Human values, ethics, and design

[1]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[2]  Johannes Britz,et al.  Rethinking the ownership of information in the 21st century: Ethical implications , 2000, Ethics and Information Technology.

[3]  Terry Winograd,et al.  Categories, disciplines, and social coordination , 1997, Computer Supported Cooperative Work (CSCW).

[4]  Thomas W. Malone,et al.  Commentary on Suchman article and Winograd response , 1994, Computer Supported Cooperative Work (CSCW).

[5]  Mikko Korpela,et al.  Community Participation in Health Informatics in Africa: An Experiment in Tripartite Partnership in Ile-Ife, Nigeria , 2004, Computer Supported Cooperative Work (CSCW).

[6]  Peter H. Kahn,et al.  Children and Nature: Psychological, Sociocultural and Evolutionary Investigations , 2003 .

[7]  Alan Borning,et al.  An extensible, modular architecture for simulating urban development, transportation, and environmental impacts , 2001, Comput. Environ. Urban Syst..

[8]  Lars Mathiassen,et al.  Computers and Design in Context , 2003 .

[9]  Richard Boyd,et al.  How to be a Moral Realist , 2002 .

[10]  I. Kant,et al.  Groundwork for the Metaphysics of Morals , 2002 .

[11]  Virgilio Pinera,et al.  Culture and Morality , 2002 .

[12]  Batya Friedman,et al.  Informed consent in the Mozilla browser: implementing value-sensitive design , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[13]  Anne R. Jacobs,et al.  The impact of awareness technologies on privacy litigation , 2001 .

[14]  Herman T. Tavani,et al.  The Internet, ethical values, and conceptual frameworks: an introduction to Cyberethics , 2001, CSOC.

[15]  Stephen Farrell,et al.  Social and informational proxies in a fishtank , 2001, CHI Extended Abstracts.

[16]  Jun Zheng,et al.  Trust without touch: jump-start trust with social chat , 2001, CHI Extended Abstracts.

[17]  Darren Gergle,et al.  Being there versus seeing there: trust via video , 2001, CHI Extended Abstracts.

[18]  Chauncey E. Wilson,et al.  Ethics in HCI , 2001, CHI Extended Abstracts.

[19]  Kristina Höök,et al.  Social navigation research agenda , 2001, CHI Extended Abstracts.

[20]  Michael Cooper,et al.  Case study: localization of an accessibility evaluation , 2001, CHI Extended Abstracts.

[21]  Peter Korn,et al.  What I need is what I get: downloadable user interfaces via Jini and Java , 2001, CHI Extended Abstracts.

[22]  Batya Friedman,et al.  Cookies and Web browser design: toward realizing informed consent online , 2001, CHI.

[23]  Johan Aberg,et al.  An empirical study of human Web assistants: implications for user support in Web information systems , 2001, CHI.

[24]  Anoop Gupta,et al.  Linking public spaces: technical and social issues , 2001, CHI.

[25]  Kristina Höök,et al.  Social navigation of food recipes , 2001, CHI.

[26]  Kori Inkpen Quinn,et al.  Single display privacyware: augmenting public displays with private information , 2001, CHI.

[27]  Marina Umaschi Bers,et al.  Identity construction environments: supporting a virtual therapeutic community of pediatric patients undergoing dialysis , 2001, CHI.

[28]  Sara Jones,et al.  Trust requirements in e-business , 2000, CACM.

[29]  Batya Friedman,et al.  Trust online , 2000, CACM.

[30]  Andrea Basso,et al.  Interpersonal trust and common ground in electronically mediated communication , 2000, CSCW '00.

[31]  Judith S. Olson,et al.  i2i trust in e-commerce , 2000, CACM.

[32]  James D. Herbsleb,et al.  Ensuring privacy in presence awareness: an automated verification approach , 2000, CSCW '00.

[33]  Leysia Palen,et al.  Going wireless: behavior & practice of new mobile phone users , 2000, CSCW '00.

[34]  Allen E. Milewski,et al.  Providing presence cues to telephone users , 2000, CSCW '00.

[35]  Christopher Edwards,et al.  The effects of filtered video on awareness and privacy , 2000, CSCW '00.

[36]  Ben Shneiderman,et al.  Designing trust into online experiences , 2000, CACM.

[37]  Michael J. Muller,et al.  Designing to support adversarial collaboration , 2000, CSCW '00.

[38]  Clifford Nass,et al.  Speech interfaces from an evolutionary perspective , 2000, CACM.

[39]  C. Borgman From Gutenberg to the Global Information Infrastructure , 2000 .

[40]  Ben Shneiderman,et al.  Universal usability , 2000, Commun. ACM.

[41]  Batya Friedman,et al.  New directions: a value-sensitive design approach to augmented reality , 2000, DARE '00.

[42]  Florian N. Egger,et al.  "Trust me, I'm an online vendor": towards a model of trust for e-commerce system design , 2000, CHI Extended Abstracts.

