Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1518701.1518875acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Values as lived experience: evolving value sensitive design in support of value discovery

Published: 04 April 2009 Publication History

Abstract

The Value Sensitive Design (VSD) methodology provides a comprehensive framework for advancing a value-centered research and design agenda. Although VSD provides helpful ways of thinking about and designing value-centered computational systems, we argue that the specific mechanics of VSD create thorny tensions with respect to value sensitivity. In particular, we examine limitations due to value classifications, inadequate guidance on empirical tools for design, and the ways in which the design process is ordered. In this paper, we propose ways of maturing the VSD methodology to overcome these limitations and present three empirical case studies that illustrate a family of methods to effectively engage local expressions of values. The findings from our case studies provide evidence of how we can mature the VSD methodology to mitigate the pitfalls of classification and engender a commitment to reflect on and respond to local contexts of design.

References

[1]
M. Akrich. User Representations: Practices, Methods and Sociology. In A. Rip, T. Misa, and J. Schot, editors, Managing Technology in Society: The Approach of Constructive Technology Assessment, pages 167--184. Pinter Publishers, London, 1995.
[2]
G. Bell, M. Blythe, and P. Sengers. Making by Making Strange: Defamiliarization and the Design of Domestic Technologies. ACM Transactions of Computer-Human Interaction, 12(2):149--173, 2005.
[3]
A. Borning, B. Friedman, J. Davis, and P. Lin. Informing Public Deliberation: Value Sensitive Design of Indicators for a Large-Scale Urban Simulation. Proceedings of the 9th European Conference on Computer-Supported Cooperative Work, pages 449--468, 2005.
[4]
G. C. Bowker and S. L. Star. Sorting Things Out: Classification and Its Consequences. MIT Press, Cambridge, MA, 1999.
[5]
A. Bruckman. A New Perspective on "Community" and Its Implications for Computer-Mediated Communication Systems. In CHI '06: Extended abstracts on Human factors in computing systems, pages 616--621, New York, NY, USA, 2006. ACM.
[6]
C. D. Clark. The Autodriven Interview: A Photographic Viewfinder into Children's Experience. Visual Sociology, 14, 1999.
[7]
M. Clark-IbáÑez. Framing the Social World With Photo-Elicitation Interviews. American Behavioral Scientist, 47(12):1507--1527, 2004.
[8]
S. Corbett. Can the Cellphone Help End Global Poverty? The New York Times Magazine, April 13 2008.
[9]
R. S. Cowan. More Work for Mother: The Ironies of Household Technology from the Open Hearth to the Microwave. Basic Books, 1983.
[10]
R. S. Cowan. The Industrial Revolution in the Home. In D. MacKenzie and J. Wajcman, editors, The Social Shaping of Technology: How the Refrigerator got Its Hum, pages 181--201. Open University Press, 1985.
[11]
J. Donath. Identity and Deception in the Virtual Community. In M. Smith and P. Kollock, editors, Communities in Cyberspace, pages 29--59. Routledge, 1999.
[12]
M. Flanagan, D. Howe, and H. Nissenbaum. Embodying Values in Design: Theory and Practice. In J. van den Hoven and J. Weckert, editors, Information Technology and Moral Philosophy, pages 322--353. Cambridge University Press, Cambridge, 2008.
[13]
E. Fram. The Booming Scrapbooking Market in the USA: Despite Phenomenal Growth, the Future's Unclear. International Journal of Retail&Distribution Management, 33(3):215--225, 2005.
[14]
B. Friedman. Value-sensitive Design. interactions, 3(6):16--23, 1996.
[15]
B. Friedman, P. H. K. Jr., and A. Borning. Value Sensitive Design and Information Systems. In Human- Computer Interaction in Management Information Systems: Foundations, chapter 16. M.E. Sharpe, Inc, 2006.
[16]
B. Friedman and P. H. Kahn, Jr. Human Values, Ethics, and Design. In The human-computer interaction handbook: fundamentals, evolving technologies and emerging applications, pages 1177--1201. Lawrence Erlbaum Associates, Inc., Mahwah, NJ, USA, 2003.
[17]
B. Friedman, P. H. Kahn Jr., J. Hagman, R. L. Severson, and B. Gill. The Watcher and the Watched: Social Judgments About Privacy in a Public Place. Human-Computer Interaction, 21:235--272, 2006.
[18]
B. Friedman and H. Nissenbaum. Bias in Computer Systems. ACM Transactions of Information Systems, 14(3):330--347, July 1996.
[19]
B. Friedman, J. Peter H. Khan, and D. C. Howe. Trust online. Communications of the ACM, 43(12):34--40, 2000.
[20]
W. W. Gaver, T. Dunne, and E. Pacenti. Design: Cultural probes. interactions, 6(1):21--29, 1999.
[21]
E. Goffman. The Presentation of Self in Everyday Life. Anchor, 1959.
[22]
E. Goffman. Stigma: Notes on the Management of Spoiled Identity. Touchstone, 1963.
[23]
J. Hagman, A. Hendrickson, and A. Whitty. What's in a Barcode? Informed Consent and Machine Scannable Driver Licenses. In CHI '03: Extended abstracts on Human factors in computing systems, pages 912--913, New York, NY, USA, 2003. ACM.
[24]
K. Höök, A. Ståhl, P. Sundström, and J. Laaksolaahti. Interactional Empowerment. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 647--656, New York, NY, USA, 2008. ACM.
[25]
D. Huffaker. The Educated Blogger: Using Weblogs to Promote Literacy in the Classroom. AACE Journal, 13(2):91--98, 2005.
[26]
H. Hutchinson, W. Mackay, B. Westerlund, B. B. Bederson, A. Druin, C. Plaisant, M. Beaudouin-Lafon, S. Conversy, H. Evans, H. Hansen, N. Roussel, and B. Eiderbäck. Technology Probes: Inspiring Design for and with Families. In CHI '03: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 17--24, New York, NY, USA, 2003. ACM.
[27]
S. Jasanoff. New Modernities: Reimagining Science, Technology and Development. Environmental Values, 11(3):253--276, August 2002.
[28]
M. Kam, D. Ramachandran, V. Devanathan, A. Tewari, and J. Canny. Localized Iterative Design for Language Learning in Underdeveloped Regions: The Pace Framework. In CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 1097--1106, New York, NY, USA, 2007. ACM.
[29]
W. Kempton. Two Theories of Home Heat Control. Cognitive Science, 10(1):75--90, 1986.
[30]
P. Kollock. The Economies of Online Cooperation: The Economies of Online Cooperation: Gifts and Public Goods in Cyberspace. In M. Smith and P. Kollock, editors, Communities in Cyberspace, pages 220--239. Routledge, 1999.
[31]
G. Lakoff and M. Johnson. Metaphors We Live By. The University of Chicago Press, Chicago, IL, USA, 1980.
[32]
C. A. Le Dantec. Feature: Life at the Margins: Assessing the Role of Technology for the Urban Homeless. interactions, 15(5):24--27, 2008.
[33]
C. A. Le Dantec and E. Y. Do. The Mechanisms of Value Transfer in Design Meetings. In J. McDonnell and P. Lloyd, editors, About: Designing - Analysing Design Meetings. Taylor and Francis, Forthcoming 2009.
[34]
C. A. Le Dantec and W. K. Edwards. Designs on Dignity: Perceptions of Technology Among the Homeless. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 627--636, New York, NY, USA, 2008. ACM.
[35]
R. Luk, M. Ho, and P. M. Aoki. Asynchronous Remote Medical Consultation for Ghana. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 743--752, New York, NY, USA, 2008. ACM.
[36]
E. Lupton. Mechanical Brides: Women and Machines from Home to Office. Princeton Architectural Press, 1993.
[37]
G. Marsden, A. Maunder, and M. Parker. People are People, but Technology is not Technology. Philosophical Transactions of the Royal Society, 366:3795--3804, July 2008.
[38]
P. McCarthy and P. Wright. Technology as Experience. MIT Press, Cambridge, Mass, 2004.
[39]
M. G. Morgan, B. Fischhoff, A. Bostrom, and C. J. Atman. Risk Communication: A Mental Models Approach. Cambridge University Press, 2002.
[40]
H. Nissenbaum. Protecting Privacy in an Information Age: The Problem of Privacy in Public. Law and Philosophy, 17:559--596, 1998.
[41]
E. Paulos and T. Jenkins. Urban Probes: Encountering Our Emerging Urban Atmospheres. In CHI '05: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 341--350, New York, NY, USA, 2005. ACM Press.
[42]
E. S. Poole, C. A. Le Dantec, J. R. Eagan, and W. K. Edwards. Reflecting on the Invisible: Understanding End-user Perceptions of Ubiquitous Computing. In UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computing, pages 192--201, New York, NY, USA, 2008. ACM.
[43]
A. Radley, D. Hodgetts, and A. Cullen. Visualizing Homelessness: A Study in Photography and Estrangement. Journal of Community&Applied Social Psychology, 15:273--295, 2005.
[44]
D. Schwartz. Visual Ethnography: Using Photography in Qualitative Research. Qualitative Sociology, 12(2):119--154, June 1989.
[45]
P. Sengers, K. Boehner, S. David, and J. J. Kaye. Reflective Design. In CC '05: Proceedings of the 4th decennial conference on Critical computing, pages 49--58, New York, NY, USA, 2005. ACM.
[46]
L. Suchman. Do Categories Have Politics? The Language/Action Perspective Reconsidered. In Human Values and the Design of Computer Technology, pages 91--106. Center for the Study of Language and Information, Stanford, CA, USA, 1997.
[47]
E. Troshynski, C. Lee, and P. Dourish. Accountabilities of Presence: Reframing Location-Based Systems. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 487--496, New York, NY, USA, 2008. ACM.
[48]
F. Turner. From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism. University Of Chicago Press, 2006.
[49]
A. Voida and E. D. Mynatt. Conveying User Values Between Families and Designers. In CHI '05: Extended abstracts on Human factors in computing systems, pages 2013--2016, New York, NY, USA, 2005. ACM Press.
[50]
R. Want. RFID Explained: A Primer on Radio Frequency Identification Technologies. Morgan&Claypoole, 2006.
[51]
J. P. Woelfer, M. W.-M. Yeung, C. G. Erdmann, and D. G. Hendry. Value Considerations in an Information Ecology: Printed Materials, Service Providers and Homeless Young People. In ASIS&T Annual Meeting, Columbus, Ohio, October 24-29 2008.
[52]
P. Wright and J. McCarthy. Empathy and Experience in HCI. In CHI'08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 637--646, New York, NY, USA, 2008. ACM.
[53]
S. P. Wyche, P. M. Aoki, and R. E. Grinter. Re-Placing Faith: Reconsidering the Secular-Religious Use Divide in the United States and Kenya. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 11--20, New York, NY, USA, 2008. ACM.
[54]
S. P. Wyche, P. Sengers, and R. E. Grinter. Historical Analysis: Using the Past to Design the Future. In Proceedings of UBICOMP, September 17--21 2006.

