Have a personal or library account? Click to login

Value-Sensitive Co-Design for Resilient Information Systems

Open Access
|Nov 2020

References

  1. Alcoff, L. (1991) The problem of speaking for others, Cultural critique, n. 20, pp. 5–32.
  2. Barn, B., Primiero, G. and Barn, R. (2015) An approach to early evaluation of informational privacy requirements. SAC ’15: Proceedings of the 30th Annual ACM Symposium on Applied Computing, April 2015, pages 1370–1375, https://doi.org/10.1145/2695664.269578810.1145/2695664.2695788
  3. Barwise J., Seligman, J. (1997) Information Flow: the logic of distributed systems. Cambridge University Press.10.1017/CBO9780511895968
  4. Beyer H., Holtzblatt K. (1998) Contextual design: defining customer-centered systems. Morgan Kaufmann Pub.10.1145/286498.286629
  5. Bjerknes G., Ehn P., Kyng M., Nygaard K. (1987) Computers and democracy: A Scandinavian challenge. Gower Pub Co.
  6. Borning, A. and Muller, M. (2012) Next steps for value sensitive design, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, pp. 1125–1134.
  7. Butschi, D., Courant, M. and Hilty, L.M. (2005) Towards sustainable pervasive computing – Guest editorial, IEEE Technology and Society Magazine, vol. 24(1), pp. 7–8.
  8. Callister W, (1994) Mechanical properties of metals. In Materials science and engineering, an introduction, New York: John Wiley & Sons, Inc, pp. 106–147.
  9. Colburn, T. R., (1999). Software, Abstraction, and Ontology, The Monist, 82(1): 3-19.10.5840/monist19998215
  10. Darimont, R., Delor, E., Massonet, P., van Lamsweerde, A. (1997) GRAIL/KAOS: an environment for goal-driven requirements engineering, Proceedings of the 19th ACM international conference on Software engineering, pp. 612–613.
  11. Davis F.D. (1993) User acceptance of information technology: system characteristics, user perceptions and behavioral impacts, International Journal of Man-Machine Studies, vol. 38, pp. 475–487.
  12. Eisenhardt, Kathleen M. (1989) Building theories from case study research, Academy of management review, vol. 14(4), pp. 532–550.
  13. Erol O., Sauser B.J., Mansouri M. (2010) A framework for investigation into extended enterprise resilience. Enterprise Information Systems 4(2): 111–136.10.1080/17517570903474304
  14. Friedman B., Kahn Jr P.H., Borning A. (2006) Value sensitive design and information systems. Human-computer interaction in management information systems: Foundations 5: 348–372.
  15. Gao H., Barbier G., Goolsby R. (2011) Harnessing the crowdsourcing power of social media for disaster relief. Intelligent Systems, IEEE 26(3): 10–14.10.1109/MIS.2011.52
  16. Greenbaum J., Kyng M. (1991) Design at work: Cooperative design of computer systems. L. Erlbaum Associates Inc. Hillsdale, NJ, USA.
  17. Gellman, B. (2014) Snowden has shown the ‘huge disparity of surveillance and power’. The Guardian, 10/03/2014, http://www.theguardian.com/technology/2014/mar/10/edward-snowden-surveillance-government-nsa-gchq-barton-gellman?CMP=twt_gu
  18. Greenberg M.T. (2006) Promoting resilience in children and youth. Annals of the New York Academy of Sciences 1094(1): 139–150.10.1196/annals.1376.013
  19. Holling C.S. (1973) Resilience and stability of ecological systems. Annual review of ecology and systematics 4: 1–23.10.1146/annurev.es.04.110173.000245
  20. Hughes A.L., Palen L. (2009) Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management 6(3): 248–260.10.1504/IJEM.2009.031564
  21. Hunter C. (2012) Is resilience still a useful concept when working with children and young people? Australian Institute of Family Studies, CFCA Paper No. 2, April 2012.
  22. Kakuda Y., Kikuchi M. (2001a) Topology on classifications in abstract design theory. Proc. IWES’01, pp. 123–130.
  23. Kakuda Y., Kikuchi M. (2001b) Abstract design theory. Annals Japan Association of Philosophy of Science 29(1): 1–6.
  24. Kazman, R., Klein, M., Barbacci, M., Longstaff, T., Lipson, H., Carriere, J. (1998) The architecture tradeoff analysis method, Engineering of Complex Computer Systems, 1998. ICECCS’98. Proceedings. Fourth IEEE International Conference on, pp. 68–78.
  25. Kikuchi M. (2003) Analysis and design from a viewpoint of information flow. In: Löwe B., Malzkom W., Räsch T. (eds) Foundations of the Formal Sciences II, Trends in Logic, vol. 17, Springer Netherlands, pp. 119–12210.1007/978-94-017-0395-6_9
