Syllabus/achievement requirements

We will work with a compendium, which is available at Akademika Blindern. These 10 articles and book chapters are the mandatory literature for the course. In addition, we have some documentaries as course material (see below). I am in the process of making a list with secondary literature, both written texts and documentaries/videos).

For your exam essay, you have to choose a minimum of two articles from the secondary resources list (eligible articles are marked with [a]) in addition to the minimum of two articles from the compendium.

Mandatory Resources

Compendium: Design, Technology & Society (2017)

Documentaries (video)

Dannoritzer, Cosima (2010). Pyramids of Waste, AKA The Lightbulb Conspiracy. (52 mins)

McDonough, Wiliam (2007). Cradle to Cradle (30 mins)

Poulsen, Frank Piasecki (2010). Blood in the mobile (82 mins)

Schei, Tonje (2014). Drone (58 mins)

VPRO (2015). Mobile Gold (47 mins)

Extra Resources

All resources can be used in the exam essay, but only the resources marked with [a] count for the requirements of the exam essay.

Meeting 1: Introductions

[a] Mangen et al. (2013). Reading linear texts on paper versus computer screen: Effects on reading comprehension. In International Journal of Educational Research, 58, pp. 61-68.

[a] Mueller, P.A. and D.M. Oppenheimer (2014). The Pen is Mightier Than the Keyboard: The Advantages of Longhand over Laptop Note Taking. In Psychological Science (online first)

[a] Singer, L.M. and P.A. Alexander (2016). Reading Across Mediums: Effects of Reading Digital and Print Texts on Comprehension and Calibration. Journal of Experimental Education, 85(1).

[a] Stahl, Bernd C. (2013). Teaching Ethical Reflexivity in Information Systems: How to Equip Students to Deal With Moral and Ethical Issues of Emerging Information and Communication Technologies. In Journal of Information Systems Education, v.22(3), pp. 253-260.

Stockholm Resilience Centre (2016). Planetary Boundaries

Rockström, J. (2010). Let the environment guide our development (video, 18:41 mins)

Course philosophy and located accountability

[a] de la Bellacasa, M. Puig (2012). ‘Nothing comes without its world’: thinking with care. In Sociological Review 60(2): 197-216

[a] Haraway, D. (1994). A game of cat's cradle: Science Studies, Feminist Theory, Cultural Studies. In Configurations 2(1).

[a] Haraway, D. (1988). Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective. In Feminist Studies 2(3)

[a] van der Velden, M. (2010). Undesigning culture: A brief reflection on design as ethical practice. InF. Sudweeks, H. Hrachovec and C. Ess (eds). Proceedings Cultural Attitudes Towards Communication and Technology 2010, Murdoch University, Australia, 117-123

[a] Latour, B. (2004). Why Has Critique Run out of Steam? From Matters of Fact to Matters of Concern. In Critical Inquiry 30(2): 225-248

[a] Wiener, N. (1960). Some Moral and Technical Consequences of Automation. In Science, New Series, 131(3410), pp. 1355-1358.

Meeting 2: Social & Economic Aspects of Design (Business and Human Rights / Corporate Social Responsibility)

Bauwens, Michel (2015). The Ten Commandments of Peer Production and Commons Economics

BBC Panorama (2015). Apple's Broken Promises (video, 55 mins): Workers making Iphone 6 and tin mining for Apple

China Labour Watch and Future in Our Hands (2015). Something is not right here: Poor working conditions persist at Apple Supplier Pegatron.

Friends of the Eart et al (2015). Katanga Calling.

[a] Fuchs, Christian (2013). Theorising and analysing digital labour: From global value chaines to modes of production. In: The Political Economy of Communication, 2(1), 3-27.

Good Electronics (2015). International Network on Human Rights and Sustainability in Electronics

IHRB (2014). Business and Human Rights

[a] Joerges, Bernward (1999). Do Politics Have Artefacts?. In Social Studies of Science, vol. 29, no. 3, pp. 411-431

Josephs, Hillary (2014). Production Chains and Workplace Law Violations: The case of Apple and Foxconn.Enough Project (2012). Conflict Minerals

How to extract gold from ... (Youtube search)

Open Net Society (2011). West Censoring East

Profundo (2015). Electronics, Mining, and Urban Mining

Wired (23 Oct. 2014). The Laborers Who Keep Dick Pics and Beheadings Out of Your Facebook Feed

Meeting 3: Ethics

[a] Ess, Charles (2007). Cybernetic pluralism in an emerging global information and computer ethics. In International Review of Information Ethics, vol. 7, no. 9, pp. 94-123.

