{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T03:48:18Z","timestamp":1765079298577,"version":"3.37.3"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10676-016-9392-2","type":"journal-article","created":{"date-parts":[[2016,3,18]],"date-time":"2016-03-18T18:35:32Z","timestamp":1458326132000},"page":"33-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Indiscriminate mass surveillance and the public sphere"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6537-2196","authenticated-orcid":false,"given":"Titus","family":"Stahl","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,16]]},"reference":[{"key":"9392_CR1","volume-title":"The human condition","author":"H Arendt","year":"1958","unstructured":"Arendt, H. (1958). The human condition. Chicago: The University of Chicago Press."},{"issue":"5","key":"9392_CR2","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.2307\/1229517","volume":"52","author":"JE Cohen","year":"2000","unstructured":"Cohen, J. E. (2000). Examined lives: Informational privacy and the subject as object. Stanford Law Review, 52(5), 1373\u20131438. doi: 10.2307\/1229517 .","journal-title":"Stanford Law Review"},{"key":"9392_CR3","volume-title":"Civil society and political theory","author":"JL Cohen","year":"1997","unstructured":"Cohen, J. L., & Arato, A. (1997). Civil society and political theory. Cambridge, MA: MIT Press."},{"key":"9392_CR4","first-page":"5","volume-title":"Power. A Reader","author":"RA Dahl","year":"2002","unstructured":"Dahl, R. A. (2002). Power. In M. Haugaard (Ed.), Power. A Reader (pp. 5\u201325). Manchester: Manchester University Press."},{"issue":"5","key":"9392_CR5","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/s10982-010-9067-9","volume":"29","author":"B Bruin de","year":"2010","unstructured":"de Bruin, B. (2010). The liberal value of privacy. Law and Philosophy, 29(5), 505\u2013534. doi: 10.1007\/s10982-010-9067-9 .","journal-title":"Law and Philosophy"},{"key":"9392_CR6","volume-title":"The system of freedom of expression","author":"TI Emerson","year":"1970","unstructured":"Emerson, T. I. (1970). The system of freedom of expression. New York: Random House."},{"key":"9392_CR7","volume-title":"The limits of privacy","author":"A Etzioni","year":"2000","unstructured":"Etzioni, A. (2000). The limits of privacy. New York: Basic Books."},{"key":"9392_CR8","first-page":"621","volume":"46","author":"LE Fisher","year":"2004","unstructured":"Fisher, L. E. (2004). Guilt by expressive association: Political profiling, surveillance and the privacy of groups. Arizona Law Review, 46, 621\u2013675.","journal-title":"Arizona Law Review"},{"issue":"2","key":"9392_CR9","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/jopp.12046","volume":"23","author":"R Forst","year":"2015","unstructured":"Forst, R. (2015). Noumenal power. Journal of Political Philosophy, 23(2), 111\u2013127. doi: 10.1111\/jopp.12046 .","journal-title":"Journal of Political Philosophy"},{"key":"9392_CR57","doi-asserted-by":"crossref","first-page":"56","DOI":"10.2307\/466240","volume":"25","author":"N Fraser","year":"1990","unstructured":"Fraser, N. (1990). Rethinking the public sphere: A contribution to the critique of actually existing democracy. Social Text, 25, 56\u201380. doi: 10.2307\/466240 .","journal-title":"Social Text"},{"issue":"3","key":"9392_CR10","doi-asserted-by":"crossref","first-page":"475","DOI":"10.2307\/794941","volume":"77","author":"C Fried","year":"1968","unstructured":"Fried, C. (1968). Privacy. The Yale Law Journal, 77(3), 475\u2013493. doi: 10.2307\/794941 .","journal-title":"The Yale Law Journal"},{"key":"9392_CR11","unstructured":"GCHQ Authors. (2014). GCHQ report on the technical abilities of TEMPORA. Electronic Frontier Foundation. https:\/\/www.eff.org\/document\/20140618-der-spiegel-gchq-report-technical-abilities-tempora . (Accessed November 23, 2015)."},{"issue":"4","key":"9392_CR12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.37974\/ALF.80","volume":"1","author":"BJ Goold","year":"2009","unstructured":"Goold, B. J. (2009). Surveillance and the political value of privacy. Amsterdam Law Forum, 1(4), 3\u20136.","journal-title":"Amsterdam Law Forum"},{"key":"9392_CR13","unstructured":"Goold, B. J. (2010). How much surveillance is too much? Some thoughts on surveillance, democracy, and the political value of privacy (SSRN Scholarly Paper No. ID 1876069). Rochester, NY: Social Science Research Network. http:\/\/papers.ssrn.com\/abstract=1876069 . (Accessed November 24, 2015)."