JCU Logo

JOHN CABOT UNIVERSITY

COURSE CODE: "CMS 365 H"
COURSE NAME: "Selfies and Beyond: Exploring Networked Identities - HONORS (This course carries 4 semester hours of credits. A minimum CUM GPA of 3.5 is required)"
SEMESTER & YEAR: Spring 2020
SYLLABUS

INSTRUCTOR: Donatella Della Ratta
EMAIL: [email protected]
HOURS: MW 4:30-5:45 PM
TOTAL NO. OF CONTACT HOURS: 45
CREDITS: 3
PREREQUISITES: Prerequisite: COM 311
OFFICE HOURS:

COURSE DESCRIPTION:
This course explores the state of the online self—the multiple ways in which identities and subjectivities are constructed in the networked environment—with an emphasis on social networking platforms (Instagram, Tinder, Facebook, etc.). The course ties networked identity’s impact on a number of current topics, including celebrity, consumer culture, dating, gender, violence, emotion, affect, big data, surveillance, collective action, and privacy. The central question explored throughout the course is how identities and subjectivities are shaped in a networked environment, and how they, in their turn, shape culture, social dynamics and politics in everyday life.
SUMMARY OF COURSE CONTENT:
This course explores the state of the online self—the multiple ways in which identities and subjectivities are constructed in the networked environment—with an emphasis on social networking platforms (Instagram, Tinder, Facebook, etc.). The course ties networked identity’s impact on a number of current topics, including celebrity, consumer culture, dating, gender, violence, emotion, affect, big data, surveillance, collective action, and privacy. The central question explored throughout the course is how identities and subjectivities are shaped in a networked environment, and how they, in their turn, shape culture, social dynamics and politics in everyday life.
LEARNING OUTCOMES:
This course explores the state of the online self—the multiple ways in which identities and subjectivities are constructed in the networked environment—with an emphasis on social networking platforms (Instagram, Tinder, Facebook, etc.). The course ties networked identity’s impact on a number of current topics, including celebrity, consumer culture, dating, gender, violence, emotion, affect, big data, surveillance, collective action, and privacy. The central question explored throughout the course is how identities and subjectivities are shaped in a networked environment, and how they, in their turn, shape culture, social dynamics and politics in everyday life.
TEXTBOOK:
NONE
REQUIRED RESERVED READING:
NONE

RECOMMENDED RESERVED READING:
NONE
GRADING POLICY
-ASSESSMENT METHODS:
AssignmentGuidelinesWeight
'Bring your own example' - reflections on the assigned readingsStudents are required to provide a short paragraph connecting the weekly readings to a relevant example, when required. Extra reflections will be required for H students. 5%
attendance and participation See attendance requirements here below. Participation includes doing the assigned readings and actively contributing to class discussions. Each student (alone or in team with another, depending on total number of students) has to lead one group discussion during the semester based on the assigned readings10%
Media 'Experiments'Students are required to exercise in auto-ethnography applying theoretical frameworks & perspectives studied in class to their daily experience of social networking platforms and other online environments. Detailed guidelines will be provided. 20%
Participation to 'Digital Delights & Disturbances' lecture series Students are required to attend 3 sessions of the lecture series. A detailed calendar with dates & event description will be provided at the beginning of the semester. 5%
'Selfie on Self'video essay10%
Final research paper and oral presentationStudents are required to write a final research paper (20%). The paper will be presented during the finals (10%). Detailed guidelines to be provided. H students will be requested to hand in a longer paper with extra research sources. 30%
Midterm Classroom exam20%

-ASSESSMENT CRITERIA:
AWork of this quality directly addresses the question or problem raised and provides a coherent argument displaying an extensive knowledge of relevant information or content. This type of work demonstrates the ability to critically evaluate concepts and theory and has an element of novelty and originality. There is clear evidence of a significant amount of reading beyond that required for the course.
BThis is highly competent level of performance and directly addresses the question or problem raised.There is a demonstration of some ability to critically evaluatetheory and concepts and relate them to practice. Discussions reflect the student’s own arguments and are not simply a repetition of standard lecture andreference material. The work does not suffer from any major errors or omissions and provides evidence of reading beyond the required assignments.
CThis is an acceptable level of performance and provides answers that are clear but limited, reflecting the information offered in the lectures and reference readings.
DThis level of performances demonstrates that the student lacks a coherent grasp of the material.Important information is omitted and irrelevant points included.In effect, the student has barely done enough to persuade the instructor that s/he should not fail.
FThis work fails to show any knowledge or understanding of the issues raised in the question. Most of the material in the answer is irrelevant.

-ATTENDANCE REQUIREMENTS:
This course explores the state of the online self—the multiple ways in which identities and subjectivities are constructed in the networked environment—with an emphasis on social networking platforms (Instagram, Tinder, Facebook, etc.). The course ties networked identity’s impact on a number of current topics, including celebrity, consumer culture, dating, gender, violence, emotion, affect, big data, surveillance, collective action, and privacy. The central question explored throughout the course is how identities and subjectivities are shaped in a networked environment, and how they, in their turn, shape culture, social dynamics and politics in everyday life.
ACADEMIC HONESTY
As stated in the university catalog, any student who commits an act of academic dishonesty will receive a failing grade on the work in which the dishonesty occurred. In addition, acts of academic dishonesty, irrespective of the weight of the assignment, may result in the student receiving a failing grade in the course. Instances of academic dishonesty will be reported to the Dean of Academic Affairs. A student who is reported twice for academic dishonesty is subject to summary dismissal from the University. In such a case, the Academic Council will then make a recommendation to the President, who will make the final decision.
STUDENTS WITH LEARNING OR OTHER DISABILITIES
John Cabot University does not discriminate on the basis of disability or handicap. Students with approved accommodations must inform their professors at the beginning of the term. Please see the website for the complete policy.

SCHEDULE

Class Schedule 

Week 1: Applying auto-ethnography to the study of the online self 

Introduction to the class and to auto-ethnography as a research method 

http://www.qualitative-research.net/index.php/fqs/article/view/1589/3095 

Week 2: The networked self and the social: a theoretical orientation

How does technology impact on the understanding of society, and on man’s own sense of the body?

Excerpts from:

Baudrillard, J. (1983) In the shadow of the silent majorities… or the end of the social and other essays. New York: Semiotext(e).

McLuhan, M. (1996) The Medium is the Massage. Berkeley: Ginko Press. 



Week 3: Identity and subjectivity formation of the online self 

How has the self become a media object? How is our sense of identity created and displayed publicly? What are the consequences?

Excerpts from:

Tiidenberg, K. (2018) SELFIES: Why We Love (and Hate) Them. Bingley: Emerald Publishing. 

Lovink, G. (2016) On Social Media Ideology. E-flux #75, September.


Week 4: Affect theories 

How do we understand and study the online self?

Excerpts from:

Hillis, K., Paasonen, S., and Petit, M., eds., NetworkedAffect. Cambridge, MA, and London: MIT Press. 

Tiidenberg, K. (2018) SELFIES: Why We Love (and Hate) Them. Bingley: Emerald Publishing. 


Week 5: Virality and (hashtag) visibility 

How do data and people become visible and sharable online? Does hashtag visibility form new collectivities?

Dean, J. (2016) Images without Viewers: Selfie communism. Foto-Museum blog post.

Jenkins, H., Ford, S., and Green, J. (2013) Spreadable Media. Creating Value and Meaning in a Networked Culture. New York and London: New York University Press.



Week 6: Celebrities, consumer culture and the ‘edited self’ 

How do networked technologies affect identity presentation and social interaction? How is the ‘edited self’ displayed in public? What happens when average people can influence large audiences through social networking platforms?

Excerpts from:

Senft, T. (2013) ‘Microcelebrity and the Branded Self’. In Hartley, Burgess and Bruns eds., Blackwell Companion to New Media Dynamics. Chicester: Wiley-Blackwell.

