Skip to main content

Design for Values in ICT

  • Reference work entry
  • First Online:
Handbook of Ethics, Values, and Technological Design

Abstract

Information and communication technologies (ICT) are becoming pervasive. ICT development has accelerated, and within a few decades its use has expanded from particular work domains to diverse areas of work and everyday life. Consequently, the range of ICT stakeholders expanded from highly trained experts to all kinds of people with varying expertise and abilities. Sometimes, even people, who are not active users, are affected by the surrounding ICT.

Since ICT influences stakeholders’ lives and in particular also their values, the ethical impact of ICT and the active consideration of values throughout design of ICT have become topics for research in several disciplines, including among others computer ethics, social informatics, or human-computer interaction. This chapter provides an overview of the history of ICT; different approaches to investigating, analyzing, and incorporating values in ICT; and practical methods to account for values in the ICT design process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 699.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Alsheikh T, Rode JA, Lindley SE (2011) (Whose) value-sensitive design: a study of long-distance relationships in an Arabic cultural context. In: Proceedings of the ACM 2011 conference on computer supported cooperative work. ACM, Hangzhou, pp 75-84

    Chapter  Google Scholar 

  • Bødker S, Grønbæk K (1991) Cooperative prototyping: users and designers in mutual activity. Int J Man-Mach Stud 34(3):453–478

    Article  Google Scholar 

  • Borning A, Muller M (2012) Next steps for value sensitive design. In: Proceedings 34th ACM SIGCHI conference on human factors in computing systems, Austin, Texas, pp 1125–1134

    Google Scholar 

  • Borning A, Friedman B, Davis J, Lin P (2005) Informing public deliberation: value sensitive design of indicators for a large-scale urban simulation. In: Proceedings of ECSCW, Paris, France, pp 449–468

    Google Scholar 

  • Bowker G, Star SL (1999) Sorting things out: classification and Its consequences. MIT Press, Cambridge, MA

    Google Scholar 

  • Boyd D, Crawford K (2011) Six provocations for big data. A decade in internet time: symposium on the dynamics of the internet and society. Available at SSRN: http://dx.doi.org/10.2139/ssrn.1926431

  • Bozdag E, van de Poel I (2013) Designing for diversity in online news recommenders. In: Technology management in the IT-Driven Services (PICMET), proceedings of PICMET’13, Portland, Oregon, pp. 1101–1106

    Google Scholar 

  • Branham SM, Thieme A, Nathan LP, Harrison S, Tatar D, Olivier P (2014) Co-creating & identity-making in CSCW: revisiting ethics in design research. In: Proceedings of 36th ACM conference on computer supported cooperative work & social computing, Vancouver, Canada, pp 305–308

    Google Scholar 

  • Cavoukian A (2009) Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Toronto

    Google Scholar 

  • Cockton G (2006) Designing worth is worth designing. In: Proceedings of 4th Nordic conference on human-computer interaction: changing roles, Oslo, Norway, pp 165–174

    Google Scholar 

  • Crabtree A (2003) Designing collaborative systems – a practical guide to ethnography, Springer series: computer supported cooperative work. Springer, London

    Google Scholar 

  • Denning T, Kohno T, Levy HM (2013) Computer security and the modern home. Commun ACM 56(1):94–103

    Article  Google Scholar 

  • Detweiler CA, Hindriks KV (2012) Value-sensitive design patterns for pervasive health care. In: Proceedings of IEEE international conference on pervasive computing and communications, Lugano, Switzerland, pp 908–913

    Google Scholar 

  • Detweiler CA, Pommeranz A, Stark L (2012a) Workshop on methods to account for values in human-centered computing held in conjunction with the ACM SIGCHI conference on human factors in computing systems – CHI’12, Austin, Texas

    Google Scholar 

  • Detweiler CA, Dechesne F, Hindriks KV, Jonker CM (2012b) Ambient intelligence implies responsibility. In: Bosse T (ed), IOS Press Amsterdam, Ambient intelligence and smart environments, Ebook vol 12, Agents and ambient intelligence, IOS Press Amsterdam, The Netherlands, pp 33–61

    Google Scholar 

  • Detweiler CA, Harbers M, Hindriks K (2014) Value stories: putting values into requirements engineering. In: Proceedings of workshop on creativity in requirements engineering (CreaRE), Essen, Germany

