PRIMA — Privacy research through the perspective of a multidisciplinary mash up

Based on a summary description of privacy protection research within three fields of inquiry, viz. social sciences, legal science, and computer and systems sciences, we discuss multidisciplinary approaches with regard to the difficulties and the risks that they entail as well as their possible advantages. The latter include the identification of relevant perspectives of privacy, increased expressiveness in the formulation of research goals, opportunities for improved research methods, and a boost in the utility of invested research efforts.

[1]  Two Treatises of Government , 1961 .

[2]  Kari-Jouko Räihä,et al.  Faces of Privacy: Effect of Culture and Context , 2009, INTERACT.

[3]  S. Margulis On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .

[4]  Wendy A. Kellogg,et al.  Social translucence: an approach to designing systems that support social processes , 2000, TCHI.

[5]  Wiebe E. Bijker,et al.  Science in action : how to follow scientists and engineers through society , 1989 .

[6]  Nancy Fraser Rethinking the Public Sphere: A Contribution to the Critique of Actually Existing Democracy , 1990 .

[7]  Lorenzo Valeri,et al.  Review of the European Data Protection Directive , 2009 .

[8]  Amitai Etzioni,et al.  The Limits Of Privacy , 1999 .

[9]  Ponnurangam Kumaraguru,et al.  Privacy Indexes: A Survey of Westin's Studies , 2005 .

[10]  Gregory D. Abowd,et al.  From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary , 2008, TCHI.

[11]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[12]  J. Law,et al.  Complexities: Social Studies of Knowledge Practices , 2002 .

[13]  John Cullen,et al.  Democratizing Innovation , 2020, Encyclopedia of Creativity, Invention, Innovation and Entrepreneurship.

[14]  N. J. Marshall DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.

[15]  M. Callon Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay , 1984 .

[16]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[17]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[18]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[19]  J. Habermas,et al.  Strukturwandel der Öffentlichkeit , 1964 .

[20]  The Measurement of Privacy Preferences Within Marital Relationships: The Relationship Privacy Preference Scale , 1997 .

[21]  V.,et al.  Notes and comments , 1922, Psychiatry.

[22]  W. R. Howard Acting with Technology: Activity Theory and Interaction Design , 2007 .

[23]  Nancy Fraser Rethinking the Public Sphere: A Contribution to the Critique of Actually Existing Democracy , 2016, Public Space Reader.

[24]  Darhl M. Pedersen,et al.  A factorial comparison of privacy questionnaires , 1996 .

[25]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[26]  Michael Boyle,et al.  The language of privacy: Learning from video media space analysis and design , 2005, TCHI.

[27]  L. Bygrave Data Protection Law, Approaching Its Rationale, Logic and Limits , 2002 .

[28]  A. Clarke Situational Analysis: Grounded Theory After the Postmodern Turn , 2005 .

[29]  Kenneth L. Kraemer,et al.  Computerization Movements and Technology Diffusion: From Mainframes to Ubiquitous Computing , 2008 .

[30]  B. Latour,et al.  Power, Action and Belief. A New Sociology of Knowledge? , 1986 .

[31]  Ninghui Li,et al.  End-User Privacy in Human–Computer Interaction , 2009 .

[32]  J. Habermas Strukturwandel der Öffentlichkeit : Untersuchungen zu einer Kategorie der bürgerlichen Gesellschaft , 1964 .

[33]  Simon N. L. Chalton,et al.  Data protection law , 1988 .

[34]  Reijo Miettinen,et al.  Perspectives on activity theory: Frontmatter , 1999 .

[35]  D. Norman,et al.  User Centered System Design: New Perspectives on Human-Computer Interaction , 1988 .

[36]  Colin J. Bennett,et al.  The Governance of Privacy: Policy Instruments in Global Perspective , 2006 .

[37]  Amitai Etzioni,et al.  The Common Good , 2004 .

[38]  Peter Laslett,et al.  Two Treatises of Government , 1948 .

[39]  Richard Sennett,et al.  The Fall of Public Man , 1977 .

[40]  T.L.J. Ferris,et al.  Participatory IT Design: Designing for Business and Workplace Realities , 2005, IEEE Transactions on Professional Communication.

[41]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[42]  Enid Mumford,et al.  The story of socio‐technical design: reflections on its successes, failures and potential , 2006, Inf. Syst. J..

[43]  A. Young Sorting Things Out: Classification and Its Consequences. , 2001 .

[44]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[45]  Priscilla M. Regan Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.

[46]  Asko Lehmuskallio 'A photo is not an extension of me, it's plain surface': views of users of a Web 2.0 photo-sharing site on photos and privacy , 2007 .

[47]  Book Reviews: After Habermas – New Perspectives on the Public Sphere , 2004 .

[48]  Blake J. Roessler,et al.  The Value of Privacy , 2004 .

[49]  H. Arendt,et al.  The Human Condition , 1960 .

[50]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[51]  A. Appadurai Modernity at Large: Cultural Dimensions of Globalization , 1996 .

[52]  Sakari Tamminen,et al.  Managing Privacy on Social Network Sites , 2009 .

[53]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[54]  H. Blumer,et al.  Symbolic Interactionism: Perspective and Method , 1988 .

[55]  Patricia Brierley Newell A cross-cultural comparison of privacy definitions and functions: a systems approach , 1998 .

[56]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[57]  Batya Friedman,et al.  Human values and the design of computer technology , 1997 .

[58]  Kristina Höök,et al.  Pieces of identity , 2008, NordiCHI.