A framework for the application of socio-technical design methodology

被引:6
作者
Ahmad, Adnan [1 ]
Whitworth, Brian [2 ]
Bertino, Elisa [3 ]
机构
[1] St Louis Univ, Dept Math & Comp Sci, St Louis, MO 63103 USA
[2] Massey Univ, Sch Engn & Adv Technol, Auckland, New Zealand
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
Cyberspace; Online rights; Online standards; Rights management; Socio-technical design; System design; ONLINE SOCIAL NETWORKS; UNIVERSAL-DECLARATION;
D O I
10.1007/s10676-022-09651-0
中图分类号
B82 [伦理学(道德学)];
学科分类号
摘要
Socio-technical systems (STS) have become prominent platforms for online social interactions. Yet, they are still struggling to incorporate basic social ideas for many different and new online activities. This has resulted in unintended exposure of users' personal data and a rise in online threats as users have now become a desirable target for malicious activities. To address such challenges, various researchers have argued that STS should support user-oriented configurations to protect their users from online social abuse. Some methodologies have also been proposed to appreciate the integration of social values in the design of information systems, but they often lack an application mechanism. This paper presents a framework for the application of the socio-technical design methodology to incorporate social standards in the design of STS. The proposed framework exemplifies the socio-technical design approach by considering a list of social standards, followed by their mapping onto corresponding technical specifications. Based on these two sets, the framework highlights various individual, inter-group, and intra-group interactions and their supporting tools for STS governance. A conversation about the integration of social standards in STS is already materializing, therefore, a comprehensive framework to apply these standards in STS is entailed.
引用
收藏
页数:20
相关论文
共 108 条
[1]  
Ahmad A., 2011, 2011 7th International Conference on Information Assurance and Security (IAS), P68, DOI 10.1109/ISIAS.2011.6122797
[2]   A methodology for sender-oriented anti-spamming [J].
Ahmad, Adnan ;
Azhar, Anique ;
Naqvi, Sajid ;
Nawaz, Asif ;
Arshad, Samia ;
Zeshan, Furkh ;
Yousif, Mohammed ;
Salih, Ali O. M. .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (03) :2765-2776
[3]   A relation-aware multiparty access control [J].
Ahmad, Adnan ;
Whitworth, Brian ;
Zeshan, Furkh ;
Janczewski, Lech ;
Ali, Munwar ;
Chaudary, Muhammad Hasanain ;
Friedman, Robert .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (01) :227-239
[4]   Extending social networks with delegation [J].
Ahmad, Adnan ;
Whitworth, Brian ;
Zeshan, Furkh ;
Bertino, Elisa ;
Friedman, Robert .
COMPUTERS & SECURITY, 2017, 70 :546-564
[5]   How Do App Stores Challenge the Global Internet Governance Ecosystem? [J].
Almeida, Virgilio A. F. ;
Doneda, Danilo ;
Rossini, Carolina .
IEEE INTERNET COMPUTING, 2016, 20 (06) :49-51
[6]  
[Anonymous], 1975, Helsinki Final Act
[7]  
[Anonymous], 1950, CONV PROT HUM RIGHTS
[8]  
[Anonymous], 1988, P 1988 ACM C COMPUTE, DOI 10.1145/62266.62273
[9]  
[Anonymous], 1948, Universal declaration of human rights
[10]  
Baraniuk C., 2019, BBC NEWS 0428