1999
DOI: 10.1006/jevp.1999.0140
|View full text |Cite
|
Sign up to set email alerts
|

Model for Types of Privacy by Privacy Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
74
0
5

Year Published

2005
2005
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 91 publications
(82 citation statements)
references
References 21 publications
1
74
0
5
Order By: Relevance
“…Altman, 1976) are considered authoritative. Their theories and ideas have stood the test of time and have been the basis of research for many subsequent authors (Margulis, 2003;Pedersen, 1999Pedersen, , 1997Petronio, 1991). The remainder of this section provides an aggregated overview of some of the core aspects of privacy compiled from the most influential literature.…”
Section: Privacy: a Review Of The Literaturementioning
confidence: 99%
See 4 more Smart Citations
“…Altman, 1976) are considered authoritative. Their theories and ideas have stood the test of time and have been the basis of research for many subsequent authors (Margulis, 2003;Pedersen, 1999Pedersen, , 1997Petronio, 1991). The remainder of this section provides an aggregated overview of some of the core aspects of privacy compiled from the most influential literature.…”
Section: Privacy: a Review Of The Literaturementioning
confidence: 99%
“…Reserve is based on a desire to limit disclosures to others. Pedersen (1997Pedersen ( , 1999 extended Westin"s model by adding isolation (i.e. using physical distance to be alone) and splitting intimacy into intimacy with family and intimacy with friends.…”
Section: Privacy Types Functions and Mechanismsmentioning
confidence: 99%
See 3 more Smart Citations