Publication Cover
The Information Society
An International Journal
Volume 29, 2013 - Issue 5
912
Views
34
CrossRef citations to date
0
Altmetric
ARTICLES

Charting Sociotechnical Dimensions of Values for Design Research

, &
Pages 259-271 | Received 08 Oct 2012, Accepted 29 Jun 2013, Published online: 11 Oct 2013

REFERENCES

  • Akrich , M. 1992 . “ The de-scription of technological objects ” . In Shaping technology/building society , Edited by: Bijker , W. E. and Law , J. 205 – 24 . Cambridge , MA : MIT Press .
  • Alsheikh , T. , Rode , J. A. and Lindley , S. E. 2011 . “ (Whose) value-sensitive design: a study of long- distance relationships in an Arabic cultural context ” . In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work , 75 – 84 . New York , NY : ACM . http://doi.acm.org/10.1145/1958824.1958836
  • Anthony , D. , Kotz , D. and Henderson , T. 2007 . Privacy in location-aware computing environments . Pervasive Computing , 6 ( 4 ) : 64 – 72 .
  • Azenkot , S. , Prasain , S. , Borning , A. , Fortuna , E. , Ladner , R. E. and Wobbrock , J. O. 2011 . “ Enhancing independence and safety for blind and deaf-blind public transit riders ” . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 3247 – 56 . New York , NY : ACM . doi: 10.1145/1978942.1979424
  • Bardi , A. and Schwartz , S. H. 2003 . Values and behavior: Strength and structure of relations . Personality and Social Psychology Bulletin , 29 ( 10 ) : 1207 – 20 . doi: 10.1177/0146167203254602
  • Bennett , R. 2003 . Factors underlying the inclination to donate to particular types of charity . International Journal of Nonprofit and Voluntary Sector Marketing , 8 ( 1 ) : 12 – 29 . doi: 10.1002/nvsm.198
  • Beyer , H. and Holtzblatt , K. 1997 . Contextual design: Defining customer-centered systems , San Diego , CA : Morgan Kaufmann .
  • Borning , A. and Muller , M. 2012 . “ Next steps for value sensitive design ” . In Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems , 1125 – 34 . New York , NY : ACM . doi: 10.1145/2207676.2208560
  • Bowker , G. C. and Star , S. L. 2000 . Sorting things out: Classification and its consequences , Cambridge , MA : MIT Press .
  • Brey , P. 2000 . Method in computer ethics: Towards a multi-level interdisciplinary approach . Ethics and Information Technology , 2 ( 2 ) : 125 – 29 . doi: 10.1023/A:1010076000182
  • Brunton , F. and Nissenbaum , H. 2011 . Vernacular resistance to data collection and analysis: A political theory of obfuscation . First Monday , 16 ( 5 ) http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3493/2955
  • Capurro , R. 2005 . Privacy. An intercultural perspective . Ethics and Information Technology , 7 : 37 – 47 .
  • Cheng , A.-S. and Fleischmann , K. R. 2010 . Developing a meta-inventory of human values . Proceedings of the American Society for Information Science and Technology , 47 ( 1 ) : 1 – 10 . doi: 10.1002/meet.14504701232
  • Cheng , A.-S. , Fleischmann , K. R. , Wang , P. , Ishita , E. and Oard , D. W. 2012 . The role of innovation and wealth in the net neutrality debate: A content analysis of human values in congressional and FCC hearings . Journal of the American Society for Information Science and Technology , 63 ( 7 ) : 1360 – 73 . doi: 10.1002/asi.22646
  • Cockton , G. 2004 . “ From quality in use to value in the world ” . In Proceedings of CHI 2004 , 1287 – 90 . New York , NY : ACM .
  • Cohen , J. E. 2012 . Configuring the networked self: Law, code, and the play of everyday practice , New Haven , CT : Yale University Press .
