Values and Ethics in Human-Computer Interaction
An important public discussion is underway on the values and ethics of digital technologies as designers work to prevent misinformation campaigns, online harassment, exclusionary tools, and biased ...
- Research Article
- 10.5958/2278-4853.2021.01211.8
- Jan 1, 2021
- Asian Journal of Multidimensional Research
An important public discussion is underway on the values and ethics of digital technologies as designers work to prevent misinformation campaigns, online harassment, exclusionary tools, and biased algorithms. This monograph reviews 30 years of research on theories and methods for surfacing values and ethics in technology design. It maps the history of values research, beginning with critique of design from related disciplines and responses in Human-Computer Interaction (HCI) research. The review then explores ongoing controversies in values-oriented design, including disagreements around terms, expressions and indicators of values and ethics, and whose values to consider. Next, the monograph describes frameworks that attempt to move values-oriented design into everyday design settings. These frameworks suggest open challenges and opportunities for the next 30 years of values in HCI research.
- Research Article
- 10.15410/aijm/2018/v7i2/128549
- Jul 1, 2018
- ANVESHAK-International Journal of Management
Technology continues to grow rapidly and is therefore changing our ways of functioning in society. Recent advancements of Communication Technology, while providing us with conveniences, also expose us to interactions that put our safety and emotional well-being at risk. This article examines one of the harmful effects of technology, cyber bullying, which is a new form of harassment with distinct differences in structure, content and impact. A review of concerned literature shows that cyber bullying is becoming a serious problem in India and most of the people do not take any step when they are cyber bullied. Very few share their issues with their colleagues and/or family members or legal enforcement agencies. Another interesting finding was that cyber bullying and victimization are closely related. This finding call for a systematic understanding of cyber bullying that requires us to scrutinize the social and virtual relationships which are prone to cyber bullying. Cyber bullying has become a major social concern because it raises questions about techno ethics. The present paper is based on an exploration of the perception, experiences and the Psycho-social impact of victimization from cyber bullying among the Entry Level Employees of the Hotel Industry in Kolkata. The exploratory investigation is based on the following theoretical framework- Bandura’s Theory of Triadic Reciprocal Determinism and the General Strain Theory. This framework posits that human behaviour is influenced by an individual’s confrontation with various stimuli. Confrontation with negative stimuli, such as that involving cyber abuse, often results in a various psychological affects among victims that may be detrimental to their overall well-being. The study investigates why and how the ‘Entry Level’ Employees of the Hotel Industry in Kolkata, become victims of cyber bullying. It also focuses on the nature of cyber bullying in virtual space and reveals how those, who are bullied, react and why the victims mostly do not report the incident and take legal action. Primary data was collected through face to face semi structured open ended interviews with 30 ‘Entry Level’ Employees of the HotelIndustry – in the age group of between the age group of 22-26 years- working in different hotels in Kolkata (15 female and 15 male employees) and had faced cyber abuse in any form. The respondents were chosen by purposive sampling, followed by snow balling. Based on the analysis of the interview, the main finding of the empirical study were analyzed in the following sub-themes- i) effect of recurring instance of cybe crime, ii) self blaming and suspecting technology as well as people, and decline in self esteem, iii) feeling helpless, hopeless and worthless due to lack of control over cyber abuse.
- Research Article
32
- 10.1016/j.chb.2018.10.014
- Oct 9, 2018
- Computers in Human Behavior
Diagnosis of cyber and non-physical bullying victimization: A lifestyles and routine activities theory approach to constructing effective preventative measures
- Single Book
- 10.1108/978-1-83549-724-1
- Oct 7, 2025
The ebook edition of this title is Open Access and freely available to read online. As we move into a world where the borders between professional activity in the physical world and the online space are becoming increasingly blurred, up to now there has been little attention paid to the risk that this occupational necessity frequently presents. This book fills that gap; exploring the online abuse of women at work, author Susan Watson uses verbatim accounts to demonstrate that online abuse is the consequence of being a woman on the internet. Timely, necessary, and the first of its kind, Gendered Online Abuse Against Women in Public Life focuses on digital abuse encountered across the public sphere and brings together both theoretical ideas and policy recommendations. Presenting evidence drawn from 50 rich and visceral semi-structured interviews and a large corpus of Twitter data, the chapters identify how abuse differs by occupation, and devises a seven-element framework that occurs in every episode of online abuse - tested through the qualitative analysis of 10 million tweets sent to 250 women across the UK: data that is no longer available following the platform's change of ownership. The design of recommendations at an individual, organisational and structural level provides workable solutions to a vicious problem, revealing how online abuse directed at women is misogynistic, frequently includes violent threats, and dismisses women's contributions to online discussions. Addressing how the expectation that women in public life maintain a digital presence precipitates online abuse, Watson offers a series of recommendations for ways that online abuse can be managed, countered, and ultimately ameliorated. Highly interdisciplinary, combining scholarly investigation and public policy insight, this is essential reading for students, academics and policymakers alike.
- Research Article
37
- 10.1007/s11199-017-0742-2
- Mar 15, 2017
- Sex Roles
Young people are spending increasing amounts of time using digital technology and, as such, are at great risk of being involved in cyber bullying as a victim, bully, or bully/victim. Despite cyber bullying typically occurring outside the school environment, the impact of being involved in cyber bullying is likely to spill over to school. Fully 285 11- to 15-year-olds (125 male and 160 female, Mage = 12.19 years, SD = 1.03) completed measures of cyber bullying involvement, self-esteem, trust, perceived peer acceptance, and perceptions of the value of learning and the importance of school. For young women, involvement in cyber bullying as a victim, bully, or bully/victim negatively predicted perceptions of learning and school, and perceived peer acceptance mediated this relationship. The results indicated that involvement in cyber bullying negatively predicted perceived peer acceptance which, in turn, positively predicted perceptions of learning and school. For young men, fulfilling the bully/victim role negatively predicted perceptions of learning and school. Consequently, for young women in particular, involvement in cyber bullying spills over to impact perceptions of learning. The findings of the current study highlight how stressors external to the school environment can adversely impact young women’s perceptions of school and also have implications for the development of interventions designed to ameliorate the effects of cyber bullying.
- Research Article
- 10.47772/ijriss.2023.7011031
- Jan 1, 2023
- International Journal of Research and Innovation in Social Science
In Indonesia, the number of teenagers who experience cyber bullying is reported 80 percent, and almost every day cyber bullying happens to the teenagers. Cyber bullying is violence that occurs through social media, when a child or teenager is ridiculed, humiliated, or intimidated by another child or youth through internet media, digital technology or cell phones. The negative effects of bullying and cyber bullying in childhood will have an impact on emotional disorders, poor psychosocial adaptation disorders and pathological behavioral disorders. The aim of psycho education at SMP 1 Kasembon is to increase youth’s knowledge to prevent cyber bullying behavior, due to the phenomenon that occurred at SMP Negeri 1 Kasembon, there was a scattering of photos and videos of several students by other people, with the intention of deliberately spreading photos and videos so that students were embarrassed and threated. Providing psycho education about cyber bullying to 54 students containing meaning, types, causal factors, impacts and ways to deal with them. The research method was a quasi-experimental. From the results, there were differences in adolescent knowledge of cyber bullying before and after being given psycho education. It was concluded that psycho education was proven to be effective in increasing adolescents’ knowledge of cyber bullying.
