Embedding Human Values into Information System Engineering Methodologies
نویسندگان
چکیده
Many people are concerned about how information systems deal with human values such as privacy and trust. In this paper, we discuss the role of human values in the design of information systems. We elaborate on the nature of human values and discuss various approaches on how to address human values, including value-sensitive design, worth-centered design and understanding as an additional step to prepare for systems design. We discuss the meaning of values like 'privacy' and 'trust' in the area of healthcare and public safety. Subsequently, we illustrate our considerations, exemplifying how privacy and trust might be embedded in a healthcare system to monitor dementia patients and how privacy might be embedded in a public safety system. Finally, we discuss how human values may be addressed in the process of developing and implementing information systems.
منابع مشابه
Singular Value Decomposition based Steganography Technique for JPEG2000 Compressed Images
In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...
متن کاملResearch on Color Watermarking Algorithm Based on RDWT-SVD
In this paper, a color image watermarking algorithm based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) is proposed. The new algorithm selects blue component of a color image to carry the watermark information since the Human Visual System (HVS) is least sensitive to it. To increase the robustness especially towards affine attacks, RDWT is adopted for its...
متن کاملBehavioral Considerations in Developing Web Information Systems: User-centered Design Agenda
The current paper explores designing a web information retrieval system regarding the searching behavior of users in real and everyday life. Designing an information system that is closely linked to human behavior is equally important for providers and the end users. From an Information Science point of view, four approaches in designing information retrieval systems were identified as system-...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملSystems Security Problems and Cultural Meanings in Control and Automation Systems: Empirical Evidence for Value Conflicts in Systems Engineering
Automation and control systems such as integrated enterprise information technologies and distributed telemedical system architectures require highly secure information processing environments to ensure that costly (and even fatal) errors do not occur. However, research into systems development methodologies shows significant gaps in the treatment of systems security. Many methodologies do not ...
متن کامل