{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T19:01:20Z","timestamp":1767034880598},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,10,2]],"date-time":"2013-10-02T00:00:00Z","timestamp":1380672000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s10676-013-9328-z","type":"journal-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T10:59:07Z","timestamp":1380625147000},"page":"1-13","source":"Crossref","is-referenced-by-count":8,"title":["Lockbox: mobility, privacy and values in cloud storage"],"prefix":"10.1007","volume":"16","author":[{"given":"Luke","family":"Stark","sequence":"first","affiliation":[]},{"given":"Matt","family":"Tierney","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,2]]},"reference":[{"issue":"11","key":"9328_CR1","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/1839676.1839683","volume":"53","author":"G Anthes","year":"2010","unstructured":"Anthes, G. (2010). Security in the cloud. Communications of the ACM, 53(11), 16\u201318. doi: 10.1145\/1839676.1839683 .","journal-title":"Communications of the ACM"},{"key":"9328_CR2","volume-title":"Liquid Times: Living in an Age of Uncertainty","author":"Z Bauman","year":"2007","unstructured":"Bauman, Z. (2007). Liquid Times: Living in an Age of Uncertainty. Malden, MA: Polity Press."},{"key":"9328_CR3","doi-asserted-by":"crossref","unstructured":"Bevan, N. (1995). Usability is Quality of Use. In Presented at the Proceedings of the 6th International Conference on Human Computer Interaction (CHI), Yokohama, Japan.","DOI":"10.1016\/S0921-2647(06)80241-8"},{"key":"9328_CR4","doi-asserted-by":"crossref","unstructured":"Bowers, K. D., Juels, A., & Oprea, A. (2009). HAIL: a high-availability and integrity layer for cloud storage (pp. 187\u2013198). In Presented at the Proceedings of the 16th ACM conference on Computer and communications security, New York, NY, USA: ACM. doi: 10.1145\/1653662.1653686 .","DOI":"10.1145\/1653662.1653686"},{"key":"9328_CR5","volume-title":"Making Sense of Privacy and Publicity","author":"D Boyd","year":"2010","unstructured":"Boyd, D. (2010). Making Sense of Privacy and Publicity. Austin, TX: SXSW."},{"key":"9328_CR6","unstructured":"Boyles, J. L., Smith, A., & Madden, M. (2012). Privacy and Data Management on Mobile Devices. Pew Research Center\u2019s Internet & American Life Project (pp. 1\u201319). Washington, D.C."},{"issue":"5","key":"9328_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5210\/fm.v16i5.3493","volume":"16","author":"F Brunton","year":"2011","unstructured":"Brunton, F., & Nissenbaum, H. (2011). Vernacular resistance to data collection and analysis: A political theory of obfuscation. First Monday, 16(5), 1\u201322.","journal-title":"First Monday"},{"key":"9328_CR8","first-page":"125","volume-title":"Technology and privacy: The new landscape","author":"H Burkert","year":"1997","unstructured":"Burkert, H. (1997). Privacy-Enhancing Technologies: Typology, critique, vision. In P. E. Agre & M. Rotenberg (Eds.), Technology and privacy: The new landscape (pp. 125\u2013142). Cambridge, MA: The MIT Press."},{"key":"9328_CR9","doi-asserted-by":"crossref","unstructured":"Chen, J., Wu, X., Zhang, S., Zhang, W., & Niu, Y. (2012). A Decentralized Approach for Implementing Identity Management in Cloud Computing (pp. 770\u2013776). In Presented at the International Conference on Cloud and Green Computing (CGC), IEEE. doi: 10.1109\/CGC.2012.118 .","DOI":"10.1109\/CGC.2012.118"},{"issue":"3","key":"9328_CR10","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1109\/TNET.2005.850224","volume":"13","author":"DD Clark","year":"2005","unstructured":"Clark, D. D., Wroclawski, J., Sollins, K. R., & Braden, R. (2005). Tussle in cyberspace: Defining