{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:00:40Z","timestamp":1742932840797,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030969561"},{"type":"electronic","value":"9783030969578"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96957-8_18","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T14:04:35Z","timestamp":1645538675000},"page":"195-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Selling Political Data: How Political Ad Tech Firms\u2019 Discourses Legitimate Microtargeting"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1243-0131","authenticated-orcid":false,"given":"Kelley","family":"Cotter","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Howard, P.N.: New Media Campaigns and the Managed Citizen. Cambridge University Press, Cambridge (2006)","DOI":"10.1017\/CBO9780511615986"},{"key":"18_CR2","volume-title":"Analytic Activism: Digital Listening and the New Political Strategy","author":"D Karpf","year":"2016","unstructured":"Karpf, D.: Analytic Activism: Digital Listening and the New Political Strategy. Oxford University Press, New York (2016)"},{"key":"18_CR3","unstructured":"Kreiss, D.: Yes we can (profile you): a brief primer on campaigns and political data. Stanf. Law Rev. Online 64, (2012)"},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Zuiderveen Borgesius, F.J., et al.: Online political microtargeting: promises and threats for democracy. ULR 14, 82 (2018). https:\/\/doi.org\/10.18352\/ulr.420","DOI":"10.18352\/ulr.420"},{"key":"18_CR5","unstructured":"Cox, K.: Proposed bill would ban microtargeting of political advertisements. https:\/\/arstechnica.com\/tech-policy\/2020\/05\/proposed-bill-would-ban-microtargeting-of-political-advertisements\/. Accessed 12 Sep 2021"},{"key":"18_CR6","unstructured":"Larson, B.N., Schmit, C., Kum, H.-C.: Data privacy laws in the US protect profit but prevent sharing data for public good \u2013 people want the opposite. http:\/\/theconversation.com\/data-privacy-laws-in-the-us-protect-profit-but-prevent-sharing-data-for-public-good-people-want-the-opposite-166320. Accessed 14 Sep 2021"},{"key":"18_CR7","unstructured":"Ryan-Mosley, T.: The technology that powers the 2020 campaigns, explained. https:\/\/www.technologyreview.com\/2020\/09\/28\/1008994\/the-technology-that-powers-political-campaigns-in-2020-explained\/. Accessed 12 Sep 2021"},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Kim, Y.M.: Algorithmic opportunity: digital advertising and inequality in political involvement. Forum 14 (2016). https:\/\/doi.org\/10.1515\/for-2016-0034","DOI":"10.1515\/for-2016-0034"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Barocas, S.: The price of precision: voter microtargeting and its potential harms to the democratic process. In: Proceedings of the first edition workshop on Politics, elections and data - PLEAD 2012, p. 31. ACM Press, Maui (2012). https:\/\/doi.org\/10.1145\/2389661.2389671","DOI":"10.1145\/2389661.2389671"},{"key":"18_CR10","unstructured":"Ortutay, B., Seitz, A.: How microtargeted political ads are wreaking havoc on our elections (2020). https:\/\/www.latimes.com\/business\/technology\/story\/2020-02-01\/how-microtargeted-political-ads-are-wreaking-havoc-on-our-elections"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2053951721996046","volume":"8","author":"K Cotter","year":"2021","unstructured":"Cotter, K., Medeiros, M., Pak, C., Thorson, K.: \u201cReach the right people\u201d: the politics of \u201cinterests\u201d in Facebook\u2019s classification system for ad targeting. Big Data Soc. 8, 1\u201316 (2021). https:\/\/doi.org\/10.1177\/2053951721996046","journal-title":"Big Data Soc."},{"key":"18_CR12","unstructured":"Gandy, O.H.: The panoptic sort: a political economy of personal information. Westview, Boulder, Colo (1993)"},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1080\/07393148.2015.1125119","volume":"38","author":"WA Gorton","year":"2016","unstructured":"Gorton, W.A.: Manipulating citizens: how political campaigns\u2019 use of behavioral social science harms democracy. New Polit. Sci. 38, 61\u201380 (2016). https:\/\/doi.org\/10.1080\/07393148.2015.1125119","journal-title":"New Polit. Sci."},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Benjamin, R.: Race After Technology: Abolitionist Tools for the New Jim Code. Polity, Medford (2019)","DOI":"10.1093\/sf\/soz162"},{"key":"18_CR15","volume-title":"Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor","author":"V Eubanks","year":"2017","unstructured":"Eubanks, V.: Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. St. Martin\u2019s Press, New York (2017)"},{"key":"18_CR16","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt1pwt9w5","volume-title":"Algorithms of Oppression: How Search Engines Reinforce Racism","author":"SU Noble","year":"2018","unstructured":"Noble, S.U.: Algorithms of Oppression: How Search Engines Reinforce Racism. New York University Press, New York (2018)"},{"key":"18_CR17","volume-title":"Weapons of math destruction: how big data increases inequality and threatens democracy","author":"C O\u2019Neil","year":"2016","unstructured":"O\u2019Neil, C.: Weapons of math destruction: how big data increases inequality and threatens democracy. Crown, New York (2016)"},{"key":"18_CR18","doi-asserted-by":"publisher","unstructured":"Bennett, C.J.: Trends in voter surveillance in western societies: privacy intrusions and democratic implications. SS 13, 370\u2013384 (2015). https:\/\/doi.org\/10.24908\/ss.v13i3\/4.5373","DOI":"10.24908\/ss.v13i3\/4.5373"},{"key":"18_CR19","unstructured":"Higher Ground Labs: 2020 Political tech landscape report (2020)"},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1177\/1750481307071986","volume":"1","author":"T Van Leeuwen","year":"2007","unstructured":"Van Leeuwen, T.: Legitimation in discourse and communication. Discourse Commun. 