Value sensitive design

Value sensitive design (VSD) is a theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner.[1][2] VSD originated within the field of information systems design[3] and human-computer interaction[4] to address design issues within the fields by emphasizing the ethical values of direct and indirect stakeholders. It was developed by Batya Friedman and Peter Kahn at the University of Washington starting in the late 1980s and early 1990s. Later, in 2019, Batya Friedman and David Hendry wrote a book on this topic called "Value Sensitive Design: Shaping Technology with Moral Imagination".[5] Value Sensitive Design takes human values into account in a well-defined matter throughout the whole process.[6] Designs are developed using an investigation consisting of three phases: conceptual, empirical and technological.[7] These investigations are intended to be iterative, allowing the designer to modify the design continuously.[8]

The VSD approach is often described as an approach that is fundamentally predicated on its ability to be modified depending on the technology, value(s), or context of use.[9][10] Some examples of modified VSD approaches are Privacy by Design which is concerned with respecting the privacy of personally identifiable information in systems and processes.[11] Care-Centered Value Sensitive Design (CCVSD) proposed by Aimee van Wynsberghe is another example of how the VSD approach is modified to account for the values central to care for the design and development of care robots.[12]

Design process

VSD uses an iterative design process that involves three types of investigations: conceptual, empirical and technical. Conceptual investigations aim at understanding and articulating the various stakeholders of the technology, as well as their values and any values conflicts that might arise for these stakeholders through the use of the technology. Empirical investigations are qualitative or quantitative design research studies used to inform the designers' understanding of the users' values, needs, and practices. Technical investigations can involve either analysis of how people use related technologies, or the design of systems to support values identified in the conceptual and empirical investigations.[13] Friedman and Hendry account seventeen methods, including their main purpose, an overview of its function as well as key references:[5]