Gee, David (2012). The Precautionary Principle (report).

Haly, Tim (2012). The unintented consequences of technology (website)

[a] Introna, Lucas D. (2007). Maintaining the reversibility of foldings: Making the ethics (politics) of information technology visible. In Ethics and Information Technology, vol. 9, no. 1, pp. 11-25.

[a] Jonas, Hans (1973). Technology and Responsibility: Reflections on the new tasks of ethics. In: Social Research, vol. 40, no. 1, pp. 31-54.

Levin, S. (2017). New AI can guess whether you're gay or straight from a photograph. The Guardian, 08.09.2017

[a] Kiran Asle H. (2011) Responsible Design: A Conceptual Look at Interdependent Design–Use Dynamics. In: Philosophy & Technology.

McFadden, Syreeta (2014). Teaching the Camera to See my Skin: Navigating photography's inherited bias against dark skin. On: Buzzfeed.

[a] Robertson, Toni (2006). Ethical Issues in Interaction Design. In: Ethics and Information Technology, no. 8, pp. 49–59.

[a] Star, Susan Leigh (1991). "Power, Technology and the Phenomenology of Conventions: on being allergic to onions". In John Law (ed), A sociology of monsters: Essays on power, technology and domination. London: Routledge, pp. 26-56

[a] Suchman, Lucy (2002). Local accountabilities in technology production Scandinavian Journal of Information Systems, 14(2).

[a] van der Velden, Maja (2011). When knowledges meet: Wikipedia and other stories from the contact zone. In Geert Lovink & Nathaniel Tkatz (eds.),Critical Point of View: A Wikipedia Reader.

[a] van der Velden, Maja and Christina Mörtberg (2016), Participatory Design and Design for Values. In van den Hoven et al. (eds.), Handbook of Ethics, Values, and Technological Design, pp. 41-66

[a] Verbeek, Peter-Paul (2006). Materializing Morality: Design Ethics and technological Mediation. In: Science, technology, & Human Values, 31(3):361-380. (or)

NENT (2007), Guidelines for research ethics in science and technology

Meeting 4: Social & Economic Aspects of Design (Circular Design)

BBC (2012). Secrets of the superbrands: Technology. (Documentary, 49 mins)

Cradle to Cradle: A Strategy of Hope MIT, 2010 (video 85 mins).

Cradle to Cradle Design: Waste = Food (by Rob van Hattum, VPRO, 2007)

Cradle to Cradle Design: William McDonough on Eco-Friendly Design, Standford University (video 72 mins).

Ellen MacArthur Foundation (2014).  Rethinking Progress (video 3.5 mins).

Meeting 5 and 6: Design & repair

iFixit (2016). iFixit: The free repir manual for everyone

Wiens, Kyle (2012). The shady world of repair manuals: Copyrighted for planned obsolescence.

Meeting 7: Theories of Technology

[a] Callon, M. (1984). Some elements of a sociology of translation: domestication of the scallops and the fishermen of St. Brieuc Bay. In J.J. Law, Power, action, and belief: a new sociology of knowledge? London, Routledge, pp. 196-223.

[a]Haraway, D. (1985). A Cyborg Manifesto. In The Virtual Handbook of Virtual Learning Environments,pp. 117-158. Springer.

[a] Mörtberg, Christina (1999). Technoscientific challenges in feminism. In NORA - Nordic Journal of Feminist and Gender Research, 7: 1, pp. 47-62

[a] Patrignani and Whitehouse, Diane (2014). Slow Tech: a quest for good, clean and fair ICT, Journal of Information, Communication and Ethics in Society, Vol. 12 Iss: 2, pp.78 - 92

[a] Pols, Jeanette (2010). Wonderful Webcams: About Active Gazes and Invisible Technologies. In: Science, Technology & Human Values, (36): 451-473

[a] Sommervold, M. (2016). "Doctor Smartphone: A critical discourse analysis of the Norwegian press' attitude toward M-health applications.

[a] Suchman, L. (2002). Located accountabilities in technology production. S

[a] Yaneva, A. (2009). Making the social hold: Towards an Actor Network Theory of design. In Design and Culture, 1(3): 273-288.

[a] Wyatt, Sally (2008). Technological determinism is dead: Long live technological determinism. In The Handbook of Science & Technology Studies, E. Hackett, O. Amsterdamska, M. Lynch and J. Wajcman (eds), Cambridge, MA: MIT Press, pp. 165-181.

Meeting 8: Automation


Angwin et al. (2016). Machine Bias. ProPublica.

[a] Arkin (2013). Lethal Autonomous Systems and the Plight of the Non-Combattant

Centre for the Study of the Drone

Harris, Sam (2017). Waking Up With Sam Harris #94 - The Future of Intelligence with Max Tegmark (podcast 89 mins)

[a] Mager, Astrid (2012). Algorythmic Ideology: How capitalist society shapes search engines. In Information, Communication & Society Vol. 15, No. 5, June 2012, pp. 769–787

Michaels, Russel, Simon Ardizzone, and Robert Carrillo Cohen (2006). Hacking Democracy. (video 81 mins).

Pro Publica (2016). Machine Bias: There’s software used across the country to predict future criminals. And it’s biased against blacks.

Levin, S. (2017). New AI can guess whether you're gay or straight from a photograph. The Guardian, 08.09.2017

Sample, Ian (2017). Computer says no: why making AIs fair, accountable and transparent is crucial. The Guardian, 05.11.2017

The Intercept (2015). The Drone Papers (leaked documents about Obama's drone wars).

van der Velden, M. (2015). Autonomous Weapon Systems (AWS).

Meeting 9: Privacy & Surveillance


[a] Adam, Alison (2005). Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine? In Ethics and Information Technology, vol 7, no. 4, pp. 233-242.

Cadwalladr, Caroline (2016). Google, democracy and the truth about internet search The Guardian (online)

Cavoukian, A. (2007). Privacy by Design: Foundational principles. Information & Privacy Commissioner, Ontario, Canada

[a] Ess, Charles (2011). Self, Community, and Ethics in Digital Mediatized Worlds. In Ess, Charles and Thorseth, May (eds.), Trust and Virtual Worlds: Contemporary Perspectives. New York: Lang, pp. 3-30.

[a] Grosser, Benjamin (2014). What Do Metrics Want. How Quantificaion Describes Social Interaction on Facebook. In: Computational Journal, no. 4, November 2014.

Hern, Alex (2016). Your battery status is being used to track you online. The Guardian (online)

[a] Kramer, Adam D.I., Jamie E. Guillory, and Jeffrey T. Hancock (2014). Experimental evidence of massive-scale emotional contagion through social networks. In: Proceedings of the National Academy of Sciences of the United States, vol. 111, no. 24.

Lodi, Simona (2010). Suicide Machine (website & video, 2:34 mins.)

Lovink, Geert (2012). What is the Social in Social media? In: e-flux, no. 40.

Matthias (2014). Delete Facebook (video, 4:52 mins.)

Pariser, Eli (2011). Beware of online "filter bubbles" (video, 9 mins.)

ProPublica (2016). What Facebook knows about you (tool for Google's Chrome browser)

Ramasastry, Anita (2012). Girls Around Me (website article)

[a] Shilton, Katie (2012). Value Levers: Building Ethics Into Design. In: Science Technology & Human Values (23).

Shirky, Clay (2+11). The Political Power of social media. In: Foreign Affairs, no. 28, pp. 28-41.

[a] Twenge, Jean M. (2013). Does Online Social Media Lead to Social Connection or Social Disconnection? In: Journal of College & Character, vol. 14, no. 1, pp. 11-20


[a] Andrejevic, Mark (2014). Wikileaks, Surveillance, and Transparency. In International Journal of Communication, no. 8.

