Materiality of Values Bibliography

Works Analyzed

Albrechtslund, A. (2006). Ethics and technology design. Ethics and Information Technology, 9(1), 63–72. http://doi.org/10.1007/s10676-006-9129-8
Alsheikh, T., Rode, J. A., & Lindley, S. E. (2011). (Whose) Value-sensitive Design: A Study of Long- Distance Relationships in an Arabic Cultural Context. In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work (pp. 75–84). New York, NY, USA: ACM. http://doi.org/10.1145/1958824.1958836
Ames, M. G., Go, J., Kaye, J. “Jofish,” & Spasojevic, M. (2011). Understanding Technology Choices and Values Through Social Class. In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work (pp. 55–64). New York, NY, USA: ACM. http://doi.org/10.1145/1958824.1958834
Bers, M. U. (2001). Identity Construction Environments: Developing Personal and Moral Values Through the Design of a Virtual City. Journal of the Learning Sciences, 10(4), 365–415. http://doi.org/10.1207/S15327809JLS1004new_1
Blanchette, J.-F. (2011). A material history of bits. Journal of the American Society for Information Science and Technology, 62(6), 1042–1057. http://doi.org/10.1002/asi.21542
Borning, A., Friedman, B., Davis, J., & Lin, P. (2005). Informing Public Deliberation: Value Sensitive Design of Indicators for a Large-Scale Urban Simulation. In H. Gellersen, K. Schmidt, M. Beaudouin-Lafon, & W. Mackay (Eds.), ECSCW 2005 (pp. 449–468). Springer Netherlands. Retrieved from http://link.springer.com/chapter/10.1007/1-4020-4023-7_23
Borning, A., Friedman, B., & Peter H. Kahn, J. (2004). Designing for Human Values in a Urban Simulation System: Value Sensitive Design and Participatory design. PDC, 68–71.
Bowser, A. E., Haimson, O. L., Melcer, E. F., & Churchill, E. F. (2015). On Vintage Values: The Experience of Secondhand Fashion Reacquisition. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 897–906). New York, NY, USA: ACM. http://doi.org/10.1145/2702123.2702394
Brecht, F., Eckhardt, A., Berger, C., & Guenther, O. (2012). Corporate Career Presences on Social Network Sites: An Analysis of Hedonic and Utilitarian Value. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2441–2450). New York, NY, USA: ACM. http://doi.org/10.1145/2207676.2208408
Brown, B., Taylor, A. S., Izadi, S., Sellen, A., Kaye, J. J., & Eardley, R. (2007). Locating Family Values: A Field Trial of the Whereabouts Clock. In J. Krumm, G. D. Abowd, A. Seneviratne, & T. Strang (Eds.), UbiComp 2007: Ubiquitous Computing (pp. 354–371). Springer Berlin Heidelberg. Retrieved from http://link.springer.com/chapter/10.1007/978-3-540-74853-3_21
Bullard, J. (2013). Playfully serious information for serious play: The integration of community values in an information resource. In iConference 2013 Proceedings (pp. 389–397). http://doi.org/10.9776/13218
Bullard, J. (2014). Values and Negotiation in Classification Work. In Proceedings of the Companion Publication of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 45–48). New York, NY, USA: ACM. http://doi.org/10.1145/2556420.2556820
Cheng, A.-S., & Fleischmann, K. R. (2010). Developing a meta-inventory of human values. Proceedings of the American Society for Information Science and Technology, 47(1), 1–10. http://doi.org/10.1002/meet.14504701232
Cheng, A.-S., Fleischmann, K. R., Wang, P., Ishita, E., & Oard, D. W. (2010). Values of Stakeholders in the Net Neutrality Debate: Applying Content Analysis to Telecommunications Policy. In 2010 43rd Hawaii International Conference on System Sciences (HICSS) (pp. 1–10). http://doi.org/10.1109/HICSS.2010.434
Chen, J., Hsieh, G., Mahmud, J. U., & Nichols, J. (2014). Understanding Individuals’ Personal Values from Social Media Word Use. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 405–414). New York, NY, USA: ACM. http://doi.org/10.1145/2531602.2531608
Cram, W. A. (2011). Aligning Organizational Values in Systems Development Projects: An Empirical Study. In 2011 44th Hawaii International Conference on System Sciences (HICSS) (pp. 1–10). http://doi.org/10.1109/HICSS.2011.44
Czeskis, A., Dermendjieva, I., Yapit, H., Borning, A., Friedman, B., Gill, B., & Kohno, T. (2010). Parenting from the Pocket: Value Tensions and Technical Directions for Secure and Private Parent-teen Mobile Safety. In Proceedings of the Sixth Symposium on Usable Privacy and Security (pp. 15:1–15:15). New York, NY, USA: ACM. http://doi.org/10.1145/1837110.1837130
Danielson, P. (2010). Designing a machine to learn about the ethics of robotics: the N-reasons platform. Ethics and Information Technology, 12(3), 251–261. http://doi.org/10.1007/s10676-009-9214-x
Davis, J. (2009). Design Methods for Ethical Persuasive Computing. In Proceedings of the 4th International Conference on Persuasive Technology (pp. 6:1–6:8). New York, NY, USA: ACM. http://doi.org/10.1145/1541948.1541957
Denning, T., Borning, A., Friedman, B., Gill, B. T., Kohno, T., & Maisel, W. H. (2010). Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 917–926). New York, NY, USA: ACM. http://doi.org/10.1145/1753326.1753462
Dinev, T., Xu, H., & Smith, H. J. (2009). Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy. In 42nd Hawaii International Conference on System Sciences, 2009. HICSS ’09 (pp. 1–10). http://doi.org/10.1109/HICSS.2009.255
Dourish, P., & Mazmanian, M. (2013). Media as Material: Information Representations as Material Foundations for Organizational Practice. In How Matter Matters: Objects, Artifacts, and Materiality in Organization Studies (pp. 92–118). OUP Oxford.
Durrant, A. C., Kirk, D. S., & Reeves, S. (2014). Human Values in Curating a Human Rights Media Archive. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (pp. 2685–2694). New York, NY, USA: ACM. http://doi.org/10.1145/2556288.2557196
Earp, J. B., Anton, A. I., Aiman-Smith, L., & Stufflebeam, W. H. (2005). Examining Internet privacy policies within the context of user privacy values. IEEE Transactions on Engineering Management, 52(2), 227–237. http://doi.org/10.1109/TEM.2005.844927
Ferreira, J., Perry, M., & Subramanian, S. (2015). Spending Time with Money: From Shared Values to Social Connectivity. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 1222–1234). New York, NY, USA: ACM. http://doi.org/10.1145/2675133.2675230
Fiore, A. T., Tiernan, S. L., & Smith, M. A. (2002). Observed Behavior and Perceived Value of Authors in Usenet Newsgroups: Bridging the Gap. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 323–330). New York, NY, USA: ACM. http://doi.org/10.1145/503376.503434
Flanagan, M., Howe, D. C., & Nissenbaum, H. (2005). Values at Play: Design Tradeoffs in Socially-oriented Game Design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 751–760). New York, NY, USA: ACM. http://doi.org/10.1145/1054972.1055076
Fleischmann, K. R., Oard, D. W., Cheng, A.-S., Wang, P., & Ishita, E. (2009). Automatic classification of human values: Applying computational thinking to information ethics. Proceedings of the American Society for Information Science and Technology, 46(1), 1–4. http://doi.org/10.1002/meet.2009.1450460345
Fleischmann, K. R., & Wallace, W. A. (2006). Ethical implications of values embedded in computational models: An exploratory study. Proceedings of the American Society for Information Science and Technology, 43(1), 1–16. http://doi.org/10.1002/meet.14504301254
Fleischmann, K. R., Wallace, W. A., & Grimes, J. M. (2010). The Values of Computational Modelers and Professional Codes of Ethics: Results from a Field Study. In 2010 43rd Hawaii International Conference on System Sciences (HICSS) (pp. 1–10). http://doi.org/10.1109/HICSS.2010.400
Fleischmann, K. R., Wallace, W. A., & Grimes, J. M. (2011). Computational Modeling and Human Values: A Comparative Study of Corporate, Academic, and Government Research Labs. In 2011 44th Hawaii International Conference on System Sciences (HICSS) (pp. 1–10). http://doi.org/10.1109/HICSS.2011.123
Forte, A., & Bruckman, A. (2008). Scaling Consensus: Increasing Decentralization in Wikipedia Governance. In Hawaii International Conference on System Sciences, Proceedings of the 41st Annual (pp. 157–157). http://doi.org/10.1109/HICSS.2008.383
Friedman, B., Hook, K., Gill, B., Eidmar, L., Prien, C. S., & Severson, R. (2008). Personlig Integritet: A Comparative Study of Perceptions of Privacy in Public Places in Sweden and the United States. In Proceedings of the 5th Nordic Conference on Human-computer Interaction: Building Bridges (pp. 142–151). New York, NY, USA: ACM. http://doi.org/10.1145/1463160.1463176
Friedman, B., Howe, D. C., & Felten, E. (2002). Informed consent in the Mozilla browser: implementing value-sensitive design. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2002. HICSS (p. 10 pp.–). http://doi.org/10.1109/HICSS.2002.994366
Friedman, B., Jr, P. H. K., Borning, A., & Huldtgren, A. (2013). Value Sensitive Design and Information Systems. In N. Doorn, D. Schuurbiers, I. van de Poel, & M. E. Gorman (Eds.), Early engagement and new technologies: Opening up the laboratory (pp. 55–95). Springer Netherlands. Retrieved from http://link.springer.com/chapter/10.1007/978-94-007-7844-3_4
Gaver, W., Blythe, M., Boucher, A., Jarvis, N., Bowers, J., & Wright, P. (2010). The Prayer Companion: Openness and Specificity, Materiality and Spirituality. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2055–2064). New York, NY, USA: ACM. http://doi.org/10.1145/1753326.1753640
Gulotta, R., Odom, W., Forlizzi, J., & Faste, H. (2013). Digital Artifacts As Legacy: Exploring the Lifespan and Value of Digital Data. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1813–1822). New York, NY, USA: ACM. http://doi.org/10.1145/2470654.2466240
Heersmink, R., Hoven, J. van den, Eck, N. J. van, & Berg, J. van den. (2011). Bibliometric mapping of computer and information ethics. Ethics and Information Technology, 13(3), 241–249. http://doi.org/10.1007/s10676-011-9273-7
Hsieh, G., Chen, J., Mahmud, J. U., & Nichols, J. (2014). You Read What You Value: Understanding Personal Values and Reading Interests. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (pp. 983–986). New York, NY, USA: ACM. http://doi.org/10.1145/2556288.2556995
Hudson, J. M., & Bruckman, A. (2005). Using Empirical Data to Reason about Internet Research Ethics. In H. Gellersen, K. Schmidt, M. Beaudouin-Lafon, & W. Mackay (Eds.), ECSCW 2005 (pp. 287–306). Springer Netherlands. Retrieved from http://link.springer.com/chapter/10.1007/1-4020-4023-7_15
Introna, L. D. (2005). Disclosive Ethics and Information Technology: Disclosing Facial Recognition Systems. Ethics and Information Technology, 7(2), 75–86. http://doi.org/10.1007/s10676-005-4583-2
Ishita, E., Oard, D. W., Fleischmann, K. R., Cheng, A.-S., & Templeton, T. C. (2010). Investigating multi-label classification for human values. Proceedings of the American Society for Information Science and Technology, 47(1), 1–4. http://doi.org/10.1002/meet.14504701116
Isomursu, M., Ervasti, M., Isomursu, P., & Kinnula, M. (2010). Evaluating Human Values in the Adoption of New Technology in School Environment. In 2010 43rd Hawaii International Conference on System Sciences (HICSS) (pp. 1–10). http://doi.org/10.1109/HICSS.2010.452
Isomursu, M., Ervasti, M., Kinnula, M., & Isomursu, P. (2011). Understanding human values in adopting new technology—A case study and methodological discussion. International Journal of Human-Computer Studies, 69(4), 183–200. http://doi.org/10.1016/j.ijhcs.2010.12.001
Johnstone, J. (2007). Technology as empowerment: a capability approach to computer ethics. Ethics and Information Technology, 9(1), 73–87. http://doi.org/10.1007/s10676-006-9127-x
Kastner, M., & Stangl, B. (2013). Exploring a Text-to-Speech Feature by Describing Learning Experience, Enjoyment, Learning Styles, and Values – A Basis for Future Studies. In 2013 46th Hawaii International Conference on System Sciences (HICSS) (pp. 3–12). http://doi.org/10.1109/HICSS.2013.214
Kirk, D. S., & Sellen, A. (2010). On Human Remains: Values and Practice in the Home Archiving of Cherished Objects. ACM Trans. Comput.-Hum. Interact., 17(3), 10:1–10:43. http://doi.org/10.1145/1806923.1806924
Klang, M. (2004). Spyware – the ethics of covert software. Ethics and Information Technology, 6(3), 193–202. http://doi.org/10.1007/s10676-004-3392-3
