A Survey of Value Sensitive Design Methods

A Survey of Value Sensitive Design Methods

Full text available at: http://dx.doi.org/10.1561/1100000015 A Survey of Value Sensitive Design Methods Batya Friedman The Information School University of Washington, USA [email protected] David G. Hendry The Information School University of Washington, USA [email protected] Alan Borning Paul G. Allen School of Computer Science & Engineering University of Washington, USA [email protected] Boston — Delft Full text available at: http://dx.doi.org/10.1561/1100000015 Foundations and Trends R in Human-Computer Interaction Published, sold and distributed by: now Publishers Inc. PO Box 1024 Hanover, MA 02339 United States Tel. +1-781-985-4510 www.nowpublishers.com [email protected] Outside North America: now Publishers Inc. PO Box 179 2600 AD Delft The Netherlands Tel. +31-6-51115274 The preferred citation for this publication is B. Friedman, D. G. Hendry and A. Borning. A Survey of Value Sensitive Design Methods. Foundations and Trends R in Human-Computer Interaction, vol. 11, no. 23, pp. 63–125, 2017. R This Foundations and Trends issue was typeset in LATEX using a class file designed by Neal Parikh. Printed on acid-free paper. ISBN: 978-1-68083-290-7 c 2017 B. Friedman, D. G. Hendry and A. Borning All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers. Photocopying. In the USA: This journal is registered at the Copyright Clearance Cen- ter, Inc., 222 Rosewood Drive, Danvers, MA 01923. Authorization to photocopy items for internal or personal use, or the internal or personal use of specific clients, is granted by now Publishers Inc for users registered with the Copyright Clearance Center (CCC). The ‘services’ for users can be found on the internet at: www.copyright.com For those organizations that have been granted a photocopy license, a separate system of payment has been arranged. Authorization does not extend to other kinds of copying, such as that for general distribution, for advertising or promotional purposes, for crea- ting new collective works, or for resale. In the rest of the world: Permission to photocopy must be obtained from the copyright owner. Please apply to now Publishers Inc., PO Box 1024, Hanover, MA 02339, USA; Tel. +1 781 871 0245; www.nowpublishers.com; sa- [email protected] now Publishers Inc. has an exclusive license to publish this material worldwide. Permission to use this content must be obtained from the copyright license holder. Please apply to now Publishers, PO Box 179, 2600 AD Delft, The Netherlands, www.nowpublishers.com; e-mail: [email protected] Full text available at: http://dx.doi.org/10.1561/1100000015 Foundations and Trends R in Human-Computer Interaction Volume 11, Issue 23, 2017 Editorial Board Editor-in-Chief Desney S. Tan Microsoft Research United States Editors Ben Bederson Youn-Kyung Lim University of Maryland Korea Advanced Institute of Science and Sheelagh Carpendale Technology University of Calgary Nuria Oliver Andy Cockburn Telefonica University of Canterbury Orit Shaer Jon Froehlich Wellesley College University of Maryland Kentaro Toyama Juan Pablo Hourcade University of Michigan University of Iowa Karrie Karahalios University of Illinois at Urbana-Champaign Full text available at: http://dx.doi.org/10.1561/1100000015 Editorial Scope Topics Foundations and Trends R in Human-Computer Interaction publishes surveys and tutorials on the foundations of human-computer inte- raction. The scope is broad. The list of topics below is meant to il- lustrate some of the coverage, and is not intended to be an exhaustive list. • History of the research • Computer supported community cooperative work • Design and evaluation • Interdisciplinary influence • Theory • Technology • Advanced topics and trends Information for Librarians Foundations and Trends R in Human-Computer Interaction, 2017, Vo- lume 11, 4 issues. ISSN paper version 1551-3955. ISSN online version 1551-3963. Also available as a combined paper and online subscription. Full text available at: http://dx.doi.org/10.1561/1100000015 Foundations and Trends R in Human-Computer Interaction Vol. 11, No. 23 (2017) 63–125 c 2017 B. Friedman, D. G. Hendry and A. Borning DOI: 10.1561/1100000015 A Survey of Value Sensitive Design Methods Batya Friedman The Information School University of Washington, USA [email protected] David G. Hendry The Information School University of Washington, USA [email protected] Alan Borning Paul G. Allen School of Computer Science & Engineering University of Washington, USA [email protected] Full text available at: http://dx.doi.org/10.1561/1100000015 To Nan and to Jeff To Karen To Charline and Marion Full text available at: http://dx.doi.org/10.1561/1100000015 Contents 1 Introduction2 1.1 On Method and Practice.................. 