A bibliometric analysis of privacy and ethics in IEEE Security and Privacy

Ethics and Information Technology 17 (2):153-163 (2015)
  Copy   BIBTEX

Abstract

The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the ethical and technological dimensions of privacy and security is structured as a bibliometric analysis. Our dataset covers all articles published in IEEE Security and Privacy since its inception in 2003 to February 06, 2014. This venue was chosen not only because of its target readership, but also because a preliminary search of keywords related to ethics, privacy, and security topics in the ISI Web of Knowledge and IEEE Xplore indicated that IEEE Security and Privacy has published a preponderance of articles matching those topics. In fact, our search returned two-fold more articles for IEEE Security and Privacy than the next most prolific venue. These reasons, coupled with the fact that both academia and industry are well-represented in the authorship of articles makes IEEE Security and Privacy an excellent candidate for bibliometric analysis. Our analysis examines the ways articles in IEEE Security and Privacy relate ethics to information technology. Such articles can influence the development of law, policy and the future of information technology ethics. We employed thematic and JK-biplot analyses of content relating privacy and ethics and found eight dominant themes as well as the inter-theme relationships. Authors and institutional affiliations were examined to discern whether centers of research activity and/or authors dominated the overall field or thematic areas. Results suggest avenues for future work in critical areas, especially for closing present gaps in the coverage of ethics and information technology privacy and security themes particularly in the areas of ethics and privacy awareness.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,261

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
Security and Privacy: Why Privacy Matters. [REVIEW]Stephanie J. Bird - 2013 - Science and Engineering Ethics 19 (3):669-671.
Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
Privacy and the judgment of others.Jeffery L. Johnson - 1989 - Journal of Value Inquiry 23 (2):157-168.
Privacy and the Right to Privacy.H. J. McCloskey - 1980 - Philosophy 55 (211):17 - 38.
Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
The Epistemic Account of Privacy.Martijn Blaauw - 2013 - Episteme 10 (2):167-177.
Workplace Privacy: Different Views and Arising Issues.Tomas Bagdanskis & Paulius Sartatavičius - 2012 - Jurisprudencija: Mokslo darbu žurnalas 19 (2):697-713.
Privacy as life, liberty, property.Richard Volkman - 2003 - Ethics and Information Technology 5 (4):199-210.
Biobank research and the right to privacy.Lars Øystein Ursin - 2008 - Theoretical Medicine and Bioethics 29 (4):267-285.

Analytics

Added to PP
2015-09-02

Downloads
17 (#872,959)

6 months
7 (#439,760)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations