Legitimate by design: Towards trusted socio-technical systems

Legitimacy or 'fairness' seems a key requirement for trust in computer-mediated social environments. Trust in turn seems necessary for productive community interactions like e-commerce. But unless legitimacy is built into social software, achieving trust may not be possible. This means expressing apparently vague social 'rights' as specific information system (IS) requirements, i.e. carrying out a legitimacy analysis. We suggest a framework for the systematic analysis of who 'owns' what in IS design, assuming basic object types and actions. This analysis not only allows social legitimacy concepts to be expressed in IS design terms, but could also reveal socio-technical system design choices for public review. The technique is illustrated by case examples. Legitimacy analysis can apply to wide variety of social software, from chat rooms to virtual realities. It could lead to future global standards for virtual social environment design, perhaps necessary for the emergence of a global online community.

[1]  Edwin Bos,et al.  Can information technology improve the quality of democracy? , 1993, Behav. Inf. Technol..

[2]  D. Hindman The Virtual Community: Homesteading on the Electronic Frontier , 1996 .

[3]  G. Hardin,et al.  The Tragedy of the Commons , 1968, Green Planet Blues.

[4]  Mary Beth Rosson,et al.  I get by with a little help from my cyber-friends: Sharing stories of good and bad times on the Web , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[5]  J. Meyrowitz,et al.  No Sense of Place: The Impact of Electronic Media on Social Behavior. , 1987 .

[6]  Leon J. Goldstein The End of History and the Last Man , 1993 .

[7]  Fion S. L. Lee,et al.  Virtual community informatics: what we know and what we need to know , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[8]  Mark Fischetti,et al.  Weaving the web - the original design and ultimate destiny of the World Wide Web by its inventor , 1999 .

[9]  Noël Coward,et al.  Private Lives , 1930 .

[10]  Dan L. Burk,et al.  Copyrightable functions and patentable speech , 2001, CACM.

[11]  S. Kiesler,et al.  Group and computer-mediated discussion effects in risk decision making. , 1987 .

[12]  P. Brey The ethics of representation and action in virtual reality , 2020, Ethics and Information Technology.

[13]  J. Neumann,et al.  Prisoner's Dilemma , 1993 .

[14]  William J. Mitchell,et al.  City of bits: space, place, and the infobahn , 1995 .

[15]  Brian Whitworth,et al.  Generating Agreement in Computer-Mediated Groups , 2001 .

[16]  Randall Davis,et al.  The digital dilemma , 2001, CACM.

[17]  K. Arrow Social Choice and Individual Values , 1951 .

[18]  Herbert Snyder,et al.  The Network Nation: Human Communication Via Computer , 1995 .

[19]  Joey F. George,et al.  Computer-Based Monitoring: Common Perceptions and Empirical Results , 1996, MIS Q..

[20]  Oren Etzioni,et al.  Privacy interfaces for information management , 1999, CACM.

[21]  Ronald K. Stamper,et al.  Social norms in requirements analysis: an outline of MEASUR , 1994 .

[22]  D. Hofstadter,et al.  Godel, Escher, Bach: An Eternal Golden Braid , 1979 .

[23]  J. Locke,et al.  The Second Treatise of Civil Government , 1986 .

[24]  J. Rawls Justice as Fairness , 2001 .

[25]  Starr Roxanne Hiltz,et al.  Network Nation: Human Communication Via Computer , 1979 .

[26]  J. S. Adams,et al.  Inequity In Social Exchange , 1965 .

[27]  Irma Becerra-Fernandez,et al.  Managing trust and commitment in collaborative supply chain relationships , 2001, CACM.

[28]  Petra Schubert,et al.  The pivotal role of community building in electronic commerce , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[29]  Volker Wulf,et al.  Reducing conflicts in groupware: Metafunctions and their empirical evaluation , 1996, Behav. Inf. Technol..

[30]  R. McQueen,et al.  A Cognitive Three-Process Model of Computer-Mediated Group Interaction , 2000 .

[31]  Mark S. Ackerman,et al.  The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility , 2000, Hum. Comput. Interact..

[32]  Brian Whitworth,et al.  Voting before discussing: computer voting as social communication , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[33]  J. Mill Considerations on Representative Government , 1861 .

[34]  Murray Turoff,et al.  Computer‐mediated communication requirements for group support , 1991 .

[35]  Deborah G. Johnson Computer Ethics , 1985 .

[36]  Wendy A. Kellogg,et al.  Social translucence: an approach to designing systems that support social processes , 2000, TCHI.

[37]  B. Wellman Physical Place and Cyberplace: The Rise of Personalized Networking , 2001 .

[38]  Manfred A. Jeusfeld,et al.  Making Workflow Change Acceptable , 2001, Requirements Engineering.

[39]  Batya Friedman,et al.  Informed consent in the Mozilla browser: implementing value-sensitive design , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[40]  Priscilla M. Regan Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.

[41]  T. Tyler,et al.  The Social Psychology of Procedural Justice , 1988 .

[42]  Herbert H. Blumberg,et al.  Small Groups and Social Interaction , 1983 .

[43]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[44]  Marko Čupić,et al.  Online communities – Designing Usability, Supporting Sociability , 2003 .

[45]  Jenny Preece,et al.  Online Communities: Designing Usability and Supporting Sociability , 2000 .

[46]  J. Reidenberg Governing Networks and Rule-Making in Cyberspace , 1996 .