  26. Kikuchi M., Nagasaka I. (2002) On the three axioms of general design theory. Proc. IWES’02, pp. 69–76.
  27. Kujala S., Väänänen-Vainio-Mattila K. (2009) Value of information systems and products: Understanding the users’ perspective and values. Journal of Information Technology Theory and Application 9(4): 23–39.
  28. Mark G.J., Al-Ani B., Semaan B. (2009) Resilience through technology adoption: merging the old and the new in Iraq. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 689–698.10.1145/1518701.1518808
  29. MoJ (2013) Youth Justice Statistics 2011/12 England and Wales. Ministry of Justice.
  30. Moor J.H. (1978). Three Myths of Computer Science, The British Journal for the Philosophy of Science, 29(3): 213-222.10.1093/bjps/29.3.213
  31. Nellis M. (2004) The ‘Tracking’ Controversy: The Roots of Mentoring and Electronic Monitoring. Youth Justice 4(2): 77.10.1177/147322540400400202
  32. OECD (2008) Concepts and dilemmas of state building in fragile situations: From fragility to resilience. Journal on Development Volume 9, No. 3.10.1787/journal_dev-v9-art27-en
  33. OECD (2013) OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Organisation for Economic Co-operation and Development.
  34. Primiero, G., (2016), Information in the philosophy of computer science, in Floridi L. (ed) The Routledge Handbook of Philosophy of Information, 90–106, Routledge.
  35. Primiero, G., Raimondi, F., Chen, T., (2019). A theory of change for prioritised resilient and evolvable software systems, Synthese, doi:10.1007/s11229-019-02305-7.10.1007/s11229-019-02305-7
  36. Primiero, G., (2020), On the Foundations of Computing, Oxford University Press.10.1093/oso/9780198835646.001.0001
  37. Rumbaugh, James and Jacobson, Ivar and Booch, Grady (2004). The Unified Modeling Language Reference Manual, Pearson Higher Education.
  38. Rutter M. (2006) Implications of resilience concepts for scientific understanding. Annals of the New York Academy of Sciences 1094(1): 1–12.10.1196/annals.1376.002
  39. Sanders E.N. (2000) Generative tools for co-designing. In: Collaborative design, Springer, pp. 3–12.10.1007/978-1-4471-0779-8_1
  40. Schön D.A. (1983) The reflective practitioner: How professionals think in action, vol. 5126. Basic books.
  41. Shklovski I., Palen L., Sutton J. (2008) Finding community through information and communication technology in disaster response. Proceedings of the 2008 ACM conference on Computer supported cooperative work, ACM, pp. 127–136.10.1145/1460563.1460584
  42. Smith D., Goldson B., Muncie J. (2006) Youth crime and justice: research, evaluation and ‘evidence’. Youth, crime and justice: critical issues, p. 78.
  43. Turner, R., (2011). Specification, Minds & Machines, 21(2): 135–152.10.1007/s11023-011-9239-x
  44. Ungar M. (2013) Resilience, trauma, context, and culture. Trauma, Violence, & Abuse 14(3): 255–266.10.1177/1524838013487805
  45. Venkatesh V., Morris M.G., Davis G.B., Davis F.D. (2003) User acceptance of information technology: Toward a unified view. MIS quarterly, pp. 425–478.10.2307/30036540
  46. Wright M.O., Masten A.S., Narayan A.J. (2013) Resilience processes in development: Four waves of research on positive adaptation in the context of adversity. In: Handbook of Resilience in Children, Springer, pp. 15–37.10.1007/978-1-4614-3661-4_2
  47. Yin, R. K. (2009) Case study research: Design and methods (4th Ed.). Thousand Oaks, CA: Sage.
  48. Yoo D., Huldtgren A., Woelfer J.P., Hendry D.G., Friedman B. (2013) A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 419–428.10.1145/2470654.2470715
  49. Yoshikawa H. (1981) General Design Theory and a CAD system, In: Man-machine Communication in CAD/CAM, T. Sata, E. Warman (editors), pp. 35–57, North-Holland, Amsterdam.
  50. Yu E.S.K. (1991) Towards modelling and reasoning support for early-phase requirements engineering, in Requirements Engineering, 1997, Proceedings of the Third IEEE International Symposium on, pp. 226-235.
DOI: https://doi.org/10.2478/slgr-2020-0032 | Journal eISSN: 2199-6059 | Journal ISSN: 0860-150X
Language: English
Page range: 141 - 164
Published on: Nov 4, 2020
Published by: University of Białystok
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year
Related subjects:

© 2020 Giuseppe Primiero, Balbir Barn, Ravinder Barn, published by University of Białystok
This work is licensed under the Creative Commons Attribution 4.0 License.