{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T22:53:28Z","timestamp":1722725608734},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,5,15]],"date-time":"2014-05-15T00:00:00Z","timestamp":1400112000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s10676-014-9346-5","type":"journal-article","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T07:25:17Z","timestamp":1400052317000},"page":"207-218","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Public anonymity and the connected world"],"prefix":"10.1007","volume":"16","author":[{"given":"Tony","family":"Doyle","sequence":"first","affiliation":[]},{"given":"Judy","family":"Veranas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,15]]},"reference":[{"key":"9346_CR1","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780195141375.001.0001","volume-title":"Unpopular privacy: What must we hide?","author":"A Allen","year":"2011","unstructured":"Allen, A. (2011). Unpopular privacy: What must we hide?. New York: Oxford University Press."},{"key":"9346_CR2","unstructured":"Barbaro, M., and Zeller Jr., T. (2006). A face is exposed for AOL searcher no. 4417749. New York Times, p. A1."},{"key":"9346_CR3","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1098\/rsbl.2006.0509","volume":"2","author":"M Bateson","year":"2006","unstructured":"Bateson, M., et al. (2006). Cues of being watched enhance cooperation in a real-world setting. Biology Letters, 2, 412\u2013414.","journal-title":"Biology Letters"},{"key":"9346_CR4","unstructured":"Bomarito, J. (2006). Scott, Sir Walter (1771\u20131832). Gothic literature: A Gale critical companion. In J. Bomarito (Ed.), Vol. 3: L-Z. Detroit: Gale, pp 289\u2013317."},{"issue":"5","key":"9346_CR5","first-page":"29","volume":"26","author":"C Chapman","year":"2002","unstructured":"Chapman, C., & Harris, A. (2002). A skeptical look at September 11. Skeptical Inquirer, 26(5), 29\u201334.","journal-title":"Skeptical Inquirer"},{"key":"9346_CR6","first-page":"981","volume":"28","author":"J Cohen","year":"1995","unstructured":"Cohen, J. (1995). Right to read anonymously: A closer look at copyright management in cyberspace. Connecticut Law Review, 28, 981\u20131058.","journal-title":"Connecticut Law Review"},{"key":"9346_CR7","unstructured":"Cohen, J. (2008). Privacy, visibility, transparency, and exposure. University of Chicago Law Review, 181-201."},{"key":"9346_CR9","unstructured":"de Montjoye, Y-A., et al. (2013). Unique in the crowd: The privacy bounds of human mobility. Nature: Scientific Reports. 31376. Retrieved from http:\/\/www.nature.com\/srep\/2013\/130325\/srep01376\/full\/srep01376.html . Accessed 2 April 2014."},{"key":"9346_CR54","doi-asserted-by":"crossref","unstructured":"The End of Privacy. (1999). Economist , 351(8117), 15\u201316.","DOI":"10.1016\/S0749-3797(99)00024-0"},{"key":"9346_CR10","unstructured":"Farmer, D. and C. Mann. (2003). Surveillance nation. MIT Technology Review (April), 36\u201343. http:\/\/www.technologyreview.com\/featuredstory\/401863\/surveillance - nation\/. Accessed 7 March 2013."},{"key":"9346_CR11","volume-title":"The moral limits of criminal law","author":"J Feinberg","year":"1984","unstructured":"Feinberg, J. (1984). The moral limits of criminal law. New York: Oxford University Press."},{"issue":"1","key":"9346_CR12","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1080\/0731129X.2002.9992113","volume":"21","author":"B Goold","year":"2002","unstructured":"Goold, B. (2002). Privacy rights and public spaces: CCTV and the problem of the \u201cunobservable observer\u201d. Criminal Justice Ethics, 21(1), 21\u201327.","journal-title":"Criminal Justice Ethics"},{"issue":"1","key":"9346_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/0731129X.2006.9992191","volume":"25","author":"B Goold","year":"2006","unstructured":"Goold, B. (2006). Open to all? Regulating open street CCTV and the case for \u201csymmetrical surveillance\u201d. Criminal Justice Ethics, 25(1), 3\u201317.","journal-title":"Criminal Justice Ethics"},{"issue":"1","key":"9346_CR14","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s11158-008-9045-3","volume":"14","author":"B Goold","year":"2008","unstructured":"Goold, B. (2008). The difference between lonely old ladies and CCTV cameras: A response to Ryberg. Res Publica, 14(1), 43\u201347.","journal-title":"Res Publica"},{"key":"9346_CR15","volume-title":"The internet of things: Key applications and protocols","author":"O Hersent","year":"2012","unstructured":"Hersent, O., et al. (2012). The internet of things: Key applications and protocols. New York: Wiley."},{"key":"9346_CR16","unstructured":"Legal Terms (2013). Facebook. Retrieved from http:\/\/www.facebook.com\/legal\/terms Accessed 2 April 2014."