Human values, ethics, and design
暂无分享,去创建一个
[1] J. Moor. What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.
[2] Johannes Britz,et al. Rethinking the ownership of information in the 21st century: Ethical implications , 2000, Ethics and Information Technology.
[3] Terry Winograd,et al. Categories, disciplines, and social coordination , 1997, Computer Supported Cooperative Work (CSCW).
[4] Thomas W. Malone,et al. Commentary on Suchman article and Winograd response , 1994, Computer Supported Cooperative Work (CSCW).
[5] Mikko Korpela,et al. Community Participation in Health Informatics in Africa: An Experiment in Tripartite Partnership in Ile-Ife, Nigeria , 2004, Computer Supported Cooperative Work (CSCW).
[6] Peter H. Kahn,et al. Children and Nature: Psychological, Sociocultural and Evolutionary Investigations , 2003 .
[7] Alan Borning,et al. An extensible, modular architecture for simulating urban development, transportation, and environmental impacts , 2001, Comput. Environ. Urban Syst..
[8] Lars Mathiassen,et al. Computers and Design in Context , 2003 .
[9] Richard Boyd,et al. How to be a Moral Realist , 2002 .
[10] I. Kant,et al. Groundwork for the Metaphysics of Morals , 2002 .
[11] Virgilio Pinera,et al. Culture and Morality , 2002 .
[12] Batya Friedman,et al. Informed consent in the Mozilla browser: implementing value-sensitive design , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[13] Anne R. Jacobs,et al. The impact of awareness technologies on privacy litigation , 2001 .
[14] Herman T. Tavani,et al. The Internet, ethical values, and conceptual frameworks: an introduction to Cyberethics , 2001, CSOC.
[15] Stephen Farrell,et al. Social and informational proxies in a fishtank , 2001, CHI Extended Abstracts.
[16] Jun Zheng,et al. Trust without touch: jump-start trust with social chat , 2001, CHI Extended Abstracts.
[17] Darren Gergle,et al. Being there versus seeing there: trust via video , 2001, CHI Extended Abstracts.
[18] Chauncey E. Wilson,et al. Ethics in HCI , 2001, CHI Extended Abstracts.
[19] Kristina Höök,et al. Social navigation research agenda , 2001, CHI Extended Abstracts.
[20] Michael Cooper,et al. Case study: localization of an accessibility evaluation , 2001, CHI Extended Abstracts.
[21] Peter Korn,et al. What I need is what I get: downloadable user interfaces via Jini and Java , 2001, CHI Extended Abstracts.
[22] Batya Friedman,et al. Cookies and Web browser design: toward realizing informed consent online , 2001, CHI.
[23] Johan Aberg,et al. An empirical study of human Web assistants: implications for user support in Web information systems , 2001, CHI.
[24] Anoop Gupta,et al. Linking public spaces: technical and social issues , 2001, CHI.
[25] Kristina Höök,et al. Social navigation of food recipes , 2001, CHI.
[26] Kori Inkpen Quinn,et al. Single display privacyware: augmenting public displays with private information , 2001, CHI.
[27] Marina Umaschi Bers,et al. Identity construction environments: supporting a virtual therapeutic community of pediatric patients undergoing dialysis , 2001, CHI.
[28] Sara Jones,et al. Trust requirements in e-business , 2000, CACM.
[29] Batya Friedman,et al. Trust online , 2000, CACM.
[30] Andrea Basso,et al. Interpersonal trust and common ground in electronically mediated communication , 2000, CSCW '00.
[31] Judith S. Olson,et al. i2i trust in e-commerce , 2000, CACM.
[32] James D. Herbsleb,et al. Ensuring privacy in presence awareness: an automated verification approach , 2000, CSCW '00.
[33] Leysia Palen,et al. Going wireless: behavior & practice of new mobile phone users , 2000, CSCW '00.
[34] Allen E. Milewski,et al. Providing presence cues to telephone users , 2000, CSCW '00.
[35] Christopher Edwards,et al. The effects of filtered video on awareness and privacy , 2000, CSCW '00.
[36] Ben Shneiderman,et al. Designing trust into online experiences , 2000, CACM.
[37] Michael J. Muller,et al. Designing to support adversarial collaboration , 2000, CSCW '00.
[38] Clifford Nass,et al. Speech interfaces from an evolutionary perspective , 2000, CACM.
[39] C. Borgman. From Gutenberg to the Global Information Infrastructure , 2000 .
[40] Ben Shneiderman,et al. Universal usability , 2000, Commun. ACM.
[41] Batya Friedman,et al. New directions: a value-sensitive design approach to augmented reality , 2000, DARE '00.
[42] Florian N. Egger,et al. "Trust me, I'm an online vendor": towards a model of trust for e-commerce system design , 2000, CHI Extended Abstracts.
