Preferences help
enabled [disable] Abstract
Number of results
2015 | 128 | 2B | B-319-B-323
Article title

A New Methodology to Disambiguate Privacy

Title variants
Languages of publication
This paper addresses the pragmatic and semantic meaning of the term privacy by establishing a new method methodology of proceeding pragmatic, semantic and conceptual or combinations instances of privacy in relation to technology. The analysis of construct definition based on information published in the literature, for example Dictionaries are investigated under various conditions, for example semiotics. The new hybrid-privacy method is lexica-technical that investigates chronological definition of terms in relation to technology in distributed systems (DS); the method also looks at the impact of technological advancement on a particular innovation, polythematic or progress in pragmatic, semantic and conceptual characteristics of perception of privacy. The method's use is verified in an analysis of the unique meanings that underlie the term's usage both as a single word and in combination such as privacy law, privacy attack, privacy breach, and so forth. Literal (denotative) definitions and metaphoric (connotative) associations are examined to explain the use of privacy to refer to a physical entity and/or a mental representation, conceptual and perception. The method is also tentatively grounded in the disciplines of philology, cognition, information technology, and the philosophy of science. The lexica-technical analysis method is applied to the meanings of privacy starting with its original usage in the twenty first century and culminating with the definitions used by authors, IT developers and peoples in this paper. Finally, the paper aims at proposing a pragmatic, semantic and conceptual framework for measuring privacy. In this, technically introducing an extra button on the keyboard to indicate; whatever typed next is private to establish new link between cognition and neuron-computation systems.
Physical description
  • De Montfort University, Software Technology Research Laboratory, Leicester, UK
  • [1] P.C. Noble, Met. Forum 6, 59 (1983)
  • [2] M.S.C. Thomas, M.H. Johnson, Develop. Psychobiol. 48, 337 (2006), doi: 10.1002/dev.20134
  • [3] L. Carlson-Sabelli, H. Sabelli, M. Patel, K. Holm, (1992). J. Group Psychoth. Psychodr. Sociom. 44, 143 (1992)
  • [4] S. Gong, M. Cristani, S. Yan, C.C. Loy, Person Re-Identification, Springer 2014
  • [5] T. Xie, E. Martin, T. Yu, in: Proc. 8th International Conference on Information and Communications Security, 2006, doi: 10.1007/11935308_11
  • [6] T.W. Bynum, S. Rogerson, Computer Ethics and Professional Responsibility: Introductory Text and Readings, Blackwell Publishers, Cambridge (MA) 2003
  • [7] E. Kenneally, M. Baily, D. Maughan, in: Workshop on Ethics in Computer Security Research, January 2010, doi: 10.1007/978-3-642-14992-4_22
  • [8] M.S.C. Thomas, A. Karmiloff-Smith, Psych. Rev. 110, 640 (2003), doi: 10.1037/0033-295X.110.4.647
  • [9] B. Schilit, M. Theimer, IEEE Network 8, 22 (1994), doi: 10.1109/65.313011
  • [10] P.J. Brown, J.D. Bovey, X. Chen, IEEE Pers. Comm. 4, 58 (1997), doi: 10.1109/98.626984
  • [11] N. Ryan, J. Pascoe, D. Morse, Enhanced Reality Fieldwork: the Context-Aware Archaeological Assistant, Eds.: V. Gaffney, M. van Leusen, S. Exxon, in: Computer Applications in Archaeology 1997
  • [12] A.K. Dey, in: AAAI 1998 Springer Symposium on Intelligent Environments, Technical Report SS-98-02, 1998, p. 51, doi: 10.1201/9781420093612.ch8
  • [13] R. Arias, Keeping Secrets: Internet Ethicist Lori Fena Explains Why the Biggest Cost of Going Online May Be Your Privacy, Springer 1997
Document Type
Publication order reference
YADDA identifier
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.