Skip to main content
Erschienen in: Ethics and Information Technology 4/2022

01.12.2022 | Original Paper

A framework for the application of socio-technical design methodology

verfasst von: Adnan Ahmad, Brian Whitworth, Elisa Bertino

Erschienen in: Ethics and Information Technology | Ausgabe 4/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Socio-technical systems (STS) have become prominent platforms for online social interactions. Yet, they are still struggling to incorporate basic social ideas for many different and new online activities. This has resulted in unintended exposure of users’ personal data and a rise in online threats as users have now become a desirable target for malicious activities. To address such challenges, various researchers have argued that STS should support user-oriented configurations to protect their users from online social abuse. Some methodologies have also been proposed to appreciate the integration of social values in the design of information systems, but they often lack an application mechanism. This paper presents a framework for the application of the socio-technical design methodology to incorporate social standards in the design of STS. The proposed framework exemplifies the socio-technical design approach by considering a list of social standards, followed by their mapping onto corresponding technical specifications. Based on these two sets, the framework highlights various individual, inter-group, and intra-group interactions and their supporting tools for STS governance. A conversation about the integration of social standards in STS is already materializing, therefore, a comprehensive framework to apply these standards in STS is entailed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
These social standards are considered only to exemplify the working of the framework, and are not meant to be exhaustive in any sense, nor representative of any desired/proposed list. Therefore, they should not be compared with different rights standards proposed by various international organizations, including Universal Declaration of Human Rights (1948), International Covenant on Civil and Political Rights (1966), European Convention for the Protection of Human Rights and Fundamental Freedoms (1950), Helsinki Final Act (1975), International Covenant on Economic, Social and Cultural Rights (1966), etc.
 
2
The discussions about norms, how they are developed, spread, got adopted, rejected etc. are out of the scope of this paper.
 
3
Without supporting social standards in design, current STS will face the same negativity as portrayed by the P2P file sharing systems, where violations of the copyright law lead to demolishing of this useful tool, altogether.
 
4
This paper does not focus on different rights (e.g., right to be forgotten, right to internet access, etc.), rather it proposes a framework through which incorporation of social standards can be made possible in socio-technical design approach.
 
5
There are different types of rights such as civil, political, economic, social and liberal etc., however, this distinction and their discussion is out of the scope of this article.
 