},{"issue":"4","key":"9346_CR17","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/s10676-013-9323-4","volume":"15","author":"K Mathiesen","year":"2013","unstructured":"Mathiesen, K. (2013). The Internet, children and privacy: The case against parental monitoring. Ethics and Information Technology, 15(4), 263\u2013274.","journal-title":"Ethics and Information Technology"},{"issue":"4","key":"9346_CR18","first-page":"351","volume":"47","author":"S Matthews","year":"2010","unstructured":"Matthews, S. (2010). Anonymity and the social self. American Philosophical Quarterly, 47(4), 351\u2013363.","journal-title":"American Philosophical Quarterly"},{"issue":"3","key":"9346_CR19","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/270858.270866","volume":"27","author":"J Moor","year":"1997","unstructured":"Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27\u201332.","journal-title":"Computers and Society"},{"key":"9346_CR20","unstructured":"National Vital Statistics Report (2003). 51(5). Retrieved from http:\/\/www.cdc.gov\/nchs\/data\/nvsr\/nvsr51\/nvsr51_05.pdf . Accessed 2 April 2014."},{"key":"9346_CR21","unstructured":"National Vital Statistics Report (2012). 61(6). Retrieved from www.cdc.gov\/nchs\/data\/nvsr\/nvsr61\/nvsr61_06.pdf . Accessed 2 April 2014."},{"issue":"3","key":"9346_CR22","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1207\/s15327019eb0703_3","volume":"7","author":"H Nissenbaum","year":"1997","unstructured":"Nissenbaum, H. (1997). Toward an approach to privacy in public: Challenges of information technology. Ethics and Behavior, 7(3), 207\u2013219.","journal-title":"Ethics and Behavior"},{"issue":"5\u20136","key":"9346_CR23","first-page":"559","volume":"17","author":"H Nissenbaum","year":"1998","unstructured":"Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17(5\u20136), 559\u2013596.","journal-title":"Law and Philosophy"},{"issue":"2","key":"9346_CR24","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1080\/019722499128592","volume":"15","author":"H Nissenbaum","year":"1999","unstructured":"Nissenbaum, H. (1999). The meaning of anonymity in an information age. The Information Society, 15(2), 141\u2013144.","journal-title":"The Information Society"},{"key":"9346_CR25","first-page":"119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 119\u2013157.","journal-title":"Washington Law Review"},{"key":"9346_CR26","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford Law."},{"key":"9346_CR27","first-page":"157","volume":"10","author":"C Norris","year":"1999","unstructured":"Norris, C., & Armstrong, G. (1999). CCTV and the social structuring of surveillance. Crime Prevention Studies, 10, 157\u2013178.","journal-title":"Crime Prevention Studies"},{"key":"9346_CR28","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1023\/A:1010057606781","volume":"2","author":"J Patton","year":"2000","unstructured":"Patton, J. (2000). Protecting privacy in public? Surveillance technologies and the value of public places. Ethics and Information Technology, 2, 181\u2013187.","journal-title":"Ethics and Information Technology"},{"key":"9346_CR29","unstructured":"Posner, R. (1984). An economic theory of privacy. In F. Schoeman (Ed.), Philosophical dimensions of privacy (pp. 333\u2013345). Cambridge: Cambridge University Press. (originally published in 1978)."},{"key":"9346_CR30","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195304275.001.0001","volume-title":"Not a suicide pact: The constitution in a time of national emergency","author":"R Posner","year":"2006","unstructured":"Posner, R. (2006). Not a suicide pact: The constitution in a time of national emergency. New York: Oxford University Press."},{"key":"9346_CR55","unstructured":"Posner, R. (2008). Privacy, surveillance, and law. University of Chicago Law Review, 245\u2013260."},{"key":"9346_CR31","volume-title":"Building a bridge to the 21st century","author":"N Postman","year":"1999","unstructured":"Postman, N. (1999). Building a bridge to the 21st century. New York: Vintage."},{"key":"9346_CR32","volume-title":"Legislating privacy: Technology, social values, and public policy","author":"P Regan","year":"1995","unstructured":"Regan, P. (1995). Legislating privacy: Technology, social values, and public policy. Chapel Hill: University of North Carolina Press."},{"key":"9346_CR33","first-page":"194","volume-title":"Privacies: Philosophical evaluations","author":"J Reiman","year":"2004","unstructured":"Reiman, J. (2004). Driving to the panopticon: A philosophical exploration of the risks to privacy posed by the information technology of the future. In B. R\u00f6ssler (Ed.), Privacies: Philosophical evaluations (pp. 194\u2013241). Stanford: Stanford University Press."},{"key":"9346_CR35","first-page":"1934","volume":"126","author":"N Richards","year":"2013","unstructured":"Richards, N. (2013). The dangers of surveillance. Harvard Law Review, 126, 1934\u20131962.","journal-title":"Harvard Law Review"},{"key":"9346_CR36","volume-title":"Privacy in peril","author":"J Rule","year":"2007","unstructured":"Rule, J. (2007). Privacy in peril. New York: Oxford University Press."},{"key":"9346_CR37","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s11158-007-9035-x","volume":"13","author":"J Ryberg","year":"2007","unstructured":"Ryberg, J. (2007). Privacy rights, crime prevention, CCTV, and the life of Mrs. Aremac. Res Publica, 13, 127\u2013143.","journal-title":"Res Publica"},{"key":"9346_CR38","volume-title":"Beyond fear: Thinking sensibly about security in an uncertain world","author":"B Schneier","year":"2003","unstructured":"Schneier, B. (2003). Beyond fear: Thinking sensibly about security in an uncertain world. New York: Copernicus Books."