},{"key":"9392_CR14","unstructured":"Greenwald, G., & Hussain, M. (2014). Meet the Muslim-American leaders the FBI and NSA have been spying on. The Intercept. http:\/\/theintercept.com\/2014\/07\/09\/under-surveillance\/ . (Accessed November 23, 2015)."},{"key":"9392_CR15","volume-title":"The structural transformation of the public sphere: An inquiry into a category of bourgeois society","author":"J Habermas","year":"1991","unstructured":"Habermas, J. (1991). The structural transformation of the public sphere: An inquiry into a category of bourgeois society. Cambridge, MA: MIT Press."},{"key":"9392_CR16","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1564.001.0001","volume-title":"Between facts and norms: Contributions to a discourse theory of law and democracy","author":"J Habermas","year":"1996","unstructured":"Habermas, J. (1996). Between facts and norms: Contributions to a discourse theory of law and democracy. Cambridge: Polity."},{"key":"9392_CR17","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511490255","volume-title":"De-facing power","author":"CR Hayward","year":"2000","unstructured":"Hayward, C. R. (2000). De-facing power. Cambridge: Cambridge University Press."},{"key":"9392_CR18","author":"JM Hoye","year":"2015","unstructured":"Hoye, J. M., & Monaghan, J. (2015). Surveillance, freedom and the republic. European Journal of Political Theory. doi: 10.1177\/1474885115608783 .","journal-title":"European Journal of Political Theory"},{"key":"9392_CR19","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1017\/CBO9781107280557.013","volume-title":"Social dimensions of privacy","author":"K Hughes","year":"2015","unstructured":"Hughes, K. (2015). The social value of privacy, the value of privacy to society and human rights discourse. In B. Roesser & D. Mokrosinska (Eds.), Social dimensions of privacy (pp. 225\u2013243). Cambridge: Cambridge University Press. doi: 10.1017\/CBO9781107280557.013 ."},{"key":"9392_CR20","volume-title":"Privacy, intimacy, and isolation","author":"JC Inness","year":"1992","unstructured":"Inness, J. C. (1992). Privacy, intimacy, and isolation. Oxford: Oxford University Press."},{"key":"9392_CR21","volume-title":"Power and Marxist theory. A realist view","author":"JC Isaac","year":"1987","unstructured":"Isaac, J. C. (1987). Power and Marxist theory. A realist view. Ithaca: Cornell University Press."},{"key":"9392_CR22","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199579419.001.0001","volume-title":"A general theory of domination and justice","author":"F Lovett","year":"2010","unstructured":"Lovett, F. (2010). A general theory of domination and justice. Oxford: Oxford University Press."},{"key":"9392_CR23","volume-title":"Trust and power","author":"N Luhmann","year":"1979","unstructured":"Luhmann, N. (1979). Trust and power. Chichester: Wiley."},{"issue":"2","key":"9392_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/2053951714541861","volume":"1","author":"D Lyon","year":"2014","unstructured":"Lyon, D. (2014). Surveillance, snowden, and big data: Capacities, consequences, critique. Big Data & Society, 1(2), 1\u201313. doi: 10.1177\/2053951714541861 .","journal-title":"Big Data & Society"},{"key":"9392_CR25","unstructured":"MacAskill, E., Borger, J., Hopkins, N., Davies, N., & Ball, J. (2013). GCHQ taps fibre-optic cables for secret access to world\u2019s communications. The Guardian. http:\/\/www.theguardian.com\/uk\/2013\/jun\/21\/gchq-cables-secret-world-communications-nsa . (Accessed November 23, 2015)."},{"key":"9392_CR26","volume-title":"Feminism unmodified: Discourses on life and law","author":"CA MacKinnon","year":"1987","unstructured":"MacKinnon, C. A. (1987). Feminism unmodified: Discourses on life and law. Cambridge, MA: Harvard University Press."},{"key":"9392_CR27","volume-title":"Toward a feminist theory of the state","author":"CA MacKinnon","year":"1989","unstructured":"MacKinnon, C. A. (1989). Toward a feminist theory of the state. Cambridge, MA: Harvard University Press."