{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T07:11:19Z","timestamp":1714633879743},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s10676-014-9339-4","type":"journal-article","created":{"date-parts":[[2014,3,11]],"date-time":"2014-03-11T02:09:26Z","timestamp":1394503766000},"page":"43-49","source":"Crossref","is-referenced-by-count":9,"title":["Surveillance and persuasion"],"prefix":"10.1007","volume":"16","author":[{"given":"Michael","family":"Nagenborg","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,12]]},"reference":[{"key":"9339_CR1","unstructured":"Albrechtslund, A. (2008). Online Social Networking as Participatory Surveillance. First Monday (13\/3). http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/2142\/1949 . Accessed February 9, 2013."},{"key":"9339_CR2","unstructured":"Bang, M., Ragnemalm, E. L. (Eds.) (2012). Persuasive Technology: Design for Health and Safety: Proceedings of the 7th International Conference on Persuasive Technology, PERSUASIVE 2012, Link\u00f6ping, Sweden. June 6\u20138, 2012. Heidelberg: Springer."},{"issue":"3","key":"9339_CR3","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s10676-006-0005-3","volume":"7","author":"P Brey","year":"2005","unstructured":"Brey, P. (2005a). Freedom and privacy in ambient intelligence. Ethics and Information Technology, 7(3), 157\u2013166. doi: 10.1007\/s10676-006-0005-3 .","journal-title":"Ethics and Information Technology"},{"issue":"4","key":"9339_CR4","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10676-006-0015-1","volume":"7","author":"P Brey","year":"2005","unstructured":"Brey, P. (2005b). Editorial introduction\u2014surveillance and privacy. Ethics and Information Technology, 7(4), 183\u2013184. doi: 10.1007\/s10676-006-0015-1 .","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9339_CR5","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s00146-009-0255-9","volume":"25","author":"R Capurro","year":"2010","unstructured":"Capurro, R. (2010). Digital hermeneutics: an outline. AI and Society, 25(1), 35\u201342. doi: 10.1007\/s00146-009-0255-9 .","journal-title":"AI and Society"},{"key":"9339_CR6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511625008","volume-title":"Ulysses unbound","author":"J Elster","year":"2000","unstructured":"Elster, J. (2000). Ulysses unbound. Cambridge and New York: Cambridge University Press."},{"key":"9339_CR7","volume-title":"Persuasive technology","author":"BJ Fogg","year":"2003","unstructured":"Fogg, B. J. (2003). Persuasive technology. Amsterdam and Boston: Morgan Kaufmann."},{"key":"9339_CR8","first-page":"1","volume-title":"Internet and surveillance: The challenges of web 2.0 and social media","author":"C Fuchs","year":"2012","unstructured":"Fuchs, C., Boersma, K., Albrechtslund, A., & Sandoval, M. (2012). Introduction. In C. Fuchs, K. Boersma, A. Albrechtslund, & M. Sandoval (Eds.), Internet and surveillance: The challenges of web 2.0 and social media (pp. 1\u201328). London: Routledge."},{"issue":"3","key":"9339_CR9","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1086\/586910","volume":"35","author":"NJ Goldstein","year":"2008","unstructured":"Goldstein, N. J., Cialdini, R. B., & Griskevicius, V. (2008). A room with a viewpoint: Using social norms to motivate environmental conservation in hotels. Journal of Consumer Research, 35(3), 472\u2013482.","journal-title":"Journal of Consumer Research"},{"key":"9339_CR10","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-540-77006-0_15","volume-title":"Persuasive technology","author":"JL Jespersen","year":"2007","unstructured":"Jespersen, J. L., Albrechtslund, A., \u00d8hrstr\u00f8m, P., Hasle, P., & Albretsen, J. (2007). Surveillance, persuasion, and panopticon. In Y. Kort, W. IJsselsteijn, C. Midden, B. Eggen, & B. J. Fogg (Eds.), Persuasive technology (pp. 109\u2013120). Heidelberg: Springer."},{"key":"9339_CR11","first-page":"182","volume-title":"The social norm approach to preventing school and college age substance abuse","author":"JW Linkenbach","year":"2003","unstructured":"Linkenbach, J. W. (2003). The Montana model: Development and overview of a seven-step process of implementing macro-level social norms campaigns. In H. W. Perkins (Ed.), The social norm approach to preventing school and college age substance abuse (pp. 182\u2013208). New York: Jossey-Bass."},{"key":"9339_CR12","first-page":"224","volume-title":"The social norm approach to preventing school and college age substance abuse","author":"JW Linkenbach","year":"2003","unstructured":"Linkenbach, J. W., & Perkins, H. W. (2003). Most of us tobacco free: An eight-month social norms campaign reducing youth initiation of smoking in Montana. In H. W. Perkins (Ed.), The social norm approach to preventing school and college age substance abuse (pp. 224\u2013234). New York: Jossey-Bass."},{"key":"9339_CR13","volume-title":"Behavior control","author":"P London","year":"1969","unstructured":"London, P. (1969). Behavior control. New York: Harper and Row."},{"key":"9339_CR14","volume-title":"Surveillance society: Monitoring everyday life","author":"D Lyon","year":"2001","unstructured":"Lyon, D. (2001). Surveillance society: Monitoring everyday life. Milton Keynes: Open University Press."},{"key":"9339_CR15","first-page":"37","volume-title":"Surveillance and security: Technological politics and power in everyday life","author":"GT Marx","year":"2006","unstructured":"Marx, G. T. (2006). Soft surveillance: The growth of mandatory volunteerism in collecting personal information\u2014Hey buddy can you spare a DNA? In T. Monahan (Ed.), Surveillance and security: Technological politics and power in everyday life (pp. 37\u201357). New York and Oxon: Routledge."},{"key":"9339_CR16","first-page":"26","volume":"2013","author":"S Mullainathan","year":"2012","unstructured":"Mullainathan, S., & Datta, S. (2012). Angel technologies: Behavioural economics has found new ways to Nudge us. Wired (UK Edition). Special Issue The Wired World in, 2013, 26\u201327.","journal-title":"Special Issue The Wired World in"},{"key":"9339_CR17","first-page":"49","volume":"1","author":"M Nagenborg","year":"2010","unstructured":"Nagenborg, M. (2010). \u00dcberwachen und \u00dcberreden [=Surveillance and Persuasion]. Zeitschrift f\u00fcr Kommunikations\u00f6kologie und Medienethik, Issue, 1, 49\u201353. [in German].","journal-title":"Zeitschrift f\u00fcr Kommunikations\u00f6kologie und Medienethik, Issue"},{"key":"9339_CR19","unstructured":"National Institute on Alcohol Abuse and Alcoholism (NIAAA) (2009). What\u2019s your pattern? http:\/\/rethinkingdrinking.niaaa.nih.gov\/IsYourDrinkingPatternRisky\/WhatsYourPattern.asp . Accessed October 31, 2011."},{"key":"9339_CR20","unstructured":"Rapp, C. (2010). Aristotle\u2019s Rhetoric. In E. N. Zalta (Ed.), The stanford encyclopedia of philosophy (Spring 2010 Edition), http:\/\/plato.stanford.edu\/archives\/spr2010\/entries\/aristotle-rhetoric\/ . Accessed October 31, 2011."},{"key":"9339_CR21","volume-title":"Praxis und Logos bei Aristoteles","author":"F Rese","year":"2002","unstructured":"Rese, F. (2002). Praxis und Logos bei Aristoteles. T\u00fcbingen: Mohr Siebeck. [in German]."},{"issue":"2007","key":"9339_CR22","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1111\/j.1467-9280.2007.01917.x","volume":"18","author":"PW Schultz","year":"2007","unstructured":"Schultz, P. W., Nolan, J. M., Cialdini, R. B., Goldstein, N. J., & Griskevicius, V. (2007). The constructive, destructive, and reconstructive power of social norms. Psychological Science, 18(2007), 429\u2013434.","journal-title":"Psychological Science"},{"key":"9339_CR23","volume-title":"Psychotechnology: Electronic control of mind and behavior","year":"1972","unstructured":"Schwitzgebel, R. L., & Schwitzgebel, R. K. (Eds.). (1972). Psychotechnology: Electronic control of mind and behavior. Holt: Rinehart and Winston."},{"issue":"2012","key":"9339_CR24","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1007\/s11948-011-9278-y","volume":"19","author":"A Spahn","year":"2012","unstructured":"Spahn, A. (2012). And lead us (not) into persuasion\u2026? Persuasive technology and the ethics of communication. Science and Engineering Ethics, 19(2012), 633\u2013650.","journal-title":"Science and Engineering Ethics"},{"key":"9339_CR25","volume-title":"Nudge! improving decisions about health, wealth and happiness","author":"RH Thaler","year":"2008","unstructured":"Thaler, R. H., & Sunstein, C. R. (2008). Nudge! improving decisions about health, wealth and happiness. London: Penguin."},{"key":"9339_CR26","doi-asserted-by":"crossref","DOI":"10.5325\/j.ctv14gp4w7","volume-title":"What things do","author":"P-P Verbeek","year":"2005","unstructured":"Verbeek, P.-P. (2005). What things do. University Park, Pa: Pennsylvania State University Press."},{"issue":"3","key":"9339_CR27","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11569-009-0077-8","volume":"3","author":"P-P Verbeek","year":"2009","unstructured":"Verbeek, P.-P. (2009). Ambient intelligence and persuasive technology: The blurring boundaries between human and technology. NanoEthics, 3(3), 231\u2013242. doi: 10.1007\/s11569-009-0077-8 .","journal-title":"NanoEthics"},{"key":"9339_CR28","doi-asserted-by":"crossref","DOI":"10.7208\/chicago\/9780226852904.001.0001","volume-title":"Moralizing technologies: Understanding and designing the morality of things","author":"P-P Verbeek","year":"2011","unstructured":"Verbeek, P.-P. (2011). Moralizing technologies: Understanding and designing the morality of things. Chicago and London: University of Chicago Press."},{"key":"9339_CR29","volume-title":"Freiheit\u2014Analyse und Bewertung [=Freedom\u2014Analysis and Evaluation]","author":"J-C Wolf","year":"1995","unstructured":"Wolf, J.-C. (1995). Freiheit\u2014Analyse und Bewertung [=Freedom\u2014Analysis and Evaluation]. Wien: Passagen Verlag. [in German]."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-014-9339-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-014-9339-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-014-9339-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,16]],"date-time":"2020-08-16T05:05:21Z","timestamp":1597554321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-014-9339-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["9339"],"URL":"https:\/\/doi.org\/10.1007\/s10676-014-9339-4","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3]]}}}