Abstract
Information and communication technologies (ICT) are becoming pervasive. ICT development has accelerated, and within a few decades its use has expanded from particular work domains to diverse areas of work and everyday life. Consequently, the range of ICT stakeholders expanded from highly trained experts to all kinds of people with varying expertise and abilities. Sometimes, even people, who are not active users, are affected by the surrounding ICT.
Since ICT influences stakeholders’ lives and in particular also their values, the ethical impact of ICT and the active consideration of values throughout design of ICT have become topics for research in several disciplines, including among others computer ethics, social informatics, or human-computer interaction. This chapter provides an overview of the history of ICT; different approaches to investigating, analyzing, and incorporating values in ICT; and practical methods to account for values in the ICT design process.
Keywords
- Information and communication technologies
- Value-sensitive design
- Pervasiveness
- Emerging technologies
- Design methods
This is a preview of subscription content, access via your institution.
Buying options


References
Alsheikh T, Rode JA, Lindley SE (2011) (Whose) value-sensitive design: a study of long-distance relationships in an Arabic cultural context. In: Proceedings of the ACM 2011 conference on computer supported cooperative work. ACM, Hangzhou, pp 75-84
Bødker S, Grønbæk K (1991) Cooperative prototyping: users and designers in mutual activity. Int J Man-Mach Stud 34(3):453–478
Borning A, Muller M (2012) Next steps for value sensitive design. In: Proceedings 34th ACM SIGCHI conference on human factors in computing systems, Austin, Texas, pp 1125–1134
Borning A, Friedman B, Davis J, Lin P (2005) Informing public deliberation: value sensitive design of indicators for a large-scale urban simulation. In: Proceedings of ECSCW, Paris, France, pp 449–468
Bowker G, Star SL (1999) Sorting things out: classification and Its consequences. MIT Press, Cambridge, MA
Boyd D, Crawford K (2011) Six provocations for big data. A decade in internet time: symposium on the dynamics of the internet and society. Available at SSRN: http://dx.doi.org/10.2139/ssrn.1926431
Bozdag E, van de Poel I (2013) Designing for diversity in online news recommenders. In: Technology management in the IT-Driven Services (PICMET), proceedings of PICMET’13, Portland, Oregon, pp. 1101–1106
Branham SM, Thieme A, Nathan LP, Harrison S, Tatar D, Olivier P (2014) Co-creating & identity-making in CSCW: revisiting ethics in design research. In: Proceedings of 36th ACM conference on computer supported cooperative work & social computing, Vancouver, Canada, pp 305–308
Cavoukian A (2009) Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Toronto
Cockton G (2006) Designing worth is worth designing. In: Proceedings of 4th Nordic conference on human-computer interaction: changing roles, Oslo, Norway, pp 165–174
Crabtree A (2003) Designing collaborative systems – a practical guide to ethnography, Springer series: computer supported cooperative work. Springer, London
Denning T, Kohno T, Levy HM (2013) Computer security and the modern home. Commun ACM 56(1):94–103
Detweiler CA, Hindriks KV (2012) Value-sensitive design patterns for pervasive health care. In: Proceedings of IEEE international conference on pervasive computing and communications, Lugano, Switzerland, pp 908–913
Detweiler CA, Pommeranz A, Stark L (2012a) Workshop on methods to account for values in human-centered computing held in conjunction with the ACM SIGCHI conference on human factors in computing systems – CHI’12, Austin, Texas
Detweiler CA, Dechesne F, Hindriks KV, Jonker CM (2012b) Ambient intelligence implies responsibility. In: Bosse T (ed), IOS Press Amsterdam, Ambient intelligence and smart environments, Ebook vol 12, Agents and ambient intelligence, IOS Press Amsterdam, The Netherlands, pp 33–61
Detweiler CA, Harbers M, Hindriks K (2014) Value stories: putting values into requirements engineering. In: Proceedings of workshop on creativity in requirements engineering (CreaRE), Essen, Germany
Fitrianie S, Huldtgren A, Alers H, Guldemond NAA (2013) SmartTV platform for wellbeing, care and social support for elderly at home. In: Biswas J, Kobayashi H, Wong L, Abdulrazak B, Mokhtar M (eds). Inclusive society: health and wellbeing in the community, and care at home. Lecture notes in computer science, vol 7910, Springer Berlin Heidelberg, pp 94–101
Flanagan M, Howe DC, Nissenbaum H (2005) Values at play: design tradeoffs in socially-oriented game design. In: Proceedings of ACM SIGCHI conference on human factors in computing systems, Portland, Oregon, pp 751–760
Flanagan M, Nissenbaum H, Belman J, Diamond J (2007) A method for discovering values in digital games. In: Situated play, proceedings of DiGRA conference. http://www.digra.org/wp-content/uploads/digital-library/07311.46300.pdf. Retrieved on 25 Aug 2014
Friedman B (1995) “It’s the computer’s fault”: reasoning about computers as moral agents. In: Proceedings of ACM SIGCHI conference on human factors in computing systems, Denver, Colorado, pp 226–227
Friedman B, Hendry DG (2012) The envisioning cards: a toolkit for catalyzing humanistic and technical imaginations. In: Proceedings of ACM SIGCHI conference on human factors in computing systems, Austin, Texas, pp 1145–1148
Friedman B, Kahn PH Jr (2003) Human values, ethics, and design. In: Jacko J, Sears A (eds) The human-computer interaction handbook. Lawrence Erlbaum Associates, Mahwah
Friedman B, Nissenbaum H (1996) Bias in computer systems. Trans Inf Syst (TOIS), 14(3):330–347
Friedman B, Nissenbaum H (1997) Software agents and user autonomy. In: Proceedings of the first international conference on autonomous agents, Marina del Rey, CA, USA, pp 466–469
Friedman B, Khan PH Jr, Howe DC (2000) Trust online. Commun ACM 43(12):34–40
Friedman B, Kahn P, Hagman J, Severson RL, Gill B (2006) The watcher and the watched: social judgments about privacy in a public place. Hum Comput Interact 21:235–272
Friedman B, Freier NG, Kahn P, Lin P, Sodeman R (2008a) Office window of the future? Field-based analyses of a new use of a large display. Int J Hum Comput Stud 66(6):452–465
Friedman B, Höök K, Gill BT, Eidmar L, Sallmander Prien C, Severson RL (2008b) Personlig integritet: a comparative study of perceptions of privacy in public places in Sweden and the United States. In: Proceedings of 6th Nordic conference on human-computer interaction, Lund, Sweden, pp 142–151
Friedman B, Nathan LP, Kane S, Lin J (2011) Envisioning cards. University of Washington, Seattle. Available at: envisioningcards.com
Friedman B, Denning T, Kohno T (2013a) Security cards: a security threat brainstorming toolkit. University of Washington, Seattle. Available at: securitycards.cs.washington.edu. Retrieved on 25 Aug 2014
Friedman B, Kahn PH, Borning A, Huldtgren A (2013b) Value sensitive design and information systems. In: Doorn N, Schuurbiers D, van de Poel I, Gorman ME (eds) Early engagement and new technologies: opening up the laboratory, vol 16, Springer series: philosophy of engineering and technology. Springer, Dordrecht, pp 55–59
Gowans C (2012) Moral relativism. In: Zalta EN (ed) The Stanford encyclopedia of philosophy (Spring 2012 edn). The metaphysics research lab, Stanford, CA. URL: http://plato.stanford.edu/archives/spr2012/entries/moral-relativism/ Retrieved on 25 Aug 2014
Holtzblatt K, Jones S (1993) Contextual inquiry: a participatory technique for system design. In Schuler D Namioka A (eds.), Lawrence Erlbaum Associates, Hillsdale, pp 177–210
