메뉴 건너뛰기




Volumn 26, Issue 1, 2007, Pages 35-45

Privacy and security as ideology

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; DATA PRIVACY; SOCIAL SCIENCES;

EID: 34147137034     PISSN: 02780097     EISSN: None     Source Type: Journal    
DOI: 10.1109/MTAS.2007.335570     Document Type: Article
Times cited : (13)

References (72)
  • 1
    • 4243136729 scopus 로고    scopus 로고
    • Cryptography and competition policy - Issues with 'trusted computing'
    • L.J. Camp and S. Lewis, Eds. Dordrecht, Germany: Kluwer
    • R. Anderson, "Cryptography and competition policy - Issues with 'trusted computing'," in Economics of Information Security, L.J. Camp and S. Lewis, Eds. Dordrecht, Germany: Kluwer, 2004, pp. 35-52.
    • (2004) Economics of Information Security , pp. 35-52
    • Anderson, R.1
  • 2
    • 84976776710 scopus 로고
    • Using the new ACM Code of Ethics in decision making
    • R.E. Anderson, D.G. Johnson, D. Gotterbarn, and J. Perrolle, "Using the new ACM Code of Ethics in decision making," Commun. ACM, vol 36, no. 2, pp. 98-106, 1993.
    • (1993) Commun. ACM , vol.36 , Issue.2 , pp. 98-106
    • Anderson, R.E.1    Johnson, D.G.2    Gotterbarn, D.3    Perrolle, J.4
  • 4
    • 16444368611 scopus 로고    scopus 로고
    • Privacy in e-commerce: Stated preferences vs. actual behavior
    • B. Berendt, O. Gunther, and S. Spiekerman, "Privacy in e-commerce: Stated preferences vs. actual behavior," in Commun. ACM., vol. 48, no. 4, pp. 101-106, 2005.
    • (2005) Commun. ACM , vol.48 , Issue.4 , pp. 101-106
    • Berendt, B.1    Gunther, O.2    Spiekerman, S.3
  • 5
    • 10644240512 scopus 로고    scopus 로고
    • Ethical guidelines for meeting the challenges of the information age
    • L.J. Pourciau, Ed. West Lafayette, IN: Purdue Univ. Press
    • J.J. Britz "Ethical guidelines for meeting the challenges of the information age," in Ethics and Electronic Information in the 21st Century, L.J. Pourciau, Ed. West Lafayette, IN: Purdue Univ. Press, 1999, pp. 9-28.
    • (1999) Ethics and Electronic Information in the 21st Century , pp. 9-28
    • Britz, J.J.1
  • 6
    • 0035982980 scopus 로고    scopus 로고
    • What does it mean to be 'critical' in IS research?
    • C. Brooke, "What does it mean to be 'critical' in IS research?," J. Information Technology, vol. 17, pp. 49-57, 2002.
    • (2002) J. Information Technology , vol.17 , pp. 49-57
    • Brooke, C.1
  • 7
    • 0033628857 scopus 로고    scopus 로고
    • Ontological security, existential anxiety and workplace privacy
    • W.S. Brown, "Ontological security, existential anxiety and workplace privacy," J. Business Ethics, vol. 23, pp. 61-65, 2000.
    • (2000) J. Business Ethics , vol.23 , pp. 61-65
    • Brown, W.S.1
  • 8
    • 34147156504 scopus 로고    scopus 로고
    • Web security and privacy: An American perspective
    • R.A. Spinello and H.T. Tavani, Eds. Sudbury, MA, Jones and Bartlett
    • L.J. Camp, "Web security and privacy: An American perspective," in Readings in Cyberethics, R.A. Spinello and H.T. Tavani, Eds. Sudbury, MA.: Jones and Bartlett, 2001, pp. 474-486.
    • (2001) Readings in Cyberethics , pp. 474-486
    • Camp, L.J.1
  • 9
    • 25444455106 scopus 로고    scopus 로고
    • L.J. Camp and S. Lewis, Eds, Dordrecht, Germany: Kluwer
    • L.J. Camp and S. Lewis, Eds. Economics of Information Security. Dordrecht, Germany: Kluwer, 2004.