Poitras, Laura (2014) Edward Snowden - Citizen Four. (NRK tv)

Datatilsynet (2014). Chilling down in Norway (report on Snowden effect)

[a] Introna, Lucas D. and David Woods (2004). Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems. In Surveillance & Society, vol. 2, no. 2/3, pp. 177-198.

NRK (2014) Smart eller overvåket? (doc. 28:53 mins)

Onion News Network (2011). CIA's "Facebook" Program Dramatically Cut Agency's Costs (video 3:32 mins).

[a] Richards, Neil M. (2013). The Dangers of Surveillance. Harvard Law Review, 2013.

Rusdal, E.H. (2017). Vandrehistorie ble virkelighet. Dagsavisen, 03.10.2017 (cameraphone takes a picture of you every time you tweet Donald Trump)

The Guardian (2017). Surveillance (special section with all articles on surveillance published in the Guardian).

Vlemmix, Peter (2012). Panopticum (60 mins)

Waddell, Kaveh (2015) The Moral Failure of Computer Scientists.The Atlantic (online)

Meeting 11: ICT & Development / Fluidity / Accountability

[a] Irani et all. (2010). Postcolonial Computing: A Lens on design and development. In Proceedings of CHI2010, April 10-15, 2010, Atlanta, Georgia, USA.

[a] Philip, Kavita, Irani, Lilly and Paul Dourish (2010). Postcolonial Computing: A Tactical Survey. In Science, Technology, & Human Values, 000(00), pp. 1-27.

[a] Moser, I. & J. Law (2003). Making Voices: New Media Technologies, Disabilities, and Articulation. In  Gunnar Liestøl, Andrew Morrison, and Terje Rasmussen (eds), Digital Media Revisited: Theoretical and Conceptual Innovation in Digital Domains, Cambridge, Mass., and London: MIT Press.

[a] Moser, I. & J. Law (2006). Fluids or flows? Information and qualculation in medical practice. In Information Technology & People , Vol. 19 Issue: 1, pp.55-73,

[a] van der Velden, Maja (2008). What's love got to do with IT? On ethics and accountability in telling technology stories. In F. Sudweeks, H. Hrachovec, (Eds), Cultural attitudes towards technology and communication 2008 (pp. 27-39). Murdoch: Murdoch University.

[a] Winschiers-Theophilus, Heiek et al. (2010). Being participated: a community approach. In: PDC'10 Proceedings of the 11th Biennial Participatory Design Conference, pp 1-10.

Meeting 12: Design & the end of life

[a] Blevis, Eli (2007). Sustainable Interaction Design: Invention & Disposal, Renewal & Reuse. CHI 2007 Proceedings

[a] Fry, Tony (2010). On Good design. Introduction to Unsettled: Inkahoots.

Gill, Alison and Abby Mellick Lopes (2012). Recoding abandoned products: Student visual designers experiment to sustain product lives and values. In: Art, Design & Communication in Higher Education, vol. 10, no. 2, pp. 233-253.

[a] Jung, Heekyoung, Shaowen Bardzell, Eli Blevis, James Pierce, Erik Stolterman (2011). How Deep Is Your Love: Deep Narratives of Ensoulment and Heirloom Status. International Journal


[a] Muis, Henk (2006). Eternally Yours. In: User Behavior and Technology Development, vol 20, pp 277-293

Leonard, Annie (2010). The Story of Electronics. (video 8 mins).

Meeting 13: Gender & technology

[a] Berg, Anne-Jorunn and Merete Lie (1995). Do Artifacts Have Gender?. Science Technology Human Values, vol. 20, no. 3, pp.332-351.

[a] Johnson, Deborah G. (2010). Sorting out the question of feminist technology. In: Feminist technology by Linda Layne, Sharra Vostral, and Kate Boyer (eds.)(36-54), University of Illinois.

[a] van der Velden, Maja and Christina Mörtberg (2012). Between Need and Desire: Exploring Strategies for Gendering Design. In: Science, Technology & Human Values, November, (37): 663-683

Damore case

Damore, James (2017).  Google’s Ideological Echo Chamber (the memo that started the discussion)

Doe, J. (2017). Here's your point by point refutation of the google memo, Medium, 7 August 2017)

Lee, C. (2017). I'm a woman in computer science. Let me ladysplain the Google memo to you. Vox, 11 August 2017.

