Value Sensitive Design and Information Systems
暂无分享,去创建一个
Alan Borning | Batya Friedman | Peter H. Kahn | Alina Huldtgren | P. H. Kahn | Batya Friedman | A. Borning | A. Huldtgren | P. Kahn
[1] Jun Zheng,et al. Trust without touch: jump-start trust with social chat , 2001, CHI Extended Abstracts.
[2] S. Scheffler. The rejection of consequentialism , 1986 .
[3] Harold C. Releya. Technology and privacy: The new landscape , 1998 .
[4] Richard E. Ladner,et al. Enhancing independence and safety for blind and deaf-blind public transit riders , 2011, CHI.
[5] Johannes Britz,et al. Rethinking the ownership of information in the 21st century: Ethical implications , 2000, Ethics and Information Technology.
[6] Darren Gergle,et al. On the "localness" of user-generated content , 2010, CSCW '10.
[7] Wanda J. Orlikowski,et al. Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..
[8] Robyn Matravers. Sustainability Indicators: A Report on the Project on Indicators of Sustainable Development , 1998 .
[9] Alan Borning,et al. An extensible, modular architecture for simulating urban development, transportation, and environmental impacts , 2001, Comput. Environ. Urban Syst..
[10] Batya Friedman,et al. The Watcher and the Watched: Social Judgments About Privacy in a Public Place , 2006, Media Space 20+ Years of Mediated Life.
[11] Batya Friedman,et al. “It's the computer's fault”: reasoning about computers as moral agents , 1995, CHI 95 Conference Companion.
[12] Carleen Maitland,et al. Trust in cyberspace , 2000 .
[13] H. Mounce,et al. Reason and Morality , 1986 .
[14] Alan Borning,et al. Microsimulation of Urban Development and Location Choices: Design and Implementation of UrbanSim , 2003 .
[15] Jens Riegelsberger,et al. Face it - photos don't make a web site trustworthy , 2002, CHI Extended Abstracts.
[16] P. Agre,et al. Technology and privacy: The new landscape , 1998 .
[17] Predrag V. Klasnja,et al. Value scenarios: a technique for envisioning systemic effects of new technologies , 2007, CHI Extended Abstracts.
[18] P T Castiglia. Moral development. , 1991, Journal of pediatric health care : official publication of National Association of Pediatric Nurse Associates & Practitioners.
[19] Peter G. Neumann,et al. Computer-related risks , 1994 .
[20] Anoop Gupta,et al. Linking public spaces: technical and social issues , 2001, CHI.
[21] H. Nissenbaum. Securing Trust Online: Wisdom or Oxymoron? , 2015 .
[22] Marina Umaschi Bers,et al. Identity construction environments: supporting a virtual therapeutic community of pediatric patients undergoing dialysis , 2001, CHI.
[23] P. Wiener,et al. The Encyclopedia of Philosophy. , 1968 .
[24] Batya Friedman,et al. Trust online , 2000, CACM.
[25] Margot Brereton,et al. Never too old: engaging retired people inventing the future with MaKey MaKey , 2014, CHI.
[26] L. Becker,et al. Property Rights: Philosophical Foundations , 1981 .
[27] Jonathan Grudin,et al. Personas: practice and theory , 2003, DUX '03.
[28] Jill Palzkill Woelfer,et al. Homeless young people and technology: ordinary interactions, extraordinary circumstances , 2011, INTR.
[29] Batya Friedman,et al. The envisioning cards: a toolkit for catalyzing humanistic and technical imaginations , 2012, CHI.
[30] R. Ulrich. View through a window may influence recovery from surgery. , 1984, Science.
[31] Elliot Turiel,et al. The development of social knowledge , 1983 .
[32] L. Suchman. Do categories have politics? The language/action perspective reconsidered , 1993 .
[33] Rob Kling,et al. Human centered systems in the perspective of organizational and social informatics , 1998, CSOC.
[34] Helen Nissenbaum,et al. Software agents and user autonomy , 1997, AGENTS '97.
