SlideShare une entreprise Scribd logo
1  sur  14
Unpacking Feenberg’s Argument about Technological Determinism BHP 206, Fall 2009 Tim McGee
Organizational Preview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Andrew Feenberg ,[object Object],[object Object]
What Is the Philosophy of Technology? ,[object Object],[object Object]
Who Are Some Other Philosophers of Technology? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chart 1: Varieties of Theory Critical Theory (choice of alternative means-ends systems) Substantivism (means and ends linked in systems) Value-laden (means form a way of life that includes ends) Instrumentalism (liberal faith in progress) Determinism (e.g., traditional Marxism) Neutral (complete separation of means and ends) Humanly Controlled Autonomous Technology Is:
Gas Chamber Victims and Atomic Bomb Damage
Max Weber’s Pessimistic View of Modernity ,[object Object],[object Object]
Contra Weber, Feenberg Argues for “Democratic Rationalization” ,[object Object],[object Object],[object Object]
Faith in Progress Based on Two Widely Held Deterministic Beliefs ,[object Object],[object Object],[object Object]
Two Premises of Determinism ,[object Object],[object Object],[object Object]
Instead of Determinism: Constructivism ,[object Object],[object Object]
The Impact of Constructivism ,[object Object]
Implications of Constructivism ,[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Feminism
FeminismFeminism
FeminismN Jones
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Donna Haraway - Breaking Boundaries Through Sciece
Donna Haraway - Breaking Boundaries Through ScieceDonna Haraway - Breaking Boundaries Through Sciece
Donna Haraway - Breaking Boundaries Through Sciecemadigangrieve
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Second wave feminism
Second wave feminismSecond wave feminism
Second wave feminismlauren1980
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Feminist Theories.
Feminist Theories.Feminist Theories.
Feminist Theories.Joan Angcual
 

Tendances (20)

Introduction to feminism
Introduction to feminismIntroduction to feminism
Introduction to feminism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Feminism phd (1)
Feminism phd (1)Feminism phd (1)
Feminism phd (1)
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Feminism
FeminismFeminism
Feminism
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Postmodern feminism
Postmodern feminismPostmodern feminism
Postmodern feminism
 
Donna Haraway - Breaking Boundaries Through Sciece
Donna Haraway - Breaking Boundaries Through ScieceDonna Haraway - Breaking Boundaries Through Sciece
Donna Haraway - Breaking Boundaries Through Sciece
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Second wave feminism
Second wave feminismSecond wave feminism
Second wave feminism
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Ch6_ArtMusicMaleGaze
Ch6_ArtMusicMaleGazeCh6_ArtMusicMaleGaze
Ch6_ArtMusicMaleGaze
 
Feminist Theories.
Feminist Theories.Feminist Theories.
Feminist Theories.
 
Foucault by farij
Foucault by farijFoucault by farij
Foucault by farij
 

En vedette

Technological det visual
Technological det visualTechnological det visual
Technological det visualKrista Kennedy
 
The Anatomy of a Theory
The Anatomy of a TheoryThe Anatomy of a Theory
The Anatomy of a TheoryJahwella Ocay
 
New Technology Lecture L06 Diffusion of Innovation
New Technology Lecture L06 Diffusion of InnovationNew Technology Lecture L06 Diffusion of Innovation
New Technology Lecture L06 Diffusion of InnovationÓlafur Andri Ragnarsson
 
The Diffusion Of Technology
The Diffusion Of TechnologyThe Diffusion Of Technology
The Diffusion Of Technologyelizreed
 
Soft determinism
Soft determinismSoft determinism
Soft determinismJohn Ervin
 
Beyond technological determinism
Beyond technological determinismBeyond technological determinism
Beyond technological determinismClare Cook
 
Technodeterminism
TechnodeterminismTechnodeterminism
TechnodeterminismAndrew Dun
 
A Critical Theory of Library Technology: Libraries & Electronic Publishing
A Critical Theory of Library Technology:  Libraries & Electronic PublishingA Critical Theory of Library Technology:  Libraries & Electronic Publishing
A Critical Theory of Library Technology: Libraries & Electronic Publishingdesy
 
6 r marshall mc luhan
6 r marshall mc luhan6 r marshall mc luhan
6 r marshall mc luhanRbk Asr
 
'It’s not a laptop project. it’s an education project': The discursive constr...
'It’s not a laptop project. it’s an education project': The discursive constr...'It’s not a laptop project. it’s an education project': The discursive constr...
'It’s not a laptop project. it’s an education project': The discursive constr...Marcus Leaning
 
Coms 2003 toronto school
Coms 2003 toronto schoolComs 2003 toronto school
Coms 2003 toronto schoolJulie Pasho
 
