Wk Date Type Activity
1 Aug 26 Lecture What is social reality? How does technology construct it?
Case study Age verification on the internet: surveillance and the dissolution of privacy in the name of security
Exercise How to research: good websites, magazines, archives
Homework Research a technology
Reading Chatbots Can Go Into a Delusional Spiral. Here’s How It Happens. (non-paywalled PDF)
“Reading”
(a video) “How Power Shapes Reality: The Philosophy of Michel Foucault”
2 Sept 2 Student presentations What does your technology do? How does it work?
Case study ChatGPT, affirmative UX, psychosis
Exercise Identifying visual essence: how can an aesthetic characteristic reveal something about an idea?
Video (Time permitting) Yotam Hadar, “Graphic Design is Easy”
Reading Liz Pelly, “The Ghosts in the Machine: Spotify’s plot against musicians” (non-paywalled PDF)
3 Sept 9 Student presentations Exercises (est 1 hour)
Case study Spotify, subscription models, renter economies, fake art (est 15 mins)
Exercise Methodologies for understanding social reality (est 45 mins)
Lecture How does visual language transmit social reality? (est 1 hour)
Reading Jackie Wang, “This Is a Story About Nerds and Cops: PredPol and Algorithmic Policing"
Homework Email your reading responses
4 Sept 16 NO CLASS Work on your projects
5 Sept 23 Student presentations Project 1 critiques
Reading Metahaven, “Can Jokes Bring Down Governments?”
6 Sept 30 Case study Google Notebook: comparing your experience to this AI summary
Lecture Visual forms for counter-narratives: Parody and satire
Exercise How to exaggerate
Reading Rick Poynor, “Appropriation” (from “No More Rules: Graphic Design and Postmodernism”)
7 Oct 7 Lecture Visual forms for counter-narratives: Appropriation and inversion
Case study Predictive policing, the construction of suspicion, the category of “criminal”
Site visit Pratt’s picture collection
Exercise Recontextualization through collage
Reading James Bridle, "All Cameras Are Police Cameras"
8 Oct 14 NO CLASS Indigenous Peoples Day
9 Oct 21 Lecture Visual forms for counter-narratives: Refusal and abstinence
Exercise Rule following: commitment to logic systems
Reading Zeynep Tufekci, "Twitter and Tear Gas: The Power and Fragility of Networked Protest"
10 Oct 28 Site visit Lubalin Center
Case study Push and pull dynamics present in personalization algorithms and political protest
11 Nov 4 Student presentations Your best work from Project 2
Reading
TOP PRIORITY Rita Felsky, “The Limits of Critique” (introduction only) (EPUB) (D
Reading
SUPPLEMENTARY Anthony Dunne & Fiona Raby, “Critical Design FAQ”
Reading
SUPPLEMENTARY Franciso Laranjo, “Critical Graphic Design: Critical of What?”
12 Nov 11 Lecture + Discussion The critical position: how we got here and what lies beyond it
Video Three phenomena to question the computer:
  1. Quantum computing and the limits of encryption
  2. Single event upsets and random data corruption
  3. The end of the Unix epoch and the one-time rupture of chronological ordering | | | | Reading | Maggie Nelson, “On Freedom” | | | | | | | 13 | Nov 18 | Discussion | The knot of freedom and unfreedom | | | | One-on-one meetings | Review your semester, individualized advice | | | | Workshop | Documentation workshop: build your own copy stand | | | | In class working (time permitting) | Work on Project 3 | | | | Optional Reading | Donna J. Haraway, “Staying With The Trouble” | | | | | | | 14 | Nov 25 | Student presentations | Project 3 critiques | | | | | | | 15 | Dec 2 | Student presentations | Project 3 critiques | | | | | |