Overview
Comment:update assignment 2 due date
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA3-256: 8d4728bb9f940f2e94d8b0634f214d64762d692921b98509feddc088e4f55959
User & Date: jboy on 2021-04-29 12:11:00
Other Links: manifest | tags
Context
2021-04-29
12:54
fix typos check-in: 785a8ec603 user: jboy tags: trunk
12:11
update assignment 2 due date check-in: 8d4728bb9f user: jboy tags: trunk
2021-04-27
09:40
clarify week 4-5 lecture schedule check-in: 3af915301a user: jboy tags: trunk
Changes

Modified docs/assignments/2.md from [093befb661] to [1ebd2c917f].

1
2
3
4
5
6
7
8
9
10
11
# Assignment 2: Hacking Ethnography

Due date
: May 14, 15:00

Working in groups of up to four students, you will design and produce a contribution to a collection of public-facing resources on the theme of Hacking Ethnography. Your contribution can take one of several forms:

1. An instructional video (for instance, to show how to use a certain tool to secure research data).
2. A zine (for instance, to provide guidelines for how to protect the identities of your research participants).
3. A curated list of resouces (for instance, to help qualitative researchers understand potential risks of data-saturated environments).




|







1
2
3
4
5
6
7
8
9
10
11
# Assignment 2: Hacking Ethnography

Due date
: May 17, 15:00

Working in groups of up to four students, you will design and produce a contribution to a collection of public-facing resources on the theme of Hacking Ethnography. Your contribution can take one of several forms:

1. An instructional video (for instance, to show how to use a certain tool to secure research data).
2. A zine (for instance, to provide guidelines for how to protect the identities of your research participants).
3. A curated list of resouces (for instance, to help qualitative researchers understand potential risks of data-saturated environments).