References
- Alcoff, L. (1991) The problem of speaking for others, Cultural critique, n. 20, pp. 5–32.
- Barn, B., Primiero, G. and Barn, R. (2015) An approach to early evaluation of informational privacy requirements. SAC ’15: Proceedings of the 30th Annual ACM Symposium on Applied Computing, April 2015, pages 1370–1375, https://doi.org/10.1145/2695664.269578810.1145/2695664.2695788
- Barwise J., Seligman, J. (1997) Information Flow: the logic of distributed systems. Cambridge University Press.10.1017/CBO9780511895968
- Beyer H., Holtzblatt K. (1998) Contextual design: defining customer-centered systems. Morgan Kaufmann Pub.10.1145/286498.286629
- Bjerknes G., Ehn P., Kyng M., Nygaard K. (1987) Computers and democracy: A Scandinavian challenge. Gower Pub Co.
- Borning, A. and Muller, M. (2012) Next steps for value sensitive design, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, pp. 1125–1134.
- Butschi, D., Courant, M. and Hilty, L.M. (2005) Towards sustainable pervasive computing – Guest editorial, IEEE Technology and Society Magazine, vol. 24(1), pp. 7–8.
- Callister W, (1994) Mechanical properties of metals. In Materials science and engineering, an introduction, New York: John Wiley & Sons, Inc, pp. 106–147.
- Colburn, T. R., (1999). Software, Abstraction, and Ontology, The Monist, 82(1): 3-19.10.5840/monist19998215
- Darimont, R., Delor, E., Massonet, P., van Lamsweerde, A. (1997) GRAIL/KAOS: an environment for goal-driven requirements engineering, Proceedings of the 19th ACM international conference on Software engineering, pp. 612–613.
- Davis F.D. (1993) User acceptance of information technology: system characteristics, user perceptions and behavioral impacts, International Journal of Man-Machine Studies, vol. 38, pp. 475–487.
- Eisenhardt, Kathleen M. (1989) Building theories from case study research, Academy of management review, vol. 14(4), pp. 532–550.
- Erol O., Sauser B.J., Mansouri M. (2010) A framework for investigation into extended enterprise resilience. Enterprise Information Systems 4(2): 111–136.10.1080/17517570903474304
- Friedman B., Kahn Jr P.H., Borning A. (2006) Value sensitive design and information systems. Human-computer interaction in management information systems: Foundations 5: 348–372.
- Gao H., Barbier G., Goolsby R. (2011) Harnessing the crowdsourcing power of social media for disaster relief. Intelligent Systems, IEEE 26(3): 10–14.10.1109/MIS.2011.52
- Greenbaum J., Kyng M. (1991) Design at work: Cooperative design of computer systems. L. Erlbaum Associates Inc. Hillsdale, NJ, USA.
- Gellman, B. (2014) Snowden has shown the ‘huge disparity of surveillance and power’. The Guardian, 10/03/2014, http://www.theguardian.com/technology/2014/mar/10/edward-snowden-surveillance-government-nsa-gchq-barton-gellman?CMP=twt_gu
- Greenberg M.T. (2006) Promoting resilience in children and youth. Annals of the New York Academy of Sciences 1094(1): 139–150.10.1196/annals.1376.013
- Holling C.S. (1973) Resilience and stability of ecological systems. Annual review of ecology and systematics 4: 1–23.10.1146/annurev.es.04.110173.000245
- Hughes A.L., Palen L. (2009) Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management 6(3): 248–260.10.1504/IJEM.2009.031564
- Hunter C. (2012) Is resilience still a useful concept when working with children and young people? Australian Institute of Family Studies, CFCA Paper No. 2, April 2012.
- Kakuda Y., Kikuchi M. (2001a) Topology on classifications in abstract design theory. Proc. IWES’01, pp. 123–130.
- Kakuda Y., Kikuchi M. (2001b) Abstract design theory. Annals Japan Association of Philosophy of Science 29(1): 1–6.
- Kazman, R., Klein, M., Barbacci, M., Longstaff, T., Lipson, H., Carriere, J. (1998) The architecture tradeoff analysis method, Engineering of Complex Computer Systems, 1998. ICECCS’98. Proceedings. Fourth IEEE International Conference on, pp. 68–78.
