Three approaches to ethical considerations in the design of behavior change support systems |
|
Author: | Karppinen, Pasi1; Oinas-Kukkonen, Harri1 |
Organizations: |
1Department of Information Processing Science, University of Oulu, Finland |
Format: | article |
Version: | accepted version |
Access: | open |
Online Access: | PDF Full Text (PDF, 0.4 MB) |
Persistent link: | http://urn.fi/urn:nbn:fi-fe202201031032 |
Language: | English |
Published: |
Springer Nature,
2013
|
Publish Date: | 2022-01-03 |
Description: |
AbstractMany ethical questions arise when developing persuasive systems. It has become evident that there is no silver bullet which would make it easy to resolve all ethical issues in all cases. This paper seeks to analyze and define potential ways to address ethical considerations in persuasive systems design. We suggest that there are three main approaches: a guideline-based approach, stakeholder analysis, and involving users. This paper helps to understand the strengths and weaknesses of these approaches when developing behavior change support systems, which, by their very nature, request deep engagement and commitment from their users. A pragmatic goal for this paper is to help designers choose an approach for their projects at hand. see all
|
Series: |
Lecture notes in computer science |
ISSN: | 0302-9743 |
ISSN-E: | 1611-3349 |
ISSN-L: | 0302-9743 |
ISBN: | 978-3-642-37157-8 |
ISBN Print: | 978-3-642-37156-1 |
Issue: | 7822 |
Pages: | 87 - 98 |
DOI: | 10.1007/978-3-642-37157-8_12 |
OADOI: | https://oadoi.org/10.1007/978-3-642-37157-8_12 |
Host publication: |
Persuasive Technology: 8th International Conference, PERSUASIVE 2013, Sydney, NSW, Australia, April 3-5, 2013. Proceedings |
Host publication editor: |
Berkovsky, Shlomo Freyne, Jill |
Conference: |
International Conference on Persuasive Technologies |
Type of Publication: |
A4 Article in conference proceedings |
Field of Science: |
113 Computer and information sciences |
Subjects: | |
Copyright information: |
© Springer-Verlag Berlin Heidelberg 2013. This is a post-peer-review, pre-copyedit version of an article published in Lecture Notes in Computer Science, vol 7822. The final authenticated version is available online at https://doi.org/10.1007/978-3-642-37157-8_12. |