Keywords
- Privacy Issue
- Soft System Methodology
- Information System Research
- Information System Development
- Informational Privacy
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Buying options
Preview
Unable to display preview. Download preview PDF.
References
Altman, I., 1976, Privacy: A conceptual analysis, Environment and Behavior 8(1):7–29.
Ariss, S. S., 2002, Computer monitoring: benefits and pitfalls facing management, Information & Management 39(7):553–558.
Avison, D. E., and Fitzgerald, G., 1995, Information Systems Development: Methodologies, Techniques and Tools, Second Edition, McGraw-Hill, London.
Avison, D. E., and Wood-Harper, A. T., 1990, Multiview: An Exploration of Information Systems Development, Blackwell, Oxford.
Baase, S., 2003, A Gift of Fire: Social, Legal and Ethical Issues for Computers and the Internet, Second Edition, Prentice Hall, NJ.
Brandt, D., and Cernetic, J., 1998, Human-centred approaches to control and information technology: European experiences, AI & Society 12:2–20.
Burgoon, J., 1982, Privacy and communication, in: Comms Yearbook 6, M. Burgoon, ed., Sage, CA, pp. 206–249.
Checkland, P., and Scholes, J., 1990, Soft Systems Methodology in Action, Wiley, Chichester.
Checkland, P., 1999, Soft Systems Methodology: A 30-Year Retrospective, Wiley, Chichester.
Galliers, R. D., 1992, Choosing information systems research approaches, in: Information Systems Research, R. Galliers, ed., Blackwell, Oxford, pp. 144–162.
Gill, K. S., 1996, The human-centred movement: The British context, AI & Society 1996(10):109–126.
Hall, E. T., 1966, The Hidden Dimension, Doubleday, New York.
Hirschheim, R., and Newman, M., 1988, Information systems and user resistance: Theory and practice, The Computer Journal 31(5):398–408.
Hirschheim, R., and Newman, M., 1991, Symbolism and information systems development: myth, metaphor and magic, Information Systems Research 2(1):29–62.
Jacobson, I., Booch, G., and Rumbaugh, J., 1999, The Unified Software Development Process, Addison-Wesley, MA.
Kaya, N., and Weber, M. J., 2003, Cross-cultural differences in the perception of crowding and privacy regulation: American and Turkish students, Journal of Environmental Psychology 23(3):301–309.
Leino-Kilpi, H., Valimaki, M., Dassen, T., Gasull, M., Lemonidou, C., Scott, A., and Arndt, A., 2001, Privacy: A review of the literature, International Journal of Nursing Studies 38(6):663–671.
Margulis, S. T., 2003, On the status and contribution of Westin’s and Altman’s theories of privacy, Journal of Social Issues 59(2):411–429.
Mumford, E., 2000, A socio-technical approach to systems design, Requirements Engineering 5:125–133.
Newell, P. B., 1998, A cross-cultural comparison of privacy definitions and functions: A systems approach, Journal of Environmental Psychology 18(4):357–371.
Oz, E., Glass, R., and Behling, R., 1999, Electronic workplace monitoring: What employees think, Omega 27(2):167–177.
Palen, L., and Dourish, P., 2003, Unpacking “privacy” for a networked world, Proceedings of the conference on Human factors in computing systems, Ft. Lauderdale, Florida, 129–136.
Pedersen, D. M., 1997, Psychological functions of privacy, Journal of Envir. Psych. 17(2):147–156.
Pedersen, D. M., 1999, Model for types of privacy by privacy functions, Journ. of Envir. Psych. 19(4):397–405.
Petronio, S., 1991, Communication boundary management: A theoretical model of managing discourse of private information between marital couples, Communication Theory 1(4):311–335.
Shapiro, B. and Baker, C. R., 2001, Information technology and the social construction of information privacy, Journal of Accounting and Public Policy 20(4–5):295–322.
Stapleton, L., 2001, Information Systems Development: An Empirical Study of Irish Manufacturing Firms, Ph.D Thesis, University College Cork.
Stone, D. L. and Stone-Romero, E. F., 1998, A multiple stakeholder model of privacy in organizations, in: Managerial Ethics: Moral Mgmt. of People and Processes, M. Schminke, ed., Erlbaum, NJ, pp. 35–39.
UN, 1948, United Nations Universal Declaration of Human Rights; http://www.un.org/Overview/rights.html.
Weaver, P. L., 1993, Practical SSADM Version 4, Pitman, London.
Westin, A., 1970, Privacy and Freedom, Atheneum, New York.
Zweig, D., and Webster, J., 2003, Personality as a moderator of monitoring acceptance, Computers in Human Behavior 19(4):479–493.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer
About this paper
Cite this paper
Carew, P.J., Stapleton, L. (2005). Towards a Privacy Framework for Information Systems Development. In: Vasilecas, O., Wojtkowski, W., Zupančič, J., Caplinskas, A., Wojtkowski, W.G., Wrycza, S. (eds) Information Systems Development. Springer, Boston, MA. https://doi.org/10.1007/0-387-28809-0_8
Download citation
DOI: https://doi.org/10.1007/0-387-28809-0_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25026-7
Online ISBN: 978-0-387-28809-3
eBook Packages: Computer ScienceComputer Science (R0)