Match!
Ibo van de Poel
Delft University of Technology
EngineeringSociologyPolitical scienceManagement scienceEngineering ethics
78Publications
23H-index
1,495Citations
What is this?
Publications 85
Newest
Source
#1Behnam TaebiH-Index: 11
#2Sabine RoeserH-Index: 14
Last. Ibo van de PoelH-Index: 23
view all 3 authors...
Source
#1Ibo van de Poel (TU Delft: Delft University of Technology)H-Index: 23
This chapter analyses some of the main values, and values conflicts, in relation to cybersecurity by distinguishing four important value clusters that should be considered when deciding on cybersecurity measures. These clusters are security, privacy, fairness and accountability. Each cluster consists of a range of further values, which can be viewed as articulating specific moral reasons relevant when devising cybersecurity measures. In addition to the four value clusters, domain-specific values...
Source
#1Geerten van de Kaa (TU Delft: Delft University of Technology)H-Index: 13
#2Jafar Rezaei (TU Delft: Delft University of Technology)H-Index: 24
Last. Abhilash Kizhakenath (KPMG)H-Index: 1
view all 5 authors...
Proactively including the ethical and societal issues of new technologies could have a positive effect on their acceptance. These issues could be captured in terms of values. In the literature, the values stakeholders deem important for the development of technology have often been identified. However, the relative ranking of these values in relation to each other have not been studied often. The best worst method is proposed as a possible method to determine the weights of values, hence it is u...
2 CitationsSource
#1Paul Hayes (TU Delft: Delft University of Technology)
#2Ibo van de Poel (TU Delft: Delft University of Technology)H-Index: 23
Last. M.G.D. Steen (TNO: Netherlands Organisation for Applied Scientific Research)H-Index: 9
view all 3 authors...
This article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology (not incorporated here are empirical and technical investigations). Here, we explicate and analyse the expression of values of accuracy, privacy, fairness and equality, property and ownership, and accountability and transparency in this context. We find that va...
Source
#1Zoë Robaey (TU Delft: Delft University of Technology)H-Index: 4
#2Shannon L. Spruit (TU Delft: Delft University of Technology)H-Index: 4
Last. Ibo van de Poel (TU Delft: Delft University of Technology)H-Index: 23
view all 3 authors...
The Safe-by-Design approach in synthetic biology holds the promise of designing the building blocks of life in an organism guided by the value of safety. This paves a new way for using biotechnologies safely. However, the Safe-by-Design approach moves the bulk of the responsibility for safety to the actors in the research and development phase. Also, it assumes that safety can be defined and understood by all stakeholders in the same way. These assumptions are problematic and might actually unde...
Source
#1Ibo van de Poel (TU Delft: Delft University of Technology)H-Index: 23
In the value sensitive design (VSD) literature, there has been little attention for how values may change during the adoption and use of a sociotechnical system, and what that implies for design. A value change taxonomy is proposed, as well as a number of technical features that allow dealing with value change.
Source
#1Ibo van de Poel (TU Delft: Delft University of Technology)H-Index: 23
#2Zoë Robaey (TU Delft: Delft University of Technology)H-Index: 4
Safe-by-design (SbD) aims at addressing safety issues already during the RD it also misses out on the resources that users (and others) can bring for achieving safety, and it is undemocratic. We argue that rather than directly designing for safety, it is better to design for the responsibility for safety, i.e., designers should think where the responsibility for safety is best situated and design technologies accordingly. We propose some heuristics that can be used in deciding how to share and d...
8 CitationsSource
#1Ibo van de PoelH-Index: 23
#2Lotte AsveldH-Index: 5
Last. Donna C. MehosH-Index: 1
view all 3 authors...
2 CitationsSource
#1Ibo van de PoelH-Index: 23
1 CitationsSource
123456789