• Corpus ID: 54165089

Coding Manual for "The Watcher and The Watched: Social Judgments about Privacy in a Public Place"

@inproceedings{Hagman2005CodingMF,
  title={Coding Manual for "The Watcher and The Watched: Social Judgments about Privacy in a Public Place"},
  author={Jennifer Hagman and Rachel L. Severson and Batya Friedman and Peter H. Kahn},
  year={2005},
  url={https://api.semanticscholar.org/CorpusID:54165089}
}
Results showed that the majority of participants upheld some modicum of privacy in public; people's privacy judgments were not a one-dimensional construct, but often involved considerations based on physical harm, psychological wellbeing, and informed consent.

The Watcher and the Watched: Social Judgments About Privacy in a Public Place

Results showed that the majority of participants upheld some modicum of privacy in public; people’s privacy judgments were not a one-dimensional construct, but often involved considerations based on physical harm, psychological wellbeing, and informed consent.

The dynamics of data donation: privacy risk, mobility data, and the smart city

"This work was supported by the University of St Andrews and the Social Sciences and Humanities Research Council of Canada (SSHRC) under the ‘Big Data Surveillance’ partnership grant. The grant’s

Enhancing research into usable privacy and security

The background on the usable privacy and security research field and literature is given, and three example problems that may yield interesting results to SIGDOC researchers are suggested.

Balancing privacy and serendipity in cyberspace

This vision paper explores how serendipity for remote workers can be created by leveraging IoT technologies, edge computing, high-resolution video, network protocols for live interaction, and video/audio denaturing.

Privacy Control and Assurance: Does Gender Influence Online Information Exchange?

This chapter presents survey results that suggest a relationship between gender and how users control personal information and suggests that e-businesses should modify information and privacy policies to increase information and transactional exchanges.

Privacy and Participation in Ubiquitous Information Systems: Information Ethics when Mobile Phones are Sensors

This work states that ubiquitous information systems, which can sense and record data such as location, sound, and images, and pose new challenges for privacy, data security, and ethics, need to be designed and used more effectively.

The Effects of Privacy Concern and Social Influence on User Acceptance of Online Social Networks

The determinants of user acceptance of online social networks are investigated, with particular attention given to a research model incorporating the variables of privacy concern and social influence into the Technology Acceptance model.

Dimensions of Employee Privacy: An Empirical Study

How additional notions of privacy relate to key demographic and employment characteristics and how data protection training, often instigated as a means of highlighting and addressing issues relating to privacy of customers’ data, is related to employees’ notions of their own workplace privacy are explored.

Value Sensitive Design and Information Systems

Value Sensitive Design is a theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner throughout the design process, consisting of conceptual, empirical, and technical investigations.

A Workshop-Based Method for Navigating Value Tensions in Collectively Speculated Worlds

This work iteratively developed a workshop-based method for probing ethical implications of emerging ubiquitous computing technologies, and introduces implication design as a means for participants with and without design experience to communicate how a technology might change to better serve them.
...

Philosophical Dimensions of Privacy

Privacy as a topic is as fascinating as it is important. Though we all acknowledge its value in the abstract, there are numerous grounds for puzzling over its significance, and for being suspicious

Value-sensitive design

Value Sensitive Design particularly emphasizes values with moral import, including privacy, trust, human dignity, respect for person, physical and psychological well-being, informed consent, intellectual property, access, universal usability, freedom from bias, moral responsibility, and moral accountability.

The effects of filtered video on awareness and privacy

The results suggest that the blur filter, and to a lesser extent the pixelize filter, have a level suitable for providing awareness information while safeguarding privacy.

Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems

This paper describes a fundamental dual tradeoff that occurs in systems supporting awareness for distributed work groups, and presents several specific new techniques which illustrate good compromise

The Right to Privacy

hat the individual shall have full protection in person and in property is a principle as old as the common law; but it has been found necessary from time to time to define anew the exact nature and

Linking public spaces: technical and social issues

Responses to the system are reported, including unexpected issues, such as creative decorations of the spaces and assertions by a vocal minority of employees about the private nature of “public space.”

Judging social issues: difficulties, inconsistencies, and consistencies.

Examination of high school and college students' reasoning about the issues of abortion, homosexuality, pornography, and incest suggested that ambiguity around assumptions is a central component of the nonprototypicality of these issues.

The Development of Social Knowledge: Morality and Convention

Preface 1. Introduction: approaches to the study of social knowledge 2. Structure and development 3. Social experience and social knowledge 4. Dimensions of social judgments 5. Rules and prohibitions

Experiences in the use of a media space

The experiences during initial use of CAVECAT are presented, including unsolved technological obstacles the authors have encountered, and the psychological and social impact of the technology are summarized.