  • Coleman , E. G. 2012 . Coding freedom: The ethics and aesthetics of hacking , Princeton , NJ : Princeton University Press .
  • Cox , L. P. , Dalton , A. and Marupadi , V. 2007 . “ SmokeScreen: Flexible privacy controls for presence-sharing ” . In Proceedings of the 5th International Conference on Mobile Systems, Applications and Services , 233 – 45 . New York , NY : ACM . doi: 10.1145/1247660.1247688
  • Dodge , M. and Kitchin , R. 2007 . Outlines of a world coming into existence”: Pervasive computing and the ethics of forgetting . Environment and Planning B: Planning and Design , 34 ( 3 ) : 431 – 45 .
  • Domínguez , V. R. 1989 . People as subject, people as object: Selfhood and peoplehood in contemporary Israel , Madison , WI : University of Wisconsin Press .
  • Dourish , P. 2001 . Where the action is: The foundations of embodied interaction , Cambridge, , MA : MIT Press .
  • Edwards , P. N. , Mayernik , M. S. , Batcheller , A. L. , Bowker , G. C. and Borgman , C. L. 2011 . Science friction: Data, metadata, and collaboration . Social Studies of Science , 41 ( 5 ) : 667 – 90 .
  • Ess , C. 2009 . Digital media ethics , Cambridge , , UK : Polity Press .
  • Fisher , E. 2007 . Ethnographic invention: Probing the capacity of laboratory decisions . NanoEthics , 1 ( 2 ) : 155 – 65 .
  • Flanagan , M. , Nissenbaum , H. and Howe , D. C. 2008 . “ Embodying values in technology: theory and practice ” . In Information technology and moral philosophy , Edited by: van den Hoven , J. and Weckert , J. 322 – 53 . Cambridge , , UK : Cambridge University Press .
  • Fleischmann , K. R. 2006a . Boundary objects with agency: A method for studying the design–use interface . The Information Society , 22 ( 2 ) : 77 – 87 .
  • Fleischmann , K. R. 2006b . Do-it-yourself information technology: Role hybridization and the design–use interface . Journal of the American Society for Information Science and Technology , 57 ( 1 ) : 87 – 95 .
  • Fleischmann , K. R. 2007a . The evolution of agency: Spectra of bioagency and cyberagency . The Information Society , 23 ( 5 ) : 361 – 71 .
  • Fleischmann , K. R. 2007b . Digital libraries with embedded values: Combining insights from LIS and science and technology studies . Library Quarterly , 77 ( 4 ) : 409 – 27 .
  • Fleischmann , K. R. 2008 . Digital libraries and human values: Human‐computer interaction meets social informatics . Proceedings of the American Society for Information Science and Technology , 44 ( 1 ) : 1 – 17 . doi: 10.1002/meet.1450440229
  • Fleischmann , K. R. 2009 . Sociotechnical interaction and cyborg–cyborg interaction: Transforming the scale and convergence of HCI . The Information Society , 25 ( 4 ) : 227 – 35 . doi: 10.1080/01972240903028359
  • Fleischmann , K. R. , Koepfler , J. A. , Robbins , R. W. and Wallace , W. A. 2011a . “ CaseBuilder: A GUI Web app for building interactive teaching cases ” . In Proceedings of the 74th Annual Meeting of the American Society for Information Science and Technology (flash drive) , Silver Spring , MD : ASIST .
  • Fleischmann , K. R. , Oard , D. , Cheng , A.-S. , Wang , P. and Ishita , E. 2009 . “ Automatic classification of human values: Applying computational thinking to information ethics ” . In Proceedings of the 72nd Annual Meeting of the American Society for Information Science and Technology (CD-ROM) , Silver Spring , MD : ASIST .
  • Fleischmann , K. R. , Robbins , R. W. and Wallace , W. A. 2011b . “ Collaborative learning of ethical decision-making via simulated cases ” . In Proceedings of the 2011 iConference , 319 – 26 . New York , NY : ACM .
  • Fleischmann , K. R. , Robbins , R. W. and Wallace , W. A. 2011c . Information ethics education in a multicultural world . Journal of Information Systems Education , 22 ( 3 ) : 191 – 202 .
  • Fleischmann , K. R. , Robbins , R. and Wallace , W. A. 2009 . Designing Educational cases for intercultural information ethics: The importance of diversity, perspectives, values and pluralism . Journal of Education for Library and Information Science , 50 ( 1 ) : 4 – 14 .
  • Fleischmann , K. R. and Wallace , W. A. 2006 . Ethical implications of values embedded in computational models: An exploratory study . Proceedings of the American Society for Information Science and Technology , 43 ( 1 ) : 1 – 16 . doi: 10.1002/meet.14504301254
  • Fleischmann , K. R. and Wallace , W. A. 2009 . Ensuring transparency in computational modeling . Communications of the ACM , 52 ( 3 ) : 131 – 34 . doi: 10.1145/1467247.1467278
  • Fleischmann , K. R. and Wallace , W. A. 2010 . Value conflicts in computational modeling . Computer , 43 ( 7 ) : 57 – 63 .
  • Fleischmann , K. R. , Wallace , W. A. and Grimes , J. M. 2010 . “ The values of computational modelers and professional codes of ethics: Results from a field study ” . In 2010 43rd Hawaii International Conference on System Sciences (HICSS) , 1 – 10 . New York , NY : IEEE . doi: 10.1109/HICSS.2010.400
  • Fleischmann , K. R. , Wallace , W. A. and Grimes , J. M. 2011d . “ Computational modeling and human values: A comparative study of corporate, academic, and government research labs ” . In 2011 44th Hawaii International Conference on System Sciences (HICSS) , 1 – 10 . New York , NY : IEEE . doi: 10.1109/HICSS.2011.123
  • Fleischmann , K. R. , Wallace , W. A. and Grimes , J. M. 2011e . How values can reduce conflicts in the design process: Results from a multi-site mixed-method field study . Proceedings of the American Society for Information Science and Technology , 48 ( 1 ) : 1 – 10 . doi: 10.1002/meet.2011.14504801147
  • Friedman , B. 1997 . Human values and the design of computer technology , Cambridge , , UK : Cambridge University Press .
  • Friedman , B. , Kahn , P. H. and Borning , A. 2006 . “ Value sensitive design and information systems ” . In Human–computer interaction and management information systems: Applications , Edited by: Galletta , D. and Zhang , P. Vol. 6 , 348 – 72 . New York , NY : M. E. Sharpe .
  • Friedman , B. and Nissenbaum , H. 1997 . “ Bias in computer systems ” . In Human Values and the design of computer technology , Edited by: Friedman , B. 21 – 40 . Cambridge , , UK : Cambridge University Press .
  • Gaver , W. W. 1991 . “ Technology affordances ” . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 79 – 84 . New York , NY : ACM . doi: 10.1145/108844.108856
  • Gibson , J. J. 1986 . “ The theory of affordances ” . In The ecological approach to visual perception , 127 – 43 . Hillsdale , NJ : Lawrence Erlbaum Associates .
  • Guth , W. D. and Tagiuri , R. 1965 . Personal values and corporate strategy . Harvard Business Review , 43 ( 5 ) : 123 – 32 .
  • Hara , N. and Rosenbaum , H. 2008 . Revising the conceptualization of computerization movements . The Information Society , 24 ( 4 ) : 229 – 45 .
  • Haraway , D. 1985 . “ The cyborg manifesto and fractured identities ” . In Social theory: The multicultural and classic readings , 597 – 604 . Boulder , CO : Westview Press .
  • Haraway , D. 2000 . “ A cyborg manifesto: Science, technology, and socialist-feminism in the late twentieth century ” . In The cybercultures reader , Edited by: Bell , D. and Kennedy , B. M. 291 – 324 . London , , UK : Routledge .
