{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T20:53:10Z","timestamp":1775508790725,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T00:00:00Z","timestamp":1661904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T00:00:00Z","timestamp":1661904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"NWO"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2022,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In projects concerning big data, ethical questions need to be answered during the design process. In this paper the Value Sensitive Design method is applied in the context of data-driven health services aimed at disease prevention. It shows how Value Sensitive Design, with the use of a moral dialogue and an ethical matrix, can support the identification and operationalization of moral values that are at stake in the design of such services. It also shows that using this method can support meeting the requirements of the General Data Protection Regulation.<\/jats:p>","DOI":"10.1007\/s10676-022-09662-x","type":"journal-article","created":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T06:04:44Z","timestamp":1661925884000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["The value sensitive design of a preventive health check app"],"prefix":"10.1007","volume":"24","author":[{"given":"Litska","family":"Strikwerda","sequence":"first","affiliation":[]},{"given":"Marlies","family":"van Steenbergen","sequence":"additional","affiliation":[]},{"given":"Anke","family":"van Gorp","sequence":"additional","affiliation":[]},{"given":"Cathelijn","family":"Timmers","sequence":"additional","affiliation":[]},{"given":"Jeroen","family":"van Grondelle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,31]]},"reference":[{"key":"9662_CR1","volume-title":"Principles of biomedical ethics","author":"TL Beauchamp","year":"2009","unstructured":"Beauchamp, T. L., & Childress, J. F. (2009). Principles of biomedical ethics (6th ed.). Oxford UP.","edition":"6"},{"key":"9662_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1017\/CBO9780511845239.004","volume-title":"The Cambridge handbook of information and computer ethics","author":"P Brey","year":"2010","unstructured":"Brey, P. (2010). Values in technology and disclosive computer ethics. In L. Floridi (Ed.), The Cambridge handbook of information and computer ethics (pp. 41\u201358). Cambridge UP."},{"issue":"1","key":"9662_CR3","first-page":"1","volume":"20","author":"JE Cohen","year":"2018","unstructured":"Cohen, J. E. (2018). Turning privacy inside out. Forthcoming, Theoretical Inquiries in Law, 20(1), 1\u201322.","journal-title":"Forthcoming, Theoretical Inquiries in Law"},{"key":"9662_CR4","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1093\/mind\/fzm875","volume":"116","author":"P Faulkner","year":"2007","unstructured":"Faulkner, P. (2007). On telling and trusting. Mind, 116, 875\u2013892.","journal-title":"Mind"},{"issue":"8","key":"9662_CR5","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1037\/0003-066X.46.8.835","volume":"46","author":"B Fischhoff","year":"1991","unstructured":"Fischhoff, B. (1991). Value elicitation: Is there anything in there? American Psychologist, 46(8), 835.","journal-title":"American Psychologist"},{"key":"9662_CR6","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1017\/CBO9780511498725.017","volume-title":"Information technology and moral philosophy","author":"M Flanagan","year":"2008","unstructured":"Flanagan, M., Howe, D. C., & Nissenbaum, H. (2008). Embodying values in technology: theory and practice. In J. Van den Hoven & J. Weckert (Eds.), Information technology and moral philosophy (pp. 322\u2013353). Cambridge UP."},{"key":"9662_CR7","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7585.001.0001","volume-title":"Value sensitive design","author":"B Friedman","year":"2019","unstructured":"Friedman, B., & Hendry, D. (2019). Value sensitive design. The MIT Press."},{"key":"9662_CR8","first-page":"348","volume-title":"Human-computer interaction in management information systems: Foundations","author":"B Friedman","year":"2006","unstructured":"Friedman, B., Kahn, P. H., & Borning, A. (2006). Value sensitive design and information systems. In P. Zhang & D. Galletta (Eds.), Human-computer interaction in management information systems: Foundations (pp. 348\u2013372). M.E. Sharpe."},{"key":"9662_CR9","volume-title":"Towards a new, dynamic concept of health: Its operationalization and use in public health and healthcare and in evaluating health effects of food","author":"M Huber","year":"2014","unstructured":"Huber, M. (2014). Towards a new, dynamic concept of health: Its operationalization and use in public health and healthcare and in evaluating health effects of food. Maastricht University."},{"key":"9662_CR10","doi-asserted-by":"publisher","first-page":"d4163","DOI":"10.1136\/bmj.d4163","volume":"343","author":"M Huber","year":"2011","unstructured":"Huber, M., Knottnerus, J. A., Green, L., van der Horst, H., Jadad, A. R., Kromhout, D., et al. (2011). How should we define health? BMJ, 343, d4163.","journal-title":"BMJ"},{"key":"9662_CR11","volume-title":"Dialogue and the art of thinking together: A pioneering approach to communicating in business and in Life","author":"W Isaacs","year":"1999","unstructured":"Isaacs, W. (1999). Dialogue and the art of thinking together: A pioneering approach to communicating in business and in Life. Bantam Doubleday Dell Publishing Group Inc."},{"key":"9662_CR12","unstructured":"Mepham, B., Kaiser, M., Thortensen, E., Tomkins, S., and Millar, K. (2006). Ethical Matrix Manual. Agricultural and Forest Meteorology."},{"issue":"4","key":"9662_CR13","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1023\/B:BUSI.0000043500.63029.40","volume":"53","author":"K Morrell","year":"2004","unstructured":"Morrell, K. (2004). Socratic dialogue as a tool for teaching business ethics. Journal of Business Ethics, 53(4), 383\u2013392.","journal-title":"Journal of Business Ethics"},{"key":"9662_CR14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511606250","volume-title":"Autonomy and trust in bioethics","author":"O O\u2019Neill","year":"2002","unstructured":"O\u2019Neill, O. (2002). Autonomy and trust in bioethics. Oxford University Press."},{"key":"9662_CR15","volume-title":"World poverty and human rights: Cosmopolitan responsibilities and reform","author":"T Pogge","year":"2002","unstructured":"Pogge, T. (2002). World poverty and human rights: Cosmopolitan responsibilities and reform. Polity Press."},{"key":"9662_CR16","doi-asserted-by":"publisher","DOI":"10.4159\/9780674042605","volume-title":"A theory of justice","author":"J Rawls","year":"1971","unstructured":"Rawls, J. (1971). A theory of justice. Harvard UP."},{"key":"9662_CR17","unstructured":"Robeyns, Ingrid (2016) The capability approach. Edward N. Zalta\u00a0(ed.) The Stanford encyclopedia of philosophy"},{"issue":"3","key":"9662_CR18","doi-asserted-by":"publisher","first-page":"393","DOI":"10.5465\/amr.1998.926617","volume":"23","author":"D Rousseau","year":"1998","unstructured":"Rousseau, D., Bitkin, S., Burt, R., & Camerer, C. (1998). Not so different after all: A cross-disciplinary view of trust. Academy of Management Review, 23(3), 393\u2013404.","journal-title":"Academy of Management Review"},{"issue":"9439","key":"9662_CR19","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1016\/S0140-6736(04)17064-5","volume":"364","author":"JP Ruger","year":"2004","unstructured":"Ruger, J. P. (2004). Health and social justice. Lancet, 364(9439), 1075\u20131080.","journal-title":"Lancet"},{"issue":"1&2","key":"9662_CR20","first-page":"123","volume":"12","author":"K Smit","year":"2019","unstructured":"Smit, K., & Zoet, M. (2019). Governing roles and responsibilities in a human-machine decision-making context: A Governance framework. International Journal on Advances in IntelligentSystems, 12(1&2), 123\u2013134.","journal-title":"International Journal on Advances in IntelligentSystems"},{"key":"9662_CR21","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-94-007-7762-0_20","volume-title":"Philosophy and engineering: Reflections on practice, principles and process","author":"I Van de Poel","year":"2013","unstructured":"Van de Poel, I. (2013). Translating values into design requirements. In D. Mitchfelder, N. McCarty, & D. E. Goldberg (Eds.), Philosophy and engineering: Reflections on practice, principles and process (pp. 253\u2013266). Springer."},{"key":"9662_CR22","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10676-018-9461-9","volume":"23","author":"I Van de Poel","year":"2021","unstructured":"Van de Poel, I. (2021). Design for value change. Ethics and Information Technology, 23, 27\u201331. https:\/\/doi.org\/10.1007\/s10676-018-9461-9","journal-title":"Ethics and Information Technology"},{"key":"9662_CR23","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1017\/CBO9780511845239.012","volume-title":"The cambridge handbook of information and computer ethics","author":"J Weckert","year":"2010","unstructured":"Weckert, J., & Henschke, A. (2010). Computer ethics and applied contexts. In L. Floridi (Ed.), The cambridge handbook of information and computer ethics (pp. 181\u2013200). Cambridge UP."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-022-09662-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-022-09662-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-022-09662-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T16:21:38Z","timestamp":1672762898000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-022-09662-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,31]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["9662"],"URL":"https:\/\/doi.org\/10.1007\/s10676-022-09662-x","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,31]]},"assertion":[{"value":"19 July 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"38"}}