[43]  P. Resnick,et al.  Protocols for automated negotiations with buyer anonymity and seller reputations , 2000 .

[44]  Steve Sawyer,et al.  Social Informatics in the Information Sciences: Current Activities and Emerging Directions , 2000, Informing Sci. Int. J. an Emerg. Transdiscipl..

[45]  Donald Gotterbarn,et al.  How the New Software Engineering Code of Ethics Affects You , 1999, IEEE Softw..

[46]  Elizabeth D. Mynatt,et al.  The network communities of SeniorNet , 1999, ECSCW.

[47]  B. Shneiderman Universal Usability: Pushing Human-Computer Interaction Research to Empower Every Citizen , 1999 .

[48]  Ludwin Fuchs,et al.  AREA: A cross-application notification service for groupware , 1999, ECSCW.

[49]  Peter H. Kahn,et al.  The Human Relationship with Nature: Development and Culture , 1999 .

[50]  Mark S. Ackerman,et al.  Privacy critics: UI components to safeguard users' privacy , 1999, CHI Extended Abstracts.

[51]  Max A. Dixon,et al.  Visual profiles: a critical component of universal access , 1999, CHI '99.

[52]  B. J. Fogg,et al.  The elements of computer credibility , 1999, CHI '99.

[53]  Sharon L. Oviatt,et al.  Mutual disambiguation of recognition errors in a multimodel architecture , 1999, CHI '99.

[54]  Peter H. Kahn Jr.,et al.  Reinstating Modernity in Social Science Research – or – The Status of Bullwinkle in a Post-Postmodern Era , 1999, Human Development.

[55]  Marc Rotenberg,et al.  The privacy law sourcebook : United States law, international law, and recent developments , 1999 .

[56]  H. Nissenbaum Can Trust be Secured Online? A theoretical perspective , 1999 .

[57]  Rob Kling,et al.  What Is Social Informatics and Why Does It Matter? , 2007, D Lib Mag..

[58]  Prasun Dewan,et al.  Flexible meta access-control for collaborative applications , 1998, CSCW '98.

[59]  Joseph F. McCarthy,et al.  MusicFX: an arbiter of group preferences for computer supported collaborative workouts , 1998, CSCW '98.

[60]  Nancy A. Van House,et al.  Cooperative knowledge work and practices of trust: sharing environmental planning data sets , 1998, CSCW '98.

[61]  D. Kevin O'Neill,et al.  Sustaining mentoring relationships on-line , 1998, CSCW '98.

[62]  Carol A. Hert,et al.  Social Informatics in Information Science: An Introduction , 1998, J. Am. Soc. Inf. Sci..

[63]  Jesper Simonsen,et al.  MUST: A Method for Participatory Design , 1998, Hum. Comput. Interact..

[64]  Rob Kling,et al.  Human centered systems in the perspective of organizational and social informatics , 1998, CSOC.

[65]  Sean White,et al.  The first noble truth of CyberSpace: people are people (even when they MOO) , 1998, CHI.

[66]  Elena Rocco,et al.  Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact , 1998, CHI.

[67]  P. Agre,et al.  Technology and privacy: The new landscape , 1998 .

[68]  Michael J. Muller Ethnocritical heuristics for reflecting on work with users and other interested parties , 1997 .

[69]  Batya Friedman,et al.  Social Judgments and Technological Innovation: Adolescents' Understanding of Property, Privacy, and Electronic Information. , 1997 .

[70]  Helen Nissenbaum,et al.  Software agents and user autonomy , 1997, AGENTS '97.

[71]  Robert B. Louden,et al.  ON SOME VICES OF VIRTUE ETHICS , 1997 .

[72]  Jakob Nielsen,et al.  Usability engineering , 1997, The Computer Science and Engineering Handbook.

[73]  M. Gross,et al.  MUD: Exploring Tradeoffs in Urban Design , 1997 .

[74]  Joan Greenbaum,et al.  Back to labor: returning to labor process discussions in the study of work , 1996, CSCW '96.

[75]  Scott E. Hudson,et al.  Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.

[76]  Stephanie D. Teasley,et al.  Groupware in the wild: lessons learned from a year of virtual collocation , 1996, CSCW '96.

[77]  John C. Tang,et al.  Piazza: a desktop environment supporting impromptu and planned interactions , 1996, CSCW '96.

[78]  Paul Dourish,et al.  Re-place-ing space: the roles of place and space in collaborative systems , 1996, CSCW '96.

[79]  Helen Nissenbaum,et al.  Bias in computer systems , 1996, TOIS.

[80]  Robert L. Campbell,et al.  Moral Development Theory: A Critique of Its Kantian Presuppositions☆ , 1996 .

[81]  B. Shneiderman,et al.  Social impact statements: engaging public participation in information technology design , 1996, CQL '96.

[82]  Jacques Berleur,et al.  Ethics of computing: codes, spaces for discussion and law , 1996 .

