{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T02:54:58Z","timestamp":1765421698239},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Law"],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1007\/s10506-004-6488-5","type":"journal-article","created":{"date-parts":[[2005,3,15]],"date-time":"2005-03-15T14:28:22Z","timestamp":1110896902000},"page":"137-157","source":"Crossref","is-referenced-by-count":18,"title":["Anonymity and software agents: An interdisciplinary challenge"],"prefix":"10.1007","volume":"12","author":[{"given":"Frances","family":"Brazier","sequence":"first","affiliation":[]},{"given":"Anja","family":"Oskamp","sequence":"additional","affiliation":[]},{"given":"Corien","family":"Prins","sequence":"additional","affiliation":[]},{"given":"Maurice","family":"Schellekens","sequence":"additional","affiliation":[]},{"given":"Niek","family":"Wijngaards","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R. Anderson","year":"2001"},{"issue":"2","key":"CR2","first-page":"103","volume":"31","author":"F. Bellifemine","year":"2001","journal-title":"Software: Practice and Experience"},{"key":"CR3","unstructured":"Bentham, J. (1791). Panopticon, Dublin."},{"key":"CR4","first-page":"151","volume-title":"Proceedings of the workshop on the Law of Electronic Agents (LEA02)","author":"F. M. T. Brazier","year":"2002"},{"key":"CR5","first-page":"69","volume-title":"Proceedings of the LEA 2003: The Law and Electronic Agents","author":"F. M. T. Brazier","year":"2003"},{"key":"CR6","doi-asserted-by":"crossref","unstructured":"Brazier, F., Oskamp, A., Prins, C., Schellekens, M. and Wijngaards, N. (2004). Law-Abiding & Integrity on the Internet: A Case for Agents, AI& Law journal, in this special issue.","DOI":"10.1007\/s10506-004-6250-z"},{"key":"CR7","first-page":"339","volume-title":"Intelligent Agents VII, Lecture Notes in Artificial Intelligence","author":"C. Castelfranchi","year":"2001"},{"key":"CR8","unstructured":"Ekker, A. (2003). Comment about Voorzieningenrechter Rechtbank Haarlem 11 September 2003 (Pessers\/Lycos) Computerrecht 22: 363?367."},{"key":"CR9","unstructured":"FIPA, (2001). FIPA agent platform, http:\/\/www.fipa.org\/."},{"key":"CR10","unstructured":"Froomkin, A. M. (1995). Anonymity and Its Enmities. Journal Online Law art. 4, June."},{"key":"CR11","first-page":"395","volume":"15","author":"A. M. Froomkin","year":"1996","journal-title":"Journal of Law and Commerce"},{"key":"CR12","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-63594-7_64","volume-title":"Financial Cryptography, Proceedings of the First International Conference, FC ?97","author":"E. Gabber","year":"1997"},{"issue":"2","key":"CR13","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. M. Goldschlag","year":"1999","journal-title":"Communications of the ACM"},{"key":"CR14","unstructured":"Grijpink, J. H. A. M. and Prins, J. E. J. (2001). New Rules for Anonymous Electronic Transactions? An Exploration of the Private Law Implications of Digital Anonymity. Journal of Information, Law and Technology, 2."},{"key":"CR15","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/978-90-6704-579-7_11","volume-title":"Digital Anonymity and the Law","author":"J. H. A. M. Grijpink","year":"2003"},{"key":"CR16","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s101150200007","volume":"4","author":"M. He","year":"2002","journal-title":"Knowledge and Information Systems"},{"key":"CR17","unstructured":"Martin, D. (1998). Internet Anonymising Techniques. In: login: Magazine,May, http:\/\/www.usenix.org\/publications\/login\/1998-5\/martin.html"},{"issue":"1?2","key":"CR18","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1080\/088395199117504","volume":"13","author":"D. Martin","year":"1999","journal-title":"Applied Artificial Intelligence"},{"key":"CR19","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/978-90-6704-579-7_13","volume-title":"Digital Anonymity and the Law. Tensions and Dimensions.","author":"C. Nicoll","year":"2003"},{"key":"CR20","doi-asserted-by":"crossref","DOI":"10.1007\/978-90-6704-579-7","volume-title":"Digital anonymity and the law: tensions and dimensions, T","author":"C. Nicoll","year":"2003"},{"key":"CR21","series-title":"Proceedings of the Third International Conference on Autonomous Agents (Autonomous Agents?99)","first-page":"360","volume-title":"ZEUS: A Toolkit and Approach for Building Distributed Multi-Agent Systems","author":"H. Nwana","year":"1999"},{"issue":"1","key":"CR22","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M. K. Reiter","year":"1998","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"CR23","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/293411.293778","volume":"42","author":"M. K. Reiter","year":"1999","journal-title":"Communications of the ACM"},{"key":"CR24","first-page":"195","volume-title":"Conference Proceedings EICAR International Conference","author":"A. Rieke","year":"2001"},{"key":"CR25","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/978-90-6704-579-7_12","volume-title":"Digital Anonymity and the Law. Tensions and Dimensions.","author":"A. Sims","year":"2003"},{"key":"CR26","first-page":"297","volume":"21","author":"W. A. M. Steenbruggen","year":"2002","journal-title":"Computerrecht"},{"key":"CR27","volume-title":"Distributed Systems: Principles and Paradigms","author":"A. S. Tanenbaum","year":"2002"},{"key":"CR28","volume-title":"Sturen in de mist..., maar dan met radar. Een onderzoek naar praktisch haalbare vormen van computerondersteuning bij het ontwerpen van regelingen","author":"W. J. M. Voermans","year":"1995"},{"issue":"(2?3)","key":"CR29","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0169-023X(02)00042-3","volume":"41","author":"N. J. E. Wijngaards","year":"2002","journal-title":"Data and Knowledge Engineering"},{"key":"CR30","doi-asserted-by":"crossref","unstructured":"Wong, H. and Sycara, K. (2000). A Taxonomy of Middle-agents for the Internet. In Proceedings of the Fourth International Conference on Multi-Agent Systems ICMAS?2000, 149?161. IEEE Computer Society: Boston, MA, USA.","DOI":"10.1109\/ICMAS.2000.858527"},{"key":"CR31","unstructured":"The Council of the European Communities, Council Directive 91\/250\/EEC of 14 May 1991 on the legal protection of computer programs, Official Journal L 122 , 17\/05\/1991, 42?46."}],"container-title":["Artificial Intelligence and Law"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-004-6488-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10506-004-6488-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-004-6488-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T09:26:55Z","timestamp":1586165215000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10506-004-6488-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":31,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2004,3]]}},"alternative-id":["6488"],"URL":"https:\/\/doi.org\/10.1007\/s10506-004-6488-5","relation":{},"ISSN":["0924-8463","1572-8382"],"issn-type":[{"value":"0924-8463","type":"print"},{"value":"1572-8382","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}