- Dissertation
1
- 10.17635/lancaster/thesis/169
- Jan 1, 2017
Digital technologies and services affect the planet. Every line of code, every photo uploaded to ‘the cloud’, and every smartphone, computer, or ‘IoT’ device, has an environmental footprint. That footprint often takes the form of carbon dioxide emissions, ecosystem degradation, and resource depletion, each of which occur to varying degrees throughout the production, use, and end-of-life processing of digital technologies. In the past two decades, multidisciplinary researchers and practitioners have examined and responded to many aspects of these processes; the responses have taken diverse forms, including energy efficiency and design standards, restrictions on the use of hazardous materials, and the international adoption of rules and regulations about electronics waste (e-waste). Despite these responses, the global environmental footprint of digital technologies and services has continued to rise due to their growing ubiquity, dwindling lifespans, and ‘always on’ support infrastructure. In this thesis, I respond directly to calls for increased analysis and discussion of the social practices and public policies that influence the environmental footprint of digital technologies (e.g. [83, 139, 232]). To narrow the scope of this broad line of enquiry, I focus on the social practices of retrocomputing repairers and human-computer interaction (HCI) academics— two communities whose practices influence the footprint of digital technologies—as well as environmental public policies that influence HCI practitioners. By drawing on secondary data and semi-structured qualitative interviews with 7 retrocomputing repairers and 22 HCI academics, my thesis offers three sets of contributions to complementary and ongoing conversations within the HCI community. The first two sets of contributions focus on the social practices of distinct but indirectly connected communities: retrocomputing repairers and HCI academics. While many HCI academics work to conceive of new digital products and services, the retro repairers actively work to maintain their ageing digital products in the face of increasingly scarce resources. Each group influences the environmental footprint in unique ways, which have been hitherto unexplored. I discuss some of these influences, and use them to highlight questions about existing and future HCI research. The third set of contributions focuses on environmental public policies and HCI. By fusing two existing approaches to understanding public policies and their relevance to HCI, I highlight opportunities for HCI researchers to engage with and influence environmental public policy. This allows me to suggest ways that environmental public policy could influence and be influenced by HCI research.
- Research Article
18
- 10.1109/access.2021.3114389
- Jan 1, 2021
- IEEE Access
It is every parent’s wish to protect their children from online pornography, cyber bullying and cyber predators. Several existing approaches analyze a limited amount of information stemming from the interactions of the child with the corresponding online party. Some restrict access to websites based on a blacklist of known forbidden URLs, others attempt to parse and analyze the exchanged multimedia content between the two parties. However, new URLs can be used to circumvent a blacklist, and images, video, and text can individually appear to be safe, but need to be judged jointly. We propose a highly modular framework of analyzing content in its final form at the user interface, or Human Computer Interaction (HCI) layer, as it appears before the child: on the screen and through the speakers. Our approach is to produce Children’s Agents for Secure and Privacy Enhanced Reaction (CASPER), which analyzes screen captures and audio signals in real time in order to make a decision based on all of the information at its disposal, with limited hardware capabilities. We employ a collection of deep learning techniques for image, audio and text processing in order to categorize visual content as pornographic or neutral, and textual content as cyberbullying or neutral. We additionally contribute a custom dataset that offers a wide spectrum of objectionable content for evaluation and training purposes. CASPER demonstrates an average accuracy of 88% and an F1 score of 0.85 when classifying text, and an accuracy of 95% when classifying pornography.
- Research Article
55
- 10.1287/isre.2021.1014
- May 24, 2021
- Information Systems Research
A key approach in many organizations to address the myriad of information security threats is encouraging employees to better understand and comply with information security policies (ISPs). Despite a significant body of academic research in this area, a commonly held but questionable assumption in these studies is that noncompliance simply represents the opposite of compliance. Hence, explaining compliance is only half of the story, and there is a pressing need to understand the causes of noncompliance, as well. If organizational leaders understood what leads a normally compliant employee to become noncompliant, future security breaches might be avoided or minimized. In this study, we found that compliant and noncompliant behaviors can be better explained by uncovering actions that focus not only on efficacious coping behaviors, but also those that focus on frustrated users who must sometimes cope with emotions, too. Employees working from a basis of emotion-focused coping are unable to address the threat and, feeling overwhelmed, focus only on controlling their emotions, merely making themselves feel better. Based on our findings, organizations can enhance their security by understanding the “tipping point” where employees’ focus likely changes from problem-solving to emotion appeasement, and instead push them into a more constructive direction.Yan Chen is an associate professor at Florida International University. She received her PhD in management information systems from University of