{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T16:33:14Z","timestamp":1775320394121,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,11,16]],"date-time":"2013-11-16T00:00:00Z","timestamp":1384560000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s10676-013-9332-3","type":"journal-article","created":{"date-parts":[[2013,11,15]],"date-time":"2013-11-15T04:02:14Z","timestamp":1384488134000},"page":"27-41","source":"Crossref","is-referenced-by-count":35,"title":["Surveillance in ubiquitous network societies: normative conflicts related to the consumer in-store supermarket experience in the context of the Internet of Things"],"prefix":"10.1007","volume":"16","author":[{"given":"Jenifer Sunrise","family":"Winter","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,16]]},"reference":[{"key":"9332_CR1","unstructured":"Acquisti, A. (2010 December 1). The economics of personal data and the economics of privacy. Joint Working Party for Information Security and Privacy (WPISP) and Working Party on the Information Economy (WPIE) Roundtable, background paper 3. Paris: Organisation for Economic Co-operation and Development (OECD)."},{"key":"9332_CR2","unstructured":"Acquisti, A., Gross, R., & Stutzman, F. (2011). Faces of Facebook: Privacy in the age of augmented reality. Black Hat 2011. Retrieved on December 11, 2011 from http:\/\/www.heinz.cmu.edu\/~acquisti\/face-recognition-study-FAQ\/acquisti-faces-BLACKHAT-draft.pdf ."},{"key":"9332_CR3","unstructured":"Albanesius, C. (2011 May 10). Senator has \u2018serious doubts\u2019 about privacy of Google, Apple location apps. PC Magazine. Retrieved on June 8, 2011 from http:\/\/www.pcmag.com\/article2\/0,2817,2385150,00.asp ."},{"key":"9332_CR4","unstructured":"Angwin, J., & Stecklow, S. (2010 October 12). \u2018Scrapers\u2019 did deep for data on Web. The Wall Street Journal. Retrieved on October 20, 2010 from http:\/\/online.wsj.com\/article\/SB10001424052748703358504575544381288117888.html ."},{"key":"9332_CR5","unstructured":"Ashton, K. (22 June 2009). That \u2018Internet of Things\u2019 thing. RFID Journal. Accessed from http:\/\/www.rfidjournal.com\/article\/view\/4986 on May 11, 2010."},{"key":"9332_CR6","unstructured":"Barnett, E. (11 Jan 2010). Facebook\u2019s Mark Zuckerberg says privacy is no longer a \u2018social norm\u2019. The Telegraph. Retrieved on March 10, 2010 from http:\/\/www.telegraph.co.uk\/technology\/facebook\/6966628\/Facebooks-Mark-Zuckerberg-says-privacy-is-no-longer-a-social-norm.html ."},{"key":"9332_CR7","volume-title":"Risk society: Towards a new modernity","author":"U Beck","year":"1992","unstructured":"Beck, U. (1992). Risk society: Towards a new modernity. London: Sage."},{"key":"9332_CR8","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7855.001.0001","volume-title":"The privacy advocates: Resisting the spread of surveillance","author":"CJ Bennett","year":"2008","unstructured":"Bennett, C. J. (2008). The privacy advocates: Resisting the spread of surveillance. Cambridge, MA: The MIT Press."},{"key":"9332_CR9","unstructured":"\u201cChina working on unified national Internet of Things strategic plan.\u201d (2010 July 5). TMCnews. Retrieved on August 10, 2010 from http:\/\/www.tmcnet.com\/usubmit\/2010\/07\/05\/4884535.htm ."},{"key":"9332_CR10","unstructured":"Christakos, H. A., & Mehta, S. N. (2002). Annual review of law and technology. Berkeley Technology Law Journal, , 473."},{"issue":"5","key":"9332_CR11","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1145\/42411.42413","volume":"31","author":"R Clarke","year":"1988","unstructured":"Clarke, R. (1988). Information technology and dataveillance. Communications of the ACM, 31(5), 498\u2013512.","journal-title":"Communications of the ACM"},{"key":"9332_CR12","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s10676-009-9203-0","volume":"12","author":"E Daly","year":"2010","unstructured":"Daly, E. (2010). Personal autonomy in the travel panopticon. Ethics and Information Technology, 12, 97\u2013108.","journal-title":"Ethics and Information Technology"},{"key":"9332_CR13","unstructured":"Denning, T., Borning, A. Friedman, B. Gill, B. Kohno, T., & Maisel, W. (2010). Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proceedings of CHI 2010 conference on human factors in computing systems (pp. 917\u2013926). New York: Association for Computing Machinery."},{"issue":"1","key":"9332_CR14","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1037\/0022-3514.74.1.63","volume":"74","author":"BM DePaulo","year":"1998","unstructured":"DePaulo, B. M., & Kashy, D. A. (1998). Everyday lies in close and casual relationships. Journal of Personality and Social Psychology, 74(1), 63\u201379.","journal-title":"Journal of Personality and Social Psychology"},{"key":"9332_CR15","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9780262015554.001.0001","volume-title":"Divining a digital future: Mess and mythology in ubiquitous computing","author":"P Dourish","year":"2011","unstructured":"Dourish, P., & Bell, G. (2011). Divining a digital future: Mess and mythology in ubiquitous computing. Cambridge, MA: The MIT Press."},{"key":"9332_CR16","unstructured":"Duhigg, C. (2012 February 16). How companies learn your secrets. The New York Times Magazine. Retrieved February 17, 2012 from: http:\/\/www.nytimes.com\/2012\/02\/19\/magazine\/shoppinghabits.html?_r=2&pagewanted=1&hp ."},{"key":"9332_CR17","volume-title":"Law\u2019s empire","author":"R Dworkin","year":"1986","unstructured":"Dworkin, R. (1986). Law\u2019s empire. Cambridge, MA: Harvard University Press."},{"key":"9332_CR18","unstructured":"European Commission & Information Society and Media. (2008). Internet of Things in 2020: Roadmap for the future. European technology platform on smart systems integration. Version 1.1 (27 May, 2008)."},{"key":"9332_CR20","unstructured":"European Parliament. http:\/\/www.europarl.europa.eu\/sides\/getDoc.do?pubRef=-\/\/EP\/\/TEXT+TA+P7-TA-2010-0207+0+DOC+XML+V0 ."},{"key":"9332_CR21","unstructured":"Federal Trade Commission. (2010 December 1). FTC staff issues privacy report, offers framework for consumers, businesses, and policymakers. Retrieved on November 24, 2011 from http:\/\/www.ftc.gov\/opa\/2010\/12\/privacyreport.shtm ."},{"key":"9332_CR22","unstructured":"Federal Trade Commission. (2011 November 21). FTC announces agenda, panelists for facial recognition workshop. Retrieved on November 24, 2011 from http:\/\/www.ftc.gov\/opa\/2011\/11\/facefacts.shtm ."},{"key":"9332_CR23","unstructured":"Federal Trade Commission. (2012 March 26). Protecting consumer privacy in an era of rapid change: Recommendations for businesses and policymakers. Washington, DC: Federal Trade Commission. Retrieved on March 27, 2012, from http:\/\/ftc.gov\/os\/2012\/03\/120326privacyreport.pdf ."},{"issue":"7","key":"9332_CR24","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s10676-006-0001-7","volume":"2005","author":"L Floridi","year":"2005","unstructured":"Floridi, L. (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 2005(7), 185\u2013200.","journal-title":"Ethics and Information Technology"},{"key":"9332_CR25","first-page":"366","volume-title":"Liberating voices: A pattern language for communication revolution","author":"B Friedman","year":"2008","unstructured":"Friedman, B. (2008). Value Sensitive Design. In D. Schular (Ed.), Liberating voices: A pattern language for communication revolution (pp. 366\u2013368). Cambridge, MA: The MIT Press."},{"issue":"3","key":"9332_CR26","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1145\/230538.230561","volume":"14","author":"B Friedman","year":"1996","unstructured":"Friedman, B., & Nissenbaum, H. (1996). Bias in computer systems. ACM Transactions on Information Systems, 14(3), 330\u2013347.","journal-title":"ACM Transactions on Information Systems"},{"key":"9332_CR27","unstructured":"Glenn, J. (2009). Scenarios. In J. C. Glenn & T. J. Gordon (Eds.), Futures research methodology\u2014Version 3.0. AC\/UNU Millennium Project. Washington: American Council for the UN University."},{"key":"9332_CR28","first-page":"3","volume-title":"The new politics of surveillance and visibility","author":"KD Haggerty","year":"2006","unstructured":"Haggerty, K. D., & Ericson, R. V. (2006). The new politics of surveillance and visibility. In K. D. Haggerty & R. V. Ericson (Eds.), The new politics of surveillance and visibility (pp. 3\u201325). Toronto: University of Toronto Press."