Factors mediating disclosure in social network sites
Computers in Human Behavior
"But the data is already public": on the ethics of research in Facebook
Ethics and Information Technology
Cellular telephony and the question of privacy
Communications of the ACM
Researching Personal Information on the Public Web: Methods and Ethics
Social Science Computer Review
Privacy in "the cloud": applying Nissenbaum's theory of contextual integrity
ACM SIGCAS Computers and Society
Trap hunting: finding personal data management issues in next generation AAC devices
SLPAT '11 Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies
Computers in Human Behavior
Understanding and protecting privacy: formal semantics and principled audit mechanisms
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Methods to account for values in human-centered computing
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Designing privacy-aware social networks: a multi-agent approach
Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics
Waiting for the barbarians or shaping new societies?
Information Polity - Special issue on Part 1: Revisiting the Surveillance Camera Revolution: Issues of Governance and Public Policy
Risk communication design: video vs. text
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Consent reconsidered; reframing consent for ubiquitous computing systems
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
HotSec'12 Proceedings of the 7th USENIX conference on Hot Topics in Security
Participatory personal data: An emerging research challenge for the information sciences
Journal of the American Society for Information Science and Technology
People-centric sensing in assistive healthcare: Privacy challenges and directions
Security and Communication Networks
Information technology and privacy: conceptual muddles or privacy vacuums?
Ethics and Information Technology
A PLA-based privacy-enhancing user modeling framework and its evaluation
User Modeling and User-Adapted Interaction
Privacy management in dynamic groups: understanding information privacy in medical practices
Proceedings of the 2013 conference on Computer supported cooperative work
Privacy-aware geolocation interfaces for volunteered geography: a case study
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Crowdsourced and Volunteered Geographic Information
Anita Allen: Unpopular privacy: what must we hide?
Ethics and Information Technology
Proceedings of the 5th Annual ACM Web Science Conference
Using contextual integrity to examine interpersonal information boundary on social network sites
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Can you see me now?: location, visibility and the management of impressions on foursquare
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
An informed view on consent for UbiComp
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems
ACM Transactions on Interactive Intelligent Systems (TiiS)
Cryptagram: photo privacy for online social media
Proceedings of the first ACM conference on Online social networks
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Accountability and deterrence in online life
Proceedings of the 3rd International Web Science Conference
How to see values in social computing: methods for studying values dimensions
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
The policy knot: re-integrating policy, practice and design in cscw studies of social computing
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Privacy intrusiveness and web audiences: Empirical evidence
Telecommunications Policy
A reflexive analysis of 'context' in privacy research: Two case studies in HIV care
International Journal of Human-Computer Studies
A privacy framework for the personal web
The Personal Web
Designing the default privacy settings for facebook applications
Proceedings of the companion publication of the 17th ACM conference on Computer supported cooperative work & social computing
Computers in Human Behavior
The Information Polity: Towards a two speed future?
Information Polity - ICT, public administration and democracy in the coming decade
Contextual integrity's decision heuristic and the tracking by social network sites
Ethics and Information Technology
Lockbox: mobility, privacy and values in cloud storage
Ethics and Information Technology
Hi-index | 0.02 |
Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itselfmost people understand that this is crucial to social life but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contextswhether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.