{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:13:02Z","timestamp":1775754782041,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"3TU Centre for Ethics and Technology"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10676-016-9396-y","type":"journal-article","created":{"date-parts":[[2016,4,2]],"date-time":"2016-04-02T00:47:34Z","timestamp":1459558054000},"page":"9-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["The transparent self"],"prefix":"10.1007","volume":"18","author":[{"given":"Marjolein","family":"Lanzing","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,2]]},"reference":[{"key":"9396_CR1","volume-title":"The environment and social behavior","author":"I Altman","year":"1975","unstructured":"Altman, I. (1975). The environment and social behavior. Monterey: Brooks\/Cole."},{"key":"9396_CR2","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1080\/1369118X.2015.1118520","volume":"19","author":"K Barta","year":"2016","unstructured":"Barta, K., & Neff, G. (2016). Technologies for Sharing: Lessons from Quantified Self about the political economy of platforms. Information, Communication and Society, 19, 4.","journal-title":"Information, Communication and Society"},{"key":"9396_CR3","volume-title":"Philosophical dimensions of privacy: An anthology","author":"SI Benn","year":"1971","unstructured":"Benn, S. I. (1971). Privacy, freedom and respect for persons. In F. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology. Cambridge: Cambridge University Press."},{"key":"9396_CR4","volume-title":"Autonomy and the challenges to liberalism","author":"J Christman","year":"2004","unstructured":"Christman, J. (2004). Autonomy, self-knowledge and liberal legitimacy. In J. Christman & J. Anderson (Eds.), Autonomy and the challenges to liberalism. Cambridge: Cambridge University Press."},{"key":"9396_CR5","volume-title":"Mill on utilitarianism","author":"R Crisp","year":"1997","unstructured":"Crisp, R. (1997). Mill on utilitarianism. New York: Routledge."},{"key":"9396_CR6","volume-title":"Persuasive technology: Using computers to change what we think and do","author":"BJ Fogg","year":"2003","unstructured":"Fogg, B. J. (2003). Persuasive technology: Using computers to change what we think and do. San Francisco: Moran Kaufmann."},{"key":"9396_CR7","unstructured":"Foss, J. (2014). The tale of a fitness-tracking addict\u2019s struggles with strava. WIRED. October 3. http:\/\/www.wired.com\/2014\/10\/my-strava-problem\/ ."},{"key":"9396_CR8","unstructured":"Fotopoulou, A. (2014). The Quantified Self community, lifelogging and the making of \u2018smart\u2019 publics. openDemocracy. https:\/\/www.opendemocracy.net\/participation-now\/aristea-fotopoulou\/quantified-self-community-lifelogging-and-making-of-%E2%80%9Csmart%E2%80%9D-pub . Accessed 10 Sept 2014."},{"key":"9396_CR9","volume-title":"[1975] Discipline, toezicht en straf","author":"M Foucault","year":"2007","unstructured":"Foucault, M. (2007). [1975] Discipline, toezicht en straf. Groningen: Historische Uitgeverij."},{"key":"9396_CR10","volume-title":"Philosophical dimensions of privacy: An anthology","author":"C Fried","year":"1984","unstructured":"Fried, C. (1984). Privacy: A moral analysis. In F. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology. Cambridge: Cambridge University Press."},{"key":"9396_CR11","volume-title":"The presentation of self in everyday life","author":"E Goffman","year":"1959","unstructured":"Goffman, E. (1959). The presentation of self in everyday life. Garden City: Doubleday."},{"key":"9396_CR12","volume-title":"Cambridge handbook of personal relationships","author":"K Greene","year":"2006","unstructured":"Greene, K., Derlega, V., & Mathews, A. (2006). Self-disclosure in personal relationships. In A. Vangelisti & D. Perlman (Eds.), Cambridge handbook of personal relationships. Cambridge: Cambridge University Press."},{"key":"9396_CR13","volume-title":"Decomposing the will","author":"L Hall","year":"2013","unstructured":"Hall, L., Johansson, P., & de L\u00e9on, D. (2013). Recomposing the will: Distributed motivation and computer mediated extrospection. In T. Vierkant, A. Clark, & J. Kiverstein (Eds.), Decomposing the will. Oxford: Oxford University Press: Philosophy of Mind Series."},{"key":"9396_CR14","volume-title":"The thief of time","author":"J Heath","year":"2010","unstructured":"Heath, J., & Anderson, J. (2010). Procrastination and the extended will. In C. Andreou & M. D. White (Eds.), The thief of time. New York: Oxford University Press."},{"key":"9396_CR15","unstructured":"Hill, K. (2011). Taking my measure. A track-your-life revolution has begun. Can Managing your Personal Data make you Happier, Healthier and Wealthier? Forbes. April 25."},{"key":"9396_CR16","volume-title":"Privacy, intimacy and isolation","author":"J Inness","year":"1992","unstructured":"Inness, J. (1992). Privacy, intimacy and isolation. New York: Oxford University Press."