  • Hayes , G. R. , Gardere , L. M. , Abowd , G. D. and Truong , K. N. 2008 . “ CareLog: A selective archiving tool for behavior management in schools ” . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 685 – 94 . New York , NY : ACM . doi: 10.1145/1357054.1357164
  • Hegel , G. W. F. and Baillie , J. B. 2003 . The phenomenology of mind , Mineola , NY : Dover .
  • Himma , K. E. 2005 . A dualist analysis of abortion: Personhood and the concept of self qua experiential subject . Journal of Medical Ethics , 31 ( 1 ) : 48 – 55 . doi: 10.1136/jme.2002.000828
  • Hitlin , S. and Piliavin , J. A. 2004 . Values: Reviving a dormant concept . Annual Review of Sociology , 30 : 359 – 93 . doi: 10.2307/29737698
  • Iachello , G. , Smith , I. , Consolvo , S. , Chen , M. and Abowd , G. 2005 . “ Developing privacy guidelines for social location disclosure applications and services ” . In Proceedings of the 2005 Symposium on Usable Privacy and Security , 65 – 76 . New York , NY : ACM . http://portal.acm.org/citation.cfm?id=1073001.1073008
  • Ihde , D. 1990 . Technology and the lifeworld: From garden to earth , Bloomington , IN : Indiana University Press .
  • Jarvenpaa , S. L. and Leidner , D. E. 1998 . Communication and trust in global virtual teams . Journal of Computer-Mediated Communication , 3 ( 4 ) doi: 10.1111/j.1083-6101.1998.tb00080.x
  • Joerges , B. 1999 . Do politics have artefacts? . Social Studies of Science , 29 ( 3 ) : 411 – 31 . doi: 10.1177/030631299029003004
  • Johnson , D. G. 1997 . Is the global information infrastructure a democratic technology? . SIGCAS Computers and Society , 27 ( 3 ) : 20 – 26 . doi: 10.1145/270858.270865
  • Johnson , D. G. 2000 . Computer ethics, 3rd ed , Upper Saddle River , NJ : Prentice Hall .
  • Kaptelinin , V. and Nardi , B. 2012 . “ Affordances in HCI: Toward a mediated action perspective ” . In Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems , 967 – 76 . New York , NY : ACM . doi: 10.1145/2208516.2208541
  • Kling , R. 1996 . Computerization and controversy: Value conflicts and social choices , San Diego , CA : Academic Press .
  • Kling , R. 2000 . Learning about information technologies and social change: The contribution of social informatics . The Information Society , 16 ( 3 ) : 217 – 32 .
  • Kling , R. and Iacono , S. 1988 . The mobilization of support for computerization: The role of computerization movements . Social Problems , 35 ( 3 ) : 226 – 43 .
  • Kluckhohn , C. 1951 . “ Values and value-orientations in the theory of action: An exploration in definition and classification ” . In Toward a general theory of action , Edited by: Parsons , T. and Shils , E. 388 – 433 . Cambridge , MA : Harvard University Press .
  • Knobel , C. P. and Bowker , G. C. 2011 . Values in design . Communications of the ACM , 54 ( 7 ) : 26 – 28 .
  • Koepfler , J. A. and Fleischmann , K. R. 2011 . Classifying values in informal communication: Adapting the meta-inventory of human values for tweets . Proceedings of the American Society for Information Science and Technology , 48 ( 1 ) : 1 – 4 . doi: 10.1002/meet.2011.14504801116
  • Latour , B. 1992 . “ Where are the missing masses? The sociology of a few mundane artifacts ” . In Shaping technology/building society , Edited by: Bijker , W. E. and Law , J. 225 – 58 . Cambridge , MA : MIT Press .
  • Latour , B. 2007 . Reassembling the social: An introduction to actor-network-theory , Oxford , , UK : Oxford University Press .
