Abstract
The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the ethical and technological dimensions of privacy and security is structured as a bibliometric analysis. Our dataset covers all articles published in IEEE Security and Privacy since its inception in 2003 to February 06, 2014 . This venue was chosen not only because of its target readership, but also because a preliminary search of keywords related to ethics, privacy, and security topics in the ISI Web of Knowledge and IEEE Xplore indicated that IEEE Security and Privacy has published a preponderance of articles matching those topics. In fact, our search returned two-fold more articles for IEEE Security and Privacy than the next most prolific venue. These reasons, coupled with the fact that both academia and industry are well-represented in the authorship of articles makes IEEE Security and Privacy an excellent candidate for bibliometric analysis. Our analysis examines the ways articles in IEEE Security and Privacy relate ethics to information technology. Such articles can influence the development of law, policy and the future of information technology ethics. We employed thematic and JK-biplot analyses of content relating privacy and ethics and found eight dominant themes as well as the inter-theme relationships. Authors and institutional affiliations were examined to discern whether centers of research activity and/or authors dominated the overall field or thematic areas. Results suggest avenues for future work in critical areas, especially for closing present gaps in the coverage of ethics and information technology privacy and security themes particularly in the areas of ethics and privacy awareness.


Similar content being viewed by others
References
Acquisti, A. (2014) From the economics of privacy to the economics of big data. Privacy, big data, and the public good: Frameworks for engagement
Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security and Privacy, 3(1), 23–33.
Acquisti, A., John, L.K., & Loewenstein, G. (2013). What is privacy worth? The Journal of Legal Studies 42(2), 249–274. doi: 10.1086/671754
Allen, A. (2007). The virtuous spy: privacy as an ethical limit. Scholarship at Penn Law.
Azevedo, P. G., Mesquita, F. O., & Young, R. J. (2010). Fishing for gaps in science: A bibliographic analysis of Brazilian freshwater ichthyology from 1986 to 2005. Journal of Fish Biology, 76(9), 2177–2193.
Beel, J., & Gipp, B. (2010). Academic Search Engine Spam and Google Scholar’s Resilience Against it. Journal of electronic publishing.
Boyd, D., & Crawford, K. (2012). Critical questions for big data. Information, Communication and Society, 15(5), 662–679.
Cohen, J.E. (2013). What privacy is for. Harvard Law Review 126.
Diebold, F. X. (2003). Advances in economics and econometrics: Theory and applications, econometric society monographs. Eighth world congress. Cambridge: Cambridge University Press.
Gauch, H, Jr. (1993). Prediction. Parsimony and Noise. American scientist, 81(5), 468–478.
Ghosh, D.P., Schrader, D.E., Schulze, W.D., Wicker, S.B. (2012). Economic analysis of privacy-aware advanced metering infrastructure adoption. Innovative Smart Grid Technologies (ISGT), 2012 IEEE PES pp 1–4
Gurses, S., & Diaz, C. (2013). Two tales of privacy in online social networks. Security and Privacy, IEEE, 11(3), 29–37.
Gurses, S., Troncoso, C. & Diaz, C. (2011). Engineering privacy by design …Privacy & Data Protection.
Hadnagy, C., & Wilson, P. (2010). Social engineering: The art of human hacking (1st ed.). Indianapolis: Wiley Publishing.
Hugl, U. (2010). Approaching the value of Privacy: Review of theoretical privacy concepts and aspects of privacy management. AMCIS.
Hull, G., Lipford, H.R., Latulipe, C. (2011). Contextual gaps: privacy issues on Facebook. Ethics Inf Technol.
Jackson, K., & Trochim, W. (2002). Concept mapping as an alternative approach for the analysis of open-ended survey responses. Organizational Research Methods, 5(4), 307–336.
Knobel, C., & Bowker, G. C. (2011). Values in design. CACM.
Lessig, L. (2006). Code. Lawrence Lessig.
Lindsey, D. (1980). Production and citation measures in the sociology of science: The problem of multiple authorship. Social Studies of Science, 10(2), 145–162.
Martin, K. (2012). Information technology and privacy: Conceptual muddles or privacy vacuums? Ethics and Information Technology, 14(4), 267–284.
Pearson, K. (1900). X. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to.... The London
Pham, M. C., Klamma, R., & Jarke, M. (2011). Development of computer science disciplines: A social network analysis approach. Social Network Analysis and Mining, 1(4), 321–340.
Richards, N. M., & King, J. H. (2014). Big Data Ethics. Wake Forest Law Review.
Sar, R. K., & Al-Saggaf, Y. (2014). Contextual integrity’s decision heuristic and the tracking by social network sites. Ethics Information Technology, 16, 15–26.
Schrader, D., Ghosh, D.P., Schulze, W.D., & Wicker, S.B. (2013). Civilization and Its Privacy Discontents. In: Patterson H (ed) Privacy Law Scholars Conference, Berkeley, CA.
Shilton, K. (2010). Participatory sensing: Building empowering surveillance: EBSCOhost. Surveillance & Society, 8, 131–150.
Solove, D. J. (2007). The future of reputation: Gossip, Rumor, and privacy on the internet. New Haven: Yale University Press.
Stajano, F., & Wilson, P. (2009). Understanding scam victims: Seven principles for systems security. Technical Report UCAM-CL-TR-754, University of Cambridge.
Stark, L., & Tierney, M. (2013). Lockbox: Mobility, privacy and values in cloud storage. Ethics and Information Technology, 16(1), 1–13.
Torres-Salinas, D., Robinson-Garcia, N., Jiménez-Contreras, E., Herrera, F., & López-Cózar, E.D. (2013). On the use of Biplot analysis for multivariate bibliometric and scientific indicators. arXiv.1302.0608v1.
Toubiana, V., Narayanan, A., Boneh, D., & Nissenbaum, H. (2010). Adnostic: Privacy preserving targeted advertising. NDSS.
Toubiana, V., Subramanian, L., & Nissenbaum, H. (2011). TrackMeNot: Enhancing the privacy of Web Search. arXiv 1109.4677v1
Turow, J. (2012). The daily you: How the new advertising industry is defining your identity and your worth. New Haven: Yale University Press.
Weber, R. P. (1990). Basic content analysis (2nd ed.). Newbury Park, CA: SAGE Publications.
Wicker, S. B., & Schrader, D. E. (2011). Privacy-aware design principles for information networks. Proceedings IEEE, 99(2), 330–350.
Acknowledgments
The authors would like to acknowledge Person 1, Person 2, and Person 3 of Institution for their invaluable contributions. This research was funded by a grant and there are no conflicts of interest by any author or consultant to this project.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tse, J., Schrader, D.E., Ghosh, D. et al. A bibliometric analysis of privacy and ethics in IEEE Security and Privacy . Ethics Inf Technol 17, 153–163 (2015). https://doi.org/10.1007/s10676-015-9369-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10676-015-9369-6