[Alcoff, L. (1991) The problem of speaking for others, Cultural critique, n. 20, pp. 5–32.]Search in Google Scholar
[Barn, B., Primiero, G. and Barn, R. (2015) An approach to early evaluation of informational privacy requirements. SAC ’15: Proceedings of the 30th Annual ACM Symposium on Applied Computing, April 2015, pages 1370–1375, https://doi.org/10.1145/2695664.269578810.1145/2695664.2695788]Search in Google Scholar
[Barwise J., Seligman, J. (1997) Information Flow: the logic of distributed systems. Cambridge University Press.10.1017/CBO9780511895968]Search in Google Scholar
[Beyer H., Holtzblatt K. (1998) Contextual design: defining customer-centered systems. Morgan Kaufmann Pub.10.1145/286498.286629]Search in Google Scholar
[Bjerknes G., Ehn P., Kyng M., Nygaard K. (1987) Computers and democracy: A Scandinavian challenge. Gower Pub Co.]Search in Google Scholar
[Borning, A. and Muller, M. (2012) Next steps for value sensitive design, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, pp. 1125–1134.]Search in Google Scholar
[Butschi, D., Courant, M. and Hilty, L.M. (2005) Towards sustainable pervasive computing – Guest editorial, IEEE Technology and Society Magazine, vol. 24(1), pp. 7–8.]Search in Google Scholar
[Callister W, (1994) Mechanical properties of metals. In Materials science and engineering, an introduction, New York: John Wiley & Sons, Inc, pp. 106–147.]Search in Google Scholar
[Colburn, T. R., (1999). Software, Abstraction, and Ontology, The Monist, 82(1): 3-19.10.5840/monist19998215]Search in Google Scholar
[Darimont, R., Delor, E., Massonet, P., van Lamsweerde, A. (1997) GRAIL/KAOS: an environment for goal-driven requirements engineering, Proceedings of the 19th ACM international conference on Software engineering, pp. 612–613.]Search in Google Scholar
[Davis F.D. (1993) User acceptance of information technology: system characteristics, user perceptions and behavioral impacts, International Journal of Man-Machine Studies, vol. 38, pp. 475–487.]Search in Google Scholar
[Eisenhardt, Kathleen M. (1989) Building theories from case study research, Academy of management review, vol. 14(4), pp. 532–550.]Search in Google Scholar
[Erol O., Sauser B.J., Mansouri M. (2010) A framework for investigation into extended enterprise resilience. Enterprise Information Systems 4(2): 111–136.10.1080/17517570903474304]Search in Google Scholar
[Friedman B., Kahn Jr P.H., Borning A. (2006) Value sensitive design and information systems. Human-computer interaction in management information systems: Foundations 5: 348–372.]Search in Google Scholar
[Gao H., Barbier G., Goolsby R. (2011) Harnessing the crowdsourcing power of social media for disaster relief. Intelligent Systems, IEEE 26(3): 10–14.10.1109/MIS.2011.52]Search in Google Scholar
[Greenbaum J., Kyng M. (1991) Design at work: Cooperative design of computer systems. L. Erlbaum Associates Inc. Hillsdale, NJ, USA.]Search in Google Scholar
[Gellman, B. (2014) Snowden has shown the ‘huge disparity of surveillance and power’. The Guardian, 10/03/2014, http://www.theguardian.com/technology/2014/mar/10/edward-snowden-surveillance-government-nsa-gchq-barton-gellman?CMP=twt_gu]Search in Google Scholar
[Greenberg M.T. (2006) Promoting resilience in children and youth. Annals of the New York Academy of Sciences 1094(1): 139–150.10.1196/annals.1376.013]Search in Google Scholar
[Holling C.S. (1973) Resilience and stability of ecological systems. Annual review of ecology and systematics 4: 1–23.10.1146/annurev.es.04.110173.000245]Search in Google Scholar
[Hughes A.L., Palen L. (2009) Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management 6(3): 248–260.10.1504/IJEM.2009.031564]Search in Google Scholar
[Hunter C. (2012) Is resilience still a useful concept when working with children and young people? Australian Institute of Family Studies, CFCA Paper No. 2, April 2012.]Search in Google Scholar
[Kakuda Y., Kikuchi M. (2001a) Topology on classifications in abstract design theory. Proc. IWES’01, pp. 123–130.]Search in Google Scholar
[Kakuda Y., Kikuchi M. (2001b) Abstract design theory. Annals Japan Association of Philosophy of Science 29(1): 1–6.]Search in Google Scholar
[Kazman, R., Klein, M., Barbacci, M., Longstaff, T., Lipson, H., Carriere, J. (1998) The architecture tradeoff analysis method, Engineering of Complex Computer Systems, 1998. ICECCS’98. Proceedings. Fourth IEEE International Conference on, pp. 68–78.]Search in Google Scholar
[Kikuchi M. (2003) Analysis and design from a viewpoint of information flow. In: Löwe B., Malzkom W., Räsch T. (eds) Foundations of the Formal Sciences II, Trends in Logic, vol. 17, Springer Netherlands, pp. 119–12210.1007/978-94-017-0395-6_9]Search in Google Scholar
[Kikuchi M., Nagasaka I. (2002) On the three axioms of general design theory. Proc. IWES’02, pp. 69–76.]Search in Google Scholar
[Kujala S., Väänänen-Vainio-Mattila K. (2009) Value of information systems and products: Understanding the users’ perspective and values. Journal of Information Technology Theory and Application 9(4): 23–39.]Search in Google Scholar
[Mark G.J., Al-Ani B., Semaan B. (2009) Resilience through technology adoption: merging the old and the new in Iraq. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 689–698.10.1145/1518701.1518808]Search in Google Scholar
[MoJ (2013) Youth Justice Statistics 2011/12 England and Wales. Ministry of Justice.]Search in Google Scholar
[Moor J.H. (1978). Three Myths of Computer Science, The British Journal for the Philosophy of Science, 29(3): 213-222.10.1093/bjps/29.3.213]Search in Google Scholar
[Nellis M. (2004) The ‘Tracking’ Controversy: The Roots of Mentoring and Electronic Monitoring. Youth Justice 4(2): 77.10.1177/147322540400400202]Search in Google Scholar
[OECD (2008) Concepts and dilemmas of state building in fragile situations: From fragility to resilience. Journal on Development Volume 9, No. 3.10.1787/journal_dev-v9-art27-en]Search in Google Scholar
[OECD (2013) OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Organisation for Economic Co-operation and Development.]Search in Google Scholar
[Primiero, G., (2016), Information in the philosophy of computer science, in Floridi L. (ed) The Routledge Handbook of Philosophy of Information, 90–106, Routledge.]Search in Google Scholar
[Primiero, G., Raimondi, F., Chen, T., (2019). A theory of change for prioritised resilient and evolvable software systems, Synthese, doi:10.1007/s11229-019-02305-7.10.1007/s11229-019-02305-7]Search in Google Scholar
[Primiero, G., (2020), On the Foundations of Computing, Oxford University Press.10.1093/oso/9780198835646.001.0001]Search in Google Scholar
[Rumbaugh, James and Jacobson, Ivar and Booch, Grady (2004). The Unified Modeling Language Reference Manual, Pearson Higher Education.]Search in Google Scholar
[Rutter M. (2006) Implications of resilience concepts for scientific understanding. Annals of the New York Academy of Sciences 1094(1): 1–12.10.1196/annals.1376.002]Search in Google Scholar
[Sanders E.N. (2000) Generative tools for co-designing. In: Collaborative design, Springer, pp. 3–12.10.1007/978-1-4471-0779-8_1]Search in Google Scholar
[Schön D.A. (1983) The reflective practitioner: How professionals think in action, vol. 5126. Basic books.]Search in Google Scholar
[Shklovski I., Palen L., Sutton J. (2008) Finding community through information and communication technology in disaster response. Proceedings of the 2008 ACM conference on Computer supported cooperative work, ACM, pp. 127–136.10.1145/1460563.1460584]Search in Google Scholar
[Smith D., Goldson B., Muncie J. (2006) Youth crime and justice: research, evaluation and ‘evidence’. Youth, crime and justice: critical issues, p. 78.]Search in Google Scholar
[Turner, R., (2011). Specification, Minds & Machines, 21(2): 135–152.10.1007/s11023-011-9239-x]Search in Google Scholar
[Ungar M. (2013) Resilience, trauma, context, and culture. Trauma, Violence, & Abuse 14(3): 255–266.10.1177/1524838013487805]Search in Google Scholar
[Venkatesh V., Morris M.G., Davis G.B., Davis F.D. (2003) User acceptance of information technology: Toward a unified view. MIS quarterly, pp. 425–478.10.2307/30036540]Search in Google Scholar
[Wright M.O., Masten A.S., Narayan A.J. (2013) Resilience processes in development: Four waves of research on positive adaptation in the context of adversity. In: Handbook of Resilience in Children, Springer, pp. 15–37.10.1007/978-1-4614-3661-4_2]Search in Google Scholar
[Yin, R. K. (2009) Case study research: Design and methods (4th Ed.). Thousand Oaks, CA: Sage.]Search in Google Scholar
[Yoo D., Huldtgren A., Woelfer J.P., Hendry D.G., Friedman B. (2013) A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 419–428.10.1145/2470654.2470715]Search in Google Scholar
[Yoshikawa H. (1981) General Design Theory and a CAD system, In: Man-machine Communication in CAD/CAM, T. Sata, E. Warman (editors), pp. 35–57, North-Holland, Amsterdam.]Search in Google Scholar
[Yu E.S.K. (1991) Towards modelling and reasoning support for early-phase requirements engineering, in Requirements Engineering, 1997, Proceedings of the Third IEEE International Symposium on, pp. 226-235.]Search in Google Scholar