tomorrow\u2019s internet. IEEE\/ACM Transactions on Networking, 13(3), 462\u2013475. doi: 10.1109\/TNET.2005.850224 .","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"5","key":"9328_CR11","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.2307\/1229517","volume":"52","author":"JE Cohen","year":"2000","unstructured":"Cohen, J. E. (2000). Examined lives: Informational privacy and the subject as object. Stanford Law Review, 52(5), 1373\u20131438.","journal-title":"Stanford Law Review"},{"key":"9328_CR12","volume-title":"Configuring the Networked Self: Law, Code, and the Play of Everyday Practice","author":"JE Cohen","year":"2012","unstructured":"Cohen, J. E. (2012). Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. New Haven, CT: Yale University Press."},{"issue":"2","key":"9328_CR13","first-page":"499","volume":"28","author":"D Constantine","year":"2012","unstructured":"Constantine, D. (2012). Cloud computing: The next great technological innovation, the death of online privacy, or both. Georgia State University Law Review, 28(2), 499\u2013528.","journal-title":"Georgia State University Law Review"},{"key":"9328_CR14","unstructured":"Duffany, J. L. (2012). Cloud Computing Security and Privacy. In Presented at the 10th Latin American and Caribbean Conference for Engineering and Technology (pp. 1\u20139) Panama City, Panama."},{"issue":"3","key":"9328_CR15","first-page":"33","volume":"1","author":"PE Fischer","year":"2012","unstructured":"Fischer, P. E. (2012). Global standards: Recent developments between the poles of privacy and cloud computing. JIPITEC, 1(3), 33\u201359.","journal-title":"JIPITEC"},{"key":"9328_CR16","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1017\/CBO9780511498725.017","volume-title":"Information Technology and Moral Philosophy","author":"M Flanagan","year":"2008","unstructured":"Flanagan, M., Howe, D. C., & Nissenbaum, H. (2008). Embodying Values in Technology: Theory and Practice. In J. van den Hoeven & J. Weckert (Eds.), Information Technology and Moral Philosophy (pp. 322\u2013353). Cambridge, UK: Cambridge University Press."},{"issue":"3","key":"9328_CR17","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1145\/230538.230561","volume":"14","author":"B Friedman","year":"1996","unstructured":"Friedman, B., & Nissenbaum, H. (1996). Bias in Computer Systems. ACM Transactions on Information Systems, 14(3), 330\u2013347.","journal-title":"ACM Transactions on Information Systems"},{"key":"9328_CR18","unstructured":"Friedman, B., & Nissenbaum, H. (1997). Software Agents and User Autonomy. In Presented at the AGENTS \u201897: Proceedings of the first international conference on Autonomous agents (pp. 466\u2013469) New York."},{"key":"9328_CR19","first-page":"348","volume-title":"Human-Computer Interaction in Management Information Systems: Foundations","author":"B Friedman","year":"2006","unstructured":"Friedman, B., Kahn, P. H., & Borning, A. (2006). Value sensitive design and information systems. In B. Schneiderman, P. Zhang, & D. Galletta (Eds.), Human-Computer Interaction in Management Information Systems: Foundations (pp. 348\u2013372). New York: M.E. Sharpe, Inc."},{"key":"9328_CR20","unstructured":"Gain, B. (2011, April 23). Why Dropbox\u2019s Privacy Policy Is OK (Just Proceed Carefully). pcworld.com. Retrieved April 30, 2011, from."},{"key":"9328_CR21","doi-asserted-by":"crossref","unstructured":"Garon, J. M. (2011). Navigating through the Cloud\u2014Legal and Regulatory Management for Software as a Service. NKU Chase Law & Informatics Institute.","DOI":"10.2139\/ssrn.2025246"},{"key":"9328_CR22","doi-asserted-by":"crossref","unstructured":"Geambasu, R., John, J. P., Gribble, S. D., Kohno, T., & Levy, H. M. (2011). Keypad: An Auditing File System for Theft-Prone Devices. In Presented at the EuroSys\u201911 (pp. 1\u201315) Salzburg, Austria.","DOI":"10.1145\/1966445.1966447"},{"key":"9328_CR23","unstructured":"Gellman, R. (2009). Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing (pp. 1\u201326). World Privacy Forum."},{"key":"9328_CR24","unstructured":"Governor, J. (2011, April 20). My thoughts on Dropbox, corporate and personal privacy and ToS changes. James Governor\u2019s Monkchips. Retrieved May 6 2013, from http:\/\/redmonk.com\/jgovernor\/2011\/04\/20\/my-thoughts-on-dropbox-corporate-and-person ."},{"issue":"4","key":"9328_CR25","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1093\/idpl\/ipr018","volume":"1","author":"WK Hon","year":"2011","unstructured":"Hon, W. K., Millard, C., & Walden, I. (2011). The problem of \u201cpersonal data\u201d in cloud computing: What information is regulated?\u2014the cloud of unknowing. International Data Privacy Law, 1(4), 211\u2013228.","journal-title":"International Data Privacy Law"},{"key":"9328_CR26","doi-asserted-by":"crossref","unstructured":"Itani, W., Kayssi, A., & Chehab, A. (2009). Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. In Presented at the International Conference on Dependable, Autonomic and Secure Computing (DASC), IEEE. (pp. 711\u2013716) doi: 10.1109\/DASC.2009.139 .","DOI":"10.1109\/DASC.2009.139"},{"key":"9328_CR27","doi-asserted-by":"crossref","unstructured":"Jansen, W., & Grance, T. (2011) Guidelines on Security and Privacy in Public Cloud Computing (pp. 1\u201380). Gaithersburg, MD: National Institute of Standards and Technology, U.S. Department of Commerce.","DOI":"10.6028\/NIST.SP.800-144"},{"key":"9328_CR28","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s10676-006-9111-5","volume":"8","author":"DG Johnson","year":"2006","unstructured":"Johnson, D. G. (2006). Computer systems: Moral entities but not moral agents. Ethics and Information Technology, 8, 195\u2013204.","journal-title":"Ethics and Information Technology"},{"key":"9328_CR29","first-page":"247","volume-title":"\u201cRadical extremism\u201d to \u201cBalanced Copyright\u201d: Canadian Copyright and the digital agenda","author":"I Kerr","year":"2010","unstructured":"Kerr, I. (2010). Digital locks and the automation of virtue. \u201cRadical extremism\u201d to \u201cBalanced Copyright\u201d: Canadian Copyright and the digital agenda (pp. 247\u2013303). Toronto: Irwin Law."},{"issue":"3","key":"9328_CR30","first-page":"392","volume":"52","author":"I Kerr","year":"2007","unstructured":"Kerr, I., & McGill, J. (2007). Emanations, Snoop Dogs and Reasonable Expectations of Privacy. Criminal Law Quarterly, 52(3), 392\u2013431.","journal-title":"Criminal Law Quarterly"},{"key":"9328_CR31","doi-asserted-by":"crossref","unstructured":"Kim, B. H., Huang, W., & Lie, D. (2012). Unity: secure and durable personal cloud storage. In Presented at the Proceedings of the 2012 ACM Workshop on Cloud computing security workshop (pp. 31\u201336) New York, NY, USA: ACM. doi: 10.1145\/2381913.2381920 .","DOI":"10.1145\/2381913.2381920"},{"key":"9328_CR32","unstructured":"Kittler, F. A. (1999). Gramophone, Film, Typewriter. (G. Winthrop-Young, Trans.). Palo Alto, CA: Stanford University Press."},{"key":"9328_CR33","first-page":"225","volume-title":"Shaping technology\/building society: Studies in sociotechnical change","author":"B Latour","year":"1992","unstructured":"Latour, B. (1992). Where are the missing masses? The sociology of a few mundane artifacts. In W. E. Bijker & J. Law (Eds.), Shaping technology\/building society: Studies in sociotechnical change (pp. 225\u2013258). Cambridge, MA: The MIT Press."