Value sensitive design
Value sensitive design (VSD) is a theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner. VSD originated within the field of information systems design and human-computer interaction to address design issues within the fields by emphasizing the ethical values of direct and indirect stakeholders. It was developed by Batya Friedman and Peter Kahn at the University of Washington starting in the late 1980s and early 1990s. Later, in 2019, Batya Friedman and David G. Hendry wrote a book on this topic called "Value Sensitive Design: Shaping Technology with Moral Imagination". Value Sensitive Design takes human values into account in a well-defined matter throughout the whole process. Designs are developed using an investigation consisting of three phases: conceptual, empirical and technological. These investigations are intended to be iterative, allowing the designer to modify the design continuously.
The VSD approach is often described as an approach that is fundamentally predicated its ability to be modified depending on the technology, value(s), or context of use. Some examples of modified VSD approaches are Privacy by Design which is concerned with respecting the privacy of personally identifiable information in systems and processes. Care-Centered Value Sensitive Design (CCVSD) proposed by Aimee van Wynsberghe is another example of how the VSD approach is modified to account for the values central to care for the design and development of care robots.
VSD uses an iterative design process that involves three types of investigations: conceptual, empirical and technical. Conceptual investigations aim at understanding and articulating the various stakeholders of the technology, as well as their values and any values conflicts that might arise for these stakeholders through the use of the technology. Empirical investigations are qualitative or quantitative design research studies used to inform the designers' understanding of the users' values, needs, and practices. Technical investigations can involve either analysis of how people use related technologies, or the design of systems to support values identified in the conceptual and empirical investigations. Friedman and Hendry account seventeen methods, including their main purpose, an overview of its function as well as key references:
- Stakeholder Analysis (Purpose: Stakeholder identification and legitimation): Identification of individuals, groups, organizations, institutions, and societies that might reasonably be affected by the technology under investigation and in what ways. Two overarching stakeholder categories: (1) those who interact directly with the technology, direct stakeholders; and (2) those indirectly affected by the technology, indirect stakeholders.
- Stakeholder Tokens (Purpose: Stakeholder identification and interaction): Playful and versatile toolkit for identifying stakeholders and their interactions. Stakeholder tokens facilitate identifying stakeholders, distinguishing core from peripheral stakeholders, surfacing excluded stakeholders, and articulating relationships among stakeholders.
- Value Source Analysis (Purpose: Identify value sources): Distinguish among the explicitly supported project values, designers’ personal values, and values held by other direct and indirect stakeholders.
- Co-evolution of Technology and Social Structure (Purpose: Expand design space): Expanding the design space to include social structures integrated with technology may yield new solutions not possible when considering the technology alone. As appropriate, engage with the design of both technology and social structure as part of the solution space. Social structures may include policy, law, regulations, organizational practices, social norms, and others.
- Value Scenario (Purpose: Values representation and elicitation): Narratives, comprising stories of use, intended to surface human and technical aspects of technology and context. Value scenarios emphasize implications for direct and indirect stakeholders, related key values, widespread use, indirect impacts, longer-term use, and similar systemic effects.
- Value Sketch (Purpose: Values representation and elicitation): Sketching activities as a way to tap into stakeholders’ non-verbal understandings, views, and values about a technology.
- Value-oriented Semi-structured Interview (Purpose: Values elicitation): Semi-structured interview questions as a way to tap into stakeholders’ understandings, views and values about a technology. Questions typically emphasize stakeholders’ evaluative judgments (e.g., all right or not all right) about a technology as well as rationale (e.g., why?). Additional considerations introduced by the stakeholder are pursued.
- Scalable Information Dimensions (Purpose: Values elicitation): Sets of questions constructed to tease apart the impact of pervasiveness, proximity, granularity of information, and other scalable dimensions. Can be used in interview or survey formats.
- Value-oriented Coding Manual (Purpose: Values analysis): Hierarchically structured categories for coding qualitative responses to the value representation and elicitation methods. Coding categories are generated from the data and a conceptualization of the domain. Each category contains a label, definition, and typically up to three sample responses from empirical data. Can be applied to oral, written, and visual responses.
- Value-oriented Mockup, Prototype or Field Deployment (Purpose: Values representation and elicitation): Development, analysis, and co-design of mockups, prototypes and field deployments to scaffold the investigation of value implications of technologies that are yet to be built or widely adopted. Mock-ups, prototypes or field deployments emphasize implications for direct and indirect stakeholders, value tensions, and technology situated in human contexts.