Wisconsin–Milwaukee. Her research focuses on information security management, online fraud, privacy, and social media. She has published more than 30 research papers in refereed academic journals and conference proceedings.Dennis F. Galletta is a LEO awardee, fellow, and former president of the Association for Information Systems and professor at University of Pittsburgh since 1985. He has published 108 articles and four books. He is a senior editor at MIS Quarterly and an editorial board member at the Journal of Management Information Systems, and has been on several other boards.Paul Benjamin Lowry is the Suzanne Parker Thornhill Chair Professor in Business Information Technology at the Pamplin College of Business at Virginia Tech. He has published more than 135 journal articles. His research areas include organizational and behavioral security and privacy; online deviance and harassment, and computer ethics; human–computer interaction, social media, and gamification; and decision sciences, innovation, and supply chains.Xin (Robert) Luo is Endowed Regent’s Professor and full professor of MIS at the University of New Mexico. His research has appeared in leading information systems journals, and he serves as an associate editor for the Journal of the Association for Information Systems, Decision Sciences Journal, Information & Management, Electronic Commerce Research, and the Journal of Electronic Commerce Research.Gregory D. Moody is currently Lee Professor of Information Systems at the University of Nevada Las Vegas, and director of the cybersecurity graduate program. His interests include information systems security and privacy, e-business, and human–computer interaction. He is currently a senior editor for the Information Systems Journal and Transactions on Human-Computer Interaction.Robert Willison is a professor of management at Xi’an Jiaotong–Liverpool University. He received his PhD in information systems from the London School of Economics. His research focuses on insider computer abuse, information security policy compliance/noncompliance, software piracy, and cyber-loafing. His research has appeared in refereed academic journals such as MIS Quarterly, Journal of the Association for Information Systems, Information Systems Journal, and others.
- Research Article
8
- 10.1177/10776990221148987
- Jan 7, 2023
- Journalism & Mass Communication Quarterly
This study investigated the experiences of Finnish media professionals with online harassment. Participants ( N = 695) answered a survey including questions concerning their experiences with online harassment and a survey experiment involving a death threat received by someone else. Results showed that closeness to the victim was associated with increased anxiety levels, but it did not affect countermeasures recommendations for the victim. Victims’ reactions depended on their visibility in the public sphere and on the frequency and severity of the harassment. The results demonstrate that online harassment is prevalent among media professionals and that prevention and intervention are crucial.
- Research Article
38
- 10.1177/1461444818825133
- Jan 24, 2019
- New Media & Society
Online harassment is increasingly applied as a form of information control to curb free speech and exert power in online public spheres. In recent years, states have appeared to be particularly invested in weaponizing information against dissidents in an attempt at dominating social and political discourses. Reports by prominent human rights institutions, as well as anecdotal evidence, indicate that Iran remains among the states with a track record of such actions. The scope of targeted cyber abuse varies by case. This study investigates the size and perpetrators of online violence, harassment, and abuse against critical members of the Iranian diaspora, including journalists, civil society activists, and artists, among many others. This study substantiates findings of qualitative interviews with a quantitative study of Instagram accounts of related individuals and explores the patterns and communities involved in disseminating hate speech in an attempt at manipulating public opinion and suppressing voices of dissidents.
- Research Article
36
- 10.1109/access.2019.2947163
- Jan 1, 2019
- IEEE Access
In the Saudi school system, cyber bullying is a persistent problem perpetuated by the development of digital technology and its ubiquitous presence in almost every societal aspect. With such technologies, it is not surprising that harassment has proliferated to the virtual world of teenagers, within which harassment is rampant. This phenomenon's frequency and outcomes have alarmed stakeholders but surprisingly, studies examining the causes and motivations behind cyber space bullying engagement are few and far between. This issue was examined through the lens of a well-known theory, the Theory of Planned Behavior (TPB). More specifically, this study examined the effects of attitudes, normative beliefs, subjective norms, and perceived behavioral control/self-efficacy on intentions towards cyber bullying and expected societal outcomes. The study distributed 395 questionnaires to high school students in the 9th to 12th grades in Saudi schools. The gathered data was run through multiple linear regressions, after which the findings showed that behavioral attitudes, social norms, perceived behavioral controls, social media use, a lack of parental controls, and a lack of regulations had a direct effects on intentions towards cyber bullying. The findings also indicated that intentions towards cyber bullying had a direct effect on student academic performance. This study provides valuable information concerning intentions towards cyberspace bullying among students and the relationship between Theory of Planned Behavior (TPB) variables and the predictive utility model. Finally, this study's findings are a basis upon which prevention and intervention strategies can be developed, which has many implications for theory, practice, and policy.
