Privacy dictionary: A new resource for the automated content analysis of privacy

This article presents the privacy dictionary, a new linguistic resource for automated content analysis on privacy-related texts. To overcome the definitional challenges inherent in privacy research, the dictionary was informed by an inclusive set of relevant theoretical perspectives. Using methods from corpus linguistics, we constructed and validated eight dictionary categories on empirical material from a wide range of privacy-sensitive contexts. It was shown that the dictionary categories are able to measure unique linguistic patterns within privacy discussions. At a time when privacy considerations are increasing and online resources provide ever-growing quantities of textual data, the privacy dictionary can play a significant role not only for research in the social sciences but also in technology design and policymaking. © 2011 Wiley Periodicals, Inc.

[1]  E. Rosch,et al.  Cognition and Categorization , 1980 .

[2]  J. Pennebaker,et al.  Psychological aspects of natural language. use: our words, our selves. , 2003, Annual review of psychology.

[3]  Ronald E. Rice,et al.  Predicting user concerns about online privacy , 2007, J. Assoc. Inf. Sci. Technol..

[4]  Jeffrey T. Hancock,et al.  Expressing emotion in text-based communication , 2007, CHI.

[5]  Cindy K. Chung,et al.  The development and psychometric properties of LIWC2007 , 2007 .

[6]  Judith Wagner DeCew,et al.  The Priority of Privacy for Medical Information , 2000, Social Philosophy and Policy.

[7]  Alessandro Acquisti,et al.  Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic Discounting , 2004, Economics of Information Security.

[8]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[9]  Darhl M. Pedersen,et al.  MODEL FOR TYPES OF PRIVACY BY PRIVACY FUNCTIONS , 1999 .

[10]  J. Costello,et al.  Nursing older dying patients: findings from an ethnographic study of death and dying in elderly care wards. , 2001, Journal of advanced nursing.

[11]  Beverley Fehr,et al.  Prototype analysis of the concepts of love and commitment , 1988 .

[12]  Sonia Livingstone,et al.  Children's Privacy Online: Experimenting with Boundaries Within and Beyond the Family , 2006, Computers, Phones, and the Internet.

[13]  Darren Gergle,et al.  The language of emotion in short blog texts , 2008, CSCW.

[14]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[15]  Marshall S. Smith,et al.  The general inquirer: A computer approach to content analysis. , 1967 .

[16]  L. Meerabeau,et al.  The management of embarrassment and sexuality in health care. , 1999, Journal of advanced nursing.

[17]  Asimina Vasalou,et al.  Cultural differences, experience with social networks and the nature of "true commitment" in Facebook , 2010, Int. J. Hum. Comput. Stud..

[18]  Alessandro Acquisti,et al.  Privacy and Security of Personal Information - Economic Incentives and Technological Solutions , 2004, Economics of Information Security.

[19]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[20]  A. Joinson,et al.  Self-disclosure, Privacy and the Internet , 2009 .

[21]  Katelyn Y. A. McKenna,et al.  Oxford Handbook of Internet Psychology , 2007 .

[22]  Lee S. Strickland,et al.  Technology, security, and individual privacy: New tools, new threats, and new public perceptions , 2005, J. Assoc. Inf. Sci. Technol..

[23]  Anil Kumar Understanding Privacy , 2010 .

[24]  J. W. DeCew In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .

[25]  Michael A. Menlowe,et al.  Philosophical Dimensions of Privacy: An Anthology , 2009 .

[26]  Robert E. Kraut,et al.  Computers, Phones, and the Internet - Domesticating Information Technology , 2006, Computers, Phones, and the Internet.

[27]  Mike Z. Yao,et al.  Predicting user concerns about online privacy , 2007 .

[28]  Jim Harper,et al.  With A Grain of Salt: What Consumer Privacy Surveys Don't Tell Us , 2002 .

[29]  Priscilla M. Regan Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.

[30]  Adam N. Joinson,et al.  Measuring self-disclosure online: Blurring and non-response to sensitive items in web-based surveys , 2008, Comput. Hum. Behav..

[31]  Susan R. Fussell,et al.  Text analysis as a tool for analyzing conversation in online support groups , 2004, CHI EA '04.

[32]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[33]  James B. Rule,et al.  Privacy in PerilHow We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience , 2009 .

[34]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[35]  W. Parent Privacy, morality, and the law , 1985 .

[36]  Mika Raento,et al.  Designing for privacy and self-presentation in social awareness , 2008, Personal and Ubiquitous Computing.

[37]  M. Angela Sasse,et al.  Taming the wolf in sheep's clothing: privacy in multimedia communications , 1999, MULTIMEDIA '99.

[38]  Cindy K. Chung,et al.  The Psychological Functions of Function Words , 2007 .

[39]  David J. Werrett,et al.  The National DNA Database , 1997 .

[40]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[41]  L. Skinns,et al.  Choice, Privacy and Publicly Funded Legal Advice at Police Stations , 2010 .

[42]  Jeffrey T. Hancock,et al.  On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication , 2007 .

[43]  D. Knights,et al.  Walking with Moneylenders: The Ecology of the UK Home-collected Credit Industry , 2006 .

[44]  Paul Rayson Wmatrix : a web-based corpus processing environment , 2022 .

[45]  Judy Anderson,et al.  The War on Privacy/Privacy in Peril: How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience , 2011 .

[46]  Susan T. Dumais,et al.  The latent semantic analysis theory of knowledge , 1997 .

[47]  Louis A. Gottschalk,et al.  Computerized content analysis of natural language , 1989, Artif. Intell. Medicine.

[48]  Satanjeev Banerjee,et al.  The Design, Implementation, and Use of the Ngram Statistics Package , 2003, CICLing.

[49]  Philip J. Stone,et al.  Extracting Information. (Book Reviews: The General Inquirer. A Computer Approach to Content Analysis) , 1967 .

[50]  Herman T. Tavani,et al.  PHILOSOPHICAL THEORIES OF PRIVACY: IMPLICATIONS FOR AN ADEQUATE ONLINE PRIVACY POLICY , 2007 .

[51]  Alastair J. Gill,et al.  Language With Character: A Stratified Corpus Comparison of Individual Differences in E-Mail Communication , 2006 .

[52]  Yvonne Rogers,et al.  From spaces to places: emerging contexts in mobile privacy , 2009, UbiComp.

[53]  John Karat,et al.  Privacy and HCI: methodologies for studying privacy issues , 2006, CHI Extended Abstracts.

[54]  M. Engelmann The Philosophical Investigations , 2013 .

[55]  A. Joinson,et al.  Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..

[56]  J. Pennebaker,et al.  The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods , 2010 .

[57]  Eleanor Rosch,et al.  Principles of Categorization , 1978 .

[58]  Tristan Henderson,et al.  Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.