  • Latour , B. 2008 . “ A cautious Prometheus? A few steps toward a philosophy of design (with special attention to Peter Sloterdijk) ” . In Proceedings of the 2008 Annual International Conference of the Design History Society , Edited by: Hackne , F. , Glynne , J. and Minto , V. 2 – 10 . Falmouth , , UK : Universal Publications .
  • Latour , B. and Woolgar , S. 1979 . Laboratory life: The social construction of scientific facts , Princeton , NJ : Princeton University Press .
  • Le Dantec , C. A. L. , Poole , E. S. and Wyche , S. P. 2009 . “ Values as lived experience: evolving value sensitive design in support of value discovery ” . In Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI) , 1141 – 1150 . Boston , MA : ACM . http://portal.acm.org/citation.cfm?id=1518701. 1518875&coll=ACM&dl=ACM&type=series&idx=SERIES260& part=series&WantType=Proceedings&title=CHI&CFID=301567 67&CFTOKEN=97894460
  • Leveson , N. G. and Turner , C. S. 1993 . An investigation of the Therac-25 accidents . Computer , 26 ( 7 ) : 18 – 41 . doi: 10.1109/ MC.1993.274940
  • Lin , P. , Abney , K. and Bekey , G. 2011 . Robot ethics: Mapping the issues for a mechanized world . Artificial Intelligence , 175 ( 5–6 ) : 942 – 49 . doi: 10.1016/j.artint.2010.11.026
  • Loo , S. 2012 . “ Design-ing ethics ” . In Design and ethics: Reflections on practice , Edited by: Felton , E. , Zelenko , O. and Vaughan , S. 10 – 19 . London , , UK : Routledge .
  • MacKenzie , D. 2008 . An engine, not a camera: How financial models shape markets , Cambridge, , MA : MIT Press .
  • Manders-Huits , N. and Zimmer , M. 2009 . Values and pragmatic action: The challenges of introducing ethical intelligence in technical and design communities . International Review of Information Ethics , 10 : 37 – 44 .
  • McGregor , J. and Wetmore , J. M. 2009 . Researching and teaching the ethics and social implications of emerging technologies in the laboratory . NanoEthics , 3 ( 1 ) : 17 – 30 .
  • Miller , J. K. , Friedman , B. and Jancke , G. 2007 . “ Value tensions in design: The value sensitive design, development, and appropriation of a corporation's groupware system ” . In Proceedings of the 2007 International ACM Conference on Supporting Group Work , 281 – 90 . New York , NY : ACM . http://portal.acm.org/citation.cfm?id=1316624.1316668
  • Monahan , T. 2006 . “ Questioning surveillance and security ” . In Surveillance and security: Technological politics and power in everyday life , 1 – 23 . New York , NY : Routledge .
  • Nissenbaum , H. 2009 . Privacy in context: Technology, policy, and the integrity of social life , Stanford , CA : Stanford Law Books .
  • Nissenbaum , H. 2011 . From preemption to circumvention: If technology regulates, why do we need regulation (and vice versa)? . Berkeley Technology Law Journal , 26 ( 3 ) : 1367 – 86 .
  • Norman , D. A. 1988 . The psychology of everyday things , New York , NY : Basic Books .
  • Pfaffenberger , B. 1992 . Technological dramas . Science, Technology & Human Values , 17 ( 3 ) : 282 – 312 . doi: 10.1177/016224399201700302
  • Pollock , N. and Williams , R. 2010 . The business of expectations: How promissory organizations shape technology and innovation . Social Studies of Science , 40 ( 4 ) : 525 – 48 . doi: 10.1177/ 0306312710362275
  • Posner , B. Z. and Schmidt , W. H. 1993 . Values congruence and differences between the interplay of personal and organizational value systems . Journal of Business Ethics , 12 ( 5 ) : 341 – 47 . doi: 10.1007/BF00882023
  • Rahmati , N. 2000 . “ The impact of cultural values on computer-mediated group work ” . In Proceedings, Cultural Attitudes Towards Technology and Communication , 257 – 274 . Perth , , Australia : Murdoch University .
  • Rokeach , M. 1973 . The nature of human values , New York , NY : Free Press .
  • Schuler , D. and Namioka , A. 1993 . Participatory design: Principles and practices , Hillsdale , NJ : Lawrence Erlbaum Associates .
  • Schwartz , S. H. 1992 . “ Universals in the content and structure of values: Theory and empirical tests in 20 countries ” . In Advances in experimental social psychology , Edited by: Zanna , M. Vol. 25 , 1 – 65 . New York , NY : Academic Press .
  • Schwartz , S. H. 2007 . “ Value orientations: measurement, antecedents and consequences across nations ” . In Measuring attitudes cross-nationally: Lessons from the European Social Survey , Edited by: Jowell , R. , Roberts , C. , Fitzgerald , C. and Eva , G. 169 – 203 . London , , UK : Sage .
  • Sclove , R. E. 1995 . Democracy and technology , New York , NY : Guilford Press .
  • Sengers , P. , Boehner , K. , David , S. and Kaye , J. 2005 . “ Reflective design ” . In Proceedings of the 4th Decennial Conference on Critical Computing: Between sense and sensibility , 49 – 58 . New York , NY : ACM . http://doi.acm.org/10.1145/1094562.1094569
  • Shilton , K. 2010 . “ Technology development with an agenda: Interventions to emphasize values in design ” . In Proceedings of the 73rd Annual Meeting of the American Society for Information Science & Technology , Vol. 47 , Silver Spring , MD : ASIST . flash drive
  • Shilton , K. 2013 . Values levers: building ethics into design . Science, Technology & Human Values , 38 ( 3 ) : 374 – 97 . doi: 10.1177/ 0162243912436985
  • Siegrist , M. , Cvetkovich , G. and Roth , C. 2000 . Salient value similarity, social trust, and risk/benefit perception . Risk Analysis , 20 ( 3 ) : 353 – 62 . doi: 10.1111/0272-4332.203034
  • Spates , J. L. 1983 . The sociology of values . Annual Review of Sociology , 9 : 27 – 49 .
  • Spiekermann , S. and Cranor , L. F. 2009 . Engineering privacy . IEEE Transactions on Software Engineering , 35 ( 1 ) : 67 – 82 .
  • Star , S. L. 1999 . The ethnography of infrastructure . American Behavioral Scientist , 43 ( 3 ) : 377 – 91 .
  • Suchman , L. 2007 . Human–machine reconfigurations, 2nd ed , New York , NY : Cambridge University Press .
  • Verbeek , P.-P. 2006 . Materializing morality . Science, Technology & Human Values , 31 ( 3 ) : 361 – 80 .
  • Wetmore , J. M. 2007 . Amish technology: Reinforcing values and building community . Technology and Society Magazine, IEEE , 26 ( 2 ) : 10 – 21 . doi: 10.1109/MTAS.2007.371278
  • Winner , L. 1980 . Do artifacts have politics? . Daedalus , 109 ( 1 ) : 121 – 36 .
  • Winner , L. 1989 . The whale and the reactor: A search for limits in an age of high technology. , Chicago , IL : University of Chicago Press .
  • Woelfer , J. P. and Hendry , D. G. 2010 . “ Homeless young people's experiences with information systems: life and work in a community technology center ” . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 1291 – 300 . New York , NY : ACM . doi: 10.1145/1753326.1753520
  • Woelfer , J. P. , Iverson , A. , Hendry , D. G. , Friedman , B. and Gill , B. T. 2011 . “ Improving the safety of homeless young people with mobile phones: values, form and function ” . In Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems , 1707 – 16 . New York , NY : ACM . doi: 10.1145/1978942.1979191

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.