skip to main content
10.1145/332186.332303acmconferencesArticle/Chapter ViewAbstractPublication PagescfpConference Proceedingsconference-collections
Article
Free Access

When social meets technical (student paper panel): ethics and the design of “social” technologies

Authors Info & Claims
Published:01 April 2000Publication History
First page image

References

  1. 1.For example, look at the FreedomTM system being developed by Zero-Knowledge Systems or the Platform for Privacy Preferences Project (P3PTM) being developed by the World Wide Web Consortium.Google ScholarGoogle Scholar
  2. 2.See the CFP2000 "Call for Participation" at: http://www.cfp2000.org/workshop/.Google ScholarGoogle Scholar
  3. 3.The 1995 Equifax-Harris mid-decade consumer privacy survey, online at: http://www.equifax.com/ consurner/parchive/svry95/survy95a.html.Google ScholarGoogle Scholar
  4. 4."The World According to Andy Grove," Business Week: The Information Revolution (1994 Special Issue), pp. 76-8.Google ScholarGoogle Scholar
  5. 5.Langdon Winner, Autonomous technology: Technics out-of-control as a theme in political thought (MIT Press, 1977).Google ScholarGoogle Scholar
  6. 6.Langdon Winner, "How technomania is overtaking the millennium," Newsday, November 23, 1997, p. B6.Google ScholarGoogle Scholar
  7. 7.New York Times Magazine editorial, "Technology makes us better," September 28, 1997, p. 45; Alvin Toffier, Powershifi: Knowledge, wealth, and violence at the edge of the 21st Century (Bantam Books, 1991).Google ScholarGoogle Scholar
  8. 8.Ann Marsh, "No place to hide," Forbes, September 22, 1997, pp. 226-34.Google ScholarGoogle Scholar
  9. 9.Taylor and Jerome, "We know where you live," PC Computing, October 1997, p. 91 (emphasis added).Google ScholarGoogle Scholar
  10. 10.To give just a sample of the work that has been done in this field, see Wiebe Bijker et al. (eds.), The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology (MIT Press, 1987); Ruth Schwarz Cowan, More Work for Mother: The Ironies of Household Technology from the Open Hearth to the Microwave (Basic Books, 1983); Batya Friedman (ed.), Human Values and the Design of Computer Technology (Cambridge University Press, 1997); Donald MacKenzie, Inventing Accuracy: A Historical Sociology of Nuclear Missile Guidance (MIT Press, 1990).Google ScholarGoogle Scholar
  11. 11.Trevor Pinch and Wiebe Bijker, "The Social Construction of Facts and Artifacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other," in The Social Construction of Technological Systems, Bijker et al. (eds.), pp. 17-50.Google ScholarGoogle Scholar
  12. 12.For more information see Chris Hibbert, "Some Frequently Asked Questions on SSNs," online at: http://www.cpsr.org/cpsr/privacy/ssn/ssn.faq.htmlGoogle ScholarGoogle Scholar
  13. 13.General background on the Highway 407 story can be found at: http://www.407etr.com/stor_/.Google ScholarGoogle Scholar
  14. 14.See "407 Express Toll Route: How You Can Travel This Road Anonymously" at: http:// www.ipc.on.ca/web_site.eng/matters/sum_pap/PAPERS/407.htmGoogle ScholarGoogle Scholar
  15. 15.1 found only one newspaper article during the entire 407 construction period that reported on these privacy issues. See Mary Gooderham, "Privacy at risk in toll systems, drivers told," The Globe and Mail, March 18, 1995, p. A4.Google ScholarGoogle Scholar
  16. 16.See, for example, "Privacy-Enhancing Technologies: The Path to Anonymity," a joint report of the Information and Privacy Commissioner of Ontario and the Registratiekamer of The Netherlands (1995). The irony is that the findings of this report, which Ontario's IPC helped produce, were never fully applied to the Highway 407 case.Google ScholarGoogle Scholar
  17. 17.See, for example, Brian Bloomfield and Theo Vurdubakis, "Boundary disputes: Negotiating the boundary between the technical and the social in the development of IT systems," Information Technology & People, 7(1): 9-24 (1997).Google ScholarGoogle ScholarCross RefCross Ref
  18. 18.1 use the term "ethicists" here as shorthand for anyone with social and ethical concerns relevant to the design of technology, including philosophers, scientists, religious leaders, social critics, and "ordinary citizens."Google ScholarGoogle Scholar
  19. 19.Douglas Schuler and Aki Namioka (eds.), Participatory design: Principles and practices, (Lawrence Erlbaum Associates, 1993), p. xi. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.See Karen Coyle's FAQ, "Some Frequently Asked Questions About Data Privacy and P3P," online at: http://www.cpsr.org/program/privacy/p3p-faq.html.Google ScholarGoogle Scholar

Index Terms

  1. When social meets technical (student paper panel): ethics and the design of “social” technologies

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CFP '00: Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
            April 2000
            351 pages
            ISBN:1581132565
            DOI:10.1145/332186

            Copyright © 2000 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 April 2000

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article
          • Article Metrics

            • Downloads (Last 12 months)9
            • Downloads (Last 6 weeks)2

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader