1. bookVolume 63 (2020): Issue 1 (September 2020)
Journal Details
License
Format
Journal
eISSN
2199-6059
ISSN
0860-150X
First Published
08 Aug 2013
Publication timeframe
4 times per year
Languages
English
Open Access

Value-Sensitive Co-Design for Resilient Information Systems

Published Online: 04 Nov 2020
Volume & Issue: Volume 63 (2020) - Issue 1 (September 2020)
Page range: 141 - 164
Journal Details
License
Format
Journal
eISSN
2199-6059
ISSN
0860-150X
First Published
08 Aug 2013
Publication timeframe
4 times per year
Languages
English

Alcoff, L. (1991) The problem of speaking for others, Cultural critique, n. 20, pp. 5–32.Search in Google Scholar

Barn, B., Primiero, G. and Barn, R. (2015) An approach to early evaluation of informational privacy requirements. SAC ’15: Proceedings of the 30th Annual ACM Symposium on Applied Computing, April 2015, pages 1370–1375, https://doi.org/10.1145/2695664.269578810.1145/2695664.2695788Search in Google Scholar

Barwise J., Seligman, J. (1997) Information Flow: the logic of distributed systems. Cambridge University Press.10.1017/CBO9780511895968Search in Google Scholar

Beyer H., Holtzblatt K. (1998) Contextual design: defining customer-centered systems. Morgan Kaufmann Pub.10.1145/286498.286629Search in Google Scholar

Bjerknes G., Ehn P., Kyng M., Nygaard K. (1987) Computers and democracy: A Scandinavian challenge. Gower Pub Co.Search in Google Scholar

Borning, A. and Muller, M. (2012) Next steps for value sensitive design, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, pp. 1125–1134.Search in Google Scholar

Butschi, D., Courant, M. and Hilty, L.M. (2005) Towards sustainable pervasive computing – Guest editorial, IEEE Technology and Society Magazine, vol. 24(1), pp. 7–8.Search in Google Scholar

Callister W, (1994) Mechanical properties of metals. In Materials science and engineering, an introduction, New York: John Wiley & Sons, Inc, pp. 106–147.Search in Google Scholar

Colburn, T. R., (1999). Software, Abstraction, and Ontology, The Monist, 82(1): 3-19.10.5840/monist19998215Search in Google Scholar

Darimont, R., Delor, E., Massonet, P., van Lamsweerde, A. (1997) GRAIL/KAOS: an environment for goal-driven requirements engineering, Proceedings of the 19th ACM international conference on Software engineering, pp. 612–613.Search in Google Scholar

Davis F.D. (1993) User acceptance of information technology: system characteristics, user perceptions and behavioral impacts, International Journal of Man-Machine Studies, vol. 38, pp. 475–487.Search in Google Scholar

Eisenhardt, Kathleen M. (1989) Building theories from case study research, Academy of management review, vol. 14(4), pp. 532–550.Search in Google Scholar

Erol O., Sauser B.J., Mansouri M. (2010) A framework for investigation into extended enterprise resilience. Enterprise Information Systems 4(2): 111–136.10.1080/17517570903474304Search in Google Scholar

Friedman B., Kahn Jr P.H., Borning A. (2006) Value sensitive design and information systems. Human-computer interaction in management information systems: Foundations 5: 348–372.Search in Google Scholar

Gao H., Barbier G., Goolsby R. (2011) Harnessing the crowdsourcing power of social media for disaster relief. Intelligent Systems, IEEE 26(3): 10–14.10.1109/MIS.2011.52Search in Google Scholar

Greenbaum J., Kyng M. (1991) Design at work: Cooperative design of computer systems. L. Erlbaum Associates Inc. Hillsdale, NJ, USA.Search in Google Scholar

Gellman, B. (2014) Snowden has shown the ‘huge disparity of surveillance and power’. The Guardian, 10/03/2014, http://www.theguardian.com/technology/2014/mar/10/edward-snowden-surveillance-government-nsa-gchq-barton-gellman?CMP=twt_guSearch in Google Scholar

Greenberg M.T. (2006) Promoting resilience in children and youth. Annals of the New York Academy of Sciences 1094(1): 139–150.10.1196/annals.1376.013Search in Google Scholar

Holling C.S. (1973) Resilience and stability of ecological systems. Annual review of ecology and systematics 4: 1–23.10.1146/annurev.es.04.110173.000245Search in Google Scholar

Hughes A.L., Palen L. (2009) Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management 6(3): 248–260.10.1504/IJEM.2009.031564Search in Google Scholar

Hunter C. (2012) Is resilience still a useful concept when working with children and young people? Australian Institute of Family Studies, CFCA Paper No. 2, April 2012.Search in Google Scholar

Kakuda Y., Kikuchi M. (2001a) Topology on classifications in abstract design theory. Proc. IWES’01, pp. 123–130.Search in Google Scholar

Kakuda Y., Kikuchi M. (2001b) Abstract design theory. Annals Japan Association of Philosophy of Science 29(1): 1–6.Search in Google Scholar