    • (2004) Economics of Information Security
  • 10
    • 32644462017 scopus 로고    scopus 로고
    • Pricing security - A market in vulnerabilities
    • L.J. Camp and S. Lewis, Eds. Dordrecht, Germany: Kluwer, pp
    • L.J. Camp and C. Wolfram, "Pricing security - A market in vulnerabilities," in Economics of Information Security, L.J. Camp and S. Lewis, Eds. Dordrecht, Germany: Kluwer, pp. 17-34, 2004.
    • (2004) Economics of Information Security , pp. 17-34
    • Camp, L.J.1    Wolfram, C.2
  • 11
    • 0036600633 scopus 로고    scopus 로고
    • Law enforcement surveillance in the network society
    • S. Chan and L.J. Camp, "Law enforcement surveillance in the network society," IEEE Technology and Society Mag., vol. 21, no. 2, pp. 22-30, 2002.
    • (2002) IEEE Technology and Society Mag , vol.21 , Issue.2 , pp. 22-30
    • Chan, S.1    Camp, L.J.2
  • 12
    • 34147189365 scopus 로고    scopus 로고
    • Economics of IT security management
    • L.J. Camp and S. Lewis, Eds, Dordrecht, Germany: Kluwer, pp
    • H Cavusoglu, "Economics of IT security management," in Economics of Information Security, L.J. Camp and S. Lewis, Eds., Dordrecht, Germany: Kluwer, pp. 71-83, 2004.
    • (2004) Economics of Information Security , pp. 71-83
    • Cavusoglu, H.1
  • 13
    • 0001501223 scopus 로고
    • How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use
    • M.J. Culnan, "How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use," MIS Quarterly, vol. 17, no. 3, pp. 341-363, 1993.
    • (1993) MIS Quarterly , vol.17 , Issue.3 , pp. 341-363
    • Culnan, M.J.1
  • 14
    • 84904323681 scopus 로고    scopus 로고
    • The discourse of learning technology in Canada: Understanding communication distortions and the implications for decision making
    • E. Wynn, E. Whitley, M. Myers, and J. DeGross, Eds. Dordrecht, Germany: Kluwer
    • W. Cukier, C. Middleton, and R. Bauer, "The discourse of learning technology in Canada: Understanding communication distortions and the implications for decision making," in Global and Organizational Discourse About Information Technology, E. Wynn, E. Whitley, M. Myers, and J. DeGross, Eds. Dordrecht, Germany: Kluwer, 2003, pp. 197-221.
    • (2003) Global and Organizational Discourse About Information Technology , pp. 197-221
    • Cukier, W.1    Middleton, C.2    Bauer, R.3
  • 15
    • 74549207774 scopus 로고    scopus 로고
    • Applying Habermas' validity claims as a standard for critical discourse analysis
    • B. Kaplan, D Truex, T. Wood-Harper, and J. DeGross, Eds. Dordrecht, Germany: Kluwar
    • W. Cukier, C. Middleton, and R. Bauer, "Applying Habermas' validity claims as a standard for critical discourse analysis," in Information Systems Research - Relevant Theory and Informed Practice, B. Kaplan, D Truex, T. Wood-Harper, and J. DeGross, Eds. Dordrecht, Germany: Kluwar, 2004, pp. 233-258.
    • (2004) Information Systems Research - Relevant Theory and Informed Practice , pp. 233-258
    • Cukier, W.1    Middleton, C.2    Bauer, R.3
  • 16
    • 0005199016 scopus 로고    scopus 로고
    • Privacy, respect for persons, and risk
    • C. Ess, Ed. Albany NY:: State Univ. of New York Press
    • D. Elgesiem, "Privacy, respect for persons, and risk," in Philosophical Perspectives on Computer-Mediated Communication, C. Ess, Ed. Albany NY:: State Univ. of New York Press, 1996, pp. 45-66.
    • (1996) Philosophical Perspectives on Computer-Mediated Communication , pp. 45-66
    • Elgesiem, D.1
  • 22
    • 0040863368 scopus 로고
    • Privacy and limits of law
    • D.G. Johnson and H. Nissenbaum, Eds. Upper Saddle River, NJ: Prentice Hall, pp
    • R. Gavison, "Privacy and limits of law," in Computers, Ethics and Social Values, D.G. Johnson and H. Nissenbaum, Eds. Upper Saddle River, NJ: Prentice Hall, pp. 332-351, 1995.
    • (1995) Computers, Ethics and Social Values , pp. 332-351
    • Gavison, R.1
  • 27
    • 53349119070 scopus 로고
    • Realizing emancipatory principles in information systems development: The case for ETHICS
    • R. Hirschheim and H.K. Klein, "Realizing emancipatory principles in information systems development: The case for ETHICS," MIS Quarterly vol. 18, no. 1, pp. 83-109, 1994.
    • (1994) MIS Quarterly , vol.18 , Issue.1 , pp. 83-109
    • Hirschheim, R.1    Klein, H.K.2
  • 28
    • 0041540817 scopus 로고    scopus 로고
    • Building consumer trust online
    • D.L. Hoffman, T.P. Novak, and M. Peralta, "Building consumer trust online," Commun. ACM, vol. 42, no. 4, pp. 80-87, 1999.
    • (1999) Commun. ACM , vol.42 , Issue.4 , pp. 80-87
    • Hoffman, D.L.1    Novak, T.P.2    Peralta, M.3
  • 29
    • 34147109570 scopus 로고    scopus 로고
    • Privacy and the computer - Why we need privacy in the information society
    • R.M. Baird, R. Ramsower, and S.E. Rosenbaum, Eds. New York, NY: Prometheus
    • L. Introna, "Privacy and the computer - Why we need privacy in the information society," in Cyberethics - Social and Moral Issues in the Computer Age, R.M. Baird, R. Ramsower, and S.E. Rosenbaum, Eds. New York, NY: Prometheus, 2000, pp. 188-199.
    • (2000) Cyberethics - Social and Moral Issues in the Computer Age , pp. 188-199
    • Introna, L.1
  • 31
    • 0004197846 scopus 로고    scopus 로고
    • 3rd ed. Upper Saddle River, NJ: Prentice Hall
    • D.G. Johnson, Computer Ethics, 3rd ed. Upper Saddle River, NJ: Prentice Hall, 2001.
    • (2001) Computer Ethics
    • Johnson, D.G.1
  • 32
    • 54649084295 scopus 로고    scopus 로고
    • Trust management on the World Wide Web
    • R. Khare and A. Rifkin "Trust management on the World Wide Web," First Monday, vol. 3, no. 6, 1998; www.firstmonday.dk.
    • (1998) First Monday , vol.3 , Issue.6
    • Khare, R.1    Rifkin, A.2
  • 33
    • 34147102602 scopus 로고    scopus 로고
    • A critical look at the regulation of computer viruses
    • M. Klang "A critical look at the regulation of computer viruses," Int. J. Law and Information Technology, vol. 11, pp. 162-183, 2003.
    • (2003) Int. J. Law and Information Technology , vol.11 , pp. 162-183
    • Klang, M.1
  • 34
    • 2442435192 scopus 로고    scopus 로고
    • The critical social theory of Jürgen Habermas and its implications for IS research
    • J. Mingers and L. Willcocks, Eds. Chichester, U.K, Wiley
    • H.K. Klein and M.Q. Huynh "The critical social theory of Jürgen Habermas and its implications for IS research," in Social Theory and Philosophy for Information Systems, J. Mingers and L. Willcocks, Eds. Chichester, U.K.: Wiley, 2004, pp. 157-237.
    • (2004) Social Theory and Philosophy for Information Systems , pp. 157-237
    • Klein, H.K.1    Huynh, M.Q.2
  • 35
    • 34147161491 scopus 로고
    • A Survey of Formal Models for Computer Security
    • 8489. Washington D.C, Naval Research Laboratory
    • C.E. Landwehr, A Survey of Formal Models for Computer Security, NRL Rep. 8489. Washington D.C.: Naval Research Laboratory, 1981.
    • (1981) NRL Rep
    • Landwehr, C.E.1
  • 38
    • 55249097295 scopus 로고
    • Four ethical issues of the information age
    • R.O. Mason, "Four ethical issues of the information age," MIS Quarterly, vol. 10, pp. 5-12, 1986.
    • (1986) MIS Quarterly , vol.10 , pp. 5-12
    • Mason, R.O.1
  • 39
    • 0036950728 scopus 로고    scopus 로고
    • The stakeholder dimension in information systems evaluation
    • L. McAulay, N. Doherty, and N. Keval, "The stakeholder dimension in information systems evaluation," J. Information Technol., vol. 17, pp. 241-255, 2002.
    • (2002) J. Information Technol , vol.17 , pp. 241-255
    • McAulay, L.1    Doherty, N.2    Keval, N.3
  • 40
    • 34147168462 scopus 로고    scopus 로고
    • Reason, relativity, and responsibility in computer ethics
    • T.W. Bynum and S. Rogerson, Eds. Oxford, U.K, Blackwell
    • J.H. Moor, "Reason, relativity, and responsibility in computer ethics," in Computer Ethics and Professional Responsibility, T.W. Bynum and S. Rogerson, Eds. Oxford, U.K.: Blackwell, 2004, pp. 21-38.
    • (2004) Computer Ethics and Professional Responsibility , pp. 21-38
    • Moor, J.H.1
  • 41
    • 7744239012 scopus 로고    scopus 로고
    • If Aristotle were a computing professional
    • R.M. Baird, R. Ramsower, and S.E. Rosenbaum, Eds. New York, NY: Prometheus
    • J.H. Moor, "If Aristotle were a computing professional," in Cyberethics - Social and Moral Issues in the Computer Age, R.M. Baird, R. Ramsower, and S.E. Rosenbaum, Eds. New York, NY: Prometheus, 2000, pp. 34-40.
    • (2000) Cyberethics - Social and Moral Issues in the Computer Age , pp. 34-40
    • Moor, J.H.1
  • 42
    • 0942281483 scopus 로고    scopus 로고
    • Toward a theory of privacy in the information age
    • R.M. Baird, R. Ramsower, and S.E. Rosenbaum, Eds. New York, NY: Prometheus
    • J.H. Moor, "Toward a theory of privacy in the information age," in Cyberethics - Social and Moral Issues in the Computer Age, R.M. Baird, R. Ramsower, and S.E. Rosenbaum, Eds. New York, NY: Prometheus, 2000, pp. 200-212.
    • (2000) Cyberethics - Social and Moral Issues in the Computer Age , pp. 200-212
    • Moor, J.H.1
  • 43
    • 84981430537 scopus 로고
    • What is computer ethics?
    • J.H. Moor, "What is computer ethics?," Metaphilosophy, vol. 16, no. 4, pp. 266-275, 1985.
    • (1985) Metaphilosophy , vol.16 , Issue.4 , pp. 266-275
    • Moor, J.H.1
  • 45
    • 31144461818 scopus 로고    scopus 로고
    • Where computer security meets National security
    • H. Nissenbaum, "Where computer security meets National security," Ethics and Information Technology, vol. 7, no. 2, pp. 61-73, 2005.
    • (2005) Ethics and Information Technology , vol.7 , Issue.2 , pp. 61-73
    • Nissenbaum, H.1
  • 46
    • 0142121793 scopus 로고    scopus 로고
    • Can trust be secured online? A theoretical perspective
    • etica/, accessed May 26
    • H. Nissenbaum, "Can trust be secured online? A theoretical perspective," etica and politica, vol. 1, no. 2, 1999; http://www.units.it/~etica/, accessed May 26, 2006.
    • (1999) etica and politica , vol.1 , Issue.2
    • Nissenbaum, H.1
  • 47
    • 71549126429 scopus 로고
    • Studying information technology in organizations: Research approaches and assumptions
    • W.J. Orlikowski and J.J. Baroudi, "Studying information technology in organizations: Research approaches and assumptions," Information Systems Research, vol. 2, no. 1, pp. 1-28, 1991.
    • (1991) Information Systems Research , vol.2 , Issue.1 , pp. 1-28
    • Orlikowski, W.J.1    Baroudi, J.J.2
  • 49
    • 7744229341 scopus 로고
    • Why privacy is important
    • J.G. Johnson and H. Nissenbaum, Eds. Upper Saddle River, NJ: Prentice Hall
    • J. Rachels, "Why privacy is important," in Computers, Ethics and Social Values, J.G. Johnson and H. Nissenbaum, Eds. Upper Saddle River, NJ: Prentice Hall, 1995, pp. 351-357.
    • (1995) Computers, Ethics and Social Values , pp. 351-357
    • Rachels, J.1
  • 50
    • 34147096224 scopus 로고    scopus 로고
    • Privacy and appropriation of identity
    • G. Collste, Ed. Linköping, Sweden: Centre for Applied Ethics
    • W.L. Robison, "Privacy and appropriation of identity," in Ethics in the Age of Information Technology, G. Collste, Ed. Linköping, Sweden: Centre for Applied Ethics, 2000, pp. 70-86.
    • (2000) Ethics in the Age of Information Technology , pp. 70-86
    • Robison, W.L.1
  • 52
    • 34147114106 scopus 로고    scopus 로고
    • Communications Privacy: Implications for Network Design
    • R. Stichler and R. Hauptman, Eds. Jefferson, NC: MacFarland
    • M. Rotenberg, "Communications Privacy: Implications for Network Design," in: Ethics, Information and Technology: Readings, R. Stichler and R. Hauptman, Eds. Jefferson, NC: MacFarland, 1998, pp. 152-168.
    • (1998) Ethics, Information and Technology: Readings , pp. 152-168
    • Rotenberg, M.1
  • 53
    • 22044441059 scopus 로고    scopus 로고
    • From the sociology of trust towards a sociology of 'e-trust,' Int
    • J. Rutter, "From the sociology of trust towards a sociology of 'e-trust,'" Int. J. New Product Development and Innovation Management, vol. 2, no. 4, pp. 371-385, 1999.
    • (1999) J. New Product Development and Innovation Management , vol.2 , Issue.4 , pp. 371-385
    • Rutter, J.1
  • 54
    • 34147169760 scopus 로고    scopus 로고
    • Beyond utopian and nostalgic views of information technology and education: Implications for research and practice
    • S. Sahay, "Beyond utopian and nostalgic views of information technology and education: Implications for research and practice," J. Association for Information Systems, vol. 5, no. 7, pp. 282-313, 2004.
    • (2004) J. Association for Information Systems , vol.5 , Issue.7 , pp. 282-313
    • Sahay, S.1
  • 55
    • 0035982982 scopus 로고    scopus 로고
    • Information technology and ideology
    • K. Saravanamuthu, "Information technology and ideology," J. Information Technology, vol. 17, pp. 79-87, 2002.
    • (2002) J. Information Technology , vol.17 , pp. 79-87
    • Saravanamuthu, K.1
  • 56
    • 0002112928 scopus 로고
    • Science and ideology
    • 2nd ed, D.M. Hausman, Ed. Cambridge, U.K, Cambridge Univ. Press
    • J. Schumpeter, "Science and ideology," in The Philosophy of Economics: An Anthology, 2nd ed., D.M. Hausman, Ed. Cambridge, U.K.: Cambridge Univ. Press, 1994, pp. 224-238.
    • (1994) The Philosophy of Economics: An Anthology , pp. 224-238
    • Schumpeter, J.1
  • 58
    • 34147122389 scopus 로고    scopus 로고
    • What price privacy? (and why identity theft is about neither identity nor theft)
    • L.J. Camp and S. Lewis, Eds. Dordrecht, Germany: Kluwer, pp
    • A. Shostack and P. Syverson, "What price privacy? (and why identity theft is about neither identity nor theft)," in Economics of Information Security, L.J. Camp and S. Lewis, Eds. Dordrecht, Germany: Kluwer, pp. 129-142, 2004.
