Below is a comprehensive list of important readings on the subject of Values in Design. If you are looking for key texts on a specific area, please use the special collections menu above.
Abowd, G.D., Mynatt, E.D., and Rodden, T. (2002). The human experience. IEEE Pervasive Computing, 1:1, pp. 48-57.
Agre, P. E., & Harbs, C. A. (1994). Social choice about privacy: Intelligent vehicle-highways systems in the United States. Information Technology and People, 7(4), 63-90.
Berg, A. and Lie, M. Feminism and Constrivism: Do Artifacts Have Gender? Science, Technology,& Human Values, Vol. 20, No. 3, (Summer 1995), 332-551
Bodker, S. & Trigg, R. (1994). From implementation to design: Tailoring and the emergence of systemization in CSCW. In R. Furuta & C. Neuwirth (Eds.), Proceedings of the Conference on Computer Supported Cooperated Work (CSCW `94), (pp. 45-54). New York: ACM Press.
Bodker, S., Gronbaeck, K., & Trigg, T. (1991). Open-ended interaction in cooperative prototyping: A video-based analysis. Scandinavian Journal, 3, 63-86.
Blomberg, J., Suchman, L. & Trigg, R.H. (1999). Moving document collections online: The evolution of a shared repository. In S. Bødker, M. Kyng, & K. Schmidt (Eds.), Proceedings of the Sixth European Conference on Computer Supported Cooperative Work (ECSCW `99), (pp. 331-350). Dordrecht, The Netherlands: Kluwer.
Blomberg, J., Suchman, L., & Trigg, R. (1996). Reflections on a work-oriented design project. Human-Computer Interaction, 11(3), 237-265.
Blomberg, J., Scuhman, L. & Trigg, R. (1997). Back to work: Renewing old agendas for cooperative design. In M. Kyng & L. Mathiassen (Eds.), Computers and design in context, (pp. 267-287). Cambridge: MIT Press.
Bowker, G.C. & Star, S.L. (1999). Sorting things out: Classification and its consequences. Cambridge, MA: MIT Press.
Boyd, D., Jensen, C., Lederer, S., and Nguyen, D.H. (2002). Privacy in digital environments: Empowering users. Workshop abstract in Extended Abstracts of the ACM Conference on Computer Supported Cooperative Work (CSCW 2002). New Orleans, Louisiana. http://www.cc.gatech.edu/fce/ecl/projects/privacyMirrors/pubs/privacyworkshop-cscw2002.pdf
Brey, P. The politics of computer systems and the ethics of design. In M.J. van den Hoven (Ed.), Computer ethics: Philosophical enquiry ACM/SIGCAS Conference (pp. 64-75). Rotterdam University Press.
Brey, P. New media and the quality of life. Techne: Journal of the Society for Philosophy and Technology, 3(1), 1-23.
Brey, P. Worker autonomy and the drama of digital networks in organizations. Journal of Business Ethics, 22, 15-25.
Brey, P. The ethics of representation and action in virtual reality. Ethics and Computer Technology, 1(1), 5-14.
Brey, P. Method in computer ethics: Towards a multi-level interdisciplinary approach. In A. D’Atri , et. al. (Eds.), Look to the future of the information society ETHIOCOMP `99. (pp. 1-10). [CD-ROM]. LUISS Guido Carli Centro di Ricerca sui Sistemi Informativi.
Brey, P. Design and the social ontology of virtual world. In A. Nijholt, O. Donk & V. van Dijk (Eds.), Interactions in virtual worlds TWLT 15 Proceedings of the Fifteenth Twente Workshop on Language. (pp. 5-12). University of Twente: Faculteit Informatica.
Camp, LJ (2003) “Design for Trust” in Trust, Reputation and Security: Theories and Practice. Rino Falcone, Springer-Verlag Berlin.
Camp LJ, (2003) “Code, Coding and Coded Perspectives” Journal of Information, Communication and Ethics in Society Vol. 1, Jan. 2003, pp. 49-59.
