Full-text resources of PSJD and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


Preferences help
enabled [disable] Abstract
Number of results
2015 | 128 | 2B | B-319-B-323

Article title

A New Methodology to Disambiguate Privacy

Authors

Content

Title variants

Languages of publication

EN

Abstracts

EN
This paper addresses the pragmatic and semantic meaning of the term privacy by establishing a new method methodology of proceeding pragmatic, semantic and conceptual or combinations instances of privacy in relation to technology. The analysis of construct definition based on information published in the literature, for example Dictionaries are investigated under various conditions, for example semiotics. The new hybrid-privacy method is lexica-technical that investigates chronological definition of terms in relation to technology in distributed systems (DS); the method also looks at the impact of technological advancement on a particular innovation, polythematic or progress in pragmatic, semantic and conceptual characteristics of perception of privacy. The method's use is verified in an analysis of the unique meanings that underlie the term's usage both as a single word and in combination such as privacy law, privacy attack, privacy breach, and so forth. Literal (denotative) definitions and metaphoric (connotative) associations are examined to explain the use of privacy to refer to a physical entity and/or a mental representation, conceptual and perception. The method is also tentatively grounded in the disciplines of philology, cognition, information technology, and the philosophy of science. The lexica-technical analysis method is applied to the meanings of privacy starting with its original usage in the twenty first century and culminating with the definitions used by authors, IT developers and peoples in this paper. Finally, the paper aims at proposing a pragmatic, semantic and conceptual framework for measuring privacy. In this, technically introducing an extra button on the keyboard to indicate; whatever typed next is private to establish new link between cognition and neuron-computation systems.

Keywords

EN

Year

Volume

128

Issue

2B

Pages

B-319-B-323

Physical description

Dates

published
2015-8

Contributors

author
  • De Montfort University, Software Technology Research Laboratory, Leicester, UK

References

  • [1] P.C. Noble, Met. Forum 6, 59 (1983)
  • [2] M.S.C. Thomas, M.H. Johnson, Develop. Psychobiol. 48, 337 (2006), doi: 10.1002/dev.20134
  • [3] L. Carlson-Sabelli, H. Sabelli, M. Patel, K. Holm, (1992). J. Group Psychoth. Psychodr. Sociom. 44, 143 (1992)
  • [4] S. Gong, M. Cristani, S. Yan, C.C. Loy, Person Re-Identification, Springer 2014
  • [5] T. Xie, E. Martin, T. Yu, in: Proc. 8th International Conference on Information and Communications Security, 2006, doi: 10.1007/11935308_11
  • [6] T.W. Bynum, S. Rogerson, Computer Ethics and Professional Responsibility: Introductory Text and Readings, Blackwell Publishers, Cambridge (MA) 2003
  • [7] E. Kenneally, M. Baily, D. Maughan, in: Workshop on Ethics in Computer Security Research, January 2010, doi: 10.1007/978-3-642-14992-4_22
  • [8] M.S.C. Thomas, A. Karmiloff-Smith, Psych. Rev. 110, 640 (2003), doi: 10.1037/0033-295X.110.4.647
  • [9] B. Schilit, M. Theimer, IEEE Network 8, 22 (1994), doi: 10.1109/65.313011
  • [10] P.J. Brown, J.D. Bovey, X. Chen, IEEE Pers. Comm. 4, 58 (1997), doi: 10.1109/98.626984
  • [11] N. Ryan, J. Pascoe, D. Morse, Enhanced Reality Fieldwork: the Context-Aware Archaeological Assistant, Eds.: V. Gaffney, M. van Leusen, S. Exxon, in: Computer Applications in Archaeology 1997
  • [12] A.K. Dey, in: AAAI 1998 Springer Symposium on Intelligent Environments, Technical Report SS-98-02, 1998, p. 51, doi: 10.1201/9781420093612.ch8
  • [13] R. Arias, Keeping Secrets: Internet Ethicist Lori Fena Explains Why the Biggest Cost of Going Online May Be Your Privacy, Springer 1997

Document Type

Publication order reference

YADDA identifier

bwmeta1.element.bwnjournal-article-appv128n2b093kz
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.