- Research Article
- 10.15226/sojmse.2022.00174
- Jan 1, 2022
- SOJ Materials Science & Engineering
Human-Computer Interaction (HCI) delves into the interaction between individuals and digital technology, encompassing computers and various forms of digital tools. The field explores how people engage with these technologies to facilitate communication and accomplish tasks, focusing extensively on the design aspect. user interfaces and experiences that are intuitive, efficient, and user-friendly. The quality of information presented through these interfaces plays a crucial role in ensuring a positive user experience. Here’s how HCI and information intersect: UserCantered Design: HCI emphasizes a user-centred approach to design. Designers and developers aim to understand users’ needs, preferences, and behaviours to create interfaces that provide the right information at the right time in a format that’s easily digestible. Information Presentation: HCI considers how information is presented to users. This involves factors like layout, typography, colour choices, and visual hierarchy to ensure that information is presented clearly and attractively. Information Architecture: HCI involves designing the structure of information within an interface. This includes creating logical navigation paths, organizing content in a meaningful way, and ensuring that users can easily find the information they’re looking for Feedback and Interactivity: Effective HCI involves providing users with timely feedback when they interact with the interface. This feedback helps users understand the outcome of their actions and the state of the system. Usability and Learnability: HCI aims to create interfaces that are easy to learn and use. Information should be presented in a way that allows users to quickly understand how to interact with the system and achieve their goals. Accessibility: HCI considers the accessibility of information for all users, including those with disabilities. Interfaces should be designed to accommodate various needs, such as screen readers for visually impaired users or keyboard navigation for users with motor impairments. Information Quality: HCI encompasses designing interfaces that present high-quality information. This involves ensuring the accuracy, relevance, and reliability of the information presented to users. Cognitive Load: HCI takes into account the cognitive load placed on users. Interfaces should avoid overwhelming users with too much information at once and present information in a way that’s easy to process. Emotional Design: HCI acknowledges that user emotions play a role in their interactions. Interfaces should evoke positive emotions and align with users’ feelings and preferences. Testing and Iteration: HCI involves iterative design and testing. Gathering feedback from users through usability testing helps identify issues with information presentation and interaction, leading to improvements. Multimedia Integration: HCI considers how different types of media, such as images, videos, and animations, are integrated into interfaces to enhance information presentation and engagement. Context Awareness: Modern HCI incorporates context awareness, where interfaces adapt to the user’s context, such as location or device, to provide relevant and timely information.The EDAS score primarily suggests a recommended course of action based on location for the contract engine. This recommendation hinges on factors such as the manufacturing plant’s installed capacity. Assessments from experts and received data pertain to solar energy and geothermal electricity. Google Chrome Browser, Microsoft Windows OS, Apple macOS, Amazon Echo (Alexa) andWhatsApp Mobile App. Taken of Usability, Accessibility, Engagement and Information Quality. the Ranking for Human-Computer Interaction and Information. Google Chrome Browser is got the first rank whereas is the Google Chrome Browser is having the Lowest rank. Keywords: MCDM, Microsoft Windows OS, Apple macOS, Amazon Echo (Alexa) and WhatsApp Mobile App.
