Privacy policies and practices: inside the organizational maze
Communications of the ACM
Applying ethics to information technology issues
Communications of the ACM
Ethics and information systems: the corporate domain
MIS Quarterly - Special issue on intensive research in information systems
Trust and Risk in Internet Commerce
Trust and Risk in Internet Commerce
Ethics of Information Management
Ethics of Information Management
Information Ecology: Mastering the Information and Knowledge Environment
Information Ecology: Mastering the Information and Knowledge Environment
Ethics and information systems: Resolving the quandaries
ACM SIGMIS Database
Usability and privacy: a study of Kazaa P2P file-sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
What You Don't Know Can Hurt You: Privacy in Collaborative Computing
HCI '96 Proceedings of HCI on People and Computers XI
SEC '02 Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives
Trust: A Collision of Paradigms
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
The mechanics of trust: a framework for research and design
International Journal of Human-Computer Studies
Working with information: information management and culture in a professional services organization
Journal of Information Science
What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology
International Journal of Electronic Commerce
Information culture and information use: An exploratory study of three organizations
Journal of the American Society for Information Science and Technology
An Information Security Governance Framework
Information Systems Management
Information displays for managing shared files
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Security and Privacy Challenges in the Smart Grid
IEEE Security and Privacy
A Formalization of HIPAA for a Medical Messaging System
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
IEEE Security and Privacy
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Determinants of consumers' perceived trust in IT-ecosystems
Journal of Theoretical and Applied Electronic Commerce Research
Private memoirs of a smart meter
Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building
Trust and TAM in online shopping: an integrated model
MIS Quarterly
Privacy-by-design in ITS applications
WOWMOM '11 Proceedings of the 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
Assessing information culture-an exploratory model
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 0.00 |
Privacy research has not helped practitioners -- who struggle to reconcile users' demands for information privacy with information security, legislation, information management and use -- to improve privacy practice. Beginning with the principle that information security is necessary but not sufficient for privacy, we present an innovative layered framework - the Privacy Security Trust (PST) Framework - which integrates, in one model, the different activities practitioners must undertake for effective privacy practice. The PST Framework considers information security, information management and data protection legislation as privacy hygiene factors, representing the minimum processes for effective privacy practice. The framework also includes privacy influencers - developed from previous research in information security culture, information ethics and information culture - and privacy by design principles. The framework helps to deliver good privacy practice by providing: 1) a clear hierarchy of the activities needed for effective privacy practice; 2) delineation of information security and privacy; and 3) justification for placing data protection at the heart of those activities involved in maintaining information privacy. We present a proof-of-concept application of the PST Framework to an example technology -- electricity smart meters.