메뉴 건너뛰기




Volumn 6, Issue 6, 2009, Pages 543-557

A conceptual analysis of group privacy in the virtual environment

Author keywords

Group privacy; Group privacy ethics; Social networking websites; Virtual communities

Indexed keywords

INFORMATION DISSEMINATION; VIRTUAL REALITY;

EID: 68849113363     PISSN: 14709503     EISSN: None     Source Type: Journal    
DOI: 10.1504/IJNVO.2009.027788     Document Type: Article
Times cited : (9)

References (29)
  • 5
    • 0346218796 scopus 로고
    • New York: Cambridge University Press
    • Broad, C.D. (1978) Kant: An Introduction, New York: Cambridge University Press.
    • (1978) Kant: An Introduction
    • Broad, C.D.1
  • 6
    • 68849129043 scopus 로고    scopus 로고
    • Philosophical ethics
    • in M.D. Ermann and M.S. Shauf (Eds.), New York, NY: Oxford University Press
    • Ermann, M.D. and Shauf, M.S. (2003) 'Philosophical ethics', in M.D. Ermann and M.S. Shauf (Eds.) Computers, Ethics, and Society, New York, NY: Oxford University Press, pp.2-3.
    • (2003) Computers, Ethics, and Society , pp. 2-3
    • Ermann, M.D.1    Shauf, M.S.2
  • 7
    • 68849114987 scopus 로고    scopus 로고
    • Federal Trade Commission
    • Washington, DC: Federal Trade Commission
    • Federal Trade Commission (2007) 2006 Identity Theft Survey Report, Washington, DC: Federal Trade Commission.
    • (2007) 2006 Identity Theft Survey Report
  • 9
    • 33645514041 scopus 로고    scopus 로고
    • Web merchants privacy and security statements: How reassuring are they for consumers? A two-sided approach
    • Gauzente, C. (2004) 'Web merchants' privacy and security statements: how reassuring are they for consumers? A two-sided approach', Journal of Electronic Commerce Research, Vol.5, No.3, pp.181-198.
    • (2004) Journal of Electronic Commerce Research , vol.5 , Issue.3 , pp. 181-198
    • Gauzente, C.1
  • 10
    • 84923486508 scopus 로고
    • Privacy and the limits of law
    • Gavison, R. (1980) 'Privacy and the limits of law', Yale Law Journal, Vol.89, No.4, pp.21-71.
    • (1980) Yale Law Journal , vol.89 , Issue.4 , pp. 21-71
    • Gavison, R.1
  • 11
    • 0000917844 scopus 로고
    • The strength of weak ties: A network theory revisited
    • in P.V. Marsden and N. Lin (Eds.), Beverly Hills, CA: Sage
    • Granovetter, M.S. (1982) 'The strength of weak ties: a network theory revisited', in P.V. Marsden and N. Lin (Eds.) Social Structure and Network Analysis, Beverly Hills, CA: Sage, pp.103-130.
    • (1982) Social Structure and Network Analysis , pp. 103-130
    • Granovetter, M.S.1
  • 12
    • 68849118664 scopus 로고    scopus 로고
    • Balancing individual privacy rights and intelligence needs: Procedural-based vs. distributive-based justice perspectives on the patriot act
    • in L. Freeman and A.G. Peace (Eds.), Hershey, PA: Information Science Publishing
    • Hartzel, K.S. and Deegan, P.E. (2005) 'Balancing individual privacy rights and intelligence needs: procedural-based vs. distributive-based justice perspectives on the patriot act', in L. Freeman and A.G. Peace (Eds.) Information Ethics: Privacy and Intellectual Property, Hershey, PA: Information Science Publishing, pp.180-195.
    • (2005) Information Ethics: Privacy and Intellectual Property , pp. 180-195
    • Hartzel, K.S.1    Deegan, P.E.2
  • 13
    • 84978166668 scopus 로고    scopus 로고
    • The best action is the one with the best consequences
    • in M.D. Ermann and M.S. Shauf (Eds.), New York, NY: Oxford University Press
