{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T19:23:46Z","timestamp":1763580226604,"version":"3.41.2"},"reference-count":32,"publisher":"Emerald","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,8,1]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>Information Privacy is becoming an increasingly important field of research with many new definitions and terminologies. Along similar rates of increase are the use, uptake and expansion of collaborative environments (CEs). There is a need for a better understanding and classification of information privacy concepts and terms. The purpose of this paper is to provide a taxonomy of information privacy in CEs. The knowledge provided from an information privacy taxonomy can be used to formulate better information privacy policies, practices, and privacy enhancing technologies.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>Through the hierarchical classification and categorization of information privacy concepts and principles an organized representation of these components has been produced. Each area was well surveyed and researched and then classified into a number of sub-categories according to their nature and relevance.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>A taxonomy was successfully developed with the identification of three high level dimensions of information privacy. Within each dimensional view a further three sub-classifications were proposed each with their own unique nature.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>This paper provides an Information Privacy taxonomy for CEs, the first of its kind to be proposed. A number of new Information privacy terms are defined that make up the categorization and classification of information privacy concepts and components.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/09685220610690835","type":"journal-article","created":{"date-parts":[[2006,9,26]],"date-time":"2006-09-26T05:17:24Z","timestamp":1159247844000},"page":"382-394","source":"Crossref","is-referenced-by-count":27,"title":["An information privacy taxonomy for collaborative environments"],"prefix":"10.1108","volume":"14","author":[{"given":"Geoff","family":"Skinner","sequence":"first","affiliation":[{"name":"Curtin University of Technology, Perth, Australia University of Newcastle, Australia"}]},{"given":"Song","family":"Han","sequence":"additional","affiliation":[{"name":"Centre for Extended Enterprises and Business Intelligence, Curtin University of Technology, Perth, Australia"}]},{"given":"Elizabeth","family":"Chang","sequence":"additional","affiliation":[{"name":"Centre for Extended Enterprises and Business Intelligence, Curtin University of Technology, Perth, Australia"}]}],"member":"140","reference":[{"key":"2025072819445001000_b1","unstructured":"Agrawal, R.\n          , Kiernan, J., Srikant, R. and Xu, Y. (2003), \u201cImplementing P3P using database technology\u201d, paper presented at the 19th International Conference on Data Engineering, Bangalore."},{"key":"2025072819445001000_b2","doi-asserted-by":"crossref","unstructured":"Backes, M.\n          , Pfitzmann, B. and Schunter, M. (2003), \u201cA toolkit for managing enterprise privacy policies\u201d, ESORICS 2003, LNCS 2808, October, pp. 162-80.","DOI":"10.1007\/978-3-540-39650-5_10"},{"key":"2025072819445001000_b3","doi-asserted-by":"crossref","unstructured":"Backes, M.\n          , Bagga, W., Karjoth, G. and Schunter, M. (2004), \u201cEfficient comparison of enterprise privacy policies\u201d, paper presented at SAC'04, Nicosia, March.","DOI":"10.1145\/967900.967983"},{"key":"2025072819445001000_b4","doi-asserted-by":"crossref","unstructured":"Bellotti, V.\n           (1996), \u201cWhat you don't know can hurt you: privacy in collaborative computing\u201d, pp. 241-61, BCS HCI 1996.","DOI":"10.1007\/978-1-4471-3588-3_16"},{"key":"2025072819445001000_b5","unstructured":"Boyd, D.\n          , Jensen, C., Lederer, S. and Nguyen, D.H. (2002), \u201cPrivacy in digital environments: empowering users\u201d, paper presented at CSCW 2002 Workshop, New Orleans, 16 November."},{"key":"2025072819445001000_b6","unstructured":"Common Criteria\n           (2004), \u201cCommon criteria for information technology evaluation\u201d, January, available at: www.commoncriteria.org."},{"issue":"2","key":"2025072819445001000_b11","doi-asserted-by":"crossref","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses, and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Communications of the ACM"},{"key":"2025072819445001000_b7","doi-asserted-by":"crossref","unstructured":"Chaum, D.\n           (1985a), \u201cShowing credentials without identification. Signature transfers between unconditionally unlikable pseudonyms\u201d, Advances in Cryptology \u2013 EUROCRYPT '85, Proceedings; LNCS 219, Springer Verlag, Berlin, pp. 241-4.","DOI":"10.1007\/3-540-39805-8_28"},{"issue":"10","key":"2025072819445001000_b9","doi-asserted-by":"crossref","DOI":"10.1145\/4372.4373","article-title":"Security without identification: card computers to make big brother obsolete","volume":"28","author":"Chaum","year":"1985","journal-title":"Communications of the ACM"},{"key":"2025072819445001000_b10","unstructured":"Chaum, D.\n           (1989), \u201cPrivacy protected payments: unconditional payer and\/or payee untraceabiliy\u201d, Smart Card 2000, pp. 69-93."},{"key":"2025072819445001000_b8","doi-asserted-by":"crossref","unstructured":"Chaum, D.\n           (1992), \u201cAchieving electronic privacy\u201d, Scientific American, 1992, August, pp. 96-101.","DOI":"10.1038\/scientificamerican0892-96"},{"key":"2025072819445001000_b12","doi-asserted-by":"crossref","unstructured":"Chaum, D.