Coding Manual for "The Watcher and The Watched: Social Judgments about Privacy in a Public Place"
@inproceedings{Hagman2005CodingMF, title={Coding Manual for "The Watcher and The Watched: Social Judgments about Privacy in a Public Place"}, author={Jennifer Hagman and Rachel L. Severson and Batya Friedman and Peter H. Kahn}, year={2005}, url={https://api.semanticscholar.org/CorpusID:54165089} }
Results showed that the majority of participants upheld some modicum of privacy in public; people's privacy judgments were not a one-dimensional construct, but often involved considerations based on physical harm, psychological wellbeing, and informed consent.
No Paper Link Available
56 Citations
The Watcher and the Watched: Social Judgments About Privacy in a Public Place
- 2009
Sociology
Results showed that the majority of participants upheld some modicum of privacy in public; people’s privacy judgments were not a one-dimensional construct, but often involved considerations based on physical harm, psychological wellbeing, and informed consent.
The dynamics of data donation: privacy risk, mobility data, and the smart city
- 2021
Computer Science, Sociology
"This work was supported by the University of St Andrews and the Social Sciences and
Humanities Research Council of Canada (SSHRC) under the ‘Big Data Surveillance’
partnership grant. The grant’s…
Enhancing research into usable privacy and security
- 2009
Computer Science
The background on the usable privacy and security research field and literature is given, and three example problems that may yield interesting results to SIGDOC researchers are suggested.
Balancing privacy and serendipity in cyberspace
- 2022
Computer Science, Sociology
This vision paper explores how serendipity for remote workers can be created by leveraging IoT technologies, edge computing, high-resolution video, network protocols for live interaction, and video/audio denaturing.
Privacy Control and Assurance: Does Gender Influence Online Information Exchange?
- 2008
Computer Science, Sociology
This chapter presents survey results that suggest a relationship between gender and how users control personal information and suggests that e-businesses should modify information and privacy policies to increase information and transactional exchanges.
Privacy and Participation in Ubiquitous Information Systems: Information Ethics when Mobile Phones are Sensors
- 2008
Computer Science
This work states that ubiquitous information systems, which can sense and record data such as location, sound, and images, and pose new challenges for privacy, data security, and ethics, need to be designed and used more effectively.
The Effects of Privacy Concern and Social Influence on User Acceptance of Online Social Networks
- 2009
Business, Computer Science
The determinants of user acceptance of online social networks are investigated, with particular attention given to a research model incorporating the variables of privacy concern and social influence into the Technology Acceptance model.
Dimensions of Employee Privacy: An Empirical Study
- 2012
Business, Sociology
How additional notions of privacy relate to key demographic and employment characteristics and how data protection training, often instigated as a means of highlighting and addressing issues relating to privacy of customers’ data, is related to employees’ notions of their own workplace privacy are explored.
Value Sensitive Design and Information Systems
- 2020
Computer Science
Value Sensitive Design is a theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner throughout the design process, consisting of conceptual, empirical, and technical investigations.
A Workshop-Based Method for Navigating Value Tensions in Collectively Speculated Worlds
- 2023
Computer Science
This work iteratively developed a workshop-based method for probing ethical implications of emerging ubiquitous computing technologies, and introduces implication design as a means for participants with and without design experience to communicate how a technology might change to better serve them.
28 References
Philosophical Dimensions of Privacy
- 1984
Philosophy
Privacy as a topic is as fascinating as it is important. Though we all acknowledge its value in the abstract, there are numerous grounds for puzzling over its significance, and for being suspicious…
Value-sensitive design
- 1996
Computer Science
Value Sensitive Design particularly emphasizes values with moral import, including privacy, trust, human dignity, respect for person, physical and psychological well-being, informed consent, intellectual property, access, universal usability, freedom from bias, moral responsibility, and moral accountability.
The effects of filtered video on awareness and privacy
- 2000
Computer Science
The results suggest that the blur filter, and to a lesser extent the pixelize filter, have a level suitable for providing awareness information while safeguarding privacy.
Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems
- 1996
Computer Science
This paper describes a fundamental dual tradeoff that occurs in systems supporting awareness for distributed work groups, and presents several specific new techniques which illustrate good compromise…
The Right to Privacy
- 1890
Law
hat the individual shall have full protection in person and in property is a principle as old as the common law; but it has been found necessary from time to time to define anew the exact nature and…
Linking public spaces: technical and social issues
- 2001
Sociology, Computer Science
Responses to the system are reported, including unexpected issues, such as creative decorations of the spaces and assertions by a vocal minority of employees about the private nature of “public space.”
Judging social issues: difficulties, inconsistencies, and consistencies.
- 1991
Psychology
Examination of high school and college students' reasoning about the issues of abortion, homosexuality, pornography, and incest suggested that ambiguity around assumptions is a central component of the nonprototypicality of these issues.
The Development of Social Knowledge: Morality and Convention
- 1983
Philosophy, Sociology
Preface 1. Introduction: approaches to the study of social knowledge 2. Structure and development 3. Social experience and social knowledge 4. Dimensions of social judgments 5. Rules and prohibitions…
Experiences in the use of a media space
- 1991
Computer Science, Psychology
The experiences during initial use of CAVECAT are presented, including unsolved technological obstacles the authors have encountered, and the psychological and social impact of the technology are summarized.