Repacking ‘privacy’ for a networked world
In this paper we examine the notion of privacy as promoted in the digital economy and how it has been taken up as a design challenge in the fields of CSCW, HCI and Ubiquitous Computing. Against these prevalent views we present an ethnomethodological study of digital privacy practices in 20 homes in...
| Main Authors: | Crabtree, Andy, Tolmie, Peter, Knight, Will |
|---|---|
| Format: | Article |
| Published: |
Springer
2017
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/42839/ |
Similar Items
The practical politics of sharing personal data
by: Tolmie, Peter, et al.
Published: (2017)
by: Tolmie, Peter, et al.
Published: (2017)
Enabling the new economic actor: data protection, the digital economy, and the databox
by: Crabtree, Andy, et al.
Published: (2016)
by: Crabtree, Andy, et al.
Published: (2016)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A generic privacy ontology and its applications to different domains
by: Hecker, Michael
Published: (2009)
by: Hecker, Michael
Published: (2009)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Privacy Perceptions of Twitter Users in Saudi Arabia.
by: ALAMR, BADR
Published: (2018)
by: ALAMR, BADR
Published: (2018)
PP-SDLC The privacy protecting systems development life cycle
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Special theme on privacy and the Internet of Things
by: Chamberlain, Alan, et al.
Published: (2018)
by: Chamberlain, Alan, et al.
Published: (2018)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
From privacy impact assessment to Social Impact Assessment
by: Edwards, Lilian, et al.
Published: (2016)
by: Edwards, Lilian, et al.
Published: (2016)
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A projection of the future effects of quantum computation on information privacy and information security
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Toward a Revolution in Australian Children’s Data and Privacy
by: Leaver, Tama, et al.
Published: (2023)
by: Leaver, Tama, et al.
Published: (2023)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Living with interpersonal data: observability and accountability in the age of pervasive ICT
by: Goulden, Murray, et al.
Published: (2017)
by: Goulden, Murray, et al.
Published: (2017)
Privacy and the Health Industry
by: Carew-Reid, Anne
Published: (2003)
by: Carew-Reid, Anne
Published: (2003)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Safeguarding privacy from criminal process
by: Purshouse, Joe
Published: (2017)
by: Purshouse, Joe
Published: (2017)
Privacy-preserving record linkage on large real world datasets
by: Randall, Sean, et al.
Published: (2014)
by: Randall, Sean, et al.
Published: (2014)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Towards a more systematic approach to secure systems design and analysis
by: Miller, Simon, et al.
Published: (2013)
by: Miller, Simon, et al.
Published: (2013)
"This has to be the cats": personal data legibility in networked sensing systems
by: Tolmie, Peter, et al.
Published: (2016)
by: Tolmie, Peter, et al.
Published: (2016)
Young people's policy recommendations on algorithm fairness
by: Perez, Elvira, et al.
Published: (2017)
by: Perez, Elvira, et al.
Published: (2017)
Digital privacy and personal, social and civic agency: refugees' experiences
by: Voigts, Matthew
Published: (2020)
by: Voigts, Matthew
Published: (2020)
Use of ontology technology for standardization of medical records and dealing with associated privacy issues
by: Hadzic, Maja, et al.
Published: (2006)
by: Hadzic, Maja, et al.
Published: (2006)
The privacy concerns in location based services: protection approaches and remaining challenges
by: Basiri, Anahid, et al.
Published: (2016)
by: Basiri, Anahid, et al.
Published: (2016)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Reputation aware obfuscation for mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings
by: Hattingh, H. Laetitia, et al.
Published: (2015)
by: Hattingh, H. Laetitia, et al.
Published: (2015)
Research ethics and public trust, preconditions for continued growth of internet mediated research: public confidence in internet mediate research
by: Koene, Ansgar, et al.
Published: (2015)
by: Koene, Ansgar, et al.
Published: (2015)
Dynamic user reconfigurable privacy and trust settigs for collaborative industrial environments
by: Skinner, G
Published: (2005)
by: Skinner, G
Published: (2005)
Efficient location privacy-aware forwarding in opportunistic mobile networks
by: Zakhary, Sameh, et al.
Published: (2014)
by: Zakhary, Sameh, et al.
Published: (2014)
Similar Items
-
The practical politics of sharing personal data
by: Tolmie, Peter, et al.
Published: (2017) -
Enabling the new economic actor: data protection, the digital economy, and the databox
by: Crabtree, Andy, et al.
Published: (2016) -
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006) -
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006) -
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)