SlideShare a Scribd company logo
1 of 26
Download to read offline
Scenario Creation Tool
for Ethical Design
A Lightning Talk
Information Architecture Meetup | UXDC

9/20/18 Washington, D.C.
Stacy Merrill Surla

stacysurla@metametrics.com
1We Need to Design Ethically
Getty Images
Peter Morville
B.J. FoggTerence Fenn &
Jason Hobbs
Vladimir Zwass
The Ethics of Information Architecture (2000)

As information architects, we are shaping the collaborative
work spaces and social environments of tomorrow. Are we
willing to take responsibility for the shapes we shape?
Keynote, IA Summit (2005)

Whether we like it or not, we are all in the business of
influencing people's thoughts and behaviors… The stakes
are higher now than ever before.
Wicked Ethics in Design (2015)

[I]s it possible that a design could be successful but not
good?
Ethical Issues in Information Systems (2010)
[W]e should use ethical principles and codes of ethics to
avoid and prevent deleterious effects of technology.
The creation will always carry its maker’s name.
And outlive him [or her].
Mike Monteiro
Design’s Lost
Generation (2018)
1931 Frankenstein
[W]e should use ethical principles and codes of ethics to avoid
and prevent deleterious effects of technology.
Vladimir Zwass
Ethical Issues in Information Systems (2010)
Thomas Hawk
2We’re Working on Tools for Ethical Design
Academics’ and Practitioners’ Roundtable
reframe-ia.org
Ren Pope
Academics’ and Practitioners’ Roundtable
reframe-ia.org
Stacy Surla
NO
Survey of philosophical frameworks and
ethical principles

Thorough explanation of the tool and how to
apply it
YES
What you will and won’t get at tonight’s talk
Enough of an overview to start including
ethical design in your toolkit 

Reference materials to get you grounded and
engaged
3The Scenario Creation Tool for Ethical Design
Use Case
Value Value Value Value
Scenario Creation Tool for Ethical Design
Arturo Pérez, Jackie Wolf, Shelley Cook, Jeff Pass, Stacy Surla
Synthesis
Maximize good
Minimize harm
PURPOSE
Outcomes integrated into the solution
Synthesis
A problem requiring a design solution
Use Case
"How do I know if I’m
designing ethically?”
An output of the 2018 Ethics & IA
Academics’ and Practitioners’ Roundtable

reframe-ia.org
Standards that guide us in action
Values
All entities affected by the Use Case
Actors
Actor
Actor
Actor
Use Case
Privacy Accuracy Property Access
Community
Stakeholders
Shareholders
Scenario Creation Tool for Ethical Design
Arturo Pérez, Jackie Wolf, Shelley Cook, Jeff Pass, Stacy Surla
Synthesis
Maximize good
Minimize harm
PURPOSE
WHAT IF?
• Hypothesize
• Design
• Test
A problem requiring a design solution
Use Case
"How do I know if I’m
designing ethically?”
IDENTIFY
• Harms
• Goods
• Research Needs
Standards that guide us in action
Values
The example uses Richard Mason’s
PAPA model. You can use any
appropriate value set.
All entities affected by the Use Case
Actors
To design ethically, consider impact to
the most vulnerable first, the client last.
Community
Stakeholders
Shareholders
Outcomes integrated into the solution
Synthesis
An output of the 2018 Ethics & IA
Academics’ and Practitioners’ Roundtable

reframe-ia.org
Use Case
Privacy Accuracy Property Access
Community
Stakeholders
Shareholders
Scenario Creation Tool for Ethical Design
Arturo Pérez, Jackie Wolf, Shelley Cook, Jeff Pass, Stacy Surla
Synthesis
Maximize good
Minimize harm
PURPOSE
A problem requiring a design solution
Use Case
"How do I know if I’m
designing ethically?”
Standards that guide us in action
Values
The example uses Richard Mason’s
PAPA model. You can use any
appropriate value set.
All entities affected by the Use Case
Actors
To design ethically, consider impact to
the most vulnerable first, the client last.
Community
Stakeholders
Shareholders
WHAT IF?
• Hypothesize
• Design
• Test
IDENTIFY
• Harms
• Goods
• Research Needs
Outcomes integrated into the solution
Synthesis
An output of the 2018 Ethics & IA
Academics’ and Practitioners’ Roundtable

reframe-ia.org
4Building a Scenario
Your company is tasked with designing the next
generation public registry of sex offenders.
You're leading the team that will design and deliver
the system.
Use Case - Sex Offender Registry
Definitions
ACTORS
Privacy What info must one reveal, and
what can be kept to oneself?