Kleif, T., & Faulkner, W. (2003). “I’m No Athlete [but] I Can Make This Thing Dance!”—Men’s Pleasures in Technology. Science, Technology & Human Values, 28(2), 296–325. http://doi.org/10.1177/0162243902250908
Koch, S. H., Proynova, R., Paech, B., & Wetter, T. (2013). How to approximate users’ values while preserving privacy: experiences with using attitudes towards work tasks as proxies for personal value elicitation. Ethics and Information Technology, 15(1), 45–61. http://doi.org/10.1007/s10676-012-9309-7
Kraemer, F., Overveld, K. van, & Peterson, M. (2010). Is there an ethics of algorithms? Ethics and Information Technology, 13(3), 251–260. http://doi.org/10.1007/s10676-010-9233-7
Kumar, N., & Parikh, T. S. (2013). Mobiles, Music, and Materiality. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2863–2872). New York, NY, USA: ACM. http://doi.org/10.1145/2470654.2481396
LaLone, N. (2014). Values Levers and the Unintended Consequences of Design. In Proceedings of the Companion Publication of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 189–192). New York, NY, USA: ACM. http://doi.org/10.1145/2556420.2556511
LeDantec, C., Poole, E. S., & Wyche, S. P. (2009). Values As Lived Experience: Evolving Value Sensitive Design in Support of Value Discovery. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1141–1150). New York, NY, USA: ACM. http://doi.org/10.1145/1518701.1518875
Lingel, J., & Regan, T. (2014). “It’s in Your Spinal Cord, It’s in Your Fingertips”: Practices of Tools and Craft in Building Software. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 295–304). New York, NY, USA: ACM. http://doi.org/10.1145/2531602.2531614
Manders-Huits, N., & Zimmer, M. (2009). Values and Pragmatic Action: The Challenges of Introducing Ethical Intelligence in Technical Design Communities. International Review of Information Ethics, 10(2), 37–45.
Miller, J. K., Friedman, B., Jancke, G., & Gill, B. (2007). Value Tensions in Design: The Value Sensitive Design, Development, and Appropriation of a Corporation’s Groupware System. In Proceedings of the 2007 International ACM Conference on Supporting Group Work (pp. 281–290). New York, NY, USA: ACM. http://doi.org/10.1145/1316624.1316668
Mueller, J. (2010). The Influence of Cultural Values on Knowledge Sharing across Organizational Boundaries. In 2010 43rd Hawaii International Conference on System Sciences (HICSS) (pp. 1–10). http://doi.org/10.1109/HICSS.2010.481
Nathan, L. P. (2008). Ecovillages, Values, and Interactive Technology: Balancing Sustainability with Daily Life in 21st Century America. In CHI ’08 Extended Abstracts on Human Factors in Computing Systems (pp. 3723–3728). New York, NY, USA: ACM. http://doi.org/10.1145/1358628.1358920
O’Leary, K., Eschler, J., Kendall, L., Vizer, L. M., Ralston, J. D., & Pratt, W. (2015). Understanding Design Tradeoffs for Health Technologies: A Mixed-Methods Approach. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 4151–4160). New York, NY, USA: ACM. http://doi.org/10.1145/2702123.2702576
Patton, J. W. (2000). Protecting privacy in public? Surveillance technologies and the value of public places. Ethics and Information Technology, 2(3), 181–187. http://doi.org/10.1023/A:1010057606781
Pommeranz, A., Detweiler, C., Wiggers, P., & Jonker, C. (2011). Elicitation of situated values: need for tools to help stakeholders and designers to reflect and communicate. Ethics and Information Technology, 14(4), 285–303. http://doi.org/10.1007/s10676-011-9282-6
Postigo, H. (2011). Questioning the Web 2.0 Discourse: Social Roles, Production, Values, and the Case of the Human Rights Portal. The Information Society, 27(3), 181–193. http://doi.org/10.1080/01972243.2011.566759
Powers, T. M. (2003). Real wrongs in virtual communities. Ethics and Information Technology, 5(4), 191–198. http://doi.org/10.1023/B:ETIN.0000017737.56971.20
Preece, J. (2004). Etiquette, empathy and trust in communities of practice: Stepping stones to social capital. Journal of Universal Computing Science, 10, 63–77.
Rashid, A. M., Ling, K., Tassone, R. D., Resnick, P., Kraut, R., & Riedl, J. (2006). Motivating Participation by Displaying the Value of Contribution. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 955–958). New York, NY, USA: ACM. http://doi.org/10.1145/1124772.1124915
Rehg, W. (2014). Discourse ethics for computer ethics: a heuristic for engaged dialogical reflection. Ethics and Information Technology, 17(1), 27–39. http://doi.org/10.1007/s10676-014-9359-0
Rosner, D. K. (2012). The Material Practices of Collaboration. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (pp. 1155–1164). New York, NY, USA: ACM. http://doi.org/10.1145/2145204.2145375
Schaupp, L. C., Carter, L. D., & Schaupp, D. L. (2011). Ethics in Social Networking: A Framework for Evaluating Online Information Disclosure. In 2011 44th Hawaii International Conference on System Sciences (HICSS) (pp. 1–7). http://doi.org/10.1109/HICSS.2011.193
Shih, P. C., Bellotti, V., Han, K., & Carroll, J. M. (2015). Unequal Time for Unequal Value: Implications of Differing Motivations for Participation in Timebanking. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 1075–1084). New York, NY, USA: ACM. http://doi.org/10.1145/2702123.2702560
Shilton, K., Koepfler, J. A., & Fleischmann, K. R. (2014). How to See Values in Social Computing: Methods for Studying Values Dimensions. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 426–435). New York, NY, USA: ACM. http://doi.org/10.1145/2531602.2531625
Siegfried, R. M. (2005). Student Attitudes on Software Piracy and Related Issues of Computer Ethics. Ethics and Information Technology, 6(4), 215–222. http://doi.org/10.1007/s10676-004-3391-4
Siponen, M. T., & Vartiainen, T. (2001). End-user ethics teaching: issues and a solution based on universalization. In Proceedings of the 34th Annual Hawaii International Conference on System Sciences, 2001 (p. 10 pp.–). http://doi.org/10.1109/HICSS.2001.927151
Sorell, T., & Draper, H. (2014). Robot carers, ethics, and older people. Ethics and Information Technology, 16(3), 183–195. http://doi.org/10.1007/s10676-014-9344-7
Stark, L., & Tierney, M. (2013). Lockbox: mobility, privacy and values in cloud storage. Ethics and Information Technology, 16(1), 1–13. http://doi.org/10.1007/s10676-013-9328-z
Steinhardt, S. B., & Jackson, S. J. (2014). Material Engagements: Putting Plans and Things Together in Collaborative Ocean Science. In 2014 47th Hawaii International Conference on System Sciences (HICSS) (pp. 1505–1514). http://doi.org/10.1109/HICSS.2014.194
Sundström, P., Taylor, A., Grufberg, K., Wirström, N., Solsona Belenguer, J., & Lundén, M. (2011). Inspirational Bits: Towards a Shared Understanding of the Digital Material. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1561–1570). New York, NY, USA: ACM. http://doi.org/10.1145/1978942.1979170
Templeton, T. C., Fleischmann, K. R., & Boyd-Graber, J. (2011). Simulating Audiences: Automating Analysis of Values, Attitudes, and Sentiment. In 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom) (pp. 734–737). http://doi.org/10.1109/PASSAT/SocialCom.2011.238
Toombs, A. L., Bardzell, S., & Bardzell, J. (2015). The Proper Care and Feeding of Hackerspaces: Care Ethics and Cultures of Making. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 629–638). New York, NY, USA: ACM. http://doi.org/10.1145/2702123.2702522
Vaccaro, A., & Madsen, P. (2009). Virtual Networks and Ethics: An Empirical Research in a Non-Governmental Organization. In 42nd Hawaii International Conference on System Sciences, 2009. HICSS ’09 (pp. 1–9). http://doi.org/10.1109/HICSS.2009.501
Vasalou, A., Oostveen, A.-M., & Joinson, A. N. (2012). A Case Study of Non-adoption: The Values of Location Tracking in the Family. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (pp. 779–788). New York, NY, USA: ACM. http://doi.org/10.1145/2145204.2145321
Verbeek, P.-P. (2006). Materializing Morality Design Ethics and Technological Mediation. Science, Technology & Human Values, 31(3), 361–380. http://doi.org/10.1177/0162243905285847
Vogt, M., & Hales, K. (2010). Strategic Alignment of ICT Projects with Community Values in Local Government. In 2010 43rd Hawaii International Conference on System Sciences (HICSS) (pp. 1–10). http://doi.org/10.1109/HICSS.2010.350
