{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:35:48Z","timestamp":1761896148944},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s10676-015-9366-9","type":"journal-article","created":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T14:58:37Z","timestamp":1441119517000},"page":"175-188","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The use of software tools and autonomous bots against vandalism: eroding Wikipedia\u2019s moral order?"],"prefix":"10.1007","volume":"17","author":[{"given":"Paul B.","family":"de Laat","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,2]]},"reference":[{"key":"9366_CR30","unstructured":"All websites below have last been accessed on December 29, 2014."},{"key":"9366_CR1","doi-asserted-by":"crossref","unstructured":"Adler, B. T., & de Alfaro, L. (2007). A content-driven reputation system for the Wikipedia. In Proceedings of the 16th international conference on World Wide Web, May 8\u201312, 2007, Banff, Alberta, Canada. doi: 10.1145\/1242572.1242608 .","DOI":"10.1145\/1242572.1242608"},{"key":"9366_CR2","unstructured":"Adler, B. T., de Alfaro, L., Mola-Velasco, S. M., Rosso, P., & West, A. G. (2011). Wikipedia vandalism detection: Combining natural language, metadata, and reputation features. In CICLing \u201811: Proceedings of the 12th international conference on intelligent text processing and computational linguistics, LNCS 6609 (pp. 277\u2013288). Tokyo, Japan."},{"issue":"4","key":"9366_CR3","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/572260.572264","volume":"30","author":"P Brey","year":"2000","unstructured":"Brey, P. (2000). Disclosive computer ethics. Computers and Society, 30(4), 10\u201316.","journal-title":"Computers and Society"},{"key":"9366_CR4","unstructured":"Chen, A. (2014). The laborers who keep dick pics and beheadings out of your facebook feed. Wired October 23. http:\/\/www.wired.com\/2014\/10\/content-moderation\/ ."},{"issue":"4","key":"9366_CR5","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/s10676-010-9230-x","volume":"12","author":"PB Laat de","year":"2010","unstructured":"de Laat, P. B. (2010). How can contributors to open-source communities be trusted? On the assumption, inference, and substitution of trust. Ethics and Information Technology, 12(4), 327\u2013341.","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9366_CR6","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s10676-012-9289-7","volume":"14","author":"PB Laat de","year":"2012","unstructured":"de Laat, P. B. (2012a). Coercion or empowerment? Moderation of content in Wikipedia as \u2018essentially contested\u2019 bureaucratic rules. Ethics and Information Technology, 14(2), 123\u2013135.","journal-title":"Ethics and Information Technology"},{"key":"9366_CR7","doi-asserted-by":"crossref","unstructured":"de Laat, P. B. (2012b). Navigating between chaos and bureaucracy: Backgrounding trust in open content communities. In K. Aberer, et al. (Eds.), Social informatics. 4th International conference, SocInfo 2012; Lausanne, Switzerland, 5\u20137 December, 2012; Proceedings, LNCS 7710 (pp. 534\u2013557). Heidelberg: Springer.","DOI":"10.1007\/978-3-642-35386-4_42"},{"issue":"2","key":"9366_CR8","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s10676-014-9342-9","volume":"16","author":"PB Laat de","year":"2014","unstructured":"de Laat, P. B. (2014). From open-source software to Wikipedia: \u2018Backgrounding\u2019 trust by collective monitoring and reputation tracking. Ethics and Information Technology, 16(2), 157\u2013169.","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9366_CR9","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1080\/08109020802270182","volume":"26","author":"WH Dutton","year":"2008","unstructured":"Dutton, W. H. (2008). The wisdom of collaborative network organizations: Capturing the value of networked individuals. Prometheus, 26(3), 211\u2013230.","journal-title":"Prometheus"},{"issue":"5","key":"9366_CR10","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1177\/0002764212469362","volume":"57","author":"A Forte","year":"2013","unstructured":"Forte, A., & Lampe, C. (2013). Defining, understanding, and supporting open collaboration: Lessons From the literature. American Behavioral Scientist, 57(5), 535\u2013547.","journal-title":"American Behavioral Scientist"},{"key":"9366_CR11","unstructured":"Friedland, S. (2014). The difference between invisible and visible surveillance in a mass surveillance world. Elon University Law Legal Studies Research Paper No. 2014-02. Available at SSRN. http:\/\/ssrn.com\/abstract=2392489 ."},{"key":"9366_CR12","first-page":"78","volume-title":"Critical point of view: A Wikipedia reader","author":"RS Geiger","year":"2011","unstructured":"Geiger, R. S. (2011). (2011) The Lives of Bots. In G. Lovink & N. Tkacz (Eds.), Critical point of view: A Wikipedia reader (pp. 78\u201393). Amsterdam: Institute of Network Cultures."},{"issue":"3","key":"9366_CR13","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1080\/1369118X.2013.873069","volume":"17","author":"RS Geiger","year":"2014","unstructured":"Geiger, R. S. (2014). Bots, bespoke, code and the materiality of software platforms. Information, Communication & Society, 17(3), 342\u2013356.","journal-title":"Information, Communication & Society"},{"key":"9366_CR14","doi-asserted-by":"crossref","unstructured":"Geiger, R. S., & Ribes, D. (2010). The work of sustaining order in Wikipedia: The banning of a vandal. In CSCW 2010, February 6\u201310, 2010, Savannah, Georgia.","DOI":"10.1145\/1718918.1718941"},{"issue":"2","key":"9366_CR15","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s10676-005-4583-2","volume":"7","author":"LD Introna","year":"2005","unstructured":"Introna, L. D. (2005). Disclosive ethics and information technology: Disclosing facial recognition systems. Ethics and Information Technology, 7(2), 75\u201386.","journal-title":"Ethics and Information Technology"},{"key":"9366_CR16","first-page":"65","volume-title":"The Blackwell guide to the philosophy of computing and information","author":"DG Johnson","year":"2004","unstructured":"Johnson, D. G. (2004). Computer ethics. In L. Floridi (Ed.), The Blackwell guide to the philosophy of computing and information (pp. 65\u201375). Hoboken, NJ: Wiley."},{"key":"9366_CR17","unstructured":"Johnson, D. G. (2013). Negotiating responsibility in the discourse on moral robots and other artificial agents. In: E. Buchanan, P. B. de Laat & H. T. Tavani (Eds.), Ambiguous technologies: Philosophical issues, practical solutions, human nature. Proceedings of the tenth international conference on computer ethics\u2014Philosophical Enquiry, 2013 (pp. 182\u2013193). Lisbon, Portugal."},{"key":"9366_CR18","doi-asserted-by":"crossref","unstructured":"Johnson, M., Bradshaw, J. M., Feltovich, P. J., Jonker, C., Sierhuis, M., & van Riemsdijk, B. (2010). Toward coactivity. In: HRI \u201810: Proceedings of the 5th ACM\/IEEE international conference on human\u2013robot interaction (March 2010).","DOI":"10.1109\/HRI.2010.5453244"},{"key":"9366_CR19","unstructured":"Livingstone, R. M. (2012). Network of knowledge: Wikipedia as a sociotechnical system of intelligence. Dissertation, University of Oregon, September 2012."},{"issue":"4","key":"9366_CR20","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MIS.2006.80","volume":"21","author":"JH Moor","year":"2006","unstructured":"Moor, J. H. (2006). The nature, importance, and difficulty of machine ethics. IEEE Intelligent Systems, 21(4), 18\u201321.","journal-title":"IEEE Intelligent Systems"},{"key":"9366_CR21","unstructured":"Nielsen, F. A. (2014). Wikipedia research and tools: Review and comments. Working paper. Most recent update obtained from http:\/\/www2.imm.dtu.dk\/pubdb\/views\/publication_details.php?id=6012 . http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2129874 ."},{"key":"9366_CR22","volume-title":"Profiles, probabilities, and stereotypes","author":"F Schauer","year":"2003","unstructured":"Schauer, F. (2003). Profiles, probabilities, and stereotypes. Cambridge, MA: The Belknap Press of Harvard University Press."},{"issue":"6","key":"9366_CR23","first-page":"51","volume":"116","author":"T Simonite","year":"2013","unstructured":"Simonite, T. (2013). The decline of Wikipedia. MIT Technology Review, 116(6), 51\u201356.","journal-title":"MIT Technology Review"},{"key":"9366_CR24","doi-asserted-by":"crossref","unstructured":"Stahl, B., Elizondo, D., Carroll-Mayer, M., Zheng, Y., & Wakunuma, K. (2010). Ethical and legal issues of the use of computational intelligence techniques in computer security and computer forensics. In: Proceedings of the 2010 international joint conference on neural networks, July 18\u201323, 2010, Barcelona, Spain.","DOI":"10.1109\/IJCNN.2010.5596546"},{"key":"9366_CR25","unstructured":"Stegbauer, C. (an interview with). (2011). Cultural transformations in Wikipedia or \u2018from Emancipation to Product Ideology\u2019. In G. Lovink & N. Tkacz (Eds.), Critical point of view: A Wikipedia reader (pp. 342\u2013350). Amsterdam: Institute of Network Cultures."},{"key":"9366_CR26","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s13347-014-0156-9","volume":"28","author":"S Vallor","year":"2015","unstructured":"Vallor, S. (2015). Moral deskilling and upskilling in a new machine age: Reflections on the ambiguous future of character. Philosophy & Technology, 28, 107\u2013124.","journal-title":"Philosophy & Technology"},{"issue":"4","key":"9366_CR27","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/s10676-011-9277-3","volume":"13","author":"B Vanacker","year":"2011","unstructured":"Vanacker, B. (2011). Returning students\u2019 right to access, choice and notice: A proposed code of ethics for instructors using Turnitin. Ethics and Information Technology, 13(4), 327\u2013338.","journal-title":"Ethics and Information Technology"},{"issue":"8","key":"9366_CR28","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1016\/j.future.2011.02.007","volume":"28","author":"AG West","year":"2012","unstructured":"West, A. G., Chang, J., Venkatasubramanian, K. K., & Lee, I. (2012). Trust in collaborative web applications. Future Generation Computer Systems, 28(8), 1238\u20131251. doi: 10.1016\/j.future.2011.02.007 .","journal-title":"Future Generation Computer Systems"},{"key":"9366_CR29","doi-asserted-by":"crossref","unstructured":"West, A. G., Kannan, S., & Lee, I. (2010) Detecting Wikipedia vandalism via spatio-temporal analysis of revision metadata. In EUROSEC\u201910: 22\u201328, Paris, France.","DOI":"10.1145\/1752046.1752050"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-015-9366-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-015-9366-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-015-9366-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T22:53:19Z","timestamp":1553640799000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-015-9366-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["9366"],"URL":"https:\/\/doi.org\/10.1007\/s10676-015-9366-9","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9]]}}}