},{"key":"9332_CR29","first-page":"133","volume":"41","author":"L Hildner","year":"2006","unstructured":"Hildner, L. (2006). Defusing the threat of RFID: Protecting consumer privacy through technology-specific legislation at the state level. Harvard Civil Rights-Civil Liberties Law Review, 41, 133\u2013176.","journal-title":"Harvard Civil Rights-Civil Liberties Law Review"},{"key":"9332_CR30","unstructured":"Hill, K. (2012 February 16). How Target figured out a teen girl was pregnant before her father did. Forbes. http:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/02\/16\/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did\/ ."},{"key":"9332_CR31","unstructured":"International Telecommunication Union. (2005). Privacy and Ubiquitous Network Societies: Background paper. In ITU Workshop on Ubiquitous Network Societies, April 6\u20138, 2005. Geneva: International Telecommunication Union."},{"key":"9332_CR32","unstructured":"Internet of Things Conference Organizing Committee. (2010). Internet of Things. Retrieved on March 17, 2010, from http:\/\/www.iot2010.org\/outline\/ ."},{"key":"9332_CR33","unstructured":"Keller, J. (2011 September 29). Cloud-powered facial recognition is terrifying. The Atlantic Monthly. Retrieved on October 1, 2011, from http:\/\/www.theatlantic.com\/technology\/archive\/2011\/09\/cloud-powered-facial-recognition-is-terrifying\/245867\/ ."},{"issue":"3","key":"9332_CR34","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1080\/01972240050133661","volume":"16","author":"R Kling","year":"2000","unstructured":"Kling, R. (2000). Learning about information technologies and social change: The contribution of social informatics. The Information Society, 16(3), 217\u2013232.","journal-title":"The Information Society"},{"key":"9332_CR35","first-page":"14","volume-title":"Surveillance as social sorting: Privacy, risk and automated discrimination","author":"D Lyon","year":"2002","unstructured":"Lyon, D. (2002). Surveillance as social sorting: Computer codes and mobile bodies. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk and automated discrimination (pp. 14\u201330). London, UK: Routledge."},{"key":"9332_CR36","doi-asserted-by":"crossref","first-page":"3","DOI":"10.4324\/9781843926818","volume-title":"Theorizing surveillance: The panopticon and beyond","author":"D Lyon","year":"2006","unstructured":"Lyon, D. (2006). The search for surveillance theories. In D. Lyon (Ed.), Theorizing surveillance: The panopticon and beyond (pp. 3\u201320). Portland, OR: Willand."},{"key":"9332_CR37","first-page":"79","volume-title":"The new politics of surveillance and visibility","author":"GT Marx","year":"2006","unstructured":"Marx, G. T. (2006). Varieties of personal information as influences on attitudes towards surveillance. In K. D. Haggerty & R. V. Ericson (Eds.), The new politics of surveillance and visibility (pp. 79\u2013110). Toronto: University of Toronto Press."},{"key":"9332_CR38","unstructured":"Microsoft. (2013, June 6). Privacy by design: How Xbox One and the new Kinect sensor put you in control. Retrieved on June 6, 2013 from: http:\/\/news.xbox.com\/2013\/06\/privacy ."},{"key":"9332_CR39","series-title":"Cambridge studies in philosophy and public policy","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1017\/CBO9780511498725.003","volume-title":"Information technology and moral philosophy","author":"JH Moor","year":"2008","unstructured":"Moor, J. H. (2008). Why we need better ethics for emerging technologies. In J. van den Hoven & J. Weckert (Eds.), Information technology and moral philosophy (pp. 26\u201339)., Cambridge studies in philosophy and public policy Cambridge: Cambridge University Press."},{"issue":"5","key":"9332_CR40","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1145\/1125944.1125971","volume":"49","author":"PG Neumann","year":"2006","unstructured":"Neumann, P. G., & Weinstein, L. (2006). Risks of RFID. Communications of the ACM, 49(5), 136.","journal-title":"Communications of the ACM"},{"key":"9332_CR41","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press."},{"key":"9332_CR42","unstructured":"nViso. (2011). Technology. Retrieved on October 11, 2011 from http:\/\/www.nviso.ch\/ ."