    Google Scholar 

  • Fitrianie S, Huldtgren A, Alers H, Guldemond NAA (2013) SmartTV platform for wellbeing, care and social support for elderly at home. In: Biswas J, Kobayashi H, Wong L, Abdulrazak B, Mokhtar M (eds). Inclusive society: health and wellbeing in the community, and care at home. Lecture notes in computer science, vol 7910, Springer Berlin Heidelberg, pp 94–101

    Google Scholar 

  • Flanagan M, Howe DC, Nissenbaum H (2005) Values at play: design tradeoffs in socially-oriented game design. In: Proceedings of ACM SIGCHI conference on human factors in computing systems, Portland, Oregon, pp 751–760

    Google Scholar 

  • Flanagan M, Nissenbaum H, Belman J, Diamond J (2007) A method for discovering values in digital games. In: Situated play, proceedings of DiGRA conference. http://www.digra.org/wp-content/uploads/digital-library/07311.46300.pdf. Retrieved on 25 Aug 2014

  • Friedman B (1995) “It’s the computer’s fault”: reasoning about computers as moral agents. In: Proceedings of ACM SIGCHI conference on human factors in computing systems, Denver, Colorado, pp 226–227

    Google Scholar 

  • Friedman B, Hendry DG (2012) The envisioning cards: a toolkit for catalyzing humanistic and technical imaginations. In: Proceedings of ACM SIGCHI conference on human factors in computing systems, Austin, Texas, pp 1145–1148

    Google Scholar 

  • Friedman B, Kahn PH Jr (2003) Human values, ethics, and design. In: Jacko J, Sears A (eds) The human-computer interaction handbook. Lawrence Erlbaum Associates, Mahwah

    Google Scholar 

  • Friedman B, Nissenbaum H (1996) Bias in computer systems. Trans Inf Syst (TOIS), 14(3):330–347

    Article  Google Scholar 

  • Friedman B, Nissenbaum H (1997) Software agents and user autonomy. In: Proceedings of the first international conference on autonomous agents, Marina del Rey, CA, USA, pp 466–469

    Google Scholar 

  • Friedman B, Khan PH Jr, Howe DC (2000) Trust online. Commun ACM 43(12):34–40

    Article  Google Scholar 

  • Friedman B, Kahn P, Hagman J, Severson RL, Gill B (2006) The watcher and the watched: social judgments about privacy in a public place. Hum Comput Interact 21:235–272

    Article  Google Scholar 

  • Friedman B, Freier NG, Kahn P, Lin P, Sodeman R (2008a) Office window of the future? Field-based analyses of a new use of a large display. Int J Hum Comput Stud 66(6):452–465

    Article  Google Scholar 

  • Friedman B, Höök K, Gill BT, Eidmar L, Sallmander Prien C, Severson RL (2008b) Personlig integritet: a comparative study of perceptions of privacy in public places in Sweden and the United States. In: Proceedings of 6th Nordic conference on human-computer interaction, Lund, Sweden, pp 142–151

    Google Scholar 

  • Friedman B, Nathan LP, Kane S, Lin J (2011) Envisioning cards. University of Washington, Seattle. Available at: envisioningcards.com

  • Friedman B, Denning T, Kohno T (2013a) Security cards: a security threat brainstorming toolkit. University of Washington, Seattle. Available at: securitycards.cs.washington.edu. Retrieved on 25 Aug 2014

  • Friedman B, Kahn PH, Borning A, Huldtgren A (2013b) Value sensitive design and information systems. In: Doorn N, Schuurbiers D, van de Poel I, Gorman ME (eds) Early engagement and new technologies: opening up the laboratory, vol 16, Springer series: philosophy of engineering and technology. Springer, Dordrecht, pp 55–59

    Chapter  Google Scholar 

  • Gowans C (2012) Moral relativism. In: Zalta EN (ed) The Stanford encyclopedia of philosophy (Spring 2012 edn). The metaphysics research lab, Stanford, CA. URL: http://plato.stanford.edu/archives/spr2012/entries/moral-relativism/ Retrieved on 25 Aug 2014

  • Holtzblatt K, Jones S (1993) Contextual inquiry: a participatory technique for system design. In Schuler D Namioka A (eds.), Lawrence Erlbaum Associates, Hillsdale, pp 177–210

    Google Scholar 

  • Huldtgren A, Wiggers P, Jonker CM (2013) Designing for self-reflection on values for improved life decisions. Interact Comput 2013. doi:10.1093/iwc/iwt025

    Google Scholar 

  • Huldtgren A, Ascencio G, Pohlmeyer A, Romero Herrera N (2014) AAL-technology acceptance through experience. In: Proceedings of pervasive health 2014, Oldenburg, Germany

