{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:34:05Z","timestamp":1743010445386,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333316"},{"type":"electronic","value":"9783642333323"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33332-3_36","type":"book-chapter","created":{"date-parts":[[2012,9,21]],"date-time":"2012-09-21T06:43:55Z","timestamp":1348209835000},"page":"387-398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Corporate Social Media Use Policy: Meeting Business and Ethical Responsibilities"],"prefix":"10.1007","author":[{"given":"Don","family":"Gotterbarn","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"crossref","DOI":"10.4135\/9781452233413","volume-title":"Mediamorphosis: Understanding New Media","author":"R. Fidler","year":"1997","unstructured":"Fidler, R.: Mediamorphosis: Understanding New Media. Pine Forge Press, Thousand Oaks (1997)"},{"key":"36_CR2","unstructured":"Gibson, D.: Angus Barn\u2019s Eure: Peyton Manning check posting \u2019horrible\u2019. Triangle Business Journal (March 7, 2012), http:\/\/www.bizjournals.com\/triangle\/blog\/2012\/03\/peyton-leaves-whopper-tip-at-angus-barn.html"},{"key":"36_CR3","unstructured":"Lemos, R.: Espionage network exploiting Adobe Reader flaw. Infoworld (December 9, 2011)"},{"key":"36_CR4","unstructured":"http:\/\/www.informationweek.com\/news\/government\/mobile\/232600428"},{"key":"36_CR5","unstructured":"http:\/\/www.telstra.com.au\/abouttelstra\/download\/document\/social-media-company-policy-final-150409.pdf?red=\/at\/m\/d\/smcpf150409pdf"},{"key":"36_CR6","unstructured":"Boudreaux, C.: Social Media Governance, Policy database 2009-2011 (2011), http:\/\/socialmediagovernance.com\/policies.php , (last accessed on June 10, 2011)"},{"key":"36_CR7","unstructured":"IBM, http:\/\/www.ibm.com\/blogs\/zz\/en\/guidelines.html"},{"key":"36_CR8","unstructured":"Kodak, http:\/\/www.kodak.com\/US\/images\/en\/corp\/aboutKodak\/onlineToday\/Social_Media_10_7aSP.pdf"},{"key":"36_CR9","unstructured":"Intel, http:\/\/www.intel.com\/content\/www\/us\/en\/legal\/intel-social-media-guidelines.html"},{"key":"36_CR10","unstructured":"Best Buy, http:\/\/forums.bestbuy.com\/t5\/Welcome-News\/Best-Buy-Social-Media-Policy\/td-p\/20492"},{"key":"36_CR11","unstructured":"ISO 38500, 2008, AS8015 (2005), http:\/\/www.iso.org\/iso\/catalogue_detail?csnumber=51639"},{"key":"36_CR12","unstructured":"Miller, K.: Ad Hoc Committee for Responsible Computing. Moral Responsibility for Computing Artifacts: Five Rules. Version 27 (2010), https:\/\/edocs.uis.edu\/kmill2\/www\/TheRules\/moralResponsibilityForComputerArtifactsV27.pdf , (last accessed on June 10, 2011)"},{"key":"36_CR13","unstructured":"Davis, M.: \u2018Ain\u2019t no one here but us social forces:\u2019 Constructing the professional responsibility of engineers. Science and Engineering Ethics (2011), http:\/\/ethics.iit.edu\/publication\/E-0077 (last accessed on May 24, 2012)"},{"key":"36_CR14","volume-title":"Conference Proceedings of the Ethicomp 2011","author":"D. Gotterbarn","year":"2011","unstructured":"Gotterbarn, D.: Tweeting is a beautiful sound, but not in my backyard: Employer Rights and the ethical issues of a tweet free environment for business. In: Bissett, A., et al. (eds.) Conference Proceedings of the Ethicomp 2011, Sheffield Hallam University Press, Sheffield (2011)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Critical Infrastructures and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33332-3_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T22:13:11Z","timestamp":1687731191000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33332-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333316","9783642333323"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33332-3_36","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}