[35] Batya Friedman,et al. Informed consent in the Mozilla browser: implementing value-sensitive design , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[36] Constantine Stephanidis,et al. User Interfaces for All: Concepts, Methods, and Tools , 2009 .
[37] Peter H. Kahn,et al. Children and Nature: Psychological, Sociocultural and Evolutionary Investigations , 2003 .
[38] Alan Borning,et al. Next steps for value sensitive design , 2012, CHI.
[39] Max A. Dixon,et al. Visual profiles: a critical component of universal access , 1999, CHI '99.
[40] Helen Nissenbaum. Protecting Privacy in an Information Age: The Problem of Privacy in Public , 1998 .
[41] Jonathan Grudin,et al. Why CSCW applications fail: problems in the design and evaluationof organizational interfaces , 1988, CSCW '88.
[42] Florian N. Egger,et al. "Trust me, I'm an online vendor": towards a model of trust for e-commerce system design , 2000, CHI Extended Abstracts.
[43] John Seely Brown,et al. The coming age of calm technolgy , 1997 .
[44] Alan Borning,et al. The Indicator Browser: A Web-Based Interface for Visualizing UrbanSim Simulation Results , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[45] Robert L. Campbell,et al. Moral Development Theory: A Critique of Its Kantian Presuppositions☆ , 1996 .
[46] Bedřich Moldan,et al. Sustainability indicators : a report on the project on indicators of sustainable development , 1997 .
[47] Jakob Nielsen,et al. Usability engineering , 1997, The Computer Science and Engineering Handbook.
[48] A. Baier. Trust and Antitrust , 1986, Ethics.
[49] Clifford Nass,et al. Speech interfaces from an evolutionary perspective , 2000, CACM.
[50] John C. Tang,et al. Piazza: a desktop environment supporting impromptu and planned interactions , 1996, CSCW '96.
[51] H. Nissenbaum. Can Trust be Secured Online? A theoretical perspective , 1999 .
[52] Jill Palzkill Woelfer,et al. Improving the safety of homeless young people with mobile phones: values, form and function , 2011, CHI.
[53] Jr Thomas E. Hill. Autonomy and Self-Respect by Thomas E. Hill, Jr , 1991 .
[54] J. Brady,et al. The Belmont Report. Ethical principles and guidelines for the protection of human subjects of research. , 2014, The Journal of the American College of Dentists.
[55] H. Nissenbaum. Protecting Privacy in an Information Age: The Problem of Privacy in Public , 1998, The Ethics of Information Technologies.
[56] Jr. Allen B. Tucker,et al. The Computer Science and Engineering Handbook , 1997 .
[57] Elliot Turiel,et al. The Culture of Morality: Social Development, Context, and Conflict , 2002 .
[58] Mirosław Żelazny,et al. The Groundwork of the Metaphysic of Morals , 2011 .
[59] Batya Friedman,et al. Hardware companions?: what online AIBO discussion forums reveal about the human-robotic relationship , 2003, CHI '03.
[60] I. Sigel,et al. HANDBOOK OF CHILD PSYCHOLOGY , 2006 .
[61] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[62] Pelle Ehn,et al. Work-oriented design of computer artifacts , 1989 .
[63] A. Beck. Between pets and people , 1983 .
[64] J. H. Davis,et al. An integrative model of organizational trust, Academy of Management Review, : . , 1995 .
[65] Ben Shneiderman,et al. Universal Usability , 2000, UBIQ.
[66] Batya Friedman,et al. Human values and the design of computer technology , 1997 .
[67] Alan Borning,et al. Urbansim: Using Simulation to Inform Public Deliberation and Decision-Making , 2008, Digital Government.
[68] Douglas Schuler,et al. Participatory Design: Principles and Practices , 1993 .
[69] Johan Aberg,et al. An empirical study of human Web assistants: implications for user support in Web information systems , 2001, CHI.
[70] Helen Nissenbaum,et al. Bias in computer systems , 1996, TOIS.
[71] E. Wilson,et al. The biophilia hypothesis , 1993 .
[72] J. Last. Our common future. , 1987, Canadian journal of public health = Revue canadienne de sante publique.
[73] Peter H. Kahn,et al. Children's conceptions of trust in the context of social expectations. , 1988 .
[74] G. Brundtland,et al. Our common future , 1987 .
[75] Christopher Edwards,et al. The effects of filtered video on awareness and privacy , 2000, CSCW '00.
[76] Batya Friedman,et al. Social Judgments and Technological Innovation: Adolescents' Understanding of Property, Privacy, and Electronic Information. , 1997 .
[77] Sean White,et al. The first noble truth of CyberSpace: people are people (even when they MOO) , 1998, CHI.
[78] Terry Winograd,et al. Categories, disciplines, and social coordination , 1997, Computer Supported Cooperative Work (CSCW).
[79] W. Damon,et al. Social, emotional, and personality development , 1998 .
[80] Susan Wyche,et al. Values as lived experience: evolving value sensitive design in support of value discovery , 2009, CHI.
[81] Seymour Rosenberg. Multiplicity of selves. , 1997 .
[82] Peter H. Kahn,et al. The Human Relationship with Nature: Development and Culture , 1999 .
[83] L. Jean Camp,et al. Trust and Risk in Internet Commerce , 2000 .
[84] Jonathan Grudin,et al. Discretionary Adoption of Group Support Software: Lessons from Calendar Applications , 2003, Implementing Collaboration Technologies in Industry.
[85] John C. Tang. Eliminating a hardware switch: weighing economics and values in a design decision , 1997 .
[86] Peter Singer,et al. UTILITARIANISM FOR AND AGAINST , 1974 .
[87] S. Greenberg,et al. The Psychology of Everyday Things , 2012 .
[88] D. Norman. The psychology of everyday things , 1990 .
[89] P. Waddell. UrbanSim: Modeling Urban Development for Land Use, Transportation, and Environmental Planning , 2002 .
[90] P. Foot,et al. Virtues and Vices , 1982 .
[91] J Weizenbaum,et al. On the impact of the computer on society. , 1972, Science.
[92] Lee Jussim,et al. Self and identity : fundamental issues , 1997 .
[93] Michael Cooper,et al. Case study: localization of an accessibility evaluation , 2001, CHI Extended Abstracts.
[94] M. Zimmer,et al. Values and pragmatic action: The challenges of introducing ethical intelligence in technical design communities , 2009 .
[95] Victoria Bellotti,et al. Design for privacy in multimedia computing and communications environments , 1997 .
[96] Rob Kling,et al. Social Informatics in Information Science: An Introduction , 1998, J. Am. Soc. Inf. Sci..
[97] Jennifer Hagman,et al. What's in a barcode? informed consent and machine scannable driver licenses , 2003, CHI Extended Abstracts.
[98] B. Shneiderman. Universal Usability: Pushing Human-Computer Interaction Research to Empower Every Citizen , 1999 .
[99] Andrew Sears and Julie A. Jacko. The human-computer interaction handbook , 2013 .
[100] A. Hughes. Oxford English Dictionary. , 2008, Isis; an international review devoted to the history of science and its cultural influences.
[101] F. C. P. Motta. The theory of communicative action , 1991 .
[102] Terry Winograd,et al. Usability - Turning Technologies into Tools , 1992 .
[103] Lars Mathiassen,et al. Computers and Design in Context , 2003 .
[104] Michael A. Menlowe,et al. Philosophical Dimensions of Privacy: An Anthology , 2009 .
[105] Alan Borning,et al. Value sensitive design of interactions with urbansim indicators , 2006 .
[106] Ludwin Fuchs,et al. AREA: A cross-application notification service for groupware , 1999, ECSCW.
[107] Thomas E. Hill,et al. Autonomy and Self-Respect , 1991 .
[108] Susanne Bødker,et al. Through the Interface: A Human Activity Approach To User Interface Design , 1990 .
[109] P. H. Kahn,et al. Human values, ethics, and design , 2002 .
[110] B. J. Fogg,et al. The elements of computer credibility , 1999, CHI '99.
[111] David J. Phillips. Cryptography, secrets, and the structuring of trust , 1997 .
