{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T09:46:18Z","timestamp":1775382378985,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2014,3,23]],"date-time":"2014-03-23T00:00:00Z","timestamp":1395532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"DOI":"10.1007\/s10676-014-9343-8","type":"journal-article","created":{"date-parts":[[2014,3,22]],"date-time":"2014-03-22T14:48:44Z","timestamp":1395499724000},"source":"Crossref","is-referenced-by-count":53,"title":["The crisis of consent: how stronger legal protection may lead to weaker consent in data protection"],"prefix":"10.1007","author":[{"given":"Bart W.","family":"Schermer","sequence":"first","affiliation":[]},{"given":"Bart","family":"Custers","sequence":"additional","affiliation":[]},{"given":"Simone","family":"van der Hof","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,23]]},"reference":[{"key":"9343_CR1","doi-asserted-by":"crossref","unstructured":"Acquisti, A. (2009), Nudging privacy: The behavioral economics of personal information. Security & Privacy Economics. November\/December 2009.","DOI":"10.1109\/MSP.2009.163"},{"key":"9343_CR2","doi-asserted-by":"crossref","unstructured":"Acquisti, A., Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy. January\u2013February, 24\u201330.","DOI":"10.1109\/MSP.2005.22"},{"key":"9343_CR3","doi-asserted-by":"crossref","unstructured":"Adjerid, I., Acquisti, Brandimarte, L. & Loewenstein, G. (2013). Sleights of privacy: Framing, disclosures, and the limits of transparency. SOUPS \u201813 Proceedings of the ninth symposium on usable privacy and security, Article No. 9.","DOI":"10.1145\/2501604.2501613"},{"key":"9343_CR4","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, R. & K\u00f6psell, S. (2010), Trained to accept?: A field experiment on consent dialogs. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2403\u20132406.","DOI":"10.1145\/1753326.1753689"},{"key":"9343_CR5","unstructured":"Brockdorff, N. & Appleby-Arnold, S. (2013). What consumers think, EU CONSENT Project, Workpackages 7 & 8."},{"key":"9343_CR6","unstructured":"Calo, M. R. (2012), Against notice skepticism in privacy (and Elsewhere), 87 Notre Dame Law Review 1027."},{"key":"9343_CR7","unstructured":"Calo, M. R. (2013), Digital market manipulation, University of Washington School of Law Research Paper No. 2013-27; 2013-08-15."},{"key":"9343_CR8","first-page":"87","volume-title":"Ethics and the internet","author":"BHM Custers","year":"2001","unstructured":"Custers, B. H. M. (2001). Data mining and group profiling on the internet. In Anton. Vedder (Ed.), Ethics and the internet (pp. 87\u2013104). Antwerpen: Intersentia."},{"key":"9343_CR9","unstructured":"Custers, B. H. M. (2012). Predicting data that people refuse to disclose; how data mining predictions challenge informational self-determination, Privacy Observatory Magazine, Issue 3."},{"issue":"4","key":"9343_CR10","first-page":"435","volume":"10","author":"B Custers","year":"2013","unstructured":"Custers, B., Van der Hof, S., Schermer, B., Appleby-Arnold, S., & Brockdorff, N. (2013). Informed consent in social media use. The gap between user expectations and EU personal data protection law. Journal of Law and Technology, 10(4), 435\u2013457.","journal-title":"Journal of Law and Technology"},{"key":"9343_CR11","volume-title":"A history and theory of informed consent","author":"R Faden","year":"1986","unstructured":"Faden, R., & Beauchamp, T. L. (1986). A history and theory of informed consent. New York: Oxford University Press."},{"key":"9343_CR12","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1017\/S1352325200000434","volume":"2","author":"HM Hurd","year":"1996","unstructured":"Hurd, H. M. (1996). The moral magic of consent. Legal Theory, 2, 121.","journal-title":"Legal Theory"},{"key":"9343_CR13","unstructured":"Internet Society. (2012). Global internet user survey, summary report. http:\/\/www.internetsociety.org\/sites\/default\/files\/rep-GIUS2012global-201211-en.pdf . Accessed February 14, 2014."},{"issue":"1","key":"9343_CR14","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1086\/500096","volume":"35","author":"C Jolls","year":"2006","unstructured":"Jolls, C., & Sunstein, C. (2006). Debiasing through law. The Journal for Legal Studies, 35(1), 199.","journal-title":"The Journal for Legal Studies"},{"key":"9343_CR15","unstructured":"Kleinig, J. (2010). The nature of consent. In The ethics of consent: Theory and practice (Miller & Wertheim, ed.), New York: Oxford University Press."},{"key":"9343_CR16","doi-asserted-by":"crossref","unstructured":"Kosinski, M., Stillwell, D. & Graepel T. (2013), Private traits and attributes are predictable from digital records of human behavior. PNAS Early Edition.","DOI":"10.1073\/pnas.1218772110"},{"key":"9343_CR17","unstructured":"McDonald, A. M. & Cranor, L. F. (2010). The cost of reading privacy policies."},{"issue":"2013","key":"9343_CR18","doi-asserted-by":"crossref","first-page":"331","DOI":"10.5325\/jinfopoli.3.2013.0331","volume":"3","author":"M McDonald","year":"2013","unstructured":"McDonald, M., & Lowenthal, T. (2013). Nano-notice: Privacy disclosure at a mobile scale. Journal of Information Policy, 3(2013), 331\u2013354.","journal-title":"Journal of Information Policy"},{"key":"9343_CR19","unstructured":"Miller, F. G. & Wertheim, A. (2010). Preface to a theory of consent: beyond valid consent. In The ethics of consent: Theory and practice (Miller & Wertheim, ed.), New York: Oxford University Press."},{"issue":"3","key":"9343_CR20","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1353\/ken.2011.0013","volume":"21","author":"FG Miller","year":"2011","unstructured":"Miller, F. G., & Wertheim, A. (2011). The fair transaction model of informed consent: An alternative to autonomous authorization. Kennedy Institute of Ethics Journal, 21(3), 201.","journal-title":"Kennedy Institute of Ethics Journal"},{"issue":"4","key":"9343_CR21","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1162\/DAED_a_00113","volume":"140","author":"H Nissenbaum","year":"2011","unstructured":"Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 32\u201348.","journal-title":"Daedalus"},{"issue":"9","key":"9343_CR22","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1145\/1284621.1284627","volume":"50","author":"I Pollach","year":"2007","unstructured":"Pollach, I. (2007). What\u2019s wrong with online privacy policies? Communications of the ACM, 50(9), 103\u2013108.","journal-title":"Communications of the ACM"},{"key":"9343_CR23","doi-asserted-by":"crossref","DOI":"10.4159\/9780674042582","volume-title":"A theory of justice (revised edition)","author":"J Rawls","year":"1999","unstructured":"Rawls, J. (1999). A theory of justice (revised edition). Oxford: Oxford University Press."},{"key":"9343_CR25","volume-title":"Nothing to hide; The false tradeoff between privacy and security","author":"DJ Solove","year":"2011","unstructured":"Solove, D. J. (2011). Nothing to hide; The false tradeoff between privacy and security. New Haven: Yale University Press."},{"key":"9343_CR26","first-page":"1880","volume":"126","author":"DJ Solove","year":"2013","unstructured":"Solove, D. J. (2013). Privacy self-management and the consent dilemma. Harvard Law Review, 126, 1880\u20131903.","journal-title":"Harvard Law Review"},{"issue":"7","key":"9343_CR27","first-page":"2","volume":"17","author":"B Berg van den","year":"2012","unstructured":"van den Berg, B., & van der Hof, S. (2012). What happens to my data? A novel approach to informing users of data processing practices. First Monday, 17(7), 2.","journal-title":"First Monday"},{"key":"9343_CR29","volume-title":"Privacy and freedom","author":"AF Westin","year":"1967","unstructured":"Westin, A. F. (1967). Privacy and freedom. New York: Atheneum Press."},{"key":"9343_CR30","unstructured":"Zarsky, T.Z. (2003). Mine your own business. Yale Journal of Law & Technology,5(1), Article 1."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-014-9343-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-014-9343-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-014-9343-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T20:25:16Z","timestamp":1648671916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-014-9343-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,23]]},"references-count":28,"alternative-id":["9343"],"URL":"https:\/\/doi.org\/10.1007\/s10676-014-9343-8","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,23]]}}}