6 found
Order:
  1.  50
    Value-based argumentation for justifying compliance.Brigitte Burgemeestre, Joris Hulstijn & Yao-Hua Tan - 2011 - Artificial Intelligence and Law 19 (2-3):149-186.
    Compliance is often achieved ‘by design’ through a coherent system of controls consisting of information systems and procedures. This system-based control requires a new approach to auditing in which companies must demonstrate to the regulator that they are ‘in control’. They must determine the relevance of a regulation for their business, justify which set of control measures they have taken to comply with it, and demonstrate that the control measures are operationally effective. In this paper we show how value-based argumentation (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  2.  66
    Designing for Trust: A Case of Value-Sensitive Design.Pieter E. Vermaas, Yao-Hua Tan, Jeroen van den Hoven, Brigitte Burgemeestre & Joris Hulstijn - 2010 - Knowledge, Technology & Policy 23 (3):491-505.
    In this paper, we consider the meaning, roles, and uses of trust in the economic and public domain, focusing on the task of designing systems for trust in information technology. We analyze this task by means of a survey of what trust means in the economic and public domain, using the model proposed by Lewicki and Bunker, and using the emerging paradigm of value-sensitive design. We explore the difficulties developers face when designing information technology for trust and show how our (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  29
    Designing for Trust: A Case of Value-Sensitive Design.Pieter E. Vermaas, Yao-Hua Tan, Jeroen Hoven, Brigitte Burgemeestre & Joris Hulstijn - 2010 - Knowledge, Technology & Policy 23 (3):491-505.
    In this paper, we consider the meaning, roles, and uses of trust in the economic and public domain, focusing on the task of designing systems for trust in information technology. We analyze this task by means of a survey of what trust means in the economic and public domain, using the model proposed by Lewicki and Bunker, and using the emerging paradigm of value-sensitive design. We explore the difficulties developers face when designing information technology for trust and show how our (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4.  52
    A common ontology of agent communication languages: Modeling mental attitudes and social commitments using roles.Guido Boella, Rossana Damianoa, Joris Hulstijn & Leendert van der Torre - 2007 - Applied ontology 2 (3):217-265.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  22
    Time and defeasibility in fipa acl semantics.Guido Boella, Guido Governatori, Joris Hulstijn, Régis Riveret, Antonino Rotolo & Leendert van der Torre - 2011 - Journal of Applied Logic 9 (4):274-288.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  21
    Value-based argumentation for designing and auditing security measures.Brigitte Burgemeestre, Joris Hulstijn & Yao-Hua Tan - 2013 - Ethics and Information Technology 15 (3):153-171.
    Designing security measures often involves trade-offs between various types of objectives. Multiple stakeholders may have conflicting demands and may have different ideas on how to resolve the resulting design conflicts. This paper reports on an application of value-sensitive design. Based on argumentation theory and social values, the paper develops a structured approach for discussing design conflicts, called value-based argumentation. The application domain examined in the paper is concerned with physical safety and security issues that arise in cross-border shipments. We first (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark