{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:01:10Z","timestamp":1732032070812},"reference-count":76,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Human-Comp. Interaction","HHCI"],"published-print":{"date-parts":[[2006,9,1]]},"DOI":"10.1207\/s15327051hci2103_2","type":"journal-article","created":{"date-parts":[[2006,8,9]],"date-time":"2006-08-09T14:09:07Z","timestamp":1155132547000},"page":"319-342","source":"Crossref","is-referenced-by-count":163,"title":["Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena"],"prefix":"10.1080","volume":"21","author":[{"given":"Paul","family":"Dourish","sequence":"first","affiliation":[]},{"given":"Ken","family":"Anderson","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"p_1_1","unstructured":"Ackerman, M., Cranor, L. & Reagle, J. (1999). Privacy in e-commerce: Examining user scenarios and privacy preferences. Proceedings of the ACM 1999 Conference on Electronic Commerce (pp. 1-8). New York: ACM."},{"key":"p_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"p_3_3","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/01972243.1994.9960162","volume":"10","author":"Agre P.","year":"1994","journal-title":"The Information Society"},{"key":"p_4_4","doi-asserted-by":"crossref","unstructured":"Agre, P. & Rotenberg, M. (Eds.). (1997). Technology and privacy: The new technological landscape. Cambridge, MA: MIT Press.","DOI":"10.7551\/mitpress\/6682.001.0001"},{"issue":"3","key":"p_5_5","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1111\/j.1540-4560.1977.tb01883.x","volume":"13","author":"Altman I.","year":"1977","journal-title":"Journal of Social Issues"},{"key":"p_6_6","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0902_1"},{"key":"p_7_7","unstructured":"Anderson, K. & Dourish, P. (2005). Do you know where your mother [trucker] is? Proceedings of HCI International."},{"key":"p_8_8","unstructured":"Beck, U. (1992). The risk society: Towards a new modernity. London: Sage."},{"key":"p_9_9","doi-asserted-by":"publisher","DOI":"10.1177\/0162243904264904"},{"key":"p_10_10","doi-asserted-by":"publisher","DOI":"10.1162\/desi.2006.22.2.35"},{"key":"p_11_11","unstructured":"Blomberg, J., Suchman, L. & Trigg, R. (1997). Notes on the work-oriented design project in three voices. In G. Bowker, S. L. Star, W. Turner, & L. Gasser (Eds.), Beyond the great divide: Socio-technical systems and cooperative work. Mahwah, NJ: Lawrence Erlbaum Associates, Inc."},{"key":"p_12_12","doi-asserted-by":"publisher","DOI":"10.1145\/1067860.1067868"},{"key":"p_13_13","unstructured":"Brin, D. (1999). The transparent society. New York: Perseus."},{"key":"p_14_14","unstructured":"Brodie, C., Karat, C.M. & Karat, J. (2005). Usable security and privacy: A case study of developing privacy management tools. Proceedings of the SOUPS 2005 Symposium on Usable Privacy and Security (pp. 35-42). New York: ACM."},{"key":"p_15_15","unstructured":"Brostoff, S. & Sasse, A. (2000). Are passfaces more usable than passwords? In S. Mc-Donald, Y. Waern, & G. Cockton (Eds.), Proceedings of HCI 2000 Conference on People and Computers XIV-Usability or Else! (pp. 405-424). London: Springer."},{"key":"p_16_16","unstructured":"Brostoff, S. & Sasse, A. (2001). Safe and sound: A safety-critical design approach to security. Proceedings of the ACM 2001 Workshop on New Security Paradigms (pp. 41-50). New York: ACM."},{"key":"p_17_17","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-004-2802-8"},{"key":"p_18_18","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42413"},{"key":"p_19_19","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1080\/01972243.1994.9960160","volume":"10","author":"Clark R.","year":"1994","journal-title":"The Information Society"},{"key":"p_20_20","doi-asserted-by":"publisher","DOI":"10.1007\/BF00749284"},{"key":"p_21_21","unstructured":"Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J. & Powledge, P. (2005). Location disclosure to social relations: Why, when, & what people want to share. Proceedings of the CHI 2005 Conference on Human Factors in Computing Systems (pp. 81-90). New York: ACM."},{"key":"p_22_22","unstructured":"Cranor, L. (2003). \"I didn't buy it for myself : Privacy and e-commerce personalization. Proceedings of the ACM 2003 Workshop on Privacy in the Electronic Society (pp. 111-117). New York: ACM."},{"key":"p_23_23","unstructured":"Cranor, L. & Reagle, J. (1998). Designing a social protocol: Lessons learned from the platform for privacy preferences project. In J. K. MacKie-Mason, & D. Waterman (Eds.), Telephony, the Internet, and the media. Mahwah, NJ: Lawrence Erlbaum Associates."},{"key":"p_24_24","doi-asserted-by":"publisher","DOI":"10.1006\/jevp.1995.0024"},{"key":"p_25_25","doi-asserted-by":"publisher","DOI":"10.1080\/09663690120050742"},{"key":"p_26_26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.021"},{"key":"p_27_27","unstructured":"Dhamija, R. & Tyger, J. (2005). The battle against phishing: Dynamic security skins. Proceedings of the SOUPS 2005 Symposium on Usable Privacy and Security (pp. 77-88). New York: ACM."},{"key":"p_28_28","unstructured":"Douglas, M. & Wildavsky, A. (1982). Risk and culture. Berkeley: University of California Press."},{"key":"p_29_29","unstructured":"Dourish, P. (1997). Accounting for system behaviour: Representation, reflection and resourceful action. In M. Kyng & L. Mathiassen (Eds.), Computers and design in context (pp. 145-170). Cambridge, MA: MIT Press."},{"key":"p_30_30","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-003-0253-8"},{"key":"p_31_31","doi-asserted-by":"publisher","DOI":"10.2307\/2577940"},{"key":"p_32_32","unstructured":"Erickson, T., Smith, D., Kellogg, W., Laff, M., Richards, J. & Bradner, E. (1999). Socially translucent systems: Social proxies, persistent conversation, and the design of \"babble. Proceedings of the CHI 99 Conference on Human Factors in Computing Systems (pp. 72-79). New York: ACM."},{"key":"p_33_33","doi-asserted-by":"publisher","DOI":"10.2307\/2787117"},{"key":"p_34_34","unstructured":"Flechais, I., Sasse, M. A. & Hailes, S. (2003). Bringing security home: A process for developing secure and useable systems. Proceedings of the ACM\/SIGSAC New Security Paradigms Workshop (pp. 49-57). New York: ACM."},{"key":"p_35_35","unstructured":"Floerkemeier, C., Schneider, R. & Langheinrich, M. (2004). Scanning with a purpose-Supporting the fair information principles in RFID protocols. Proceedings of the UCS 2004 Second International Symposium on Ubiquitous Computing Systems (pp. 214-231). Berlin, Germany: Springer-Verlag."},{"key":"p_36_36","doi-asserted-by":"publisher","DOI":"10.1177\/0162243904264960"},{"key":"p_37_37","unstructured":"Garfinkel, H. (1967). Studies in ethnomethodology. Cambridge, UK: Polity."},{"key":"p_38_38","doi-asserted-by":"publisher","DOI":"10.2307\/795891"},{"key":"p_39_39","unstructured":"Good, N. & Krekelberger, A. (2003). Usability and privacy: A study of Kazaa P2P file-sharing. Proceedings of the CHI 2003 Conference on Human Factors in Computing Systems. New York: ACM."},{"key":"p_40_40","doi-asserted-by":"publisher","DOI":"10.1080\/01972240290075129"},{"key":"p_41_41","unstructured":"Grinter, R. & Palen, L. (2002). Instant messaging in teen life. Proceedings of the CSCW 2002 Conference on Computer-Supported Cooperative Work. New York: ACM."},{"issue":"10","key":"p_42_42","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MC.2004.149","volume":"37","author":"Griswold W.","year":"2004","journal-title":"IEEE Computer"},{"key":"p_43_43","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI16234_10"},{"key":"p_44_44","doi-asserted-by":"crossref","unstructured":"Gruteser, M. & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. Proceedings of the Mobisys 2003 ACM\/ USENIX International Conference on Mobile Systems, Applications and Service. Berkeley, CA: USENIX","DOI":"10.1145\/1066116.1189037"},{"key":"p_45_45","unstructured":"Hong, J., Boriello, G., Landay, J., McDonald, D., Schilit, B. & Tygar, J. (2003). Privacy and security in the location-enhanced World Wide Web. (Seattle, WA). Lecture Notes in Computer Science (LNCS2864). Proceedings of the International Conference on Ubquitous Computing Ubicomp 2003. Berlin, Germany: Springer."},{"key":"p_46_46","unstructured":"Hook, K., Munro, A. & Benyon, D. (Eds.). (2002). Designing information spaces: The social navigation approach. London: Springer."},{"key":"p_47_47","doi-asserted-by":"publisher","DOI":"10.1007\/BF00752435"},{"key":"p_48_48","unstructured":"Iachello, G., Smith, I., Consolvo, S., Chen, M. & Abowd, G. (2005). Developing privacy guidelines for social location disclosure applications and services. Proceedings of the SOUPS 2005 Symposium on Usable Privacy and Security (pp. 65-76). New York: ACM."},{"key":"p_49_49","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"p_50_50","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1177\/089124167900800302","volume":"8","author":"Kleinman S.","year":"1979","journal-title":"Urban Life"},{"key":"p_51_51","doi-asserted-by":"crossref","unstructured":"Langheinrich, M. (2002). A privacy awareness system for ubiquitous computing environments. Proceedings of the Ubicomp 2002.","DOI":"10.1007\/3-540-45809-3_19"},{"key":"p_52_52","doi-asserted-by":"publisher","DOI":"10.2307\/2783351"},{"key":"p_53_53","doi-asserted-by":"publisher","DOI":"10.1177\/089124199129023398"},{"key":"p_54_54","unstructured":"Millett, L., Friedman, B. & Felten, E. (2001). Cookies and Web browser design: Toward realizing informed consent online. Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems (pp. 46-52). New York: ACM."},{"key":"p_55_55","unstructured":"Nippert-Eng, C. & Melican, J. (2005). Concealment and disclosure: Wallets, purses, and identity work in modern societies. Manuscript in preparation."},{"key":"p_56_56","unstructured":"Palen, L. & Dourish, P. (2003). Unpacking \"privacy for a networked world. Proceedings of the CHI 2003 Conference on Human Factors in Computing Systems. New York: ACM."},{"key":"p_57_57","doi-asserted-by":"crossref","unstructured":"Parthasarathy, S. (2004). Regulating risk: Defining genetic privacy in the United States and Britain. Science, Technology, and Human Values, 29, 332-352.","DOI":"10.1177\/0162243904264485"},{"key":"p_58_58","unstructured":"Patil, S. & Lai, J. (2005). Who gets to know what when: Configuring privacy preferences in an awareness application. Proceedings of the CHI 2005 Conference on Human Factors in Computing Systems. New York: ACM."},{"key":"p_59_59","unstructured":"Patrick, A., Long, C. & Flinn, S. (2003). HCI and security systems (workshop description). Adjunct Proceedings of CHI 2003. New York: ACM."},{"key":"p_60_60","first-page":"11","volume":"36","author":"Rabin M.","year":"1998","journal-title":"Journal Of Economic Literature"},{"key":"p_61_61","doi-asserted-by":"publisher","DOI":"10.2307\/2095688"},{"key":"p_62_62","unstructured":"Riegelsberger, J., Sasse, M. A. & McCarthy, J. (2003). Shiny happy people building trust? Proceedings of the ACM Conference of Human Factors in Computing Systems CHI 2003 (pp. 121-128). New York: ACM."},{"key":"p_63_63","unstructured":"Sahlins, M. (1972). Culture and practical reason. Chicago: University of Chicago Press."},{"key":"p_64_64","unstructured":"Schneier, B. (2000). Secrets and lies: Digital security in a networked world. New York: Wiley."},{"key":"p_65_65","unstructured":"Schilit, B., LaMarca, A., Borriello, G., Griswold, W., McDonald, D., Lazowska, E., etal (2003). Challenge: Ubiquitous location-aware computing and the \"Place Lab initiative. Proceedings of the ACM International Workshop on Wireless Mobile Applications and Services on WLAN. New York: ACM."},{"key":"p_66_66","doi-asserted-by":"publisher","DOI":"10.2307\/2549460"},{"key":"p_67_67","unstructured":"Shapin, S. (2004). The great neurotic art. London Review of Books, 26(15)."},{"key":"p_68_68","doi-asserted-by":"publisher","DOI":"10.1145\/256175.256190"},{"key":"p_69_69","unstructured":"Spiekermann, S., Grossklags, J. & Berendt, B. (2001). E-privacy in second generation e-commerce: Privacy preferences versus actual behavior. Proceedings of the EC 2001 Conference on Electronic Commerce (pp. 38-47). New York: ACM."},{"key":"p_70_70","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1038\/scientificamerican0104-56","volume":"290","author":"Want R.","year":"2004","journal-title":"Scientific American"},{"key":"p_71_71","unstructured":"Weidenbeck, S., Waters, J., Birget, J.C., Broditskly, A. & Memon, N. (2005). Authentication using graphical passwords: Effects of tolerance and image choice. Proceedings of the SOUPS 2005 Symposium on Usable Privacy and Security (pp. 1-12). New York: ACM."},{"key":"p_72_72","unstructured":"Weirich, D. & Sasse, A. (2001). Pretty good persuasion: Steps towards effective password security in the real world. Proceedings of the ACM xxxx Workshop on New Security Paradigms Workshop (pp. 137-143). New York: ACM."},{"key":"p_73_73","doi-asserted-by":"crossref","unstructured":"Wenger, E. (1998). Communities of practice: Learning, meaning, and identity. Cambridge University Press.","DOI":"10.1017\/CBO9780511803932"},{"key":"p_74_74","unstructured":"Westin, A. (1968). Privacy and freedom. New York: Atheneum."},{"key":"p_75_75","unstructured":"Whitten, A. & Tygar, D. (1999). Why Johnny can't encrypt: A usability evaluation of PGP 5.0. Proceedings of the Ninth USENIX Security Symposium."},{"key":"p_76_76","doi-asserted-by":"publisher","DOI":"10.1088\/0963-6625\/1\/3\/004"}],"container-title":["Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1207\/s15327051hci2103_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T16:04:48Z","timestamp":1555776288000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1207\/s15327051hci2103_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,1]]},"references-count":76,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,9,1]]}},"alternative-id":["784766982"],"URL":"https:\/\/doi.org\/10.1207\/s15327051hci2103_2","relation":{},"ISSN":["0737-0024"],"issn-type":[{"value":"0737-0024","type":"print"}],"subject":[],"published":{"date-parts":[[2006,9,1]]}}}