Huldtgren A, Wiggers P, Jonker CM (2013) Designing for self-reflection on values for improved life decisions. Interact Comput 2013. doi:10.1093/iwc/iwt025
Huldtgren A, Ascencio G, Pohlmeyer A, Romero Herrera N (2014) AAL-technology acceptance through experience. In: Proceedings of pervasive health 2014, Oldenburg, Germany
Johnson DG (1985) Computer ethics, 1st edn. Prentice Hall, Englewood Cliffs
Kahn PH, Friedman B, Gill BT, Hagman J, Severson RL, Freier NG (2008) A plasma display window? The shifting baseline problem in a technologically-mediated natural word. J Environ Psychol 28(2):192–199
Kensing F, Madsen KH (1992) Generating visions: future workshops and metaphorical design. Lawrence Erlbaum Associates, Roskilde, pp 155–168
Kling R (1999) What is social informatics and why does it matter? D-Lib Mag 5(1):205–220
Koch SH, Proynova R, Paech B, Wetter T (2013) How to approximate users’ values while preserving privacy: experiences with using attitudes towards work tasks as proxies for personal value elicitation. Ethics Inf Technol 15(1):45–61
Koepfler JA, Fleischmann KR (2011) Classifying values in informal communication: adapting the meta-inventory of human values for tweets. Proc Am Soc Inf Sci Technol 48(1):1–4
Kraemer F, van Overveld K, Peterson M (2011) Is there an ethics of algorithms? Ethics Inf Technol 13(3):251–260
Le Dantec CA, Poole ES, Wyche SP (2009) Values as lived experience: evolving value sensitive design in support of value discovery. In: Proceedings of 27th international ACM, SIGCHI conference on human factors in computing systems, Boston, USA, pp 1141–1150
Mander-Huits N, Zimmer M (2009) Values and pragmatic action: the challenges of introducing ethical intelligence in technical design communities. Int Rev Inf Ethics 10:1–7
Marshall CC, Shipman FM (2011) Social media ownership: using twitter as a window onto current attitudes and beliefs. In: Proceedings of the SIGCHI conference on human factors in computing systems, Vancouver, Canada, pp 1081–1090
Miceli M, Castelfranchi C (1989) A cognitive approach to values. J Theory Soc Behav 19:169–193
Miller J, Friedman B, Jancke G, Gill B (2007) Value tensions in design: the value sensitive design, development, and appropriation of a corporation’s groupware system. Proc GROUP 2007:281–290
Morandini M, Nguyen D, Perini A, Siena A, Susi A (2008) Tool-supported development with tropos: the conference management system case study. In: Luck M, Padgham L (eds) Agent-oriented software engineering VIII, lecture notes in computer science, vol 4951. Springer, Berlin/Heidelberg, pp 182–196
Movius LB, Krup N (2009) US and EU privacy policy: comparison of regulatory approaches. Int J Commun 3:19
Napoli P (1999) Deconstructing the diversity principle. J Commun 49(4):7–34
Nathan LP, Klasnja PV, Friedman B (2007) Value scenarios: a technique for envisioning systemic effects of new technologies. In: CHI ‘07 extended abstracts on human factors in computing systems, ACM, pp 2585–2590
Nissenbaum H (1998) Values in the design of computer systems. Comput Soc 28(1):38–39
Nissenbaum H (2005) Values in technical design. In: Encyclopedia of science, technology and ethics. Macmillan, New York, pp lxvi–lxx
Norman DA, Draper SW (1986) User centered system design: new perspectives on human-computer interaction. Boca Raton, Florida, CRC Press
O’Neill E (2000) User-development cooperation in software development: building common ground and usable systems (ed: van Rijsbergen CJ). Springer, London
Oxford Dictionary (2014) http://www.oxforddictionaries.com/definition/english/information-technology. Retrieved 25 Aug 2014
Pariser E (2011) The filter bubble: what the internet is hiding from you. Penguin Press, New York
Pommeranz A, Detweiler C, Wiggers P, Jonker CM (2011) Elicitation of situated values: need for tools to help stakeholders and designers to reflect and communicate. Ethics Inf Technol 14(4):285–303
