248 research outputs found

    Towards a unified conceptual model for surveillance theories

    Get PDF
    The erosion of values such as privacy can be a critical factor in preventing the acceptance of new innovative technology especially in challenging environments such as the criminal justice system. Erosion of privacy happens through either deliberate or inadvertent surveillance. Since Bentham’s original liberal project in the 1900s, a literature and a whole study area around theories of surveillance has developed. Increasingly this general body of work has focussed on the role of information technology as a vehicle for surveillance activity. Despite an abundance of knowledge, a uni!ed view of key surveillance concepts that is useful to designers of information systems in preventing or reducing unintended surveillance remains elusive. This paper contributes a conceptual model that synthesises the gamut of surveillance theories as a !rst step to a theory building effort for use by Information Systems professionals. The model is evaluated using a design science research paradigm using data from both examples of surveillance and a recently completed research project that developed technology for the UK youth justice system

    Human and value sensitive aspects of mobile app design: a Foucauldian perspective

    Get PDF
    Value sensitive concerns remain relatively neglected by software design processes leading to potential failure of technology acceptance. By drawing upon an inter-disciplinary study that employed participatory design methods to develop mobile apps in the domain of youth justice, this paper examines a critical example of an unintended consequence that created user concerns around Focauldian concepts including power, authority, surveillance and governmentality. The primary aim of this study was to design, deploy and evaluate social technology that may help to promote better engagement between case workers and young people to help reduce recidivism, and support young people’s transition towards social inclusion in society. A total of 140 participants including practitioners (n=79), and young people (n=61) contributed to the data collection via surveys, focus groups and one-one interviews. The paper contributes an important theoretically located discussion around both how co-design is helpful in giving ‘voice’ to key stakeholders in the research process and observing the risk that competing voices may lead to tensions and unintended outcomes. In doing so, software developers are exposed to theories from social science that have significant impact on their product

    An approximate theory for value sensitivity

    Get PDF
    The software engineering community is on a quest for general and specific theories for the discipline. Increasingly, systems constructed for today’s hyper connected world are raising issues of security and privacy, both examples of value concerns. Hence there is a need to articulate a theory for value sensitivity that software engineers can draw upon to evaluate their designs and to embed outcomes into systems that are developed. This paper proposes an approximate theory of value sensitivity in recognition that this is a journey and an interim struggle. The theory is articulated using the framework proposed by Sjøberg et al. An initial evaluation is provided for both the value sensitivity theory and the framework

    An ontological representation of a taxonomy for cybercrime

    Get PDF
    The modern phenomenon of cybercrime raises issues and challenges on a scale that has few precedents. A particular central concern is that of establishing clarity about the conceptualization of cybercrime and its growing economic cost to society. A further related concern is focused on developing appropriate legal and policy responses in a context where crime transcends national jurisdictions and physical boundaries. Both are predicated on a better understanding of cybercrime. Efforts at defining and classifying cybercrime by the use of taxonomies to date have largely been descriptive with resulting ambiguities. This paper contributes a semi-formal approach to the development of a taxonomy for cybercrime and offers the conceptual language and accompanying constraints with which to describe cybercrime examples. The approach uses the ontology development platform, Protégé and the Unified Modeling Language (UML) to present an initial taxonomy for cybercrime that goes beyond the descriptive accounts previously offered. The taxonomy is illustrated with examples of cybercrimes both documented in the Protégé toolset and also using UML

    Youth justice in the digital age: a case study of practitioners' perspectives on the challenges and opportunities of social technology in their Techno-Habitat in the United Kingdom

    Get PDF
    This article draws on original, empirical research that focused on the use of an experimental mobile application developed by the authors and used in the domain of youth justice in England. Against a backdrop of the theory of the paradox of technology with ideas of the networked self and child rights, the article explores the use of social technology with vulnerable/marginalised young people. Given the dearth in knowledge and understanding, in this area of social technology and young people in conflict with the law, the article focuses on an important, original and fast-developing issue in contemporary youth justice. Principally, the article explores the experiences and views of practitioners to promote a better understanding of the opportunities and challenges in the adoption of social technology in working with marginalised young people. Practitioner perceptions on the use of social technology in their own practice and its associated risks and benefits are also revealed. Study findings indicate that digital opportunities and challenges are embedded in organisational and cultural structures and practices. The article discusses implications for youth justice and ultimately for young people in conflict with the law who are caught up in the system. The article raises important issues about the likely increasing use of technology as a tool in rehabilitation and desistance; and its key messages will be of considerable interest to practitioners, managers and policy-makers who will have little option, as time goes on, to enter this controversial field

    On the evaluation of reference models for software engineering practice.

    Get PDF
    This paper argues that conceptual models and more specifically reference models play a key role in the specification and design of information systems. However, an effective evaluation strategy of such models is a relatively immature field. The paper presents the key challenges for this evaluation activity and articulates an approach for understanding how to evaluate models based on the information and cognitive theories of structuralism and conversation theory. An example of a reference model developed for the Higher Education domain is used as a case study to illustrate how the approach may be applied

    Do you own a Volkswagen? Values as non-functional requirements

    Get PDF
    Of late, there has been renewed interest in determining the role and relative importance of (moral) values in the design of software and its acceptance. Events such as the Snowden revelations and the more recent case of the Volkswagen "defeat device” software have further emphasised the importance of values and ethics in general. This paper posits a view that values accompanied by an appropriate framework derived from non-functional requirements can be used by designers and developers as means for discourse of ethical concerns of the design of software. The position is based on the Volkswagen dieselgate case study and a qualitative analysis of developers views from Reddit discussion forums. The paper proposes an extension of an existing classification of requirements to include value concerns

    The sociotechnical digital twin: on the gap between social and technical feasibility

    Get PDF
    The last five years has seen an exponential increase in interest around the notion of a digital twin. Multiple systematic reviews have established a base set of findings which are now broadly taken as assumptions in the field. The findings have outlined frameworks, integration patterns, distinctions between product and process oriented digital twins, simulation and the leveraging of artificial intelligence to support prediction and optimisation. As the use cases of digital twins have evolved from a predominance in manufacturing and into the sociotechnical domain to support the social world, a gap emerges between the social requirements and the technical machinery of digital twins. This gap is significant and worthy of exploration as it presents important challenges for digital twin research including use of sociotechnical design methods, problems arising from a so-called abstraction gap and various epistemological concerns. This paper proposes an analytical route to ameliorating the sociotechnical gap which is discussed within a future notion of an Environment Digital Twin

    Mapping the public debate on ethical concerns: algorithms in mainstream media

    Get PDF
    Algorithms are in the mainstream media news on an almost daily basis. Their context is invariably artificial intelligence and machine learning decision making. In media articles, algorithms are described as powerful, autonomous actors that have a capability of producing actions that have consequences. Despite a tendency to deification, the prevailing critique of algorithms focusses on ethical concerns raised by decisions resulting from algorithmic processing. However, this paper proposes that the ethical concerns discussed are limited in scope and it is not clear which concerns dominate the debate. The research presented in this paper contributes the first systematic mapping study of articles appearing in leading UK national papers from the perspective of widely accepted ethical concerns. The UK context is important because of UK public policy initiatives around artificial intelligence. In academic literature, the key ethical concerns have been well documented and numerous models have been developed. To review the media content from the perspective of ethical concerns, this paper uses the synthesised conceptual map of ethical concerns developed by Mittelstad et. al. Given the widespread use of that framework, as evident through citations, this paper's contribution is also an important illustration and experiment using that conceptual map

    Value-sensitive co-design for resilient information systems

    Get PDF
    In Information Systems development, resilience has often been treated as a non-functional requirement and little or no work is aimed at building resilience in end-users through systems development. The question of how values and resilience (for the end-user) can be incorporated into the design of systems is an on-going research activity in user-centered design. In this paper we evaluate the relation of values and resilience within the context of an ongoing software development project and contribute a formal model of co-design based on a significant extension of Abstract Design Theory. The formal analysis provides a full and clear-cut definition of the co-design space, its objectives and processes. On the basis of both, we provide an abstract definition of resilient system (for the end-user). We conclude that value-sensitive co-design enforces better resilience in end-users
    corecore