Abstract
Software systems bring great benefits to people’s lives. Nevertheless, they can cause issues in terms of social and ethical implications toward individuals and society, and compromise their ethical values. Therefore, it is crucial to consider all potentially-concerned stakeholders during the system design process, as they are the primary source of value and requirements identification. In this study, we aim to evaluate the effect that two ethics-driven instruments we have created (i.e., a stakeholder map and a value model) may have on supporting ethical considerations (such as stakeholder and ethical value), using the case of an Access Control System. The paper presents the insights gained from this evaluation, performed as a retrospective study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
In the stakeholder map, solid circles represent stakeholders identified before introducing the instruments, while dotted circles correspond to those identified after the introduction.
- 2.
In the value model, solid circles depict values identified before introducing instruments, while dotted circles represent them after the introduction.
- 3.
Appendix A is available in the GitHub repository https://github.com/S2-group/ECSA23-SIVD-rep-pkg.git.
- 4.
References
Alidoosti, R., Lago, P., Poort, E., Razavian, M.: Ethics-aware decidarch game: Designing a game to reflect on ethical considerations in software architecture design decision making. In: 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), pp. 96–100. IEEE (2023)
Alidoosti, R., Lago, P., Razavian, M., Tang, A.: Ethics in software engineering: a systematic literature review. Technical report, Vrije Universiteit Amsterdam (2022). https://tinyurl.com/39crpyn2
Bittner, K., Spence, I.: Establishing the Vision for Use Case Modeling, Use Case Modeling. Addison Wesley Professional, Reading (2003)
De Sanctis, M., Di Salle, A., Iovino, L., Rossi, M.T.: A technology transfer journey to a model-driven access control system. Int. J. Softw. Tools Technol. Transf. 1–26 (2023)
Friese, S.: Qualitative Data Analysis with ATLAS.ti. Sage, Thousand Oaks (2019)
Leong, B.: Facial recognition and the future of privacy: I always feel like... somebody’s watching me. Bull. Atomic Sci. 75(3), 109–115 (2019)
Miles, M.B., Huberman, A.M.: Qualitative Data Analysis: An Expanded Sourcebook. Sage, Thousand Oaks(1994)
Moreno, M.V., Hernández, J.L., Skarmeta, A.F.: A new location-aware authorization mechanism for indoor environments. In: International Conference on Advanced Information Networking and Applications Workshops, pp. 791–796. IEEE (2014)
Neudecker, T., Hayrapetyan, A., Degitz, A., Andelfinger, P.: Consideration of values in the design of access control systems. In: Informatik 2016 (2016)
Robson, C.: Small-Scale Evaluation: Principles and Practice. Sage, Thousand Oaks (2017)
Schwartz, S.H.: Universals in the content and structure of values: theoretical advances and empirical tests in 20 countries. In: Advances in Experimental Social Psychology, vol. 25, pp. 1–65. Elsevier, Amsterdam (1992)
Schwartz, S.H.: Basic human values: theory, measurement, and applications. Rev. Fr. Sociol. 47(4), 929 (2007)
Schwartz, S.H.: An overview of the schwartz theory of basic values. Online readings in Psychology and Culture 2(1), 2307–0919 (2012)
Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A.: Security policy enforcement for networked smart objects. Comput. Netw. 108, 133–147 (2016)
Acknowledgement
We would like to thank the ACS designers for their contribution to enhancing our understanding of the system from an ethical standpoint. Also, we thank the gym members for their valuable feedback. The work has been partially supported by ARS01_00540 - RASTA project, funded by the Italian Ministry of Research PNR 2015–2020. The authors De Sanctis and Iovino acknowledge the support of the MUR (Italy) Department of Excellence 2023–2027 for GSSI.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Alidoosti, R., De Sanctis, M., Iovino, L., Lago, P., Razavian, M. (2024). Stakeholder Inclusion and Value Diversity: An Evaluation Using an Access Control System. In: Tekinerdoğan, B., Spalazzese, R., Sözer, H., Bonfanti, S., Weyns, D. (eds) Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium. ECSA 2023. Lecture Notes in Computer Science, vol 14590. Springer, Cham. https://doi.org/10.1007/978-3-031-66326-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-66326-0_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-66325-3
Online ISBN: 978-3-031-66326-0
eBook Packages: Computer ScienceComputer Science (R0)