Potts C (1999) Scenic: a strategy for inquiry-driven requirements determination. In: Proceedings of IEEE fourth international symposium on requirements engineering (RE’99), Limerick, Ireland, pp 58–65
Rokeach M (1973) The nature of human values. Free Press, New York
Rosson MB, Carroll JM (2002) Scenario based design. In: Jacko J, Sears A (eds) The human-computer interaction handbook: fundamentals, evolving technologies and emerging applications. Erlbaum, Boca Raton, pp 1032–1050
Rosson MB, Carroll JM (2009) Scenario based design. Human-computer interaction. Boca Raton, pp 145–162
Sallai G (2012) Defining infocommunications and related terms. Acta Polytech Hung 9(6)
Sanders EB-N, Westerlund B (2011) Experience, exploring and experimenting in and with co-design spaces. In: Proceedings of NORDES’11, Helsinki, pp 1–5
Sanders C, Rogers A, Bowen R et al (2012) Exploring barriers to participation and adoption of telehealth and telecare within the Whole System Demonstrator trial: a qualitative study. BMC Health Serv Res Healthc Needs Demand 12:220
Schneider FB (ed) (1999) Trust in cyberspace. National Academies Press, Washington, DC
Schwartz SH, Bilsky W (1990) Toward a theory of the universal content and structure of values: extensions and cross-cultural replications. J Pers Soc Psychol 58:878–891
Sharkey A, Sharkey N (2012) Granny and the robots: ethical issues in robot care for the elderly. Ethics Inf Technol 14(1):27–40
Shilton K (2012) Values levers: building ethics into design. Sci Technol Hum Values 38(3):374–397
Simonsen J (2009) The role of ethnography in the design and implementation of IT systems. Des Princ Pract Int J 3(3):253–264
Stahl BC, Heersmink R, Goujon P, Flick C, van den Hoven J, Wakunuma K, Rader M (2010) Issues, concepts and methods relating to the identification of the ethics of emerging ICTs. Available at: http://www.academia.edu/432392/Issues_Concepts_and_Methods_Relating_to_the_Identification_of_the_Ethics_of_Emerging_ICTs. Retrieved on 25 Aug 2014
EIDD Stockholm Declaration (2004) Retrieved on 25 Aug 2014 from http://www.designforalleurope.org/Design-for-All/EIDD-Documents/Stockholm-Declaration/
Thew S, Sutcliffe A (2008) Investigating the role of ’soft issues’ in the RE process. In: Proceedings of 16th IEEE international requirements engineering conference, Barcelona, Spain, pp 63–66
van den Berg N, Schumann M, Kraft K, Hoffmann W (2012) Telemedicine and telecare for older patients – a systematic review. Maturitas 73(2):94–114
van den Hoven J, Helbing D, Pedreschi D, Domingo-Ferrer J, Gianotti F, Christen M (2012) FuturICT-The road towards ethical ICT. The European Physical Journal Special Topics. arXiv preprint arXiv:1210.8181, 214(1):153–181
van Wynsberghe A (2013) Designing robots for care: care centered value-sensitive design. Sci Eng Ethics 19(2):407–433
Woelfer JP, Iverson A, Hendry DG, Friedman B, Gill BT (2011) Improving the safety of homeless young people with mobile phones: values, form and function. In: Proceedings of ACM SIGCHI conference on human factors in computing systems, Vancouver, Canada, pp 1707–1716
Yoo D, Huldtgren A, Woelfer JP, Hendry DG, Friedman B (2013) A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts. In: Proceedings of the ACM SIGCHI conference on human factors in computing systems, Paris, France, pp 419–428
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Dordrecht
About this entry
Cite this entry
Huldtgren, A. (2015). Design for Values in ICT . In: van den Hoven, J., Vermaas, P., van de Poel, I. (eds) Handbook of Ethics, Values, and Technological Design. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6970-0_35
Download citation
DOI: https://doi.org/10.1007/978-94-007-6970-0_35
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-6969-4
Online ISBN: 978-94-007-6970-0
eBook Packages: Humanities, Social Sciences and LawReference Module Humanities and Social Sciences