  1. Stakeholder Analysis (Purpose: Stakeholder identification and legitimation): Identification of individuals, groups, organizations, institutions, and societies that might reasonably be affected by the technology under investigation and in what ways. Two overarching stakeholder categories: (1) those who interact directly with the technology, direct stakeholders; and (2) those indirectly affected by the technology, indirect stakeholders.[14][15][16][17]
  2. Stakeholder Tokens (Purpose: Stakeholder identification and interaction): Playful and versatile toolkit for identifying stakeholders and their interactions. Stakeholder tokens facilitate identifying stakeholders, distinguishing core from peripheral stakeholders, surfacing excluded stakeholders, and articulating relationships among stakeholders.[18]
  3. Value Source Analysis (Purpose: Identify value sources): Distinguish among the explicitly supported project values, designers’ personal values, and values held by other direct and indirect stakeholders.[19]
  4. Co-evolution of Technology and Social Structure (Purpose: Expand design space): Expanding the design space to include social structures integrated with technology may yield new solutions not possible when considering the technology alone. As appropriate, engage with the design of both technology and social structure as part of the solution space. Social structures may include policy, law, regulations, organizational practices, social norms, and others.[20][21]
  5. Value Scenario (Purpose: Values representation and elicitation): Narratives, comprising stories of use, intended to surface human and technical aspects of technology and context. Value scenarios emphasize implications for direct and indirect stakeholders, related key values, widespread use, indirect impacts, longer-term use, and similar systemic effects.[15][16][21]
  6. Value Sketch (Purpose: Values representation and elicitation): Sketching activities as a way to tap into stakeholders’ non-verbal understandings, views, and values about a technology.[22][23]
  7. Value-oriented Semi-structured Interview (Purpose: Values elicitation): Semi-structured interview questions as a way to tap into stakeholders’ understandings, views and values about a technology. Questions typically emphasize stakeholders’ evaluative judgments (e.g., all right or not all right) about a technology as well as rationale (e.g., why?). Additional considerations introduced by the stakeholder are pursued.[24][10][19][25][16][26]
  8. Scalable Information Dimensions (Purpose: Values elicitation): Sets of questions constructed to tease apart the impact of pervasiveness, proximity, granularity of information, and other scalable dimensions. Can be used in interview or survey formats.[24][14][27]
  9. Value-oriented Coding Manual (Purpose: Values analysis): Hierarchically structured categories for coding qualitative responses to the value representation and elicitation methods. Coding categories are generated from the data and a conceptualization of the domain. Each category contains a label, definition, and typically up to three sample responses from empirical data. Can be applied to oral, written, and visual responses.[1]
  10. Value-oriented Mockup, Prototype or Field Deployment (Purpose: Values representation and elicitation): Development, analysis, and co-design of mockups, prototypes and field deployments to scaffold the investigation of value implications of technologies that are yet to be built or widely adopted. Mock-ups, prototypes or field deployments emphasize implications for direct and indirect stakeholders, value tensions, and technology situated in human contexts.[25][28][29][16][30]
  11. Ethnographically Informed Inquiry regarding Values and Technology (Purpose: Values, technology and social structure framework and analysis): Framework and approach for data collection and analysis to uncover the complex relationships among values, technology and social structure as those relationships unfold. Typically involves indepth engagement in situated contexts over longer periods of time.[31]
  12. Model for Informed Consent Online (Purpose: Design principles and values analysis): Model with corresponding design principles for considering informed consent in online contexts. The construct of informed encompasses disclosure and comprehension; that of consent encompasses voluntariness, competence, and agreement. Furthermore, implementations of informed consent.[32]
  13. Value Dams and Flows (Purpose: Values analysis): Analytic method to reduce the solution space and resolve value tensions among design choices. First, design options that even a small percentage of stakeholders strongly object to are removed from the design space—the value dams. Then of the remaining design options, those that a good percentage of stakeholders find appealing are foregrounded in the design—the value flows. Can be applied to the design of both technology and social structures.[16][21][29]
  14. Value Sensitive Action-Reflection Model (Purpose: Values representation and elicitation): Reflective process for introducing value sensitive prompts into a co-design activity. Prompts can be designer or stakeholder generated.[30]
  15. Multi-lifespan timeline (Purpose: Priming longer-term and multi-generational design thinking): Priming activity for longer-term design thinking. Multi-lifespan timelines prompt individuals to situate themselves in a longer time frame relative to the present, with attention to both societal and technological change.[33]
  16. Multi-lifespan co-design (Purpose: Longer-term design thinking and envisioning): Co-design activities and processes that emphasize longer-term anticipatory futures with implications for multiple and future generations.[33]
  17. Envisioning Cards (Purpose: Value sensitive design toolkit for industry, research, and educational practice): Value sensitive envisioning toolkit. A set of 32 cards, the Envisioning Cards build on four criteria: stakeholders, time, values, and pervasiveness. Each card contains on one side a title and an evocative image related to the card theme; on the flip side, the envisioning criterion, card theme, and a focused design activity. Envisioning Cards can be used for ideation, co-design, heuristic critique, and evaluation.[34][35][30] The second edition of the Envision Cards was published online under the CC BY-NC-ND 4.0 license in 2024.[36] This second edition of the Envisioning Cards brings together under one cohesive design the original set of 32 Envisioning Cards published in 2011 including the four suits—Stakeholders, Time, Values, and Pervasiveness—with the supplementary set of 13 Envisioning Cards published in 2018 with the Multi-lifespan suit.

Criticisms

VSD is not without its criticisms. Two commonly cited criticisms are critiques of the heuristics of values on which VSD is built.[37][38] These critiques have been forwarded by Le Dantec et al.[39] and Manders-Huits.[40] Le Dantec et al. argue that formulating a pre-determined list of implicated values runs the risk of ignoring important values that can be elicited from any given empirical case by mapping those value a priori.[39] Manders-Huits instead takes on the concept of ‘values’ itself with VSD as the central issue. She argues that the traditional VSD definition of values as “what a person or group of people consider important in life” is nebulous and runs the risk of conflating stakeholders preferences with moral values.[40]

Wessel Reijers and Bert Gordijn have built upon the criticisms of Le Dantec et alia and Manders-Huits that the value heuristics of VSD are insufficient given their lack of moral commitment.[38] They propose that a heuristic of virtues stemming from a virtue ethics approach to technology design, mostly influenced by the works of Shannon Vallor, provides a more holistic approach to technology design. Steven Umbrello has criticized this approach arguing that not only can the heuristic of values be reinforced[41] but that VSD does make moral commitments to at least three universal values: human well-being, justice and dignity.[37][5] Batya Friedman and David Hendry, in "Value Sensitive Design: Shaping Technology with Moral Imagination", argue that although earlier iterations of the VSD approach did not make explicit moral commitments, it has since evolved over the past two decades to commit to at least those three fundamental values.[5]

