{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:53:37Z","timestamp":1776110017948,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T00:00:00Z","timestamp":1534809600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T00:00:00Z","timestamp":1534809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2021,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This article reviews the academic literature (1996\u20132016) that emerged under value sensitive design (VSD). It investigates those VSD projects that employed the tripartite methodology, examining the use of VSD methodological elements, and illustrating common practices and identifying shortcomings. The article provides advice for VSD researchers on how to complete and enhance their methodological approach as the research community moves forward.<\/jats:p>","DOI":"10.1007\/s10676-018-9476-2","type":"journal-article","created":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T07:59:39Z","timestamp":1534838379000},"page":"17-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":98,"title":["Twenty years of value sensitive design: a review of methodological practices in VSD projects"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4045-3085","authenticated-orcid":false,"given":"Till","family":"Winkler","sequence":"first","affiliation":[]},{"given":"Sarah","family":"Spiekermann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,21]]},"reference":[{"key":"9476_CR1","doi-asserted-by":"crossref","unstructured":"Azenkot, S., Prasain, S., Borning, A., Fortuna, E., Ladner, R. E., & Wobbrock, J. O. (2011). Enhancing independence and safety for blind and deaf-blind public transit riders. In Proceedings of the SIGCHI conference on human factors in computing systems (pp.\u00a03247\u20133256). ACM.","DOI":"10.1145\/1978942.1979424"},{"key":"9476_CR2","doi-asserted-by":"crossref","unstructured":"Bleumers, L., Mouws, K., Huyghe, J., Van Mechelen, M., Mari\u00ebn, I., & Zaman, B. (2015). Sensitivity to parental play beliefs and mediation in young children\u2019s hybrid play activities. In Proceedings of the 14th international conference on interaction design and children (pp.\u00a0170\u2013177). ACM.","DOI":"10.1145\/2771839.2771857"},{"key":"9476_CR3","doi-asserted-by":"crossref","unstructured":"Boyd, K., Rule, A., Tabard, A., & Hollan, J. (2016). Sharing, human values, and computer activity tracking. In Proceedings of the 19th ACM conference on computer supported cooperative work and social computing companion (pp.\u00a0233\u2013236). ACM.","DOI":"10.1145\/2818052.2869119"},{"key":"9476_CR4","doi-asserted-by":"crossref","unstructured":"Brush, A. B., & Borning, A. (2005). \u2018Today\u2019messages: Lightweight support for small group awareness via email. In Proceedings of the 38th annual Hawaii international conference on system sciences (pp.\u00a016a\u201316a). IEEE.","DOI":"10.1109\/HICSS.2005.2"},{"key":"9476_CR5","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s10676-016-9404-2","volume":"18","author":"OK Burmeister","year":"2016","unstructured":"Burmeister, O. K. (2016). The development of assistive dementia technology that accounts for the values of those affected by its use. Ethics and Information Technology, 18, 185\u2013198.","journal-title":"Ethics and Information Technology"},{"issue":"4","key":"9476_CR6","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s11948-006-0065-0","volume":"12","author":"ML Cummings","year":"2006","unstructured":"Cummings, M. L. (2006). Integrating ethics in design through the value-sensitive design approach. Science and Engineering Ethics, 12(4), 701\u2013715.","journal-title":"Science and Engineering Ethics"},{"key":"9476_CR7","doi-asserted-by":"crossref","unstructured":"Czeskis, A., Dermendjieva, I., Yapit, H., Borning, A., Friedman, B., Gill, B., & Kohno, T. (2010). Parenting from the pocket: Value tensions and technical directions for secure and private parent-teen mobile safety. In Proceedings of the sixth symposium on usable privacy and security. ACM.","DOI":"10.1145\/1837110.1837130"},{"key":"9476_CR8","doi-asserted-by":"crossref","unstructured":"Dahl, Y., & Holb\u00f8, K. (2012). Value biases of sensor-based assistive technology: Case study of a GPS tracking system used in dementia care. In Proceedings of the designing interactive systems conference (pp.\u00a0572\u2013581). ACM.","DOI":"10.1145\/2317956.2318043"},{"key":"9476_CR9","doi-asserted-by":"crossref","unstructured":"Davis, J. (2008). Engaging and informing citizens with household indicators. In Proceedings of the 41st annual Hawaii international conference on system sciences (pp.\u00a0190\u2013190). IEEE.","DOI":"10.1109\/HICSS.2008.145"},{"key":"9476_CR10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-94-007-6970-0_3","volume-title":"Handbook of ethics, values, and technological design: Sources, theory, values and application domains","author":"J Davis","year":"2015","unstructured":"Davis, J., & Nathan, L. P. (2015). Value sensitive design: Applications, adaptations, and critiques. In Handbook of ethics, values, and technological design: Sources, theory, values and application domains (pp.\u00a011\u201340). Dordrecht: Springer."},{"key":"9476_CR11","doi-asserted-by":"crossref","unstructured":"Epstein, D. A., Borning, A., & Fogarty, J. (2013). Fine-grained sharing of sensed physical activity: A value sensitive approach. In Proceedings of the 2013 ACM international joint conference on pervasive and ubiquitous computing (pp.