{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:02:23Z","timestamp":1754157743518,"version":"3.41.2"},"reference-count":25,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2012,11,23]],"date-time":"2012-11-23T00:00:00Z","timestamp":1353628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11,23]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to report on and evaluate focus groups and privacy diary\/interview methods used in a qualitative study of on\u2010line privacy.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper is a discursive evaluation of two methods employed to study on\u2010line privacy, informed by and situated in interpretive and constructivist approaches to knowledge.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The paper argues for the value of qualitative research methods in study of on\u2010line privacy. It confronts the positivist paradigm that informs much of the work in the field by foregrounding the need for methodological plurality in the study of privacy as relational, situated, dynamic and contextual. It deals with the notion of \u201csensitivity\u201d as well as introducing often neglected issue of logistical challenges in qualitative research.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper contributes to the existing debates about the value of employment of qualitative research methods broadly, as well as in the study of on\u2010line privacy more specifically. It demonstrates a range of advantages and challenges in use of the two methods, providing recommendations of how to supplement them. It opens up the discussion of process of sensitizing of the participants and thus the \u201cco\u2010construction\u201d of knowledge.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14779961211285854","type":"journal-article","created":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T05:18:33Z","timestamp":1353561513000},"page":"208-221","source":"Crossref","is-referenced-by-count":2,"title":["Contesting methodologies"],"prefix":"10.1108","volume":"10","author":[{"given":"Danijela","family":"Bogdanovic","sequence":"first","affiliation":[]},{"given":"Michael","family":"Dowd","sequence":"additional","affiliation":[]},{"given":"Eileen","family":"Wattam","sequence":"additional","affiliation":[]},{"given":"Alison","family":"Adam","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020920124332400_b1","doi-asserted-by":"crossref","unstructured":"Adam, A. (2005), Gender, Ethics and Information Technology, Palgrave Macmillan, Basingstoke.","DOI":"10.1057\/9780230000520"},{"key":"key2022020920124332400_b2","unstructured":"Alasuutari, P. (1995), Researching Culture: Qualitative Method and Cultural Studies, Sage, London."},{"key":"key2022020920124332400_b3","doi-asserted-by":"crossref","unstructured":"Barbour, R.S. and Kitzinger, J. (Eds) (1999), Developing Focus Group Research: Politics, Theory and Practice, Sage, London.","DOI":"10.4135\/9781849208857"},{"key":"key2022020920124332400_b4","unstructured":"Boyd, D. (2007), \u201cWhy youth (heart) social network sites: the role of networked publics\u201d, in Buckingham, D. (Ed.), Youth, Identity and Digital Media, MIT Press, Cambridge, MA, pp. 119\u201042."},{"key":"key2022020920124332400_b5","doi-asserted-by":"crossref","unstructured":"Br\u00fcggen, E. (2009), \u201cA critical comparison of offline focus groups, online focus groups and e\u2010delphi\u201d, International Journal of Market Research, Vol. 51 No. 3, pp. 363\u201081.","DOI":"10.2501\/S1470785309200608"},{"key":"key2022020920124332400_b6","unstructured":"Byron, T. (2008), Safer Children in a Digital World: The Report of the Byron Review, available at: http:\/\/media.education.gov.uk\/assets\/files\/pdf\/s\/safer%20children%20in%20a%20digital%20world%20the%202008%20byron%20review.pdf (accessed 20 February 2012)."},{"key":"key2022020920124332400_b7","doi-asserted-by":"crossref","unstructured":"Cho, H., Rivera\u2010S\u00e1nchez, M. and Lim, S.S. (2009), \u201cA multinational study of on\u2010line privacy: global concerns and local responses\u201d, New Media and Society, Vol. 11 No. 3, pp. 395\u2010416.","DOI":"10.1177\/1461444808101618"},{"key":"key2022020920124332400_b8","unstructured":"Farquhar, C. (1999), \u201cAre focus groups suitable for \u2018sensitive\u2019 topics?\u201d, in Barbour, R.S. and Kitzinger, J. (Eds), Developing Focus Group Research: Politics, Theory and Practice, Sage, London, pp. 47\u201063."},{"key":"key2022020920124332400_b9","doi-asserted-by":"crossref","unstructured":"Fuchs, C. (2011), \u201cTowards an alternative concept of privacy\u201d, Journal of Information, Communication and Ethics in Society, Vol. 9 No. 4, pp. 220\u201037.","DOI":"10.1108\/14779961111191039"},{"key":"key2022020920124332400_b10","unstructured":"Gellman, R. (1997), \u201cDoes privacy law work?\u201d, in Agre, P. and Rotenberg, M. (Eds), Technology and Privacy: The New Landscape, MIT Press, Cambridge, MA, pp. 193\u2010218."