- Ethnographically Informed Inquiry regarding Values and Technology (Purpose: Values, technology and social structure framework and analysis): Framework and approach for data collection and analysis to uncover the complex relationships among values, technology and social structure as those relationships unfold. Typically involves indepth engagement in situated contexts over longer periods of time.
- Model for Informed Consent Online (Purpose: Design principles and values analysis): Model with corresponding design principles for considering informed consent in online contexts. The construct of informed encompasses disclosure and comprehension; that of consent encompasses voluntariness, competence, and agreement. Furthermore, implementations of informed consent.
- Value Dams and Flows (Purpose: Values analysis): Analytic method to reduce the solution space and resolve value tensions among design choices. First, design options that even a small percentage of stakeholders strongly object to are removed from the design space—the value dams. Then of the remaining design options, those that a good percentage of stakeholders find appealing are foregrounded in the design—the value flows. Can be applied to the design of both technology and social structures.
- Value Sensitive Action-Reflection Model (Purpose: Values representation and elicitation): Reflective process for introducing value sensitive prompts into a co-design activity. Prompts can be designer or stakeholder generated.
- Multi-lifespan timeline (Purpose: Priming longer-term and multi-generational design thinking): Priming activity for longer-term design thinking. Multi-lifespan timelines prompt individuals to situate themselves in a longer time frame relative to the present, with attention to both societal and technological change.
- Multi-lifespan co-design (Purpose: Longer-term design thinking and envisioning): Co-design activities and processes that emphasize longer-term anticipatory futures with implications for multiple and future generations.
- Envisioning Cards™ (Purpose: Versatile value sensitive design toolkit for industry, research, and educational practice): Versatile value sensitive envisioning toolkit. A set of 32 cards, the Envisioning Cards™ build on four criteria—stakeholders, time, values, and pervasiveness. Each card contains on one side a title and an evocative image related to the card theme; on the flip side, the envisioning criterion, card theme, and a focused design activity. Envisioning CardsTM can be used for ideation, co-design, heuristic critique, evaluation, and other purposes.
- Himma, Kenneth Einar; Tavani, Herman T., eds. (2008). The Handbook of Information and Computer Ethics (PDF). John Wiley & Sons Inc. ISBN 978-0-471-79959-7. Retrieved 8 July 2016.
- Friedman, Batya; Hendry, David G.; Borning, Alan (2017-11-21). "A Survey of Value Sensitive Design Methods". Foundations and Trends in Human–Computer Interaction. 11 (2): 63–125. doi:10.1561/1100000015. ISSN 1551-3955.
- Friedman, Batya; Kahn, Peter H.; Borning, Alan; Huldtgren, Alina (2013), Doorn, Neelke; Schuurbiers, Daan; van de Poel, Ibo; Gorman, Michael E. (eds.), "Value Sensitive Design and Information Systems", Early engagement and new technologies: Opening up the laboratory, Philosophy of Engineering and Technology, Springer Netherlands, pp. 55–95, doi:10.1007/978-94-007-7844-3_4, ISBN 9789400778443, S2CID 8176837
- Borning, Alan; Muller, Michael (2012). "Next Steps for Value Sensitive Design". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '12. New York, NY, USA: ACM: 1125–1134. doi:10.1145/2207676.2208560. ISBN 9781450310154.
- Friedman, Batya; Hendry, David G. (2019-05-03). Value Sensitive Design: Shaping Technology with Moral Imagination. MIT Press. ISBN 9780262351706.
- Friedman, Batya; Kahn, Peter H.; Jr (2002). "Value Sensitive Design: Theory and Methods". CiteSeerX 10.1.1.11.8020. Cite journal requires
- Philosophy, Engineering & Technology (18 May 2010). "Value Sensitive Design: Four Challenges". slideshare.net. Archived from the original on 7 March 2016. Retrieved 24 April 2018.
- Umbrello, Steven (2020-04-01). "Imaginative Value Sensitive Design: Using Moral Imagination Theory to Inform Responsible Technology Design". Science and Engineering Ethics. 26 (2): 575–595. doi:10.1007/s11948-019-00104-4. hdl:2318/1699361. ISSN 1471-5546. PMID 30972629. S2CID 108295110.
- van den Hoven, Jeroen (2007). Goujon, Philippe; Lavelle, Sylvian; Duquenoy, Penny; Kimppa, Kai; Laurent, Véronique (eds.). "ICT and Value Sensitive Design". The Information Society: Innovation, Legitimacy, Ethics and Democracy in Honor of Professor Jacques Berleur S.j. IFIP International Federation for Information Processing. Boston, MA: Springer US. 233: 67–72. doi:10.1007/978-0-387-72381-5_8. ISBN 978-0-387-72381-5.
- Longo, Francesco; Padovano, Antonio; Umbrello, Steven (January 2020). "Value-Oriented and Ethical Technology Engineering in Industry 5.0: A Human-Centric Perspective for the Design of the Factory of the Future". Applied Sciences. 10 (12): 4182. doi:10.3390/app10124182.
- Spiekermann, Sarah (July 2012). "The challenges of privacy by design". Communications of the ACM. 55 (7): 38–40. doi:10.1145/2209249.2209263. ISSN 0001-0782. S2CID 3023111.
- van Wynsberghe, Aimee (2013-06-01). "Designing Robots for Care: Care Centered Value-Sensitive Design". Science and Engineering Ethics. 19 (2): 407–433. doi:10.1007/s11948-011-9343-6. ISSN 1471-5546. PMC 3662860. PMID 22212357.
- Friedman, B., Kahn Jr, P. H., Borning, A., & Kahn, P. H. (2006). Value Sensitive Design and information systems. Human-Computer Interaction and Management Information Systems: Foundations. ME Sharpe, New York, 348–372.
- Friedman, Batya; Jr, Peter H. Kahn; Hagman, Jennifer; Severson, Rachel L.; Gill, Brian (2006-05-01). "The Watcher and the Watched: Social Judgments About Privacy in a Public Place". Human–Computer Interaction. 21 (2): 235–272. doi:10.1207/s15327051hci2102_3. ISSN 0737-0024. S2CID 54165089.
- Nathan, Lisa P.; Friedman, Batya; Klasnja, Predrag; Kane, Shaun K.; Miller, Jessica K. (2008-02-25). "Envisioning systemic effects on persons and society throughout interactive system design". Proceedings of the 7th ACM Conference on Designing Interactive Systems. DIS '08. Cape Town, South Africa: Association for Computing Machinery: 1–10. doi:10.1145/1394445.1394446. ISBN 978-1-60558-002-9. S2CID 2412766.
- Czeskis, Alexei; Dermendjieva, Ivayla; Yapit, Hussein; Borning, Alan; Friedman, Batya; Gill, Brian; Kohno, Tadayoshi (2010-07-14). "Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety". Proceedings of the Sixth Symposium on Usable Privacy and Security. SOUPS '10. Redmond, Washington, USA: Association for Computing Machinery: 1–15. doi:10.1145/1837110.1837130. ISBN 978-1-4503-0264-7. S2CID 13951473.
- Watkins, Kari Edison; Ferris, Brian; Malinovskiy, Yegor; Borning, Alan (2013-11-27). "Beyond Context-Sensitive Solutions: Using Value-Sensitive Design to Identify Needed Transit Information Tools". Urban Public Transportation Systems 2013. pp. 296–308. doi:10.1061/9780784413210.026. ISBN 9780784413210.
- Yoo, Daisy (2018-08-04). "Stakeholder Tokens: a constructive method for value sensitive design stakeholder analysis". Ethics and Information Technology. doi:10.1007/s10676-018-9474-4. ISSN 1572-8439. S2CID 52048390.
- Borning, Alan; Friedman, Batya; Davis, Janet; Lin, Peyina (2005). Gellersen, Hans; Schmidt, Kjeld; Beaudouin-Lafon, Michel; Mackay, Wendy (eds.). "Informing Public Deliberation: Value Sensitive Design of Indicators for a Large-Scale Urban Simulation". Ecscw 2005. Dordrecht: Springer Netherlands: 449–468. doi:10.1007/1-4020-4023-7_23. ISBN 978-1-4020-4023-8.
- Friedman, Batya; Smith, Ian; H. Kahn, Peter; Consolvo, Sunny; Selawski, Jaina (2006). Dourish, Paul; Friday, Adrian (eds.). "Development of a Privacy Addendum for Open Source Licenses: Value Sensitive Design in Industry". UbiComp 2006: Ubiquitous Computing. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. 4206: 194–211. doi:10.1007/11853565_12. ISBN 978-3-540-39635-2.
- Miller, Jessica K.; Friedman, Batya; Jancke, Gavin; Gill, Brian (2007-11-04). "Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system". Proceedings of the 2007 International ACM Conference on Supporting Group Work. GROUP '07. Sanibel Island, Florida, USA: Association for Computing Machinery: 281–290. doi:10.1145/1316624.1316668. ISBN 978-1-59593-845-9. S2CID 2633485.