VSD as a standalone approach has also been criticized as being insufficient for the ethical design of artificial intelligence.[42] This criticism is predicated on the self-learning and opaque artificial intelligence techniques like those stemming from machine learning and, as a consequence, the unforeseen or unforeseeable values or disvalues that may emerge after the deployment of an AI system. Steven Umbrello and Ibo van de Poel propose a modified VSD approach that uses the Artificial Intelligence for Social Good (AI4SG)[43] factors as norms to translate abstract philosophical values into tangible design requirements.[44] What they propose is that full-lifecycle monitoring is necessary to encourage redesign in the event that unwanted values manifest themselves during the deployment of a system.

See also

References

  1. ^ Himma, Kenneth Einar; Tavani, Herman T., eds. (2008). The Handbook of Information and Computer Ethics (PDF). John Wiley & Sons Inc. ISBN 978-0-471-79959-7. Retrieved 8 July 2016.
  2. ^ Friedman, Batya; Hendry, David G.; Borning, Alan (2017-11-21). "A Survey of Value Sensitive Design Methods". Foundations and Trends in Human–Computer Interaction. 11 (2): 63–125. doi:10.1561/1100000015. ISSN 1551-3955. S2CID 28701004.
  3. ^ Friedman, Batya; Kahn, Peter H.; Borning, Alan; Huldtgren, Alina (2013), Doorn, Neelke; Schuurbiers, Daan; van de Poel, Ibo; Gorman, Michael E. (eds.), "Value Sensitive Design and Information Systems", Early engagement and new technologies: Opening up the laboratory, Philosophy of Engineering and Technology, Springer Netherlands, pp. 55–95, doi:10.1007/978-94-007-7844-3_4, ISBN 9789400778443, S2CID 8176837
  4. ^ Borning, Alan; Muller, Michael (2012). "Next steps for value sensitive design". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '12. New York, NY, USA: ACM. pp. 1125–1134. doi:10.1145/2207676.2208560. ISBN 9781450310154.
  5. ^ a b c d Friedman, Batya; Hendry, David G. (2019-05-03). Value Sensitive Design: Shaping Technology with Moral Imagination. MIT Press. ISBN 9780262351706.
  6. ^ Friedman, Batya; Kahn, Peter H. Jr. (2002). "Value Sensitive Design: Theory and Methods". CiteSeerX 10.1.1.11.8020. {{cite journal}}: Cite journal requires |journal= (help)
  7. ^ Philosophy, Engineering & Technology (18 May 2010). "Value Sensitive Design: Four Challenges". slideshare.net. Archived from the original on 7 March 2016. Retrieved 24 April 2018.
  8. ^ Umbrello, Steven (2020-04-01). "Imaginative Value Sensitive Design: Using Moral Imagination Theory to Inform Responsible Technology Design". Science and Engineering Ethics. 26 (2): 575–595. doi:10.1007/s11948-019-00104-4. hdl:2318/1699361. ISSN 1471-5546. PMID 30972629. S2CID 108295110.
  9. ^ van den Hoven, Jeroen (2007). "ICT and Value Sensitive Design". In Goujon, Philippe; Lavelle, Sylvian; Duquenoy, Penny; Kimppa, Kai; Laurent, Véronique (eds.). The Information Society: Innovation, Legitimacy, Ethics and Democracy in honor of Professor Jacques Berleur s.j. IFIP International Federation for Information Processing. Vol. 233. Boston, MA: Springer US. pp. 67–72. doi:10.1007/978-0-387-72381-5_8. ISBN 978-0-387-72381-5.
  10. ^ a b Longo, Francesco; Padovano, Antonio; Umbrello, Steven (January 2020). "Value-Oriented and Ethical Technology Engineering in Industry 5.0: A Human-Centric Perspective for the Design of the Factory of the Future". Applied Sciences. 10 (12): 4182. doi:10.3390/app10124182. hdl:2318/1741791.
  11. ^ Spiekermann, Sarah (July 2012). "The challenges of privacy by design". Communications of the ACM. 55 (7): 38–40. doi:10.1145/2209249.2209263. ISSN 0001-0782. S2CID 3023111.
  12. ^ van Wynsberghe, Aimee (2013-06-01). "Designing Robots for Care: Care Centered Value-Sensitive Design". Science and Engineering Ethics. 19 (2): 407–433. doi:10.1007/s11948-011-9343-6. ISSN 1471-5546. PMC 3662860. PMID 22212357.
  13. ^ Friedman, B., Kahn Jr, P. H., Borning, A., & Kahn, P. H. (2006). Value Sensitive Design and information systems. Human-Computer Interaction and Management Information Systems: Foundations. ME Sharpe, New York, 348–372.
  14. ^ a b Friedman, Batya; Kahn, Peter H. Jr.; Hagman, Jennifer; Severson, Rachel L.; Gill, Brian (2006-05-01). "The Watcher and the Watched: Social Judgments About Privacy in a Public Place". Human–Computer Interaction. 21 (2): 235–272. doi:10.1207/s15327051hci2102_3. ISSN 0737-0024. S2CID 54165089.
  15. ^ a b Nathan, Lisa P.; Friedman, Batya; Klasnja, Predrag; Kane, Shaun K.; Miller, Jessica K. (2008-02-25). "Envisioning systemic effects on persons and society throughout interactive system design". Proceedings of the 7th ACM conference on Designing interactive systems. DIS '08. Cape Town, South Africa: Association for Computing Machinery. pp. 1–10. doi:10.1145/1394445.1394446. ISBN 978-1-60558-002-9. S2CID 2412766.
  16. ^ a b c d e Czeskis, Alexei; Dermendjieva, Ivayla; Yapit, Hussein; Borning, Alan; Friedman, Batya; Gill, Brian; Kohno, Tadayoshi (2010-07-14). "Parenting from the pocket". Proceedings of the Sixth Symposium on Usable Privacy and Security. SOUPS '10. Redmond, Washington, USA: Association for Computing Machinery. pp. 1–15. doi:10.1145/1837110.1837130. ISBN 978-1-4503-0264-7. S2CID 13951473.
  17. ^ Watkins, Kari Edison; Ferris, Brian; Malinovskiy, Yegor; Borning, Alan (2013-11-27). "Beyond Context-Sensitive Solutions: Using Value-Sensitive Design to Identify Needed Transit Information Tools". Urban Public Transportation Systems 2013. pp. 296–308. doi:10.1061/9780784413210.026. ISBN 9780784413210.
  18. ^ Yoo, Daisy (2018-08-04). "Stakeholder Tokens: a constructive method for value sensitive design stakeholder analysis". Ethics and Information Technology. 23: 63–67. doi:10.1007/s10676-018-9474-4. ISSN 1572-8439. S2CID 52048390.
  19. ^ a b Borning, Alan; Friedman, Batya; Davis, Janet; Lin, Peyina (2005). Gellersen, Hans; Schmidt, Kjeld; Beaudouin-Lafon, Michel; Mackay, Wendy (eds.). "Informing Public Deliberation: Value Sensitive Design of Indicators for a Large-Scale Urban Simulation". Ecscw 2005. Dordrecht: Springer Netherlands: 449–468. doi:10.1007/1-4020-4023-7_23. ISBN 978-1-4020-4023-8. S2CID 17369120.
  20. ^ Friedman, Batya; Smith, Ian; H. Kahn, Peter; Consolvo, Sunny; Selawski, Jaina (2006). "Development of a Privacy Addendum for Open Source Licenses: Value Sensitive Design in Industry". In Dourish, Paul; Friday, Adrian (eds.). UbiComp 2006: Ubiquitous Computing. Lecture Notes in Computer Science. Vol. 4206. Berlin, Heidelberg: Springer. pp. 194–211. doi:10.1007/11853565_12. ISBN 978-3-540-39635-2.
  21. ^ a b c Miller, Jessica K.; Friedman, Batya; Jancke, Gavin; Gill, Brian (2007-11-04). "Value tensions in design". Proceedings of the 2007 international ACM conference on Conference on supporting group work - GROUP '07. Sanibel Island, Florida, USA: Association for Computing Machinery. pp. 281–290. doi:10.1145/1316624.1316668. ISBN 978-1-59593-845-9. S2CID 2633485.
  22. ^ Friedman, Batya; Hurley, David; Howe, Daniel C.; Felten, Edward; Nissenbaum, Helen (2002-04-20). "Users' conceptions of web security: A comparative study". CHI '02 Extended Abstracts on Human Factors in Computing Systems. CHI EA '02. Minneapolis, Minnesota, USA: Association for Computing Machinery. pp. 746–747. doi:10.1145/506443.506577. ISBN 978-1-58113-454-4. S2CID 27784060.
  23. ^ Woelfer, Jill Palzkill; Iverson, Amy; Hendry, David G.; Friedman, Batya; Gill, Brian T. (2011-05-07). "Improving the safety of homeless young people with mobile phones". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '11. Vancouver, BC, Canada: Association for Computing Machinery. pp. 1707–1716. doi:10.1145/1978942.1979191. ISBN 978-1-4503-0228-9. S2CID 41591259.
  24. ^ a b Friedman, Batya (1997-08-01). "Social Judgments and technological innovation: Adolescents' understanding of property, privacy, and electronic information". Computers in Human Behavior. 13 (3): 327–351. doi:10.1016/S0747-5632(97)00013-7. ISSN 0747-5632.
  25. ^ a b Freier, Nathan G. (2008-04-06). "Children attribute moral standing to a personified agent". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '08. Florence, Italy: Association for Computing Machinery. pp. 343–352. doi:10.1145/1357054.1357113. ISBN 978-1-60558-011-1. S2CID 15580819.
  26. ^ Umbrello, Steven; van de Poel, Ibo (2021). "Mapping value sensitive design onto AI for social good principles". AI and Ethics. 1 (3). Springer Nature: 283–296. doi:10.1007/s43681-021-00038-3. PMC 7848675. PMID 34790942. S2CID 231744217.
  27. ^ Munson, Sean A.; Avrahami, Daniel; Consolvo, Sunny; Fogarty, James; Friedman, Batya; Smith, Ian (2011-06-12). "Attitudes toward online availability of US public records". Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times. dg.o '11. College Park, Maryland, USA: Association for Computing Machinery. pp. 2–9. doi:10.1145/2037556.2037558. ISBN 978-1-4503-0762-8. S2CID 10276344.
  28. ^ Woelfer, Jill Palzkill; Hendry, David G. (2009). "Stabilizing homeless young people with information and place". Journal of the American Society for Information Science and Technology. 60 (11): 2300–2312. doi:10.1002/asi.21146. ISSN 1532-2890. S2CID 18725449.
  29. ^ a b Denning, Tamara; Borning, Alan; Friedman, Batya; Gill, Brian T.; Kohno, Tadayoshi; Maisel, William H. (2010-04-10). "Patients, pacemakers, and implantable defibrillators". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '10. Atlanta, Georgia, USA: Association for Computing Machinery. pp. 917–926. doi:10.1145/1753326.1753462. ISBN 978-1-60558-929-9. S2CID 16571765.
  30. ^ a b c Yoo, Daisy; Huldtgren, Alina; Woelfer, Jill Palzkill; Hendry, David G.; Friedman, Batya (2013-04-27). "A value sensitive action-reflection model". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '13. Paris, France: Association for Computing Machinery. pp. 419–428. doi:10.1145/2470654.2470715. ISBN 978-1-4503-1899-0. S2CID 2603883.
  31. ^ Nathan, Lisa P. (2012). "Sustainable information practice: An ethnographic investigation". Journal of the American Society for Information Science and Technology. 63 (11): 2254–2268. doi:10.1002/asi.22726. ISSN 1532-2890.
  32. ^ Millett, Lynette I.; Friedman, Batya; Felten, Edward (2001-03-01). "Cookies and Web browser design". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '01. Seattle, Washington, USA: Association for Computing Machinery. pp. 46–52. doi:10.1145/365024.365034. ISBN 978-1-58113-327-1. S2CID 1596706.
  33. ^ a b Yoo, Daisy; Derthick, Katie; Ghassemian, Shaghayegh; Hakizimana, Jean; Gill, Brian; Friedman, Batya (2016-05-07). "Multi-lifespan Design Thinking". Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. CHI '16. San Jose, California, USA: Association for Computing Machinery. pp. 4423–4434. doi:10.1145/2858036.2858366. ISBN 978-1-4503-3362-7. S2CID 2148594.
  34. ^ Kaptein, Maurits; Eckles, Dean; Davis, Janet (2011-09-01). "Envisioning persuasion profiles: challenges for public policy and ethical practice". Interactions. 18 (5): 66–69. doi:10.1145/2008176.2008191. ISSN 1072-5520. S2CID 11099713.
  35. ^ Friedman, Batya; Hendry, David (2012-05-05). "The envisioning cards". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '12. Austin, Texas, USA: Association for Computing Machinery. pp. 1145–1148. doi:10.1145/2207676.2208562. ISBN 978-1-4503-1015-4. S2CID 24059203.
  36. ^ "The Envisioning Cards - VSD". VSD Lab. Retrieved 2024-08-01.
  37. ^ a b Umbrello, Steven (2020-10-30). "Combinatory and Complementary Practices of Values and Virtues in Design: A Reply to Reijers and Gordijn". Filosofia (in Italian) (65): 107–121 Paginazione. doi:10.13135/2704-8195/5236.
  38. ^ a b Reijers, Wessel; Gordijn, Bert (2019-05-13). "Moving from value sensitive design to virtuous practice design". Journal of Information, Communication and Ethics in Society. 17 (2): 196–209. doi:10.1108/JICES-10-2018-0080. hdl:1814/63270. ISSN 1477-996X. S2CID 197695970.
  39. ^ a b Le Dantec, Christopher A.; Poole, Erika Shehan; Wyche, Susan P. (2009). "Values as lived experience". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York, New York, USA: ACM Press. p. 1141. doi:10.1145/1518701.1518875. ISBN 978-1-60558-246-7. S2CID 13933217.
  40. ^ a b Manders-Huits, Noëmi (2011-06-01). "What Values in Design? The Challenge of Incorporating Moral Values into Design". Science and Engineering Ethics. 17 (2): 271–287. doi:10.1007/s11948-010-9198-2. ISSN 1471-5546. PMC 3124645. PMID 20224927.
  41. ^ Umbrello, Steven (2018-05-04). "The moral psychology of value sensitive design: the methodological issues of moral intuitions for responsible innovation". Journal of Responsible Innovation. 5 (2): 186–200. doi:10.1080/23299460.2018.1457401. hdl:2318/1685524. ISSN 2329-9460.
  42. ^ van de Poel, Ibo (September 2020). "Embedding Values in Artificial Intelligence (AI) Systems". Minds and Machines. 30 (3): 385–409. doi:10.1007/s11023-020-09537-4. ISSN 0924-6495. S2CID 222354603.
  43. ^ Floridi, Luciano; Cowls, Josh; King, Thomas C.; Taddeo, Mariarosaria (June 2020). "How to Design AI for Social Good: Seven Essential Factors". Science and Engineering Ethics. 26 (3): 1771–1796. doi:10.1007/s11948-020-00213-5. ISSN 1353-3452. PMC 7286860. PMID 32246245.
  44. ^ Umbrello, Steven; van de Poel, Ibo (2021-02-01). "Mapping value sensitive design onto AI for social good principles". AI and Ethics. 1 (3): 283–296. doi:10.1007/s43681-021-00038-3. ISSN 2730-5953. PMC 7848675. PMID 34790942.

Read other articles:

1856 treaty between Tibet and Nepal This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Treaty of Thapathali – news · newspapers · books · scholar · JSTOR (August 2023) (Learn how and when to remove this template message) Treaty of ThapathaliTreaty of Thapathali(1856)Signed24 March 1856 (Chaitra 13, 1912 B.S.)Lo...

A. Korn et Latil Rechtsform Société Gründung 1898 Auflösung 1902 Sitz Paris, Frankreich Leitung Auguste George Latil Branche Automobilindustrie Fahrzeug von 1898 A. Korn et Latil war ein französischer Hersteller von Automobilen.[1][2][3] Inhaltsverzeichnis 1 Unternehmensgeschichte 2 Fahrzeuge 3 Literatur 4 Weblinks 5 Einzelnachweise Unternehmensgeschichte Auguste George Latil (1878–1961) gründete 1898 das Unternehmen in Paris. Daraufhin begann die Produktion vo...

Halga seducing his own daughter Yrsa, by Jenny Nyström (1895). Incest is found in folklore and mythology in many countries and cultures in the world.[1][2][3][4][5] Polytheistic deities Greek In Greek mythology, Gaia (earth) had 12 children with her own son Uranus (sky).[6][7] She bore six male and six female Titans to her son, Uranus (sky). The male Titans were Oceanus, Coeus, Crius, Hyperion, Iapetus, and Cronus. The female Titans wer...

River in New Hampshire, United StatesWest Branch Warner RiverThe West Branch along Fairgrounds Road in Bradford, NHShow map of New HampshireShow map of the United StatesLocationCountryUnited StatesStateNew HampshireCountyMerrimackTownsNewbury, BradfordPhysical characteristicsSourceMount Sunapee • locationNewbury • coordinates43°14′45″N 72°3′28″W / 43.24583°N 72.05778°W / 43.24583; -72.05778 • elevation1,6...

2023年 3月(弥生) 日 月 火 水 木 金 土 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 365日 各月 1 2 3 4 5 6 7 8 9 10 11 12 3月11日(さんがつじゅういちにち)は、グレゴリオ暦で年始から70日目(閏年では71日目)にあたり、年末まであと295日ある。 できごと 和宮親子内親王(皇女和宮) マッカーサー、オーストラリアに後退(撮影日は1942年3月26日) 惑星探査

Black WidowLagu oleh Pristindari album Hi! PristinDirilis19 Mei 2017 (2017-05-19)FormatUnduh digitalDirekam2017GenreK-popdance-pophip hopEDMDurasi03:13LabelPledis EntertainmentPenciptaRoaSungyeonSimon PetrénYlva DimbergProduserSimon Petrén (versi album)Anchor (versi remix) Black Widow adalah lagu oleh girlband Korea Selatan Pristin untuk album mini pertama mereka Hi! Pristin (2017). Lagu ini diremix dan dirilis sebagai singel kedua dari album pada 19 Mei 2017.[1] Lagu ini ditul...

American baseball player Baseball player Mickey HeathFirst basemanBorn: (1903-10-30)October 30, 1903Toledo, OhioDied: July 30, 1986(1986-07-30) (aged 82)Dallas, TexasBatted: LeftThrew: LeftMLB debutApril 18, 1931, for the Cincinnati RedsLast MLB appearanceJune 5, 1932, for the Cincinnati RedsMLB statisticsBatting average.213Home runs0Runs batted in18 Teams Cincinnati Reds (1931–1932) Minor Wilson Mickey Heath (October 30, 1903 – July 30, 1986) was a prof...

Family of molluscs UnionidaeTemporal range: Middle Jurassic - present, 177–0 Ma PreꞒ Ꞓ O S D C P T J K Pg N Six endangered species of Unionidae Scientific classification Domain: Eukaryota Kingdom: Animalia Phylum: Mollusca Class: Bivalvia Order: Unionida Superfamily: Unionoidea Family: UnionidaeFleming, 1828 Genera See text The Unionidae are a family of freshwater mussels, the largest in the order Unionida, the bivalve molluscs sometimes known as river mussels, or simply as unionid...

Tratado Webster-Ashburton Mapa de las áreas disputadas y la frontera definitiva.Tipo de tratado Tratado de límitesFirmado 9 de agosto de 1842Washington D. C., Estados UnidosPartes  Reino Unido Estados UnidosIdioma Inglés[editar datos en Wikidata] El Tratado Webster-Ashburton es un tratado que resolvió varios problemas de límites entre los Estados Unidos y las colonias británicas en Norteamérica. El tratado se firmó el 9 de agosto de 1842. El tratado en especia...

This article is about the 2014 South Korean film. For the 2018 Philippine remake, see Miss Granny (2018 film). 2014 South Korean filmMiss GrannyPromotional posterHangul수상한 그녀Hanja殊常한 그女Literal meaningSuspicious GirlRevised RomanizationSusanghan GeunyeoMcCune–ReischauerSusanhan Kŭnyŏ Directed byHwang Dong-hyukWritten byShin Dong-ikHong Yun-jeongDong Hee-seonProduced by Jeon Jae-sun Park Ji-seong Lee Jae-pil Im Ji-young Starring Na Moon-hee Shim Eun-kyung CinematographyK...

