Electronic Exchange of Signals on Youth at Risk: A Value Perspective

Chapter
Part of the Information Technology and Law Series book series (ITLS, volume 20)

Abstract

An estimated 3.5–12% of Dutch youngsters has a multitude of psychosocial problems, which are either directed internally (emotional problems) or externally (behavioral problems) (Zeijl et al. 2005). These problems have reached a level where they impair their social functioning and may even cause harm to others. The recognition of children with these problems can be difficult. Many of these youngsters are known by some organization, such as schools, police, youth care or sports clubs, as having a problem. However, the dispersed information often is never combined, so that the informational puzzle around a child is incomplete.

Abbreviations

VIR

Verwijsindex Risicojongeren

VSD

Value-sensitive design

ANT

Actor-network theory

References

  1. Albrechtslund A (2007) Ethics and technology design. Ethics Inf Technol 9(1):63–72CrossRefGoogle Scholar
  2. Bimber B (1994) Three faces of technological determinism. In: Smith MR, Marx L (eds) Does technology drive history? MIT Press, London, pp 79–100Google Scholar
  3. Birrer FAJ (2005) Data mining to combat terrorism and the roots of privacy concerns. Ethics Inf Technol 7(4):211–220CrossRefGoogle Scholar
  4. Boehner K et al (2005) Critical technical practice as a methodology for values in design. Paper presented at the annual meeting on computer human interactionGoogle Scholar
  5. Bouwman H et al (2005) Information communication technology in organizations: adoption, implementation, use and effects. Sage, LondonGoogle Scholar
  6. Bowker GC, Star SL (1999) Sorting things out classification and its consequences. MIT Press, New YorkGoogle Scholar
  7. Breeuwsma G (2009) Kind wordt te weinig met rust gelaten. NRC Handelsblad, 26 MayGoogle Scholar
  8. Brey P (2000) Disclosive computer ethics. Comput Soc 30(4):10–16Google Scholar
  9. Brown J et al (1998) A longitudinal analysis of risk factors for child maltreatment: findings of a 17-year prospective study of officially recorded and self-reported child abuse and neglect. Child Abuse Negl 22(11):1065–1078CrossRefGoogle Scholar
  10. Daniel RS (2003) Disciplined intuition: subjective aspects of judgment and decision making in child protective services. Texas A&M University, College station, TexasGoogle Scholar
  11. Dekovi M (1999) Risk and protective factors in the development of problem behavior during adolescence. J Youth Adolesc 28(6):667–685CrossRefGoogle Scholar
  12. Douma S, Schreuder H (2002) Agency theory. In: Douma S, Schreuder H (eds) Economic approaches to organizations. Financial Times/Prentice Hall, AmsterdamGoogle Scholar
  13. Flanagan M, Howe D, Nissenbaum H (2005) Embodying values in technology: theory and practice (draft). In: Hoven M, van den Weckert J (eds) Information technology and moral philosophy. Cambridge University Press, CambridgeGoogle Scholar
  14. Friedman B, Freier NG (2005) Value sensitive design. In: Fisher KE, Erdelez S, McKechnie EF (eds) Theories of information behavior: a researcher’s guide. Information Today, Medford, pp 368–372Google Scholar
  15. Friedman B, Kahn Jr PH (2002) Human values, ethics, and design. Human factors and ergonomics, pp 1177–1201Google Scholar
  16. Friedman B, Nissenbaum H (1996) Bias in computer systems. ACM Trans Inform Syst 14(3):330–347CrossRefGoogle Scholar
  17. Friedman B, Kahn Jr PH, Borning A (2001) Value sensitive design: theory and methods. University of Washington, SeattleGoogle Scholar
  18. Groenewegen J (2005) Designing markets in infrastructures: from blueprint to learning. Delft, TU DelftGoogle Scholar
  19. Hanseth O, Monteiro E (1998) Understanding information infrastructure (unpublished book). Available at http://heim.ifi.uio.no/~oleha/Publications/bok.pdf
  20. Hughes TP (1994) Technological momentum. In: Smith MR, Marx L (eds) Does technology drive history?. MIT Press, London, pp 101–113Google Scholar
  21. Koppenjan J, Groenewegen J (2005) Institutional design for complex technological systems. Int J Technol Policy Manag 5(3):240–257CrossRefGoogle Scholar
  22. Kunneke R (2008) Institutional reform and technological practice: the case of electricity. Ind Corp Chang 17(2):233CrossRefGoogle Scholar
  23. Manders-Huits N, Zimmer M (2008) Values and pragmatic action: the challenges of engagement with technical communities in support of value-conscious design (working paper)Google Scholar
  24. Mintzberg H (1983) Structure in fives: designing effective organizations. Prentice Hall, Englewood CliffsGoogle Scholar
  25. Monasso T (2006) I don’t know what I’m doing. Mekelessay 2006. Delft, TU DelftGoogle Scholar
  26. Monasso T (2008) Policy considerations for the use of IT-supported recognition of children with psychosocial problems (unpublished work). Delft, TU DelftGoogle Scholar
  27. Munro E (1999) Common errors of reasoning in child protection work. Child Abuse Negl 23(8):745–758CrossRefGoogle Scholar
  28. Orlikowski WJ, Robey D (1991) Information technology and the structuring of organizations. Inf Syst Res 2(2):143–169CrossRefGoogle Scholar
  29. Raiffa H, Richardson J, Metcalfe D (2002) Negotiation analysis the science and art of collaborative decision making. Harvard University Press, CambridgeGoogle Scholar
  30. van den Hoven J (2007) ICT and value sensitive design. Int Fed Inf Process 233:67CrossRefGoogle Scholar
  31. van IJzendoorn MH, et al. (2007) De Nationale Prevalentiestudie Mishandeling van Kinderen en Jeugdigen (NPM-2005). Den Haag, Wetenschappelijk Onderzoeks- en DocumentatiecentrumGoogle Scholar
  32. Vedder A (1999) KDD: the challenge to individualism. Ethics Inf Technol 1(4):275–281CrossRefGoogle Scholar
  33. Weijers I (2007) Het gaat best goed met de jeugd. Grijp beperkter en gerichter in. NRC Handelsblad, 29 SeptemberGoogle Scholar
  34. Williamson OE (1998) Transaction cost economics: how it works, where it is headed. The Economist 1:146Google Scholar
  35. Zeijl E et al (2005) Kinderen in Nederland. Den Haag, Sociaal en Cultureel PlanbureauGoogle Scholar

Copyright information

© T.M.C. ASSER PRESS, The Hague, The Netherlands, and the authors 2011 2011

Authors and Affiliations

  1. 1.Zenc Research and ConsultancyThe HagueThe Netherlands

Personalised recommendations