Value Sensitive Design and Information Systems

Value Sensitive Design is a theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner throughout the design process. It employs an integrative and iterative tripartite methodology, consisting of conceptual, empirical, and technical investigations. We explicate Value Sensitive Design by drawing on three case studies. The first study concerns information and control of web browser cookies, implicating the value of informed consent. The second study concerns using high-definition plasma displays in an office environment to provide a “window” to the outside world, implicating the values of physical and psychological well-being and privacy in public spaces. The third study concerns an integrated land use, transportation, and environmental simulation system to support public deliberation and debate on major land use and transportation decisions, implicating the values of fairness, accountability, and support for the democratic process, as well as a highly diverse range of values that might be held by different stakeholders, such as environmental sustainability, opportunities for business expansion, or walkable neighborhoods. We conclude with direct and practical suggestions for how to engage in Value Sensitive Design.

[1]  Jun Zheng,et al.  Trust without touch: jump-start trust with social chat , 2001, CHI Extended Abstracts.

[2]  S. Scheffler The rejection of consequentialism , 1986 .

[3]  Harold C. Releya Technology and privacy: The new landscape , 1998 .

[4]  Richard E. Ladner,et al.  Enhancing independence and safety for blind and deaf-blind public transit riders , 2011, CHI.

[5]  Johannes Britz,et al.  Rethinking the ownership of information in the 21st century: Ethical implications , 2000, Ethics and Information Technology.

[6]  Darren Gergle,et al.  On the "localness" of user-generated content , 2010, CSCW '10.

[7]  Wanda J. Orlikowski,et al.  Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..

[8]  Robyn Matravers Sustainability Indicators: A Report on the Project on Indicators of Sustainable Development , 1998 .

[9]  Alan Borning,et al.  An extensible, modular architecture for simulating urban development, transportation, and environmental impacts , 2001, Comput. Environ. Urban Syst..

[10]  Batya Friedman,et al.  The Watcher and the Watched: Social Judgments About Privacy in a Public Place , 2006, Media Space 20+ Years of Mediated Life.

[11]  Batya Friedman,et al.  “It's the computer's fault”: reasoning about computers as moral agents , 1995, CHI 95 Conference Companion.

[12]  Carleen Maitland,et al.  Trust in cyberspace , 2000 .

[13]  H. Mounce,et al.  Reason and Morality , 1986 .

[14]  Alan Borning,et al.  Microsimulation of Urban Development and Location Choices: Design and Implementation of UrbanSim , 2003 .

[15]  Jens Riegelsberger,et al.  Face it - photos don't make a web site trustworthy , 2002, CHI Extended Abstracts.

[16]  P. Agre,et al.  Technology and privacy: The new landscape , 1998 .

[17]  Predrag V. Klasnja,et al.  Value scenarios: a technique for envisioning systemic effects of new technologies , 2007, CHI Extended Abstracts.

[18]  P T Castiglia Moral development. , 1991, Journal of pediatric health care : official publication of National Association of Pediatric Nurse Associates & Practitioners.

[19]  Peter G. Neumann,et al.  Computer-related risks , 1994 .

[20]  Anoop Gupta,et al.  Linking public spaces: technical and social issues , 2001, CHI.

[21]  H. Nissenbaum Securing Trust Online: Wisdom or Oxymoron? , 2015 .

[22]  Marina Umaschi Bers,et al.  Identity construction environments: supporting a virtual therapeutic community of pediatric patients undergoing dialysis , 2001, CHI.

[23]  P. Wiener,et al.  The Encyclopedia of Philosophy. , 1968 .

[24]  Batya Friedman,et al.  Trust online , 2000, CACM.

[25]  Margot Brereton,et al.  Never too old: engaging retired people inventing the future with MaKey MaKey , 2014, CHI.

[26]  L. Becker,et al.  Property Rights: Philosophical Foundations , 1981 .

[27]  Jonathan Grudin,et al.  Personas: practice and theory , 2003, DUX '03.

[28]  Jill Palzkill Woelfer,et al.  Homeless young people and technology: ordinary interactions, extraordinary circumstances , 2011, INTR.

[29]  Batya Friedman,et al.  The envisioning cards: a toolkit for catalyzing humanistic and technical imaginations , 2012, CHI.

[30]  R. Ulrich View through a window may influence recovery from surgery. , 1984, Science.