},{"key":"9328_CR34","first-page":"185","volume-title":"High noon on the electronic frontier","author":"S Levy","year":"1996","unstructured":"Levy, S. (1996). Crypto Rebels. In P. Ludlow (Ed.), High noon on the electronic frontier (pp. 185\u2013205). Cambridge, MA: The MIT Press."},{"key":"9328_CR35","doi-asserted-by":"crossref","unstructured":"Lodhi, A. (2010). Usability Heuristics as an Assessment Parameter: for performing Usability Testing.In Presented at the 2nd International Conference on Software Technology and Engineering(ICSTE) (pp. 256\u2013259) San Juan, Puerto Rico.","DOI":"10.1109\/ICSTE.2010.5608809"},{"key":"9328_CR36","doi-asserted-by":"crossref","unstructured":"Lopez-Alt, A., Tromer, E., & Vaikuntanathan, V. (2012). On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In Presented at the Proceedings of the 44th symposium on Theory of Computing (pp. 1219\u20131234) New York, NY, USA: ACM. doi: 10.1145\/2213977.2214086 .","DOI":"10.1145\/2213977.2214086"},{"key":"9328_CR37","unstructured":"Lyon, D. (2007). Data, Discrimination, Dignity. In Surveillance Studies: An Overview (pp. 179\u2013197). Malden, MA: Polity."},{"key":"9328_CR38","doi-asserted-by":"crossref","unstructured":"Manders-Huits, N., & Zimmer, M. (2009). Values and pragmatic action: The Challenges of Introducing Ethical Intelligence in Technical Design Communities. International Review of Information Ethics, 1\u20138.","DOI":"10.29173\/irie87"},{"key":"9328_CR39","unstructured":"Matthews, L. (2011, April 21). Dropbox responds to privacy outrage. Geek.com. Retrieved May 6 2013, from http:\/\/www.geek.com\/news\/dropbox-responds-to-privacy-outrage-1345235\/ ."},{"key":"9328_CR40","doi-asserted-by":"crossref","unstructured":"Mell, P., & Grance, T. (2011) The NIST Definition of Cloud Computing (Draft) (pp. 1\u20137). National Institute of Standards and Technology, U.S. Department of Commerce.","DOI":"10.6028\/NIST.SP.800-145"},{"key":"9328_CR41","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/B978-0-08-052029-2.50005-X","volume-title":"Usability engineering","author":"J Nielsen","year":"1993","unstructured":"Nielsen, J. (1993). What is usability. Usability engineering (pp. 23\u201349). San Diego, CA: Academic Press."},{"key":"9328_CR42","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Palo Alto, CA: Stanford Law Books."},{"issue":"3","key":"9328_CR43","first-page":"1367","volume":"26","author":"H Nissenbaum","year":"2011","unstructured":"Nissenbaum, H. (2011a). From Preemption to Circumvention. Berkeley Technology Law Journal, 26(3), 1367\u20131386.","journal-title":"Berkeley Technology Law Journal"},{"issue":"4","key":"9328_CR44","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1162\/DAED_a_00113","volume":"140","author":"H Nissenbaum","year":"2011","unstructured":"Nissenbaum, H. (2011b). A Contextual Approach to Privacy Online. Daedalus, 140(4), 32\u201348.","journal-title":"Daedalus"},{"key":"9328_CR45","first-page":"10","volume":"119","author":"P Ohm","year":"2005","unstructured":"Ohm, P. (2005). The Fourth Amendment Right to Delete. Harvard Law Review, 119, 10\u201318.","journal-title":"Harvard Law Review"},{"key":"9328_CR46","doi-asserted-by":"crossref","unstructured":"Pearson, S. (2009). Taking Account of Privacy When Designing Cloud Computing Services. In Presented at the ICSE\u201909 Workshop (pp. 44\u201352).","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"9328_CR47","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/978-3-642-10665-1_9","volume-title":"Cloud Computing","author":"S Pearson","year":"2009","unstructured":"Pearson, S., Shen, Y., & Mowbray, M. (2009). A privacy manager for cloud computing. Cloud Computing (pp. 90\u2013106). New York: Springer."