-
Value-based Engineering with IEEE 7000TM
Authors:
Sarah Spiekermann,
Till Winkler
Abstract:
Digital ethics is being discussed worldwide as a necessity to create more reliable IT systems. This discussion, fueled by the fear of uncontrollable artificial intelligence (AI) has moved many institutions and scientists to demand a value-based system engineering. This article presents how organizations can build responsible and ethically founded systems with the 'Value-based Engineering' (VBE) ap…
▽ More
Digital ethics is being discussed worldwide as a necessity to create more reliable IT systems. This discussion, fueled by the fear of uncontrollable artificial intelligence (AI) has moved many institutions and scientists to demand a value-based system engineering. This article presents how organizations can build responsible and ethically founded systems with the 'Value-based Engineering' (VBE) approach that was standardized in the IEEE 7000TM standard. VBE is a transparent, clearly-structured, step-by-step methodology combining innovation management, risk management, system and software engineering in one process framework. It embeds a robust value ontology and terminology. It has been tested in various case studies. This article introduces readers to the most important steps and contributions of the approach.
△ Less
Submitted 21 June, 2022;
originally announced July 2022.
-
Engineering Privacy by Design: Are engineers ready to live up to the challenge?
Authors:
Kathrin Bednar,
Sarah Spiekermann,
Marc Langheinrich
Abstract:
Organizations struggle to comply with legal requirements as well as customers calls for better data protection. On the implementation level, incorporation of privacy protections in products and services depends on the commitment of the engineers who design them. We interviewed six senior engineers, who work for globally leading IT corporations and research institutions to investigate their motivat…
▽ More
Organizations struggle to comply with legal requirements as well as customers calls for better data protection. On the implementation level, incorporation of privacy protections in products and services depends on the commitment of the engineers who design them. We interviewed six senior engineers, who work for globally leading IT corporations and research institutions to investigate their motivation and ability to comply with privacy regulations. Our findings point to a lack of perceived responsibility, control, autonomy, and frustrations with interactions with the legal world. While we increasingly call on engineers to go beyond functional requirements and be responsive to human values in our increasingly technological society, we may be facing the dilemma of asking engineers to live up to a challenge they are currently not ready to embrace.
△ Less
Submitted 29 June, 2020; v1 submitted 8 June, 2020;
originally announced June 2020.
-
The Challenges and Impact of Privacy Policy Comprehension
Authors:
Jana Korunovska,
Bernadette Kamleitner,
Sarah Spiekermann
Abstract:
The new information and communication technology providers collect increasing amounts of personal data, a lot of which is user generated. Unless use policies are privacy-friendly, this leaves users vulnerable to privacy risks such as exposure through public data visibility or intrusive commercialisation of their data through secondary data use. Due to complex privacy policies, many users of online…
▽ More
The new information and communication technology providers collect increasing amounts of personal data, a lot of which is user generated. Unless use policies are privacy-friendly, this leaves users vulnerable to privacy risks such as exposure through public data visibility or intrusive commercialisation of their data through secondary data use. Due to complex privacy policies, many users of online services unwillingly agree to privacy-intruding practices. To give users more control over their privacy, scholars and regulators have pushed for short, simple, and prominent privacy policies. The premise has been that users will see and comprehend such policies, and then rationally adjust their disclosure behaviour. In this paper, on a use case of social network service site, we show that this premise does not hold. We invited 214 regular Facebook users to join a new fictitious social network. We experimentally manipulated the privacy-friendliness of an unavoidable and simple privacy policy. Half of our participants miscomprehended even this transparent privacy policy. When privacy threats of secondary data use were present, users remembered the policies as more privacy-friendly than they actually were and unwittingly uploaded more data. To mitigate such behavioural pitfalls we present design recommendations to improve the quality of informed consent.
△ Less
Submitted 18 May, 2020;
originally announced May 2020.
