Privacy by designers: software developers’ privacy mindset
暂无分享,去创建一个
Eran Toch | Irit Hadar | Sofia Sherman | Tomer Hasson | Oshrat Ayalon | Arod Balissa | Michael Birnhack | Oshrat Ayalon | Eran Toch | Michael Birnhack | I. Hadar | Sofia Sherman | Tomer Hasson | Arod Balissa
[1] Carmela Troncoso,et al. Engineering Privacy by Design , 2011 .
[2] Fernando Jaramillo,et al. Bringing meaning to the sales job: The effect of ethical climate and customer demandingness , 2013 .
[3] Eran Toch,et al. Privacy Mindset, Technological Mindset , 2014 .
[4] Lorrie Faith Cranor,et al. The Privacy and Security Behaviors of Smartphone App Developers , 2014 .
[5] S. Fienberg. Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation , 2006, math/0609288.
[6] A. Strauss,et al. Grounded theory methodology: An overview. , 1994 .
[7] Michael D. Myers,et al. Qualitative Research in Information Systems , 1997, MIS Q..
[8] Nigel Nicholson,et al. The Absence Culture and Psychological Contract—Who's in Control of Absence? , 1985 .
[9] Ira S. Rubinstein,et al. Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents , 2012 .
[10] A. Bandura. Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .
[11] Tim Menzies,et al. Balancing Privacy and Utility in Cross-Company Defect Prediction , 2013, IEEE Transactions on Software Engineering.
[12] Michael D. Myers,et al. The qualitative interview in IS research: Examining the craft , 2007, Inf. Organ..
[13] Walid Maalej,et al. On lawful disclosure of personal user data: What should app developers do? , 2014, 2014 IEEE 7th International Workshop on Requirements Engineering and Law (RELAW).
[14] Carolyn B. Seaman,et al. Qualitative Methods in Empirical Studies of Software Engineering , 1999, IEEE Trans. Software Eng..
[15] Mary Lacity,et al. Understanding Qualitative Data: A Framework of Text Analysis Methods , 1994, J. Manag. Inf. Syst..
[16] R L Brown,et al. The use of a factor-analytic procedure for assessing the validity of an employee safety climate model. , 1986, Accident; analysis and prevention.
[17] Marvin Ammori,et al. Media Diversity and Online Advertising , 2013 .
[18] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[19] Bashar Nuseibeh,et al. Distilling privacy requirements for mobile applications , 2014, ICSE.
[20] Thomas R. Shaw,et al. The Moral Intensity of Privacy: An Empirical Study of Webmaster' Attitudes , 2003 .
[21] Stoianov,et al. Facial Recognition with Biometric Encryption in Match-on-Card Architecture for Gaming and Other Computer Applications , 2014 .
[22] Deirdre K. Mulligan,et al. Privacy in Europe: Initial Data on Governance Choices and Corporate Practices , 2013 .
[23] Chris Argyris,et al. Understanding organizational behavior , 1961 .
[24] R. Suddaby. From the Editors: What Grounded Theory is Not , 2006 .
[25] R. Eisenberger,et al. Perceived Organizational Support and Employee Diligence, Commitment, and Innovation , 1990 .
[26] Omer Tene,et al. Big Data for All: Privacy and User Control in the Age of Analytics , 2012 .
[27] Miguel Castro,et al. Better bug reporting with better privacy , 2008, ASPLOS 2008.
[28] David Lo,et al. kb-anonymity: a model for anonymized behaviour-preserving test and debugging data , 2011, PLDI '11.
[29] Bashar Nuseibeh,et al. Engineering adaptive privacy: On the role of privacy awareness requirements , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[30] K D Burau,et al. Organisational and occupational risk factors associated with work related injuries among public hospital employees in Costa Rica , 2005, Occupational and Environmental Medicine.
[31] Avi Goldfarb,et al. Comments on 'A Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers' , 2011 .
[32] Michelle Finneran Dennedy,et al. The Privacy Engineer’s Manifesto , 2014, Apress.
[33] Nicholas Berente,et al. Institutional Contradictions and Loose Coupling: Postimplementation of NASA's Enterprise Information System , 2012, Inf. Syst. Res..
[34] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[35] Nai-Chang Cheng,et al. Programmer perceptions of knowledge-sharing behavior under social cognitive theory , 2010, Expert Syst. Appl..
[36] Alessandro Acquisti,et al. Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.
[37] Walid Maalej,et al. Us and them: a study of privacy requirements across north america, asia, and europe , 2014, Software Engineering & Management.
[38] Kynn K. Bartels,et al. The Relationship between Ethical Climate and Ethical Problems within Human Resource Management , 1998 .
[39] Sherif Ali Mohtady Mohamed,et al. SAFETY CLIMATE IN CONSTRUCTION SITE ENVIRONMENTS , 2002 .
[40] Cheri Ostroff,et al. Organizational Climate and Culture: Reflections on the History of the Constructs in the Journal of Applied Psychology , 2017, The Journal of applied psychology.
[41] R. A. Phillips,et al. Exploratory analysis of the safety climate and safety behavior relationship. , 2004 .
