메뉴 건너뛰기




Volumn , Issue , 2012, Pages 265-274

A case study of community privacy

Author keywords

community privacy; focus group studies; privacy awareness; situated disclosures

Indexed keywords

FOCUS GROUP STUDIES; INFORMATION PRIVACY; ORGANIZATIONAL INTERESTS; PRIVACY AWARENESS; PRIVACY CONCERNS; PRIVACY MODELS; SENSITIVE INFORMATIONS; SITUATED DISCLOSURES;

EID: 84881035820     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SocialInformatics.2012.30     Document Type: Conference Paper
Times cited : (2)

References (31)
  • 1
  • 2
    • 84993894931 scopus 로고
    • Privacy regulation: Culturally universal or culturally specific?
    • I. Altman, ?Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, vol. 33, no. 3, pp. 66-84, 1977.
    • (1977) Journal of Social Issues , vol.33 , Issue.3 , pp. 66-84
    • Altman, I.1
  • 3
    • 84856186485 scopus 로고    scopus 로고
    • Introduction to P3P
    • O'Reilly & Associates, Inc., ch. 1
    • L. F. Cranor, ?Introduction to P3P,? in Web Privacy with P3P. O'Reilly & Associates, Inc., 2002, ch. 1, pp. 3-11.
    • (2002) Web Privacy with P3P , pp. 3-11
    • Cranor, L.F.1
  • 4
    • 77955711162 scopus 로고    scopus 로고
    • Collaborative privacy management
    • J. Kolter, T. Kernchen, and G. Pernul, ?Collaborative privacy management,? Computers & Security, vol. 29, no. 5, pp. 580-591, 2010.
    • (2010) Computers & Security , vol.29 , Issue.5 , pp. 580-591
    • Kolter, J.1    Kernchen, T.2    Pernul, G.3
  • 6
    • 0000043192 scopus 로고
    • Definitions of community: Areas of agreement
    • Jun.
    • G. A. Hillery, ?Definitions of community: areas of agreement,? Rural Sociology, vol. 20, pp. 111-123, Jun. 1955.
    • (1955) Rural Sociology , vol.20 , pp. 111-123
    • Hillery, G.A.1
  • 7
    • 0001907110 scopus 로고
    • Studying personal communities
    • P. Marsden and N. Lin, Eds. Beverly Hills, CA: Sage
    • B. Wellman, ?Studying personal communities,? in Social Structure and Network Analysis, P. Marsden and N. Lin, Eds. Beverly Hills, CA: Sage, 1982, pp. 61-80.
    • (1982) Social Structure and Network Analysis , pp. 61-80
    • Wellman, B.1
  • 8
    • 84869099387 scopus 로고    scopus 로고
    • A new perspective on 'community' and its implications for computer-mediated communication systems
    • 22-27 Apr.
    • A. Bruckman, ?A new perspective on ?community? and its implications for computer-mediated communication systems,? in Proc. of the Int. Conf. on Human Factors in Computing (CHI 2006), 22-27 Apr. 2006.
    • (2006) Proc. of the Int. Conf. on Human Factors in Computing (CHI 2006)
    • Bruckman, A.1
  • 9
    • 0000582220 scopus 로고    scopus 로고
    • Keeping organizational secrets: Protective institutional mechanisms and their costs
    • J. P. Liebeskind, ?Keeping organizational secrets: Protective institutional mechanisms and their costs,? Industrial and Corporate Change, vol. 6, no. 3, pp. 623-663, 1997.
    • (1997) Industrial and Corporate Change , vol.6 , Issue.3 , pp. 623-663
    • Liebeskind, J.P.1
  • 10
    • 84881075471 scopus 로고    scopus 로고
    • last accessed 30 May
    • Google, ?About circles,? http://support.google.com/plus/bin/answer.py?hl= en\&answer=1047805, last accessed 30 May 2012.
    • (2012) About Circles
  • 12
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • Sep.
    • S. Rafaeli and D. Hutchison, ?A survey of key management for secure group communication,? ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sep. 2003.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 14
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • Feb.
    • H. F. Nissenbaum, ?Privacy as contextual integrity,? Washington Law Review, vol. 79, no. 1, pp. 119-158, Feb. 2004.