    • Hospers, J. (2003) 'The best action is the one with the best consequences', in M.D. Ermann and M.S. Shauf (Eds.) Computers, Ethics, and Society, New York, NY: Oxford University Press, pp.3-11.
    • (2003) Computers, Ethics, and Society , pp. 3-11
    • Hospers, J.1
  • 15
    • 84976854084 scopus 로고
    • Cooperation, coordination and control in computer-supported work
    • Kling, R. (1991) 'Cooperation, coordination and control in computer-supported work', Communications of the ACM, Vol.34, No.12, pp.83-88.
    • (1991) Communications of the ACM , vol.34 , Issue.12 , pp. 83-88
    • Kling, R.1
  • 17
    • 55249097295 scopus 로고
    • Four ethical issues of the information age
    • Mason, R. (1986) 'Four ethical issues of the information age', MIS Quarterly, Vol.10, No.1, pp.5-12.
    • (1986) MIS Quarterly , vol.10 , Issue.1 , pp. 5-12
    • Mason, R.1
  • 18
    • 84986134849 scopus 로고    scopus 로고
    • Are they really listening? An investigation into published online privacy policies at the beginning of the third millennium
    • McRobb, S. and Rogerson, S. (2004) 'Are they really listening? An investigation into published online privacy policies at the beginning of the third millennium', Information Technology & People, Vol.17, No.4, pp.442-1161
    • (2004) Information Technology and People , vol.17 , Issue.4 , pp. 442-1161
    • McRobb, S.1    Rogerson, S.2
  • 20
    • 84861301596 scopus 로고    scopus 로고
    • Who gets to know what when: Configuring privacy permissions in an awareness application
    • New York, NY: ACM
    • Patil, S. and Lai, J. (2005) 'Who gets to know what when: configuring privacy permissions in an awareness application', Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY: ACM, pp.101-110.
    • (2005) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , pp. 101-110
    • Patil, S.1    Lai, J.2
  • 21
    • 0000839286 scopus 로고
    • Privacy
    • Prosser, W. (1960) 'Privacy', California Law Review, Vol.48, No.3, pp.383-423.
    • (1960) California Law Review , vol.48 , Issue.3 , pp. 383-423
    • Prosser, W.1
  • 26
    • 31644435932 scopus 로고    scopus 로고
    • Y2K all over again: How group think permeates IS and compromises security
    • Schiano, W. and Weiss, J.W. (2006) 'Y2K all over again: how groupthink permeates IS and compromises security', Business Horizons, Vol.49, pp.115-125.
    • (2006) Business Horizons , vol.49 , pp. 115-125
    • Schiano, W.1    Weiss, J.W.2
  • 27
    • 56349094972 scopus 로고
    • The law of privacy in a nutshell
    • Smith, R. (1993) 'The law of privacy in a nutshell', Privacy Journal, Vol.19, No.6, pp.50-51.
    • (1993) Privacy Journal , vol.19 , Issue.6 , pp. 50-51
    • Smith, R.1
  • 28
    • 0022810941 scopus 로고
    • Reducing social context cues: Electronic mail in organizational communication
    • Sproull, L. and Kiesler, S. (1986) 'Reducing social context cues: electronic mail in organizational communication', Management Science, Vol.32, No.11, pp.1492-1513.
    • (1986) Management Science , vol.32 , Issue.11 , pp. 1492-1513
    • Sproull, L.1    Kiesler, S.2
  • 29
    • 0005489253 scopus 로고    scopus 로고
    • Privacy and security: An ethical analysis
    • Walters, G. (2001) 'Privacy and security: an ethical analysis', Computers and Society, Vol.31, No.2, pp.8-23.
    • (2001) Computers and Society , vol.31 , Issue.2 , pp. 8-23
    • Walters, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.