[43] P. Resnick,et al. Protocols for automated negotiations with buyer anonymity and seller reputations , 2000 .
[44] Steve Sawyer,et al. Social Informatics in the Information Sciences: Current Activities and Emerging Directions , 2000, Informing Sci. Int. J. an Emerg. Transdiscipl..
[45] Donald Gotterbarn,et al. How the New Software Engineering Code of Ethics Affects You , 1999, IEEE Softw..
[46] Elizabeth D. Mynatt,et al. The network communities of SeniorNet , 1999, ECSCW.
[47] B. Shneiderman. Universal Usability: Pushing Human-Computer Interaction Research to Empower Every Citizen , 1999 .
[48] Ludwin Fuchs,et al. AREA: A cross-application notification service for groupware , 1999, ECSCW.
[49] Peter H. Kahn,et al. The Human Relationship with Nature: Development and Culture , 1999 .
[50] Mark S. Ackerman,et al. Privacy critics: UI components to safeguard users' privacy , 1999, CHI Extended Abstracts.
[51] Max A. Dixon,et al. Visual profiles: a critical component of universal access , 1999, CHI '99.
[52] B. J. Fogg,et al. The elements of computer credibility , 1999, CHI '99.
[53] Sharon L. Oviatt,et al. Mutual disambiguation of recognition errors in a multimodel architecture , 1999, CHI '99.
[54] Peter H. Kahn Jr.,et al. Reinstating Modernity in Social Science Research – or – The Status of Bullwinkle in a Post-Postmodern Era , 1999, Human Development.
[55] Marc Rotenberg,et al. The privacy law sourcebook : United States law, international law, and recent developments , 1999 .
[56] H. Nissenbaum. Can Trust be Secured Online? A theoretical perspective , 1999 .
[57] Rob Kling,et al. What Is Social Informatics and Why Does It Matter? , 2007, D Lib Mag..
[58] Prasun Dewan,et al. Flexible meta access-control for collaborative applications , 1998, CSCW '98.
[59] Joseph F. McCarthy,et al. MusicFX: an arbiter of group preferences for computer supported collaborative workouts , 1998, CSCW '98.
[60] Nancy A. Van House,et al. Cooperative knowledge work and practices of trust: sharing environmental planning data sets , 1998, CSCW '98.
[61] D. Kevin O'Neill,et al. Sustaining mentoring relationships on-line , 1998, CSCW '98.
[62] Carol A. Hert,et al. Social Informatics in Information Science: An Introduction , 1998, J. Am. Soc. Inf. Sci..
[63] Jesper Simonsen,et al. MUST: A Method for Participatory Design , 1998, Hum. Comput. Interact..
[64] Rob Kling,et al. Human centered systems in the perspective of organizational and social informatics , 1998, CSOC.
[65] Sean White,et al. The first noble truth of CyberSpace: people are people (even when they MOO) , 1998, CHI.
[66] Elena Rocco,et al. Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact , 1998, CHI.
[67] P. Agre,et al. Technology and privacy: The new landscape , 1998 .
[68] Michael J. Muller. Ethnocritical heuristics for reflecting on work with users and other interested parties , 1997 .
[69] Batya Friedman,et al. Social Judgments and Technological Innovation: Adolescents' Understanding of Property, Privacy, and Electronic Information. , 1997 .
[70] Helen Nissenbaum,et al. Software agents and user autonomy , 1997, AGENTS '97.
[71] Robert B. Louden,et al. ON SOME VICES OF VIRTUE ETHICS , 1997 .
[72] Jakob Nielsen,et al. Usability engineering , 1997, The Computer Science and Engineering Handbook.
[73] M. Gross,et al. MUD: Exploring Tradeoffs in Urban Design , 1997 .
[74] Joan Greenbaum,et al. Back to labor: returning to labor process discussions in the study of work , 1996, CSCW '96.
[75] Scott E. Hudson,et al. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.
[76] Stephanie D. Teasley,et al. Groupware in the wild: lessons learned from a year of virtual collocation , 1996, CSCW '96.
[77] John C. Tang,et al. Piazza: a desktop environment supporting impromptu and planned interactions , 1996, CSCW '96.
[78] Paul Dourish,et al. Re-place-ing space: the roles of place and space in collaborative systems , 1996, CSCW '96.
[79] Helen Nissenbaum,et al. Bias in computer systems , 1996, TOIS.
[80] Robert L. Campbell,et al. Moral Development Theory: A Critique of Its Kantian Presuppositions☆ , 1996 .
[81] B. Shneiderman,et al. Social impact statements: engaging public participation in information technology design , 1996, CQL '96.
[82] Jacques Berleur,et al. Ethics of computing: codes, spaces for discussion and law , 1996 .
