ABSTRACT
Privacy is frequently a key concern relating to technology and central to HCI research, yet it is notoriously difficult to study in a naturalistic way. In this paper we describe and evaluate a dictionary of privacy designed for content analysis, derived using prototype theory and informed by traditional theoretical approaches to privacy. We evaluate our dictionary categories alongside privacy-related categories from an existing content analysis tool, LIWC, using verbal discussions of privacy issues from a variety of technology and non-technology contexts. We find that our privacy dictionary is better able to distinguish between privacy and non-privacy language, and is less context-dependent than LIWC. However, the more general LIWC categories are able to describe a greater amount of variation in our data. We discuss possible improvements to the privacy dictionary and note future work.
- Acquisti, A. and Grossklags, J. Privacy attitudes and Privacy behavior: Losses, Gains, and Hyperbolic Discounting. In Camp and Lewis: The Economics of Information Security Kluwer, 2004.Google Scholar
- Adams, A. and Sasse, M.A. Privacy in multimedia communications: protecting users not just data. In Proceedings of IMH HCI'01, 2001, 49--64.Google ScholarCross Ref
- Altman, I. The environment and social behavior. Brooks/Cole, Monterey: CA, 1975.Google Scholar
- Beach, S., Schulz, R., Downs, J., Matthews, J., Barron, B. and Seelman, K. Disability, Age, and Informational Privacy Attitudes in Quality of Life Technology Applications: Results from a National Web Survey. ACM Trans. Access. Comput., 2, 1 2009, 1--21. Google ScholarDigital Library
- Boyle, M. and Greenberg, S. The language of privacy: Learning from video media space analysis and design. ACM Trans. Comput.-Hum. Interact., 12, 2 2005), 328--370. Google ScholarDigital Library
- Christidi, S. and Rosenbaum-Elliott, R. Shared spaces and personal corners in social networking websites: the contracted and the cryptically revealed self. European Advances in Consumer Research, 9 2010).Google Scholar
- Chung, C. and Pennebaker, J. W. The Psychological Function of Function Words. In: Fiedler (ed.): Social Communication, Psychology Press, 2007.Google Scholar
- Costello, J. Nursing older dying patients: findings from an ethnographic study of death and dying in elderly care wards. Journal of Advanced Nursing, 35, 1 2001), 59--68.Google ScholarCross Ref
- DeCew, J. W. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Cornell University Press, Ithaca, NY, 1997.Google ScholarCross Ref
- DeCew, J. W. The Priority of Privacy for Medical Information. Social Philosophy and Policy, 17, 2 2000, 213--234.Google ScholarCross Ref
- Fehr, B. Prototype Analysis of the Concepts of Love and Commitment. Journal of Personality and Social Psychology, 55, 4 1988, 557--579.Google ScholarCross Ref
- Gill, A. J., French, R. M., Gergle, D. and Oberlander, J. The Language of Emotion in Short Blog Texts. ACM, New York, NY, 2008.Google ScholarDigital Library
- Hancock, J. T., Curry, L., Goorha, S. and Woodworth, M. T. On lying and being lied to: A linguistic analysis of deception. Discourse Processes, 45 2008, 1--23.Google ScholarCross Ref
- Harper, J. and Singleton, S. With a Grain of Salt: What Consumer Privacy Surveys Don't Tell Us. 2001. http://ssrn.com/abstract=299930.Google Scholar
- Introna, L. D. and Pouloudi, A. Privacy in the information age: Stakeholders, interests and values. Journal of Business Ethics, 22, 1 1999, 27--38.Google ScholarCross Ref
- Joinson, A. N. and Paine, C. Self-disclosure, Privacy and the Internet. Oxford University Press, Oxford, 2007.Google Scholar
- Joinson, A. N. Looking at, looking up or keeping up with people? Motives and use of facebook. In Proceedings of the twenty-sixth annual SIGCHI conference on Human factors in computing systems (Florence, Italy). ACM, 2008. Google ScholarDigital Library
- Joinson, A. N., Paine, C., Buchanan, T. and Reips, U. D. Measuring self-disclosure online: Blurring and non-response to sensitive items in web-based surveys. Comput Hum Behav, 24, 5 2008, 2158--2171. Google ScholarDigital Library
- Labov, W. The boundaries of words and their meaning. In Bailey and Shuy (eds.): New Ways of Analyzing Variation in English. Georgetown University Press, Washington DC, 1973.Google Scholar
- Leyshon, A., Knights, D. and Burton, D. Delivering Financial Services in the Home. Colchester, EsCUL: UK Data Archive, 2002--2004.Google Scholar
- Leyshon, A., Signoretta, P., Knights, D., Alferoff, C. and Burton, D. Walking with Moneylenders: The Ecology of the UK Home-collected Credit Industry. Urban Studies, 43, 1 2006, 161--186.Google ScholarCross Ref
- Lowe, W. Content analysis and its place in the (methodological) scheme of things Qualitative Methods 2, 1 2004, 25--27.Google Scholar