[112] Robert E. Kraut,et al. Intellectual Teamwork: Social and Technological Foundations of Cooperative Work , 1990 .
[113] Nancy G. Leveson,et al. Software safety in embedded computer systems , 1991, CACM.
[114] Batya Friedman,et al. Cookies and Web browser design: toward realizing informed consent online , 2001, CHI.
[115] Clifford Nass,et al. The media equation - how people treat computers, television, and new media like real people and places , 1996 .
[116] Alison J. Gilbert,et al. Indicators of Sustainable Development , 1999 .
[117] Stephanie D. Teasley,et al. Groupware in the wild: lessons learned from a year of virtual collocation , 1996, CSCW '96.
[118] Morten Kyng,et al. Design at Work , 1992 .
[119] John C. Thomas. Steps toward universal access with a communications company , 1997 .
[120] J. Habermas. Communication and the Evolution of Society , 1979 .
[121] G. H. Brundtland. World Commission on environment and development , 1985 .
[122] I. Kant,et al. Groundwork for the Metaphysics of Morals , 2002 .
[123] Bjørn Erik Munkvold,et al. Implementing Collaboration Technologies in Industry , 2003, Computer Supported Cooperative Work.
[124] Mark S. Ackerman,et al. Privacy critics: UI components to safeguard users' privacy , 1999, CHI Extended Abstracts.
[125] Anthony Dunne,et al. Design Noir: The Secret Life of Electronic Objects , 2001 .
[126] Steve Sawyer,et al. Social Informatics in the Information Sciences: Current Activities and Emerging Directions , 2000, Informing Sci. Int. J. an Emerg. Transdiscipl..
[127] Elena Rocco,et al. Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact , 1998, CHI.
[128] Walter Blumenfeld,et al. Value and Valuation , 1961 .
[129] Keith W. Miller,et al. Ethical Issues for Computer Scientists and Engineers , 1997, The Computer Science and Engineering Handbook.
[130] Kristina Höök,et al. Social navigation of food recipes , 2001, CHI.
[131] R. Burchfield. Oxford English dictionary , 1982 .
[132] M. Herskovits,et al. Economic anthropology : a study in comparative economics , 1953 .
[133] Lucy A. Suchman,et al. Do categories have politics? , 1993, Computer Supported Cooperative Work (CSCW).
[134] Kristina Höök,et al. Social navigation research agenda , 2001, CHI Extended Abstracts.
[135] M. Hart,et al. Guide to sustainable community indicators , 1999 .
[136] Eric H. Johnson. Getting Beyond the Simple Assumptions of Organizational Impact , 2000 .
[137] B. Kapp,et al. A history and theory of informed consent , 1986 .
[138] Principia Ethica , 1922, Nature.
[139] Ronald Dworkin,et al. Taking Rights Seriously. , 1978 .
[140] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[141] Tone Bratteteig,et al. User Participation and Democracy: A Discussion of Scandinavian Research on System Development , 1995, Scand. J. Inf. Syst..
[142] Johanna D. Moore,et al. Proceedings of the Conference on Human Factors in Computing Systems , 1989 .
[143] Judith S. Olson,et al. i2i trust in e-commerce , 2000, CACM.
[144] James D. Wallace,et al. Virtues and Vices , 1978 .
[145] Batya Friedman,et al. Human agency and responsible computing: Implications for computer system design , 1992, J. Syst. Softw..
[146] William J. Bennett,et al. Moral Education in the Schools. , 1978 .
[147] T. Hill. Autonomy and self-respect: Sources and acknowledgments , 1991 .
[148] Bjørn N. Freeman-Benson,et al. YP and urban simulation: applying an agile programming methodology in a politically tempestuous domain , 2003, Proceedings of the Agile Development Conference, 2003. ADC 2003.
[149] W. Feinberg,et al. On After Virtue , 1984 .
[150] Janet Davis,et al. Informing Public Deliberation: Value Sensitive Design of Indicators for a Large-scale Urban Simulation , 2005, ECSCW.
[151] Alan R. White,et al. Taking Rights Seriously. , 1977 .