Monitoring Checklist is a product auditing method that helps product owners to evaluate and monitor the ethical impact of their shipped product on their users.
Timelines is a design activity created for an individual or group of technology professionals to engage in perspective-taking scenarios that form discussions about ethics and values in technology.
Inspired by Maslow’s Hierarchy model, the goal of this method is to help designers identify both positive and negative impacts of their product on the users.
Dichotomy mapping is a framework that helps designers to map and evaluate contrasting aspects—“harmful” and “beneficial”—of each of their design features.
Tarot Cards of Tech is a set of provocative considerations presented as cards, designed for technology professionals to more deeply consider the impact of their work and to prevent unintended negative impacts.
360 Review is a systems-focused method that provides insight into all of the stakeholders that are impacted by every aspect of the design and deployment of a product.
Black Mirror Brainstorms is an exercise modeled after the “Black Mirror” Netflix series, designed for industry teams to critically brainstorm and evaluate negative impact scenarios of their work in order to properly consider their potential consequences.
Design with Intent is a toolkit card deck and worksheet set, designed for a team of practitioners to approach design and research through intentional exploration of people’s behavior across digital and physical spaces and objects.
Diverse Voices is a guideline for group evaluation, designed for those writing technical documents to be more inclusive in their writing styles and to avoid writing practices that don’t account for diversity.
A design technique that allows designers to explore privacy features they should integrate into the design of a digital product right from the development phase of the product.
The Inclusive Design Toolkit is a collection of digital resources and products, designed for professionals to implement inclusive design practices in relation to vision, hearing, thinking, reach/dexterity, and mobility in their workplace practices. Example of elements to consider when evaluating inclusive design practices from the toolkit website.
A software application that helps designers and technology practitioners think through challenging ethical scenarios when developing products.
Playfully reflect on new technologies within design using privacy, ethics, law and security themed cards.
A worksheet within the Ethics for Designers Toolkit, designed for a team of designers and stakeholders to map value priorities, concerns, and effects of your existing design.
A worksheet within the Ethics for Designers Toolkit, designed for a team of designers to shape, brainstorm, and formulate their design goals for a product through different ethical theories.
Speculative Enactments is a method that allows designers to enact possible future technology outcomes with users to explore how the participants’ reactions to consequences of the enactments.
The Ethical Design Scorecard is an assessment technique that is designed to help practitioners investigate the ethical implications of their products and services. The method employs a weighted assessment criteria to determine the ethical implications of different criteria and provides information on areas that require improvement and those that are Read more…
Examine your product or service from a list of perspectives in order to identify, mitigate and account for the actual and potential adverse impact of your solution.
Tap into stakeholders’ understandings, views and values about a technology using semi-structured interview questions.
Judgment Call the Game is a team-based game that centers on Microsoft’s principles of ethics, designed for technology professionals to further understand the ethical implications of product work and implement their findings into future work.
An interactive role-playing game, designed for industry teams to critically engage and think broadly and creatively about potential cybersecurity threats.