6
After the receiving party’s consent.
 
10
For instance, information about operating system processes.
 
Literatur
Zurück zum Zitat Beer, D., & Burrows, R. (2007). Sociology and, of and in Web 2.0: Some Initial Considerations. Sociological Research Online, 12(5). Beer, D., & Burrows, R. (2007). Sociology and, of and in Web 2.0: Some Initial Considerations. Sociological Research Online, 12(5).
Zurück zum Zitat Beu, D., & Buckley, M. R. (2001). The hypothesized relationship between accountability and ethical behavior. Journal of Business Ethics, 34(1), 57–74.CrossRef Beu, D., & Buckley, M. R. (2001). The hypothesized relationship between accountability and ethical behavior. Journal of Business Ethics, 34(1), 57–74.CrossRef
Zurück zum Zitat Bird, P. (1973). Accountability: Standards in financial reporting. Accountancy Age Books. Bird, P. (1973). Accountability: Standards in financial reporting. Accountancy Age Books.
Zurück zum Zitat Bonahoom, O. M. (1953). Moral and ethical considerations in tax practice. Marquette Law Review, 37(1), 85. Bonahoom, O. M. (1953). Moral and ethical considerations in tax practice. Marquette Law Review, 37(1), 85.
Zurück zum Zitat Broadbent, J., & Laughlin, R. (2003). Control and legitimation in government accountability processes: The private finance initiative in the UK. Critical Perspectives on Accounting., 14(1–2), 23–48.CrossRef Broadbent, J., & Laughlin, R. (2003). Control and legitimation in government accountability processes: The private finance initiative in the UK. Critical Perspectives on Accounting., 14(1–2), 23–48.CrossRef
Zurück zum Zitat Cahn, A., Alfeld, S., Barford, P., & Muthukrishnan, S. (2016). An Empirical Study of Web Cookies. In Proceedings of the 25th international conference on World Wide Web (WWW '16). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 891–901. https://doi.org/10.1145/2872427.2882991 Cahn, A., Alfeld, S., Barford, P., & Muthukrishnan, S. (2016). An Empirical Study of Web Cookies. In Proceedings of the 25th international conference on World Wide Web (WWW '16). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 891–901. https://​doi.​org/​10.​1145/​2872427.​2882991
Zurück zum Zitat Cerf, V. (2012). The right to connect and internet censorship. New Perspectives Quarterly., 29(2), 18–23.CrossRef Cerf, V. (2012). The right to connect and internet censorship. New Perspectives Quarterly., 29(2), 18–23.CrossRef
Zurück zum Zitat Chaffey, D. (2020). Global social media research summary August 2020. Smart Insights, 3. Chaffey, D. (2020). Global social media research summary August 2020. Smart Insights, 3.
Zurück zum Zitat DeNardis, L. (2014). The global war for internet governance. Yale University Press.CrossRef DeNardis, L. (2014). The global war for internet governance. Yale University Press.CrossRef
Zurück zum Zitat Dryer, D. P. (1964). Freedom. The Canadian Journal of Economics and Political Science / Revue Canadienne D’economique Et De Science Politique, 30(3), 444–448. Dryer, D. P. (1964). Freedom. The Canadian Journal of Economics and Political Science / Revue Canadienne D’economique Et De Science Politique, 30(3), 444–448.
Zurück zum Zitat Economides, N. (2008). “Net Neutrality”, non-discrimination, and digital distribution of content through the Internet. I/S: A Journal of Law and Policy., 4, 209–233. Economides, N. (2008). “Net Neutrality”, non-discrimination, and digital distribution of content through the Internet. I/S: A Journal of Law and Policy., 4, 209–233.
Zurück zum Zitat Fehr, E., Kremhelmer, S., & Schmidt, K. M. (2008). Fairness and the optimal allocation of ownership rights. The Economic Journal, 118(531), 1262–1284.CrossRef Fehr, E., Kremhelmer, S., & Schmidt, K. M. (2008). Fairness and the optimal allocation of ownership rights. The Economic Journal, 118(531), 1262–1284.CrossRef
Zurück zum Zitat Fire, M., Goldschmidt, R., & Elovici, Y. (2014). Online social networks: Threats and solutions. IEEE Communications Surveys & Tutorials, 16(4), 2019–2036.CrossRef Fire, M., Goldschmidt, R., & Elovici, Y. (2014). Online social networks: Threats and solutions. IEEE Communications Surveys & Tutorials, 16(4), 2019–2036.CrossRef