CCR 633: Technological Determinism notes
CCR 633: Technological Determinism notesCCR 633: Technological Determinism notes
CCR 633: Technological Determinism notesKrista Kennedy
 
Technology and Social Communication
Technology and Social CommunicationTechnology and Social Communication
Technology and Social CommunicationChristian Katzenbach
 
Technological Determinism
Technological DeterminismTechnological Determinism
Technological DeterminismYasmin Hussain
 
The Medium Is The Message11
The Medium Is The Message11The Medium Is The Message11
The Medium Is The Message11tashwilliams
 
Technological determinism theory powerpoint
Technological determinism theory powerpointTechnological determinism theory powerpoint
Technological determinism theory powerpointElaine Humpleby
 

En vedette (20)

Technological det visual
Technological det visualTechnological det visual
Technological det visual
 
The Anatomy of a Theory
The Anatomy of a TheoryThe Anatomy of a Theory
The Anatomy of a Theory
 
Comm theory
Comm theoryComm theory
Comm theory
 
New Technology Lecture L06 Diffusion of Innovation
New Technology Lecture L06 Diffusion of InnovationNew Technology Lecture L06 Diffusion of Innovation
New Technology Lecture L06 Diffusion of Innovation
 
The Diffusion Of Technology
The Diffusion Of TechnologyThe Diffusion Of Technology
The Diffusion Of Technology
 
Soft determinism
Soft determinismSoft determinism
Soft determinism
 
Mass media theories
Mass media theoriesMass media theories
Mass media theories
 
Beyond technological determinism
Beyond technological determinismBeyond technological determinism
Beyond technological determinism
 
Technodeterminism
TechnodeterminismTechnodeterminism
Technodeterminism
 
Ppt11
Ppt11Ppt11
Ppt11
 
A Critical Theory of Library Technology: Libraries & Electronic Publishing
A Critical Theory of Library Technology:  Libraries & Electronic PublishingA Critical Theory of Library Technology:  Libraries & Electronic Publishing
A Critical Theory of Library Technology: Libraries & Electronic Publishing
 
6 r marshall mc luhan
6 r marshall mc luhan6 r marshall mc luhan
6 r marshall mc luhan
 
'It’s not a laptop project. it’s an education project': The discursive constr...
'It’s not a laptop project. it’s an education project': The discursive constr...'It’s not a laptop project. it’s an education project': The discursive constr...
'It’s not a laptop project. it’s an education project': The discursive constr...
 
Edrd 3160 chowdhury
Edrd 3160 chowdhuryEdrd 3160 chowdhury
Edrd 3160 chowdhury
 
Coms 2003 toronto school
Coms 2003 toronto schoolComs 2003 toronto school
Coms 2003 toronto school
 
CCR 633: Technological Determinism notes
CCR 633: Technological Determinism notesCCR 633: Technological Determinism notes
CCR 633: Technological Determinism notes
 
Technology and Social Communication
Technology and Social CommunicationTechnology and Social Communication
Technology and Social Communication
 
Technological Determinism
Technological DeterminismTechnological Determinism
Technological Determinism
 
The Medium Is The Message11
The Medium Is The Message11The Medium Is The Message11
The Medium Is The Message11
 
Technological determinism theory powerpoint
Technological determinism theory powerpointTechnological determinism theory powerpoint
Technological determinism theory powerpoint
 

Similaire à Unpacking Feenberg

"Questioning technology": an introduction to Critical Theory of Technology
"Questioning technology": an introduction to Critical Theory of Technology"Questioning technology": an introduction to Critical Theory of Technology
"Questioning technology": an introduction to Critical Theory of TechnologyLela Mosemghvdlishvili
 
A Critical Theory Of Technology
A Critical Theory Of TechnologyA Critical Theory Of Technology
A Critical Theory Of TechnologyJoe Andelija
 
Do artifacts have politics author(s) langdon winnersou
 Do artifacts have politics author(s) langdon winnersou Do artifacts have politics author(s) langdon winnersou
Do artifacts have politics author(s) langdon winnersouVivan17
 
Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx
 Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx
Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docxaryan532920
 
Interactivity and the problematic nature of a substantivist reading
Interactivity and the problematic nature of a substantivist readingInteractivity and the problematic nature of a substantivist reading
Interactivity and the problematic nature of a substantivist readingMarcus Leaning
 
Organization and technology pdf
Organization and technology pdfOrganization and technology pdf
Organization and technology pdfKan Yuenyong
 
SCIENCE TECHNOLOGY AND SOCIETY MODULE 1
SCIENCE TECHNOLOGY AND SOCIETY MODULE 1SCIENCE TECHNOLOGY AND SOCIETY MODULE 1
SCIENCE TECHNOLOGY AND SOCIETY MODULE 1PsalmGGeraldino
 