Kazman, R., Klein, M., Barbacci, M., Longstaff, T., Lipson, H., Carriere, J. (1998) The architecture tradeoff analysis method, Engineering of Complex Computer Systems, 1998. ICECCS’98. Proceedings. Fourth IEEE International Conference on, pp. 68–78.Search in Google Scholar

Kikuchi M. (2003) Analysis and design from a viewpoint of information flow. In: Löwe B., Malzkom W., Räsch T. (eds) Foundations of the Formal Sciences II, Trends in Logic, vol. 17, Springer Netherlands, pp. 119–12210.1007/978-94-017-0395-6_9Search in Google Scholar

Kikuchi M., Nagasaka I. (2002) On the three axioms of general design theory. Proc. IWES’02, pp. 69–76.Search in Google Scholar

Kujala S., Väänänen-Vainio-Mattila K. (2009) Value of information systems and products: Understanding the users’ perspective and values. Journal of Information Technology Theory and Application 9(4): 23–39.Search in Google Scholar

Mark G.J., Al-Ani B., Semaan B. (2009) Resilience through technology adoption: merging the old and the new in Iraq. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 689–698.10.1145/1518701.1518808Search in Google Scholar

MoJ (2013) Youth Justice Statistics 2011/12 England and Wales. Ministry of Justice.Search in Google Scholar

Moor J.H. (1978). Three Myths of Computer Science, The British Journal for the Philosophy of Science, 29(3): 213-222.10.1093/bjps/29.3.213Search in Google Scholar

Nellis M. (2004) The ‘Tracking’ Controversy: The Roots of Mentoring and Electronic Monitoring. Youth Justice 4(2): 77.10.1177/147322540400400202Search in Google Scholar

OECD (2008) Concepts and dilemmas of state building in fragile situations: From fragility to resilience. Journal on Development Volume 9, No. 3.10.1787/journal_dev-v9-art27-enSearch in Google Scholar

OECD (2013) OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Organisation for Economic Co-operation and Development.Search in Google Scholar

Primiero, G., (2016), Information in the philosophy of computer science, in Floridi L. (ed) The Routledge Handbook of Philosophy of Information, 90–106, Routledge.Search in Google Scholar

Primiero, G., Raimondi, F., Chen, T., (2019). A theory of change for prioritised resilient and evolvable software systems, Synthese, doi:10.1007/s11229-019-02305-7.10.1007/s11229-019-02305-7Search in Google Scholar

Primiero, G., (2020), On the Foundations of Computing, Oxford University Press.10.1093/oso/9780198835646.001.0001Search in Google Scholar

Rumbaugh, James and Jacobson, Ivar and Booch, Grady (2004). The Unified Modeling Language Reference Manual, Pearson Higher Education.Search in Google Scholar

Rutter M. (2006) Implications of resilience concepts for scientific understanding. Annals of the New York Academy of Sciences 1094(1): 1–12.10.1196/annals.1376.002Search in Google Scholar

Sanders E.N. (2000) Generative tools for co-designing. In: Collaborative design, Springer, pp. 3–12.10.1007/978-1-4471-0779-8_1Search in Google Scholar

Schön D.A. (1983) The reflective practitioner: How professionals think in action, vol. 5126. Basic books.Search in Google Scholar

Shklovski I., Palen L., Sutton J. (2008) Finding community through information and communication technology in disaster response. Proceedings of the 2008 ACM conference on Computer supported cooperative work, ACM, pp. 127–136.10.1145/1460563.1460584Search in Google Scholar

Smith D., Goldson B., Muncie J. (2006) Youth crime and justice: research, evaluation and ‘evidence’. Youth, crime and justice: critical issues, p. 78.Search in Google Scholar

Turner, R., (2011). Specification, Minds & Machines, 21(2): 135–152.10.1007/s11023-011-9239-xSearch in Google Scholar

Ungar M. (2013) Resilience, trauma, context, and culture. Trauma, Violence, & Abuse 14(3): 255–266.10.1177/1524838013487805Search in Google Scholar

Venkatesh V., Morris M.G., Davis G.B., Davis F.D. (2003) User acceptance of information technology: Toward a unified view. MIS quarterly, pp. 425–478.10.2307/30036540Search in Google Scholar

Wright M.O., Masten A.S., Narayan A.J. (2013) Resilience processes in development: Four waves of research on positive adaptation in the context of adversity. In: Handbook of Resilience in Children, Springer, pp. 15–37.10.1007/978-1-4614-3661-4_2Search in Google Scholar

Yin, R. K. (2009) Case study research: Design and methods (4th Ed.). Thousand Oaks, CA: Sage.Search in Google Scholar

Yoo D., Huldtgren A., Woelfer J.P., Hendry D.G., Friedman B. (2013) A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 419–428.10.1145/2470654.2470715Search in Google Scholar

Yoshikawa H. (1981) General Design Theory and a CAD system, In: Man-machine Communication in CAD/CAM, T. Sata, E. Warman (editors), pp. 35–57, North-Holland, Amsterdam.Search in Google Scholar

Yu E.S.K. (1991) Towards modelling and reasoning support for early-phase requirements engineering, in Requirements Engineering, 1997, Proceedings of the Third IEEE International Symposium on, pp. 226-235.Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo