{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:20:08Z","timestamp":1759335608577},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,11,30]],"date-time":"2005-11-30T00:00:00Z","timestamp":1133308800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2006,6]]},"DOI":"10.1007\/s00146-005-0024-3","type":"journal-article","created":{"date-parts":[[2005,11,29]],"date-time":"2005-11-29T12:03:50Z","timestamp":1133265830000},"page":"372-383","source":"Crossref","is-referenced-by-count":3,"title":["Togetherness and respect: ethical concerns of privacy in Global Web Societies"],"prefix":"10.1007","volume":"20","author":[{"given":"Gordana","family":"Dodig-Crnkovic","sequence":"first","affiliation":[]},{"given":"Virginia","family":"Horniak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,11,30]]},"reference":[{"issue":"7","key":"24_CR1","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1145\/379300.379322","volume":"44","author":"S Benford","year":"2001","unstructured":"Benford S, Greenhalgh C, Rodden T, Pycock J (2001) Collaborative virtual environments. Commun ACM 44(7):79\u201385","journal-title":"Commun ACM"},{"key":"24_CR2","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010069907461","volume":"1\/1","author":"P Brey","year":"1999","unstructured":"Brey P (1999) The ethics of representation and action in virtual reality. Ethics Inform Technol 1\/1:5\u201314","journal-title":"Ethics Inform Technol"},{"issue":"3","key":"24_CR3","first-page":"1","volume":"2","author":"P Brey","year":"2000","unstructured":"Brey P (2000) Method in computer ethics: towards a multi-level interdisciplinary approach. Ethics Inform Technol 2(3):1\u20135","journal-title":"Ethics Inform Technol"},{"key":"24_CR4","first-page":"32","volume-title":"Ethics in the age of information technology","author":"TW Bynum","year":"2000","unstructured":"Bynum TW (2000) Ethics and the information revolution, In: Collste G (eds) Ethics in the age of information technology. Center for Applied Ethics Linkoeping Universitet. Linkoeping, pp 32\u201355"},{"key":"24_CR5","unstructured":"Cooley MJ (1999) Invited talk at international conference: enterprise cultures and innovation in the Information Society. University of Brighton"},{"key":"24_CR6","unstructured":"Dodig-Crnkovic G (2003) Shifting the paradigm of the philosophy of science: the philosophy of information and a new renaissance. Minds Mach: Special Issue on the Philosophy of Information 13(4)"},{"key":"24_CR7","unstructured":"DeCew J (2002) Privacy, the stanford encyclopedia of philosophy. In: Edward NZ (ed) ( http:\/\/www.plato.stanford.edu\/archives\/sum2002\/entries\/privacy )"},{"issue":"1","key":"24_CR8","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1023\/A:1010018611096","volume":"1","author":"L Floridi","year":"1999","unstructured":"Floridi L (1999) Information ethics: On the philosophical foundations of computer ethics. Ethics Inform Technol 1(1):37\u201356","journal-title":"Ethics Inform Technol"},{"issue":"1","key":"24_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1023\/A:1015209807065","volume":"4","author":"L Floridi","year":"2002","unstructured":"Floridi L, Sanders J (2002) Mapping the foundationalist debate in computer science, a revised version of computer ethics: mapping the foundationalist debate. Ethics Inform Technol 4(1):1\u20139","journal-title":"Ethics Inform Technol"},{"key":"24_CR10","unstructured":"Floridi L, Sanders J (2003) Internet ethics: the constructionist values of homo poieticus. In: Cavalier R (ed) The impact of the internet on our moral lives,"},{"key":"24_CR11","unstructured":"Gill KS (1997) Knowledge networking and social cohesion in the Information Society, a study for the European Commission"},{"key":"24_CR12","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/s001460200021","volume":"16","author":"KS Gill","year":"2002","unstructured":"Gill KS (2002) Knowledge networking in cross-cultural settings. AI Soc 16:252\u2013277","journal-title":"AI Soc"},{"key":"24_CR13","unstructured":"Gill KS (2003) Future with AI and Society ( http:\/\/www.it.bton.ac.uk\/research\/seake\/ai_soc6_3.html )"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Goodman N (1978) Ways of worldmaking, indianapolis: Hackett Publishing Human Rights Act 1998 http:\/\/www.hmso.gov.uk\/acts\/acts1998\/80042\u2013d.htm","DOI":"10.5040\/9781350928558"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Hinde S (2001) 2001: a privacy Odyssey. Comput Security 20","DOI":"10.1016\/S0167-4048(01)01016-1"},{"key":"24_CR16","unstructured":"Hinde S (2002) 2001: a privacy Odyssey Revisited. Comput Security 21"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Johnson DG (1997) Ethics online. Association for computing machinery. Commun ACM","DOI":"10.1145\/242857.242875"},{"key":"24_CR18","volume-title":"The blackwell guide to the philosophy of computing and information","author":"DG Johnson","year":"2003","unstructured":"Johnson DG (2003) Computer ethics. In: Floridi L (ed) The blackwell guide to the philosophy of computing and information. Blackwell, Oxford"},{"key":"24_CR20","unstructured":"Mason RO (2004) A tapestry of privacy, a meta-discussion. ( http:\/\/www.cyberethics.cbi.msstate.edu\/mason2\/ )"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Mizutani M, Dorsey J, Moor JH (2004) The Internet and Japanese conception of privacy. Ethics Inform Technol","DOI":"10.1023\/B:ETIN.0000047479.12986.42"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Moor JH (1985) What is computer ethics? Metaphilosophy 16\/4 ( http:\/\/www.ccsr.cse.dmu.ac.uk\/staff\/Srog\/teaching\/moor.htm )","DOI":"10.1111\/j.1467-9973.1985.tb00173.x"},{"issue":"2","key":"24_CR23","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/966389.966407","volume":"47","author":"GJ Pottie","year":"2004","unstructured":"Pottie GJ (2004) Privacy in the global village. Commun ACM 47(2):2\u201323","journal-title":"Commun ACM"},{"issue":"4","key":"24_CR25","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1023\/B:ETIN.0000017737.56971.20","volume":"5","author":"TM Powers","year":"2004","unstructured":"Powers TM (2004) Real wrongs in virtual communities. Ethics Inform Technol 5(4):191\u2013198","journal-title":"Ethics Inform Technol"},{"key":"24_CR19","unstructured":"Research Projects at Carnegie Mellon CyLab (2005) ( http:\/\/www.cylab.cmu.edu\/default.aspx?id=10 )"},{"key":"24_CR24","unstructured":"Rosen J (2000) Why privacy matters. Wilson Quarta 24(4)"},{"key":"24_CR27","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1023\/A:1015283808882","volume":"4","author":"H Tavani","year":"2002","unstructured":"Tavani H (2002) The uniqueness debate in computer ethics: what exactly is at issue, and why does it matter? Ethics Inform Technol 4:37\u201354","journal-title":"Ethics Inform Technol"},{"key":"24_CR28","unstructured":"Tavani HT, Moor JH (2000) Privacy protection, control of information, and privacy-enhancing technologies. In: Proceedings of the conference on computer ethics-philosophical enquiry"},{"issue":"1","key":"24_CR29","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/BF02065179","volume":"6","author":"G Thill","year":"1994","unstructured":"Thill G (1994) The relevance of associative networks for a sustainable information and communication society. AI Soc 6(1):70\u201377","journal-title":"AI Soc"},{"key":"24_CR30","unstructured":"Turkle S (1996) Who am we? Wired 4(1):148\u2013152, 194\u2013199"},{"key":"24_CR31","unstructured":"Vance D (2004) The place of cyberethics, information systems ethics. ( http:\/\/www.cyberethics.cbi.msstate.edu\/ )"},{"issue":"4","key":"24_CR32","first-page":"1","volume":"14","author":"C Wagner","year":"2003","unstructured":"Wagner C, Cheung K, Lee F, Ip R (2003) Enhancing e-government in developing countries: managing knowledge through virtual communities. Electron J Inform Syst Dev Ctries 14(4):1\u201320","journal-title":"Electron J Inform Syst Dev Ctries"},{"issue":"1","key":"24_CR33","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1080\/01449290301783","volume":"22","author":"B Whitworth","year":"2003","unstructured":"Whitworth B, de Moor A (2003) Legitimate by design: towards trusted virtual community environments. Behav Inform Technol 22(1):31\u201351","journal-title":"Behav Inform Technol"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-005-0024-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00146-005-0024-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-005-0024-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T17:03:13Z","timestamp":1683306193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00146-005-0024-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,30]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,6]]}},"alternative-id":["24"],"URL":"https:\/\/doi.org\/10.1007\/s00146-005-0024-3","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,11,30]]}}}