{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T17:16:04Z","timestamp":1655399764854},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10676-016-9397-x","type":"journal-article","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T09:19:09Z","timestamp":1459329549000},"page":"41-49","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy, speech, and values: what we have no business knowing"],"prefix":"10.1007","volume":"18","author":[{"given":"Adam D.","family":"Moore","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,30]]},"reference":[{"key":"9397_CR1","volume-title":"Right to privacy","author":"E Alderman","year":"1995","unstructured":"Alderman, E., & Kennedy, C. (1995). Right to privacy. New York: Vintage Books."},{"key":"9397_CR2","first-page":"1319","volume":"78","author":"L Alexander","year":"1984","unstructured":"Alexander, L. (1984). The impossibility of a free speech principle. Northwestern University Law Review, 78, 1319\u20131357.","journal-title":"Northwestern University Law Review"},{"key":"9397_CR3","volume-title":"Why privacy isn\u2019t everything: Feminist reflections on personal accountability","author":"A Allen","year":"2003","unstructured":"Allen, A. (2003). Why privacy isn\u2019t everything: Feminist reflections on personal accountability. Lanham, MD: Rowman & Littlefield."},{"key":"9397_CR4","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780195141375.001.0001","volume-title":"Unpopular privacy: What must we hide?","author":"A Allen","year":"2011","unstructured":"Allen, A. (2011). Unpopular privacy: What must we hide?. Oxford: Oxford University Press."},{"key":"9397_CR5","volume-title":"Privacy, security, and accountability","author":"A Allen","year":"2015","unstructured":"Allen, A. (2015). The duty to protect your own privacy. In A. D. Moore (Ed.), Privacy, security, and accountability. Lanham, MD: Rowman and Littlefield International."},{"key":"9397_CR6","unstructured":"Barns v. Glen Theater, Inc., 501 U.S. 560 (1991)."},{"key":"9397_CR7","volume-title":"The morality of consent","author":"A Bickel","year":"1975","unstructured":"Bickel, A. (1975). The morality of consent. New Haven: Yale University Press."},{"key":"9397_CR8","first-page":"866","volume":"35","author":"HL Black","year":"1960","unstructured":"Black, H. L. (1960). The bill of rights. New York University Law Review, 35, 866.","journal-title":"New York University Law Review"},{"key":"9397_CR9","doi-asserted-by":"crossref","unstructured":"Blasi, V. (1977). The checking value in first amendment theory. American Bar Foundation Research Journal, 521\u2013649.","DOI":"10.1111\/j.1747-4469.1977.tb01008.x"},{"key":"9397_CR10","volume-title":"Other people\u2019s money, and how the bankers use it","author":"L Brandeis","year":"1914","unstructured":"Brandeis, L. (1914). Other people\u2019s money, and how the bankers use it. New York: F.A. Stokes."},{"key":"9397_CR11","unstructured":"Campbell v Mirror Group Newspapers Ltd (2004) 2 AC 457."},{"key":"9397_CR12","doi-asserted-by":"crossref","DOI":"10.7591\/9781501721243","volume-title":"In pursuit of privacy: Law, ethics, and the rise of technology","author":"JW DeCew","year":"1997","unstructured":"DeCew, J. W. (1997). In pursuit of privacy: Law, ethics, and the rise of technology. Ithaca, NY: Cornell University Press."},{"key":"9397_CR13","first-page":"113","volume-title":"Public and private in social life","author":"R Gavison","year":"1983","unstructured":"Gavison, R. (1983). Information control: Availability and control. In S. Benn & G. Gaus (Eds.), Public and private in social life (pp. 113\u2013134). New York: St. Martin\u2019s Press."},{"key":"9397_CR14","volume-title":"The power of photography: How photographs changed our lives","author":"V Goldberg","year":"1991","unstructured":"Goldberg, V. (1991). The power of photography: How photographs changed our lives. New York: Abbeville Press."},{"key":"9397_CR15","unstructured":"Greenawalt, K. (2005). Rationales for freedom of speech. In\u00a0A. Moore (Ed.), Information ethics: Privacy, property, and power. Seattle: University of Washington Press."},{"key":"9397_CR16","first-page":"169","volume-title":"Privacy","author":"H Gross","year":"1971","unstructured":"Gross, H. (1971). Privacy and autonomy. In J. R. Pennock & J. W. Chapman (Eds.), Privacy (pp. 169\u2013181). New York: Atherton Press."},{"key":"9397_CR17","volume-title":"Comparative defamation and privacy law","author":"K Hughes","year":"2016","unstructured":"Hughes, K., & Richards, N. (2016). The Atlantic divide on privacy and free speech. In A. T. Kenyon (Ed.), Comparative defamation and privacy law. Cambridge: Cambridge University Press."},{"key":"9397_CR18","doi-asserted-by":"crossref","unstructured":"Kant, I. (1974). On the old saw: That may be right in theory but it won\u2019t work in practice (E. B. Ashton, Trans.). Philadelphia: University of Pennsylvania Press (first published in 1793).","DOI":"10.9783\/9780812209495"},{"key":"9397_CR19","doi-asserted-by":"crossref","first-page":"627","DOI":"10.2307\/1073208","volume":"76","author":"A Kozinski","year":"1990","unstructured":"Kozinski, A., & Banner, S. (1990). Who\u2019s afraid of commercial speech. Virginia Law Review, 76, 627.","journal-title":"Virginia Law Review"},{"key":"9397_CR20","unstructured":"McClurg, A. (1994\u20131995). Bringing privacy law out of the closet: A Tort theory of liability for intrusions in public places. North Carolina Law Review, 73, 989\u20131088."},{"key":"9397_CR21","doi-asserted-by":"crossref","unstructured":"Meiklejohn, A. (1961). The first amendment is an absolute. Supreme Court Review, 245\u2013266.","DOI":"10.1086\/scr.1961.3108719"},{"key":"9397_CR22","volume-title":"On liberty","author":"JS Mill","year":"1859","unstructured":"Mill, J. S. (1859). On liberty. London: Longman, Roberts & Green."},{"key":"9397_CR23","volume-title":"Privacy, security, and accountability","author":"D Mokrosinska","year":"2015","unstructured":"Mokrosinska, D. (2015). Privacy, freedom of speech, and the sexual lives of office holders. In A. D. Moore (Ed.), Privacy, security, and accountability. Lanham, MD: Rowman and Littlefield International."},{"key":"9397_CR24","first-page":"215","volume":"40","author":"AD Moore","year":"2003","unstructured":"Moore, A. D. (2003). Privacy: Its meaning and value. American Philosophical Quarterly., 40, 215\u2013227.","journal-title":"American Philosophical Quarterly."},{"key":"9397_CR25","first-page":"809","volume":"44","author":"AD Moore","year":"2007","unstructured":"Moore, A. D. (2007). Toward informational privacy rights. San Diego Law Review, 44, 809\u2013845.","journal-title":"San Diego Law Review"},{"key":"9397_CR26","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1111\/j.1467-9833.2008.00433.x","volume":"39","author":"AD Moore","year":"2008","unstructured":"Moore, A. D. (2008). Defining privacy. Journal of Social Philosophy, 39, 411\u2013428.","journal-title":"Journal of Social Philosophy"},{"key":"9397_CR27","volume-title":"Privacy rights: Moral and legal foundations","author":"AD Moore","year":"2010","unstructured":"Moore, A. D. (2010). Privacy rights: Moral and legal foundations. University Park, PA: Penn State University Press."},{"key":"9397_CR28","first-page":"141","volume":"25","author":"AD Moore","year":"2011","unstructured":"Moore, A. D. (2011). Privacy, security, and government surveillance: Wikileaks and the new accountability. Public Affairs Quarterly, 25, 141\u2013156.","journal-title":"Public Affairs Quarterly"},{"key":"9397_CR29","doi-asserted-by":"crossref","first-page":"21","DOI":"10.3172\/JIE.22.1.21","volume":"22","author":"AD Moore","year":"2013","unstructured":"Moore, A. D. (2013). Privacy, speech, and the law. Journal of Information Ethics, 22, 21\u201343.","journal-title":"Journal of Information Ethics"},{"key":"9397_CR30","volume-title":"The social dimensions of privacy","author":"AD Moore","year":"2015","unstructured":"Moore, A. D., Newell, B. C., & Metoyer, C. (2015). Privacy in the family. In B. Roessler & D. Mokrosinska (Eds.), The social dimensions of privacy. Cambridge: Cambridge University Press."},{"key":"9397_CR31","volume-title":"Readings in world anthropology","author":"GP Murdock","year":"1955","unstructured":"Murdock, G. P. (1955). The universals of culture. In A. Hoebel, J. D. Jennings, & E. R. Smith (Eds.), Readings in world anthropology. New York: McGraw-Hill."},{"key":"9397_CR32","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2009","unstructured":"Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press."},{"key":"9397_CR33","volume-title":"Obfuscation: A user\u2019s guide for privacy and protest","author":"H Nissenbaum","year":"2015","unstructured":"Nissenbaum, H., & Brunton, F. (2015). Obfuscation: A user\u2019s guide for privacy and protest. Cambridge, MA: MIT Press."},{"key":"9397_CR34","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511841286","volume-title":"Woman and human development: The capabilities approach","author":"MC Nussbaum","year":"2000","unstructured":"Nussbaum, M. C. (2000). Woman and human development: The capabilities approach. Cambridge: Cambridge University Press."},{"key":"9397_CR35","first-page":"269","volume":"12","author":"WA Parent","year":"1983","unstructured":"Parent, W. A. (1983). Privacy, morality, and the law. Philosophy & Public Affairs, 12, 269\u2013288.","journal-title":"Philosophy & Public Affairs"},{"key":"9397_CR36","first-page":"275","volume":"27","author":"RB Parker","year":"1974","unstructured":"Parker, R. B. (1974). A definition of privacy. Rutgers Law Review., 27, 275\u2013296.","journal-title":"Rutgers Law Review."},{"key":"9397_CR37","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1017\/CBO9781316402467.008","volume-title":"Comparative defamation and privacy law","author":"G Phillipson","year":"2016","unstructured":"Phillipson, G. (2016). Press freedom, the public interest and privacy. In A. Kenyon (Ed.), Comparative defamation and privacy law (pp. 136\u2013163). Cambridge: Cambridge University Press."},{"key":"9397_CR38","first-page":"323","volume":"4","author":"J Rachels","year":"1975","unstructured":"Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4, 323\u2013333.","journal-title":"Philosophy & Public Affairs"},{"key":"9397_CR39","doi-asserted-by":"crossref","unstructured":"Rawls, J. (1971).\u00a0A theory of justice. Cambridge: Harvard University Press.","DOI":"10.4159\/9780674042605"},{"key":"9397_CR40","doi-asserted-by":"crossref","first-page":"113","DOI":"10.2307\/1228513","volume":"34","author":"M Redish","year":"1981","unstructured":"Redish, M. (1981). The content distinction in first amendment analysis. Stanford Law Review, 34, 113.","journal-title":"Stanford Law Review"},{"key":"9397_CR41","doi-asserted-by":"crossref","first-page":"591","DOI":"10.2307\/3311836","volume":"130","author":"M Redish","year":"1982","unstructured":"Redish, M. (1982). The value of free speech. University of Pennsylvania Law Review, 130, 591.","journal-title":"University of Pennsylvania Law Review"},{"key":"9397_CR42","unstructured":"Roberts, J. M., & Gregor, T. (1971). Privacy: A cultural view. In J. R. Pennock & J. W. Chapman (Eds.), Privacy: Nomos XIII (pp. 199\u2013225).\u00a0New York: Atherton Press."},{"key":"9397_CR43","unstructured":"R\u00f6ssler, B. (2005). The value of privacy (R. D. V. Glasgow, Trans.). Cambridge: Polity."