},{"key":"9332_CR43","unstructured":"O\u2019Connor, M. C. (2011 April 6). European Commission issues framework for measuring and mitigating RFID\u2019s privacy impact. RFID Journal. Retrieved on April 6, 2011 from http:\/\/www.rfidjournal.com\/article\/view\/8345 ."},{"key":"9332_CR44","author":"A Pommeranz","year":"2011","unstructured":"Pommeranz, A., Detweiler, C., Wiggers, P., & Jonker, C. (2011). Elicitation of situated values: Need for tools to help stakeholders and designers to reflect and communicate. Ethics and Information Technology,. doi: 10.1007\/s10676-011-9282-6 .","journal-title":"Ethics and Information Technology"},{"key":"9332_CR45","volume-title":"The art of the long view: Planning for the future in an uncertain world","author":"P Schwartz","year":"1996","unstructured":"Schwartz, P. (1996). The art of the long view: Planning for the future in an uncertain world. New York: Currency Doubleday."},{"key":"9332_CR46","first-page":"1814","volume":"86","author":"PM Schwartz","year":"2011","unstructured":"Schwartz, P. M., & Solove, D. (2011). The PII problem: Privacy and a new concept of personally identifiable information. New York University Law Review, 86, 1814\u20131894.","journal-title":"New York University Law Review"},{"key":"9332_CR49","volume-title":"Nothing to hide: The false tradeoff between privacy and security","author":"D Solove","year":"2011","unstructured":"Solove, D. (2011). Nothing to hide: The false tradeoff between privacy and security. New Haven, CT: Yale University Press."},{"issue":"1","key":"9332_CR50","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1023\/B:MIND.0000005136.61217.93","volume":"14","author":"BC Stahl","year":"2004","unstructured":"Stahl, B. C. (2004). Information, ethics, and computers: The problem of autonomous moral agents. Minds and Machines, 14(1), 67\u201383.","journal-title":"Minds and Machines"},{"key":"9332_CR51","first-page":"279","volume-title":"The new politics of surveillance and visibility","author":"J Turow","year":"2006","unstructured":"Turow, J. (2006). Cracking the consumer code: Advertisers, anxiety and surveillance in the digital age. In K. D. Haggerty & R. V. Ericson (Eds.), The new politics of surveillance and visibility (pp. 279\u2013307). Toronto: University of Toronto Press."},{"issue":"3","key":"9332_CR52","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/270858.270868","volume":"27","author":"MJ Hoven van den","year":"1997","unstructured":"van den Hoven, M. J. (1997). Privacy and the varieties of moral wrong-doing in an information age. Computers and Society, 27(3), 33\u201337.","journal-title":"Computers and Society"},{"key":"9332_CR53","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-11710-7","volume-title":"Internet of Things: Legal perspectives","author":"RH Weber","year":"2010","unstructured":"Weber, R. H., & Weber, R. (2010). Internet of Things: Legal perspectives. Berlin: Springer."},{"key":"9332_CR54","first-page":"176","volume-title":"Surveillance as social sorting: Privacy, risk and digital discrimination","author":"D Winseck","year":"2003","unstructured":"Winseck, D. (2003). Netscapes of power: Convergence, network design, walled gardens, and other strategies of control in the information age. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk and digital discrimination (pp. 176\u2013198). New York: Routledge."},{"key":"9332_CR55","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s12130-008-9058-4","volume":"21","author":"JS Winter","year":"2008","unstructured":"Winter, J. S. (2008). Emerging policy problems related to ubiquitous computing: Negotiating stakeholders\u2019 visions of the future. Knowledge, Technology & Policy, 21, 191\u2013203.","journal-title":"Knowledge, Technology & Policy"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-013-9332-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-013-9332-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-013-9332-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T14:47:18Z","timestamp":1688654838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-013-9332-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,16]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["9332"],"URL":"https:\/\/doi.org\/10.1007\/s10676-013-9332-3","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,16]]}}}