skip to main content
10.1145/1316624.1316668acmconferencesArticle/Chapter ViewAbstractPublication PagesgroupConference Proceedingsconference-collections
research-article

Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system

Published:04 November 2007Publication History

ABSTRACT

We report on the value sensitive design, development, and appropriation of a groupware system to support software engineering knowledge sharing. Usage data (5,965 visitors) and semi-structured interviews (18 individuals) suggest the methods employed were successful in addressing value tensions, particularly with respect to privacy, awareness, and reputation. Key contributions include: (1) "proof-of-concept" that established Value Sensitive Design principles and methods can be used to good effect for the design of groupware in an industry setting, (2) a new design method for addressing value tensions, Value Dams and Flows, and (3) demonstration of the co-evolution of technology and organizational policy.

References

  1. Bellotti, V. and Sellen, A. Design for privacy in ubiquitous computing environments. In Proc. of ECSCW (Milan, Italy, Sept. 13--17, 1993). Kluwer Academic Publishers, Dordrecht, The Netherlands, 1993, 77--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Boyle, M., Edwards, C., and Greenberg, S. The effects of filtered video on awareness privacy. In Proc. of the 2000 ACM Conf. on CSCW (Philadelphia, PA, USA, Dec. 2--6, 2000). ACM, N.Y., N.Y., 2000, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Flanagan, M., Howe, D. C., and Nissenbaum, H. Values at play: design tradeoffs in socially oriented game design. In Proc. of CHI (Portland, OR, USA, April 2--7, 2005). ACM, N.Y., N.Y., 2005, 751--760. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Friedman, B., Kahn, P. H., Jr., and Borning, A. Value Sensitive Design and information systems. In Human-Computer Interaction and Management Information Systems: Foundations. M.E. Sharpe, Armonk, N.Y., 2006, 348--372.Google ScholarGoogle Scholar
  5. Friedman, B., Lin, P., and Miller, J. K. Informed consent by design. In Security and Usability: Designing Secure Systems That People Can Use. O'Reilly, Cambridge, 2005, 495--521.Google ScholarGoogle Scholar
  6. Friedman, B. and Nissenbaum, H. Bias in computer systems. ACM Trans. on Inf. Syst., 14, 3 (July 1996), 330--347. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Friedman, B., Smith, I. E., Kahn, P. H., Jr., Consolvo, S., and Selawski, J. Development of a privacy addendum for open source licenses: Value Sensitive Design in industry. In Proc. of UbiComp 2006 (Orange County, CA, USA, Sept. 17--21, 2006). Springer-Verlag, Berlin, 2006, 194--211. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gaw, S., Felten, E. W., and Fernandez-Kelly, P. Secrecy, flagging, and paranoia: adoption criteria in encrypted e-mail. In Proc. of CHI (Montréal, Québec, Canada, Apr. 22--27, 2006). ACM, N.Y., N.Y., 2006, 591--600. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Greenbaum, J. M. and Kyng, M. Design at Work: Cooperative Design of Computer Systems. Lawrence Erlbaum Associates, Hillsdale, N.J., 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Grønbæk, K., Grudin, J., Bødker, S., and Bannon, L. Achieving cooperative system design: shifting from a product to a process focus. In Participatory Design: Principles and Practices. Lawrence Erlbaum Associates, Mahwah, N.J., 1993, 79--96.Google ScholarGoogle Scholar
  11. Grudin, J. Groupware and social dynamics: eight challenges for developers. Comm. of ACM, 37, 1 (January 1994), 92--105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jancke, G., Venolia, G. D., Grudin, J., Cadiz, J., and Gupta, A. Linking public spaces: technical and social issues. In Proc. of CHI (Seattle, WA, USA, Mar. 31--Apr. 5, 2001). ACM, N.Y., N.Y, 2001, 530--537. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Nissenbaum, H. Will security enhance trust online, or supplant it?. In Trust and Distrust Within Organizations. Russell Sage Foundation, N.Y., N.Y., 2004, 155--188.Google ScholarGoogle Scholar
  14. Orlikowski, W. J. Learning from Notes: Organizational Issues in Groupware Implementation. In Proc. of the 1992 ACM Conf. on CSCW (Toronto, Canada, Oct. 3--Nov. 4, 1992). N.Y., N.Y.: ACM, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Palen, L. Social, individual, and technological issues for groupware calendar systems. In Proc. of CHI (Pittsburgh, PA, USA, May 15--20, 1999). ACM, N.Y., N.Y., 1999, 17--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Palen, L. and Dourish, P. Unpacking "privacy" for a networked world. In Proc. of CHI (Ft. Lauderdale, FL, USA, Apr. 5--10, 2003). ACM, N.Y., N.Y., 2003, 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Preece, J. and Maloney-Krichmar, D. Online Communities: Focusing on Sociability and Usability. Lawrence Erlbaum Associates, Mahwah, N.J., 2003.Google ScholarGoogle Scholar
  18. Van House, N. A., Butler, M. H., and Schiff, L. R. Cooperative knowledge work and practices of trust: sharing environmental planning data sets. In Proc. of the 1998 ACM Conf. on CSCW (Seattle, WA, USA, Nov. 14--18, 1998). ACM, N.Y., N.Y., 1998, 335--343. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Zheng, J., Veinott, E., Bos, N., Olson, J. S., and Olson, G. M. Trust without touch: jumpstarting long-distance trust with initial social activities. In Proc. of CHI (Minneapolis, MN, USA, April 20--25, 2002). ACM, N.Y., N.Y., 2002, 141--146. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          GROUP '07: Proceedings of the 2007 ACM International Conference on Supporting Group Work
          November 2007
          422 pages
          ISBN:9781595938459
          DOI:10.1145/1316624

          Copyright © 2007 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 November 2007

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate125of405submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader