14 Value Methodologies

1 Direct and Indirect Stakeholder Analysis
2 Value Source Analysis
3 Co-evolution of Technology and Social Structure
.4 Value Scenario
5 Value Sketch
6 Value-oriented Semi-structured Interview
7 Scalable Information Dimensions
8 Value-oriented Coding Manual
9 Value-oriented Mock-up, Prototype, or Field Deployment
10 Ethnographically Informed Inquiry
11 Model for Informed Consent Online
12 Value Dams and Flows
13 Value Sensitive Action-Reflection Model
14 Envisioning Cards

FTC FIPPs

1. Notice/Awareness[12]

2. Choice/Consent[13]

3. Access/Participation[14]

4. Integrity/Security[15]

5. Enforcement/Redress[16]


  1. FAIR defines six kind of loss:[3]

        1. Productivity

        2. Response

        3. Replacement

        4. Fines and judgments (F/J)

        5. Competitive advantage (CA)t

        6. Reputation

  2. value/liability as:[3]

        1. Critical

        2. Cost

        3. Sensitivity

              1. Embarrassment

              2. Competitive advantage

              3. Legal/regulatory

              4. General

  3. Threat[edit]

      1. Access

      2. Misuse

      3. Disclose

      4. Modify

      5. Deny access


Begin with CH6: Interference and work "backwards." from har

https://iapp.org/resources/glossary/group/cipt/

substitute for law, reg, or policyFTC DHS

I had no questions on Nissenbaum, FAIR, encryption, controls (architect, secure…), high/low-level design, testing, or ongoing vigilance.

Questions related to harm were mixed with other topics; never direct. Several questions on FIPPS, anonymity techniques, automated decisions, and IAM.

Couple on Carlo and Value Sensitive Design (glad I studied that one…), and design patterns.

A. Privacy Risk Models and Frameworks
a.Nissenbaum’s Contextual Integrity b.Calo’s Harms Dimensions c.Legal Compliance d.FIPPs e.NIST/NICE frameworks f. FAIR (Factors Analysis in Information Risk)