\u00a0489\u2013498). ACM.","DOI":"10.1145\/2493432.2493433"},{"issue":"6","key":"9476_CR12","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/242485.242493","volume":"3","author":"B Friedman","year":"1996","unstructured":"Friedman, B. (1996). Value-sensitive design. Interactions, 3(6), 16\u201323.","journal-title":"Interactions"},{"key":"9476_CR13","doi-asserted-by":"crossref","unstructured":"Friedman, B., & Hendry, D. (2012). The envisioning cards: A toolkit for catalyzing humanistic and technical imaginations. In Proceedings of the SIGCHI conference on human factors in computing systems (pp.\u00a01145\u20131148). ACM.","DOI":"10.1145\/2207676.2208562"},{"issue":"2","key":"9476_CR14","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1561\/1100000015","volume":"11","author":"B Friedman","year":"2017","unstructured":"Friedman, B., Hendry, D. G., & Borning, A. (2017). A survey of value sensitive design methods. Foundations and Trends\u00ae in Human-Computer Interaction, 11(2), 63\u2013125.","journal-title":"Foundations and Trends\u00ae in Human-Computer Interaction"},{"key":"9476_CR15","doi-asserted-by":"crossref","unstructured":"Friedman, B., Howe, D. C., & Felten, E. (2002). Informed consent in the Mozilla browser: Implementing value-sensitive design. In Proceedings of the 35th annual Hawaii international conference on system sciences, 2002. HICSS. IEEE.","DOI":"10.1109\/HICSS.2002.994366"},{"key":"9476_CR16","first-page":"348","volume-title":"Human-computer interaction in management information systems: Foundations, chapter value sensitive design and information systems","author":"B Friedman","year":"2006","unstructured":"Friedman, B., Kahn, P., & Borning, A. (2006). Human-computer interaction in management information systems: Foundations, chapter value sensitive design and information systems (pp.\u00a0348\u2013372). New York: Armonk."},{"issue":"2","key":"9476_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1215942.1215943","volume":"36","author":"S Kuznetsov","year":"2006","unstructured":"Kuznetsov, S. (2006). Motivations of contributors to Wikipedia. ACM SIGCAS Computers and Society, 36(2), 1.","journal-title":"ACM SIGCAS Computers and Society"},{"key":"9476_CR18","doi-asserted-by":"crossref","unstructured":"Le Dantec, C. A., Poole, E. S., & Wyche, S. P. (2009). Values as lived experience: Evolving value sensitive design in support of value discovery. In Proceedings of the SIGCHI conference on human factors in computing systems (pp.\u00a01141\u20131150). ACM.","DOI":"10.1145\/1518701.1518875"},{"issue":"2","key":"9476_CR19","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s11948-010-9198-2","volume":"17","author":"N Manders-Huits","year":"2011","unstructured":"Manders-Huits, N. (2011). What values in design? The challenge of incorporating moral values into design. Science and Engineering Ethics, 17(2), 271\u2013287.","journal-title":"Science and Engineering Ethics"},{"key":"9476_CR20","doi-asserted-by":"crossref","unstructured":"Miller, J. K., Friedman, B., Jancke, G., & Gill, B. (2007). Value tensions in design: The value sensitive design, development, and appropriation of a corporation\u2019s groupware system. In Proceedings of the 2007 international ACM conference on supporting group work (pp.\u00a0281\u2013290). ACM.","DOI":"10.1145\/1316624.1316668"},{"key":"9476_CR21","doi-asserted-by":"crossref","unstructured":"Rector, K., Milne, L., Ladner, R. E., Friedman, B., & Kientz, J. A. (2015). Exploring the opportunities and challenges with exercise technologies for people who are blind or low-vision. In Proceedings of the 17th international ACM SIGACCESS conference on computers & accessibility (pp.\u00a0203\u2013214). ACM.","DOI":"10.1145\/2700648.2809846"},{"key":"9476_CR22","doi-asserted-by":"crossref","unstructured":"Schwartzman, Y., & Borning, A. (2007). The indicator browser: A web-based interface for visualizing UrbanSim simulation results. In 40th Annual Hawaii international conference on system sciences, 2007. HICSS 2007 (pp.\u00a092\u201392). IEEE.","DOI":"10.1109\/HICSS.2007.540"},{"issue":"4","key":"9476_CR23","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/TPC.2009.2034075","volume":"52","author":"R Walton","year":"2009","unstructured":"Walton, R., & DeRenzi, B. (2009). Value-sensitive design and health care in Africa. IEEE Transactions on Professional Communication, 52(4), 346\u2013358.","journal-title":"IEEE Transactions on Professional Communication"},{"issue":"5","key":"9476_CR24","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1007\/s11116-013-9450-0","volume":"40","author":"KE Watkins","year":"2013","unstructured":"Watkins, K. E., Borning, A., Rutherford, G. S., Ferris, B., & Gill, B. (2013). Attitudes of bus operators towards real-time transit information tools. Transportation, 40(5), 961\u2013980.","journal-title":"Transportation"},{"issue":"1","key":"9476_CR25","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.dss.2012.06.003","volume":"54","author":"H Xu","year":"2012","unstructured":"Xu, H., Crossler, R. E., & B\u00e9Langer, F. (2012). A value sensitive design investigation of privacy enhancing tools in web browsers. Decision Support Systems, 54(1), 424\u2013433.","journal-title":"Decision Support Systems"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9476-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-018-9476-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9476-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T17:09:36Z","timestamp":1621962576000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-018-9476-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,21]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["9476"],"URL":"https:\/\/doi.org\/10.1007\/s10676-018-9476-2","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,21]]},"assertion":[{"value":"21 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}