{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T03:29:21Z","timestamp":1768793361730,"version":"3.49.0"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,6,21]],"date-time":"2016-06-21T00:00:00Z","timestamp":1466467200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"FWO (Flemish Research Foundation)","award":["G048214N"],"award-info":[{"award-number":["G048214N"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s10676-016-9405-1","type":"journal-article","created":{"date-parts":[[2016,6,22]],"date-time":"2016-06-22T07:24:50Z","timestamp":1466580290000},"page":"175-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["\u2018I keep a close watch on this child of mine\u2019: a moral critique of other-tracking apps"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6984-8793","authenticated-orcid":false,"given":"Katleen","family":"Gabriels","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,21]]},"reference":[{"issue":"3","key":"9405_CR1","doi-asserted-by":"crossref","first-page":"401","DOI":"10.24908\/ss.v12i3.4966","volume":"12","author":"CM Barron","year":"2014","unstructured":"Barron, C. M. (2014). \u2018I had no credit to ring you back\u2019: Children\u2019s strategies of negotiation and resistance to parental surveillance via mobile phones. Surveillance & Society, 12(3), 401\u2013413.","journal-title":"Surveillance & Society"},{"key":"9405_CR2","doi-asserted-by":"crossref","DOI":"10.7312\/baud12100","volume-title":"The vital illusion (The Wellek library lectures)","author":"J Baudrillard","year":"2000","unstructured":"Baudrillard, J. (2000). The vital illusion (The Wellek library lectures). New York: Columbia University Press."},{"key":"9405_CR3","volume-title":"The panopticon writings","author":"J Bentham","year":"1995","unstructured":"Bentham, J. (1995). The panopticon writings. London: Verso."},{"key":"9405_CR4","first-page":"1221","volume":"44","author":"G Bernstein","year":"2010","unstructured":"Bernstein, G., & Triger, Z. (2010). Over-parenting. University of California Davis Law Review, 44, 1221\u20131279.","journal-title":"University of California Davis Law Review"},{"key":"9405_CR5","volume-title":"It\u2019s complicated. The social lives of networked teens","author":"D Boyd","year":"2014","unstructured":"Boyd, D. (2014). It\u2019s complicated. The social lives of networked teens. New Haven, CT: Yale University Press."},{"issue":"2","key":"9405_CR6","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1177\/0272431699019002001","volume":"19","author":"G Carlo","year":"1999","unstructured":"Carlo, G., Fabes, R. A., Laible, D., & Kupanoff, K. (1999). Early adolescence and prosocial\/moral behavior II: The role of social and contextual influences. Journal of Early Adolescence, 19(2), 133\u2013147.","journal-title":"Journal of Early Adolescence"},{"key":"9405_CR7","doi-asserted-by":"crossref","unstructured":"Clark, L. S. (2013\/2014). The parent app: Understanding families in the digital age. Oxford: Oxford University Press.","DOI":"10.1093\/acprof:oso\/9780199899616.001.0001"},{"issue":"4","key":"9405_CR8","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1177\/1367549415584857","volume":"18","author":"K Crawford","year":"2015","unstructured":"Crawford, K., Lingel, J., & Karppi, T. (2015). Our metrics, our selves: A hundred years of self-tracking from the weight scale to the wrist wearable device. European Journal of Cultural Studies, 18(4), 479\u2013496.","journal-title":"European Journal of Cultural Studies"},{"key":"9405_CR9","unstructured":"Duhigg, C. (2012). How companies learn your secrets, February 16. http:\/\/www.nytimes.com\/2012\/02\/19\/magazine\/shopping-habits.html?_r=2&hp=&pagewanted=all . Accessed 14 Mar 2016."},{"key":"9405_CR10","first-page":"1","volume":"2015","author":"P Duysburgh","year":"2015","unstructured":"Duysburgh, P., Jansen, A., Decancq, J., Derboven, J., & Jacobs, A. (2015). \u201cWho will help me out of bed today?