Camp, LJ (2001) “The Shape of the Network” in Governance in a Globalizing World , ed. J. Donahue, Brookings Press, Washington DC
Camp, L.J. (2000) Trust and Risk in Internet Commerce MIT Press, Cambridge.
Camp, L.J. & C. Osorio (2003) “Privacy Enhancing Technologies for Internet Commerce” in Trust in the Network Economy , Springer-Verlag Berlin.
Camp, L.J. &l S. Syme (2002) “The Governance of Code” ACM Computers & Society, Vol. 32, No. 3
Chapman, G. & L. Rhodes (1997). Nurturing Neighborhood Nets. Technology Review, 100(7), MIT. Boston.
Cranor, L.F. (2002) Web Privacy with P3P O’Reilly and Associates, Cambridge.
Cranor, L. & Resnick, P. (1999). Protocols for automated negotiations with buyer anonymity and seller reputations. Netnomics.
Cranor L. F. and Wright, R. (1998, October 3-5). Influencing Software Usage. Proceedings of the Telecommunications Policy Research Conference. Alexandria, VA, October 3-5. http://xxx.lanl.gov/abs/cs.CY/9809018
Cranor L. (1998). Bias and Responsibility in ‘Neutral’ Social Protocols, Computers & Society, September 1998, (pp. 17-19). Originally presented at the DIMACS workshop on Design for Values: Ethical, Social and Political Dimensions of Information Technology, Princeton, NJ, 28 February 1998. http://www.research.att.com/~lorrie/pubs/dimacs-values.html
Cranor L., Ed. (1998). P3P Guiding Principles. W3C Note, 21 July 1998. http://www.w3.org/TR/1998/NOTE-P3P10-principles
Cranor, L. and Reagle, J. (1997). Designing a Social Protocol: Lessons Learned from the Platform for Privacy Preferences. In J. K. MacKie-Mason and D. Waterman, (Eds.), Telephony, the Internet, and the Media. Mahwah: Lawrence Erlbaum Associates, 1998. Paper presented at the Telecommunications Policy Research Conference. Alexandria, VA, September 27-29 1997. http://www.research.att.com/~lorrie/pubs/dsp/
Feenberg, A. (1991). Critical Theory of Technology. Oxford.
Feenberg, A. & Hannay, A. (eds.). (1995). Technology and the Politics of Knowledge. Indiana.
Feenberg, A. (1995). Alternative Modernity. University of California.
Feenberg, A. (1999). Questioning Technology. Routledge.
Feenberg, A. (1993). Building a Global Network: The WBSI Experience. In Harasim, L. ed., Global Networks: Computerizing the International Community. MIT Press. 185-197.
Feenberg, A. (1999). Wither Educational Technology? Peer Review, Summer 1999. 4-7.
Feenberg, A. (1999). Distance Learning: Promise or Threat. Academe, Sept.-Oct. 1999. 26-31.
Feenberg, A., (1995). Review of Carol Gould (ed.), The Information Web. In Minds and Machines, 5. 138-142.
Feenberg, A. (1989). The Written World. In Kaye, A. and Mason, R. (eds.) Mindweave: Communication, Computers and Distance Education. Pergamon Press. 22-39.
Feenberg, A. (1992). Subversive Rationalization: Technology, Power and Democracy. Inquiry, Sept./Dec. 1992. 301-322.
Feenberg, A. (1992). From Information to Communication: The French Experience with Videotex. In Lea, M. (ed.), Contexts of Computer-Mediated Communication. Harvester-Wheatsheaf. 168-187.
Feenberg, A. (1992). On Being a Human Subject: Interest and Obligation in the Experimental Treatment of Incurable Disease. The Philosophical Forum. Spring 1992. 213-230.
Feenberg, A. (1996). The Commoner-Ehrlich Debate: Environmentalism and the Politics of Survival. In Macauley, D. (ed.), Minding Nature: The Philosophers of Ecology. Guilford Publications. 257-282.
Friedman, B. (Ed.) (1997). Human values and the design of computer technology. New York: Cambridge University Press and CSLI, Stanford University.
Friedman, B., & Nissenbaum, H. (1996). Bias in computer systems. ACM Transactions on Information Systems, 14(3), 330-347. (Earlier version published as Tech. Rep. No. CSLI-94-188, Stanford, CA: CSLI, Stanford University)
Friedman, B. & Kahn, P. H., Jr. (1992). Human agency and responsible computing: Implications for computer system design. Journal of Systems Software, 17, 7-14.
Friedman, B. (1991). Social and moral development through computer use: A constructivist approach. Journal of Research on Computing in Education, 23, 560-567.
Friedman, B. (1999). Value-Sensitive Design: A Research Agenda for Information Technology. (Contract No: SBR-9729633). Arlington, VA: National Science Foundation.
B. Friedman and H. Nissenbaum, “Discerning Bias in Computer Systems” in S. Ashlund, K. Mullet, A. Henderson, E. Hollnagel, & T. White (Eds), InterCHI ’93 Adjunct Proceedings Amsterdam, The Netherlands, pp. 141-142
Friedman, B. & Workshop Participants. (1998). User autonomy: Who should control what and when? SIGCHI Bulletin, 30(1), 26-29.
Friedman, B. (1996). Value-sensitive design. interactions, III(6), 17-23.
Friedman, B., Brok, E., Roth, S. K., & Thomas, J. (1996). Minimizing bias in computer systems: A CHI ’95 Workshop. SIGCHI Bulletin, 28(1), 48-51.
Friedman, B., & Kahn, P. H., Jr. (1994). Educating computer scientists: Linking the social and the technical. Communications of the ACM, 37(1), 64-70.
Friedman, B. and Kahn, P. H., Jr. (2003). “Human values, ethics and design”. In J. Jacko and A. Sears (Eds.), Handbook of Human-Computer Interaction (pp. 1177 – 1201). Mahwah, NJ: Lawrence Erlbaum Associates.
Friedman, B., & Thomas, J. C. (1999). (Organizer and Panelists). Trust me, I’m accountable: Trust and accountability online. CHI 99 Extended abstracts of the conference on Human Factors in Computing Systems (p. 79-80). New York: Association for Computing Machinery.
Friedman, B. (1999, May 16-17). Informed consent and the design of recommender systems. Paper presented to the workshop on “Interacting with Recommender Systems”, CHI 99, Pittsburgh, PA.
Friedman, B. & Grudin, J. (1998). Trust and Accountability: Preserving human values in interactional experience. CHI 98 Summary of the conference on Human Factors in Computing Systems (p. 213). New York: Association for Computing Machinery.
Friedman, B., & Nissenbaum, H. (1997, February). Software agents and user autonomy. Proceedings of the First International Conference on Autonomous Agents (pp. 466-469). New York: Association for Computing Machinery.
Friedman, B., & Millett, L. (1995, May). “It’s the computer’s fault” — Reasoning about computers as moral agents. Conference companion of the conference on Human Factors in Computing Systems, CHI ’95 (pp. 226-227). New York: Association for Computing Machinery.
Friedman, B. (Organizer and Panelist). (1994). Beyond accuracy, reliability, and efficiency: Criteria for a good computer system. Conference companion of the conference on Human Factors in Computing Systems, CHI ’94 (pp. 195-196). New York: Association for Computing Machinery.
Friedman, B. (1992). Designing computer systems for human (and humane) use. In D. Schular (Ed.), Proceedings of the conference on Directions and Implications of Advanced Computing (pp. 131-133). Berkeley.
Friedman, E. & Resnick, P. (1999). The Social cost of cheap pseudonyms: fostering cooperation on the Internet. (working paper under review, 1999).
Gottberbarn, D., Miller, K., & Rogerson, S. (1999). “Computer Society and ACM Approve Software Engineering Code of Ethics” Computer. pp. 84-89. Reprinted as “Software Engineering Code of Ethics is Approved” in Communications of the ACM 42(10). pp. 102-107
Gotterbarn, D. (1999). “Improving Ethical Decisions in Software Engineering.” Proceeding of the Australian Institute of Computer Ethics Conference, July 1999.
Gotterbarn, D. (1999). “An Ethical Decision Support Tool: Improving the Identification and Response to the Ethical Dimensions of Software Projects.” Proceedings of Ethicomp ’99. Rome, Italy. October 8.
Gottberbarn, D. & Rogerson, S. (1998). “The Ethics of Software Project Management” in Collste, G. (ed.) Ethics and Information Technology. New Academic Publisher, Delhi.
Greenbaum, J., & Kyng, M. (1991). Design at work. Hillsdale, NJ: Lawrence Erlbaum.
Grudin, J. (1999). Information, context and conventions in computer-mediated interaction. Manuscript submitted for publication.
Heim, M. (1998). Virtual Realism. Oxford University Press. New York.
Heim, M. (1993). The Metaphysics of Virtual Reality. Oxford University Press. New York.
Heim, M. (1999). Electric Language: A Philosophical Study of Word Processing. 2nd Ed. Yale University Press. New Haven.
Heim, M. (Jan. 2000). “Response to Stephen J. Schneider’s Review of Virtual Realism.” Resource Center for Cyberculture Studies.
Heim, M. (1998). “Virtual Reality and the Tea Ceremony” in The Virtual Dimension, John Beckmann ed. Princeton Architectural Press. New York. pp. 156-77
L. Introna and H. Nissenbaum. Shaping the Web: Why the Politics of Search Engines Matters. The Information Society , 16(3):1-17,2000.
Johnson, D.G. (1997). Is the global information infrastructure a democratic technology? Computer & Society, 27(3), 20-26.
Johnson, D. G., & Mulvey, J. M. (1993). Computer Decisions: Ethical Issues of Responsibility and Bias (SOR-93-11). Statistics and Operations Research Series, Dept. of Civil Engineering and Operations Research, Princeton University, Princeton, NJ.
Johnson, D.G. (with Mulvey, J.M.). (1995). Accountability and computer decision systems. Communications of the ACM, 38(12), 58-64.
Johnson, D.G. (2000). Democratic values. In D. Langford (Ed.), Ethics and the Internet (pp. 181-196). UK: Macmillan Press Ltd.
Johnson, D.G. & Nissenbaum, H. (Eds.), (1995). Computers, ethics and social values. Englewood Cliffs, NJ: Prentice-Hall.
Johnson, D.G. (1985). Computer ethics. Englewood Cliffs, NJ: Prentice-Hall.
Johnson, D.G. (1994). Computer ethics (2nd ed.). Englewood Cliffs, NJ: Prentice-Hall.
Kammen, D.M. & Dove, M.R. (1997) The Virtues of Mundane Science. Environment, Vol. 39 No. 6 (July/August 1997) http://ist-socrates.berkeley.edu/~rael/Mundane_Science.pdf
King, M. & Resnick, P. (1990). The rainbow pages: Building community with voice technology. In P. Agre & D. Schuler (Eds.) Reinventing technology, rediscovering community, (pp. 229-240). Greenwich, CT: Ablex. (Originally presented at the 1990 Conference on Directions and Implications of Advanced Computing).
Lessig, L. & Resnick, P. (1999). The architectures of mandated access controls. In S.E. Gillett & I. Vogelsong (Eds.) Competition, regulation, and convergence: Current trends in telecommunications policy research, 1998 Tele communications Policy Research Conference, (pp. 137-157). Mahwah, NJ: Lawrence Erlbaum Associates.
Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999
Macken, E., Perry, J., Scott, N. and McKinley, J.. (1996) Disability, Inability, and Cyberspace. In Friedman, B. (ed.), Designing Computers for People–Human Values and the Design of Computer Technology, Cambridge and Stanford: CSLI Publications.
Macken, E., Perry, J. and Israel, D. Prolegomena to A Theory of Disability. Forthcoming in Proceedings of the Second Conference on Information-Theoretic Approaches to Logic, Language, and Computation.
Macken, E., Perry, J., and Haas, C. (1995). American Sign Language as a Heterogeneous System of Communication. Sign Language Studies, 89, Winter 1995, 363-413.
Macken, E. & Perry, J. (1996). Interfacing Situations. In Seligman J. & Westerstahl (eds.), Logic, Language, and Computation, 1, Stanford: CSLI Publications.
Macken, E. Perry, J. & Haas, C. (1993). Richly Grounded Symbols in American Sign Language. Sign Language Studies 81, Winter 1993. 375-394.
Miller, J. & Resnick, P. (1996). PICS: Internet access controls without censorship. Communications of the ACM, 39(10), 87-93.
Mogenson, P. & Trigg, R. (1992, November). Artifacts as triggers for participatory analysis. In M.J. Muller, S. Kuhn, & A. Meskill (Eds.), Proceedings of the Participatory Design Conference, (pp. 55-62). Cambridge, MA.
Mynatt, E. D., and Rogers, W. A. (2002). Developing technology to support the functional independence of older adults. Ageing International, 27, 24-41. http://www.cc.gatech.edu/fce/ecl/publications/functionalIndependence-agingInternational2002.pdf
Mynatt, E.D. & Nguyen, D.H. (2001). Making Ubiquitous Computing Visible. Position paper ACM CHI 2001 Conference Workshop: Building the Ubiquitous Computing User Experience.
Nardi, B. & O’Day, V. (1999). Information Ecologies. Cambridge, MA: MIT Press.
Neumann, P.G. (1983). Psychological implications of computer software development and use: Zen and the art of computing. In D. Ferrari, M. Bolognani & J. Goguen (Eds.), Theory and practice of software technology (pp. 221-232). North-Holland.
Neumann, P.G., Denning, D.E. & Parker, D.B. (1987, December). Social aspects of computer security. Proceedings of the 10th National Computer Security Conference.
Neumann, P.G. (1991, August). Computer security and human values. Proceedings of the National Conference on Computing and Values. New Haven, CT: Southern Conneticut State University.
Neumann, P.G. (1993, December). Limitations of computer-communication technology. Proceedings of an Invitational Conference on Legal, Ethical, and Technological Aspects of Computer and Network Use and Abuse. AAAS.
Neumann, P.G. (1994). Computer-related risks. New York: ACM Press.
Neumann, P.G., et. al. (1994). Codes, keys, and conflicts: Issues in [U.S.] crypto policy. Note: A summary of this report by the same authors is available as the following. Neumann, P.G. et. al. (1994). Crypto policy perspectives. Communications of the ACM, 37(8), 115-121.
Neumann, P.G. et. al. (1997). The risks of key recovery, key escrow, and trusted third-party encryption. World Wide Web Journal (Web Security: A Matter of Trust), 2(3), 241-257.
Neumann, P.G. et. al. (1998). The risks of key recovery, key escrow, and trusted third-party encryption. World Wide Web Journal (Web Security: A Matter of Trust). Note: This is a reissue of the May 27, 1997 report, with a new preface evaluating what happened in the intervening year.
Nguyen, D.H. & Mynatt, E.D (2002) Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems Georgia Institute of Technology Technical Report GIT-GVU-02-16 http://www.erstwhile.org/research/PrivacyMirrors.pdf
Nguyen, D.H. & Truong, K.N. (2003) PHEMAIL: Designing a Privacy Honoring Email System. To appear in the Extended Abstracts of the ACM Conference on Human Factors in Computing Systems (CHI 2003). Fort Lauderdale, Florida: ACM Press.
Nissenbaum, H. (in press) Can Trust be Secured Online? A Theoretical Perspective. Etica e Politica.
H. Nissenbaum. How Computer Systems Embody Values. IEEE Computer, March 2001.
Nissenbaum, H. (1996). Accountability in a computerized society. Science and Engineering Ethics, 2, 25-42.
Nissenbaum, H. (1998a). Values in computer system design: Bias and autonomy. In Ethics and information technology (Proceedings of the Conference on Computer Ethics, Linkoping Sweden. June, 1997). Delhi: New Academic Press. 35-42.
