Barn, B., Primiero, G. and Barn, R. (2015) An approach to early evaluation of informational privacy requirements. SAC ’15: Proceedings of the 30th Annual ACM Symposium on Applied Computing, April 2015, pages 1370–1375, https://doi.org/10.1145/2695664.269578810.1145/2695664.2695788
Borning, A. and Muller, M. (2012) Next steps for value sensitive design, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, pp. 1125–1134.
Butschi, D., Courant, M. and Hilty, L.M. (2005) Towards sustainable pervasive computing – Guest editorial, IEEE Technology and Society Magazine, vol. 24(1), pp. 7–8.
Callister W, (1994) Mechanical properties of metals. In Materials science and engineering, an introduction, New York: John Wiley & Sons, Inc, pp. 106–147.
Darimont, R., Delor, E., Massonet, P., van Lamsweerde, A. (1997) GRAIL/KAOS: an environment for goal-driven requirements engineering, Proceedings of the 19th ACM international conference on Software engineering, pp. 612–613.
Davis F.D. (1993) User acceptance of information technology: system characteristics, user perceptions and behavioral impacts, International Journal of Man-Machine Studies, vol. 38, pp. 475–487.
Erol O., Sauser B.J., Mansouri M. (2010) A framework for investigation into extended enterprise resilience. Enterprise Information Systems 4(2): 111–136.10.1080/17517570903474304
Friedman B., Kahn Jr P.H., Borning A. (2006) Value sensitive design and information systems. Human-computer interaction in management information systems: Foundations 5: 348–372.
Gao H., Barbier G., Goolsby R. (2011) Harnessing the crowdsourcing power of social media for disaster relief. Intelligent Systems, IEEE 26(3): 10–14.10.1109/MIS.2011.52
Gellman, B. (2014) Snowden has shown the ‘huge disparity of surveillance and power’. The Guardian, 10/03/2014, http://www.theguardian.com/technology/2014/mar/10/edward-snowden-surveillance-government-nsa-gchq-barton-gellman?CMP=twt_gu
Holling C.S. (1973) Resilience and stability of ecological systems. Annual review of ecology and systematics 4: 1–23.10.1146/annurev.es.04.110173.000245
Hughes A.L., Palen L. (2009) Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management 6(3): 248–260.10.1504/IJEM.2009.031564
Hunter C. (2012) Is resilience still a useful concept when working with children and young people? Australian Institute of Family Studies, CFCA Paper No. 2, April 2012.
Kazman, R., Klein, M., Barbacci, M., Longstaff, T., Lipson, H., Carriere, J. (1998) The architecture tradeoff analysis method, Engineering of Complex Computer Systems, 1998. ICECCS’98. Proceedings. Fourth IEEE International Conference on, pp. 68–78.
Kikuchi M. (2003) Analysis and design from a viewpoint of information flow. In: Löwe B., Malzkom W., Räsch T. (eds) Foundations of the Formal Sciences II, Trends in Logic, vol. 17, Springer Netherlands, pp. 119–12210.1007/978-94-017-0395-6_9
Kujala S., Väänänen-Vainio-Mattila K. (2009) Value of information systems and products: Understanding the users’ perspective and values. Journal of Information Technology Theory and Application 9(4): 23–39.
Mark G.J., Al-Ani B., Semaan B. (2009) Resilience through technology adoption: merging the old and the new in Iraq. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 689–698.10.1145/1518701.1518808
OECD (2008) Concepts and dilemmas of state building in fragile situations: From fragility to resilience. Journal on Development Volume 9, No. 3.10.1787/journal_dev-v9-art27-en
OECD (2013) OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Organisation for Economic Co-operation and Development.
Primiero, G., (2016), Information in the philosophy of computer science, in Floridi L. (ed) The Routledge Handbook of Philosophy of Information, 90–106, Routledge.
Rutter M. (2006) Implications of resilience concepts for scientific understanding. Annals of the New York Academy of Sciences 1094(1): 1–12.10.1196/annals.1376.002
Shklovski I., Palen L., Sutton J. (2008) Finding community through information and communication technology in disaster response. Proceedings of the 2008 ACM conference on Computer supported cooperative work, ACM, pp. 127–136.10.1145/1460563.1460584
Venkatesh V., Morris M.G., Davis G.B., Davis F.D. (2003) User acceptance of information technology: Toward a unified view. MIS quarterly, pp. 425–478.10.2307/30036540
Wright M.O., Masten A.S., Narayan A.J. (2013) Resilience processes in development: Four waves of research on positive adaptation in the context of adversity. In: Handbook of Resilience in Children, Springer, pp. 15–37.10.1007/978-1-4614-3661-4_2
Yoo D., Huldtgren A., Woelfer J.P., Hendry D.G., Friedman B. (2013) A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 419–428.10.1145/2470654.2470715
Yoshikawa H. (1981) General Design Theory and a CAD system, In: Man-machine Communication in CAD/CAM, T. Sata, E. Warman (editors), pp. 35–57, North-Holland, Amsterdam.
Yu E.S.K. (1991) Towards modelling and reasoning support for early-phase requirements engineering, in Requirements Engineering, 1997, Proceedings of the Third IEEE International Symposium on, pp. 226-235.