- Livingstone, S. and Bober, M. United Kingdom Children Go Online. Colchester, EsCUL: UK Data Archive, 2003--2005.Google Scholar
- Mazanderani, F. and Brown, I. Making things private: exploring the relational dynamics of privacy. In Proceedings of the Computers, Privacy and Data Protection (Brussels, Belgium), 2010.Google Scholar
- Mehl, M.R. and Gill, A.J. Computerized Content Analysis. In: Gosling and Johnson (eds.), Advanced Methods for Behavioral Research on the Internet. American Psychological Association Publications, Washington, DC.Google Scholar
- Murphy, T. and Whitty, N. Risk and Human Rights in UK Prison Governance. British Journal of Criminology, 47, 5 2007, 798--816.Google Scholar
- Oberlander, J. and Gill, A. J. Language with character: A stratified corpus comparison of individual differences in e-mail communication. Discourse Processes, 43, 2 2006, 239--270.Google Scholar
- Palen, L. and Dourish, P. Unpacking "privacy" for a networked world. In Proceedings of the SIGCHI conference on Human factors in computing systems (Ft. Lauderdale, Florida, USA). ACM, New York, NY, 2003. Google ScholarDigital Library
- Patil, S., Romero, N. and Karat, J. Privacy and HCI: methodologies for studying privacy issues. In Proceedings of the SIGCHI conference on Human factors in computing systems (Montreal, Canada). ACM, New York, NY, 2006. Google ScholarDigital Library
- Pattenden, R. and Skinns, L. Choice, Privacy and Publicly Funded Legal Advice at Police Stations. The Modern Law Review, 73, 3 2010, 349--370.Google ScholarCross Ref
- Pedersen, D. M. Model for types of privacy by privacy functions. Journal of Environmental Psychology, 19, 4 1999, 397--405.Google ScholarCross Ref
- Pennebaker, J. W., Mehl, M. R. and Niederhoffer, K. G. Psychological Aspects of Natural Language Use: Our Words, Our Selves. Annual Review of Psychology, 54 2003, 547--577.Google ScholarCross Ref
- Pennebaker, J. W., Francis M.E., Booth R.J. (2001). Linguistic Inquiry and Word Count (LIWC): LIWC2001. Mahwah: Lawrence Erlbaum Associates.Google Scholar
- Petronio, S. Boundaries of privacy: Dialectics of disclosure. State University of New York Press, Albany: NY, 2002.Google ScholarCross Ref
- Raento, M. and Oulasvirta, A. Designing for privacy and self-presentation in social awareness. Personal and Ubiquitous Computing, 12, 7 2008, 527--542. Google ScholarDigital Library
- Roen, K., Scourfield, J. and McDermott, E. Cultural Context of Youth Suicide: Identity, Gender and Sexuality. Colchester, EsCUL: UK Data Archive, 2006.Google Scholar
- Rosch, E. Principles of categorization. Erlbaum, Hillsdale, NJ, 1978.Google Scholar
- Seymour, J. Technology and Natural Death: a Study of Older People. Colchester, EsCUL: UK Data Archive, 2001--2002.Google Scholar
- Skinns, L. Co-operation or Contest? Inter-Agency Relationships in Police Custody Areas. Colchester, EsCUL: UK Data Archive, 2007.Google Scholar
- Solove, D. J. A taxonomy of privacy. University of Pennsylvania Law Review, 154, 3 2006, 477--564.Google ScholarCross Ref
- Stutzman, F. and Kramer-Duffield, J. Friends only: examining a privacy-enhancing behavior in facebook. In Proceedings of the 28th international conference on Human factors in computing systems (Atlanta, Georgia, USA). ACM, New York, NY, 2010. Google ScholarDigital Library
- Tausczik, Y. R. and Pennebaker, J. W. The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods. Journal of Language and Social Psychology, 29, 1 2010, 24--54.Google ScholarCross Ref
- Tavani, H. T. Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38, 1 2007, 1--22.Google ScholarCross Ref
- Terry, W., Olson, L. G., Wilss, L. and Boulton-Lewis, G. Experience of dying: concerns of dying patients and of carers. Internal Medicine Journal, 6, 3 2006, 338--346.Google Scholar
- Vasalou, A., Joinson, A., Houghton, D. A prototype analysis of privacy (under review).Google Scholar
- Westin, A. Privacy and freedom. Athenaeum, New York, 1967.Google Scholar
- Wittgenstein, L. Philosophical Investigations. Blackwell, Oxford, 2001.Google Scholar
Index Terms
- Privacy dictionary: a linguistic taxonomy of privacy for content analysis
Recommendations
Privacy dictionary: A new resource for the automated content analysis of privacy
This article presents the privacy dictionary, a new linguistic resource for automated content analysis on privacy-related texts. To overcome the definitional challenges inherent in privacy research, the dictionary was informed by an inclusive set of ...
Freedom of Privacy: Anonymous Data Collection with Respondent-Defined Privacy Protection
The massive amount of sensitive survey data about individuals that agencies collect and share through the Internet is causing a great deal of privacy concerns. These concerns may discourage individuals from revealing their sensitive information. ...
On two RFID privacy notions and their relations
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on ...
Comments