4 1.2 Summary of Key Theoretical Constructs .......... 5 1.3 Bounding the Article .................... 8 2 The Fourteen Methods 10 2.1 Direct and Indirect Stakeholder Analysis .......... 14 2.2 Value Source Analysis .................... 15 2.3 Co-evolution of Technology and Social Structure ..... 17 2.4 Value Scenario ........................ 18 2.5 Value Sketch ......................... 19 2.6 Value-oriented Semi-structured Interview .......... 20 2.7 Scalable Information Dimensions .............. 22 2.8 Value-oriented Coding Manual ............... 22 2.9 Value-oriented Mock-up, Prototype, or Field Deployment . 24 2.10 Ethnographically Informed Inquiry regarding Values and Technology .......................... 26 2.11 Model for Informed Consent Online ............. 27 2.12 Value Dams and Flows ................... 28 2.13 Value Sensitive Action-Reflection Model .......... 29 2.14 Envisioning CardsTM ..................... 30 iii Full text available at: http://dx.doi.org/10.1561/1100000015 iv 3 Strategies and Heuristics for Skillful Practice 32 3.1 Getting Started ....................... 32 3.2 Clarify Explicitly Supported Project Values and Designer Stance ............................ 33 3.3 Identify Direct and Indirect Stakeholders .......... 34 3.4 Identify Benefits and Harms for Stakeholders ........ 35 3.5 Identify and Elicit Potential Values ............. 35 3.6 Develop Working Definitions of Key Values ........ 36 3.7 Identify Potential Value Tensions .............. 37 3.8 Heuristics for Interviewing Stakeholders .......... 37 3.9 Heuristics for Technical Investigations ........... 39 4 One Method in Action: Value Scenarios across Contexts 40 5 Concluding Reflections 47 5.1 Some Core Characteristics of Value Sensitive Design Met- hodology ........................... 47 5.2 Innovating Method with Value Sensitive Design ...... 49 5.3 Conclusion .......................... 50 Acknowledgements 51 References 54 Full text available at: http://dx.doi.org/10.1561/1100000015 Abstract Value sensitive design is a theoretically grounded approach to the de- sign of technology that accounts for human values in a principled and systematic manner throughout the design process. In this article we provide a survey of 14 value sensitive design methods: (1) direct and indirect stakeholder analysis; (2) value source analysis; (3) co-evolution of technology and social structure; (4) value scenario; (5) value sketch; (6) value-oriented semi- structured interview; (7) scalable information dimensions; (8) value-oriented coding manual; (9) value-oriented mock- up, prototype, or field deployment; (10) ethnographically informed in- quiry regarding values and technology; (11) model of informed consent online; (12) value dams and flows; (13) value sensitive action-reflection model; and (14) Envisioning Cards TM. Each of these methods is ho- ned to the investigation of values in technology, serving such purposes as stakeholder identification and legitimation, value representation and elicitation, and values analysis. While presented individually, the met- hods are intended to be integrated in a robust value sensitive design process. The survey article begins with a brief summary of value sen- sitive design methodology and theoretical constructs. We next provide an overview of the 14 methods. Then, we turn to a broader discussion of value sensitive design practice, focussing on some methodological stra- tegies and heuristics to support skillful value sensitive design practice. Following the broad discussion of practice, we illustrate one method in action—value scenarios—providing details on its range of purposes and contexts. We conclude with reflections on core characteristics of value sensitive design methodology, and heuristics for innovation. B. Friedman, D. G. Hendry and A. Borning. A Survey of Value Sensitive Design Methods. Foundations and Trends R in Human-Computer Interaction, vol. 11, no. 23, pp. 63–125, 2017. DOI: 10.1561/1100000015. Full text available at: http://dx.doi.org/10.1561/1100000015 1 Introduction Value sensitive design is a theoretically grounded approach to the de- sign of technology that accounts for human values in a principled and systematic manner throughout the design process (Friedman et al., 2006a; Davis and Nathan, 2014). Under development since the mid 1990s, value sensitive design has been applied to a wide range of pro- jects, including browser privacy and informed consent, implantable me- dical devices, and information systems for transitional justice. Throug- hout, methods for research and design have been developed. Often, fa- miliar methods from the social sciences, human-computer interaction, security, and

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    27 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us