{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:52:52Z","timestamp":1774975972134,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2006,2,14]],"date-time":"2006-02-14T00:00:00Z","timestamp":1139875200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Poiesis Prax"],"published-print":{"date-parts":[[2006,3]]},"DOI":"10.1007\/s10202-005-0010-3","type":"journal-article","created":{"date-parts":[[2005,10,14]],"date-time":"2005-10-14T10:58:33Z","timestamp":1129287513000},"page":"6-18","source":"Crossref","is-referenced-by-count":51,"title":["Technology paternalism \u2013 wider implications of ubiquitous computing"],"prefix":"10.1007","volume":"4","author":[{"given":"S.","family":"Spiekermann","sequence":"first","affiliation":[]},{"given":"F.","family":"Pallas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,2,14]]},"reference":[{"issue":"2","key":"10_CR1","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1207\/S15327051HCI16234_04","volume":"16","author":"PE Agre","year":"2001","unstructured":"Agre PE (2001) Changing places: contexts of awareness in computing. Hum-Comput Interact 16(2):177\u2013192","journal-title":"Hum-Comput Interact"},{"key":"10_CR2","volume-title":"The environment and social behaviour:rivacy,ersonal space, territory, crowding","author":"I Altman","year":"1975","unstructured":"Altman I (1975) The environment and social behaviour: privacy, personal space, territory, crowding. Monterey, California, Brooks\/Cole"},{"key":"10_CR3","unstructured":"Baran E, Krasnova H (2005) \u201cTechnology Paternalism\u201d, Seminar paper, Institut f\u00fcr Wirtschaftsinformatik - Humboldt Universit\u00e4t zu Berlin"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Berthold O, G\u00fcnther O, Spiekermann S (2005) RFID: Verbraucher\u00e4ngste und Verbraucherschutz. IWI Working Paper, Humboldt University Berlin","DOI":"10.1007\/BF03252655"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Bohn J, Coroama V, Langheinrich M, Mattern F, Rohs M (2004) Living in a World of Smart Everyday Objects \u2013 Social, Economic, and Ethical Implications. Journal of Human and Ecological Risk Assessment 10(5):763\u2013786 Online: http:\/\/www.vs.inf.ethz.ch\/publ\/papers\/hera.pdf [2005-04-22]","DOI":"10.1080\/10807030490513793"},{"key":"10_CR6","volume-title":"Technology assessment in the IT society","author":"C Clausen","year":"2002","unstructured":"Clausen C, Hansen A (2002) The Role of TA in the social shaping of technology. In: Banse, Grunwald, Rader (eds) Technology assessment in the IT society. Campus Verlag, Berlin"},{"issue":"3","key":"10_CR7","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/1047671.1047703","volume":"48","author":"J Coutaz","year":"2005","unstructured":"Coutaz J, Crowley JL, et al (2005) \u201cContext is key. Commun ACM 48(3):49\u201353","journal-title":"Commun ACM"},{"key":"10_CR8","volume-title":"The social legitimacy ofaternalism","author":"A Couto","year":"2005","unstructured":"Couto A (2005) The social legitimacy of paternalism. Social justice, Bremen"},{"key":"10_CR9","unstructured":"Dworkin Gerald (2002) Paternalism\u201d, The Stanford Encyclopedia of Philosophy (Winter 2002 Edition), Edward N Zalta (ed) Online: http:\/\/plato.stanford.edu\/archives\/win2002\/entries\/paternalism [2005-04-26]"},{"key":"10_CR10","unstructured":"Hooper S (2004) The car that can read road signs\u201d, In: CNN.com, Oct. 7, 2004. Online: http:\/\/www.cnn.com\/2004\/TECH\/10\/06\/roadsign.recognition\/"},{"issue":"3","key":"10_CR11","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1145\/1047671.1047705","volume":"48","author":"S Lahlou","year":"2005","unstructured":"Lahlou S, Langheinrich M, et al (2005) Privacy and trust issues with invisible computers. Commun ACM 48(3):59\u201360","journal-title":"Commun ACM"},{"key":"10_CR12","volume-title":"Code and other laws of cyberspace","author":"L Lessig","year":"1999","unstructured":"Lessig L (1999) Code and other laws of cyberspace. Basic books, New York"},{"key":"10_CR13","unstructured":"Longmans Dictionary of Contemporary English (1987) Paternalism\u201d and \u201cpaternal\u201d, Licensed edition published by Langenscheidt KG, Berlin"},{"issue":"12","key":"10_CR14","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/585597.585616","volume":"45","author":"K Lyytinen","year":"2002","unstructured":"Lyytinen K, Yoo Y (2002) Issues and challenges in ubiquitous computing. Commun ACM 45(12):63\u201365","journal-title":"Commun ACM"},{"issue":"2","key":"10_CR15","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1111\/1540-4560.00063","volume":"59","author":"S Margulis","year":"2003","unstructured":"Margulis S (2003) Privacy as a social issue and behavioral concept. J Soc Issues 59(2):243\u2013261","journal-title":"J