia Munoz, Megan Smith, and DJ Patil. Big data: A report on algorithmic systems, opportunity, and civil rights. Technical report, Executive Office of the President, The White House, 2016.
  • See the results of the “Fairness, Accountability, and Transparency in Machine Learning” event:

Week 14: Design Responses to Harassment

Tuesday, November 28th; Thursday, November 31st
Richmond away Thursday



Explore content moderation on Youtube, Google, Facebook
Play with "The Moderation Machine and the NY Times Comment Moderation Test" "[2]"
Use "Dombrowski, Lynn, Ellie Harmon, and Sarah Fox. "Social Justice-Oriented Interaction Design: Outlining Key Design Strategies and Commitments." Proceedings of the 2016 ACM Conference on Designing Interactive Systems. ACM, 2016. to consider either and suggest improvements or new directions.
  • Hate Crimes in Cyberspace, by Danielle Keats Citron, September 2014.
  • Look at Blocktogether and the source code behind ggautoblocker and other blocklists.

Week 15 (RRR): Project Presentations

Tuesday, December 5th

Course policies


This is a 3-unit class. Meetings each week will include seminar-style discussion, lab-style exercises, and collaborative design and technical work. Readings should be read carefully. Throughout the semester students will complete short writing assignments, lead class discussions, and critique artifacts during the semester. During the second half of the semester students will work collaboratively in teams of 2-4 on a larger design-oriented final project.


Your grade is based on class participation 15% and assignments 85%. This class is designed to hone your critical inquiry skills. You are expected to fully participate—present, actively listen, engage with your classmates and the materials, bring your own insights to the discussion, share your experience and knowledge. Please come prepared to argue, explain, revise, borrow, refine, and of course junk your ideas. Thinking out loud is encouraged. This is how one learns. The success of this class depends upon student’s diligent preparation and active participation—listening, speaking, designing, building—in class. Readings will be assigned throughout the semester. Everyone is expected to read and reflect on the readings.

Assignments account for the remainder of your grade. They will be graded primarily on substance, however a minimal portion of each grade will reflect organizational clarity, grammar, and presentation style as appropriate. The assignments are staggered throughout the semester.


1. Discussion Leads 10% At least once during the semester, you and a partner will be selected to lead the class discussion of the weekly readings. While each student is expected to engage in class discussions, which counts towards the class participation grade, the students assigned students will be expected to prepare a set of questions to frame the discussion, and to lead and moderate the conversation.

2. Critical Reflections 30% Critical reflections are an invitation to apply both the theoretical and practical learning from the course to new problems. They are designed to develop your skills as readers--critiquing, building upon, relating various pieces we read. Reflection pieces should synthesize readings and ideas from class discussion, and use the resulting insights to analyze an issue or object of interest to you, critique readings, or anything else you would like. The requirements of the writing are small in number, you must 1) seriously engage with the readings (could be 1 could be 2 could be more); and 2) write about something that interests you.

Do not, under any circumstances, provide a summary of the articles. You've read them. We've read them. We know you've read them. The form is in between short essay and journal entry. This is a playful style. We want to get a sense of what you are taking away from the class and what sorts of thoughts, ideas, questions it is raising for you. 2-4 normal pages typed.

Because we think this form of writing is most successful when it originates organically with you, the deadlines are looser:

  • the first is due sometime in weeks 1-3 (by Saturday, September 16th);
  • the second in weeks 4-6 (by Saturday, October 7th extended to Tues, Oct 10); and,
  • the third anytime before December 2nd.

3. Critiques 10% The second half of the semester we will begin each class with a student led critique of an information or physical artifact. The students assigned (teams of 2) will select an interface, object, algorithm, design, instructable, kickstarter, toy, etc. and offer a brief—3 slides 5 min—critique that introduces the item and reflects on its values implications drawing on class readings and assignments up to that point. The class will then collectively critique the artifact.

4. Final Project 35% DUE 12/13 (hard deadline) During the second half of the semester students will work collaboratively in teams of 2-4 on a larger final project. While we are flexible on the type of project, projects might include: a design-oriented project where something is made or prototyped, writing out a research protocol for further exploration, or writing a part of a paper aimed toward publication.

Late assignments will be penalized: each day an assignment is late will result in a half a grade deduction. Recognizing that emergencies arise, exceptions will be made on a case-by-case basis.

Scheduling: Use this spreadsheet to choose which week you'll be a discussion lead and when you'll do a design critique.


Academic integrity for this course depends on clear citation of ideas, text and code. At this level, we harbor no romantic illusions that work is born whole from your mind alone; instead, we want you to engage with the assigned readings and ideas you connect from other classes or the world around you, and to make those connections clear. Programmers often copy-paste code or re-use libraries in order to build upon the shoulders of giants without reinventing the wheel. This is encouraged, but we expect students to be careful in their assignments to note what they wrote themselves and to attribute code snippets and libraries to their original authors.

Research Ethics

Class projects for the purpose of learning are typically exempt from Berkeley’s Committee for the Protection of Human Subjects (our Institutional Review Board) review. However, if you are conducting a research project that might result in publishable work (and many of you may!), keep in mind that UCB policy and publication venues will typically require you to have gone through the IRB process even if it is to receive an exemption. In addition, being exempt from IRB review does not mean that you are somehow exempt from ethical norms or that you wouldn’t benefit from advice or review. Feel free to come to the instructors for advice on a project which involves intervention with, data collection, or use of data about, human subjects.