},{"issue":"3","key":"9328_CR48","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1177\/016224399201700302","volume":"17","author":"B Pfaffenberger","year":"1992","unstructured":"Pfaffenberger, B. (1992). Technological Dramas. Science, Technology and Human Values, 17(3), 282\u2013312.","journal-title":"Science, Technology and Human Values"},{"key":"9328_CR49","first-page":"475","volume-title":"The collected dialogues of Plato","author":"Plato","year":"1961","unstructured":"Plato, & Hamilton, E. (1961). Phaedrus. In E. Hamilton & H. Cairns (Eds.), The collected dialogues of Plato (pp. 475\u2013525). Princeton, NJ: Princeton University Press."},{"issue":"1","key":"9328_CR50","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/1866739.1866751","volume":"54","author":"MD Ryan","year":"2011","unstructured":"Ryan, M. D. (2011). Cloud computing privacy concerns on our doorstep. Communications of the ACM, 54(1), 36\u201338. doi: 10.1145\/1866739.1866751 .","journal-title":"Communications of the ACM"},{"key":"9328_CR51","doi-asserted-by":"crossref","unstructured":"Sengers, P., Boehner, K., David, S., & Kaye, J. \u201c. (2005). Reflective Design. In Presented at the Proceedings of the 4th decennial conference on Critical computing: between sense and sensibility (pp. 49\u201358) New York, NY, USA: ACM. doi: 10.1145\/1094562.1094569 .","DOI":"10.1145\/1094562.1094569"},{"key":"9328_CR52","unstructured":"Soghoian, C. (2011, April 12). How Dropbox sacrifices user privacy for cost savings. slight paranoia. Retrieved July 10 2013, from http:\/\/paranoia.dubfire.net\/2011\/04\/how-dropbox-sacrifices-user-privacy-for.html ."},{"issue":"3","key":"9328_CR53","doi-asserted-by":"crossref","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"DJ Solove","year":"2006","unstructured":"Solove, D. J. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477\u2013564.","journal-title":"University of Pennsylvania Law Review"},{"key":"9328_CR54","unstructured":"Tor Project: Overview. (n.d.). Tor Project: Overview. torproject.org. Retrieved May 6 2013, from https:\/\/www.torproject.org\/about\/overview.html.en ."},{"key":"9328_CR55","unstructured":"Tridgell, A., & Mackerras, P. (1996). The rsync algorithm (No. TR-CS-96-05) (pp. 1\u20138). The Australian National University."},{"key":"9328_CR56","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., & Ren, K. (2011). Towards Secure and Effective Utilization over Encrypted Cloud Data. In Presented at the 31st International Conference on Distributed Computing Systems Workshops (ICDCS Workshops) (pp. 282\u2013286) IEEE. doi: 10.1109\/ICDCSW.2011.16 .","DOI":"10.1109\/ICDCSW.2011.16"},{"issue":"1","key":"9328_CR57","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1080\/01449290301783","volume":"22","author":"B Whitworth","year":"2003","unstructured":"Whitworth, B., & de Moor, A. (2003). Legitimate by design: Towards trusted socio-technical systems. Behavior and Information Technology, 22(1), 31\u201351.","journal-title":"Behavior and Information Technology"},{"key":"9328_CR58","unstructured":"Zhang, Q., Luo, B., Shi, W., & Almoharib, A. M. (2013). CloudSafe: Storing Your Digital Asset in the Cloud-based Safe."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-013-9328-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-013-9328-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-013-9328-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T23:43:32Z","timestamp":1688514212000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-013-9328-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,2]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["9328"],"URL":"https:\/\/doi.org\/10.1007\/s10676-013-9328-z","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,2]]}}}