    • (2004) Economics of Information Security , pp. 129-142
    • Shostack, A.1    Syverson, P.2
  • 59
    • 84976693761 scopus 로고
    • The ethical and legal quandary of email privacy
    • J.C. Sipior and B.T. Ward, "The ethical and legal quandary of email privacy" Commun. ACM, vol. 38, no. 12, pp. 48-54, 1995.
    • (1995) Commun. ACM , vol.38 , Issue.12 , pp. 48-54
    • Sipior, J.C.1    Ward, B.T.2
  • 61
    • 33845522161 scopus 로고    scopus 로고
    • Electronic monitoring in the work-place: If people don't care, then what is the relevance?
    • J. Weckert, Ed. Hershey, PA: Idea-Group
    • B.S. Stahl, M. Prior, S. Wilford, and D. Collins, "Electronic monitoring in the work-place: If people don't care, then what is the relevance?," in Electronic Monitoring in the Workplace: Controversies and Solutions, J. Weckert, Ed. Hershey, PA: Idea-Group, 2005, pp. 50-78, 2005.
    • (2005) Electronic Monitoring in the Workplace: Controversies and Solutions , pp. 50-78
    • Stahl, B.S.1    Prior, M.2    Wilford, S.3    Collins, D.4
  • 62
    • 2642578963 scopus 로고    scopus 로고
    • B.C. Stahl, Responsibility for information assurance and privacy: A problem of individual ethics?, J. Organizational and End User Computing (Special Issue on Information Assurance and Security), C.D. Schou and K.J. Trimmer, Eds., 16, no. 3, pp. 59-77, 2004.
    • B.C. Stahl, "Responsibility for information assurance and privacy: A problem of individual ethics?," J. Organizational and End User Computing (Special Issue on Information Assurance and Security), C.D. Schou and K.J. Trimmer, Eds., vol. 16, no. 3, pp. 59-77, 2004.
  • 64
    • 53349102510 scopus 로고
    • Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy
    • D.W. Straub and R.W. Collins, "Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy," MIS Quarterly, vol. 14, pp. 143-156, 1990.
    • (1990) MIS Quarterly , vol.14 , pp. 143-156
    • Straub, D.W.1    Collins, R.W.2
  • 65
    • 0002363511 scopus 로고    scopus 로고
    • Privacy and security
    • D Langford, Ed. London, U.K, McMillan
    • H. Tavani, "Privacy and security," in Internet Ethics, D Langford, Ed. London, U.K.: McMillan, 2000, pp. 65-89.
    • (2000) Internet Ethics , pp. 65-89
    • Tavani, H.1
  • 66
    • 34147134135 scopus 로고    scopus 로고
    • Privacy protection, control of information, and privacy-enhancing technologies
    • R.A. Spinello and H.T. Tavani, Eds. Sudbury, MA: Jones and Bartlett
    • H.T. Tavani and J.T. Moor, "Privacy protection, control of information, and privacy-enhancing technologies," in Readings in Cyberethics, R.A. Spinello and H.T. Tavani, Eds. Sudbury, MA: Jones and Bartlett, 2001, pp. 378-391.
    • (2001) Readings in Cyberethics , pp. 378-391
    • Tavani, H.T.1    Moor, J.T.2
  • 68
    • 0002686025 scopus 로고    scopus 로고
    • Trust (and mistrust) in secure applications
    • J. Viega, T. Kohno and B. Potter, "Trust (and mistrust) in secure applications," Commun. ACM, vol. 44, no. 2, pp. 31-36, 2001.
    • (2001) Commun. ACM , vol.44 , Issue.2 , pp. 31-36
    • Viega, J.1    Kohno, T.2    Potter, B.3
  • 69
    • 34147141708 scopus 로고    scopus 로고
    • Cracking the computer forensics mystery
    • C. Wall and J. Paroff, "Cracking the computer forensics mystery," Computer and Internet Lawyer, vol. 22, no. 4, pp. 1-6, 2005.
    • (2005) Computer and Internet Lawyer , vol.22 , Issue.4 , pp. 1-6
    • Wall, C.1    Paroff, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.