Zurück zum Zitat Friedman, B., Kahn, P., & Borning, A. (2002). Value sensitive design: Theory and methods. University of Washington technical report (pp. 2–12). Friedman, B., Kahn, P., & Borning, A. (2002). Value sensitive design: Theory and methods. University of Washington technical report (pp. 2–12).
Zurück zum Zitat Friedman, B., & Kahn Jr, P. H. (2007). Human values, ethics, and design. In The human-computer interaction handbook (pp. 1267–1292). CRC Press. Friedman, B., & Kahn Jr, P. H. (2007). Human values, ethics, and design. In The human-computer interaction handbook (pp. 1267–1292). CRC Press.
Zurück zum Zitat Gao, H., Hu, J., Huang, T., Wang, J., & Chen, Y. (2011). Security issues in online social networks. IEEE Internet Computing, 15(4), 56–63.CrossRef Gao, H., Hu, J., Huang, T., Wang, J., & Chen, Y. (2011). Security issues in online social networks. IEEE Internet Computing, 15(4), 56–63.CrossRef
Zurück zum Zitat Geer, D. E. (2015). The right to be unobserved. IEEE Security & Privacy, 13(4). Geer, D. E. (2015). The right to be unobserved. IEEE Security & Privacy, 13(4).
Zurück zum Zitat Greenbaum, J. (1996, November). Back to labor: Returning to labor process discussions in the study of work. In Proceedings of the 1996 ACM conference on computer supported cooperative work (pp. 229–237). Greenbaum, J. (1996, November). Back to labor: Returning to labor process discussions in the study of work. In Proceedings of the 1996 ACM conference on computer supported cooperative work (pp. 229–237).
Zurück zum Zitat Grudin, J. (1988, January). Why CSCW applications fail: problems in the design and evaluation of organizational interfaces. In Proceedings of the 1988 ACM conference on Computer-supported cooperative work (pp. 85–93). Grudin, J. (1988, January). Why CSCW applications fail: problems in the design and evaluation of organizational interfaces. In Proceedings of the 1988 ACM conference on Computer-supported cooperative work (pp. 85–93).
Zurück zum Zitat Hart, H. L. A. (1961). The concept of law. Hart, H. L. A. (1961). The concept of law.
Zurück zum Zitat Hu, P. J., Chau, P. Y. K., Sheng, O. R. L., & Tam, K. Y. (1999). Examining the technology acceptance model using physician acceptance of telemedicine. Journal of Management Information Systems, 16, 91–112.CrossRef Hu, P. J., Chau, P. Y. K., Sheng, O. R. L., & Tam, K. Y. (1999). Examining the technology acceptance model using physician acceptance of telemedicine. Journal of Management Information Systems, 16, 91–112.CrossRef
Zurück zum Zitat Hu, H., Ahn, G., Zhao, Z., & Yang, D. (2014). Game theoretic analysis of multiparty access control in online social networks. In Proceedings of the 19th ACM symposium on Access control models and technologies (SACMAT '14) (pp. 93–102). ACM, New York, NY, USA. https://doi.org/10.1145/2613087.2613097 Hu, H., Ahn, G., Zhao, Z., & Yang, D. (2014). Game theoretic analysis of multiparty access control in online social networks. In Proceedings of the 19th ACM symposium on Access control models and technologies (SACMAT '14) (pp. 93–102). ACM, New York, NY, USA. https://​doi.​org/​10.​1145/​2613087.​2613097
Zurück zum Zitat Ilia, P., Carminati, B., Ferrari, E., Fragopoulou, P., & Ioannidis, S. (2017). SAMPAC: Socially-aware collaborative multi-party access control. In Proceedings of the seventh ACM on conference on data and application security and privacy (CODASPY '17) (pp. 71–82). ACM, New York, NY, USA. https://doi.org/10.1145/3029806.3029834. Ilia, P., Carminati, B., Ferrari, E., Fragopoulou, P., & Ioannidis, S. (2017). SAMPAC: Socially-aware collaborative multi-party access control. In Proceedings of the seventh ACM on conference on data and application security and privacy (CODASPY '17) (pp. 71–82). ACM, New York, NY, USA. https://​doi.​org/​10.​1145/​3029806.​3029834.
Zurück zum Zitat Jin, L., Chen, Y., Wang, T., Hui, P., & Vasilakos, A. V. (2013). Understanding user behavior in online social networks: A survey. IEEE Communications Magazine, 51(9), 144–150.CrossRef Jin, L., Chen, Y., Wang, T., Hui, P., & Vasilakos, A. V. (2013). Understanding user behavior in online social networks: A survey. IEEE Communications Magazine, 51(9), 144–150.CrossRef
Zurück zum Zitat Johnson, D. G. (1985). Computer ethics. Prentice-Hall Inc. Johnson, D. G. (1985). Computer ethics. Prentice-Hall Inc.
