Considering privacy in the development of multi-media communications

dc.contributor.authorClement, Andrew
dc.date.accessioned2020-06-06T00:42:35Z
dc.date.available2020-06-06T00:42:35Z
dc.date.issued1993
dc.date.issued1993
dc.description.abstractThis paper discusses the privacy implications of multi-media communications systems by examining how privacy issues arise and are dealt with by the researchers who are simultaneously developing and using such systems. While several design principles are emerging from this process that can guide future developments, it is argued that greater attention to privacy concerns will be needed as these new communications technologies are applied more widely.de
dc.identifier.doi10.1007/BF00749284
dc.identifier.pissn1573-7551
dc.identifier.urihttp://dx.doi.org/10.1007/BF00749284
dc.identifier.urihttps://dl.eusset.eu/handle/20.500.12015/3444
dc.publisherSpringer
dc.relation.ispartofComputer Supported Cooperative Work (CSCW): Vol. 2, No. 1-2
dc.relation.ispartofseriesComputer Supported Cooperative Work
dc.subjectCSCW
dc.subjectMedia Spaces
dc.subjectMulti-media Communications
dc.subjectPrivacy
dc.titleConsidering privacy in the development of multi-media communicationsde
dc.typeText/Journal Article
gi.citation.endPage88
gi.citation.startPage67
gi.citations.count19
gi.citations.elementRob Kling (1996): A Reader's Guide to Computerization and Controversy, In: Computerization and Controversy, doi:10.1016/b978-0-12-415040-9.50085-3
gi.citations.elementSusan Turner, Phil Turner (2007): Familiar problems re‐visited: the cooperative aspects of an e‐learning environment, In: Interactive Technology and Smart Education 2(4), doi:10.1108/17415650780000306
gi.citations.elementJeremy Birnholtz, Nanyi Bi, Susan Fussell (2012): Do you see that I see?, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/2207676.2208308
gi.citations.elementLeysia Palen, Paul Dourish (2003): Unpacking "privacy" for a networked world, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/642611.642635
gi.citations.elementRob Kling (1996): Beyond outlaws, hackers and pirates, In: ACM SIGCAS Computers and Society 2(26), doi:10.1145/236394.236395
gi.citations.elementThomas Herrmann, Isa Jahnke, Alexander Nolte (2021): A problem-based approach to the advancement of heuristics for socio-technical evaluation, In: Behaviour & Information Technology 14(41), doi:10.1080/0144929x.2021.1972157
gi.citations.elementJeffrey M. Stanton, Steven G. Rogelberg (2004): Beyond Online Surveys: Internet Research Opportunities for Industrial‐Organizational Psychology, In: Handbook of Research Methods in Industrial and Organizational Psychology, doi:10.1002/9780470756669.ch13
gi.citations.elementB. Lemken, H. Kahler, M. Rittenbruch (2000): Sustained knowledge management by organizational culture, In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, doi:10.1109/hicss.2000.926701
gi.citations.elementRob Kling (1996): Beyond Outlaws, Hackers, and Pirates: Ethical Issues in the Work of Information and Computer Science Professionals, In: Computerization and Controversy, doi:10.1016/b978-0-12-415040-9.50153-6
gi.citations.elementRob Kling (1996): Computers as Tools and Social Systems: The Car-Computer Analogy, In: Computerization and Controversy, doi:10.1016/b978-0-12-415040-9.50087-7
gi.citations.elementSoobin Cho, Joongseek Lee, Bongwon Suh (2023): "I Want to Reveal, but I Also Want to Hide" Understanding the Conflict of Revealing and Hiding Needs in Virtual Study Rooms, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(7), doi:10.1145/3610091
gi.citations.elementAndrew Clement, Ina Wagner (1995): Fragmented Exchange: Disarticulation and the Need for Regionalized Communication Spaces, In: Proceedings of the Fourth European Conference on Computer-Supported Cooperative Work ECSCW ’95, doi:10.1007/978-94-011-0349-7_3
gi.citations.elementJeremy Birnholtz, Johnathon Schultz, Matthew Lepage, Carl Gutwin (2011): A Framework for Supporting Joint Interpersonal Attention in Distributed Groups, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-23774-4_25
gi.citations.elementRula Sayaf, Dave Clarke, James B. Rule (2015): The other side of privacy, In: Proceedings of the 2015 British HCI Conference, doi:10.1145/2783446.2783584
gi.citations.elementVictoria Bellotti (1996): What You Don’t Know Can Hurt You: Privacy in Collaborative Computing, In: People and Computers XI, doi:10.1007/978-1-4471-3588-3_16
gi.citations.elementNari Kim, Sangsu Jang, Hansol Kim, Jaeyeon Lee, Young-Woo Park (2023): Design and Field Trial of Tunee in Shared Houses: Exploring Experiences of Sharing Individuals’ Current Noise-level Preferences with Housemates, In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3544548.3581521
gi.citations.elementFrank Stuart Symons (1997): Network Access Skills and Equity in the Workplace: Polarization in Social Policy, In: Canadian Journal of Communication 2(22), doi:10.22230/cjc.1997v22n2a994
gi.citations.elementPaul Dourish, Ken Anderson (2006): Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena, In: Human-Computer Interaction 3(21), doi:10.1207/s15327051hci2103_2
gi.citations.elementRob Kling (1996): Information Technologies and the Shifting Balance between Privacy and Social Control, In: Computerization and Controversy, doi:10.1016/b978-0-12-415040-9.50132-9

Files