Who's responsible? How will an
injured party be made whole?
Who owns the info?
What are the rights of access?
Consumers, and those
directly and indirectly
affected by the design

Those who perform the
work, were consulted, or
have a stake in it

Whoever paid for the
work or owns the output
VALUES
Accuracy
Access
Property
Shareholders
Stakeholders
Community
1. Brainstorm potential negative consequences of building the system for
each of the actors.

2. Consider ways to address the consequences – for instance to maximize
good, minimize harm.
3. Outline a scenario that reflects one or more consequences for the actors.
4. Storyboard and present your scenario.
5. Repeat for multiple scenarios.
How-To (The Full Instructions)
Lightning Exercise - 5 mins
Identify key actors in each category
Community

Stakeholders

Shareholders
Get into pairs
Lightning Exercise - 5 mins
Choose an actor and one of the values
Actor Value
Brainstorm negative consequences of the system for that actor with
respect to that value
Lightning Exercise - 5 mins
Choose an actor and one of the values
Actor Value
Brainstorm negative consequences of the system for that actor with
respect to that value
1. Brainstorm potential negative consequences of building the system for
each of the actors.

2. Consider ways to address the consequences – for instance to maximize
good, minimize harm.
3. Outline a scenario that reflects one or more consequences for the actors.
4. Storyboard and present your scenario.
5. Repeat for multiple scenarios.
The Next Steps Would Be…
5What Did We Learn?
References
Ethics and Information Architecture, http://reframe-ia.org/

Four Ethical Issues of the Information Age, Richard Mason, http://
moodle.ncku.edu.tw/pluginfile.php/848770/mod_resource/content/1/
mason_PAPA.pdf

The Ethics and Politics of Information Architecture, Andrea Resmini, https://
www.slideshare.net/resmini/the-ethics-and-politics-of-information-architecture

Ethical Issues in Information Systems, Vladimir Zwass, http://reframe-ia.org/
EthicalIssuesinInformationSystems-Zwass.pdf
Stacy Merrill Surla

stacysurla@metametrics.com

More Related Content

Similar to Ethics and IA: A Scenario Creation Tool for Ethical Design

Final professional ethics for midterm(1)
Final professional ethics for midterm(1)Final professional ethics for midterm(1)
Final professional ethics for midterm(1)
JUNAIDJUANID
 

Similar to Ethics and IA: A Scenario Creation Tool for Ethical Design (20)

20240104 HICSS Panel on AI and Legal Ethical 20240103 v7.pptx
20240104 HICSS  Panel on AI and Legal Ethical 20240103 v7.pptx20240104 HICSS  Panel on AI and Legal Ethical 20240103 v7.pptx
20240104 HICSS Panel on AI and Legal Ethical 20240103 v7.pptx
 
PD for the development of AI ethics
PD for the development of AI ethicsPD for the development of AI ethics
PD for the development of AI ethics
 
Elder Abuse Research
Elder Abuse ResearchElder Abuse Research
Elder Abuse Research
 
Spohrer EMAC 20230509 v14.pptx
Spohrer EMAC 20230509 v14.pptxSpohrer EMAC 20230509 v14.pptx
Spohrer EMAC 20230509 v14.pptx
 
10 solution architecture concepts
10 solution architecture concepts10 solution architecture concepts
10 solution architecture concepts
 
How to Not Destroy the World - the Ethics of Web Design
How to Not Destroy the World - the Ethics of Web DesignHow to Not Destroy the World - the Ethics of Web Design
How to Not Destroy the World - the Ethics of Web Design
 
Bg Social Networks
Bg Social NetworksBg Social Networks
Bg Social Networks
 
Final professional ethics for midterm(1)
Final professional ethics for midterm(1)Final professional ethics for midterm(1)
Final professional ethics for midterm(1)
 
Hcic muller and liao - participatory design fictions
Hcic   muller and liao - participatory design fictionsHcic   muller and liao - participatory design fictions
Hcic muller and liao - participatory design fictions
 
What Gives Life to our Community
What Gives Life to our CommunityWhat Gives Life to our Community
What Gives Life to our Community
 
BA and Beyond 19 Sponsor spotlight - Namahn - Beating complexity with complexity
BA and Beyond 19 Sponsor spotlight - Namahn - Beating complexity with complexityBA and Beyond 19 Sponsor spotlight - Namahn - Beating complexity with complexity
BA and Beyond 19 Sponsor spotlight - Namahn - Beating complexity with complexity
 
Enterprise2.0 Conference Presentation
Enterprise2.0 Conference PresentationEnterprise2.0 Conference Presentation
Enterprise2.0 Conference Presentation
 
How Not to Destroy the World: Ethics in Design and Technology
How Not to Destroy the World: Ethics in Design and TechnologyHow Not to Destroy the World: Ethics in Design and Technology
How Not to Destroy the World: Ethics in Design and Technology
 