Soc Issues"},{"key":"10_CR16","unstructured":"Merriam-Webster (2003) \u201cPaternalism\u201d, Merriam Webster\u2019s Collegiate Dictionary. In: Encyclop\u00e6dia Britannica \u2013 Deluxe Edition 2003 for PC. Encyclop\u00e6dia Britannica Inc, UK"},{"key":"10_CR17","unstructured":"Mitchell G (2005) \u201cLibertarian Paternalism Is an Oxymoron\u201d, Northwestern University Law Review, Vol. 99, No. 3, 2005. Online: http:\/\/ssrn.com\/abstract=615562 [2005-05-30]"},{"key":"10_CR18","volume-title":"Unpacking \u2018Privacy\u2019 for a Networked World CHI 2003, Ft Lauderdale","author":"L Palen","year":"2003","unstructured":"Palen L, Dourish P (2003) Unpacking \u2018Privacy\u2019 for a Networked World CHI 2003, Ft Lauderdale. ACM Press, Florida, USA,"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Petersson L, Fletcher L, Barnes N, Zelinsky A (2004) An interactive driver assistance system monitoring the scene in and out of the vehicle. Proceedings of the 2004 IEEE International Conference on Robotics and Automation pp 3475\u20133481","DOI":"10.1109\/ROBOT.2004.1308791"},{"key":"10_CR20","unstructured":"Pohl H (2004) Hintergrundinformationen der Gesellschaft f\u00fcr Informatik e.V. (GI) zu RFID - Radio Frequency Identification.\u201d"},{"key":"10_CR21","unstructured":"Saab (2005) Saab unveils Alcohol Lock-Out Concept to discourage drinking and driving. Saab South Africa. Online: http:\/\/www.saab.com\/main\/ZA\/en\/alcokey.shtml [2005-04-27]"},{"key":"10_CR22","unstructured":"Spiekermann S, Ziekow H (2004) Technische Analyse RFID-bezogener Angstszenarien. Berlin, Institut f\u00fcr Wirtschaftsinformatik - Humboldt Universit\u00e4t zu Berlin: 44"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Spiekermann S (2005) Perceived Control: Scales for Privacy in Ubiquitous Computing Environments. 10th International Conference on User Modeling, Edinburgh, Scotland","DOI":"10.2139\/ssrn.761109"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Spiekermann S, Ziekow H (2005) RFID: a 7-point-plan to ensure privacy\u201d, 13th European conference on Information Systems, Regensburg, May 2005. Online: http:\/\/www.wiwi.hu-berlin.de\/~sspiek\/ECIS_final.pdf [2005-04-25]","DOI":"10.2139\/ssrn.761047"},{"key":"10_CR25","unstructured":"Strassner M, Fleisch E (2003) The Promise of Auto-ID in the Automotive Industry\u201d, Auto-ID Center, May 2003. Online: http:\/\/www.autoid.org\/SC31\/clr\/200305_3826_Automotive%20Prpsl.pdf [2005-05-18]"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Sunstein CR, Thaler RH (2003) Libertarian Paternalism Is Not An Oxymoron. University of Chicago Law Review, Forthcoming. Online: http:\/\/ssrn.com\/abstract=405940 [2005-05-28]","DOI":"10.2307\/1600573"},{"issue":"2","key":"10_CR27","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1207\/S15327590IJHC1302_7","volume":"13","author":"GH Walker","year":"2001","unstructured":"Walker GH, Stanton NA, Young MS (2001) Where Is Computing Driving Cars?. Int J Hum-Comput Int 13(2):203\u2013229","journal-title":"Int J Hum-Comput Int"},{"key":"10_CR28","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M Weiser","year":"1991","unstructured":"Weiser M (1991) The computer for the 21st century. Sci Am 265:94\u2013104","journal-title":"Sci Am"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Weiser M, Brown JS (1996) The Coming Age of Calm Technology. Online: http:\/\/www.ubiq.com\/hypertext\/weiser\/acmfuture2endnote.htm [2005-05-04]","DOI":"10.1007\/978-1-4612-0685-9_6"},{"key":"10_CR30","unstructured":"Williams JM (2004) Technological Paternalism, Prism, December 2004, Vol. 14, No. 4, American Society for Engineering Education, Washington DC. Online: http:\/\/prism-magazine.org\/dec04\/last_word.cfm [2005-04-28]"},{"key":"10_CR31","first-page":"856","volume":"20","author":"R Williams","year":"1996","unstructured":"Williams R, Edge D (1996) The social shaping of technology. Res Policy 20:856\u2013899","journal-title":"Res Policy"}],"container-title":["Poiesis &amp; Praxis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10202-005-0010-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10202-005-0010-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10202-005-0010-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T08:42:26Z","timestamp":1586508146000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10202-005-0010-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,2,14]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,3]]}},"alternative-id":["10"],"URL":"https:\/\/doi.org\/10.1007\/s10202-005-0010-3","relation":{},"ISSN":["1615-6609","1615-6617"],"issn-type":[{"value":"1615-6609","type":"print"},{"value":"1615-6617","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,2,14]]}}}