[83] Clifford Nass,et al. The media equation - how people treat computers, television, and new media like real people and places , 1996 .
[84] A. Roland,et al. Does Technology Drive History? The Dilemma of Technological Determinism. , 1995 .
[85] Batya Friedman,et al. “It's the computer's fault”: reasoning about computers as moral agents , 1995, CHI 95 Conference Companion.
[86] Wendy E. Mackay,et al. Ethics, lies and videotape… , 1995, CHI '95.
[87] Philip Scranton,et al. Determinism and indeterminacy in the history of technology , 1995 .
[88] Cecilia Wainryb,et al. Reasoning about Social Conflicts in Different Cultures: Druze and Jewish Children in Israel. , 1995 .
[89] Tone Bratteteig,et al. User Participation and Democracy: A Discussion of Scandinavian Research on System Development , 1995, Scand. J. Inf. Syst..
[90] James Houston,et al. Confessions of an Igloo Dweller , 1995 .
[91] Peter G. Neumann,et al. Computer-related risks , 1994 .
[92] Jonathan Grudin,et al. Organizational obstacles to interface design and development: two participant-observer studies , 1994, TCHI.
[93] L. Suchman. Do categories have politics? The language/action perspective reconsidered , 1993 .
[94] Nancy G. Leveson,et al. An investigation of the Therac-25 accidents , 1993, Computer.
[95] Donald Gotterbarn,et al. Using the new ACM code of ethics in decision making , 1993, CACM.
[96] Terry Winograd,et al. Usability - Turning Technologies into Tools , 1992 .
[97] P. H. Kahn,et al. Children's obligatory and discretionary moral judgments. , 1992, Child development.
[98] Batya Friedman,et al. Human agency and responsible computing: Implications for computer system design , 1992, J. Syst. Softw..
[99] Madeleine Akrich,et al. The De-scription of Technical Objects , 1992 .
[100] S. Kiesler,et al. Connections: New Ways of Working in the Networked Organization. , 1992 .
[101] Douglas D. Noble. The classroom arsenal : military research, information technology, and public education / Douglas D. Noble , 1991 .
[102] Peter G. Neumann,et al. Inside risks: certifying professionals , 1991, CACM.
[103] Nancy G. Leveson,et al. Software safety in embedded computer systems , 1991, CACM.
[104] Jr. Peter H. Kahn,et al. Bounding the controversies : foundational issues in the study of moral development , 1991 .
[105] A. Roth,et al. New physicians: a natural experiment in market organization , 1990, Science.
[106] Robert E. Kraut,et al. Intellectual Teamwork: Social and Technological Foundations of Cooperative Work , 1990 .
[107] D. Parker,et al. Ethical conflicts in information and computer science, technology, and business , 1990 .
[108] Donald A. Norman,et al. Psychology of everyday things , 1990 .
[109] Peter H. Kahn,et al. Children's conceptions of trust in the context of social expectations. , 1988 .
[110] Jonathan Grudin,et al. Why CSCW applications fail: problems in the design and evaluationof organizational interfaces , 1988, CSCW '88.
[111] P. Attewell. The Deskilling Controversy , 1987 .
[112] L. Winner. The Whale and the Reactor , 2020 .
[113] T. Nagel. The view from nowhere , 1987 .
[114] T. Beauchamp,et al. A History and Theory of Informed Consent , 1986, American Political Science Review.
[115] A. Baier. Trust and Antitrust , 1986, Ethics.
[116] Bernard Williams,et al. Ethics and the Limits of Philosophy. , 1988 .
[117] F. Schoeman. Philosophical Dimensions of Privacy: An Anthology , 1984 .
[118] R. Ulrich. View through a window may influence recovery from surgery. , 1984, Science.
[119] John Leslie King,et al. Centralized versus decentralized computing: organizational considerations and management options , 1983, CSUR.
[120] A. Beck. Between pets and people , 1983 .
[121] P. Foot,et al. Virtues and Vices , 1982 .
[122] Elliot Turiel,et al. The development of social knowledge , 1983 .
[123] S. Scheffler. The rejection of consequentialism , 1986 .
[124] R. Rorty. Consequences of pragmatism , 1982 .
[125] L. Becker,et al. Property Rights: Philosophical Foundations , 1981 .
[126] John R. Searle,et al. Minds, brains, and programs , 1980, Behavioral and Brain Sciences.
[127] Rob Kling,et al. Social Analyses of Computing: Theoretical Perspectives in Recent Empirical Research , 1980, CSUR.
[128] J. Mackie,et al. Ethics: Inventing Right and Wrong , 1977 .
[129] Lauriston Sharp,et al. Steel Axes for Stone-Age Australians , 1952 .