},{"key":"9346_CR39","first-page":"10","volume":"427","author":"B Schneier","year":"2009","unstructured":"Schneier, B. (2009). Beyond security theatre. New Internationalist, 427, 10\u201312.","journal-title":"New Internationalist"},{"key":"9346_CR40","volume-title":"Liars and outliers: enabling the trust that society needs to thrive","author":"B Schneier","year":"2012","unstructured":"Schneier, B. (2012). Liars and outliers: enabling the trust that society needs to thrive. Indianapolis: John Wiley and Sons."},{"key":"9346_CR41","unstructured":"Smithson, M. (2003). Private lives, public spaces: The surveillance state. Dissent (Winter), 43\u201349."},{"key":"9346_CR42","volume-title":"The digital person","author":"D Solove","year":"2004","unstructured":"Solove, D. (2004). The digital person. Cambridge, MA: Harvard University Press."},{"key":"9346_CR43","volume-title":"The future of reputation: Gossip, rumor, and privacy on the internet","author":"D Solove","year":"2007","unstructured":"Solove, D. (2007). The future of reputation: Gossip, rumor, and privacy on the internet. New Haven: Yale University Press."},{"key":"9346_CR44","volume-title":"Nothing to hide","author":"D Solove","year":"2011","unstructured":"Solove, D. (2011). Nothing to hide. New Haven: Yale University Press."},{"key":"9346_CR45","unstructured":"State of Massachussetts. Department of Revenue. (2012). \u201cCommuter deduction worksheet example\u201d. Guide to Personal Income Tax: Forms, Schedules, and Worksheets. Massachusetts Department of Revenue. Retrieved from http:\/\/www.mass.gov\/dor\/individuals\/filing-and-payment-information\/guide-to-personal-income-tax\/forms-schedules-and-worksheets\/worksheet-examples\/commuter-deduction-worksheet-example.html . Accessed 2 April 2014."},{"key":"9346_CR46","first-page":"614","volume":"70","author":"K Strandburg","year":"2010","unstructured":"Strandburg, K. (2010). Home, home on the web and other fourth amendment implications of technosocial change. Maryland Law Review, 70, 614\u2013680.","journal-title":"Maryland Law Review"},{"key":"9346_CR56","unstructured":"Talbot, D. (2012). A phone that knows where you\u2019re going. MIT Technology Review. Retrieved from http:\/\/www.technologyreview.com\/news\/428441\/a-phone-that-knows-where-youre-going .\u00a0 Accessed 2 April 2014."},{"issue":"4","key":"9346_CR47","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1111\/j.2041-6962.2002.tb01918.x","volume":"40","author":"J Taylor","year":"2002","unstructured":"Taylor, J. (2002). Privacy and autonomy: A reappraisal. Southern Journal of Philosophy, 40(4), 587\u2013604.","journal-title":"Southern Journal of Philosophy"},{"key":"9346_CR49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-19157-2_1","volume-title":"Architecting the internet of things","author":"D Uckelman","year":"2011","unstructured":"Uckelman, D., et al. (2011). An architectural approach towards the future internet of things. In D. Uckelman, et al. (Eds.), Architecting the internet of things (pp. 1\u201324). New York: Springer."},{"key":"9346_CR50","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1023\/A:1010066509278","volume":"1","author":"K Wallace","year":"1999","unstructured":"Wallace, K. (1999). Anonymity. Ethics and Information Technology, 1, 23\u201335.","journal-title":"Ethics and Information Technology"},{"key":"9346_CR51","volume-title":"The handbook or information and computer ethics","author":"K Wallace","year":"2008","unstructured":"Wallace, K. (2008). Online anonymity. In K. Himma & H. Tavani (Eds.), The handbook or information and computer ethics. New York: Wiley."},{"key":"9346_CR52","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s10676-006-0016-0","volume":"7","author":"M Zimmer","year":"2005","unstructured":"Zimmer, M. (2005). Surveillance, privacy and the ethics of vehicle safety communication technology. Ethics and Information Technology, 7, 201\u2013210.","journal-title":"Ethics and Information Technology"},{"key":"9346_CR53","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/s10676-010-9227-5","volume":"12","author":"M Zimmer","year":"2010","unstructured":"Zimmer, M. (2010). \u201cBut the data is already public\u201d: On the ethics of research in Facebook. Ethics and Information Technology, 12, 313\u2013325.","journal-title":"Ethics and Information Technology"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-014-9346-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-014-9346-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-014-9346-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T17:16:22Z","timestamp":1716743782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-014-9346-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,15]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["9346"],"URL":"https:\/\/doi.org\/10.1007\/s10676-014-9346-5","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,15]]}}}