Theory of technology selami̇ yi̇ği̇t korucu
Theory of technology selami̇ yi̇ği̇t korucuTheory of technology selami̇ yi̇ği̇t korucu
Theory of technology selami̇ yi̇ği̇t korucuSelamiYiitKorucu
 
1 October 2012
1 October 20121 October 2012
1 October 2012renabivens
 
Isirc 2011 tim curtis we are all critical now
Isirc 2011 tim curtis   we are all critical nowIsirc 2011 tim curtis   we are all critical now
Isirc 2011 tim curtis we are all critical nowTim Curtis
 
Ethic&Technology
Ethic&TechnologyEthic&Technology
Ethic&Technologyjuliax
 
LARC Presentation ~ Simplexity
LARC Presentation ~ SimplexityLARC Presentation ~ Simplexity
LARC Presentation ~ SimplexityPhilip Mehler
 
Social constructionism of technology
Social constructionism of technologySocial constructionism of technology
Social constructionism of technologyFlorence Paisey
 
The philosophy of transhumanism
The philosophy of transhumanismThe philosophy of transhumanism
The philosophy of transhumanismEva Durall
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INClaire Cross
 
Neural Networks Models for Large Social Systems
Neural Networks Models for Large Social SystemsNeural Networks Models for Large Social Systems
Neural Networks Models for Large Social SystemsSSA KPI
 

Similaire à Unpacking Feenberg (20)

"Questioning technology": an introduction to Critical Theory of Technology
"Questioning technology": an introduction to Critical Theory of Technology"Questioning technology": an introduction to Critical Theory of Technology
"Questioning technology": an introduction to Critical Theory of Technology
 
A Critical Theory Of Technology
A Critical Theory Of TechnologyA Critical Theory Of Technology
A Critical Theory Of Technology
 
Week2 (STSP)
Week2 (STSP)Week2 (STSP)
Week2 (STSP)
 
Do artifacts have politics author(s) langdon winnersou
 Do artifacts have politics author(s) langdon winnersou Do artifacts have politics author(s) langdon winnersou
Do artifacts have politics author(s) langdon winnersou
 
Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx
 Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx
Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx
 
Interactivity and the problematic nature of a substantivist reading
Interactivity and the problematic nature of a substantivist readingInteractivity and the problematic nature of a substantivist reading
Interactivity and the problematic nature of a substantivist reading
 
Organization and technology pdf
Organization and technology pdfOrganization and technology pdf
Organization and technology pdf
 
SCIENCE TECHNOLOGY AND SOCIETY MODULE 1
SCIENCE TECHNOLOGY AND SOCIETY MODULE 1SCIENCE TECHNOLOGY AND SOCIETY MODULE 1
SCIENCE TECHNOLOGY AND SOCIETY MODULE 1
 
Theory of technology selami̇ yi̇ği̇t korucu
Theory of technology selami̇ yi̇ği̇t korucuTheory of technology selami̇ yi̇ği̇t korucu
Theory of technology selami̇ yi̇ği̇t korucu
 
10.1.1.10.1265
10.1.1.10.126510.1.1.10.1265
10.1.1.10.1265
 
Mechanism tilly
Mechanism tillyMechanism tilly
Mechanism tilly
 
1 October 2012
1 October 20121 October 2012
1 October 2012
 
Isirc 2011 tim curtis we are all critical now
Isirc 2011 tim curtis   we are all critical nowIsirc 2011 tim curtis   we are all critical now
Isirc 2011 tim curtis we are all critical now
 
Ethic&Technology
Ethic&TechnologyEthic&Technology
Ethic&Technology
 
LARC Presentation ~ Simplexity
LARC Presentation ~ SimplexityLARC Presentation ~ Simplexity
LARC Presentation ~ Simplexity
 
Social constructionism of technology
Social constructionism of technologySocial constructionism of technology
Social constructionism of technology
 
The philosophy of transhumanism
The philosophy of transhumanismThe philosophy of transhumanism
The philosophy of transhumanism
 
Development of Media Technologies
Development of Media TechnologiesDevelopment of Media Technologies
Development of Media Technologies
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT IN
 
Neural Networks Models for Large Social Systems
Neural Networks Models for Large Social SystemsNeural Networks Models for Large Social Systems
Neural Networks Models for Large Social Systems
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Unpacking Feenberg

  • 1. Unpacking Feenberg’s Argument about Technological Determinism BHP 206, Fall 2009 Tim McGee
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Chart 1: Varieties of Theory Critical Theory (choice of alternative means-ends systems) Substantivism (means and ends linked in systems) Value-laden (means form a way of life that includes ends) Instrumentalism (liberal faith in progress) Determinism (e.g., traditional Marxism) Neutral (complete separation of means and ends) Humanly Controlled Autonomous Technology Is:
  • 7. Gas Chamber Victims and Atomic Bomb Damage
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.