[31]  Elliot Turiel,et al.  The development of social knowledge , 1983 .

[32]  L. Suchman Do categories have politics? The language/action perspective reconsidered , 1993 .

[33]  Rob Kling,et al.  Human centered systems in the perspective of organizational and social informatics , 1998, CSOC.

[34]  Helen Nissenbaum,et al.  Software agents and user autonomy , 1997, AGENTS '97.

[35]  Batya Friedman,et al.  Informed consent in the Mozilla browser: implementing value-sensitive design , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[36]  Constantine Stephanidis,et al.  User Interfaces for All: Concepts, Methods, and Tools , 2009 .

[37]  Peter H. Kahn,et al.  Children and Nature: Psychological, Sociocultural and Evolutionary Investigations , 2003 .

[38]  Alan Borning,et al.  Next steps for value sensitive design , 2012, CHI.

[39]  Max A. Dixon,et al.  Visual profiles: a critical component of universal access , 1999, CHI '99.

[40]  Helen Nissenbaum Protecting Privacy in an Information Age: The Problem of Privacy in Public , 1998 .

[41]  Jonathan Grudin,et al.  Why CSCW applications fail: problems in the design and evaluationof organizational interfaces , 1988, CSCW '88.

[42]  Florian N. Egger,et al.  "Trust me, I'm an online vendor": towards a model of trust for e-commerce system design , 2000, CHI Extended Abstracts.

[43]  John Seely Brown,et al.  The coming age of calm technolgy , 1997 .

[44]  Alan Borning,et al.  The Indicator Browser: A Web-Based Interface for Visualizing UrbanSim Simulation Results , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[45]  Robert L. Campbell,et al.  Moral Development Theory: A Critique of Its Kantian Presuppositions☆ , 1996 .

[46]  Bedřich Moldan,et al.  Sustainability indicators : a report on the project on indicators of sustainable development , 1997 .

[47]  Jakob Nielsen,et al.  Usability engineering , 1997, The Computer Science and Engineering Handbook.

[48]  A. Baier Trust and Antitrust , 1986, Ethics.

[49]  Clifford Nass,et al.  Speech interfaces from an evolutionary perspective , 2000, CACM.

[50]  John C. Tang,et al.  Piazza: a desktop environment supporting impromptu and planned interactions , 1996, CSCW '96.

[51]  H. Nissenbaum Can Trust be Secured Online? A theoretical perspective , 1999 .

[52]  Jill Palzkill Woelfer,et al.  Improving the safety of homeless young people with mobile phones: values, form and function , 2011, CHI.

[53]  Jr Thomas E. Hill Autonomy and Self-Respect by Thomas E. Hill, Jr , 1991 .

[54]  J. Brady,et al.  The Belmont Report. Ethical principles and guidelines for the protection of human subjects of research. , 2014, The Journal of the American College of Dentists.

[55]  H. Nissenbaum Protecting Privacy in an Information Age: The Problem of Privacy in Public , 1998, The Ethics of Information Technologies.

[56]  Jr. Allen B. Tucker,et al.  The Computer Science and Engineering Handbook , 1997 .

[57]  Elliot Turiel,et al.  The Culture of Morality: Social Development, Context, and Conflict , 2002 .

[58]  Mirosław Żelazny,et al.  The Groundwork of the Metaphysic of Morals , 2011 .

[59]  Batya Friedman,et al.  Hardware companions?: what online AIBO discussion forums reveal about the human-robotic relationship , 2003, CHI '03.

[60]  I. Sigel,et al.  HANDBOOK OF CHILD PSYCHOLOGY , 2006 .

[61]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[62]  Pelle Ehn,et al.  Work-oriented design of computer artifacts , 1989 .

[63]  A. Beck Between pets and people , 1983 .

[64]  J. H. Davis,et al.  An integrative model of organizational trust, Academy of Management Review, : . , 1995 .

[65]  Ben Shneiderman,et al.  Universal Usability , 2000, UBIQ.

[66]  Batya Friedman,et al.  Human values and the design of computer technology , 1997 .

[67]  Alan Borning,et al.  Urbansim: Using Simulation to Inform Public Deliberation and Decision-Making , 2008, Digital Government.

[68]  Douglas Schuler,et al.  Participatory Design: Principles and Practices , 1993 .

[69]  Johan Aberg,et al.  An empirical study of human Web assistants: implications for user support in Web information systems , 2001, CHI.