\n           and Evertse, J.H. (1986), \u201cA secure and privacy-protecting protocol for transmitting personal information between organizations\u201d, Crypto'86, LNCS 263, Springer-Verlag, Berlin, pp. 118-67.","DOI":"10.1007\/3-540-47721-7_10"},{"key":"2025072819445001000_b13","unstructured":"Clarke, R.\n           (1999a), \u201cIntroduction to dataveillance and information privacy, and definitions and terms\u201d, available at: www.anu.edu.au\/people\/Roger.Clarke\/DV\/Intro.html."},{"key":"2025072819445001000_b15","unstructured":"Clarke, R.\n           (1999b), The Real \u2018Who's Who\u2019 of the Electronic Commerce: The Identification of Organizations, Xamax Consultancy, Canberra, prepared for Journal of Strategic Information Systems, available at: www.anu.edu.au\/people\/Roger.Clarke\/DV\/Intro.html."},{"key":"2025072819445001000_b14","unstructured":"Clarke, R.\n           (2002), Introducing PITs and PETs: Technologies Affecting Privacy, Xamax Consultancy, Canberra."},{"key":"2025072819445001000_b16","doi-asserted-by":"crossref","unstructured":"Duan, Y.\n           and Canny, J. (2004), Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments, Privacy-Enhancing Technologies (PET), Toronto.","DOI":"10.1007\/11423409_11"},{"key":"2025072819445001000_b17","unstructured":"Goecks, J.\n           and Mynatt, E. (2002), \u201cEnabling privacy management in ubiquitous computing environments through trust and reputation systems\u201d, paper presented at CSCW 2002 Workshop, New Orleans, 16 November."},{"key":"2025072819445001000_b18","unstructured":"Government of Ontario\n           (2000), \u201cPrivacy design principles \u2013 personal information\u201d, 23 May, available at: www.gov.on.ca\/MBS\/english\/fip\/pub\/pdp.html."},{"key":"2025072819445001000_b19","unstructured":"Hope-Tindal, P.\n           (2001), Managing Privacy and Security Risks Through Architecture Design: An Enterprise Privacy View, Data Privacy Partners, Mississauga, ON, November."},{"key":"2025072819445001000_b20","unstructured":"IBM\n           (2003), \u201cEnterprise Privacy Authorization Language (EPAL) specification\u201d, www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/."},{"key":"2025072819445001000_b33","unstructured":"IEEE\n           (1986), \u201cStandard taxonomy for software engineering standards (ANSI)\u201d, IEEE Standard 1002-1987, The Institute of Electrical and Electronics Engineers Inc.."},{"key":"2025072819445001000_b22","doi-asserted-by":"crossref","unstructured":"Karjoth, G.\n          , Schunter, M. and Waidner, M. (2002), \u201cPlatform for enterprise privacy practices: privacy-enabled management of customer data\u201d, paper presented at 2nd Workshop on Privacy Enhancing Technologies, LNCS, Springer Verlag.","DOI":"10.1007\/3-540-36467-6_6"},{"key":"2025072819445001000_b23","unstructured":"Karjoth, G.\n           and Schunter, M. (2002), \u201cA privacy model enterprises\u201d, paper presented at the 15th IEEE Computer Security Foundations Workshop, June."},{"key":"2025072819445001000_b24","unstructured":"Langheinrich, M.\n           (2002), \u201cPrivacy invasions in ubiquitous computing\u201d, Privacy in Ubicomp 2002, G\u00f6teborg."},{"key":"2025072819445001000_b25","doi-asserted-by":"crossref","unstructured":"Langheinrich, M.\n           (2001), \u201cPrivacy by design \u2013 principles of privacy aware ubiquitous systems\u201d, Ubicomp 2001, Atlanta.","DOI":"10.1007\/3-540-45427-6_23"},{"key":"2025072819445001000_b26","unstructured":"Patil, S.\n           and Kobsa, A. (2004), Preserving Privacy in Awareness Systems, Aktion, Wissen."},{"key":"2025072819445001000_b27","unstructured":"Ponemon, L.\n           (2004), \u201cTop 5 privacy issues for 2005\u201d, Computerworld, December 28."},{"key":"2025072819445001000_b28","unstructured":"Schwartz, P.M.\n           (1999), \u201cPrivacy and democracy in cyberspace\u201d, 52 Vand. L. Rev., Vol. 1609, pp. 1610-1."},{"key":"2025072819445001000_b30","unstructured":"Skinner, G.\n          , Han, S. and Chang, E. (2005), \u201cDefining and protecting meta privacy: a new conceptual framework within information privacy\u201d, paper presented at International Conference on Computational Intelligence and Security, Xian, China, December, pp. 15-19."},{"key":"2025072819445001000_b34","unstructured":"Office of the Ontario Information and Privacy Commissioner and the United States Department of Justice\n           (2000), \u201cPrivacy design principles for an integrated justice system\u201d, working paper, available at: www.ojp.usdoj.gov\/archive\/topics\/integratedjustice\/pdpapril.htm."},{"key":"2025072819445001000_b31","unstructured":"van Blarkom, G.W.\n          , Borking, J.J. and Olk, J.G.E. (2003), Handbook of Privacy and Privacy-Enhancing Technologies, PISA Consortium, The Hague."},{"key":"2025072819445001000_b32","unstructured":"W3C\n           (2002), \u201cW3C: the platform for privacy preferences 1.0 (P3P1.0) specification\u201d, W3C Proposed Recommendation, available at: www.w3.org\/TR\/P3P."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220610690835","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220610690835\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/14\/4\/382\/1203964\/09685220610690835.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/14\/4\/382\/1203964\/09685220610690835.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T23:44:58Z","timestamp":1753746298000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ics\/article\/14\/4\/382\/176984\/An-information-privacy-taxonomy-for-collaborative"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8,1]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,8,1]]}},"URL":"https:\/\/doi.org\/10.1108\/09685220610690835","relation":{},"ISSN":["0968-5227","1758-5805"],"issn-type":[{"type":"print","value":"0968-5227"},{"type":"electronic","value":"1758-5805"}],"subject":[],"published":{"date-parts":[[2006,8,1]]}}}