메뉴 건너뛰기




Volumn 15, Issue 2, 2008, Pages

From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary

Author keywords

Design methods; Privacy; Proportionality; Requirements analysis; Risk analysis; Social issues; Ubiquitous computing

Indexed keywords

BALANCE (WEIGHTING); COMPREHENSIVE DESIGNS; DATA PROTECTION; DESIGN METHODS; HCI PRACTITIONERS; IT APPLICATIONS;

EID: 47249131693     PISSN: 10730516     EISSN: 15577325     Source Type: Journal    
DOI: 10.1145/1375761.1375763     Document Type: Article
Times cited : (9)

References (59)
  • 3
    • 0037299043 scopus 로고    scopus 로고
    • Understanding the differences between how novice and experienced designers aapproach design tasks
    • AHMED, S., WALLACE,K.,ANDBLESSING,L. 2003. Understanding the differences between how novice and experienced designers aapproach design tasks. Resear. Engin. Design 14, 1, 1-11.
    • (2003) Resear. Engin. Design , vol.14 , Issue.1 , pp. 1-11
    • AHMED, S.1    WALLACE, K.2    ANDBLESSING, L.3
  • 6
    • 84993894931 scopus 로고
    • Privacy regulation: Culturally universal or culturally specific?
    • ALTMAN, I. 1977. Privacy regulation: Culturally universal or culturally specific?. J. Soc. Iss. 33, 3, 66-84.
    • (1977) J. Soc. Iss , vol.33 , Issue.3 , pp. 66-84
    • ALTMAN, I.1
  • 7
    • 47249099244 scopus 로고    scopus 로고
    • ASSOCIATION FOR COMPUTING MACHINERY
    • ASSOCIATION FOR COMPUTING MACHINERY. ACM code of ethics. http://www.acm.org/serving/ ethics.html.
    • ACM code of ethics
  • 8
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • BASKERVILLE, R. 1993. Information systems security design methods: Implications for information systems development. ACM Comput. Surv. 25, 4, 375-414.
    • (1993) ACM Comput. Surv , vol.25 , Issue.4 , pp. 375-414
    • BASKERVILLE, R.1
  • 13
    • 84976717439 scopus 로고
    • Scaling up: A research agenda for software engineering
    • COMPUTER SCIENCE AND TECHNOLOGY BOARD
    • COMPUTER SCIENCE AND TECHNOLOGY BOARD. 1990. Scaling up: A research agenda for software engineering. Com. ACM 33, 3, 281-293.
    • (1990) Com. ACM , vol.33 , Issue.3 , pp. 281-293
  • 16
    • 19944399587 scopus 로고    scopus 로고
    • Privacy, Security ... and Risk and Danger and Secrecy and Trust and Morality and Identity and Power: Understanding Collective Information Practices
    • Tech. rep. UCI-ISR-05-1. Institute for Software Research, University of California at Irvine
    • DOURISH, P. AND ANDERSON, K. 2005. Privacy, Security ... and Risk and Danger and Secrecy and Trust and Morality and Identity and Power: Understanding Collective Information Practices. Tech. rep. UCI-ISR-05-1. Institute for Software Research, University of California at Irvine.
    • (2005)
    • DOURISH, P.1    ANDERSON, K.2
  • 18
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data
    • EU DIRECTIVE. 1995. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data. Official Journal of the European Communities L281, 31-50.
    • (1995) Official Journal of the European Communities , vol.L281 , pp. 31-50
    • DIRECTIVE, E.1
  • 19
    • 47249091173 scopus 로고    scopus 로고
    • EUROPEAN COMMISSION ARTICLE 29 WORKING PARTY. 2004. Opinion 4/2004 on the Processing of Personal Data by Means of Video Surveillance. 11750/02/EN WP 89.
    • EUROPEAN COMMISSION ARTICLE 29 WORKING PARTY. 2004. Opinion 4/2004 on the Processing of Personal Data by Means of Video Surveillance. 11750/02/EN WP 89.
  • 24
    • 34948898464 scopus 로고    scopus 로고
    • Lexis Nexis data breach far worse than reported
    • 4/13/05
    • GREENE, T. C. 2005. Lexis Nexis data breach far worse than reported. The Register, 4/13/05.
    • (2005) The Register
    • GREENE, T.C.1
  • 25
  • 26
    • 8844249460 scopus 로고    scopus 로고
    • Assessing the human, social and environmental risks of pervasive computing
    • HILTY, L. M., SOM, C., AND KÖHLER, A. 2004. Assessing the human, social and environmental risks of pervasive computing. Hum. Ecolog. Risk Assess. 10, 853-874.
    • (2004) Hum. Ecolog. Risk Assess , vol.10 , pp. 853-874
    • HILTY, L.M.1    SOM, C.2    KÖHLER, A.3
  • 30
    • 36549045395 scopus 로고    scopus 로고
    • PhD Dissertation. College of Computing, Georgia Institute of Technology, Atlanta, GA
    • IACHELLO, G. 2006. Privacy and proportionality. PhD Dissertation. College of Computing, Georgia Institute of Technology, Atlanta, GA. http://etd.gatech.edu.
    • (2006) Privacy and proportionality
    • IACHELLO, G.1
  • 31
    • 47249135894 scopus 로고    scopus 로고
    • An evaluation of the comprehensibility and usability of a design method for ubiquitous computing applications
    • GIT-GVU-05-32, Georgia Institute of Technology, Atlanta, GA
    • IACHELLO, G. AND ABOWD, G. D. 2005a. An evaluation of the comprehensibility and usability of a design method for ubiquitous computing applications. GVU Tech. rep. GIT-GVU-05-32, Georgia Institute of Technology, Atlanta, GA.
    • (2005) GVU Tech. rep
    • IACHELLO, G.1    ABOWD, G.D.2
  • 32
  • 35
    • 47249121126 scopus 로고    scopus 로고
    • INTERNATIONAL ORGANIZATION FOR STANDARDIZATION/INTERNATIONAL ELECTROTECHNICAL COMMISSION 2000a. IS 15408: Common Criteria for Information Technology Security Evaluation.
    • INTERNATIONAL ORGANIZATION FOR STANDARDIZATION/INTERNATIONAL ELECTROTECHNICAL COMMISSION 2000a. IS 15408: Common Criteria for Information Technology Security Evaluation.
  • 36
    • 47249131926 scopus 로고    scopus 로고
    • INTERNATIONAL ORGANIZATION FOR STANDARDIZATION/INTERNATIONAL ELECTROTECHNICAL COMMISSION 2000b. IS 17799:2000 Information Technology - Code of Practice for Information Security Management.
    • INTERNATIONAL ORGANIZATION FOR STANDARDIZATION/INTERNATIONAL ELECTROTECHNICAL COMMISSION 2000b. IS 17799:2000 Information Technology - Code of Practice for Information Security Management.
  • 37
    • 36549072774 scopus 로고    scopus 로고
    • PhD. Dissertation. Georgia Institute of Technology, College of Computing, Atlanta, GA
    • JENSEN, C. 2005. Designing for privacy in interactive systems. PhD. Dissertation. Georgia Institute of Technology, College of Computing, Atlanta, GA. http://etd.gatech.edu.
    • (2005) Designing for privacy in interactive systems
    • JENSEN, C.1
  • 38
    • 47249098812 scopus 로고    scopus 로고
    • A structured analysis framework for privacy. GVU Tech. rep. 05-02. Georgia Institute of Technology, Atlanta, GA
    • JENSEN, C., TULLIO, J., POTTS, C., AND MYNATT, E. D. 2005. Strap: A structured analysis framework for privacy. GVU Tech. rep. 05-02. Georgia Institute of Technology, Atlanta, GA.
    • (2005) Strap
    • JENSEN, C.1    TULLIO, J.2    POTTS, C.3    MYNATT, E.D.4
  • 44
    • 0004284157 scopus 로고
    • NIELSEN, J. AND MACK, R. L, Eds, John Wiley & Sons, New York, NY
    • NIELSEN, J. AND MACK, R. L., Eds. 1994. Usability Inspection Methods. John Wiley & Sons, New York, NY.
    • (1994) Usability Inspection Methods
  • 47
    • 0038037379 scopus 로고    scopus 로고
    • Unpacking "privacy" for a networked world
    • PALEN, L. AND DOURISH, P. 2003. Unpacking "privacy" for a networked world. CHI Lett. 5, 1, 129-136.
    • (2003) CHI Lett , vol.5 , Issue.1 , pp. 129-136
    • PALEN, L.1    DOURISH, P.2
  • 48
    • 35248872156 scopus 로고    scopus 로고
    • From privacy legislation to interface design: Implementing information privacy in human-computer interactions
    • Springer Verlag
