Charting Sociotechnical Dimensions of Values for Design Research
暂无分享,去创建一个
Jes A. Koepfler | Katie Shilton | Kenneth R. Fleischmann | Katie Shilton | J. Koepfler | K. Fleischmann
[1] B. Latour. A Cautious Prometheus ? A Few Steps Toward a Philosophy of Design , 2009 .
[2] Don Ihde,et al. Technology and the lifeworld , 1990 .
[3] W. Rostow,et al. Toward a General Theory of Action , 1953, World Politics.
[4] William A. Wallace,et al. The Values of Computational Modelers and Professional Codes of Ethics: Results from a Field Study , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[5] R. Kling,et al. Book Review: Computerization and Controversy: Value Conflicts and Social Choices , 1991 .
[6] Gregory D. Abowd,et al. Developing privacy guidelines for social location disclosure applications and services , 2005, SOUPS '05.
[7] William A. Wallace,et al. How values can reduce conflicts in the design process: Results from a multi-site mixed-method field study , 2011, ASIST.
[8] Deborah G. Johnson. Is the global information infrastructure a democratic technology? , 1997, CSOC.
[9] Kenneth R. Fleischmann,et al. Developing a meta-inventory of human values , 2010, ASIST.
[10] T. Peters. Computerization and Controversy: Value Conflicts and Social Choices (2nd Ed.), edited by Rob Kling , 1996, J. Am. Soc. Inf. Sci..
[11] Meredith Ringel Morris,et al. Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009 , 2009, CHI Extended Abstracts.
[12] Helen Nissenbaum,et al. Bias in computer systems , 1996, TOIS.
[13] M. Zimmer,et al. Values and pragmatic action: The challenges of introducing ethical intelligence in technical design communities , 2009 .
[14] Kenneth R. Fleischmann,et al. Sociotechnical Interaction and Cyborg–Cyborg Interaction: Transforming the Scale and Convergence of HCI , 2009, Inf. Soc..
[15] Erik Fisher,et al. Ethnographic Invention: Probing the Capacity of Laboratory Decisions , 2007 .
[16] Bryan Pfaffenberger,et al. Technological Dramas , 1992 .
[17] Julie E. Cohen. Configuring the Networked Self - Law, Code, and the Play of Everyday Practice , 2012 .
[18] Jameson M. Wetmore. Amish Technology: Reinforcing values and building community , 2007, IEEE Technology and Society Magazine.
[19] Helen Nissenbaum,et al. New Design Methods for Activist Gaming , 2005, DiGRA Conference.
[20] Katie Shilton,et al. Values Levers , 2013 .
[21] William A. Wallace,et al. Computational Modeling and Human Values: A Comparative Study of Corporate, Academic, and Government Research Labs , 2011, 2011 44th Hawaii International Conference on System Sciences.
[22] Jes A. Koepfler,et al. Studying the values of hard-to-reach populations: content analysis of tweets by the 21st century homeless , 2012, iConference '12.
[23] Jill Palzkill Woelfer,et al. Improving the safety of homeless young people with mobile phones: values, form and function , 2011, CHI.
[24] Kenneth R. Fleischmann,et al. Digital libraries and human values: Human-computer interaction meets social informatics , 2008, ASIST.
[25] Jes A. Koepfler,et al. Classifying values in informal communication: Adapting the meta-inventory of human values for tweets , 2011, ASIST.
[26] William W. Gaver. Technology affordances , 1991, CHI.
[27] S. Schwartz. Value orientations: Measurement, antecedents and consequences across nations. , 2007 .
[28] Gabrielle Durepos. Reassembling the Social: An Introduction to Actor‐Network‐Theory , 2008 .
[29] Georg Wilhelm Friedrich Hegel,et al. The Phenomenology of Mind , 1911, Nature.
[30] S. Greenberg,et al. The Psychology of Everyday Things , 2012 .
[31] Ping Wang,et al. Automatic classification of human values: Applying computational thinking to information ethics , 2009, ASIST.
[32] Paul Dourish,et al. Where the action is , 2001 .
[33] Emma Felton,et al. Design and ethics : reflections on practice , 2012 .
[34] William A. Wallace,et al. Ethical implications of values embedded in computational models: An exploratory study , 2007, ASIST.
[35] Kenneth R. Fleischmann,et al. Boundary Objects with Agency: A Method for Studying the Design–Use Interface , 2006, Inf. Soc..
[36] Karen Holtzblatt,et al. Contextual design , 1997, INTR.
[37] Victor Kaptelinin,et al. Affordances in HCI: toward a mediated action perspective , 2012, CHI.
[38] Kenneth R. Fleischmann,et al. The Evolution of Agency: Spectra of Bioagency and Cyberagency , 2007, Inf. Soc..
[39] Katie Shilton. Technology development with an agenda: Interventions to emphasize values in design , 2010, ASIST.
[40] Philip Brey,et al. Method in computer ethics: Towards a multi-level interdisciplinary approach , 1999, Ethics and Information Technology.
[41] J. Overhage,et al. Sorting Things Out: Classification and Its Consequences , 2001, Annals of Internal Medicine.
[42] S. L. Star,et al. The Ethnography of Infrastructure , 1999 .
[43] Nasrin Rahmati. The impact of Cultural Values on Computer Mediated Groupwork , 2000 .
[44] Alan Borning,et al. Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.
[45] D. Haraway. A Cyborg Manifesto , 2013 .
[46] Kai A. Olsen,et al. Democracy and Technology , 2011, Computer.
[47] Jessica K. Miller,et al. Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system , 2007, GROUP.
[48] William A. Wallace,et al. Collaborative learning of ethical decision-making via simulated cases , 2011, iConference '11.
[49] S. Schwartz. Universals in the Content and Structure of Values: Theoretical Advances and Empirical Tests in 20 Countries , 1992 .
[50] K. Himma. A dualist analysis of abortion: personhood and the concept of self qua experiential subject , 2005, Journal of Medical Ethics.
[51] Nancy G. Leveson,et al. An investigation of the Therac-25 accidents , 1993, Computer.
[52] Sirkka L. Jarvenpaa,et al. Communication and Trust in Global Virtual Teams , 1999, J. Comput. Mediat. Commun..
[53] Kenneth R. Fleischmann,et al. Information Ethics Education for a Multicultural World , 2011, J. Inf. Syst. Educ..
[54] J. Piliavin,et al. Values: Reviving a Dormant Concept , 2004 .
[55] M. Flanagan,et al. Embodying values in technology: Theory and practice , 2008 .
[56] Helen Z. Margetts,et al. Computerization and Controversy: Value Conflicts and Social Choices , 1993, J. Inf. Technol..
[57] Finn Brunton,et al. Vernacular resistance to data collection and analysis: A political theory of obfuscation , 2011, First Monday.
[58] R. Kling,et al. The Mobilization of Support for Computerization: The Role of Computerization Movements , 1988 .
[59] William A. Wallace,et al. Designing Educational Cases for Intercultural Information Ethics: The Importance of Diversity, Perspectives, Values, and Pluralism , 2009 .
[60] P. Verbeek,et al. Materializing Morality , 2006 .
[61] E. G. Coleman,et al. Coding Freedom: The Ethics and Aesthetics of Hacking , 2012 .
[62] Gregory D. Abowd,et al. CareLog: a selective archiving tool for behavior management in schools , 2008, CHI.
[63] Christine L Borgman,et al. Science friction: Data, metadata, and collaboration , 2011, Social studies of science.
[64] M. Siegrist,et al. Salient Value Similarity, Social Trust, and Risk/Benefit Perception , 2000, Risk analysis : an official publication of the Society for Risk Analysis.
[65] Phoebe Sengers,et al. Reflective design , 2005, Critical Computing.
[66] 三嶋 博之. The theory of affordances , 2008 .
[67] Jill Palzkill Woelfer,et al. Homeless young people's experiences with information systems: life and work in a community technology center , 2010, CHI.
[68] Jameson M. Wetmore,et al. Researching and Teaching the Ethics and Social Implications of Emerging Technologies in the Laboratory , 2009 .
[69] Robert S. Taylor,et al. Information use environments. , 1991 .
[70] Batya Friedman,et al. Human values and the design of computer technology , 1997 .
[71] Douglas Schuler,et al. Participatory Design: Principles and Practices , 1993 .
