Skip to main content

Towards a Privacy Framework for Information Systems Development

  • Conference paper

Keywords

  • Privacy Issue
  • Soft System Methodology
  • Information System Research
  • Information System Development
  • Informational Privacy

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/0-387-28809-0_8
  • Chapter length: 12 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   249.00
Price excludes VAT (USA)
  • ISBN: 978-0-387-28809-3
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   319.00
Price excludes VAT (USA)
Hardcover Book
USD   319.00
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Altman, I., 1976, Privacy: A conceptual analysis, Environment and Behavior 8(1):7–29.

    MathSciNet  Google Scholar 

  • Ariss, S. S., 2002, Computer monitoring: benefits and pitfalls facing management, Information & Management 39(7):553–558.

    CrossRef  Google Scholar 

  • Avison, D. E., and Fitzgerald, G., 1995, Information Systems Development: Methodologies, Techniques and Tools, Second Edition, McGraw-Hill, London.

    Google Scholar 

  • Avison, D. E., and Wood-Harper, A. T., 1990, Multiview: An Exploration of Information Systems Development, Blackwell, Oxford.

    Google Scholar 

  • Baase, S., 2003, A Gift of Fire: Social, Legal and Ethical Issues for Computers and the Internet, Second Edition, Prentice Hall, NJ.

    Google Scholar 

  • Brandt, D., and Cernetic, J., 1998, Human-centred approaches to control and information technology: European experiences, AI & Society 12:2–20.

    CrossRef  Google Scholar 

  • Burgoon, J., 1982, Privacy and communication, in: Comms Yearbook 6, M. Burgoon, ed., Sage, CA, pp. 206–249.

    Google Scholar 

  • Checkland, P., and Scholes, J., 1990, Soft Systems Methodology in Action, Wiley, Chichester.

    Google Scholar 

  • Checkland, P., 1999, Soft Systems Methodology: A 30-Year Retrospective, Wiley, Chichester.

    Google Scholar 

  • Galliers, R. D., 1992, Choosing information systems research approaches, in: Information Systems Research, R. Galliers, ed., Blackwell, Oxford, pp. 144–162.

    Google Scholar 

  • Gill, K. S., 1996, The human-centred movement: The British context, AI & Society 1996(10):109–126.

    Google Scholar 

  • Hall, E. T., 1966, The Hidden Dimension, Doubleday, New York.

    Google Scholar 

  • Hirschheim, R., and Newman, M., 1988, Information systems and user resistance: Theory and practice, The Computer Journal 31(5):398–408.

    CrossRef  Google Scholar 

  • Hirschheim, R., and Newman, M., 1991, Symbolism and information systems development: myth, metaphor and magic, Information Systems Research 2(1):29–62.

    Google Scholar 

  • Jacobson, I., Booch, G., and Rumbaugh, J., 1999, The Unified Software Development Process, Addison-Wesley, MA.

    Google Scholar 

  • Kaya, N., and Weber, M. J., 2003, Cross-cultural differences in the perception of crowding and privacy regulation: American and Turkish students, Journal of Environmental Psychology 23(3):301–309.

    CrossRef  Google Scholar 

  • Leino-Kilpi, H., Valimaki, M., Dassen, T., Gasull, M., Lemonidou, C., Scott, A., and Arndt, A., 2001, Privacy: A review of the literature, International Journal of Nursing Studies 38(6):663–671.

    CrossRef  Google Scholar 

  • Margulis, S. T., 2003, On the status and contribution of Westin’s and Altman’s theories of privacy, Journal of Social Issues 59(2):411–429.

    Google Scholar 

  • Mumford, E., 2000, A socio-technical approach to systems design, Requirements Engineering 5:125–133.

    Google Scholar 

  • Newell, P. B., 1998, A cross-cultural comparison of privacy definitions and functions: A systems approach, Journal of Environmental Psychology 18(4):357–371.

    CrossRef  Google Scholar 

  • Oz, E., Glass, R., and Behling, R., 1999, Electronic workplace monitoring: What employees think, Omega 27(2):167–177.

    CrossRef  Google Scholar 

  • Palen, L., and Dourish, P., 2003, Unpacking “privacy” for a networked world, Proceedings of the conference on Human factors in computing systems, Ft. Lauderdale, Florida, 129–136.

    Google Scholar 

  • Pedersen, D. M., 1997, Psychological functions of privacy, Journal of Envir. Psych. 17(2):147–156.

    Google Scholar 

  • Pedersen, D. M., 1999, Model for types of privacy by privacy functions, Journ. of Envir. Psych. 19(4):397–405.

    Google Scholar 

  • Petronio, S., 1991, Communication boundary management: A theoretical model of managing discourse of private information between marital couples, Communication Theory 1(4):311–335.

    Google Scholar 

  • Shapiro, B. and Baker, C. R., 2001, Information technology and the social construction of information privacy, Journal of Accounting and Public Policy 20(4–5):295–322.

    Google Scholar 

  • Stapleton, L., 2001, Information Systems Development: An Empirical Study of Irish Manufacturing Firms, Ph.D Thesis, University College Cork.

    Google Scholar 

  • Stone, D. L. and Stone-Romero, E. F., 1998, A multiple stakeholder model of privacy in organizations, in: Managerial Ethics: Moral Mgmt. of People and Processes, M. Schminke, ed., Erlbaum, NJ, pp. 35–39.

    Google Scholar 

  • UN, 1948, United Nations Universal Declaration of Human Rights; http://www.un.org/Overview/rights.html.

    Google Scholar 

  • Weaver, P. L., 1993, Practical SSADM Version 4, Pitman, London.

    Google Scholar 

  • Westin, A., 1970, Privacy and Freedom, Atheneum, New York.

    Google Scholar 

  • Zweig, D., and Webster, J., 2003, Personality as a moderator of monitoring acceptance, Computers in Human Behavior 19(4):479–493.

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2005 Springer

About this paper

Cite this paper

Carew, P.J., Stapleton, L. (2005). Towards a Privacy Framework for Information Systems Development. In: Vasilecas, O., Wojtkowski, W., Zupančič, J., Caplinskas, A., Wojtkowski, W.G., Wrycza, S. (eds) Information Systems Development. Springer, Boston, MA. https://doi.org/10.1007/0-387-28809-0_8

Download citation

  • DOI: https://doi.org/10.1007/0-387-28809-0_8

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-25026-7

  • Online ISBN: 978-0-387-28809-3

  • eBook Packages: Computer ScienceComputer Science (R0)