    • (2004) Washington Law Review , vol.79 , Issue.1 , pp. 119-158
    • Nissenbaum, H.F.1
  • 15
    • 33845422335 scopus 로고    scopus 로고
    • What we talk about when we talk about context
    • Feb.
    • P. Dourish, ?What we talk about when we talk about context,? Personal Ubiquitous Computing, vol. 8, no. 1, pp. 19-30, Feb. 2004.
    • (2004) Personal Ubiquitous Computing , vol.8 , Issue.1 , pp. 19-30
    • Dourish, P.1
  • 17
    • 33748924513 scopus 로고    scopus 로고
    • Collective information practice: Emploring privacy and security as social and cultural phenomena
    • Sep.
    • P. Dourish and K. Anderson, ?Collective information practice: emploring privacy and security as social and cultural phenomena,? Human- Computer Interaction, vol. 21, no. 3, pp. 319-342, Sep. 2006.
    • (2006) Human-Computer Interaction , vol.21 , Issue.3 , pp. 319-342
    • Dourish, P.1    Anderson, K.2
  • 18
    • 0034459145 scopus 로고    scopus 로고
    • The intellectual challenge of CSCW: The gap between social requirements and technical feasibility
    • Sep.
    • M. S. Ackerman, ?The intellectual challenge of CSCW: The gap between social requirements and technical feasibility,? Human-Computer Interaction, vol. 15, no. 2 & 3, pp. 179-203, Sep. 2000.
    • (2000) Human-Computer Interaction , vol.15 , Issue.2-3 , pp. 179-203
    • Ackerman, M.S.1
  • 19
    • 0028429984 scopus 로고
    • Computer-supported cooperative work: History and focus
    • May
    • J. Grudin, ?Computer-supported cooperative work: History and focus,? IEEE Computer, vol. 27, no. 5, pp. 19-26, May 1994.
    • (1994) IEEE Computer , vol.27 , Issue.5 , pp. 19-26
    • Grudin, J.1
  • 23
    • 84881031663 scopus 로고    scopus 로고
    • NASCIO, National Association of State Chief Information Offices, Tech. Rep.
    • NASCIO, ?Insider security threats: State CIOs take action now!? National Association of State Chief Information Offices, Tech. Rep., 2007.
    • (2007) Insider Security Threats: State CIOs Take Action Now!
  • 24
    • 70350366164 scopus 로고    scopus 로고
    • Mitigating inadvertent insider threats with incentives
    • R. Dingledine and P. Golle, Eds. Berlin: Springer
    • D. Liu, X. Wang, and L. J. Camp, ?Mitigating inadvertent insider threats with incentives,? in Financial Cryptography and Data Security, R. Dingledine and P. Golle, Eds. Berlin: Springer, 2009, pp. 1-16.
    • (2009) Financial Cryptography and Data Security , pp. 1-16
    • Liu, D.1    Wang, X.2    Camp, L.J.3
  • 25
    • 84873664690 scopus 로고    scopus 로고
    • Master?s thesis, Virginia Polytechnic Institute and State University, Blacksburg, VA, 1 May
    • S. Codio, ?Understanding community privacy through focus group studies,? Master?s thesis, Virginia Polytechnic Institute and State University, Blacksburg, VA, 1 May 2012.
    • (2012) Understanding Community Privacy Through Focus Group Studies
    • Codio, S.1
  • 26
    • 79960049010 scopus 로고    scopus 로고
    • Framework analysis: A qualitative methodology for applied policy research
    • A. Srivastava and S. B. Thomson, ?Framework analysis: A qualitative methodology for applied policy research,? Research Note JOAAG, vol. 4, no. 2, 2009.
    • (2009) Research Note JOAAG , vol.4 , Issue.2
    • Srivastava, A.1    Thomson, S.B.2
  • 30
    • 0000320829 scopus 로고
    • The right to privacy
    • Dec.
    • S. D. Warren and L. D. Brandeis, ?The right to privacy,? Harward Law Review, vol. 4, no. 5, pp. 193-220, Dec. 1890.
    • (1890) Harward Law Review , vol.4 , Issue.5 , pp. 193-220
    • Warren, S.D.1    Brandeis, L.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.