- Friedman, Batya; Hurley, David; Howe, Daniel C.; Felten, Edward; Nissenbaum, Helen (2002-04-20). "Users' conceptions of web security: a comparative study". CHI '02 Extended Abstracts on Human Factors in Computing Systems. CHI EA '02. Minneapolis, Minnesota, USA: Association for Computing Machinery: 746–747. doi:10.1145/506443.506577. ISBN 978-1-58113-454-4. S2CID 27784060.
- Woelfer, Jill Palzkill; Iverson, Amy; Hendry, David G.; Friedman, Batya; Gill, Brian T. (2011-05-07). "Improving the safety of homeless young people with mobile phones: values, form and function". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '11. Vancouver, BC, Canada: Association for Computing Machinery: 1707–1716. doi:10.1145/1978942.1979191. ISBN 978-1-4503-0228-9. S2CID 41591259.
- Friedman, Batya (1997-08-01). "Social Judgments and technological innovation: Adolescents' understanding of property, privacy, and electronic information". Computers in Human Behavior. 13 (3): 327–351. doi:10.1016/S0747-5632(97)00013-7. ISSN 0747-5632.
- Freier, Nathan G. (2008-04-06). "Children attribute moral standing to a personified agent". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '08. Florence, Italy: Association for Computing Machinery: 343–352. doi:10.1145/1357054.1357113. ISBN 978-1-60558-011-1. S2CID 15580819.
- Munson, Sean A.; Avrahami, Daniel; Consolvo, Sunny; Fogarty, James; Friedman, Batya; Smith, Ian (2011-06-12). "Attitudes toward online availability of US public records". Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times. dg.o '11. College Park, Maryland, USA: Association for Computing Machinery: 2–9. doi:10.1145/2037556.2037558. ISBN 978-1-4503-0762-8. S2CID 10276344.
- Woelfer, Jill Palzkill; Hendry, David G. (2009). "Stabilizing homeless young people with information and place". Journal of the American Society for Information Science and Technology. 60 (11): 2300–2312. doi:10.1002/asi.21146. ISSN 1532-2890.
- Denning, Tamara; Borning, Alan; Friedman, Batya; Gill, Brian T.; Kohno, Tadayoshi; Maisel, William H. (2010-04-10). "Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '10. Atlanta, Georgia, USA: Association for Computing Machinery: 917–926. doi:10.1145/1753326.1753462. ISBN 978-1-60558-929-9. S2CID 16571765.
- Yoo, Daisy; Huldtgren, Alina; Woelfer, Jill Palzkill; Hendry, David G.; Friedman, Batya (2013-04-27). "A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '13. Paris, France: Association for Computing Machinery: 419–428. doi:10.1145/2470654.2470715. ISBN 978-1-4503-1899-0. S2CID 2603883.
- Nathan, Lisa P. (2012). "Sustainable information practice: An ethnographic investigation". Journal of the American Society for Information Science and Technology. 63 (11): 2254–2268. doi:10.1002/asi.22726. ISSN 1532-2890.
- Millett, Lynette I.; Friedman, Batya; Felten, Edward (2001-03-01). "Cookies and Web browser design: toward realizing informed consent online". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '01. Seattle, Washington, USA: Association for Computing Machinery: 46–52. doi:10.1145/365024.365034. ISBN 978-1-58113-327-1. S2CID 1596706.
- Yoo, Daisy; Derthick, Katie; Ghassemian, Shaghayegh; Hakizimana, Jean; Gill, Brian; Friedman, Batya (2016-05-07). "Multi-lifespan Design Thinking: Two Methods and a Case Study with the Rwandan Diaspora". Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. CHI '16. San Jose, California, USA: Association for Computing Machinery: 4423–4434. doi:10.1145/2858036.2858366. ISBN 978-1-4503-3362-7. S2CID 2148594.
- Kaptein, Maurits; Eckles, Dean; Davis, Janet (2011-09-01). "Envisioning persuasion profiles: challenges for public policy and ethical practice". Interactions. 18 (5): 66–69. doi:10.1145/2008176.2008191. ISSN 1072-5520. S2CID 11099713.
- Friedman, Batya; Hendry, David (2012-05-05). "The envisioning cards: a toolkit for catalyzing humanistic and technical imaginations". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '12. Austin, Texas, USA: Association for Computing Machinery: 1145–1148. doi:10.1145/2207676.2208562. ISBN 978-1-4503-1015-4. S2CID 24059203.