},{"key":"9396_CR17","unstructured":"Lupton, D. (2013). Understanding the human machine. IEEE Technology and Society Magazine. Available at: http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=6679313 . Accessed 28 March 2015."},{"key":"9396_CR18","doi-asserted-by":"crossref","unstructured":"Lupton, D. (2014). Self-tracking modes: Reflexive self-monitoring and data practices. Available at SSRN: http:\/\/ssrn.com\/abstract=2483549 or http:\/\/dx.doi.org\/10.2139\/ssrn.2483549 .","DOI":"10.2139\/ssrn.2483549"},{"key":"9396_CR19","unstructured":"Nafus, D., & Sherman, J. (2014). This one does not go up to eleven: The Quantified Self movement as an alternative big data practice. International Journal of Communication, 8."},{"key":"9396_CR20","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/10421.001.0001","volume-title":"Self-tracking","author":"G Neff","year":"2016","unstructured":"Neff, G., & Nafus, D. (2016). Self-tracking. Cambridge: MIT Press."},{"key":"9396_CR21","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford Palo Alto: Stanford University Press."},{"key":"9396_CR22","doi-asserted-by":"crossref","unstructured":"Patterson, H. (2013). Contextual expectations of privacy in self-generated health information flows. TPRC 41: The 41st Research Conference on Communication, Information and Internet Policy. SSRN: http:\/\/ssrn.com\/abstract=2242144 or http:\/\/dx.doi.org\/10.2139\/ssrn.2242144 .","DOI":"10.2139\/ssrn.2242144"},{"key":"9396_CR23","volume-title":"Philosophical dimensionsof privacy: An anthology","author":"J Rachels","year":"1975","unstructured":"Rachels, J. (1975). Why privacy is important. In F. Schoeman (Ed.), Philosophical dimensionsof privacy: An anthology. Cambridge: Cambridge University Press."},{"key":"9396_CR24","unstructured":"Regalado, A. (2013). Stephen wolfram adds analytics to the quantified-self movement. MIT Technology Review. http:\/\/www.technologyreview.com\/news\/514356\/stephen-wolfram-on-personal-analytics\/ . 8 May."},{"key":"9396_CR25","unstructured":"Research and Markets, Dublin. (2015). http:\/\/www.prnewswire.com\/news-releases\/global-smartwatch-market-2013-2020-samsung-pebble-garmin-nike-sony-fitbit-and-casio-dominate-the-32-billion-industry-300033591.html ."},{"key":"9396_CR26","volume-title":"The value of privacy","author":"B Roessler","year":"2005","unstructured":"Roessler, B. (2005). The value of privacy. Cambridge: Polity Press."},{"key":"9396_CR27","unstructured":"Singer, N. (2015). Technology that prods you to take action, not just collect data. The New York Times. http:\/\/www.nytimes.com\/2015\/04\/19\/technology\/technology-that-prods-you-to-take-action-not-just-collect-data.html . 18 April."},{"key":"9396_CR28","volume-title":"Lessons from the identity trail: Anonymity, privacy and identity in a networked society","author":"V Steeves","year":"2009","unstructured":"Steeves, V. (2009). Reclaiming the social value of privacy. In I. Kerr, V. Steeves, & C. Lulock (Eds.), Lessons from the identity trail: Anonymity, privacy and identity in a networked society. Oxford: Oxford University Press."},{"key":"9396_CR29","doi-asserted-by":"crossref","unstructured":"Till, C. (2014). Exercise as labour: Quantified Self and the transformation of exercise into labour. Societies, 4(3), 446\u2013462.","DOI":"10.3390\/soc4030446"},{"key":"9396_CR35","doi-asserted-by":"crossref","unstructured":"Valdman, M. (2010). Outsourcing self-government. Ethics, 120(4), 761\u2013790.","DOI":"10.1086\/653435"},{"key":"9396_CR30","unstructured":"Van Dijck, J. (2004). Composing the self: Of diaries and lifelogs. The Fibreculture Journal, 1(3)."},{"key":"9396_CR31","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199970773.001.0001","volume-title":"The culture of connectivity","author":"J Dijck van","year":"2013","unstructured":"van Dijck, J. (2013). The culture of connectivity. New York: Oxford University Press."},{"key":"9396_CR32","volume-title":"Privacy and freedom","author":"A Westin","year":"1967","unstructured":"Westin, A. (1967). Privacy and freedom. New York: Atheneum."},{"key":"9396_CR33","unstructured":"Wolf, G. (2014). Quantified Self | Antephase. http:\/\/antephase.com\/quantifiedself . Accessed 22 Oct 2014."},{"key":"9396_CR34","unstructured":"Zandbergen, D. (2013). Data confessions of the quantified self. http:\/\/www.leidenanthropologyblog.nl\/articles\/data-confessions-of-the-quantified-self . Accessed 1 Feb\u00a02015."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9396-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-016-9396-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9396-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T01:52:36Z","timestamp":1567734756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-016-9396-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["9396"],"URL":"https:\/\/doi.org\/10.1007\/s10676-016-9396-y","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3]]}}}