},{"key":"key2022020920124332400_b11","unstructured":"Glasser, B.G. and Strauss, A.L. (1967), The Discovery of Grounded Theory: Strategies for Qualitative Research, Aldine de Gruyter, New York, NY."},{"key":"key2022020920124332400_b12","unstructured":"Groenland, E.A.G. (2002), \u201cOn\u2010line Kwalitatief Marketing Onderzoek\u201d, in Bronner, A.E., Dekker, P., Olivier, A.J., Van Raaij, W.F., Wedel, M. and Wierenga, B. (Eds), Jaarboek 2000 MarktOnderzoekAssociaatie: Onwtkkelingen in het Marktonderzoek, Uitgeverij De Vrieseborch, Haarlem, pp. 41\u201068."},{"key":"key2022020920124332400_b13","doi-asserted-by":"crossref","unstructured":"Hammersley, M. (2008), Questioning Qualitative Inquiry: Critical Essays, Sage, London.","DOI":"10.4135\/9780857024565"},{"key":"key2022020920124332400_b14","doi-asserted-by":"crossref","unstructured":"Introna, L.D. and Whitley, E.A. (2000), \u201cAbout experiments and style: a critique of laboratory research in information systems\u201d, Information Technology and People, Vol. 13 No. 3, pp. 161\u201073.","DOI":"10.1108\/09593840010377608"},{"key":"key2022020920124332400_b15","doi-asserted-by":"crossref","unstructured":"Jacelon, C.S. and Imperio, K. (2005), \u201cParticipant diaries as a source of data in research with older adults\u201d, Qualitative Health Research, September, pp. 991\u20107.","DOI":"10.1177\/1049732305278603"},{"key":"key2022020920124332400_b16","doi-asserted-by":"crossref","unstructured":"Lange, P.G. (2007), \u201cPublicly private and privately public: social networking on YouTube\u201d, Journal of Computer\u2010Mediated Communication, Vol. 1 No. 1, available at: http:\/\/jcmc.indiana.edu\/vol13\/issue1\/lange.html (accessed 18 October 2011).","DOI":"10.1111\/j.1083-6101.2007.00400.x"},{"key":"key2022020920124332400_b17","doi-asserted-by":"crossref","unstructured":"Malhotra, N.K., Kim, S.S. and Agarwal, J. (2004), \u201cInternet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model\u201d, Information Systems Research, Vol. 15 No. 4, pp. 336\u201055.","DOI":"10.1287\/isre.1040.0032"},{"key":"key2022020920124332400_b18","doi-asserted-by":"crossref","unstructured":"Morgan, D.L. (1997), Focus Groups as Qualitative Research, Sage, London.","DOI":"10.4135\/9781412984287"},{"key":"key2022020920124332400_b19","doi-asserted-by":"crossref","unstructured":"Raynes\u2010Goldie, K. (2010), \u201cAliases, creeping, and wall cleaning: understanding privacy in the age of Facebook\u201d, First Monday, Vol. 15 No. 1, available at: http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/viewArticle\/2775\/2432 (accessed 21 January 2011).","DOI":"10.5210\/fm.v15i1.2775"},{"key":"key2022020920124332400_b20","doi-asserted-by":"crossref","unstructured":"Tufekci, Z. (2008), \u201cCan you see me now? Audience and disclosure regulation in on\u2010line social network sites\u201d, Bulletin of Science, Technology and Society, Vol. 28 No. 1, pp. 20\u201036.","DOI":"10.1177\/0270467607311484"},{"key":"key2022020920124332400_b21","doi-asserted-by":"crossref","unstructured":"Udo, G.J. (2001), \u201cPrivacy and security concerns as major barriers for e\u2010commerce: a survey study\u201d, Information Management & Computer Security, Vol. 9 No. 4, pp. 165\u201074.","DOI":"10.1108\/EUM0000000005808"},{"key":"key2022020920124332400_b22","doi-asserted-by":"crossref","unstructured":"Viseu, A., Clement, A. and Aspinall, J. (2004), \u201cSituating privacy on\u2010line: complex perceptions and everyday practices\u201d, Information, Communication and Society, Vol. 7 No. 1, pp. 92\u2010114.","DOI":"10.1080\/1369118042000208924"},{"key":"key2022020920124332400_b23","unstructured":"Westin, A. (1995), \u201cPrivacy in America: an historical and socio\u2010political analysis\u201d, paper presented at National Privacy and Public Policy Symposium, Hartford, CT."},{"key":"key2022020920124332400_b24","unstructured":"Willis, P.E. (2000), The Ethnographic Imagination, Polity Press, Cambridge."},{"key":"key2022020920124332400_b25","doi-asserted-by":"crossref","unstructured":"Zimmerman, D.H. and Wieder, D.L. (1977), \u201cThe diary: diary\u2010interview method\u201d, Urban Life, Vol. 5 No. 4, pp. 479\u201098.","DOI":"10.1177\/089124167700500406"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14779961211285854","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961211285854\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961211285854\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:13:20Z","timestamp":1753402400000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/10\/4\/208-221\/218271"}},"subtitle":["Evaluating focus group and privacy diary methods in a study of on\u2010line privacy"],"short-title":[],"issued":{"date-parts":[[2012,11,23]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,11,23]]}},"alternative-id":["10.1108\/14779961211285854"],"URL":"https:\/\/doi.org\/10.1108\/14779961211285854","relation":{},"ISSN":["1477-996X"],"issn-type":[{"type":"print","value":"1477-996X"}],"subject":[],"published":{"date-parts":[[2012,11,23]]}}}