Zurück zum Zitat Kelsen, H. (1949). General theory of law and state. Harvard University Press. Kelsen, H. (1949). General theory of law and state. Harvard University Press.
Zurück zum Zitat Kim, M., Song, C., Kim, H., Park, D., Kwon, Y., Namkung, E., & Carlsson, M. (2019, September). Scam detection assistant: Automated protection from scammers. In 2019 first international conference on societal automation (SA) (pp. 1–8). IEEE. Kim, M., Song, C., Kim, H., Park, D., Kwon, Y., Namkung, E., & Carlsson, M. (2019, September). Scam detection assistant: Automated protection from scammers. In 2019 first international conference on societal automation (SA) (pp. 1–8). IEEE.
Zurück zum Zitat Kling, R. (1980). Social analyses of computing: Theoretical perspectives in recent empirical research. ACM Computing Surveys (CSUR), 12(1), 61–110.CrossRef Kling, R. (1980). Social analyses of computing: Theoretical perspectives in recent empirical research. ACM Computing Surveys (CSUR), 12(1), 61–110.CrossRef
Zurück zum Zitat Korpela, M., Soriyan, H. A., Olufokunbi, K. C., Onayade, A. A., Davies-Adetugbo, A., & Adesanmi, D. (1998). Community participation in health informatics in Africa: An experiment in tripartite partnership in Ile-Ife, Nigeria. Computer Supported Cooperative Work (CSCW), 7(3), 339–358.CrossRef Korpela, M., Soriyan, H. A., Olufokunbi, K. C., Onayade, A. A., Davies-Adetugbo, A., & Adesanmi, D. (1998). Community participation in health informatics in Africa: An experiment in tripartite partnership in Ile-Ife, Nigeria. Computer Supported Cooperative Work (CSCW), 7(3), 339–358.CrossRef
Zurück zum Zitat Lee, B., Riche, N., Karlson, A., Carpendale, S., SparkClouds. (2010). Visualizing trends in tag clouds. IEEE Transactions on Visualization and Computer Graphics, 16(6), 1182–1189.CrossRef Lee, B., Riche, N., Karlson, A., Carpendale, S., SparkClouds. (2010). Visualizing trends in tag clouds. IEEE Transactions on Visualization and Computer Graphics, 16(6), 1182–1189.CrossRef
Zurück zum Zitat Lessig, L. (2006). Code: And other laws of cyberspace, Version 2.0. Basic Books. Lessig, L. (2006). Code: And other laws of cyberspace, Version 2.0. Basic Books.
Zurück zum Zitat Lessig, L. (2012). Against perpetual copyright. The Lessig Wiki. Lessig, L. (2012). Against perpetual copyright. The Lessig Wiki.
Zurück zum Zitat Littleton, A. C. (1966). Accounting evolution to 1900, 2nd edition, Russell and Russell. Littleton, A. C. (1966). Accounting evolution to 1900, 2nd edition, Russell and Russell.
Zurück zum Zitat Locke, J. (1963). An essay concerning the true original extent and end of civil government: Second of Two Treatises on Government‖ (1690). In J. Somerville & R. E. Santoni (Eds.), Social and political philosophy (pp. 169–204). Anchor. Locke, J. (1963). An essay concerning the true original extent and end of civil government: Second of Two Treatises on Government‖ (1690). In J. Somerville & R. E. Santoni (Eds.), Social and political philosophy (pp. 169–204). Anchor.
Zurück zum Zitat Mead, G. H. (1934). 1934. University of Chicago Press. Mead, G. H. (1934). 1934. University of Chicago Press.
Zurück zum Zitat Mehnaz, S., & Bertino, E. (2019). A fine-grained approach for anomaly detection in file system accesses with enhanced temporal user profiles. IEEE Transactions on Dependable and Secure Computing. Mehnaz, S., & Bertino, E. (2019). A fine-grained approach for anomaly detection in file system accesses with enhanced temporal user profiles. IEEE Transactions on Dependable and Secure Computing.
Zurück zum Zitat Mislove, A., Viswanath, B., Gummadi, K. P., & Druschel, P. (2010). You are who you know: inferring user profiles in online social networks. In: Proceedings of the third ACM international conference on web search and data mining (pp. 251–260). Mislove, A., Viswanath, B., Gummadi, K. P., & Druschel, P. (2010). You are who you know: inferring user profiles in online social networks. In: Proceedings of the third ACM international conference on web search and data mining (pp. 251–260).
Zurück zum Zitat Muhammad, T., & Ahmad, A. (2021). A joint sharing approach for online privacy preservation, World Wide Web, (accepted). Muhammad, T., & Ahmad, A. (2021). A joint sharing approach for online privacy preservation, World Wide Web, (accepted).