    Google Scholar 

  • Johnson DG (1985) Computer ethics, 1st edn. Prentice Hall, Englewood Cliffs

    Google Scholar 

  • Kahn PH, Friedman B, Gill BT, Hagman J, Severson RL, Freier NG (2008) A plasma display window? The shifting baseline problem in a technologically-mediated natural word. J Environ Psychol 28(2):192–199

    Article  Google Scholar 

  • Kensing F, Madsen KH (1992) Generating visions: future workshops and metaphorical design. Lawrence Erlbaum Associates, Roskilde, pp 155–168

    Google Scholar 

  • Kling R (1999) What is social informatics and why does it matter? D-Lib Mag 5(1):205–220

    Google Scholar 

  • Koch SH, Proynova R, Paech B, Wetter T (2013) How to approximate users’ values while preserving privacy: experiences with using attitudes towards work tasks as proxies for personal value elicitation. Ethics Inf Technol 15(1):45–61

    Article  Google Scholar 

  • Koepfler JA, Fleischmann KR (2011) Classifying values in informal communication: adapting the meta-inventory of human values for tweets. Proc Am Soc Inf Sci Technol 48(1):1–4

    Article  Google Scholar 

  • Kraemer F, van Overveld K, Peterson M (2011) Is there an ethics of algorithms? Ethics Inf Technol 13(3):251–260

    Article  Google Scholar 

  • Le Dantec CA, Poole ES, Wyche SP (2009) Values as lived experience: evolving value sensitive design in support of value discovery. In: Proceedings of 27th international ACM, SIGCHI conference on human factors in computing systems, Boston, USA, pp 1141–1150

    Google Scholar 

  • Mander-Huits N, Zimmer M (2009) Values and pragmatic action: the challenges of introducing ethical intelligence in technical design communities. Int Rev Inf Ethics 10:1–7

    Google Scholar 

  • Marshall CC, Shipman FM (2011) Social media ownership: using twitter as a window onto current attitudes and beliefs. In: Proceedings of the SIGCHI conference on human factors in computing systems, Vancouver, Canada, pp 1081–1090

    Google Scholar 

  • Miceli M, Castelfranchi C (1989) A cognitive approach to values. J Theory Soc Behav 19:169–193

    Article  Google Scholar 

  • Miller J, Friedman B, Jancke G, Gill B (2007) Value tensions in design: the value sensitive design, development, and appropriation of a corporation’s groupware system. Proc GROUP 2007:281–290

    Google Scholar 

  • Morandini M, Nguyen D, Perini A, Siena A, Susi A (2008) Tool-supported development with tropos: the conference management system case study. In: Luck M, Padgham L (eds) Agent-oriented software engineering VIII, lecture notes in computer science, vol 4951. Springer, Berlin/Heidelberg, pp 182–196

    Chapter  Google Scholar 

  • Movius LB, Krup N (2009) US and EU privacy policy: comparison of regulatory approaches. Int J Commun 3:19

    Google Scholar 

  • Napoli P (1999) Deconstructing the diversity principle. J Commun 49(4):7–34

    Article  Google Scholar 

  • Nathan LP, Klasnja PV, Friedman B (2007) Value scenarios: a technique for envisioning systemic effects of new technologies. In: CHI ‘07 extended abstracts on human factors in computing systems, ACM, pp 2585–2590

    Google Scholar 

  • Nissenbaum H (1998) Values in the design of computer systems. Comput Soc 28(1):38–39

    Article  Google Scholar 

  • Nissenbaum H (2005) Values in technical design. In: Encyclopedia of science, technology and ethics. Macmillan, New York, pp lxvi–lxx

    Google Scholar 

  • Norman DA, Draper SW (1986) User centered system design: new perspectives on human-computer interaction. Boca Raton, Florida, CRC Press

    Google Scholar 

  • O’Neill E (2000) User-development cooperation in software development: building common ground and usable systems (ed: van Rijsbergen CJ). Springer, London

    Google Scholar 

  • Oxford Dictionary (2014) http://www.oxforddictionaries.com/definition/english/information-technology. Retrieved 25 Aug 2014

  • Pariser E (2011) The filter bubble: what the internet is hiding from you. Penguin Press, New York

    Google Scholar 

  • Pommeranz A, Detweiler C, Wiggers P, Jonker CM (2011) Elicitation of situated values: need for tools to help stakeholders and designers to reflect and communicate. Ethics Inf Technol 14(4):285–303

    Article  Google Scholar 

  • Potts C (1999) Scenic: a strategy for inquiry-driven requirements determination. In: Proceedings of IEEE fourth international symposium on requirements engineering (RE’99), Limerick, Ireland, pp 58–65

    Google Scholar 

  • Rokeach M (1973) The nature of human values. Free Press, New York

    Google Scholar 

  • Rosson MB, Carroll JM (2002) Scenario based design. In: Jacko J, Sears A (eds) The human-computer interaction handbook: fundamentals, evolving technologies and emerging applications. Erlbaum, Boca Raton, pp 1032–1050

    Google Scholar 

  • Rosson MB, Carroll JM (2009) Scenario based design. Human-computer interaction. Boca Raton, pp 145–162

    Google Scholar 

  • Sallai G (2012) Defining infocommunications and related terms. Acta Polytech Hung 9(6)

    Google Scholar 

  • Sanders EB-N, Westerlund B (2011) Experience, exploring and experimenting in and with co-design spaces. In: Proceedings of NORDES’11, Helsinki, pp 1–5

    Google Scholar 

  • Sanders C, Rogers A, Bowen R et al (2012) Exploring barriers to participation and adoption of telehealth and telecare within the Whole System Demonstrator trial: a qualitative study. BMC Health Serv Res Healthc Needs Demand 12:220

    Article  Google Scholar 

  • Schneider FB (ed) (1999) Trust in cyberspace. National Academies Press, Washington, DC

    Google Scholar 

  • Schwartz SH, Bilsky W (1990) Toward a theory of the universal content and structure of values: extensions and cross-cultural replications. J Pers Soc Psychol 58:878–891

    Article  Google Scholar 

  • Sharkey A, Sharkey N (2012) Granny and the robots: ethical issues in robot care for the elderly. Ethics Inf Technol 14(1):27–40

    Article  Google Scholar 

  • Shilton K (2012) Values levers: building ethics into design. Sci Technol Hum Values 38(3):374–397

    Article  Google Scholar 

  • Simonsen J (2009) The role of ethnography in the design and implementation of IT systems. Des Princ Pract Int J 3(3):253–264

    Google Scholar 

  • Stahl BC, Heersmink R, Goujon P, Flick C, van den Hoven J, Wakunuma K, Rader M (2010) Issues, concepts and methods relating to the identification of the ethics of emerging ICTs. Available at: http://www.academia.edu/432392/Issues_Concepts_and_Methods_Relating_to_the_Identification_of_the_Ethics_of_Emerging_ICTs. Retrieved on 25 Aug 2014

  • EIDD Stockholm Declaration (2004) Retrieved on 25 Aug 2014 from http://www.designforalleurope.org/Design-for-All/EIDD-Documents/Stockholm-Declaration/

  • Thew S, Sutcliffe A (2008) Investigating the role of ’soft issues’ in the RE process. In: Proceedings of 16th IEEE international requirements engineering conference, Barcelona, Spain, pp 63–66

    Google Scholar 

  • van den Berg N, Schumann M, Kraft K, Hoffmann W (2012) Telemedicine and telecare for older patients – a systematic review. Maturitas 73(2):94–114

    Article  Google Scholar 

  • van den Hoven J, Helbing D, Pedreschi D, Domingo-Ferrer J, Gianotti F, Christen M (2012) FuturICT-The road towards ethical ICT. The European Physical Journal Special Topics. arXiv preprint arXiv:1210.8181, 214(1):153–181

    Google Scholar 

  • van Wynsberghe A (2013) Designing robots for care: care centered value-sensitive design. Sci Eng Ethics 19(2):407–433

    Article  Google Scholar 

  • Woelfer JP, Iverson A, Hendry DG, Friedman B, Gill BT (2011) Improving the safety of homeless young people with mobile phones: values, form and function. In: Proceedings of ACM SIGCHI conference on human factors in computing systems, Vancouver, Canada, pp 1707–1716

    Google Scholar 

  • Yoo D, Huldtgren A, Woelfer JP, Hendry DG, Friedman B (2013) A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts. In: Proceedings of the ACM SIGCHI conference on human factors in computing systems, Paris, France, pp 419–428

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alina Huldtgren .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Dordrecht

About this entry

Cite this entry

Huldtgren, A. (2015). Design for Values in ICT . In: van den Hoven, J., Vermaas, P., van de Poel, I. (eds) Handbook of Ethics, Values, and Technological Design. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6970-0_35

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6970-0_35

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6969-4

  • Online ISBN: 978-94-007-6970-0

  • eBook Packages: Humanities, Social Sciences and Law

Publish with us

Policies and ethics