802
Views
9
CrossRef citations to date
0
Altmetric
Articles

Translating privacy: developer cultures in the global world of practice

Pages 838-853 | Received 03 Sep 2018, Accepted 28 Jan 2019, Published online: 11 Feb 2019

References

  • Ailon-Souday, G., & Kunda, G. (2003). The local selves of global workers: The social construction of national identity in the face of organizational globalization. Organization Studies, 24(7), 1073–1096. doi: 10.1177/01708406030247004
  • Amrute, S. (2014). Proprietary freedoms in an IT office: How Indian IT workers negotiate code and cultural branding. Social Anthropology, 22(1), 101–117. doi: 10.1111/1469-8676.12064
  • Balebako, R., Marsh, A., Lin, J., Hong, J. I., & Cranor, L. F. (2014). The privacy and security behaviors of smartphone app developers. Usable Security Workshop Proceedings, Carnegie Mellon University Research Showcase.
  • Bamberger, K. A., & Mulligan, D. K. (2013). Privacy in Europe: Initial data on governance choices and corporate practices. George Washington Law Review, 81(5), 1529–1664.
  • Billig, M., Condor, S., Edwards, D., Gane, M., Middleton, D., & Radley, A. (1988). Ideological dilemmas: A social psychology of everyday thinking. London: Sage.
  • Breznitz, D. (2005). Collaborative public space in a national innovation system: A case study of the Israeli military's impact on the software industry. Industry & Innovation, 12(1), 31–64. doi: 10.1080/1366271042000339058
  • Callon, M. (1984). Some elements of a sociology of translation: Domestication of the scallops and the fishermen of St. Brieuc Bay. The Sociological Review, 32(1_suppl), 196–233. doi: 10.1111/j.1467-954X.1984.tb00113.x
  • Coleman, G. (2009). Code is speech: Legal tinkering, expertise, and protest among free and open source software developers. Cultural Anthropology, 24(3), 420–454. doi: 10.1111/j.1548-1360.2009.01036.x
  • Frenkel, M. (2005). The politics of translation: How state-level political relations affect the cross-national travel of management ideas. Organization, 12(2), 275–301. doi: 10.1177/1350508405051191
  • Gershon, I. (2017). Down and out in the new economy: How people find (or don’t find) work today. Chicago: University of Chicago Press.
  • Giddens, A. (1991). The consequences of modernity. Stanford, CA: Stanford University Press.
  • Gillespie, T. (2016). Digital keywords: A vocabulary of information, society and culture. Princeton, NJ: Princeton University Press.
  • Gold, S. J. (2018). Israeli infotech migrants in Silicon Valley. Russel Sage Foundation Journal of the Social Sciences, 4(1), 130–148. doi: 10.7758/rsf.2018.4.1.08
  • Grassiani, E. (2018). Between security and military identities: The case of Israeli security experts. Security Dialogue, 49(1-2), 83–95. doi: 10.1177/0967010617747202
  • Greene, D., & Shilton, K. (2018). Platform privacies: Governance, collaboration, and the different meanings of “privacy” in iOS and Android development. New Media & Society, 20(4), 1640–1657. doi: 10.1177/1461444817702397
  • Hadar, I., Hasson, T., Ayalon, O., Toch, E., Birnhack, M., Sherman, S., & Balissa, A. (2018). Privacy by designers: Software developers’ privacy mindset. Empirical Software Engineering, 23(1), 259–289. doi: 10.1007/s10664-017-9517-1
  • Honig, B., Lerner, M., & Raban, Y. (2006). Social capital and the linkages of high-tech companies to the military defense system: Is there a signaling mechanism? Small Business Economics, 27(4-5), 419–437. doi: 10.1007/s11187-005-5644-y
  • JafariNaimi, N. (2018). Our bodies in the trolley’s path, or why self-driving cars must *not* be programmed to kill. Science, Technology, & Human Values, 43(2), 302–323. doi: 10.1177/0162243917718942
  • John, N. A. (2011). Representing the Israeli internet: The press, the pioneers and the practitioners. International Journal of Communication, 5, 1545–1566.
  • Jørgensen, R. F. (2018). Framing human rights: exploring storytelling within internet companies. Information, Communication & Society, 21(3), 340–355. doi: 10.1080/1369118X.2017.1289233
  • Latour, B. (1987). Science in action: How to follow scientists and engineers through society. Cambridge, MA: Harvard University Press.
  • Machold, R. (2015). Mobility and the model: Policy mobility and the becoming of Israeli homeland security dominance. Environment and Planning, 47(4), 816–832. doi: 10.1068/a140010p
  • Marciano, A. (2018). The discursive construction of biometric surveillance in the Israeli press: Nationality, citizenship, and democracy. Journalism Studies, 1–19. doi:10.1080/1461670X.2018.1468723
  • Mulligan, D. K., Koopman, C., & Doty, N. (2016). Privacy is an essentially contested concept: A multi-dimensional analytic for mapping privacy. Philosophical Transactions of the Royal Society A, 374(2083), 118. doi: 10.1098/rsta.2016.0118
  • Neff, G. (2012). Venture labor: Work and the burden of risk in innovative industries. Cambridge, MA: MIT Press.
  • Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 119–157.
  • Reay, I., Beatty, P., Dick, S., & Miller, J. (2013). Privacy policies and national culture on the internet. Information Systems Frontiers, 15(2), 279–292. doi: 10.1007/s10796-011-9336-7
  • Ribak, R. (2007). “Privacy is a basic American value”: globalization and the construction of web privacy in Israel. The Communication Review, 10(1), 1–27. doi: 10.1080/10714420601168392
  • Ribak, R., & Turow, J. (2003). Internet power and social context: A globalization approach to web privacy concerns. Journal of Broadcasting & Electronic Media, 47(3), 328–349. doi: 10.1207/s15506878jobem4703_2
  • Shilton, K. (2012). Values levers: Building ethics into design. Science. Technology & Human Values, 38(3), 374–397. doi: 10.1177/0162243912436985
  • Shilton, K., & Greene, D. (2017). Linking platforms, practices, and developer ethics: Levers for privacy discourse in mobile application development. Journal of Business Ethics, 1–16. doi:10.1007/s10551-017-3504-8
  • Swed, O., & Butler, J. S. (2015). Military capital in the Israeli Hi-tech industry. Armed Forces & Society, 41(1), 123–141. doi: 10.1177/0095327X13499562
  • Takhteyev, Y. (2012). Coding places: Software practice in a South American city. Cambridge, MA: MIT Press.
  • Zahedi, M., & Babar, M. A. (2016). Why does site visit matter in global software development: A knowledge-based perspective. Information and Software Technology, 80, 36–56. doi: 10.1016/j.infsof.2016.08.001
  • Zarsky, T. (2016). The trouble with algorithmic decisions: An analytic road map to examine efficiency and fairness in automated and opaque decision making. Science, Technology & Human Values, 41(1), 118–132. doi: 10.1177/0162243915605575
  • Zilber, N. (2018). The rise of the cyber-mercenaries. Retrieved from https://foreignpolicy.com/2018/08/31/the-rise-of-the-cyber-mercenaries-israel-nso/
  • Zilber, T. B. (2007). Stories and the discursive dynamics of institutional entrepreneurship: The case of Israeli high-tech after the bubble. Organization Studies, 28(7), 1035–1054. doi: 10.1177/0170840607078113

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.