[42] Mary J. Culnan,et al. How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches , 2009, MIS Q..
[43] Michael D Birnhack,et al. Does Law Matter Online? Empirical Evidence on Privacy Law Compliance , 2009 .
[44] Satish P. Deshpande,et al. Ethical climate and the link between success and ethical behavior: An empirical investigation of a non-profit organization , 1996 .
[45] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[46] L. Kool,et al. Privacy by Design: an alternative to existing practice in safeguarding privacy , 2011 .
[47] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[48] Stefanos Gritzalis,et al. Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.
[49] Coye Cheshire,et al. Risky Business: Social Trust and Community in the Practice of Cybersecurity for Internet Infrastructure , 2017, HICSS.
[50] Iván Székely,et al. What Do IT Professionals Think About Surveillance , 2013 .
[51] Alan Borning,et al. Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.
[52] Patricia S. Abril,et al. Blurred Boundaries: Social Media Privacy and the Twenty‐First‐Century Employee , 2012 .
[53] Janne Lindqvist,et al. Should I Protect You? Understanding Developers' Behavior to Privacy-Preserving APIs , 2014 .
[54] David Lo,et al. kbe-anonymity: test data anonymization for evolving programs , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[55] Tim Menzies,et al. Privacy and utility for defect prediction: Experiments with MORPH , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[56] N. Hoffart. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .
[57] Deirdre K. Mulligan,et al. Privacy on the Books and on the Ground , 2011 .
[58] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[59] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[60] Rayid Ghani,et al. Testing software in age of data privacy: a balancing act , 2011, ESEC/FSE '11.
[61] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[62] B. Schneider,et al. Organizational climate and culture. , 2009, Annual review of psychology.
[63] Marc Langheinrich,et al. Privacy and trust issues with invisible computers , 2005, CACM.
[64] Kecheng Liu,et al. Understanding the roles of signs and norms in organizations - a semiotic approach to information systems design , 2000, Behav. Inf. Technol..
[65] Nicole Ozer,et al. Putting Online Privacy Above the Fold: Building a Social Movement and Creating Corporate Change , 2012 .
[66] Geoff Walsham,et al. Doing interpretive research , 2006, Eur. J. Inf. Syst..
[67] Oi-ling Siu,et al. Safety climate and safety performance among construction workers in Hong Kong. The role of psychological strains as mediators. , 2004, Accident; analysis and prevention.
[68] D. Zohar. Safety climate in industrial organizations: theoretical and applied implications. , 1980, The Journal of applied psychology.
[69] A. Bandura,et al. Social Cognitive Theory of Organizational Management , 1989 .
[70] Yang Wang,et al. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems , 2012, User Modeling and User-Adapted Interaction.
[71] D. Zohar,et al. A multilevel model of safety climate: cross-level relationships between organization and group-level climates. , 2005, The Journal of applied psychology.
[72] Gil Luria,et al. Controlling for Quality: Climate, Leadership, and Behavior , 2008 .
[73] A. Cavoukian. Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era , 2012 .
[74] Maarten H. Everts,et al. Designing Privacy-by-Design , 2012, APF.
[75] L R Murphy,et al. Hospital safety climate and its relationship with safe work practices and workplace exposure incidents. , 2000, American journal of infection control.
[76] U Varonen,et al. The safety climate and its relationship to safety practices, safety of the work environment and occupational accidents in eight wood-processing companies. , 2000, Accident; analysis and prevention.
[77] Chen Fu,et al. Is Data Privacy Always Good for Software Testing? , 2010, 2010 IEEE 21st International Symposium on Software Reliability Engineering.
[78] Bradley L. Kirkman,et al. Taking Stock: A review of more than twenty years of research on empowerment at work , 2007 .
[79] Scott Dick,et al. A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations , 2009, TWEB.
[80] Yolande E. Chan. IT Value: The Great Divide Between Qualitative and Quantitative and Individual and Organizational Measures , 2000, J. Manag. Inf. Syst..
[81] J. Shepard,et al. Toward an understanding of ethical climate: Its relationship to ethical behavior and supervisory influence , 1994 .
[82] Michelle Finneran Dennedy,et al. The Privacy Engineers Manifesto: Getting from Policy to Code to QA to Value , 2014 .
[83] D M DeJoy,et al. Safety climate dimensions associated with occupational exposure to blood-borne pathogens in nurses. , 1999, American journal of industrial medicine.
[84] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[85] Marc L. Resnick,et al. Perceptions of Customer Service, Information Privacy, and Product Quality From Semiotic Design Features in an Online Web Store , 2003, Int. J. Hum. Comput. Interact..
[86] Steven M. Bellovin,et al. The Failure of Online Social Network Privacy Settings , 2011 .
[87] A. Strauss,et al. Basics of Qualitative Research , 1992 .
[88] Eran Toch,et al. Retrospective privacy: managing longitudinal privacy in online social networks , 2013, SOUPS.
[89] D. Zohar. A group-level model of safety climate: testing the effect of group climate on microaccidents in manufacturing jobs. , 2000, The Journal of applied psychology.