Legitimate by design: towards trusted socio-technical systems

被引:0
作者
Whitworth, B [1 ]
De Moor, A
机构
[1] New Jersey Inst Technol, Newark, NJ 07102 USA
[2] Tilburg Univ, NL-5000 LE Tilburg, Netherlands
关键词
D O I
10.1080/01449290301783
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Legitimacy or 'fairness' seems a key requirement for trust in computer-mediated social environments. Trust in turn seems necessary for productive community interactions like e-commerce. But unless legitimacy is built into social software, achieving trust may not be possible. This means expressing apparently vague social 'rights' as specific information system (IS) requirements, i.e. carrying out a legitimacy analysis. We suggest a framework for the systematic analysis of who 'owns' what in IS design, assuming basic object types and actions. This analysis not only allows social legitimacy concepts to be expressed in IS design terms, but could also reveal socio-technical system design choices for public review. The technique is illustrated by case examples. Legitimacy analysis can apply to wide variety of social software, from chat rooms to virtual realities. It could lead to future global standards for virtual social environment design, perhaps necessary for the emergence of a global online community.
引用
收藏
页码:31 / 51
页数:21
相关论文
共 57 条
[41]  
Rheingold H., 1993, The virtual community: Homesteading on the electronic frontier
[42]  
ROSSON MB, 1999, P 32 HAW INT C SYST
[43]  
SCHUBERT P, 2000, P 33 HAW INT C SYST
[44]  
STAMPER R, 1994, REQUIREMENTS ENG SOC, P107
[45]  
STEFIK M, 1997, SCI AM MAR, P78
[46]  
SYMONDS M, 2000, ECONOMIST, V24
[47]  
*TRANSP INT, 2001, CORR PERC
[48]  
Turoff M., 1991, Journal of Organizational Computing, V1, P85, DOI 10.1080/10919399109540151
[49]  
TYLER T, 1999, SOC EXP SOC PSYCH AN
[50]  
TYNAN D, 2000, PC WORLD JUN, P103