Zurück zum Zitat Muller, M. J., & Kuhn, S. (1993). Participatory design. Communications of the ACM, 36(6), 24–28.CrossRef Muller, M. J., & Kuhn, S. (1993). Participatory design. Communications of the ACM, 36(6), 24–28.CrossRef
Zurück zum Zitat Muller, M. J. (1997). Ethnocritical heuristics for reflecting on work with users and other interested parties. In Computers and design in context (pp. 349–380). Muller, M. J. (1997). Ethnocritical heuristics for reflecting on work with users and other interested parties. In Computers and design in context (pp. 349–380).
Zurück zum Zitat Musiani, F., Cogburn, D. L., DeNardis, L., & Levinson, N. S. (2015). The turn to infrastructure in internet governance. Palgrave Macmillan US. Musiani, F., Cogburn, D. L., DeNardis, L., & Levinson, N. S. (2015). The turn to infrastructure in internet governance. Palgrave Macmillan US.
Zurück zum Zitat Novak, E. & Li, Q. (2012). A survey of security and privacy in online social networks (pp. 1–32), College of William and Mary Computer Science. Technical Report. Novak, E. & Li, Q. (2012). A survey of security and privacy in online social networks (pp. 1–32), College of William and Mary Computer Science. Technical Report.
Zurück zum Zitat Porra, J., & Hirscheim, R. (2007). A lifetime of theory and action on the ethical use of computers. JAIS, 8(9), 467–478.CrossRef Porra, J., & Hirscheim, R. (2007). A lifetime of theory and action on the ethical use of computers. JAIS, 8(9), 467–478.CrossRef
Zurück zum Zitat Ridley, M. (2010). The rational optimist: How prosperity evolves. Harper. Ridley, M. (2010). The rational optimist: How prosperity evolves. Harper.
Zurück zum Zitat Rokeach, M. (1973). The nature of human values. The Free Press. Rokeach, M. (1973). The nature of human values. The Free Press.
Zurück zum Zitat Schwartz, S. H. (1994). Are there universal aspects in the structure and contents of human values? Journal of Social Issues, 50(4), 19–45.CrossRef Schwartz, S. H. (1994). Are there universal aspects in the structure and contents of human values? Journal of Social Issues, 50(4), 19–45.CrossRef
Zurück zum Zitat Schwartz, S. H. (1999). A theory of cultural values and some implications for work. Applied Psychology, 48(1), 23–47.CrossRef Schwartz, S. H. (1999). A theory of cultural values and some implications for work. Applied Psychology, 48(1), 23–47.CrossRef
Zurück zum Zitat Schwartz, S. H., & Bilsky, W. (1987). Toward a universal psychological structure of human values. Journal of Personality and Social Psychology, 53(3), 550.CrossRef Schwartz, S. H., & Bilsky, W. (1987). Toward a universal psychological structure of human values. Journal of Personality and Social Psychology, 53(3), 550.CrossRef
Zurück zum Zitat Sepuldeva, M., Van Banning, T., & van Genugten, W. J. M. (2004). Human rights reference handbook. University for Peace. Sepuldeva, M., Van Banning, T., & van Genugten, W. J. M. (2004). Human rights reference handbook. University for Peace.
Zurück zum Zitat Shah, H. (2011). Accountability: Has it been hollowed out in the modern state? Journal of Political Studies, 18(1), 77–91. Shah, H. (2011). Accountability: Has it been hollowed out in the modern state? Journal of Political Studies, 18(1), 77–91.
Zurück zum Zitat Sidorowicz, R. (2002). Back to the beginning—Core values. Refresher Publications Inc. Sidorowicz, R. (2002). Back to the beginning—Core values. Refresher Publications Inc.
Zurück zum Zitat Suchman, L. (1997). Do categories have politics? The language/action perspective reconsidered. In Human values and the design of computer technology (pp. 91–106). Suchman, L. (1997). Do categories have politics? The language/action perspective reconsidered. In Human values and the design of computer technology (pp. 91–106).
Zurück zum Zitat Suntaxi-Oña, G., & Varadharajan, V. (2015). A comparative analysis of the social graph model and multiparty access control model for online social networks. International Journal of Future Computer and Communication, Vol. 4, No. 5. Suntaxi-Oña, G., & Varadharajan, V. (2015). A comparative analysis of the social graph model and multiparty access control model for online social networks. International Journal of Future Computer and Communication, Vol. 4, No. 5.