The Economist (2017). The e-mail Larry Page should have written to James Damore. In The Economist, 19 August, 2017.

Wikipedia contributors (2017). Google's Ideological Echo Chamber.

      Project "Mobile"

      Jensen (2017). Hva er egentlig greia med Iphone? NRKbeta

      van den Meer (2016). Find my iPhone (video, 21.29 mins)

      Amnesty International. (2016). ‘This is what we die for’: Human rights abuses in the Democratic Republic of the Congo power the global trade in cobalt (p. 92). London: Amnesty International.

      Amnesty International. (2017). Time to Recharge: Corporate action and inaction to tackle abuses in the cobalt supply chain (p. 108). London: Amnesty International. Retrieved from

      Atiemo, S., Faabeluon, L., Manhart, A., Nyaaba, L., & Schleicher, T. (2016). Baseline Assessment on E-waste Management in Ghana. Retrieved from

      Ban Action Network. (2016). Scam Recycling: e-Dumping on Asia by US Recyclers (p. 65). Seattle: BAN.

      Chan, J., Fung, P., & Overeem, P. (2016). The Poisonous Pearl: Occupational chemical poisoning in the electronics industry in the Pearl River Delta, People’s Republic of China (p. 54). Amsterdam: Good Electronics. Retrieved from

      China Labor Watch. (2016a). Apple is the Source of Mistreatment of Chinese Workers (p. 21). CLW.

      China Labor Watch. (2016b). Study Casts Doubts on Apple’s Ethical Standards: Research on 1,261 pay stubs shows that Apple’s protection of workers is false advertisement (p. 24). New York: CLW.

      China Labor Watch. (2016c). The Dark Side of Samsung’s Corporate Social Responsibility Comparative Studies Cast Doubt on the Reliability of Samsung’s Sustainability Report (p. 17). New York: CLW.

      Cook, G., & Jardim, E. (2017). Guide to Greener  Electronics 2017: Company Report Card (p. 60). Washington: Greenpeace.

      de Haan, E., Scheele, F., & Kiezebrink, V. (2016). Cobalt blues: Environmental pollution and human rights violations in Katanga’s copper and cobalt mines (p. 59). Amsterdam: SOMO.

      Frankel, T. C. (2016, September 30). This is where your smartphone battery begins. Washington Post.

      Global Witness. (2016). River of Gold (p. 32). London: Global Witness.

      Greenpeace. (2017a). From Smart to Senseless: The Global Impact of 10 Years of Smartphones (p. 16). Washington.

      Greenpeace. (2017b). Guide to Greener Electronics (p. 22). Washington: Greenpeace International.

      Industriall, & ITUC. (2016). Samsung - Modern Tech, Medieval Conditions (p. 32). Geneva: Industriall.
      Institute for Applied Ecology. (2016). Resource Efficiency in the ICT Sector (p. 86). Berlin: Greenpeace Germany.

      Oeko-Institut. (2016). Outlining Environmental Challenges in the Non-Fuel Mining Sector (p. 11). Freiburg: Oeko-Institut.

      Partnership Africa Canada. (2017). The West African El Dorado: Mapping the Illicit Trade of Gold in Côte d’Ivoire, Mali and Burkina Faso (p. 28). Ottawa: PAC.

      Rucevska, I., Nellemann, C., & Isarin, N. (2015). Waste Crime - Waste Risks: Gaps in Meeting the Global Waste Challenge (A UNEP Rapid Response Assessment.). United Nations Environment Programme and GRID-Arendal, Nairobi and Arendal.

      Schipper, I., de Haan, E., & van Dorp, M. (2015). Gold from children’s hands: Use of child-mined gold by the electronics sector (p. 102). Amsterdam: SOMO.

      SOMO. (2015). There is more than 3TG: The need for the inclusion of all minerals in EU regulation for conflict due diligence (p. 15). Amsterdam: SOMO.

      UNDP. (2016). Mapping Mining to the Sustainable Development Goals: An Atlas (p. 77). UNDP.


      Published Nov. 2, 2017 8:14 PM - Last modified Nov. 29, 2017 8:52 PM