Towards a Privacy Framework for Information Systems Development

Conference paper


Privacy Issue Soft System Methodology Information System Research Information System Development Informational Privacy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Altman, I., 1976, Privacy: A conceptual analysis, Environment and Behavior 8(1):7–29.MathSciNetGoogle Scholar
  2. Ariss, S. S., 2002, Computer monitoring: benefits and pitfalls facing management, Information & Management 39(7):553–558.CrossRefGoogle Scholar
  3. Avison, D. E., and Fitzgerald, G., 1995, Information Systems Development: Methodologies, Techniques and Tools, Second Edition, McGraw-Hill, London.Google Scholar
  4. Avison, D. E., and Wood-Harper, A. T., 1990, Multiview: An Exploration of Information Systems Development, Blackwell, Oxford.Google Scholar
  5. Baase, S., 2003, A Gift of Fire: Social, Legal and Ethical Issues for Computers and the Internet, Second Edition, Prentice Hall, NJ.Google Scholar
  6. Brandt, D., and Cernetic, J., 1998, Human-centred approaches to control and information technology: European experiences, AI & Society 12:2–20.CrossRefGoogle Scholar
  7. Burgoon, J., 1982, Privacy and communication, in: Comms Yearbook 6, M. Burgoon, ed., Sage, CA, pp. 206–249.Google Scholar
  8. Checkland, P., and Scholes, J., 1990, Soft Systems Methodology in Action, Wiley, Chichester.Google Scholar
  9. Checkland, P., 1999, Soft Systems Methodology: A 30-Year Retrospective, Wiley, Chichester.Google Scholar
  10. Galliers, R. D., 1992, Choosing information systems research approaches, in: Information Systems Research, R. Galliers, ed., Blackwell, Oxford, pp. 144–162.Google Scholar
  11. Gill, K. S., 1996, The human-centred movement: The British context, AI & Society 1996(10):109–126.Google Scholar
  12. Hall, E. T., 1966, The Hidden Dimension, Doubleday, New York.Google Scholar
  13. Hirschheim, R., and Newman, M., 1988, Information systems and user resistance: Theory and practice, The Computer Journal 31(5):398–408.CrossRefGoogle Scholar
  14. Hirschheim, R., and Newman, M., 1991, Symbolism and information systems development: myth, metaphor and magic, Information Systems Research 2(1):29–62.Google Scholar
  15. Jacobson, I., Booch, G., and Rumbaugh, J., 1999, The Unified Software Development Process, Addison-Wesley, MA.Google Scholar
  16. Kaya, N., and Weber, M. J., 2003, Cross-cultural differences in the perception of crowding and privacy regulation: American and Turkish students, Journal of Environmental Psychology 23(3):301–309.CrossRefGoogle Scholar
  17. Leino-Kilpi, H., Valimaki, M., Dassen, T., Gasull, M., Lemonidou, C., Scott, A., and Arndt, A., 2001, Privacy: A review of the literature, International Journal of Nursing Studies 38(6):663–671.CrossRefGoogle Scholar
  18. Margulis, S. T., 2003, On the status and contribution of Westin’s and Altman’s theories of privacy, Journal of Social Issues 59(2):411–429.Google Scholar
  19. Mumford, E., 2000, A socio-technical approach to systems design, Requirements Engineering 5:125–133.Google Scholar
  20. Newell, P. B., 1998, A cross-cultural comparison of privacy definitions and functions: A systems approach, Journal of Environmental Psychology 18(4):357–371.CrossRefGoogle Scholar
  21. Oz, E., Glass, R., and Behling, R., 1999, Electronic workplace monitoring: What employees think, Omega 27(2):167–177.CrossRefGoogle Scholar
  22. Palen, L., and Dourish, P., 2003, Unpacking “privacy” for a networked world, Proceedings of the conference on Human factors in computing systems, Ft. Lauderdale, Florida, 129–136.Google Scholar
  23. Pedersen, D. M., 1997, Psychological functions of privacy, Journal of Envir. Psych. 17(2):147–156.Google Scholar
  24. Pedersen, D. M., 1999, Model for types of privacy by privacy functions, Journ. of Envir. Psych. 19(4):397–405.Google Scholar
  25. Petronio, S., 1991, Communication boundary management: A theoretical model of managing discourse of private information between marital couples, Communication Theory 1(4):311–335.Google Scholar
  26. Shapiro, B. and Baker, C. R., 2001, Information technology and the social construction of information privacy, Journal of Accounting and Public Policy 20(4–5):295–322.Google Scholar
  27. Stapleton, L., 2001, Information Systems Development: An Empirical Study of Irish Manufacturing Firms, Ph.D Thesis, University College Cork.Google Scholar
  28. Stone, D. L. and Stone-Romero, E. F., 1998, A multiple stakeholder model of privacy in organizations, in: Managerial Ethics: Moral Mgmt. of People and Processes, M. Schminke, ed., Erlbaum, NJ, pp. 35–39.Google Scholar
  29. UN, 1948, United Nations Universal Declaration of Human Rights; Scholar
  30. Weaver, P. L., 1993, Practical SSADM Version 4, Pitman, London.Google Scholar
  31. Westin, A., 1970, Privacy and Freedom, Atheneum, New York.Google Scholar
  32. Zweig, D., and Webster, J., 2003, Personality as a moderator of monitoring acceptance, Computers in Human Behavior 19(4):479–493.CrossRefGoogle Scholar

Copyright information

© Springer 2005

Authors and Affiliations

  1. 1.ISOL Research CentreWaterford Institute of TechnologyIreland

Personalised recommendations