Skip to main content

Towards a Privacy Framework for Information Systems Development

  • Conference paper
Information Systems Development

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Altman, I., 1976, Privacy: A conceptual analysis, Environment and Behavior 8(1):7–29.

    MathSciNet  Google Scholar 

  • Ariss, S. S., 2002, Computer monitoring: benefits and pitfalls facing management, Information & Management 39(7):553–558.

    Article  Google Scholar 

  • Avison, D. E., and Fitzgerald, G., 1995, Information Systems Development: Methodologies, Techniques and Tools, Second Edition, McGraw-Hill, London.

    Google Scholar 

  • Avison, D. E., and Wood-Harper, A. T., 1990, Multiview: An Exploration of Information Systems Development, Blackwell, Oxford.

    Google Scholar 

  • Baase, S., 2003, A Gift of Fire: Social, Legal and Ethical Issues for Computers and the Internet, Second Edition, Prentice Hall, NJ.

    Google Scholar 

  • Brandt, D., and Cernetic, J., 1998, Human-centred approaches to control and information technology: European experiences, AI & Society 12:2–20.

    Article  Google Scholar 

  • Burgoon, J., 1982, Privacy and communication, in: Comms Yearbook 6, M. Burgoon, ed., Sage, CA, pp. 206–249.

    Google Scholar 

  • Checkland, P., and Scholes, J., 1990, Soft Systems Methodology in Action, Wiley, Chichester.

    Google Scholar 

  • Checkland, P., 1999, Soft Systems Methodology: A 30-Year Retrospective, Wiley, Chichester.

    Google Scholar 

  • Galliers, R. D., 1992, Choosing information systems research approaches, in: Information Systems Research, R. Galliers, ed., Blackwell, Oxford, pp. 144–162.

    Google Scholar 

  • Gill, K. S., 1996, The human-centred movement: The British context, AI & Society 1996(10):109–126.

    Google Scholar 

  • Hall, E. T., 1966, The Hidden Dimension, Doubleday, New York.

    Google Scholar 

  • Hirschheim, R., and Newman, M., 1988, Information systems and user resistance: Theory and practice, The Computer Journal 31(5):398–408.

    Article  Google Scholar 

  • Hirschheim, R., and Newman, M., 1991, Symbolism and information systems development: myth, metaphor and magic, Information Systems Research 2(1):29–62.

    Google Scholar 

  • Jacobson, I., Booch, G., and Rumbaugh, J., 1999, The Unified Software Development Process, Addison-Wesley, MA.

    Google Scholar 

  • Kaya, N., and Weber, M. J., 2003, Cross-cultural differences in the perception of crowding and privacy regulation: American and Turkish students, Journal of Environmental Psychology 23(3):301–309.

    Article  Google Scholar 

  • Leino-Kilpi, H., Valimaki, M., Dassen, T., Gasull, M., Lemonidou, C., Scott, A., and Arndt, A., 2001, Privacy: A review of the literature, International Journal of Nursing Studies 38(6):663–671.

    Article  Google Scholar 

  • Margulis, S. T., 2003, On the status and contribution of Westin’s and Altman’s theories of privacy, Journal of Social Issues 59(2):411–429.

    Google Scholar 

  • Mumford, E., 2000, A socio-technical approach to systems design, Requirements Engineering 5:125–133.

    Google Scholar 

  • Newell, P. B., 1998, A cross-cultural comparison of privacy definitions and functions: A systems approach, Journal of Environmental Psychology 18(4):357–371.

    Article  Google Scholar 

  • Oz, E., Glass, R., and Behling, R., 1999, Electronic workplace monitoring: What employees think, Omega 27(2):167–177.

    Article  Google Scholar 

  • Palen, L., and Dourish, P., 2003, Unpacking “privacy” for a networked world, Proceedings of the conference on Human factors in computing systems, Ft. Lauderdale, Florida, 129–136.

    Google Scholar 

  • Pedersen, D. M., 1997, Psychological functions of privacy, Journal of Envir. Psych. 17(2):147–156.

    Google Scholar 

  • Pedersen, D. M., 1999, Model for types of privacy by privacy functions, Journ. of Envir. Psych. 19(4):397–405.

    Google Scholar 

  • Petronio, S., 1991, Communication boundary management: A theoretical model of managing discourse of private information between marital couples, Communication Theory 1(4):311–335.

    Google Scholar 

  • Shapiro, B. and Baker, C. R., 2001, Information technology and the social construction of information privacy, Journal of Accounting and Public Policy 20(4–5):295–322.

    Google Scholar 

  • Stapleton, L., 2001, Information Systems Development: An Empirical Study of Irish Manufacturing Firms, Ph.D Thesis, University College Cork.

    Google Scholar 

  • Stone, D. L. and Stone-Romero, E. F., 1998, A multiple stakeholder model of privacy in organizations, in: Managerial Ethics: Moral Mgmt. of People and Processes, M. Schminke, ed., Erlbaum, NJ, pp. 35–39.

    Google Scholar 

  • UN, 1948, United Nations Universal Declaration of Human Rights; http://www.un.org/Overview/rights.html.

    Google Scholar 

  • Weaver, P. L., 1993, Practical SSADM Version 4, Pitman, London.

    Google Scholar 

  • Westin, A., 1970, Privacy and Freedom, Atheneum, New York.

    Google Scholar 

  • Zweig, D., and Webster, J., 2003, Personality as a moderator of monitoring acceptance, Computers in Human Behavior 19(4):479–493.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer

About this paper

Cite this paper

Carew, P.J., Stapleton, L. (2005). Towards a Privacy Framework for Information Systems Development. In: Vasilecas, O., Wojtkowski, W., Zupančič, J., Caplinskas, A., Wojtkowski, W.G., Wrycza, S. (eds) Information Systems Development. Springer, Boston, MA. https://doi.org/10.1007/0-387-28809-0_8

Download citation

  • DOI: https://doi.org/10.1007/0-387-28809-0_8

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-25026-7

  • Online ISBN: 978-0-387-28809-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics