Reference no: EM132219979
For this assignment, you will write a short 3-page essay examining your own experiences with an evocative object. Writing this paper should help you start thinking critically about technology by reflecting on your personal experiences with technology and its relation to society.
Sherry Turkle (2008), a social informatics scholar, calls this approach "intimate ethnography"--"a way of listening that adds new dimensions to our understanding of how technologies affect our relationships and sensibilities" and "illuminates the subjective side of technological experience, how what we have made is woven into our ways of seeing and being in the world" (p. 14).
Refer to Gathman's "Cell Phones" article as an example of this genre, paying particular attention to how the author uses personal stories to describe and comment on broader social and cultural themes relating to technology use and design. Then, think and write about your own experiences and observations with an object that you are familiar with. Your object does not have to be computer-based.
For example: When and how do you use it? How does it fit into your daily practices? What kinds of practices does it enable and extend?
How does it limit your abilities to communicate and act? Who do you interact with while using the object?
Do you have experiences of using your chosen object in different ways depending on the application or context of use, or have you seen other people or groups use it differently?
You don't have to answer all of these questions; you can focus on those that make sense in your example and/or come up with your own main themes. Above all, it should be a story of you.
IMPORTANT
In the interest of encouraging student creativity, the teaching staff strongly suggests that you not write about the following: computer (including your laptop), computer game system, or computer-based music playing device (including iPods, MP3 players, etc.). You are not permitted to write about your mobile phone.
Analysis of the secure enterprise wireless network
: MN603 - Wireless Networks and Security - Analysis of the secure enterprise wireless network using WPA2 and the RADIUS server
|
Why do organization have information deficiency problem
: Discuss the relationship between data, information, and knowledge. Support your discussion with at least 3 academically reviewed articles.
|
What to do in order to avoid the given type of situation
: Create a 2-page executive summary explaining to your staff the significant of stocking, placing timely orders, and provide a step by step method.
|
Discuss the potential customers for this product
: Describe the product/service including the benefits of using the product/service. Discuss the potential customers for this product/service.
|
Write an essay examining your own experiences with evocative
: How does it limit your abilities to communicate and act? Who do you interact with while using the object?
|
Develop best practices for quality care across the dimension
: Develop best practices for quality care across the dimensions of end-of-life care, including the physical, psychological, spiritual, and interpersonal.
|
Discuss delicate balance between mission and profit margin
: Chief executive officer (CEO) Beranger is aware that there are many ethical issues that arise as health care organizations struggle to balance the commitment.
|
Create a nursing theory using given information
: NR393 Nursing history is being made today by exemplary nurses throughout the world. Select one registered nurse who is creating nursing history.
|
Define the vulnerability assessment requirement
: Define the vulnerability assessment requirement, propose a solution, and justify the solution.
|