1990 stage musical ShōgunThe MusicalPromotional ButtonMusicPaul ChiharaLyricsJohn DriverBookJohn DriverBasisJames Clavell's novel ShōgunProductions1990 Kennedy Center 1990 Broadway Shōgun: The Musical is a musical with a book and lyrics by John Driver[1] and music by Paul Chihara.[1] Based on James Clavell's 1976 novel[1] and the 1980 television mini-series of the same name based on it, the musical centers on shipwrecked English sea captain John Blackthorne, who fin...

Nineteenth-century freedom suit Lemmon v. New YorkCourtNew York Court of AppealsDecidedMarch 1860Citation(s)20 N.Y. 562 (1860)Court membershipJudges sittingGeorge F. Comstock (chief), Henry E. Davies, Samuel Lee Selden, Hiram Denio, William B. Wright (acting), Thomas W. Clerke (acting), William J. Bacon (acting), Henry Welles (acting)Case opinionsDecision byDenio, WrightConcurrenceDavis, Bacon, WellesDissentClerke, ComstockKeywordsHabeas corpusslavery Lemmon v. New York, or Lemmon v. The Peop...

Road in Selangor, Malaysia This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Jalan Johan Setia – news · newspapers · books · scholar · JSTOR (January 2021) (Learn how and when to remove this template message) Selangor Route 10Jalan Johan SetiaMajor junctionsWest endJalan Pandamaran-Johan Setia junctions F...

Гвидо Новелло да Полента Дата рождения около 1275 Место рождения Равенна Дата смерти 1323 Место смерти Болонья, Папская область Род деятельности поэт, писатель  Медиафайлы на Викискладе Гвидо Новелло да Полента (итал. Guido Novello da Polenta; около 1275-1333) — сеньор Равен...

Canadian folk music band For the film, see The Weather Station (film). The Weather StationTamara Lindeman at Rough Trade in the UK in 2022Background informationOriginTorontoGenresFolk musicexperimental musicYears active2006 (2006)–presentLabelsFat Possum (current)previously Paradise of Bachelors (U.S., Europe, Australia)Outside (Canada)You've ChangedMembersTamara LindemanBen WhiteleyWill KidmanJohnny SpenceChristine BougieKaren NgEvan CartwrightKieran AdamsPast membersJack DonovanSimon...

Left-Wing Student Group (1953-1971) This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article may rely excessively on sources too closely associated with the subject, potentially preventing the article from being verifiable and neutral. Please help improve it by replacing them with more appropriate citations to reliable, independent, third-party sources. (September 2017) (Learn how and...

Soviet Army lieutenant general Arkhip Ivanovich RuchkinBorn19 September 1898Nizovka, Balashovsky Uyezd, Saratov Governorate, Russian EmpireDied8 November 1979(1979-11-08) (aged 81)Moscow, Soviet UnionAllegiance Russian Empire Soviet Union Service/branch Imperial Russian Army Red Army (Soviet Army from 1946) Years of service 1917 1918–1961 RankLieutenant generalCommands held 31st Guards Rifle Corps 22nd Guards Rifle Corps 2nd Guards Rifle Corps Battles/wars World War I Russian Civi...

This article is part of a series onPolitics of the European Union Member states (27) Austria Belgium Bulgaria Croatia Cyprus Czech Republic Denmark Estonia Finland France Germany Greece Hungary Ireland Italy Latvia Lithuania Luxembourg Malta Netherlands Poland Portugal Romania Slovakia Slovenia Spain Sweden Candidate countries Albania Bosnia and Herzegovina Mo...

Not to be confused with cerium. Chemical element, symbol Cs and atomic number 55Caesium, 55CsCaesiumPronunciation/ˈsiːziəm/ ​(SEE-zee-əm)Alternative namecesium (US)Appearancepale goldStandard atomic weight Ar°(Cs)132.90545196±0.00000006132.91±0.01 (abridged)[1] Caesium in the periodic table Hydrogen Helium Lithium Beryllium Boron Carbon Nitrogen Oxygen Fluorine Neon Sodium Magnesium Aluminium Silicon Phosphorus Sulfur Chlorine Argon Potassium Calcium Sc...

For the 2019 video game, see Destiny 2: Shadowkeep. You can help expand this article with text translated from the corresponding article in German. (October 2011) Click [show] for important translation instructions. View a machine-translated version of the German article. Machine translation, like DeepL or Google Translate, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pas...