Science fiction as a value scenario for historical technology

  • Ian S. KingEmail author
Original Paper


The value scenario is a useful tool in the sheaf of methods within value sensitive design. When envisioning new technology, this tool supports the designer in speculatively considering relevant stakeholders, values expressed or rebuffed by an artifact’s design, and tensions that may exist between those values. This paper explores how science fiction stories can serve as value scenarios to supplement traditional historical methods, especially when informants are no longer accessible.


Value sensitive design Value scenarios History of technology Sociotechnical systems 


  1. Bijker, W. E. (1997). Of bicycles, bakelites, and bulbs: Toward a theory of sociotechnical change. London: MIT Press.Google Scholar
  2. Butterfield, H. (1965). The Whig interpretation of history. New York: WW Norton & Company.Google Scholar
  3. Czeskis, A., Dermendjieva, I., Yapit, H., Borning, A., Friedman, B., Gill, B., & Kohno, T. (2010). Parenting from the pocket: Value tensions and technical directions for secure and private parent-teen mobile safety. In Proceedings of the sixth symposium on usable privacy and security (p. 15). New York: ACM.Google Scholar
  4. Dunne, A., & Raby, F. (2001). Design noir: The secret life of electronic objects. New York: Springer.Google Scholar
  5. Edwards, P. N. (2003). Infrastructure and modernity: Force, time, and social organization in the history of sociotechnical systems. In T. J. Misa, P. Brey, & A. Feenberg (Eds.), Modernity and technology (pp. 185–226). Cambridge, MA: MIT Press.Google Scholar
  6. Franklin, B. (1963). Pennsylvania assembly: Reply to the governor, November 11, 1755. The Papers of Benjamin Franklin, 6, 242.Google Scholar
  7. Friedman, B. (1995). It’s the computer’s fault: Reasoning about computers as moral agents. Conference companion on human factors in computing systems (pp. 226–227). New York: ACM.Google Scholar
  8. Friedman, B., Kahn, P., & Borning, A. (2002). Value sensitive design: Theory and methods. University of Washington technical report (pp. 2–12).Google Scholar
  9. Heinlein, R. A. (1961). Stranger in a strange land. New York: G. P. Putnam’s Sons.Google Scholar
  10. Heinlein, R. A. (1966). The moon is a harsh mistress. New York: G. P. Putnam’s Sons.Google Scholar
  11. Jones, D. F. (1966). Colossus. New York: Putnam.Google Scholar
  12. Leinster, M. (1946). A logic named Joe. Astounding, 139–155.Google Scholar
  13. Levin, I. (1970). This perfect day. New York: Random House.Google Scholar
  14. Nass, C., Steuer, J., & Tauber, E. R. (1994). Computers are social actors. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 72–78). New York: ACM.Google Scholar
  15. Nathan, L. P., Friedman, B., Klasnja, P., Kane, S. K., & Miller, J. K. (2008). Envisioning systemic effects on persons and society throughout interactive system design. In Proceedings of the 7th ACM conference on designing interactive systems (pp. 1–10). New York: ACM.Google Scholar
  16. Nathan, L. P., Klasnja, P. V., & Friedman, B. (2007). Value scenarios: A technique for envisioning systemic effects of new technologies. In CHI’07 extended abstracts on human factors in computing systems (pp. 2585–2590). New York: ACM.Google Scholar
  17. Pasmore, W. A., & Sherwood, J. J. (1978). Sociotechnical systems: A sourcebook. San Diego, CA: Pfeiffer & Co.Google Scholar
  18. Rosson, M., & Carroll, J. (2003). Scenario-based design. In J. Jacko & A. Sears (Eds.), The human computer interaction handbook: Fundamentals, evolving technologies, and emerging applications (Chap. 10, pp. 1032–1050). Mahwah, NJ: Lawrence Erlbaum Associates.Google Scholar
  19. Sterling, B. (2009). Cover story: Design fiction. Interactions, 16(3), 20–24.CrossRefGoogle Scholar
  20. Suvin, D. (1979). Metamorphoses of science fiction: On the poetics and history of a literary genre. New Haven: Yale University Press.Google Scholar
  21. Woelfer, J. P., Iverson, A., Hendry, D. G., Friedman, B., & Gill, B. T. (2011). Improving the safety of homeless young people with mobile phones: Values, form and function. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 1707–1716). New York: ACM.Google Scholar

Copyright information

© Springer Nature B.V. 2018

Authors and Affiliations

  1. 1.University of WashingtonSeattleUSA

Personalised recommendations