-
Street Marketing: How Proximity and Context drive Coupon Redemption
Authors:
Sarah Spiekermann,
Matthias Rothensee,
Michael Klafft
Abstract:
Purpose: In 2009, US coupons set a new record of 367 billion coupons distributed. Yet, while coupon distribution is on the rise, redemption rates remain below 1 percent. This paper aims to show how recognizing context variables, such as proximity, weather, part of town and financial incentives interplay to determine a coupon campaigns success. Design/methodology/approach. The paper reports an empi…
▽ More
Purpose: In 2009, US coupons set a new record of 367 billion coupons distributed. Yet, while coupon distribution is on the rise, redemption rates remain below 1 percent. This paper aims to show how recognizing context variables, such as proximity, weather, part of town and financial incentives interplay to determine a coupon campaigns success. Design/methodology/approach. The paper reports an empirical study conducted in co-operation with a restaurant chain 9.880 Subway coupons were distributed under different experimental context conditions. Redemption behavior was analyzed with the help of logistic regressions. Findings: It was found that even though proximity drives coupon redemption, city center campaigns seem to be much more sensitive to distance than suburban areas. The further away the distribution place from the restaurant, the less does the amount of monetary incentive determine the motivation to redeem. Practical implications. When designing a coupon campaign for a company, coupon distribution should not follow a -- one is good for all strategy -- even for one marketer within one product category. Instead each coupon strategy should carefully consider contextual influence. Originality/value. This paper is the first to the authors knowledge that systematically investigates the impact of context variables on coupon redemption. It focuses on context variables that electronic marketing channels will be able to easily incorporate into personalized mobile marketing campaigns.
△ Less
Submitted 14 May, 2020;
originally announced May 2020.
-
Do Interruptions Pay Off? Effects of Interruptive Ads on Consumers Willingness to Pay
Authors:
Alessandro Acquisti,
Sarah Spiekermann
Abstract:
We present the results of a study designed to measure the impact of interruptive advertising on consumers willingness to pay for products bearing the advertiser's brand. Subjects participating in a controlled experiment were exposed to ads that diverted their attention from a computer game they were testing. We found that ads significantly lowered subjects willingness to pay for a good associated…
▽ More
We present the results of a study designed to measure the impact of interruptive advertising on consumers willingness to pay for products bearing the advertiser's brand. Subjects participating in a controlled experiment were exposed to ads that diverted their attention from a computer game they were testing. We found that ads significantly lowered subjects willingness to pay for a good associated with the advertised brand. We did not find conclusive evidence that providing some level of user control over the appearance of ads mitigated the negative impact of ad interruption. Our results contribute to the research on the economic impact of advertising, and introduce a method of measuring actual (as opposed to self-reported) willingness to pay in experimental marketing research.
△ Less
Submitted 14 May, 2020;
originally announced May 2020.
-
A vision for global privacy bridges: Technical and legal measures for international data markets
Authors:
Sarah Spiekermann,
Alexander Novotny
Abstract:
From the early days of the information economy, personal data has been its most valuable asset. Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil". Most of this business is done without the knowledge and active informed consent of the people. But as data breaches and abuses are made public through the med…
▽ More
From the early days of the information economy, personal data has been its most valuable asset. Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil". Most of this business is done without the knowledge and active informed consent of the people. But as data breaches and abuses are made public through the media, consumers react. They become irritated about companies' data handling practices, lose trust, exercise political pressure and start to protect their privacy with the help of technical tools. As a result, companies' Internet business models that are based on personal data are unsettled. An open conflict is arising between business demands for data and a desire for privacy. As of 2015 no true answer is in sight of how to resolve this conflict. Technologists, economists and regulators are struggling to develop technical solutions and policies that meet businesses' demand for more data while still maintaining privacy. Yet, most of the proposed solutions fail to account for market complexity and provide no pathway to technological and legal implementation. They lack a bigger vision for data use and privacy. To break this vicious cycle, we propose and test such a vision of a personal information market with privacy. We accumulate technical and legal measures that have been proposed by technical and legal scholars over the past two decades. And out of this existing knowledge, we compose something new: a four-space market model for personal data.
△ Less
Submitted 13 May, 2020;
originally announced May 2020.
-
Oblivion of Online Reputation: How Time Cues Improve Online Recruitment
Authors:
Alexander Novotny,
Sarah Spiekermann
Abstract:
In online crowdsourcing labour markets, employers decide which job-seekers to hire based on their reputation profiles. If reputation systems neglect the aspect of time when displaying reputation profiles, though, employers risk taking false decisions, deeming an obsolete reputation to be still relevant. As a consequence, job-seekers might be unwarrantedly deprived of getting hired for new jobs and…
▽ More
In online crowdsourcing labour markets, employers decide which job-seekers to hire based on their reputation profiles. If reputation systems neglect the aspect of time when displaying reputation profiles, though, employers risk taking false decisions, deeming an obsolete reputation to be still relevant. As a consequence, job-seekers might be unwarrantedly deprived of getting hired for new jobs and can be harmed in their professional careers in the long-run. This paper argues that exposing employers to the temporal context of job-seekers' reputation leads to better hiring decisions. The visible temporal context in reputation systems helps employers to ignore a job-seeker's obsolete reputation. An experimental lab study with 335 students shows that current reputation systems fall short of making them aware of obsolete reputation. In contrast, graphical time cues improve the social efficiency of hiring decisions.
△ Less
Submitted 13 May, 2020;
originally announced May 2020.
-
Value-based Engineering for Ethics by Design
Authors:
Sarah Spiekermann,
Till Winkler
Abstract:
This article gives a methodological overview of Value-based Engineering for ethics by design. It discusses key challenges and measures involved in eliciting, conceptualizing, prioritizing and respecting values in system design. Thereby it draws from software engineering, value sensitive design, design thinking and participatory design as well as from philosophical sources, especially Material Ethi…
▽ More
This article gives a methodological overview of Value-based Engineering for ethics by design. It discusses key challenges and measures involved in eliciting, conceptualizing, prioritizing and respecting values in system design. Thereby it draws from software engineering, value sensitive design, design thinking and participatory design as well as from philosophical sources, especially Material Ethics of Value. The article recognizes timely challenges for Value-based Engineering, such as compatibility with agile forms of system development, responsibility in hardly controllable ecosystems of interconnected services, fearless integration of external stakeholders and the difficulty in measuring the ethicality of a system. Finally, the Value-based Engineering methodology presented here benefits from learnings collected in the IEEE P7000 standardization process as well as from a case study. P7000 has been set up by IEEE to establish a process model, which addresses ethical considerations throughout the various stages of system initiation, analysis and design.
△ Less
Submitted 23 October, 2020; v1 submitted 28 April, 2020;
originally announced April 2020.
-
The Power and Pitfalls of Transparent Privacy Policies in Social Networking Service Platforms
Authors:
Jana Korunovska,
Bernadette Kamleitner,
Sarah Spiekermann
Abstract:
Users disclose ever-increasing amounts of personal data on Social Network Service platforms (SNS). Unless SNSs' policies are privacy friendly, this leaves them vulnerable to privacy risks because they ignore the privacy policies. Designers and regulators have pushed for shorter, simpler and more prominent privacy policies, however the evidence that transparent policies increase informed consent is…
▽ More
Users disclose ever-increasing amounts of personal data on Social Network Service platforms (SNS). Unless SNSs' policies are privacy friendly, this leaves them vulnerable to privacy risks because they ignore the privacy policies. Designers and regulators have pushed for shorter, simpler and more prominent privacy policies, however the evidence that transparent policies increase informed consent is lacking. To answer this question, we conducted an online experiment with 214 regular Facebook users asked to join a fictitious SNS. We experimentally manipulated the privacy-friendliness of SNS's policy and varied threats of secondary data use and data visibility. Half of our participants incorrectly recalled even the most formally "perfect" and easy-to-read privacy policies. Mostly, users recalled policies as more privacy friendly than they were. Moreover, participants self-censored their disclosures when aware that visibility threats were present, but were less sensitive to threats of secondary data use. We present design recommendations to increase informed consent.
△ Less
Submitted 4 December, 2019; v1 submitted 21 November, 2019;
originally announced November 2019.
-
The Effects of Information and Communication Technology Use on Human Energy and Fatigue: A Review
Authors:
Jana Korunovska,
Sarah Spiekermann
Abstract:
Information and communication technologies (ICTs) are generally assumed to save time and energy, yet user fatigue due to ICT use is assumed to be on the rise. The question about the effects of ICT use on human energy has sparked increased research interest in recent years. however, the course is complicated by the fact that the conceptualization of human energy is extremely diverse. The aim of thi…
▽ More
Information and communication technologies (ICTs) are generally assumed to save time and energy, yet user fatigue due to ICT use is assumed to be on the rise. The question about the effects of ICT use on human energy has sparked increased research interest in recent years. however, the course is complicated by the fact that the conceptualization of human energy is extremely diverse. The aim of this paper is therefore twofold. First, we provide a conceptual framework and classification for subjective energy concepts and reflect on the theoretical embedding of technology within the theories on subjective energy. Second, we review the leading empirical literature on the relationship between ICT use and eight different subjective energy concepts prominent in different disciplines. We also include the new phenomena of social networking sites (SNS) exhaustion and SNS fatigue. With this, we aim to consolidate the existing research, illuminate the gaps and provide a conceptual baseline for future research on the relationship between ICT use and subjective energy of ICT users. We show that ICT use has predominantly negative effect on users' energy, especially in organizational contexts, and show the main patterns and mechanisms through which technology drains as well as energizes users.
△ Less
Submitted 15 April, 2021; v1 submitted 4 October, 2019;
originally announced October 2019.