},{"issue":"1","key":"9392_CR28","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1111\/papa.12040","volume":"43","author":"A Marmor","year":"2015","unstructured":"Marmor, A. (2015). What is the right to privacy? Philosophy & Public Affairs, 43(1), 3\u201326. doi: 10.1111\/papa.12040 .","journal-title":"Philosophy & Public Affairs"},{"key":"9392_CR29","volume-title":"On liberty and other writings","author":"JS Mill","year":"1989","unstructured":"Mill, J. S. (1989). On liberty and other writings. Cambridge: Cambridge University Press."},{"issue":"1","key":"9392_CR30","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1111\/j.1088-4963.1998.tb00057.x","volume":"27","author":"T Nagel","year":"1998","unstructured":"Nagel, T. (1998). Concealment and exposure. Philosophy & Public Affairs, 27(1), 3\u201330.","journal-title":"Philosophy & Public Affairs"},{"issue":"3","key":"9392_CR31","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1207\/s15327019eb0703_3","volume":"7","author":"H Nissenbaum","year":"1997","unstructured":"Nissenbaum, H. (1997). Toward an approach to privacy in public: Challenges of information technology. Ethics and Behavior, 7(3), 207\u2013219. doi: 10.1207\/s15327019eb0703_3 .","journal-title":"Ethics and Behavior"},{"issue":"1","key":"9392_CR32","first-page":"101","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 101\u2013139.","journal-title":"Washington Law Review"},{"issue":"4","key":"9392_CR33","first-page":"269","volume":"12","author":"WA Parent","year":"1983","unstructured":"Parent, W. A. (1983). Privacy, morality, and the law. Philosophy & Public Affairs, 12(4), 269\u2013288.","journal-title":"Philosophy & Public Affairs"},{"issue":"3","key":"9392_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17645\/mac.v3i3.263","volume":"3","author":"C Parsons","year":"2015","unstructured":"Parsons, C. (2015). Beyond privacy: Articulating the broader harms of pervasive mass surveillance. Media and Communication, 3(3), 1\u201311. doi: 10.17645\/mac.v3i3.263 .","journal-title":"Media and Communication"},{"key":"9392_CR35","volume-title":"Republicanism. A theory of freedom and government","author":"P Pettit","year":"1997","unstructured":"Pettit, P. (1997). Republicanism. A theory of freedom and government. Oxford: Oxford University Press."},{"issue":"3","key":"9392_CR36","doi-asserted-by":"crossref","first-page":"383","DOI":"10.2307\/3478805","volume":"48","author":"W Prosser","year":"1960","unstructured":"Prosser, W. (1960). Privacy. California Law Review, 48(3), 383\u2013423.","journal-title":"California Law Review"},{"issue":"4","key":"9392_CR37","first-page":"323","volume":"4","author":"J Rachels","year":"1975","unstructured":"Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323\u2013333.","journal-title":"Philosophy & Public Affairs"},{"key":"9392_CR38","volume-title":"Legislating privacy. Technology, social values, and public policy","author":"PM Regan","year":"1995","unstructured":"Regan, P. M. (1995). Legislating privacy. Technology, social values, and public policy. Chapel Hill: University of North Carolina Press."},{"key":"9392_CR39","author":"A Roberts","year":"2014","unstructured":"Roberts, A. (2014). A republican account of the value of privacy. European Journal of Political Theory. doi: 10.1177\/1474885114533262 .","journal-title":"European Journal of Political Theory"},{"key":"9392_CR40","volume-title":"The value of privacy","author":"B Roessler","year":"2004","unstructured":"Roessler, B. (2004). The value of privacy. Cambridge: Polity."},{"issue":"8","key":"9392_CR41","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1177\/0191453713494968","volume":"39","author":"B Roessler","year":"2013","unstructured":"Roessler, B., & Mokrosinska, D. (2013). Privacy and social interaction. Philosophy and Social Criticism, 39(8), 771\u2013791.","journal-title":"Philosophy and Social Criticism"},{"key":"9392_CR42","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511625138","volume-title":"Philosophical dimensions of privacy","author":"F Schoeman","year":"1984","unstructured":"Schoeman, F. (Ed.). (1984). Privacy and intimate information. In Philosophical dimensions of privacy. Cambridge: Cambridge University Press."},{"issue":"3","key":"9392_CR43","doi-asserted-by":"crossref","first-page":"707","DOI":"10.2307\/3312079","volume":"135","author":"S Simitis","year":"1987","unstructured":"Simitis, S. (1987). Reviewing privacy in an information society. University of Pennsylvania Law Review, 135(3), 707\u2013746.","journal-title":"University of Pennsylvania Law Review"},{"key":"9392_CR44","unstructured":"Skinner, Q. (2015). Liberty, liberalism and surveillance: A historic overview. OpenDemocracy. https:\/\/www.opendemocracy.net\/ourkingdom\/quentin-skinner-richard-marshall\/liberty-liberalism-and-surveillance-historic-overview . (Accessed July 10, 2015)."},{"issue":"3","key":"9392_CR45","doi-asserted-by":"crossref","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"DJ Solove","year":"2006","unstructured":"Solove, D. J. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477\u2013564. doi: 10.2307\/40041279 .","journal-title":"University of Pennsylvania Law Review"},{"key":"9392_CR46","first-page":"745","volume":"44","author":"DJ Solove","year":"2007","unstructured":"Solove, D. J. (2007). \u2018I\u2019ve got nothing to hide\u2019 and other misunderstandings of privacy. San Diego Law Review, 44, 745\u2013772.","journal-title":"San Diego Law Review"},{"key":"9392_CR47","unstructured":"Stallman, R. (2013). How much surveillance can democracy withstand? GNU Project. https:\/\/www.gnu.org\/philosophy\/surveillance-vs-democracy.html . (Accessed November 23, 2015)."},{"issue":"3","key":"9392_CR48","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s11133-008-9107-z","volume":"31","author":"A Starr","year":"2008","unstructured":"Starr, A., Fernandez, L. A., Amster, R., Wood, L. J., & Caro, M. J. (2008). The impacts of state surveillance on political assembly and association: A socio-legal analysis. Qualitative Sociology, 31(3), 251\u2013270. doi: 10.1007\/s11133-008-9107-z .","journal-title":"Qualitative Sociology"},{"issue":"4","key":"9392_CR49","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1080\/15236803.1998.12022042","volume":"4","author":"JJ Thomson","year":"1975","unstructured":"Thomson, J. J. (1975). The right to privacy. Philosophy & Public Affairs, 4(4), 295\u2013314.","journal-title":"Philosophy & Public Affairs"},{"key":"9392_CR50","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511618185","volume-title":"Trust and rule","author":"C Tilly","year":"2005","unstructured":"Tilly, C. (2005). Trust and rule. Cambridge: Cambridge University Press."},{"issue":"1","key":"9392_CR51","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1215\/08992363-14-1-49","volume":"14","author":"M Warner","year":"2002","unstructured":"Warner, M. (2002). Publics and counterpublics. Public Culture, 14(1), 49\u201390.","journal-title":"Public Culture"},{"issue":"5","key":"9392_CR52","doi-asserted-by":"crossref","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"SD Warren","year":"1890","unstructured":"Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193\u2013220. doi: 10.2307\/1321160 .","journal-title":"Harvard Law Review"},{"key":"9392_CR53","volume-title":"Forms of power: From domination to transformation","author":"T Wartenberg","year":"1991","unstructured":"Wartenberg, T. (1991). Forms of power: From domination to transformation. Philadelphia: Temple University Press."},{"key":"9392_CR54","unstructured":"Weber, M. (1978). Economy and society. In G. Roth & C. Wittich (Eds.), Berkeley: University of California Press."},{"key":"9392_CR55","volume-title":"Privacy and freedom","author":"AF Westin","year":"1970","unstructured":"Westin, A. F. (1970). Privacy and freedom. London: The Bodley Head."},{"key":"9392_CR56","unstructured":"Wolf, N. (2012). Revealed: How the FBI coordinated the crackdown on occupy. The Guardian. http:\/\/www.theguardian.com\/commentisfree\/2012\/dec\/29\/fbi-coordinated-crackdown-occupy . (Accessed July 15, 2015)."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9392-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-016-9392-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9392-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,17]],"date-time":"2020-09-17T10:10:38Z","timestamp":1600337438000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-016-9392-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["9392"],"URL":"https:\/\/doi.org\/10.1007\/s10676-016-9392-2","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2016,3]]}}}