Considering privacy in the development of multi-media communications
Loading...
Fulltext URI
Document type
Text/Journal Article
Additional Information
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Springer
Abstract
This paper discusses the privacy implications of multi-media communications systems by examining how privacy issues arise and are dealt with by the researchers who are simultaneously developing and using such systems. While several design principles are emerging from this process that can guide future developments, it is argued that greater attention to privacy concerns will be needed as these new communications technologies are applied more widely.
Description
Keywords
CSCW, Media Spaces, Multi-media Communications, Privacy
Citation
URI
Collections
Endorsement
Review
Supplemented By
Referenced By
Number of citations to item: 19
- Rob Kling (1996): A Reader's Guide to Computerization and Controversy, In: Computerization and Controversy, doi:10.1016/b978-0-12-415040-9.50085-3
- Susan Turner, Phil Turner (2007): Familiar problems re‐visited: the cooperative aspects of an e‐learning environment, In: Interactive Technology and Smart Education 2(4), doi:10.1108/17415650780000306
- Jeremy Birnholtz, Nanyi Bi, Susan Fussell (2012): Do you see that I see?, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/2207676.2208308
- Leysia Palen, Paul Dourish (2003): Unpacking "privacy" for a networked world, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/642611.642635
- Rob Kling (1996): Beyond outlaws, hackers and pirates, In: ACM SIGCAS Computers and Society 2(26), doi:10.1145/236394.236395
- Thomas Herrmann, Isa Jahnke, Alexander Nolte (2021): A problem-based approach to the advancement of heuristics for socio-technical evaluation, In: Behaviour & Information Technology 14(41), doi:10.1080/0144929x.2021.1972157
- Jeffrey M. Stanton, Steven G. Rogelberg (2004): Beyond Online Surveys: Internet Research Opportunities for Industrial‐Organizational Psychology, In: Handbook of Research Methods in Industrial and Organizational Psychology, doi:10.1002/9780470756669.ch13
- B. Lemken, H. Kahler, M. Rittenbruch (2000): Sustained knowledge management by organizational culture, In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, doi:10.1109/hicss.2000.926701
- Rob Kling (1996): Beyond Outlaws, Hackers, and Pirates: Ethical Issues in the Work of Information and Computer Science Professionals, In: Computerization and Controversy, doi:10.1016/b978-0-12-415040-9.50153-6
- Rob Kling (1996): Computers as Tools and Social Systems: The Car-Computer Analogy, In: Computerization and Controversy, doi:10.1016/b978-0-12-415040-9.50087-7
- Soobin Cho, Joongseek Lee, Bongwon Suh (2023): "I Want to Reveal, but I Also Want to Hide" Understanding the Conflict of Revealing and Hiding Needs in Virtual Study Rooms, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(7), doi:10.1145/3610091
- Andrew Clement, Ina Wagner (1995): Fragmented Exchange: Disarticulation and the Need for Regionalized Communication Spaces, In: Proceedings of the Fourth European Conference on Computer-Supported Cooperative Work ECSCW ’95, doi:10.1007/978-94-011-0349-7_3
- Jeremy Birnholtz, Johnathon Schultz, Matthew Lepage, Carl Gutwin (2011): A Framework for Supporting Joint Interpersonal Attention in Distributed Groups, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-23774-4_25
- Rula Sayaf, Dave Clarke, James B. Rule (2015): The other side of privacy, In: Proceedings of the 2015 British HCI Conference, doi:10.1145/2783446.2783584
- Victoria Bellotti (1996): What You Don’t Know Can Hurt You: Privacy in Collaborative Computing, In: People and Computers XI, doi:10.1007/978-1-4471-3588-3_16
- Nari Kim, Sangsu Jang, Hansol Kim, Jaeyeon Lee, Young-Woo Park (2023): Design and Field Trial of Tunee in Shared Houses: Exploring Experiences of Sharing Individuals’ Current Noise-level Preferences with Housemates, In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3544548.3581521
- Frank Stuart Symons (1997): Network Access Skills and Equity in the Workplace: Polarization in Social Policy, In: Canadian Journal of Communication 2(22), doi:10.22230/cjc.1997v22n2a994
- Paul Dourish, Ken Anderson (2006): Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena, In: Human-Computer Interaction 3(21), doi:10.1207/s15327051hci2103_2
- Rob Kling (1996): Information Technologies and the Shifting Balance between Privacy and Social Control, In: Computerization and Controversy, doi:10.1016/b978-0-12-415040-9.50132-9