    • PATRICK, A. S. AND KENNY, S. 2003. From privacy legislation to interface design: Implementing information privacy in human-computer interactions. Lecture Notes in Computer Science, vol. 2760. Springer Verlag, 107-124.
    • (2003) Lecture Notes in Computer Science , vol.2760 , pp. 107-124
    • PATRICK, A.S.1    KENNY, S.2
  • 49
    • 47249165025 scopus 로고    scopus 로고
    • Consumer privacy attitudes: A major shift since 2000 and why
    • PRIVACY & AMERICAN BUSINESS
    • PRIVACY & AMERICAN BUSINESS 2003. Consumer privacy attitudes: A major shift since 2000 and why. Privacy Amer. Bus. News. 10, 6.
    • (2003) Privacy Amer. Bus. News , vol.10 , pp. 6
  • 51
    • 0034440052 scopus 로고    scopus 로고
    • A survey of design rationale systems: Approaches, representation capture and retrieval
    • REGLI, W. C., HU, X., ATWOOD, M., AND SUN, W. 2000. A survey of design rationale systems: Approaches, representation capture and retrieval. Eng. Comput. 16, 209-235.
    • (2000) Eng. Comput , vol.16 , pp. 209-235
    • REGLI, W.C.1    HU, X.2    ATWOOD, M.3    SUN, W.4
  • 52
    • 36549058537 scopus 로고    scopus 로고
    • The five most shocking things about the choice point debacle
    • 5/01/05
    • SCALET, S. D. 2005. The five most shocking things about the choice point debacle. CSO Mag. 5/01/05.
    • (2005) CSO Mag
    • SCALET, S.D.1
  • 53
    • 0036063961 scopus 로고    scopus 로고
    • Information management of automatic data capture: An overview of technical developments
    • SMITH, A. D. AND OFFODILE, F. 2002. Information management of automatic data capture: An overview of technical developments. Inform. Manag. Comput. Secur. 10, 3, 109-118.
    • (2002) Inform. Manag. Comput. Secur , vol.10 , Issue.3 , pp. 109-118
    • SMITH, A.D.1    OFFODILE, F.2
  • 54
    • 0026869935 scopus 로고
    • Toward objective, systematic design-method comparisons
    • SONG, X. AND OSTERWEIL, L. J. 1992. Toward objective, systematic design-method comparisons. IEEE Softw. 9, 3, 43-53.
    • (1992) IEEE Softw , vol.9 , Issue.3 , pp. 43-53
    • SONG, X.1    OSTERWEIL, L.J.2
  • 55
    • 36549065994 scopus 로고    scopus 로고
    • On the effective use and reuse of HCI knowledge
    • J. M. Carroll, Ed. ACM Press
    • SUTCLIFFE, A. 2000. On the effective use and reuse of HCI knowledge. In Human-Computer Interaction in the New Millennium. J. M. Carroll, Ed. ACM Press, 3-29.
    • (2000) Human-Computer Interaction in the New Millennium , pp. 3-29
    • SUTCLIFFE, A.1
  • 56
    • 33646209527 scopus 로고    scopus 로고
    • TREASURY BOARD OF THE GOVERNMENT OF CANADA, Last accessed
    • TREASURY BOARD OF THE GOVERNMENT OF CANADA. 2002. Privacy impact assessment policy. http://www.tbs-sct.gc. ca/pubs_pol/ciopubs/pia-pefr/siglist_e.asp. Last accessed: 8/1/2006.
    • (2002) Privacy impact assessment policy , pp. 8-1
  • 57
    • 47249091648 scopus 로고    scopus 로고
    • UNITED STATES DEPARTMENT OF HEALTH EDUCATION AND WELFARE. 1973. Records, computers and the rights of Citizens, Report of the Secretary's Advisory Committee on Automated Personal Data Systems.
    • UNITED STATES DEPARTMENT OF HEALTH EDUCATION AND WELFARE. 1973. Records, computers and the rights of Citizens, Report of the Secretary's Advisory Committee on Automated Personal Data Systems.
  • 59
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: Toward a unified view
    • VENKATESH, V., MORRIS, M. G., DAVIS, G. B., AND DAVIS, F. D. 2003. User acceptance of information technology: Toward a unified view. MIS Quarterly 27, 3, 425-478.
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • VENKATESH, V.1    MORRIS, M.G.2    DAVIS, G.B.3    DAVIS, F.D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.