Cited By

View all
  • (2025)What Knowledge Do We Produce from Social Media Data and How?Proceedings of the ACM on Human-Computer Interaction10.1145/37012169:1(1-45)Online publication date: 10-Jan-2025
  • (2024)Ethics dumping in artificial intelligenceFrontiers in Artificial Intelligence10.3389/frai.2024.14267617Online publication date: 8-Nov-2024
  • (2024)Measuring and shaping the nutritional environment via food sales logs: case studies of campus-wide food choice and a call to actionFrontiers in Nutrition10.3389/fnut.2024.123107011Online publication date: 4-Jun-2024
  • Show More Cited By

Index Terms

  1. Values as lived experience: evolving value sensitive design in support of value discovery

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '09: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2009
      2426 pages
      ISBN:9781605582467
      DOI:10.1145/1518701
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 April 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. empirical methods
      2. fieldwork
      3. methodology
      4. photo elicitation
      5. value sensitive design
      6. values

      Qualifiers

      • Research-article

      Conference

      CHI '09
      Sponsor:

      Acceptance Rates

      CHI '09 Paper Acceptance Rate 277 of 1,130 submissions, 25%;
      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)296
      • Downloads (Last 6 weeks)50
      Reflects downloads up to 18 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)What Knowledge Do We Produce from Social Media Data and How?Proceedings of the ACM on Human-Computer Interaction10.1145/37012169:1(1-45)Online publication date: 10-Jan-2025
      • (2024)Ethics dumping in artificial intelligenceFrontiers in Artificial Intelligence10.3389/frai.2024.14267617Online publication date: 8-Nov-2024
      • (2024)Measuring and shaping the nutritional environment via food sales logs: case studies of campus-wide food choice and a call to actionFrontiers in Nutrition10.3389/fnut.2024.123107011Online publication date: 4-Jun-2024
      • (2024)Ethical Design through Grounding and Evaluation (EDGE) of Information Systems to Achieve Social ImpactsJournal of Information Technology10.1177/02683962241289598Online publication date: 23-Sep-2024
      • (2024)"They Make Us Old Before We're Old": Designing Ethical Health Technology with and for Older AdultsProceedings of the ACM on Human-Computer Interaction10.1145/36870178:CSCW2(1-30)Online publication date: 8-Nov-2024
      • (2024)Improving Collaborative Management of Multiple Mental and Physical Health Conditions: A Qualitative Inquiry into Designing Technology-Enabled Services for Eliciting Patients' ValuesProceedings of the ACM on Human-Computer Interaction10.1145/36870008:CSCW2(1-30)Online publication date: 8-Nov-2024
      • (2024)Value Tensions in OpenStreetMap: Openness, Membership, and Policy in Online CommunitiesProceedings of the ACM on Human-Computer Interaction10.1145/36869198:CSCW2(1-25)Online publication date: 8-Nov-2024
      • (2024)Safety and Community Context: Exploring a Transfeminist Approach to Sapphic Relationship PlatformsProceedings of the ACM on Human-Computer Interaction10.1145/36536948:CSCW1(1-34)Online publication date: 26-Apr-2024
      • (2024)Designing for Personalization in Personal Informatics: Barriers and Pragmatic Approaches from the Perspectives of Designers, Developers, and Product ManagersProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661622(584-596)Online publication date: 1-Jul-2024
      • (2024)Ethics Pathways: A Design Activity for Reflecting on Ethics Engagement in HCI ResearchProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3660714(3515-3533)Online publication date: 1-Jul-2024
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media