Abidin, C. (2014). ‘#In$tagLam: Instagram as a repository of taste, a brimming marketplace, a war of eyeballs’. In Berry and Schleser eds., Mobile Media Making in the Age of Smartphones.New York: Palgrave Pivot.

Week 7: Gender, sexuality and dating 

How does the networked environment shape and reflect gendered subjectivities? How do forms of the online self become central to mediated sexual cultures, from flirting to dating to hooking-up?

Excerpts from: 

Senft, T. (2008) Camgirls: celebrity and community in the age of social networks. New York: Peter Lang Publishing 

Illouz,  E. (2007) Cold Intimacies: The Making of Emotional Capitalism,Cambridge, UK: Polity Press. 



Week 8

Recap and midterm exam

Week 9: Violence and visibility of the online self 

What does it happen when the online self takes violent forms, when mundane practices such as Instagramming and taking selfies become instruments of violence? 

Excerpts from: 

Hegghammer T., ed (2017) Jihadi Culture: the art and social practice of militant islamists.Cambdrigde: Cambridge University Press. 

Kuntsman, A. and Stein, R. (2015) Digital Militarism: Israel’s occupation in the social media age. Stanford: Stanford University Press. 



Week 10:Networked emotions 

How do sadness, anxiety, boredom, and other ‘moods’ of the self transform and manifest in the networked environment?

Excerpts from:

McDonough, T. ed. (2017). Boredom. Cambridge, Massachussetts: The MIT Press.

Broder, M. (2016) So Sad Today. New York and Boston: Grand Central Publishing. 



Week 11: Affective networks 

How does the production of affect drive the networks’ economy? What new forms of labor are produced within a networked environment?

Excerpts from:

Wark, M. (2013) The Spectacle of Disintegration: situationist passages out of the Twentieth century. London and New York: Verso.

Hillis, K., Paasonen, S., and Petit, M., eds., NetworkedAffect. Cambridge, MA, and London: MIT Press. 

 

Week 12: Dataveillance and algorithmic cultures

Is software innocent? Are data numb? What happens when emotions and feelings are constantly turned into data, controlled and sold to corporations and governments, leaked and hacked by criminals for malicious purposes? 


Excerpts from:

van Dijck, J. (2014). Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology. Surveillance and Society 12(2). 

Chun, W. (2011) Programmed Visions; Software and Memory. Cambridge, Massachussets: The MIT Press. 

Recommended readings

Cheney-Lippold, J. (2017) , We Are Data. Algorithms and the Making of Our Digital Selves, New York: New York University Press. 

Cohen, J. E. (2016) The Surveillance-Innovation Complex: The Irony of the Participatory Turn, in Barney, D. et al. (eds)The Participatory Condition in the Digital Age, Minneapolis – London: University of Minnesota Press.

Case studies on algorithmic predictability (Facebook, Instagram, YouTube) and data mining scandals (Cambridge Analytica, etc)



Week 13 Mask design, anonymity, and new forms of collective action 

Is there any free space left to design new identities and new forms of collective action escaping data mining, corporate, state and peer surveillance? and what premises are hidden in contemporary crypto-design projects?

Excerpts from: 

Coleman, G. (2013). Anonymous in Context: the politics and power behind the mask. Internet Governance Papers. Waterloo, Ontario: The Centre for International Governance Innovation.



deSeriis, M. (2015). Improper names: collective pseudonyms from the Luddites to Anonymous. Minneapolis: University of Minnesota Press. 

  

Week 14: Privacy and the right to digital death

What is the meaning of privacy when public self-disclosure makes the real added value of the networked economy? Is there a way out from being constantly profiled and ranked? Can our digital selves be killed and forgotten? 

Excerpts from:

Senft, T. (2015)’ The skin of the selfie’. In Bieber, A. ed. Ego Update: the future of digital identity. Dusseldorf: NRW Forum Publication. 

Mayer-Schönberger, V. (2009) ‘Reintroducing Forgetting’. Chapter VI, in Delete. The Virtue of Forgetting in the Digital Age. Princeton and Oxford: Princeton University Press.