Zurück zum Zitat Timberg, C., & Dwoskin, E. (2020). Silicon Valley is getting tougher on Trump and his supporters over hate speech and disinformation. The Washington Post. Retrieved February 2, 2021. Timberg, C., & Dwoskin, E. (2020). Silicon Valley is getting tougher on Trump and his supporters over hate speech and disinformation. The Washington Post. Retrieved February 2, 2021.
Zurück zum Zitat Turilli, M., & Floridi, L. (2009). The ethics of information transparency. Ethics and Information Technology, 11(2). Turilli, M., & Floridi, L. (2009). The ethics of information transparency. Ethics and Information Technology, 11(2).
Zurück zum Zitat Vasak, K. (1977). Human rights: A thirty-year struggle: The sustained efforts to give force of law to the Universal Declaration of Human Rights. UNESCO Courier, 30, 29–32. Vasak, K. (1977). Human rights: A thirty-year struggle: The sustained efforts to give force of law to the Universal Declaration of Human Rights. UNESCO Courier, 30, 29–32.
Zurück zum Zitat Voloch, N., Nissim, P., Elmakies, M., & Gudes, E. (2019, July). A role and trust access control model for preserving privacy and image anonymization in social networks. In IFIP international conference on trust management (pp. 19–27). Springer. Voloch, N., Nissim, P., Elmakies, M., & Gudes, E. (2019, July). A role and trust access control model for preserving privacy and image anonymization in social networks. In IFIP international conference on trust management (pp. 19–27). Springer.
Zurück zum Zitat Wentworth, D. (2002). Mickey rattles the bars: The supreme court hearing of Eldred v. Ashcroft, Berkman Center for Internet & Society, Harvard. Wentworth, D. (2002). Mickey rattles the bars: The supreme court hearing of Eldred v. Ashcroft, Berkman Center for Internet & Society, Harvard.
Zurück zum Zitat Whitworth, B., & De Moor, A. (Eds.). (2009). Handbook of Research on Socio-Technical Design and Social Networking Systems. Hershey, PA: IGI.” ISBN: 978-1-60566-264-0. Whitworth, B., & De Moor, A. (Eds.). (2009). Handbook of Research on Socio-Technical Design and Social Networking Systems. Hershey, PA: IGI.” ISBN: 978-1-60566-264-0.
Zurück zum Zitat Whitworth, B., & Ahmad, A. (2014). The social design of technical systems: Building technologies for communities. Interaction Design Foundation. Whitworth, B., & Ahmad, A. (2014). The social design of technical systems: Building technologies for communities. Interaction Design Foundation.
Zurück zum Zitat Young, H. P. (2015). The evolution of social norms. Economics, 7(1), 359–387. Young, H. P. (2015). The evolution of social norms. Economics, 7(1), 359–387.
Zurück zum Zitat Zeebaree, S., Ameen, S., & Sadeeq, M. (2020). Social media networks security threats, risks and recommendation: A case study in the kurdistan region. International Journal of Innovation, Creativity and Change, 13, 349–365. Zeebaree, S., Ameen, S., & Sadeeq, M. (2020). Social media networks security threats, risks and recommendation: A case study in the kurdistan region. International Journal of Innovation, Creativity and Change, 13, 349–365.
Zurück zum Zitat Zhang, J., Gu, Z., Jang, J., Wu, H., Stoecklin, M. P., Huang, H., & Molloy, I. (2018, May). Protecting intellectual property of deep neural networks with watermarking. In Proceedings of the 2018 on Asia conference on computer and communications security (pp. 159–172). Zhang, J., Gu, Z., Jang, J., Wu, H., Stoecklin, M. P., Huang, H., & Molloy, I. (2018, May). Protecting intellectual property of deep neural networks with watermarking. In Proceedings of the 2018 on Asia conference on computer and communications security (pp. 159–172).
Zurück zum Zitat Ziccardi, G. (2019). The right to data oblivion. DATA POLITICS (p. 231). Ziccardi, G. (2019). The right to data oblivion. DATA POLITICS (p. 231).
Metadaten
Titel
A framework for the application of socio-technical design methodology
verfasst von
Adnan Ahmad
Brian Whitworth
Elisa Bertino
Publikationsdatum
01.12.2022
Verlag
Springer Netherlands
Erschienen in
Ethics and Information Technology / Ausgabe 4/2022
Print ISSN: 1388-1957
Elektronische ISSN: 1572-8439
DOI
https://doi.org/10.1007/s10676-022-09651-0

Weitere Artikel der Ausgabe 4/2022

Ethics and Information Technology 4/2022 Zur Ausgabe

Premium Partner