Guest lecture Sustainable Lens 2014
Guest lecture Sustainable Lens 2014Guest lecture Sustainable Lens 2014
Guest lecture Sustainable Lens 2014
 
Computational Models in Systemic Design
Computational Models in Systemic DesignComputational Models in Systemic Design
Computational Models in Systemic Design
 
Governance Rochester 2021
Governance Rochester 2021Governance Rochester 2021
Governance Rochester 2021
 
The ethics of serious games for health final
The ethics of serious games for health   finalThe ethics of serious games for health   final
The ethics of serious games for health final
 
Ilo 2018 business models for social impact (low res)
Ilo 2018 business models for social impact  (low res)Ilo 2018 business models for social impact  (low res)
Ilo 2018 business models for social impact (low res)
 
Ethics
EthicsEthics
Ethics
 
Ethics for Conversational AI
Ethics for Conversational AIEthics for Conversational AI
Ethics for Conversational AI
 

More from Stacy Surla

More from Stacy Surla (12)

Towards a feminist ia - lightning talk
Towards a feminist ia - lightning talkTowards a feminist ia - lightning talk
Towards a feminist ia - lightning talk
 
Why Sprint Zero Sucks
Why Sprint Zero SucksWhy Sprint Zero Sucks
Why Sprint Zero Sucks
 
The Unknown Craftsman
The Unknown CraftsmanThe Unknown Craftsman
The Unknown Craftsman
 
IA Language Critique IAS16 Surla
IA Language Critique IAS16 SurlaIA Language Critique IAS16 Surla
IA Language Critique IAS16 Surla
 
The Good, The Bad, and the Ugly: A Language of Critique for Information Archi...
The Good, The Bad, and the Ugly: A Language of Critique for Information Archi...The Good, The Bad, and the Ugly: A Language of Critique for Information Archi...
The Good, The Bad, and the Ugly: A Language of Critique for Information Archi...
 
Design Doing: Creating a Digital Practice
Design Doing: Creating a Digital PracticeDesign Doing: Creating a Digital Practice
Design Doing: Creating a Digital Practice
 
Ux Local Groups
Ux Local GroupsUx Local Groups
Ux Local Groups
 
Employee Recruitment through Second Life
Employee Recruitment through Second LifeEmployee Recruitment through Second Life
Employee Recruitment through Second Life
 
Starting IA Locals and Bringing IA to Work
Starting IA Locals and Bringing IA to WorkStarting IA Locals and Bringing IA to Work
Starting IA Locals and Bringing IA to Work
 
Leading Successful Volunteer Projects
Leading Successful Volunteer ProjectsLeading Successful Volunteer Projects
Leading Successful Volunteer Projects
 
Using Gaming Platforms for Telepresencing
Using Gaming Platforms for TelepresencingUsing Gaming Platforms for Telepresencing
Using Gaming Platforms for Telepresencing
 
Information Architecture in Second Life
Information Architecture in Second LifeInformation Architecture in Second Life
Information Architecture in Second Life
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 

Recently uploaded (20)

ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 

Ethics and IA: A Scenario Creation Tool for Ethical Design

  • 1. Scenario Creation Tool for Ethical Design A Lightning Talk Information Architecture Meetup | UXDC 9/20/18 Washington, D.C. Stacy Merrill Surla stacysurla@metametrics.com
  • 2. 1We Need to Design Ethically
  • 4. Peter Morville B.J. FoggTerence Fenn & Jason Hobbs Vladimir Zwass The Ethics of Information Architecture (2000) As information architects, we are shaping the collaborative work spaces and social environments of tomorrow. Are we willing to take responsibility for the shapes we shape? Keynote, IA Summit (2005) Whether we like it or not, we are all in the business of influencing people's thoughts and behaviors… The stakes are higher now than ever before. Wicked Ethics in Design (2015) [I]s it possible that a design could be successful but not good? Ethical Issues in Information Systems (2010) [W]e should use ethical principles and codes of ethics to avoid and prevent deleterious effects of technology.
  • 5. The creation will always carry its maker’s name. And outlive him [or her]. Mike Monteiro Design’s Lost Generation (2018) 1931 Frankenstein
  • 6. [W]e should use ethical principles and codes of ethics to avoid and prevent deleterious effects of technology. Vladimir Zwass Ethical Issues in Information Systems (2010) Thomas Hawk
  • 7. 2We’re Working on Tools for Ethical Design
  • 8. Academics’ and Practitioners’ Roundtable reframe-ia.org Ren Pope
  • 9. Academics’ and Practitioners’ Roundtable reframe-ia.org Stacy Surla
  • 10. NO Survey of philosophical frameworks and ethical principles Thorough explanation of the tool and how to apply it YES What you will and won’t get at tonight’s talk Enough of an overview to start including ethical design in your toolkit Reference materials to get you grounded and engaged
  • 11. 3The Scenario Creation Tool for Ethical Design
  • 12. Use Case Value Value Value Value Scenario Creation Tool for Ethical Design Arturo Pérez, Jackie Wolf, Shelley Cook, Jeff Pass, Stacy Surla Synthesis Maximize good Minimize harm PURPOSE Outcomes integrated into the solution Synthesis A problem requiring a design solution Use Case "How do I know if I’m designing ethically?” An output of the 2018 Ethics & IA Academics’ and Practitioners’ Roundtable reframe-ia.org Standards that guide us in action Values All entities affected by the Use Case Actors Actor Actor Actor
  • 13. Use Case Privacy Accuracy Property Access Community Stakeholders Shareholders Scenario Creation Tool for Ethical Design Arturo Pérez, Jackie Wolf, Shelley Cook, Jeff Pass, Stacy Surla Synthesis Maximize good Minimize harm PURPOSE WHAT IF? • Hypothesize • Design • Test A problem requiring a design solution Use Case "How do I know if I’m designing ethically?” IDENTIFY • Harms • Goods • Research Needs Standards that guide us in action Values The example uses Richard Mason’s PAPA model. You can use any appropriate value set. All entities affected by the Use Case Actors To design ethically, consider impact to the most vulnerable first, the client last. Community Stakeholders Shareholders Outcomes integrated into the solution Synthesis An output of the 2018 Ethics & IA Academics’ and Practitioners’ Roundtable reframe-ia.org
  • 14. Use Case Privacy Accuracy Property Access Community Stakeholders Shareholders Scenario Creation Tool for Ethical Design Arturo Pérez, Jackie Wolf, Shelley Cook, Jeff Pass, Stacy Surla Synthesis Maximize good Minimize harm PURPOSE A problem requiring a design solution Use Case "How do I know if I’m designing ethically?” Standards that guide us in action Values The example uses Richard Mason’s PAPA model. You can use any appropriate value set. All entities affected by the Use Case Actors To design ethically, consider impact to the most vulnerable first, the client last. Community Stakeholders Shareholders WHAT IF? • Hypothesize • Design • Test IDENTIFY • Harms • Goods • Research Needs Outcomes integrated into the solution Synthesis An output of the 2018 Ethics & IA Academics’ and Practitioners’ Roundtable reframe-ia.org
  • 16. Your company is tasked with designing the next generation public registry of sex offenders. You're leading the team that will design and deliver the system. Use Case - Sex Offender Registry
  • 17. Definitions ACTORS Privacy What info must one reveal, and what can be kept to oneself? Who's responsible? How will an injured party be made whole? Who owns the info? What are the rights of access? Consumers, and those directly and indirectly affected by the design Those who perform the work, were consulted, or have a stake in it Whoever paid for the work or owns the output VALUES Accuracy Access Property Shareholders Stakeholders Community
  • 18. 1. Brainstorm potential negative consequences of building the system for each of the actors. 2. Consider ways to address the consequences – for instance to maximize good, minimize harm. 3. Outline a scenario that reflects one or more consequences for the actors. 4. Storyboard and present your scenario. 5. Repeat for multiple scenarios. How-To (The Full Instructions)
  • 19. Lightning Exercise - 5 mins Identify key actors in each category Community Stakeholders Shareholders Get into pairs
  • 20. Lightning Exercise - 5 mins Choose an actor and one of the values Actor Value Brainstorm negative consequences of the system for that actor with respect to that value
  • 21.
  • 22. Lightning Exercise - 5 mins Choose an actor and one of the values Actor Value Brainstorm negative consequences of the system for that actor with respect to that value
  • 23. 1. Brainstorm potential negative consequences of building the system for each of the actors. 2. Consider ways to address the consequences – for instance to maximize good, minimize harm. 3. Outline a scenario that reflects one or more consequences for the actors. 4. Storyboard and present your scenario. 5. Repeat for multiple scenarios. The Next Steps Would Be…
  • 24.
  • 25. 5What Did We Learn?
  • 26. References Ethics and Information Architecture, http://reframe-ia.org/ Four Ethical Issues of the Information Age, Richard Mason, http:// moodle.ncku.edu.tw/pluginfile.php/848770/mod_resource/content/1/ mason_PAPA.pdf The Ethics and Politics of Information Architecture, Andrea Resmini, https:// www.slideshare.net/resmini/the-ethics-and-politics-of-information-architecture Ethical Issues in Information Systems, Vladimir Zwass, http://reframe-ia.org/ EthicalIssuesinInformationSystems-Zwass.pdf Stacy Merrill Surla stacysurla@metametrics.com