{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:13:38Z","timestamp":1740147218626,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T00:00:00Z","timestamp":1515456000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Laboratory for Analytic Sciences","award":["LAS DO6 Task Order: Behavior Modeling"],"award-info":[{"award-number":["LAS DO6 Task Order: Behavior Modeling"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11948-017-9938-7","type":"journal-article","created":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T10:17:22Z","timestamp":1515493042000},"page":"869-898","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Bringing the National Security Agency into the Classroom: Ethical Reflections on Academia-Intelligence Agency Partnerships"],"prefix":"10.1007","volume":"25","author":[{"given":"Christopher","family":"Kampe","sequence":"first","affiliation":[]},{"given":"Gwendolynne","family":"Reid","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Jones","sequence":"additional","affiliation":[]},{"given":"Colleen","family":"S.","sequence":"additional","affiliation":[]},{"given":"Sean","family":"S.","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8520-4402","authenticated-orcid":false,"given":"Kathleen M.","family":"Vogel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,9]]},"reference":[{"key":"9938_CR1","first-page":"131","volume-title":"Social science, technical systems and cooperative work: The great divide","author":"P Agre","year":"1997","unstructured":"Agre, P. (1997). Toward a critical technical practice: Lessons learned in trying to reform AI. In G. C. Bowker, L. Gasser, S. Leigh Star, & B. Turner (Eds.), Social science, technical systems and cooperative work: The great divide (pp. 131\u2013158). Hillsdale, NJ: Lawrence Erlbaum."},{"issue":"1","key":"9938_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1207\/s15327809jls1301_1","volume":"13","author":"S Barab","year":"2004","unstructured":"Barab, S., & Squire, K. (2004). Design-based research: Putting a stake in the ground. Journal of the Learning Sciences, 13(1), 1\u201314.","journal-title":"Journal of the Learning Sciences"},{"issue":"224","key":"9938_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.7146\/dpb.v16i224.7586","volume":"16","author":"S B\u00f8dker","year":"1987","unstructured":"B\u00f8dker, S. (1987). Through the interface\u2014a human activity approach to user interface design. DAIMI Report Series, 16(224), 1\u2013167.","journal-title":"DAIMI Report Series"},{"issue":"2","key":"9938_CR4","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1207\/s15327809jls0202_2","volume":"2","author":"A Brown","year":"1992","unstructured":"Brown, A. (1992). Design experiments: Theoretical and methodological challenges in creating complex interventions in classroom settings. Journal of the Learning Sciences, 2(2), 141\u2013178.","journal-title":"Journal of the Learning Sciences"},{"issue":"1\/2","key":"9938_CR5","first-page":"69","volume":"4","author":"SP Dawson","year":"2006","unstructured":"Dawson, S. P. (2006). The impact of institutional surveillance technologies on student behaviour. Surveillance and Society, 4(1\/2), 69\u201384.","journal-title":"Surveillance and Society"},{"key":"9938_CR6","doi-asserted-by":"crossref","unstructured":"Dhami, M., & Careless, K. (2015). Ordinal structure of the generic analytic workflow: A survey of intelligence analysis. In Paper presented at the European intelligence and security informatics conference 2015, Manchester, UK.","DOI":"10.1109\/EISIC.2015.37"},{"key":"9938_CR8","unstructured":"Flanagan, M., How, D., & Nissenbaum, H. (2005). Values in design: Theory and practice. In Working Paper."},{"volume-title":"Human values and the design of computer technology","year":"1998","key":"9938_CR9","unstructured":"Friedman, B. (Ed.). (1998). Human values and the design of computer technology. Chicago: University of Chicago Press."},{"issue":"1\u20132","key":"9938_CR10","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/S0160-791X(01)00047-1","volume":"24","author":"DH Guston","year":"2002","unstructured":"Guston, D. H., & Sarewitz, D. (2002). Real-time technology assessment. Technology in Society, 24(1\u20132), 93\u2013109.","journal-title":"Technology in Society"},{"issue":"1","key":"9938_CR11","doi-asserted-by":"publisher","first-page":"55","DOI":"10.2307\/357539","volume":"42","author":"GE Hawisher","year":"1991","unstructured":"Hawisher, G. E., & Selfe, C. L. (1991). The rhetoric of technology and the electronic writing class. College Composition and Communication, 42(1), 55\u201365.","journal-title":"College Composition and Communication"},{"issue":"1","key":"9938_CR12","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/8755-4615(91)80038-F","volume":"9","author":"J Janangelo","year":"1991","unstructured":"Janangelo, J. (1991). Technopower and technoppression: Some abuses of power and control in computer-assisted writing environments. Computers and Composition, 9(1), 47\u201364.","journal-title":"Computers and Composition"},{"key":"9938_CR13","doi-asserted-by":"crossref","unstructured":"Jones, P., Sharma, S., Moon, C. & Samatova, N. F. (2017).\u00a0A network-fusion guided dashboard interface for task-centric document curation.\u00a0In\u00a0Proceedings of the\u00a022nd International Conference on Intelligent User Interfaces\u00a0(pp. 481\u2013491). ACM.","DOI":"10.1145\/3025171.3025177"},{"key":"9938_CR14","doi-asserted-by":"crossref","unstructured":"Jones, P., Thakur, S., Matthews, M., & Cox, S. (2016). A versatile platform for instrumentation of knowledge worker\u2019s computers to improve information analysis.\u00a0In\u00a0Proceedings of the\u00a0Second International Conference on Big Data Computing Service and Applications\u00a0(pp. 185\u2013194). IEEE.","DOI":"10.1109\/BigDataService.2016.47"},{"key":"9938_CR15","doi-asserted-by":"crossref","unstructured":"Jones, P., Thakur, S., Matthews, M., Cox, S., Streck, S., Kampe, C., et al. (2016b). Journaling interfaces to support knowledge workers in their collaborative tasks and goals. In\u00a0Proceedings of the 17th International Conference on Collaboration Technologies and Systems\u00a0(pp. 310\u2013318). IEEE.","DOI":"10.1109\/CTS.2016.0064"},{"issue":"7","key":"9938_CR16","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/1965724.1965735","volume":"54","author":"C Knobel","year":"2011","unstructured":"Knobel, C., & Bowker, G. C. (2011). Computing ethics: Values in design. Communications of the ACM, 54(7), 26\u201328.","journal-title":"Communications of the ACM"},{"key":"9938_CR17","doi-asserted-by":"crossref","first-page":"37","DOI":"10.29173\/irie87","volume":"10","author":"N Manders-Huits","year":"2009","unstructured":"Manders-Huits, N., & Zimmer, M. (2009). Values and pragmatic action: the challenges of introducing ethical intelligence in technical and design communities. International Review of Information Ethics, 10, 37\u201344.","journal-title":"International Review of Information Ethics"},{"issue":"2","key":"9938_CR18","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1080\/08850600701854417","volume":"21","author":"BH Miller","year":"2008","unstructured":"Miller, B. H. (2008). Improving all-source intelligence analysis: Elevate knowledge in the equation. The International Journal of Intelligence and Counterintelligence, 21(2), 337\u2013354.","journal-title":"The International Journal of Intelligence and Counterintelligence"},{"key":"9938_CR19","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/10421.001.0001","volume-title":"Self-tracking","author":"G Neff","year":"2016","unstructured":"Neff, G., & Nafus, D. (2016). Self-tracking. Cambridge, MA: MIT Press."},{"key":"9938_CR20","unstructured":"Nolan, B. R (2013). Information sharing and collaboration in the United States intelligence community: An ethnographic study of the national counterterrorism center, Ph.D. Dissertation (Philadelphia: University of Pennsylvania)."},{"key":"9938_CR21","unstructured":"Office of the Director of National Intelligence (2008). Intelligence Community Directive 205: Analytic Outreach. https:\/\/fas.org\/irp\/dni\/icd\/icd-205.pdf . Accessed Mar 11 2017."},{"key":"9938_CR22","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226703152.001.0001","volume-title":"Designing human practices: An experiment with synthetic biology","author":"P Rabinow","year":"2012","unstructured":"Rabinow, P., & Bennett, G. (2012). Designing human practices: An experiment with synthetic biology. Chicago: University of Chicago Press."},{"key":"9938_CR33","unstructured":"Sengers, P. Boehner, K. David, S, & Kaye, J. (2005). Reflective design. In Proceedings of the 4 th Decennial Conference on Critical Computing: Between Sense and Sensibility (pp. 49\u201358). New York: ACM, Retried from http:\/\/dl.acm.org\/citation.cfm?id=1094569 ."