Embedding Human Values into Information System Engineering Methodologies

نویسندگان

  • Sunil Choenni
  • Peter van Waart
  • Geert de Haan
چکیده

Many people are concerned about how information systems deal with human values such as privacy and trust. In this paper, we discuss the role of human values in the design of information systems. We elaborate on the nature of human values and discuss various approaches on how to address human values, including value-sensitive design, worth-centered design and understanding as an additional step to prepare for systems design. We discuss the meaning of values like 'privacy' and 'trust' in the area of healthcare and public safety. Subsequently, we illustrate our considerations, exemplifying how privacy and trust might be embedded in a healthcare system to monitor dementia patients and how privacy might be embedded in a public safety system. Finally, we discuss how human values may be addressed in the process of developing and implementing information systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Singular Value Decomposition based Steganography Technique for JPEG2000 Compressed Images

In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...

متن کامل

Research on Color Watermarking Algorithm Based on RDWT-SVD

In this paper, a color image watermarking algorithm based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) is proposed. The new algorithm selects blue component of a color image to carry the watermark information since the Human Visual System (HVS) is least sensitive to it. To increase the robustness especially towards affine attacks, RDWT is adopted for its...

متن کامل

Behavioral Considerations in Developing Web Information Systems: User-centered Design Agenda

The current paper explores designing a web information retrieval system regarding the searching behavior of users in real and everyday life. Designing an information system that is closely linked to human behavior is equally important for providers and the end users.  From an Information Science point of view, four approaches in designing information retrieval systems were identified as system-...

متن کامل

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

Systems Security Problems and Cultural Meanings in Control and Automation Systems: Empirical Evidence for Value Conflicts in Systems Engineering

Automation and control systems such as integrated enterprise information technologies and distributed telemedical system architectures require highly secure information processing environments to ensure that costly (and even fatal) errors do not occur. However, research into systems development methodologies shows significant gaps in the treatment of systems security. Many methodologies do not ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011