- Research Article
7
- 10.1007/s00146-010-0265-7
- Feb 2, 2010
- AI & SOCIETY
Human life is thoroughly mediated by technologies and instruments. Contemporary life is a ‘‘technologically mediated life.’’ We rely on what we make in order to survive, to thrive and to live together in societies. Sometimes the things we make improve our lives, and sometimes they make our lives worse. Technological devices shape our culture and the environment, alter patterns of human activity, and influence who we are and how we live. (Kaplan 2009, 2008, 2007). ‘‘Philosophers of technology tend not to celebrate technological achievements, because they get celebrated all the time’’, says Albert Borgmann by emphasizing the problem of how to tame the technological development. Borgmann further elaborates, ‘‘Philosophers point out the liabilities, what happens when technology moves beyond lifting genuine burdens and starts freeing us from burdens that we should not want to be rid of.’’ Technological mediation is precisely this capacity of technology: technologies can mediate between humans and reality, by establishing specific relations between both. This phenomenon of technological mediation has two dimensions, each of them pertaining to one aspect of the relations between humans and reality. [Verbeek paper Persuasive Technology and Moral Responsibility Toward an ethical framework for persuasive technologies addresses the ethical aspects of persuasive technologies. By integrating the concept of ‘persuasive technology’ with the concept of ‘technological mediation’, as developed in theoretical frameworks from the field of persuasive technology and from the philosophy of technology, it will be possible to identify three such points of application. Cf. Verbeek (2010)] (Fig. 1). Human–Computer Interaction (HCI) is concerned with the design, implementation and evaluation of interactive computer-based systems, as well as with the multi-disciplinary study of various issues affecting this interaction. The aim of HCI is to ensure the safety, utility, effectiveness, efficiency, accessibility, and usability of such systems. In recent years, HCI has attracted considerable attention by the academic and research communities, as well as by the Information Society Technologies industry. The ongoing paradigm shift towards a knowledge-intensive Information Society has brought about radical changes in the way people work and interact with each other and with information. Computer-mediated human activities undergo fundamental changes, and new ones appear continuously, as new, intelligent, distributed, and highly interactive technological environments emerge, making available concurrent access to heterogeneous information sources and interpersonal communication. The progressive fusion of existing and emerging technologies is transforming the computer from a specialist’s device into an information appliance. This dynamic evolution is characterized by several dimensions of diversity that are intrinsic to the Information Society. These become evident when considering the broad range of user characteristics, the changing nature of human activities, the variety of contexts of use, the increasing availability and diversification of information, knowledge sources, and services, the proliferation of diverse technological platforms, etc. HCI plays a critical role in the context of the emerging Information Society, as citizens experience technology through their contact with the user interfaces of interactive products, applications, and A. K. Tripathi (&) Department of Philosophy of Technology, Institute for Philosophy, Dresden University of Technology, Dresden, Germany e-mail: arun.tripathi@waoe.org
- Addendum
- 10.1007/s00146-010-0277-3
- Mar 10, 2010
- AI & SOCIETY
In Human–Computer Interaction research, several disciplines have come to give their contribution to the field, each with different emphases, traditions and views points. Daniel Fallman elaborates ‘‘early parts of cognitive psychology showed interest in the new field and stressed the application of models and theories of cognitive processes when designing the meeting between human and interface’’ (Fallman 2007). Human–Computer Interaction (HCI) is concerned with the design, implementation and evaluation of interactive computer-based systems, as well as with the multi-disciplinary study of various issues affecting this interaction. The aim of HCI is ‘‘to ensure the safety, utility, effectiveness, efficiency, accessibility and usability of such systems. In recent years, HCI has attracted considerable attention by the academic and research communities, as well as by the Information Society Technologies industry’’ (Stephanidis and Savidis 2001). The on-going paradigm shift towards a knowledge-intensive Information Society has brought about radical changes in the way people work and interact with each other and with information. Computermediated human activities undergo fundamental changes and new ones appear continuously, as new, intelligent, distributed, and highly interactive technological environments emerge, making available concurrent access to heterogeneous information sources and interpersonal communication. The progressive fusion of existing and emerging technologies is transforming the computer from a specialist’s device into an information appliance. ‘‘This dynamic evolution is characterized by several dimensions of diversity that are intrinsic to the Information Society.’’ These become evident when considering the broad range of user characteristics, the changing nature of human activities, the variety of contexts of use, the increasing availability and diversification of information, knowledge sources and services, the proliferation of diverse technological platforms, etc. ‘‘Human–Computer Interaction plays a critical role in the context of the emerging Information Society, as citizens experience technology through their contact with the user interfaces of interactive products, applications and services. Therefore, it is important to ensure that user interfaces provide access and quality in use to all potential users, in all possible of contexts of use, and through a variety of technological platforms’’ (Tripathi 2005; Stephanidis 2007).
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.