[70]  Helen Nissenbaum,et al.  Bias in computer systems , 1996, TOIS.

[71]  E. Wilson,et al.  The biophilia hypothesis , 1993 .

[72]  J. Last Our common future. , 1987, Canadian journal of public health = Revue canadienne de sante publique.

[73]  Peter H. Kahn,et al.  Children's conceptions of trust in the context of social expectations. , 1988 .

[74]  G. Brundtland,et al.  Our common future , 1987 .

[75]  Christopher Edwards,et al.  The effects of filtered video on awareness and privacy , 2000, CSCW '00.

[76]  Batya Friedman,et al.  Social Judgments and Technological Innovation: Adolescents' Understanding of Property, Privacy, and Electronic Information. , 1997 .

[77]  Sean White,et al.  The first noble truth of CyberSpace: people are people (even when they MOO) , 1998, CHI.

[78]  Terry Winograd,et al.  Categories, disciplines, and social coordination , 1997, Computer Supported Cooperative Work (CSCW).

[79]  W. Damon,et al.  Social, emotional, and personality development , 1998 .

[80]  Susan Wyche,et al.  Values as lived experience: evolving value sensitive design in support of value discovery , 2009, CHI.

[81]  Seymour Rosenberg Multiplicity of selves. , 1997 .

[82]  Peter H. Kahn,et al.  The Human Relationship with Nature: Development and Culture , 1999 .

[83]  L. Jean Camp,et al.  Trust and Risk in Internet Commerce , 2000 .

[84]  Jonathan Grudin,et al.  Discretionary Adoption of Group Support Software: Lessons from Calendar Applications , 2003, Implementing Collaboration Technologies in Industry.

[85]  John C. Tang Eliminating a hardware switch: weighing economics and values in a design decision , 1997 .

[86]  Peter Singer,et al.  UTILITARIANISM FOR AND AGAINST , 1974 .

[87]  S. Greenberg,et al.  The Psychology of Everyday Things , 2012 .

[88]  D. Norman The psychology of everyday things , 1990 .

[89]  P. Waddell UrbanSim: Modeling Urban Development for Land Use, Transportation, and Environmental Planning , 2002 .

[90]  P. Foot,et al.  Virtues and Vices , 1982 .

[91]  J Weizenbaum,et al.  On the impact of the computer on society. , 1972, Science.

[92]  Lee Jussim,et al.  Self and identity : fundamental issues , 1997 .

[93]  Michael Cooper,et al.  Case study: localization of an accessibility evaluation , 2001, CHI Extended Abstracts.

[94]  M. Zimmer,et al.  Values and pragmatic action: The challenges of introducing ethical intelligence in technical design communities , 2009 .

[95]  Victoria Bellotti,et al.  Design for privacy in multimedia computing and communications environments , 1997 .

[96]  Rob Kling,et al.  Social Informatics in Information Science: An Introduction , 1998, J. Am. Soc. Inf. Sci..

[97]  Jennifer Hagman,et al.  What's in a barcode? informed consent and machine scannable driver licenses , 2003, CHI Extended Abstracts.

[98]  B. Shneiderman Universal Usability: Pushing Human-Computer Interaction Research to Empower Every Citizen , 1999 .

[99]  Andrew Sears and Julie A. Jacko The human-computer interaction handbook , 2013 .

[100]  A. Hughes Oxford English Dictionary. , 2008, Isis; an international review devoted to the history of science and its cultural influences.

[101]  F. C. P. Motta The theory of communicative action , 1991 .

[102]  Terry Winograd,et al.  Usability - Turning Technologies into Tools , 1992 .

[103]  Lars Mathiassen,et al.  Computers and Design in Context , 2003 .

[104]  Michael A. Menlowe,et al.  Philosophical Dimensions of Privacy: An Anthology , 2009 .

[105]  Alan Borning,et al.  Value sensitive design of interactions with urbansim indicators , 2006 .

[106]  Ludwin Fuchs,et al.  AREA: A cross-application notification service for groupware , 1999, ECSCW.

[107]  Thomas E. Hill,et al.  Autonomy and Self-Respect , 1991 .

[108]  Susanne Bødker,et al.  Through the Interface: A Human Activity Approach To User Interface Design , 1990 .

[109]  P. H. Kahn,et al.  Human values, ethics, and design , 2002 .

[110]  B. J. Fogg,et al.  The elements of computer credibility , 1999, CHI '99.

[111]  David J. Phillips Cryptography, secrets, and the structuring of trust , 1997 .

[112]  Robert E. Kraut,et al.  Intellectual Teamwork: Social and Technological Foundations of Cooperative Work , 1990 .

[113]  Nancy G. Leveson,et al.  Software safety in embedded computer systems , 1991, CACM.

[114]  Batya Friedman,et al.  Cookies and Web browser design: toward realizing informed consent online , 2001, CHI.

[115]  Clifford Nass,et al.  The media equation - how people treat computers, television, and new media like real people and places , 1996 .

[116]  Alison J. Gilbert,et al.  Indicators of Sustainable Development , 1999 .

[117]  Stephanie D. Teasley,et al.  Groupware in the wild: lessons learned from a year of virtual collocation , 1996, CSCW '96.

[118]  Morten Kyng,et al.  Design at Work , 1992 .

[119]  John C. Thomas Steps toward universal access with a communications company , 1997 .

[120]  J. Habermas Communication and the Evolution of Society , 1979 .

[121]  G. H. Brundtland World Commission on environment and development , 1985 .

[122]  I. Kant,et al.  Groundwork for the Metaphysics of Morals , 2002 .

[123]  Bjørn Erik Munkvold,et al.  Implementing Collaboration Technologies in Industry , 2003, Computer Supported Cooperative Work.

[124]  Mark S. Ackerman,et al.  Privacy critics: UI components to safeguard users' privacy , 1999, CHI Extended Abstracts.

[125]  Anthony Dunne,et al.  Design Noir: The Secret Life of Electronic Objects , 2001 .

[126]  Steve Sawyer,et al.  Social Informatics in the Information Sciences: Current Activities and Emerging Directions , 2000, Informing Sci. Int. J. an Emerg. Transdiscipl..

[127]  Elena Rocco,et al.  Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact , 1998, CHI.

[128]  Walter Blumenfeld,et al.  Value and Valuation , 1961 .

[129]  Keith W. Miller,et al.  Ethical Issues for Computer Scientists and Engineers , 1997, The Computer Science and Engineering Handbook.

[130]  Kristina Höök,et al.  Social navigation of food recipes , 2001, CHI.

[131]  R. Burchfield Oxford English dictionary , 1982 .

[132]  M. Herskovits,et al.  Economic anthropology : a study in comparative economics , 1953 .

[133]  Lucy A. Suchman,et al.  Do categories have politics? , 1993, Computer Supported Cooperative Work (CSCW).

[134]  Kristina Höök,et al.  Social navigation research agenda , 2001, CHI Extended Abstracts.

[135]  M. Hart,et al.  Guide to sustainable community indicators , 1999 .

[136]  Eric H. Johnson Getting Beyond the Simple Assumptions of Organizational Impact , 2000 .

[137]  B. Kapp,et al.  A history and theory of informed consent , 1986 .

[138]  Principia Ethica , 1922, Nature.

[139]  Ronald Dworkin,et al.  Taking Rights Seriously. , 1978 .

[140]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[141]  Tone Bratteteig,et al.  User Participation and Democracy: A Discussion of Scandinavian Research on System Development , 1995, Scand. J. Inf. Syst..

[142]  Johanna D. Moore,et al.  Proceedings of the Conference on Human Factors in Computing Systems , 1989 .

[143]  Judith S. Olson,et al.  i2i trust in e-commerce , 2000, CACM.

[144]  James D. Wallace,et al.  Virtues and Vices , 1978 .

[145]  Batya Friedman,et al.  Human agency and responsible computing: Implications for computer system design , 1992, J. Syst. Softw..

[146]  William J. Bennett,et al.  Moral Education in the Schools. , 1978 .

[147]  T. Hill Autonomy and self-respect: Sources and acknowledgments , 1991 .

[148]  Bjørn N. Freeman-Benson,et al.  YP and urban simulation: applying an agile programming methodology in a politically tempestuous domain , 2003, Proceedings of the Agile Development Conference, 2003. ADC 2003.

[149]  W. Feinberg,et al.  On After Virtue , 1984 .

[150]  Janet Davis,et al.  Informing Public Deliberation: Value Sensitive Design of Indicators for a Large-scale Urban Simulation , 2005, ECSCW.

[151]  Alan R. White,et al.  Taking Rights Seriously. , 1977 .