},{"key":"9397_CR44","first-page":"216","volume":"1","author":"T Scanlon","year":"1972","unstructured":"Scanlon, T. (1972). A theory of freedom of expression. Philosophy & Public Affairs, 1, 216.","journal-title":"Philosophy & Public Affairs"},{"key":"9397_CR45","volume-title":"Free speech: A philosophical enquiry","author":"F Schauer","year":"1982","unstructured":"Schauer, F. (1982). Free speech: A philosophical enquiry. Cambridge: Cambridge University Press."},{"key":"9397_CR46","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1086\/224567","volume":"73","author":"B Schwartz","year":"1968","unstructured":"Schwartz, B. (1968). The social psychology of privacy. American Journal of Sociology, 73, 741\u2013752.","journal-title":"American Journal of Sociology"},{"key":"9397_CR47","first-page":"123","volume":"96","author":"D Solove","year":"2007","unstructured":"Solove, D., & Richards, N. (2007). Privacy\u2019s other path: Recovering the law of confidentiality. Georgetown Law Journal, 96, 123.","journal-title":"Georgetown Law Journal"},{"key":"9397_CR48","volume-title":"Essays: Scientific, political, and speculative","author":"H Spencer","year":"1904","unstructured":"Spencer, H. (1904). Essays: Scientific, political, and speculative (Vol. 3). New York: D. Appleton and Company."},{"key":"9397_CR49","unstructured":"Spiro, H. J. (1971). Privacy in comparative perspective. In J. R. Pennock & J. W. Chapman (Eds.), Privacy: Nomos XIII (pp. 121\u2013148). New York: Atherton Press."},{"key":"9397_CR50","doi-asserted-by":"crossref","first-page":"1072","DOI":"10.1111\/1467-8624.00210","volume":"71","author":"H Stattin","year":"2000","unstructured":"Stattin, H., & Kerr, M. (2000). Parental monitoring: A reinterpretation. Child Development, 71, 1072\u20131085.","journal-title":"Child Development"},{"key":"9397_CR51","first-page":"631","volume":"26","author":"P Stewart","year":"1974","unstructured":"Stewart, P. (1974). Or of the press. Hastings Law Journal, 26, 631.","journal-title":"Hastings Law Journal"},{"key":"9397_CR52","doi-asserted-by":"crossref","unstructured":"Sunstein, C. (1986). Pornography and the first amendment. Duke Law Journal, 1986,\u00a0589\u2013627.","DOI":"10.2307\/1372485"},{"issue":"3","key":"9397_CR53","first-page":"555","volume":"83","author":"C Sunstein","year":"1989","unstructured":"Sunstein, C. (1989). Low value speech revisited). Northwestern University Law Review, 83(3), 555\u2013561.","journal-title":"Northwestern University Law Review"},{"key":"9397_CR54","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.2307\/1229510","volume":"52","author":"E Volokh","year":"2000","unstructured":"Volokh, E. (2000). Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you. Stanford Law Review, 52, 1049\u20131124.","journal-title":"Stanford Law Review"},{"key":"9397_CR55","doi-asserted-by":"crossref","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"SD Warren","year":"1890","unstructured":"Warren, S. D., & Brandeis, L. (1890). The right to privacy. The Harvard Law Review, 4, 193\u2013220.","journal-title":"The Harvard Law Review"},{"key":"9397_CR56","volume-title":"Privacy and freedom","author":"A Westin","year":"1967","unstructured":"Westin, A. (1967). Privacy and freedom. New York: Atheneum."},{"key":"9397_CR57","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1086\/scr.1985.3109499","volume":"149","author":"G Wright","year":"1985","unstructured":"Wright, G. (1985). A rationale from J. S. Mill for the free speech clause. Supreme Court Review, 149, 149\u2013178.","journal-title":"Supreme Court Review"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9397-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-016-9397-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9397-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T16:52:56Z","timestamp":1655398376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-016-9397-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["9397"],"URL":"https:\/\/doi.org\/10.1007\/s10676-016-9397-x","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3]]}}}