Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development
暂无分享,去创建一个
[1] Katie Shilton,et al. Values Levers , 2013 .
[2] Kirsten E. Martin. Understanding Privacy Online: Development of a Social Contract Approach to Privacy , 2016 .
[3] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[4] Tarleton Gillespie,et al. The politics of ‘platforms’ , 2010, New Media Soc..
[5] Yang Wang,et al. Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising (CMU-CyLab-11-017) , 2011 .
[6] Lynette I. Millett,et al. Engaging Privacy and Information Technology in a Digital Age: Executive Summary , 2010, J. Priv. Confidentiality.
[7] Katie Shilton,et al. Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices , 2016, Inf. Soc..
[8] T. Shepherd,et al. Doing well by doing good? Normative tensions underlying Twitter’s corporate social responsibility ethos , 2014 .
[9] Kirsten E. Martin,et al. Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy online , 2013, First Monday.
[10] Helen Nissenbaum,et al. Bias in computer systems , 1996, TOIS.
[11] Jessica K. Miller,et al. Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system , 2007, GROUP.
[12] S. Brusoni,et al. Ethics, Technology and Organizational Innovation , 2017 .
[13] Nick Doty,et al. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[14] Katie Shilton,et al. Why experience matters to privacy: How context‐based experience moderates consumer privacy expectations for mobile applications , 2015, J. Assoc. Inf. Sci. Technol..
[15] P. Verbeek,et al. Materializing Morality , 2006 .
[16] Lucas D. Introna,et al. Privacy in the Information Age: Stakeholders, Interests and Values , 1999, Journal of business ethics : JBE.
[17] Rafael Capurro,et al. Privacy. An Intercultural Perspective , 2005, Ethics and Information Technology.
[18] P. Brey,et al. Anticipating ethical issues in emerging IT , 2012, Ethics and Information Technology.
[19] J. Herkert,et al. Future directions in engineering ethics research: Microethics, macroethics and the role of professional societies , 2001, Science and engineering ethics.
[20] J. Moor. What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.
[21] W. Orlikowski. Sociomaterial Practices: Exploring Technology at Work , 2007 .
[22] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[23] Hazel Hall,et al. Organizational knowledge and communities of practice , 2005, Annu. Rev. Inf. Sci. Technol..
[24] Paul A. Pavlou,et al. State of the information privacy literature: where are we now and where should we go? , 2011 .
[25] Julie E. Cohen. Configuring the Networked Self - Law, Code, and the Play of Everyday Practice , 2012 .
[26] David H. Guston. Participating Despite Questions: Toward a More Confident Participatory Technology Assessment , 2011, Sci. Eng. Ethics.
[27] Jinyan Zang,et al. Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps , 2015 .
[28] Steven B. Lipner,et al. The trustworthy computing security development lifecycle , 2004, 20th Annual Computer Security Applications Conference.
[29] Helen Nissenbaum,et al. Respecting Context to Protect Privacy: Why Meaning Matters , 2018, Sci. Eng. Ethics.
[30] Ctrl-Z The right to be forgotten.pdf , 2016 .
[31] Robert Boguslaw,et al. Privacy and Freedom , 1968 .
[32] R. F. Beltramini,et al. A 30-Year Historical Examination of Ethical Concerns Regarding Business Ethics: Who’s Concerned? , 2012 .
[33] A. Cavoukian. Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices , 2012 .
[34] Lorrie Faith Cranor,et al. What do they "indicate?": evaluating security and privacy indicators , 2006, INTR.
[35] Katie Shilton,et al. Platform privacies: Governance, collaboration, and the different meanings of “privacy” in iOS and Android development , 2018, New Media Soc..
[36] K. K. Cetina,et al. The Practice Turn in Contemporary Theory , 2001 .
[37] Laurence Ashworth,et al. Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns , 2006 .
[38] Lorrie Faith Cranor,et al. The Privacy and Security Behaviors of Smartphone App Developers , 2014 .
[39] Christopher Kelty,et al. Two Bits: The Cultural Significance of Free Software , 2008 .
[40] Rachelle Hollander,et al. Ethics education and scientific and engineering research : what's been learned? what should be done? : summary of a workshop , 2009 .
[41] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.