- Kikuchi M. (2003) Analysis and design from a viewpoint of information flow. In: Löwe B., Malzkom W., Räsch T. (eds) Foundations of the Formal Sciences II, Trends in Logic, vol. 17, Springer Netherlands, pp. 119–12210.1007/978-94-017-0395-6_9
- Kikuchi M., Nagasaka I. (2002) On the three axioms of general design theory. Proc. IWES’02, pp. 69–76.
- Kujala S., Väänänen-Vainio-Mattila K. (2009) Value of information systems and products: Understanding the users’ perspective and values. Journal of Information Technology Theory and Application 9(4): 23–39.
- Mark G.J., Al-Ani B., Semaan B. (2009) Resilience through technology adoption: merging the old and the new in Iraq. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 689–698.10.1145/1518701.1518808
- MoJ (2013) Youth Justice Statistics 2011/12 England and Wales. Ministry of Justice.
- Moor J.H. (1978). Three Myths of Computer Science, The British Journal for the Philosophy of Science, 29(3): 213-222.10.1093/bjps/29.3.213
- Nellis M. (2004) The ‘Tracking’ Controversy: The Roots of Mentoring and Electronic Monitoring. Youth Justice 4(2): 77.10.1177/147322540400400202
- OECD (2008) Concepts and dilemmas of state building in fragile situations: From fragility to resilience. Journal on Development Volume 9, No. 3.10.1787/journal_dev-v9-art27-en
- OECD (2013) OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Organisation for Economic Co-operation and Development.
- Primiero, G., (2016), Information in the philosophy of computer science, in Floridi L. (ed) The Routledge Handbook of Philosophy of Information, 90–106, Routledge.
- Primiero, G., Raimondi, F., Chen, T., (2019). A theory of change for prioritised resilient and evolvable software systems, Synthese, doi:10.1007/s11229-019-02305-7.10.1007/s11229-019-02305-7
- Primiero, G., (2020), On the Foundations of Computing, Oxford University Press.10.1093/oso/9780198835646.001.0001
- Rumbaugh, James and Jacobson, Ivar and Booch, Grady (2004). The Unified Modeling Language Reference Manual, Pearson Higher Education.
- Rutter M. (2006) Implications of resilience concepts for scientific understanding. Annals of the New York Academy of Sciences 1094(1): 1–12.10.1196/annals.1376.002
- Sanders E.N. (2000) Generative tools for co-designing. In: Collaborative design, Springer, pp. 3–12.10.1007/978-1-4471-0779-8_1
- Schön D.A. (1983) The reflective practitioner: How professionals think in action, vol. 5126. Basic books.
- Shklovski I., Palen L., Sutton J. (2008) Finding community through information and communication technology in disaster response. Proceedings of the 2008 ACM conference on Computer supported cooperative work, ACM, pp. 127–136.10.1145/1460563.1460584
- Smith D., Goldson B., Muncie J. (2006) Youth crime and justice: research, evaluation and ‘evidence’. Youth, crime and justice: critical issues, p. 78.
- Turner, R., (2011). Specification, Minds & Machines, 21(2): 135–152.10.1007/s11023-011-9239-x
- Ungar M. (2013) Resilience, trauma, context, and culture. Trauma, Violence, & Abuse 14(3): 255–266.10.1177/1524838013487805
- Venkatesh V., Morris M.G., Davis G.B., Davis F.D. (2003) User acceptance of information technology: Toward a unified view. MIS quarterly, pp. 425–478.10.2307/30036540
- Wright M.O., Masten A.S., Narayan A.J. (2013) Resilience processes in development: Four waves of research on positive adaptation in the context of adversity. In: Handbook of Resilience in Children, Springer, pp. 15–37.10.1007/978-1-4614-3661-4_2
- Yin, R. K. (2009) Case study research: Design and methods (4th Ed.). Thousand Oaks, CA: Sage.
- Yoo D., Huldtgren A., Woelfer J.P., Hendry D.G., Friedman B. (2013) A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 419–428.10.1145/2470654.2470715
- Yoshikawa H. (1981) General Design Theory and a CAD system, In: Man-machine Communication in CAD/CAM, T. Sata, E. Warman (editors), pp. 35–57, North-Holland, Amsterdam.
- Yu E.S.K. (1991) Towards modelling and reasoning support for early-phase requirements engineering, in Requirements Engineering, 1997, Proceedings of the Third IEEE International Symposium on, pp. 226-235.