{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T12:23:22Z","timestamp":1777119802971,"version":"3.51.4"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,10,4]],"date-time":"2014-10-04T00:00:00Z","timestamp":1412380800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s10676-014-9351-8","type":"journal-article","created":{"date-parts":[[2014,10,3]],"date-time":"2014-10-03T12:26:35Z","timestamp":1412339195000},"page":"263-274","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":111,"title":["From open data to information justice"],"prefix":"10.1007","volume":"16","author":[{"given":"Jeffrey Alan","family":"Johnson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,4]]},"reference":[{"issue":"2","key":"9351_CR1","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1080\/1369118X.2012.701657","volume":"16","author":"S Adams","year":"2013","unstructured":"Adams, S. (2013). Post-panoptic surveillance through healthcare rating sites. Information, Communication & Society, 16(2), 215\u2013235.","journal-title":"Information, Communication & Society"},{"key":"9351_CR2","unstructured":"Archer, P. (2012). Report on using open data: Policy modeling, citizen empowerment, data journalism. Brussels, Belgium: W3C. http:\/\/www.w3.org\/2012\/06\/pmod\/report . March 3, 2013."},{"key":"9351_CR3","doi-asserted-by":"crossref","unstructured":"Baepler, P., & Murdoch, C. J. (2010). Academic analytics and data mining in higher education. International Journal for the Scholarship of Teaching and Learning 4(2). http:\/\/academics.georgiasouthern.edu\/ijsotl\/v4n2\/essays_about_sotl\/PDFs\/_BaeplerMurdoch.pdf","DOI":"10.20429\/ijsotl.2010.040217"},{"key":"9351_CR4","unstructured":"Britz, J., Hoffmann, A., Ponelis, S., Zimmer, M., & Lor, P. (2012). On considering the application of Amartya Sen\u2019s capability approach to an information-based rights framework. Information Development. http:\/\/idv.sagepub.com\/cgi\/doi\/10.1177\/0266666912454025 . March 13, 2013."},{"key":"9351_CR5","unstructured":"Charles, N. (2013). Big data madness and my football prediction model. Wallpapering Fog. http:\/\/www.wallpaperingfog.co.uk\/2013\/03\/big-data-madness-and-my-football.html . March 25, 2013."},{"issue":"2","key":"9351_CR6","doi-asserted-by":"crossref","first-page":"700","DOI":"10.1162\/REST_a_00052","volume":"93","author":"Ethan Cohen-Cole","year":"2011","unstructured":"Cohen-Cole, Ethan. (2011). Credit card redlining. Review of Economics and Statistics, 93(2), 700\u2013713.","journal-title":"Review of Economics and Statistics"},{"key":"9351_CR7","doi-asserted-by":"crossref","DOI":"10.1515\/9781400845293","volume-title":"Coding freedom: The ethics and aesthetics of hacking","author":"E Gabriella Coleman","year":"2013","unstructured":"Coleman, E. Gabriella. (2013). Coding freedom: The ethics and aesthetics of hacking. Princeton: Princeton University Press."},{"key":"9351_CR8","unstructured":"Craig, T., & Ludloff, M. E. (2011). Privacy and big data. Sebastopol, CA: O\u2019Reilly. http:\/\/proquest.safaribooksonline.com\/9781449314842"},{"key":"9351_CR9","unstructured":"Croll, A. (2012). Big data is our generation\u2019s civil rights issue, and we don\u2019t know it. O\u2019Reilly Radar. http:\/\/radar.oreilly.com\/2012\/08\/big-data-is-our-generations-civil-rights-issue-and-we-dont-know-it.html . March 12, 2013."},{"key":"9351_CR10","unstructured":"Donovan, K. (2012). Seeing like a slum: Towards open, deliberative development. SSRN scholarly paper, Social Science Research Network, Rochester, NY. http:\/\/papers.ssrn.com\/abstract=2045556 . March 5, 2013."},{"key":"9351_CR11","volume-title":"Discipline and punish: The birth of the prison","author":"Michel Foucault","year":"1995","unstructured":"Foucault, Michel. (1995). Discipline and punish: The birth of the prison (Second Vintage ed.). New York: Vintage Books.","edition":"Second Vintage"},{"key":"9351_CR12","unstructured":"Global Voices Advocacy. (2012). Home. Online censorship alpha. https:\/\/onlinecensorship.org\/ . March 7, 2013."},{"key":"9351_CR13","unstructured":"Goldrick-Rab, S. (2013). What have we done to the talented poor? The Education Optimists. http:\/\/eduoptimists.blogspot.com\/2013\/03\/what-have-we-done-to-talented-poor.html . March 21, 2013."},{"key":"9351_CR14","volume-title":"What is community informatics (and why does it matter?)","author":"M Gurstein","year":"2007","unstructured":"Gurstein, M. (2007). What is community informatics (and why does it matter?). Milan: Polimetrica."},{"key":"9351_CR15","unstructured":"Gurstein, M. (2011). Open data: Empowering the empowered or effective data use for everyone? First Monday 16(2). http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/3316\/2764 . March 5, 2013."},{"key":"9351_CR16","unstructured":"Hoxby, C. M., & Avery, C. (2012). The missing \u201cone-offs\u201d: The hidden supply of high-achieving, low income students. Working paper, National Bureau of Economic Research. http:\/\/www.nber.org\/papers\/w18586 . March 21, 2013."},{"key":"9351_CR17","doi-asserted-by":"crossref","unstructured":"Johnson, J. A. (2006). Technology and pragmatism: From value neutrality to value criticality. Paper presented at the Western Political Science Association, Albuquerque, New Mexico. http:\/\/johnsonanalytical.com\/technology\/Value_Critical_Technology.pdf","DOI":"10.2139\/ssrn.2154654"},{"issue":"4","key":"9351_CR18","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1300\/J399v03n04_05","volume":"3","author":"JA Johnson","year":"2007","unstructured":"Johnson, J. A. (2007). The illiberal culture of e-democracy. Journal of E-Government, 3(4), 85\u2013112.","journal-title":"Journal of E-Government"},{"issue":"Online","key":"9351_CR19","first-page":"13","volume":"2","author":"M Kaminski","year":"2012","unstructured":"Kaminski, M. (2012). Reading over your shoulder: Social readers and privacy law. Wake Forest Law Review, 2(Online), 13\u201320.","journal-title":"Wake Forest Law Review"},{"key":"9351_CR20","first-page":"17","volume-title":"Educational measurement","author":"MT Kane","year":"2006","unstructured":"Kane, M. T. (2006). Validation. In R. L. Brennan (Ed.), Educational measurement (pp. 17\u201364). Westport, CT: American Council on Education\/Praeger."},{"key":"9351_CR21","first-page":"438","volume-title":"A companion to contemporary political philosophy","author":"S Kolm","year":"1995","unstructured":"Kolm, S. (1995). Distributive justice. In R. E. Goodin & P. Pettit (Eds.), A companion to contemporary political philosophy (pp. 438\u2013461). Cambridge, MA: Blackwell."},{"issue":"21","key":"9351_CR22","first-page":"14","volume":"80","author":"Michael Learmonth","year":"2009","unstructured":"Learmonth, Michael. (2009). Next-gen creatives focus on Web\u2019s data detritus. Advertising Age, 80(21), 14.","journal-title":"Advertising Age"},{"key":"9351_CR23","volume-title":"Consent of the networked: The world-wide struggle for Internet freedom","author":"Rebecca MacKinnon","year":"2012","unstructured":"MacKinnon, Rebecca. (2012). Consent of the networked: The world-wide struggle for Internet freedom. New York: Basic Books."},{"key":"9351_CR24","unstructured":"Matias, J. N. (2014). Uncovering algorithms: Looking inside the Facebook news feed. MIT Center for Civic Media. http:\/\/civic.mit.edu\/blog\/natematias\/uncovering-algorithms-looking-inside-the-facebook-news-feed . July 22, 2014."},{"key":"9351_CR25","unstructured":"Morozov, E. (2012). You can\u2019t say that on the Internet. The New York Times. http:\/\/www.nytimes.com\/2012\/11\/18\/opinion\/sunday\/you-cant-say-that-on-the-internet.html . March 14, 2013."},{"key":"9351_CR26","volume-title":"To save everything, click here: The folly of technological solutionism","author":"E Morozov","year":"2013","unstructured":"Morozov, E. (2013). To save everything, click here: The folly of technological solutionism (1st ed.). New York: PublicAffairs.","edition":"1"},{"key":"9351_CR27","unstructured":"Nahdet ElMahrousa. (2013). Harass Map. http:\/\/harassmap.org\/en\/ . March 27, 2013."},{"key":"9351_CR28","unstructured":"National Center for Education Statistics. (2013). The integrated postsecondary education data system. https:\/\/nces.ed.gov\/ipeds\/ . March 25, 2013."},{"key":"9351_CR29","unstructured":"National Science Foundation. (2012). The national science foundation open government plan 2.0. http:\/\/www.nsf.gov\/pubs\/2012\/nsf12066\/nsf12066.pdf . March 12, 2013."},{"key":"9351_CR30","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford Law Books."},{"key":"9351_CR31","unstructured":"Open Government Working Group. (2010). 8 principles of open government data. OpenGovData.org. http:\/\/www.opengovdata.org\/home\/8principles . March 25, 2013."},{"key":"9351_CR32","unstructured":"Orszag, P. R. (2009). Open government directive. Office of Management and Budget. http:\/\/www.whitehouse.gov\/open\/documents\/open-government-directive . March 25, 2013."},{"key":"9351_CR33","unstructured":"Parry, M. (2012). College degrees, designed by the numbers. https:\/\/chronicle.com\/article\/College-Degrees-Designed-by\/132945\/"},{"issue":"1","key":"9351_CR34","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1146\/annurev.polisci.031108.095600","volume":"13","author":"K Prewitt","year":"2010","unstructured":"Prewitt, K. (2010). The U.S. decennial census: Politics and political science. Annual Review of Political Science, 13(1), 237\u2013254.","journal-title":"Annual Review of Political Science"},{"key":"9351_CR35","unstructured":"Raman, B. (2012). The rhetoric of transparency and its reality: Transparent territories, opaque power and empowerment. The Journal of Community Informatics 8(2). http:\/\/ci-journal.net\/index.php\/ciej\/article\/view\/866\/909 . March 5, 2013."},{"key":"9351_CR36","volume-title":"Political liberalism","author":"J Rawls","year":"2005","unstructured":"Rawls, J. (2005). Political liberalism (Expanded ed.). New York: Columbia University Press.","edition":"Expanded"},{"key":"9351_CR37","unstructured":"Rich, S. (2012). Palo Alto, Calif., to launch open data initiative. Government Technology. http:\/\/www.govtech.com\/policy-management\/Palo-Alto-Calif-Open-Data-Initiative.html . March 12, 2013."},{"key":"9351_CR38","unstructured":"Saitta, E. (2012). Not only must data sovereignty trump open data, but we need active pro-social countermeasures\u2014a data justice movement. http:\/\/bit.ly\/MUYkQi . @Dymaxion. https:\/\/twitter.com\/Dymaxion\/status\/218062501999427586 . March 25, 2013."},{"key":"9351_CR39","unstructured":"Schechner, S., & Fleisher, L. (2014). EU Invites Google, Microsoft to Discuss \u2018Right to Be Forgotten\u2019. The Wall Street Journal. http:\/\/online.wsj.com\/articles\/eu-regulators-invite-google-microsoft-to-discuss-right-to-be-forgotten-1405592730 . July 17, 2014."},{"key":"9351_CR40","unstructured":"Scherer, M. (2012). Obama wins: How Chicago\u2019s data-driven campaign triumphed. Time Swampland. http:\/\/swampland.time.com\/2012\/11\/07\/inside-the-secret-world-of-quants-and-data-crunchers-who-helped-obama-win\/print\/ . March 13, 2013."},{"key":"9351_CR41","unstructured":"Sch\u00f6nberger, V, & Cukier, K. (2013). Big data excerpt: How mike flowers revolutionized New York\u2019s building inspections. Slate Magazine. http:\/\/www.slate.com\/articles\/technology\/future_tense\/2013\/03\/big_data_excerpt_how_mike_flowers_revolutionized_new_york_s_building_inspections.single.html . March 8, 2013."},{"key":"9351_CR42","volume-title":"Seeing like a state: How certain schemes to improve the human condition have failed","author":"JC Scott","year":"1998","unstructured":"Scott, J. C. (1998). Seeing like a state: How certain schemes to improve the human condition have failed. New Haven: Yale University Press."},{"key":"9351_CR43","unstructured":"Shilton, K. (2009). Four billion little brothers? Privacy, mobile phones, and ubiquitous data collection. 7(7). http:\/\/escholarship.org\/uc\/item\/2xr2r802 . March 19, 2013."},{"key":"9351_CR44","volume-title":"The faces of injustice","author":"JN Shklar","year":"1990","unstructured":"Shklar, J. N. (1990). The faces of injustice. New Haven: Yale University Press."},{"key":"9351_CR45","unstructured":"Slee, T. (2012). Seeing like a geek. Crooked Timber. http:\/\/crookedtimber.org\/2012\/06\/25\/seeing-like-a-geek\/ . March 5, 2013."},{"key":"9351_CR46","unstructured":"Stearns, J. (2012). We need a \u2018Truth\u2019 campaign for digital literacy and data tracking. MediaShift. http:\/\/www.pbs.org\/mediashift\/2012\/11\/we-need-a-truth-campaign-for-digital-literacy-and-data-tracking318.html . March 14, 2013."},{"key":"9351_CR47","unstructured":"Swartz, A. (2009). Transparency is bunk. Aaron Swartz\u2019s Raw Thought. http:\/\/www.aaronsw.com\/weblog\/transparencybunk . March 3, 2013."},{"key":"9351_CR48","unstructured":"Swartz, A. (2012). A database of folly. Crooked Timber. http:\/\/crookedtimber.org\/2012\/07\/03\/a-database-of-folly\/ . March 3, 2013."},{"key":"9351_CR49","unstructured":"Walls, S., & Johnson, J. A. (2011). From beginning to end: The transformation of individualism in classical liberalism. Chicago, Illinois: SSRN. http:\/\/ssrn.com\/paper=1767067"},{"issue":"2","key":"9351_CR50","first-page":"49","volume":"5","author":"Malcolm Williams","year":"2010","unstructured":"Williams, Malcolm. (2010). Can we measure homelessness?\u00a0A critical evaluation of \u2018Capture\u2013Recapture\u2019. Methodological Innovations Online, 5(2), 49\u201359.","journal-title":"Methodological Innovations Online"},{"key":"9351_CR51","volume-title":"Justice and the politics of difference","author":"IM Young","year":"1990","unstructured":"Young, I. M. (1990). Justice and the politics of difference. Princeton, NJ: Princeton University Press."},{"issue":"4","key":"9351_CR52","doi-asserted-by":"crossref","first-page":"660","DOI":"10.2105\/AJPH.2004.042150","volume":"95","author":"SN Zenk","year":"2005","unstructured":"Zenk, S. N., Schulz, A. J., Israel, B. A., James, S. A., Bao, S., & Wilson, M. L. (2005). Neighborhood Racial Composition, Neighborhood Poverty, and the Spatial Accessibility of Supermarkets in Metropolitan Detroit. American Journal of Public Health, 95(4), 660\u2013667.","journal-title":"American Journal of Public Health"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-014-9351-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-014-9351-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-014-9351-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T09:53:48Z","timestamp":1598349228000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-014-9351-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,4]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["9351"],"URL":"https:\/\/doi.org\/10.1007\/s10676-014-9351-8","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,4]]}}}