Voida, A., Dombrowski, L., Hayes, G. R., & Mazmanian, M. (2014). Shared Values/Conflicting Logics: Working Around e-Government Systems. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (pp. 3583–3592). New York, NY, USA: ACM. http://doi.org/10.1145/2556288.2556971
Voida, A., & Mynatt, E. D. (2005). Conveying User Values Between Families and Designers. In CHI ’05 Extended Abstracts on Human Factors in Computing Systems (pp. 2013–2016). New York, NY, USA: ACM. http://doi.org/10.1145/1056808.1057080
Voort, M. V. de, Pieters, W., & Consoli, L. (2015). Refining the ethics of computer-made decisions: a classification of moral mediation by ubiquitous machines. Ethics and Information Technology, 17(1), 41–56. http://doi.org/10.1007/s10676-015-9360-2
Waern, A., Balan, E., & Nevelsteen, K. (2012). Athletes and Street Acrobats: Designing for Play As a Community Value in Parkour. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 869–878). New York, NY, USA: ACM. http://doi.org/10.1145/2207676.2208528
Wallace, J., Thieme, A., Wood, G., Schofield, G., & Olivier, P. (2012). Enabling Self, Intimacy and a Sense of Home in Dementia: An Enquiry into Design in a Hospital Setting. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2629–2638). New York, NY, USA: ACM. http://doi.org/10.1145/2207676.2208654
Wang, Q., Ding, X., Lu, T., & Gu, N. (2012). Digitality and Materiality of New Media: Online TV Watching in China. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 347–356). New York, NY, USA: ACM. http://doi.org/10.1145/2207676.2207724
Warwick, K. (2003). Cyborg morals, cyborg values, cyborg ethics. Ethics and Information Technology, 5(3), 131–137. http://doi.org/10.1023/B:ETIN.0000006870.65865.cf
Weiss, J. W., Gulati, G. J., Yates, D. J., & Yates, L. E. (2015). Mobile Broadband Affordability and the Global Digital Divide – An Information Ethics Perspective. In 2015 48th Hawaii International Conference on System Sciences (HICSS) (pp. 2177–2186). http://doi.org/10.1109/HICSS.2015.261
Woelfer, J. P., Iverson, A., Hendry, D. G., Friedman, B., & Gill, B. T. (2011). Improving the Safety of Homeless Young People with Mobile Phones: Values, Form and Function. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1707–1716). New York, NY, USA: ACM. http://doi.org/10.1145/1978942.1979191
Woelfer, J. P., Yeung, M. W.-M., Erdmann, C. G., & Hendry, D. G. (2008). Value considerations in an information ecology: Printed materials, service providers and homeless young people. Proceedings of the American Society for Information Science and Technology, 45(1), 1–9. http://doi.org/10.1002/meet.2008.1450450370
Yoo, D., Huldtgren, A., Woelfer, J. P., Hendry, D. G., & Friedman, B. (2013). A Value Sensitive Action-reflection Model: Evolving a Co-design Space with Stakeholder and Designer Prompts. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 419–428). New York, NY, USA: ACM. http://doi.org/10.1145/2470654.2470715
Zhang, J., Qu, Y., Cody, J., & Wu, Y. (2010). A Case Study of Micro-blogging in the Enterprise: Use, Value, and Related Issues. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 123–132). New York, NY, USA: ACM. http://doi.org/10.1145/1753326.1753346
Zhao, X., & Lindley, S. E. (2014). Curation Through Use: Understanding the Personal Value of Social Media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2431–2440). New York, NY, USA: ACM. http://doi.org/10.1145/2556288.2557291
Zhou, Y., Fleischmann, K. R., & Wallace, W. A. (2010). Automatic Text Analysis of Values in the Enron Email Dataset: Clustering a Social Network Using the Value Patterns of Actors. In 2010 43rd Hawaii International Conference on System Sciences (HICSS) (pp. 1–10). http://doi.org/10.1109/HICSS.2010.77
Zimmer, M. (2005). Surveillance, Privacy and the Ethics of Vehicle Safety Communication Technologies. Ethics and Information Technology, 7(4), 201–210. http://doi.org/10.1007/s10676-006-0016-0
Zimmer, M. (2010). “But the data is already public”: on the ethics of research in Facebook. Ethics and Information Technology, 12(4), 313–325. http://doi.org/10.1007/s10676-010-9227-5