[83]  Clifford Nass,et al.  The media equation - how people treat computers, television, and new media like real people and places , 1996 .

[84]  A. Roland,et al.  Does Technology Drive History? The Dilemma of Technological Determinism. , 1995 .

[85]  Batya Friedman,et al.  “It's the computer's fault”: reasoning about computers as moral agents , 1995, CHI 95 Conference Companion.

[86]  Wendy E. Mackay,et al.  Ethics, lies and videotape… , 1995, CHI '95.

[87]  Philip Scranton,et al.  Determinism and indeterminacy in the history of technology , 1995 .

[88]  Cecilia Wainryb,et al.  Reasoning about Social Conflicts in Different Cultures: Druze and Jewish Children in Israel. , 1995 .

[89]  Tone Bratteteig,et al.  User Participation and Democracy: A Discussion of Scandinavian Research on System Development , 1995, Scand. J. Inf. Syst..

[90]  James Houston,et al.  Confessions of an Igloo Dweller , 1995 .

[91]  Peter G. Neumann,et al.  Computer-related risks , 1994 .

[92]  Jonathan Grudin,et al.  Organizational obstacles to interface design and development: two participant-observer studies , 1994, TCHI.

[93]  L. Suchman Do categories have politics? The language/action perspective reconsidered , 1993 .

[94]  Nancy G. Leveson,et al.  An investigation of the Therac-25 accidents , 1993, Computer.

[95]  Donald Gotterbarn,et al.  Using the new ACM code of ethics in decision making , 1993, CACM.

[96]  Terry Winograd,et al.  Usability - Turning Technologies into Tools , 1992 .

[97]  P. H. Kahn,et al.  Children's obligatory and discretionary moral judgments. , 1992, Child development.

[98]  Batya Friedman,et al.  Human agency and responsible computing: Implications for computer system design , 1992, J. Syst. Softw..

[99]  Madeleine Akrich,et al.  The De-scription of Technical Objects , 1992 .

[100]  S. Kiesler,et al.  Connections: New Ways of Working in the Networked Organization. , 1992 .

[101]  Douglas D. Noble The classroom arsenal : military research, information technology, and public education / Douglas D. Noble , 1991 .

[102]  Peter G. Neumann,et al.  Inside risks: certifying professionals , 1991, CACM.

[103]  Nancy G. Leveson,et al.  Software safety in embedded computer systems , 1991, CACM.

[104]  Jr. Peter H. Kahn,et al.  Bounding the controversies : foundational issues in the study of moral development , 1991 .

[105]  A. Roth,et al.  New physicians: a natural experiment in market organization , 1990, Science.

[106]  Robert E. Kraut,et al.  Intellectual Teamwork: Social and Technological Foundations of Cooperative Work , 1990 .

[107]  D. Parker,et al.  Ethical conflicts in information and computer science, technology, and business , 1990 .

[108]  Donald A. Norman,et al.  Psychology of everyday things , 1990 .

[109]  Peter H. Kahn,et al.  Children's conceptions of trust in the context of social expectations. , 1988 .

[110]  Jonathan Grudin,et al.  Why CSCW applications fail: problems in the design and evaluationof organizational interfaces , 1988, CSCW '88.

[111]  P. Attewell The Deskilling Controversy , 1987 .

[112]  L. Winner The Whale and the Reactor , 2020 .

[113]  T. Nagel The view from nowhere , 1987 .

[114]  T. Beauchamp,et al.  A History and Theory of Informed Consent , 1986, American Political Science Review.

[115]  A. Baier Trust and Antitrust , 1986, Ethics.

[116]  Bernard Williams,et al.  Ethics and the Limits of Philosophy. , 1988 .

[117]  F. Schoeman Philosophical Dimensions of Privacy: An Anthology , 1984 .

[118]  R. Ulrich View through a window may influence recovery from surgery. , 1984, Science.

[119]  John Leslie King,et al.  Centralized versus decentralized computing: organizational considerations and management options , 1983, CSUR.

[120]  A. Beck Between pets and people , 1983 .

[121]  P. Foot,et al.  Virtues and Vices , 1982 .

[122]  Elliot Turiel,et al.  The development of social knowledge , 1983 .

[123]  S. Scheffler The rejection of consequentialism , 1986 .

[124]  R. Rorty Consequences of pragmatism , 1982 .

[125]  L. Becker,et al.  Property Rights: Philosophical Foundations , 1981 .

[126]  John R. Searle,et al.  Minds, brains, and programs , 1980, Behavioral and Brain Sciences.

[127]  Rob Kling,et al.  Social Analyses of Computing: Theoretical Perspectives in Recent Empirical Research , 1980, CSUR.

[128]  J. Mackie,et al.  Ethics: Inventing Right and Wrong , 1977 .

[129]  Lauriston Sharp,et al.  Steel Axes for Stone-Age Australians , 1952 .