{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:30:47Z","timestamp":1740123047159,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T00:00:00Z","timestamp":1433116800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T00:00:00Z","timestamp":1433116800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1016203"],"award-info":[{"award-number":["1016203"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s10676-015-9369-6","type":"journal-article","created":{"date-parts":[[2015,7,15]],"date-time":"2015-07-15T08:28:50Z","timestamp":1436948930000},"page":"153-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A bibliometric analysis of privacy and ethics in IEEE Security and Privacy"],"prefix":"10.1007","volume":"17","author":[{"given":"Jonathan","family":"Tse","sequence":"first","affiliation":[]},{"given":"Dawn E.","family":"Schrader","sequence":"additional","affiliation":[]},{"given":"Dipayan","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Tony","family":"Liao","sequence":"additional","affiliation":[]},{"given":"David","family":"Lundie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,16]]},"reference":[{"key":"9369_CR1","unstructured":"Acquisti, A. (2014) From the economics of privacy to the economics of big data. Privacy, big data, and the public good: Frameworks for engagement"},{"issue":"1","key":"9369_CR2","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security and Privacy, 3(1), 23\u201333.","journal-title":"IEEE Security and Privacy"},{"key":"9369_CR3","doi-asserted-by":"publisher","unstructured":"Acquisti, A., John, L.K., & Loewenstein, G. (2013). What is privacy worth? The Journal of Legal Studies \n                           42(2), 249\u2013274. doi: \n                    10.1086\/671754","DOI":"10.1086\/671754"},{"key":"9369_CR4","unstructured":"Allen, A. (2007). The virtuous spy: privacy as an ethical limit. Scholarship at Penn Law."},{"issue":"9","key":"9369_CR5","doi-asserted-by":"publisher","first-page":"2177","DOI":"10.1111\/j.1095-8649.2010.02668.x","volume":"76","author":"PG Azevedo","year":"2010","unstructured":"Azevedo, P. G., Mesquita, F. O., & Young, R. J. (2010). Fishing for gaps in science: A bibliographic analysis of Brazilian freshwater ichthyology from 1986 to 2005. Journal of Fish Biology, 76(9), 2177\u20132193.","journal-title":"Journal of Fish Biology"},{"key":"9369_CR6","doi-asserted-by":"crossref","unstructured":"Beel, J., & Gipp, B. (2010). Academic Search Engine Spam and Google Scholar\u2019s Resilience Against it. Journal of electronic publishing.","DOI":"10.3998\/3336451.0013.305"},{"issue":"5","key":"9369_CR7","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1080\/1369118X.2012.678878","volume":"15","author":"D Boyd","year":"2012","unstructured":"Boyd, D., & Crawford, K. (2012). Critical questions for big data. Information, Communication and Society, 15(5), 662\u2013679.","journal-title":"Information, Communication and Society"},{"key":"9369_CR8","unstructured":"Cohen, J.E. (2013). What privacy is for. Harvard Law Review 126."},{"key":"9369_CR9","volume-title":"Advances in economics and econometrics: Theory and applications, econometric society monographs. Eighth world congress","author":"FX Diebold","year":"2003","unstructured":"Diebold, F. X. (2003). Advances in economics and econometrics: Theory and applications, econometric society monographs. Eighth world congress. Cambridge: Cambridge University Press."},{"issue":"5","key":"9369_CR10","first-page":"468","volume":"81","author":"H Gauch Jr","year":"1993","unstructured":"Gauch, H, Jr. (1993). Prediction. Parsimony and Noise. American scientist, 81(5), 468\u2013478.","journal-title":"Parsimony and Noise. American scientist"},{"key":"9369_CR11","doi-asserted-by":"crossref","unstructured":"Ghosh, D.P., Schrader, D.E., Schulze, W.D., Wicker, S.B. (2012). Economic analysis of privacy-aware advanced metering infrastructure adoption. Innovative Smart Grid Technologies (ISGT), 2012 IEEE PES pp 1\u20134","DOI":"10.1109\/ISGT.2012.6175740"},{"issue":"3","key":"9369_CR12","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSP.2013.47","volume":"11","author":"S Gurses","year":"2013","unstructured":"Gurses, S., & Diaz, C. (2013). Two tales of privacy in online social networks. Security and Privacy, IEEE, 11(3), 29\u201337.","journal-title":"Security and Privacy, IEEE"},{"key":"9369_CR13","unstructured":"Gurses, S., Troncoso, C. & Diaz, C. (2011). Engineering privacy by design \u2026Privacy\n& Data Protection."},{"key":"9369_CR14","volume-title":"Social engineering: The art of human hacking","author":"C Hadnagy","year":"2010","unstructured":"Hadnagy, C., & Wilson, P. (2010). Social engineering: The art of human hacking (1st ed.). Indianapolis: Wiley Publishing.","edition":"1"},{"key":"9369_CR15","unstructured":"Hugl, U. (2010). Approaching the value of Privacy: Review of theoretical privacy concepts and aspects of privacy management. AMCIS."},{"key":"9369_CR16","doi-asserted-by":"crossref","unstructured":"Hull, G., Lipford, H.R., Latulipe, C. (2011). Contextual gaps: privacy issues on Facebook. Ethics Inf Technol.","DOI":"10.1007\/s10676-010-9224-8"},{"issue":"4","key":"9369_CR17","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1177\/109442802237114","volume":"5","author":"K Jackson","year":"2002","unstructured":"Jackson, K., & Trochim, W. (2002). Concept mapping as an alternative approach for the analysis of open-ended survey responses. Organizational Research Methods, 5(4), 307\u2013336.","journal-title":"Organizational Research Methods"},{"key":"9369_CR18","doi-asserted-by":"crossref","unstructured":"Knobel, C., & Bowker, G. C. (2011). Values in design. CACM.","DOI":"10.1145\/1965724.1965735"},{"key":"9369_CR19","unstructured":"Lessig, L. (2006). Code. Lawrence Lessig."},{"issue":"2","key":"9369_CR20","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1177\/030631278001000202","volume":"10","author":"D Lindsey","year":"1980","unstructured":"Lindsey, D. (1980). Production and citation measures in the sociology of science: The problem of multiple authorship. Social Studies of Science, 10(2), 145\u2013162.","journal-title":"Social Studies of Science"},{"issue":"4","key":"9369_CR21","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10676-012-9300-3","volume":"14","author":"K Martin","year":"2012","unstructured":"Martin, K. (2012). Information technology and privacy: Conceptual muddles or privacy vacuums? Ethics and Information Technology, 14(4), 267\u2013284.","journal-title":"Ethics and Information Technology"},{"key":"9369_CR22","unstructured":"Pearson, K. (1900). X. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to.... The London"},{"issue":"4","key":"9369_CR23","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s13278-011-0024-x","volume":"1","author":"MC Pham","year":"2011","unstructured":"Pham, M. C., Klamma, R., & Jarke, M. (2011). Development of computer science disciplines: A social network analysis approach. Social Network Analysis and Mining, 1(4), 321\u2013340.","journal-title":"Social Network Analysis and Mining"},{"key":"9369_CR24","unstructured":"Richards, N. M., & King, J. H. (2014). Big Data Ethics. Wake Forest Law Review."},{"key":"9369_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10676-013-9329-y","volume":"16","author":"RK Sar","year":"2014","unstructured":"Sar, R. K., & Al-Saggaf, Y. (2014). Contextual integrity\u2019s decision heuristic and the tracking by social network sites. Ethics Information Technology, 16, 15\u201326.","journal-title":"Ethics Information Technology"},{"key":"9369_CR26","unstructured":"Schrader, D., Ghosh, D.P., Schulze, W.D., & Wicker, S.B. (2013). Civilization and Its Privacy Discontents. In: Patterson H (ed) Privacy Law Scholars Conference, Berkeley, CA."},{"key":"9369_CR27","doi-asserted-by":"crossref","first-page":"131","DOI":"10.24908\/ss.v8i2.3482","volume":"8","author":"K Shilton","year":"2010","unstructured":"Shilton, K. (2010). Participatory sensing: Building empowering surveillance: EBSCOhost. Surveillance & Society, 8, 131\u2013150.","journal-title":"Surveillance & Society"},{"key":"9369_CR28","volume-title":"The future of reputation: Gossip, Rumor, and privacy on the internet","author":"DJ Solove","year":"2007","unstructured":"Solove, D. J. (2007). The future of reputation: Gossip, Rumor, and privacy on the internet. New Haven: Yale University Press."},{"key":"9369_CR29","unstructured":"Stajano, F., & Wilson, P. (2009). Understanding scam victims: Seven principles for systems security. Technical Report UCAM-CL-TR-754, University of Cambridge."},{"issue":"1","key":"9369_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10676-013-9328-z","volume":"16","author":"L Stark","year":"2013","unstructured":"Stark, L., & Tierney, M. (2013). Lockbox: Mobility, privacy and values in cloud storage. Ethics and Information Technology, 16(1), 1\u201313.","journal-title":"Ethics and Information Technology"},{"key":"9369_CR31","doi-asserted-by":"crossref","unstructured":"Torres-Salinas, D., Robinson-Garcia, N., Jim\u00e9nez-Contreras, E., Herrera, F., & L\u00f3pez-C\u00f3zar, E.D. (2013). On the use of Biplot analysis for multivariate bibliometric and scientific indicators. \n                    arXiv.1302.0608v1\n                    \n                  .","DOI":"10.1002\/asi.22837"},{"key":"9369_CR32","unstructured":"Toubiana, V., Narayanan, A., Boneh, D., & Nissenbaum, H. (2010). Adnostic: Privacy preserving targeted advertising. NDSS."},{"key":"9369_CR33","unstructured":"Toubiana, V., Subramanian, L., & Nissenbaum, H. (2011). TrackMeNot: Enhancing\nthe privacy of Web Search. \n                    arXiv 1109.4677v1"},{"key":"9369_CR34","volume-title":"The daily you: How the new advertising industry is defining your identity and your worth","author":"J Turow","year":"2012","unstructured":"Turow, J. (2012). The daily you: How the new advertising industry is defining your identity and your worth. New Haven: Yale University Press."},{"key":"9369_CR35","doi-asserted-by":"crossref","DOI":"10.4135\/9781412983488","volume-title":"Basic content analysis","author":"RP Weber","year":"1990","unstructured":"Weber, R. P. (1990). Basic content analysis (2nd ed.). Newbury Park, CA: SAGE Publications.","edition":"2"},{"issue":"2","key":"9369_CR36","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/JPROC.2010.2073670","volume":"99","author":"SB Wicker","year":"2011","unstructured":"Wicker, S. B., & Schrader, D. E. (2011). Privacy-aware design principles for information networks. Proceedings IEEE, 99(2), 330\u2013350.","journal-title":"Proceedings IEEE"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-015-9369-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-015-9369-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-015-9369-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-015-9369-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T06:29:03Z","timestamp":1589437743000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-015-9369-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["9369"],"URL":"https:\/\/doi.org\/10.1007\/s10676-015-9369-6","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2015,6]]},"assertion":[{"value":"16 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}