- 1.For example, look at the FreedomTM system being developed by Zero-Knowledge Systems or the Platform for Privacy Preferences Project (P3PTM) being developed by the World Wide Web Consortium.Google Scholar
- 2.See the CFP2000 "Call for Participation" at: http://www.cfp2000.org/workshop/.Google Scholar
- 3.The 1995 Equifax-Harris mid-decade consumer privacy survey, online at: http://www.equifax.com/ consurner/parchive/svry95/survy95a.html.Google Scholar
- 4."The World According to Andy Grove," Business Week: The Information Revolution (1994 Special Issue), pp. 76-8.Google Scholar
- 5.Langdon Winner, Autonomous technology: Technics out-of-control as a theme in political thought (MIT Press, 1977).Google Scholar
- 6.Langdon Winner, "How technomania is overtaking the millennium," Newsday, November 23, 1997, p. B6.Google Scholar
- 7.New York Times Magazine editorial, "Technology makes us better," September 28, 1997, p. 45; Alvin Toffier, Powershifi: Knowledge, wealth, and violence at the edge of the 21st Century (Bantam Books, 1991).Google Scholar
- 8.Ann Marsh, "No place to hide," Forbes, September 22, 1997, pp. 226-34.Google Scholar
- 9.Taylor and Jerome, "We know where you live," PC Computing, October 1997, p. 91 (emphasis added).Google Scholar
- 10.To give just a sample of the work that has been done in this field, see Wiebe Bijker et al. (eds.), The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology (MIT Press, 1987); Ruth Schwarz Cowan, More Work for Mother: The Ironies of Household Technology from the Open Hearth to the Microwave (Basic Books, 1983); Batya Friedman (ed.), Human Values and the Design of Computer Technology (Cambridge University Press, 1997); Donald MacKenzie, Inventing Accuracy: A Historical Sociology of Nuclear Missile Guidance (MIT Press, 1990).Google Scholar
- 11.Trevor Pinch and Wiebe Bijker, "The Social Construction of Facts and Artifacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other," in The Social Construction of Technological Systems, Bijker et al. (eds.), pp. 17-50.Google Scholar
- 12.For more information see Chris Hibbert, "Some Frequently Asked Questions on SSNs," online at: http://www.cpsr.org/cpsr/privacy/ssn/ssn.faq.htmlGoogle Scholar
- 13.General background on the Highway 407 story can be found at: http://www.407etr.com/stor_/.Google Scholar
- 14.See "407 Express Toll Route: How You Can Travel This Road Anonymously" at: http:// www.ipc.on.ca/web_site.eng/matters/sum_pap/PAPERS/407.htmGoogle Scholar
- 15.1 found only one newspaper article during the entire 407 construction period that reported on these privacy issues. See Mary Gooderham, "Privacy at risk in toll systems, drivers told," The Globe and Mail, March 18, 1995, p. A4.Google Scholar
- 16.See, for example, "Privacy-Enhancing Technologies: The Path to Anonymity," a joint report of the Information and Privacy Commissioner of Ontario and the Registratiekamer of The Netherlands (1995). The irony is that the findings of this report, which Ontario's IPC helped produce, were never fully applied to the Highway 407 case.Google Scholar
- 17.See, for example, Brian Bloomfield and Theo Vurdubakis, "Boundary disputes: Negotiating the boundary between the technical and the social in the development of IT systems," Information Technology & People, 7(1): 9-24 (1997).Google ScholarCross Ref
- 18.1 use the term "ethicists" here as shorthand for anyone with social and ethical concerns relevant to the design of technology, including philosophers, scientists, religious leaders, social critics, and "ordinary citizens."Google Scholar
- 19.Douglas Schuler and Aki Namioka (eds.), Participatory design: Principles and practices, (Lawrence Erlbaum Associates, 1993), p. xi. Google ScholarDigital Library
- 20.See Karen Coyle's FAQ, "Some Frequently Asked Questions About Data Privacy and P3P," online at: http://www.cpsr.org/program/privacy/p3p-faq.html.Google Scholar
Index Terms
- When social meets technical (student paper panel): ethics and the design of “social” technologies
Recommendations
E-Government Meets Social Media: Realities and Risks
This study uses a content-analysis methodology to examine 100 e-government websites in the US and relevant social media accounts, assessing how state government portals and state governors use social media. After comparing these two environments, the ...
When Fitness Meets Social Networks: Investigating Fitness Tracking and Social Practices on WeRun
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsThe last two decades have seen growing interest in promoting physical activities by using self-tracking technologies. Previous work has identified social interactions in self-tracking as a crucial factor in motivating users to exercise. However, it is ...
Uses and gratifications of social networking sites for bridging and bonding social capital
Applying uses and gratifications theory (UGT) and social capital theory, our study examined users of four social networking sites (SNSs) (Facebook, Twitter, Instagram, and Snapchat), and their influence on online bridging and bonding social capital. ...
Comments