Overview
Comment:clarify week 4-5 lecture schedule
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA3-256: 3af915301a1f71468988ec96b97404c6e5df333c0d508af75ccac6133c052434
User & Date: jboy on 2021-04-27 09:40:44
Other Links: manifest | tags
Context
2021-04-29
12:11
update assignment 2 due date check-in: 8d4728bb9f user: jboy tags: trunk
2021-04-27
09:40
clarify week 4-5 lecture schedule check-in: 3af915301a user: jboy tags: trunk
2021-04-14
16:13
add Domino tool for assignment 2 check-in: 8116b14fa0 user: jboy tags: trunk
Changes

Modified docs/weeks/4.md from [e8f7ebe53e] to [ac3a505a11].

1
2
3
4
5
6
7
8
9
10
11
12
13
14
# Week 4

**No lecture this week.**

## Tutorial

Homework
: - Come up with a fictional research scenario and complete the [EFF risk assessment](https://ssd.eff.org/en/module/your-security-plan) for that hypothetical scenario. Think about what skills or tools you would need to mitigate the risks you identified.
- Browse some of the following resources and write down a few ideas for what you would like to work on for your second assignment:
    - <https://defendourmovements.org/resources/>
    - <https://myshadow.org/>
    - <https://securityinabox.org/en/>

During tutorials, you will discuss and plan the [second assignment](../assignments/2.md). This will require forming groups with two or three other students in your tutorial group and coming up with a contribution to the Hacking Ethnography collection.


|











1
2
3
4
5
6
7
8
9
10
11
12
13
14
# Week 4

**No lecture on Monday, but we do have a special lecture on Thursday (see [week 5](5.md)).**

## Tutorial

Homework
: - Come up with a fictional research scenario and complete the [EFF risk assessment](https://ssd.eff.org/en/module/your-security-plan) for that hypothetical scenario. Think about what skills or tools you would need to mitigate the risks you identified.
- Browse some of the following resources and write down a few ideas for what you would like to work on for your second assignment:
    - <https://defendourmovements.org/resources/>
    - <https://myshadow.org/>
    - <https://securityinabox.org/en/>

During tutorials, you will discuss and plan the [second assignment](../assignments/2.md). This will require forming groups with two or three other students in your tutorial group and coming up with a contribution to the Hacking Ethnography collection.

Modified docs/weeks/5.md from [a3332ff4fd] to [75b770dab4].

1
2
3


4
5
6
7
8
9
10
11
# Week 5

## Lecture



Readings
: - Wouters (2017)
- [Leiden Manifesto](http://www.leidenmanifesto.org/)

For this session we are honored to welcome Professor **Paul Wouters**, Dean of the Faculty of Social Sciences, who will speak from his vantage point about the ethics and politics of scientific knowledge production. Dean Wouters was a driving force behind the Leiden Manifesto on Research Metrics and, as a scholar of science and technology, he has studied important trends such as open science and mixed-methods research. He will also talk to us about issues that are unique to the Dutch social sciences and our own Faculty.

**No tutorials this week.**



>
>








1
2
3
4
5
6
7
8
9
10
11
12
13
# Week 5

## Lecture

**This lecture is scheduled for Thursday, May 6, at 14:30.**

Readings
: - Wouters (2017)
- [Leiden Manifesto](http://www.leidenmanifesto.org/)

For this session we are honored to welcome Professor **Paul Wouters**, Dean of the Faculty of Social Sciences, who will speak from his vantage point about the ethics and politics of scientific knowledge production. Dean Wouters was a driving force behind the Leiden Manifesto on Research Metrics and, as a scholar of science and technology, he has studied important trends such as open science and mixed-methods research. He will also talk to us about issues that are unique to the Dutch social sciences and our own Faculty.

**No tutorials this week.**