[72] Alan Borning,et al. Next steps for value sensitive design , 2012, CHI.
[73] Rafael Capurro,et al. Privacy. An Intercultural Perspective , 2005, Ethics and Information Technology.
[74] L. Winner. The Whale and the Reactor , 2020 .
[75] W. Schmidt,et al. Values congruence and differences between the interplay of personal and organizational value systems , 1993 .
[76] Landon P. Cox,et al. SmokeScreen: flexible privacy controls for presence-sharing , 2007, MobiSys '07.
[77] William A. Wallace,et al. Value Conflicts in Computational Modeling , 2010, Computer.
[78] Gilbert Cockton,et al. From quality in use to value in the world , 2004, CHI EA '04.
[79] D. MacKenzie. An Engine, Not a Camera: How Financial Models Shape Markets , 2006 .
[80] Roger Bennett,et al. Factors underlying the inclination to donate to particular types of charity , 2003 .
[81] Geoffrey C. Bowker,et al. Values in design , 2011, Commun. ACM.
[82] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[83] D. Ihde. Technology and the lifeworld : from garden to earth , 1991 .
[84] C. Batson,et al. Prosocial Motives, Emotions, and Behavior: The Better Angels of Our Nature , 2015 .
[85] Virginia R. Dominguez. People As Subject, People As Object: Selfhood and Peoplehood in Contemporary Israel , 1989 .
[86] Tristan Henderson,et al. Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.
[87] Noriko Hara,et al. Revising the Conceptualization of Computerization Movements , 2008, Inf. Soc..
[88] James L. Spates. The Sociology of Values , 1983 .
[89] Rob Kling,et al. Learning About Information Technologies and Social Change: The Contribution of Social Informatics , 2000, Inf. Soc..
[90] Jes A. Koepfler,et al. CaseBuilder: A GUI Web App for building interactive teaching cases , 2011, ASIST.
[91] Ping Wang,et al. The role of innovation and wealth in the net neutrality debate: A content analysis of human values in congressional and FCC hearings , 2012, J. Assoc. Inf. Sci. Technol..
[92] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[93] Susan Wyche,et al. Values as lived experience: evolving value sensitive design in support of value discovery , 2009, CHI.
[94] B. Latour,et al. Laboratory Life: The Social Construction of Scientific Facts , 1983 .
[95] Rob Kitchin,et al. ‘Outlines of a World Coming into Existence’: Pervasive Computing and the Ethics of Forgetting , 2007 .
[96] Shalom H. Schwartz,et al. Basic values: How they motivate and inhibit prosocial behavior. , 2010 .
[97] George A. Bekey,et al. Robot ethics: Mapping the issues for a mechanized world , 2011, Artif. Intell..
[98] William A. Wallace,et al. Ensuring transparency in computational modeling , 2009, CACM.
[99] W. Davis. The Ecological Approach to Visual Perception , 2012 .
[100] Neil Pollock,et al. The business of expectations: How promissory organizations shape technology and innovation , 2010 .
[101] B. Latour. 10 ''Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts'' , 1992 .
[102] B. Joerges. Do Politics Have Artefacts? , 1999 .
[103] Clifton F. Guthrie. Digital Media Ethics , 2010, The SAGE International Encyclopedia of Mass Media and Society.
[104] Kenneth R. Fleischmann,et al. Digital Libraries with Embedded Values: Combining Insights from LIS and Science and Technology Studies1 , 2007, The Library Quarterly.
[105] Jennifer Ann Rode,et al. (Whose) value-sensitive design: a study of long- distance relationships in an Arabic cultural context , 2011, CSCW.
[106] Shalom H. Schwartz,et al. Values and Behavior: Strength and Structure of Relations , 2003, Personality & social psychology bulletin.
[107] D. Haraway,et al. A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century , 2013 .
[108] M. Rokeach. The Nature Of Human Values , 1974 .
[109] Richard E. Ladner,et al. Enhancing independence and safety for blind and deaf-blind public transit riders , 2011, CHI.
[110] Helen Nissenbaum,et al. From Preemption to Circumvention: If Technology Regulates Why Do We Need Regulation (and Vice Versa)? , 2011 .