2009
DOI: 10.1109/tse.2008.88
|View full text |Cite
|
Sign up to set email alerts
|

Engineering Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
272
1
3

Year Published

2012
2012
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 366 publications
(277 citation statements)
references
References 54 publications
1
272
1
3
Order By: Relevance
“…Work in ethics education focused on training computing engineers in relevant computer ethics (Herkert 2001;Hollander 2009). Work in ethical design focused on eliminating bias (Friedman and Nissenbaum 1997), achieving privacy by design (Spiekermann and Cranor 2009), or encouraging sustainability (Froehlich et al 2010).…”
Section: Background: Ethics In Computing Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Work in ethics education focused on training computing engineers in relevant computer ethics (Herkert 2001;Hollander 2009). Work in ethical design focused on eliminating bias (Friedman and Nissenbaum 1997), achieving privacy by design (Spiekermann and Cranor 2009), or encouraging sustainability (Froehlich et al 2010).…”
Section: Background: Ethics In Computing Workmentioning
confidence: 99%
“…Encouraging the developers and technology firms responsible for shaping our increasingly sociotechnical world to consider corporate social responsibility and the ethics of their work is an ongoing, unmet challenge (Brusoni and Vaccaro 2016). Building explicit ethical reflection into technology development is a goal of researchers (Miller, Friedman, and Jancke 2007;Spiekermann and Cranor 2009;Verbeek 2006), regulators (Federal Trade Commission 2012), and many firms (Brusoni and Vaccaro 2016). There has been little research, however, to understand how developers make choices between technical features that support ethical values (e.g., privacy or fairness) over other values (e.g., efficiency or novelty).…”
Section: Introduction: Investigating Work Dynamics That Impact Privacmentioning
confidence: 99%
“…Increasingly, an approach known as privacy by design is gaining popularity (Mayer and Narayanan 2013;Cavoukian 2012;Spiekermann and Cranor 2009). In privacy by design, privacy protection measures are built into technologies at the point of design.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition to the matrix, we utilise the Three Layer Privacy Model from Spiekermann & Cranor (2009) to explore privacy concerns in more detail.…”
Section: Approach and Methodologymentioning
confidence: 99%