Nissenbaum, H. (1998b). Values in the design of computer systems. Computers in Society. 38-39.
Donald Norman, The Design of Everyday Things, New York: Doubleday, 1989
Pinch, Trevor and W. Bijker. “The Social Construction of Facts and Artifacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other.” Shaping Technology/Building Society. Ed. W. Bijker and J. Law. Cambridge, MA: MIT Press, 1992, 17-50
Reidenberg, J. Privacy Wrongs in Search of Remedies Hastings Law Journal, Vol. 54, 2003 Fordham University School of Law
Reidenberg, J. Technology and Internet Jurisdiction University of Pennsylvania Law Review, Vol. 153, 2005 Fordham University School of Law
Reidenberg, J. and Cranor, L. Can User Agents Accurately Represent Privacy Policies? Fordham University School of Law and AT&T Labs – Research
Rekhter, Y., Resnick, P. & Bellovin, S. (1997). Financial incentives for route aggregation and efficient address utilization in the Internet. In B. Kahin & J. Keller (Eds.), Coordinating the Internet, (pp. 273-287). Cambridge: MIT Press.
Resnick, P. (1997, June). PICS, censorship, & intellectual freedom FAQ, (Version 1.12). Available at http://www.w3.org/PICS/PICS-FAQ-980126.html.
Resnick. P. (1997). Filtering he Internet. Scientific American, March, 62-64.
Resnick, P. Phone-based CSCW: Tools and trails. ACM Transactions on Information Systems, 11(4), 401-424.
Rhodes, L. (forthcoming). The Internet: Making Room for Families. In A. Kavanaugh & J. Turow (eds.), Internet and the Family: New Views on a New World. MIT Press. Boston
Rhodes, L. (1998). I Can Do It. Discovery, 15(2). University of Texas, Austin.
Rhodes, L. & T. Williams (1998). Building Competence Through Information Literacy. Family Futures, 2(2). University of South Carolina. Columbia, South Carolina.
Shneiderman, B. (1991). Human values and the future of technology: A declaration of responsibility. ACM SIGCHI Bulletin, 23(1), 11-16.
Shneiderman, B., & Rose, A. (1997). Social impact statements: Engaging public participation in information technology design. In B. Friedman, Ed., Human values and the design of computer technology pp. 117-133. New York, NY: Cambridge University Press.
Suchman, L. & Trigg, R. (1991). Understanding practice: Video as a medium for reflection and design. In J. Greenbaum & M. Kyng (Eds.), Design at work: Cooperative design of computer systems, (pp. 65-89). Hillsdale, NJ: Lawrence Erlbaum Associates.
Suchman, L. & Trigg, R. (1993). Artificial intelligence as craftwork. In S. Chaiklin & J. Lave (Eds.), Understanding practice, (pp. 144-178). New York: Cambridge University Press.
Tang, J. (1997). Eliminating a hardware switch: Weighing economics and values in a design decision. In B. Freidman (Ed.) Human values and the design of computer technology. Cambridge: Cambridge University Press.
Teich, Albert H. Ed. (2000). Technology and the Future, 8th edition. Boston: Bedford/St. Martin’s.
Teich, Al, Mark S. Frankel, Rob Kling, & Ya-ching Lee. (1999). Anonymous Communication Policies for the Internet, Results and Recommendations of the AAAS Conference. The Information Society, 15( 2), 71-77.
Voida, A. & Mynatt, E.D, (2002). Grounding Design in Values. A Position Paper for CHI 2002 Workshop on New Technologies for Families. http://www.cc.gatech.edu/~amyvoida/groundingDesignInValues-chi02.pdf
Weber, R. Manufacturing Gender in Military Cockpit Design. In MacKenzie, D., and J. Wajcman, eds. 1985. The Social Shaping of Technology. Milton Keynes: Open University Press.
Weinberg, J. (1997). Rating the net. Hastings Communication and Entertainment Law Journal, 19, 453.