LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:

OpenAIRE is about to release its new face with lots of new content and services.
During September, you may notice downtime in services, while some functionalities (e.g. user registration, login, validation, claiming) will be temporarily disabled.
We apologize for the inconvenience, please stay tuned!
For further information please contact helpdesk[at]openaire.eu

fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Watson, Patrick; Duquenoy, Penny; Brennan, Margaret; Jones, Matt; Walkerdine, James (2009)
Publisher: ACM
Languages: English
Types: Part of book or chapter of book
Subjects:
In the public sector (particularly in the UK in light of\ud recent reforms i.e. the Local Government Act 2000, etc.)\ud a greater degree of accountability and public involvement\ud or intervention has become the norm in public\ud infrastructure projects, partially under the rubric of\ud “stakeholder engagement”. This paper seeks to discuss\ud public involvement in a law-enforcement technology\ud (Isis), which operates on a covert basis in the detection\ud and prevention of child abuse activities across a number\ud of social networking facilities. Our contribution to the\ud development of Isis is to perform an ethics centered\ud consultation process with stakeholders who will\ud contribute to the design and deployment of the end\ud software package. To that end, we have sought to\ud develop a “Modified Participatory Design” approach,\ud utilizing the knowledge gained from the HCI community\ud with regards to more traditional design projects and\ud adapting this body of work to questions of ethics, privacy,\ud corporate and civic responsibility, monitoring and\ud awareness issues, etc. in an effort to create a fluid and\ud agile communication process between stakeholders and\ud designers, thus taking account of the ethical issues around\ud Isis as design occurs.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Anderson, R.E. Social impacts of computing: Codes of professional ethics. Social Science Computing Review 10, 2 (1992), 453-469.
    • Behn, R. Why Measure Performance? Different Purposes Require Different Measures. Public Administration Review (2003), vol. 63, no. 5, 586-606
    • Druin, A. The Role of Children in the Design of New Technology. Behaviour and Information Technology (2002), vol. 21, no. 1, 1-25.
    • Dunleavy, P. And Hood, C. From Old Public Administration to New Public Management. Public Money and Management (1994), July - September, 9- 18
    • Flynn, N. and Talbot, C. Strategy and Strategists in UK Local Government. Journal of Management Development (1996) vol. 15 no. 2, 24-37
    • Freeman, R. Strategic Management: A Stakeholder Approach (1984) Boston, Pitman
    • Friedman, B. Value-Sensitive (1996), vol. 3, no. 6, 16-23.
    • Gillatt, S. Fenwick, J. and Alford, D. Public Services and the Consumer: Empowerment or Control? Social Policy and Administration. (2000) vol. 34 no. 3, 333-349
    • policing‟, Police Practice & Research 8, 1
    • Hughes, D., Walkerdine, J., Coulson, G., Gibson, S. Is Deviant Behaviour the Norm on P2P File-Sharing Networks? In IEEE Distributed Systems Online , vol. 7, no. 2, February 2006.
    • Jones, M., Harwood, W., Bainbridge, D., Buchanan, G., Frohlich, D., Rachovides, D., Frank, M., and Lalmas, M. "Narrowcast yourself": designing for community storytelling in a rural Indian context. In Proceedings of the 7th ACM Conference on Designing interactive Systems (Cape Town, South Africa, February 25 - 27, 2008). DIS '08. ACM, New York, NY, 369-378.
    • Lager, F. Ben and Jerry‟s: The Inside Scoop (1994) New York, Crown Publishers
    • McManus, J. Managing Stakeholders in Development Projects. (2004) Oxford, Elsevier
    • Muller, M. J. and Kuhn, S. Participatory Design. Commun. ACM (1993) vol. 36 no. 6, 24-28
    • Mitchell, R. Agle, B. and Wood, D. Towards a Theory of Stakeholder Identification and Salience: Defining the Principle of Who and What Really Counts. Academy of Management Review (1997) vol. 22 no. 4 853-866
    • Rayson, P., Leech, G., and Hodges, M. Social differentiation in the use of English vocabulary: some analyses of the conversational component of the British National Corpus. International Journal of Corpus Linguistics. (1997). Volume 2, number 1. pp 133 - 152.
    • Rayson, P. From key words to key semantic domains. International Journal of Corpus Linguistics, (2008). vol. 13 no. 4, pp. 519-549.
    • Taylor, M and Quayle, E. The Internet and Abuse Images of Children: Search, Pre-criminal Situations and Opportunity. Situational Prevention of Child Sexual Abuse, R. Wortley, S. Smallbone (eds.), Criminal Justice Press, 2006. pp. 169-195
  • No related research data.
  • No similar publications.

Share - Bookmark

Funded by projects

Cite this article

Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
More information Ok