Proceedings of the Conference on Human Factors in Computing Systems - CHI '03 2003
DOI: 10.1145/642633.642635
|View full text |Cite
|
Sign up to set email alerts
|

Unpacking "privacy" for a networked world

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
244
0
1

Year Published

2005
2005
2014
2014

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 219 publications
(248 citation statements)
references
References 0 publications
3
244
0
1
Order By: Relevance
“…The part of one's life lived apart from society was not highly valued in some ancient societies (Hixon, 1987) and strong emphasis was placed on social involvement. Palen & Dourish (2003) call this the disclosure boundary tension (4.d.vii): a tension between one wanting/needing/choosing/being private versus public. This tension carries over to VMS design.…”
Section: Perspectives On Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…The part of one's life lived apart from society was not highly valued in some ancient societies (Hixon, 1987) and strong emphasis was placed on social involvement. Palen & Dourish (2003) call this the disclosure boundary tension (4.d.vii): a tension between one wanting/needing/choosing/being private versus public. This tension carries over to VMS design.…”
Section: Perspectives On Privacymentioning
confidence: 99%
“…This control is afforded by environmental constraints to interactivity. Technology confounds privacy control by lifting or changing these constraints (Palen & Dourish, 2003;Grudin, 2001) and affords new degrees of temporal and spatial freedom for information access (5.c.i) (Palen & Dourish, 2003). There is an implicit assumption that there are some times when some people-who may or may not be part of the VMS community-go out of their way to violate others' privacy.…”
Section: Privacy Violationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Westin [1967] describes practices such as covering one's face, averting others' eyes, or facing the wall. As Palen and Dourish [2003] point out, "Privacy is understood to be under continuous negotiation and management, with the boundary that distinguishes privacy and publicity refined according to circumstance".…”
Section: Relationship Between Awareness and Privacymentioning
confidence: 99%
“…For instance, Boyle and Greenberg [2005] describe a vocabulary of privacy that designers can employ for an unambiguous discussion of privacy issues. To suggest ways of thinking about privacy in socio-technical environments, Palen and Dourish [2003] outline a model of privacy that is based on the theory of social psychologist Irwin Altman. It views privacy as a process that regulates the boundaries of disclosure, identity and temporality.…”
Section: Theories Principles and Guidelinesmentioning
confidence: 99%