1, 91\u2013112 (2007). https:\/\/doi.org\/10.1177\/1750481307071986","journal-title":"Discourse Commun."},{"key":"18_CR21","volume-title":"Building a Business of Politics: The Rise of Political Consulting and the Transformation of American Democracy","author":"AD Sheingate","year":"2016","unstructured":"Sheingate, A.D.: Building a Business of Politics: The Rise of Political Consulting and the Transformation of American Democracy. Oxford University Press, New York (2016)"},{"key":"18_CR22","unstructured":"Schier, S.E.: By invitation only: the rise of exclusive politics in the United States. University of Pittsburgh Pre (2000)"},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1080\/10584609.2017.1372999","volume":"34","author":"J Baldwin-Philippi","year":"2017","unstructured":"Baldwin-Philippi, J.: The myths of data-driven campaigning. Polit. Commun. 34, 627\u2013633 (2017). https:\/\/doi.org\/10.1080\/10584609.2017.1372999","journal-title":"Polit. Commun."},{"key":"18_CR24","unstructured":"Karpf, D.: Preparing for the Campaign Tech Bullshit Season. https:\/\/civichall.org\/civicist\/preparing-campaign-tech-bullshit-season\/"},{"key":"18_CR25","volume-title":"Subprime attention crisis advertising and the time bomb at the heart of the internet","author":"T Hwang","year":"2020","unstructured":"Hwang, T.: Subprime attention crisis advertising and the time bomb at the heart of the internet. Farrar Straus and Giroux, New York (2020)"},{"key":"18_CR26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316212783","volume-title":"Hacking the Electorate: How Campaigns Perceive Voters","author":"ED Hersh","year":"2015","unstructured":"Hersh, E.D.: Hacking the Electorate: How Campaigns Perceive Voters. Cambridge University Press, New York (2015)"},{"key":"18_CR27","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1086\/228951","volume":"94","author":"S Hilgartner","year":"1988","unstructured":"Hilgartner, S., Bosk, C.L.: The rise and fall of social problems: a public arenas model. Am. J. Sociol. 94, 53\u201378 (1988)","journal-title":"Am. J. Sociol."},{"key":"18_CR28","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199350247.001.0001","volume-title":"Prototype Politics: Technology-Intensive Campaigning and the Data of Democracy","author":"D Kreiss","year":"2016","unstructured":"Kreiss, D.: Prototype Politics: Technology-Intensive Campaigning and the Data of Democracy. Oxford University Press, New York (2016)"},{"key":"18_CR29","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-030-56286-1_4","volume-title":"The Cultural Life of Machine Learning an Incursion into Critical AI Studies","author":"F McKelvey","year":"2021","unstructured":"McKelvey, F.: The other cambridge analytics: early \u201cartificial intelligence\u201d in American political science. Roberge, J., Castelle, M. (eds.) The Cultural Life of Machine Learning an Incursion into Critical AI Studies, pp. 117\u2013142. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-56286-1_4"},{"key":"18_CR30","unstructured":"Isenstadt, A.: Republicans launching innovation fund to match Democrats. https:\/\/politi.co\/2OUySoP. Accessed 12 Sep 2021"},{"key":"18_CR31","doi-asserted-by":"publisher","first-page":"571","DOI":"10.2307\/258788","volume":"20","author":"MC Suchman","year":"1995","unstructured":"Suchman, M.C.: Managing legitimacy: strategic and institutional approaches. Acad. Manag. Rev. 20, 571\u2013610 (1995)","journal-title":"Acad. Manag. Rev."},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Jasanoff, S.: Future imperfect: science, technology, and the imaginations of modernity. In: Dreamscapes of Modernity: Sociotechnical Imaginaries and the Fabrication of Power. University of Chicago Press, Chicago (2015)","DOI":"10.7208\/chicago\/9780226276663.001.0001"},{"key":"18_CR33","unstructured":"Hall, S.: Foucault: power, knowledge and discourse. In: Wetherell, M., Yates, S., Taylor, S. (eds.) Discourse Theory and Practice: A Reader, pp. 72\u201381. SAGE, Thousand Oaks (2001)"},{"key":"18_CR34","volume-title":"The Coding Manual for Qualitative Researchers","author":"J Salda\u00f1a","year":"2009","unstructured":"Salda\u00f1a, J.: The Coding Manual for Qualitative Researchers. Sage Publications Ltd., London (2009)"},{"key":"18_CR35","doi-asserted-by":"publisher","unstructured":"Parvin, N., Pollock, A.: Unintended by design: on the political uses of \u201cunintended consequences.\u201d Engag. Sci. Technol. Soc. 6, 320\u2013327 (2020). https:\/\/doi.org\/10.17351\/ests2020.497","DOI":"10.17351\/ests2020.497"}],"container-title":["Lecture Notes in Computer Science","Information for a Better World: Shaping the Global Future"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96957-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T00:05:44Z","timestamp":1645661144000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96957-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030969561","9783030969578"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96957-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iConference","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 February 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconference2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ischools.org\/iConference","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfTool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"147","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}