},{"issue":"11","key":"9938_CR23","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/1592761.1592778","volume":"52","author":"K Shilton","year":"2009","unstructured":"Shilton, K. (2009). Four billon little brothers?: Privacy, mobile, phones, and ubiquitous data collection. Communications of the ACM, 52(11), 48\u201353.","journal-title":"Communications of the ACM"},{"issue":"2","key":"9938_CR25","doi-asserted-by":"publisher","first-page":"131","DOI":"10.24908\/ss.v8i2.3482","volume":"8","author":"K Shilton","year":"2010","unstructured":"Shilton, K. (2010a). Participatory sensing: Building empowering surveillance. Surveillance and Society, 8(2), 131\u2013150.","journal-title":"Surveillance and Society"},{"key":"9938_CR26","unstructured":"Shilton, K. (2010b). Technology development with an Agenda: Interventions to Emphasize Values in Design. Retrieved from http:\/\/escholarship.org\/uc\/item\/72n146cj"},{"issue":"3","key":"9938_CR27","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1177\/0162243912436985","volume":"38","author":"K Shilton","year":"2012","unstructured":"Shilton, K. (2012). Values levers: Building ethics into design. Science, Technology and Human Values, 38(3), 374\u2013397.","journal-title":"Science, Technology and Human Values"},{"key":"9938_CR28","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-94-007-6833-8_9","volume-title":"Emerging pervasive information and communication technologies (PICT)","author":"K Shilton","year":"2014","unstructured":"Shilton, K. (2014). This is an intervention: Foregrounding and operationalizing ethics during technology design. In K. D. Pimple (Ed.), Emerging pervasive information and communication technologies (PICT) (pp. 177\u2013192). Dordrecht: Springer."},{"issue":"1","key":"9938_CR29","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1093\/iwc\/iww002","volume":"29","author":"K Shilton","year":"2016","unstructured":"Shilton, K., & Anderson, S. (2016). Blended, not Bossy: Ethics roles, responsibilities, and expertise in design. Interacting with Computers, 29(1), 71\u201379.","journal-title":"Interacting with Computers"},{"key":"9938_CR24","unstructured":"Shilton, K. Burke, J.A., Estrin, D, Govindan, R., Hansen, M. Kang, J. & Mun, M. (2009). Designing the personal data stream: Enabling participatory privacy in mobile personal sensing. Retrieved from http:\/\/escholarship.org\/uc\/item\/4sn741ns"},{"issue":"10","key":"9938_CR30","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1177\/0002764213479366","volume":"57","author":"S Slade","year":"2013","unstructured":"Slade, S., & Prinsloo, P. (2013). Learning analytics ethical issues and dilemmas. American Behavioral Scientist, 57(10), 1510\u20131529.","journal-title":"American Behavioral Scientist"},{"key":"9938_CR32","unstructured":"The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, Report to the President of the United States. (2005). https:\/\/fas.org\/irp\/offdocs\/wmd_report.pdf . Accessed 11 Mar 2017."},{"key":"9938_CR34","volume-title":"Assessing the tradecraft of intelligence analysis (Santa Monica","author":"GF Treverton","year":"2008","unstructured":"Treverton, G. F. (2008). Assessing the tradecraft of intelligence analysis (Santa Monica. CA: RAND Corporation."},{"key":"9938_CR35","volume-title":"Intelligence analysis for tomorrow: Advances from the behavioral and social sciences","author":"U.S. National Research Council","year":"2011","unstructured":"U.S. National Research Council. (2011). Intelligence analysis for tomorrow: Advances from the behavioral and social sciences. Washington, DC: U.S. National Academies Press."},{"key":"9938_CR36","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11948-013-9498-4","volume":"20","author":"A Wynsberghe Van","year":"2014","unstructured":"Van Wynsberghe, A., & Robbins, S. (2014). Ethicist as designer: A pragmatic approach to ethics in the lab. Science and Engineering Ethics, 20, 947\u2013961.","journal-title":"Science and Engineering Ethics"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9938-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-017-9938-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9938-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T01:08:58Z","timestamp":1660266538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-017-9938-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,9]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["9938"],"URL":"https:\/\/doi.org\/10.1007\/s11948-017-9938-7","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"type":"print","value":"1353-3452"},{"type":"electronic","value":"1471-5546"}],"subject":[],"published":{"date-parts":[[2018,1,9]]},"assertion":[{"value":"20 March 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}