{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:38:22Z","timestamp":1761896302744},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,4,30]],"date-time":"2016-04-30T00:00:00Z","timestamp":1461974400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10676-016-9399-8","type":"journal-article","created":{"date-parts":[[2016,4,30]],"date-time":"2016-04-30T02:49:19Z","timestamp":1461984559000},"page":"131-148","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Profiling vandalism in Wikipedia: A Schauerian approach to justification"],"prefix":"10.1007","volume":"18","author":[{"given":"Paul B.","family":"de Laat","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,30]]},"reference":[{"key":"9399_CR1","doi-asserted-by":"crossref","unstructured":"Adler, B. T., de Alfaro, L., Mola-Velasco, S. M., Rosso, P., & West, A. G. (2011) Wikipedia vandalism detection: Combining natural language, metadata, and reputation features. In CICLing \u201811: Proceedings of the 12th international conference on intelligent text processing and computational linguistics, LNCS 6609 (pp. 277\u2013288), Tokyo, Japan.","DOI":"10.1007\/978-3-642-19437-5_23"},{"key":"9399_CR2","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-1-4020-6914-7_4","volume-title":"Profiling the European citizen, cross-disciplinary perspectives","author":"B Anrig","year":"2008","unstructured":"Anrig, B., Browne, W., & Gasson, M. (2008). The role of algorithms in profiling. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European citizen, cross-disciplinary perspectives (pp. 65\u201387). Berlin: Springer."},{"key":"9399_CR3","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-3-642-30487-3_3","volume-title":"Discrimination and Privacy in the Information Society: Data mining and profiling in large databases","author":"T Calders","year":"2013","unstructured":"Calders, T., & Zliobaite, I. (2013). Why unbiased computational processes can lead to discriminative decision procedures. In B. Custers, T. Calders, B. Schermer, & T. Zarsky (Eds.), Discrimination and Privacy in the Information Society: Data mining and profiling in large databases (pp. 43\u201357). Berlin: Springer."},{"key":"9399_CR4","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-1-4020-6914-7_3","volume-title":"Profiling the European citizen, cross-disciplinary perspectives","author":"A Canhoto","year":"2008","unstructured":"Canhoto, A., & Backhouse, J. (2008). General description of the process of behavioural profiling. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European citizen, cross-disciplinary perspectives (pp. 47\u201363). Berlin: Springer."},{"key":"9399_CR5","doi-asserted-by":"crossref","unstructured":"de Laat, P. B. (2012). Navigating between chaos and bureaucracy: Backgrounding trust in open content communities. In K. Aberer et al. (Eds.), Social informatics; 4th international conference, SocInfo 2012; Lausanne, Switzerland, December 5\u20137, 2012; Proceedings, LNCS 7710 (pp. 534\u2013557). Berlin: Springer.","DOI":"10.1007\/978-3-642-35386-4_42"},{"issue":"3","key":"9399_CR6","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s10676-015-9366-9","volume":"17","author":"PB Laat de","year":"2015","unstructured":"de Laat, P. B. (2015). The use of software tools and autonomous bots against vandalism: Eroding Wikipedia\u2019s moral order? Ethics and Information Technology, 17(3), 175\u2013188.","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9399_CR7","first-page":"583","volume":"75","author":"SW Dummer","year":"2005","unstructured":"Dummer, S. W. (2005). Secure flight and dataveillance, a new type of civil liberties erosion: Stripping your rights when you don\u2019t even know it (Comment). Mississippi Law Journal, 75(2), 583\u2013618.","journal-title":"Mississippi Law Journal"},{"issue":"3","key":"9399_CR8","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1080\/08109020802270182","volume":"26","author":"WH Dutton","year":"2008","unstructured":"Dutton, W. H. (2008). The wisdom of collaborative network organizations: Capturing the value of networked individuals. Prometheus, 26(3), 211\u2013230.","journal-title":"Prometheus"},{"key":"9399_CR9","doi-asserted-by":"crossref","unstructured":"Epple, D., Romano, R., Sinan Sarp\u00e7a, & Sieg, H. (2006) Profiling in bargaining over college tuition. The Economic Journal, 116(515), F459\u2013F479.","DOI":"10.1111\/j.1468-0297.2006.01132.x"},{"key":"9399_CR10","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-3-642-30487-3_13","volume-title":"Discrimination and Privacy in the Information Society: Data mining and profiling in large databases","author":"S Hajian","year":"2013","unstructured":"Hajian, S., & Domingo-Ferrer, J. (2013). Direct and indirect discrimination prevention methods. In B. Custers, T. Calders, B. Schermer, & T. Zarsky (Eds.), Discrimination and Privacy in the Information Society: Data mining and profiling in large databases (pp. 241\u2013254). Berlin: Springer."},{"key":"9399_CR11","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-1-4020-6914-7_2","volume-title":"Profiling the European citizen, cross-disciplinary perspectives","author":"M Hildebrandt","year":"2008","unstructured":"Hildebrandt, M. (2008). Defining profiling: A new type of knowledge? In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European citizen, cross-disciplinary perspectives (pp. 17\u201345). Berlin: Springer."},{"key":"9399_CR12","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-642-30487-3_12","volume-title":"Discrimination and Privacy in the Information Society: Data mining and profiling in large databases","author":"F Kamiran","year":"2013","unstructured":"Kamiran, F., Calders, T., & Pechenizkiy, M. (2013). Techniques for discrimination-free predictive models. In B. Custers, T. Calders, B. Schermer, & T. Zarsky (Eds.), Discrimination and Privacy in the Information Society: Data mining and profiling in large databases (pp. 223\u2013239). Berlin: Springer."},{"key":"9399_CR13","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/978-3-642-30487-3_8","volume-title":"Discrimination and Privacy in the Information Society: Data mining and profiling in large databases","author":"F Kamiran","year":"2013","unstructured":"Kamiran, F., & Zliobaite, I. (2013). Explainable and non-explainable discrimination in classification. In B. Custers, T. Calders, B. Schermer, & T. Zarsky (Eds.), Discrimination and Privacy in the Information Society: Data mining and profiling in large databases (pp. 155\u2013170). Berlin: Springer."},{"issue":"3","key":"9399_CR14","first-page":"1385","volume":"61","author":"LA Kite","year":"2004","unstructured":"Kite, L. A. (2004). Red flagging civil liberties and due process rights of airline passengers: Will a redesigned CAPPS II system meet the constitutional challenge? Washington and Lee Law Review, 61(3), 1385\u20131436.","journal-title":"Washington and Lee Law Review"},{"key":"9399_CR15","doi-asserted-by":"crossref","unstructured":"Kumar, S, Spezzano, F., & Subrahmanian, V. S. (2015) VEWS: A Wikipedia vandal early warning system. Obtained from http:\/\/arxiv.org\/abs\/1507.01272 .","DOI":"10.1145\/2783258.2783367"},{"issue":"2","key":"9399_CR16","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1111\/j.1088-4963.2004.00009.x","volume":"32","author":"M Risse","year":"2004","unstructured":"Risse, M., & Zeckhauser, R. (2004). Racial profiling. Philosophy & Public Affairs, 32(2), 131\u2013170.","journal-title":"Philosophy & Public Affairs"},{"key":"9399_CR17","volume-title":"Playing by the rules: A philosophical examination of rule-based decision-making in law and life","author":"F Schauer","year":"1991","unstructured":"Schauer, F. (1991). Playing by the rules: A philosophical examination of rule-based decision-making in law and life. Oxford: Clarendon Press."},{"key":"9399_CR18","volume-title":"Profiles, probabilities, and stereotypes","author":"F Schauer","year":"2003","unstructured":"Schauer, F. (2003). Profiles, probabilities, and stereotypes. Cambridge, Mass.: The Belknap Press of Harvard University Press."},{"key":"9399_CR19","unstructured":"Schneier, B. (2005). Profiling. On his personal blog called Schneier on Security. Obtained from https:\/\/www.schneier.com\/blog\/archives\/2005\/07\/profiling.html ."},{"key":"9399_CR20","unstructured":"Schneier, B. (2012). The trouble with airport profiling. On his personal blog called Schneier on Security. Obtained from https:\/\/www.schneier.com\/essays\/archives\/2012\/05\/the_trouble_with_air.html"},{"key":"9399_CR21","volume-title":"Data and goliath: The hidden battles to collect your data and control your world","author":"B Schneier","year":"2015","unstructured":"Schneier, B. (2015). Data and goliath: The hidden battles to collect your data and control your world. New York, London: W.W. Norton."},{"issue":"1","key":"9399_CR22","first-page":"3","volume":"40","author":"DJ Steinbock","year":"2005","unstructured":"Steinbock, D. J. (2005). data matching, data mining, and due process. Georgia Law Review, 40(1), 3\u201384.","journal-title":"Georgia Law Review"},{"key":"9399_CR23","unstructured":"Tukdi, I. (2007). Transatlantic turbulence: The European Union and United States Debate Over Passenger Data. Globalex, Hauser Global Law School Program, NYU School of Law. Obtained from http:\/\/www.nyulawglobal.org\/globalex\/Passenger_Data_US_EU.html"},{"key":"9399_CR24","unstructured":"White House Commission on Aviation Safety and Security (1997) Final Report to President Clinton. Washington D.C.: The White House. Obtained from http:\/\/fas.org\/irp\/threat\/212fin~1.html"},{"issue":"3","key":"9399_CR25","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s12599-015-0378-0","volume":"57","author":"T W\u00f6hner","year":"2015","unstructured":"W\u00f6hner, T., K\u00f6hler, D. W. I. S., & Peters, R. (2015). Managed Wikis. Business & Information Systems Engineering, 57(3), 155\u2013166.","journal-title":"Business & Information Systems Engineering"},{"issue":"2","key":"9399_CR26","first-page":"285","volume":"116","author":"TZ Zarski","year":"2011","unstructured":"Zarski, T. Z. (2011). Governmental data mining and its alternatives. Penn State Law Review, 116(2), 285\u2013330.","journal-title":"Penn State Law Review"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9399-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-016-9399-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9399-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T05:19:22Z","timestamp":1567833562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-016-9399-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,30]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["9399"],"URL":"https:\/\/doi.org\/10.1007\/s10676-016-9399-8","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,30]]}}}