\u201d Creating a design space for IoT-assisted micromanagement in home care. Pervasive Health Conference, 2015, 1\u20138.","journal-title":"Pervasive Health Conference"},{"issue":"1","key":"9405_CR11","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1177\/0272431699019001001","volume":"19","author":"RA Fabes","year":"1999","unstructured":"Fabes, R. A., Carlo, G., Kupanoff, K., & Liable, D. (1999). Early adolescence and prosocial\/moral behavior I: The role of individual processes. Journal of Early Adolescence, 19(1), 5\u201316.","journal-title":"Journal of Early Adolescence"},{"key":"9405_CR12","doi-asserted-by":"crossref","unstructured":"Fahlquist, J. N. (2013). Responsibility and privacy\u2014Ethical aspects of using GPS to track children. Children & Society 29(1), 38\u201347. http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/chso.12016\/full .","DOI":"10.1111\/chso.12016"},{"key":"9405_CR13","first-page":"1","volume":"5","author":"M Fleming","year":"2005","unstructured":"Fleming, M. (2005). Adolescent autonomy: Desire, achievement and disobeying parents between early and late adolescence. Australian Journal of Education and Developmental Psychology, 5, 1\u201316.","journal-title":"Australian Journal of Education and Developmental Psychology"},{"key":"9405_CR14","volume-title":"The 4th revolution. How the infosphere is reshaping human reality","author":"L Floridi","year":"2014","unstructured":"Floridi, L. (2014). The 4th revolution. How the infosphere is reshaping human reality. Oxford: Oxford University Press."},{"key":"9405_CR15","volume-title":"Surveiller et punir: Naissance de la prison","author":"M Foucault","year":"1975","unstructured":"Foucault, M. (1975). Surveiller et punir: Naissance de la prison. Paris: Gallimard."},{"key":"9405_CR16","volume-title":"The culture of fear","author":"F Furedi","year":"2002","unstructured":"Furedi, F. (2002). The culture of fear. London: Continuum."},{"key":"9405_CR17","unstructured":"Gardner, D. (2008\/2009). Risk. The science and politics of fear. London: Virgin Books."},{"issue":"3","key":"9405_CR18","doi-asserted-by":"crossref","first-page":"301","DOI":"10.24908\/ss.v11i3.4514","volume":"11","author":"M Gregg","year":"2013","unstructured":"Gregg, M. (2013). Spousebusting: Intimacy, adultery, and surveillance technology. Surveillance & Society, 11(3), 301\u2013310.","journal-title":"Surveillance & Society"},{"issue":"1","key":"9405_CR19","doi-asserted-by":"crossref","first-page":"11","DOI":"10.5840\/pcw2001813","volume":"8","author":"L Introna","year":"2001","unstructured":"Introna, L. (2001). Virtuality and morality: On (not) being disturbed by the other. Philosophy in the Contemporary World, 8(1), 11\u201319.","journal-title":"Philosophy in the Contemporary World"},{"issue":"8","key":"9405_CR20","doi-asserted-by":"crossref","first-page":"934","DOI":"10.1177\/1363460712459314","volume":"15","author":"Y Jewkes","year":"2012","unstructured":"Jewkes, Y., & Wykes, M. (2012). Reconstructing the sexual abuse of children: \u2018cyber-paeds\u2019, panic and power. Sexualities, 15(8), 934\u2013952.","journal-title":"Sexualities"},{"key":"9405_CR21","unstructured":"Jonas, H. (1979\/1984). The imperative of responsibility. In search of an ethics for the technological age. Chicago: The University of Chicago Press."},{"key":"9405_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-016-9396-y","author":"M Lanzing","year":"2016","unstructured":"Lanzing, M. (2016). The transparent self. Ethics and Information Technology. doi: 10.1007\/s10676-016-9396-y .","journal-title":"Ethics and Information Technology"},{"key":"9405_CR23","unstructured":"Levinas, E. (1961\/1971). Totalit\u00e9 et infini \u2013 Essay sur l\u2019ext\u00e9riorit\u00e9. Kluwer Academic."},{"key":"9405_CR24","volume-title":"Qu\u2019est-ce que le virtuel?","author":"P L\u00e9vy","year":"1998","unstructured":"L\u00e9vy, P. (1998). Qu\u2019est-ce que le virtuel? Paris: La d\u00e9couverte."},{"key":"9405_CR25","unstructured":"Life360. (2015). Life360: Welcome to your new family circle. https:\/\/www.life360.com . Accessed 14 Sept 2015."},{"issue":"2","key":"9405_CR26","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1017\/jgc.2012.29","volume":"22","author":"J Locke","year":"2012","unstructured":"Locke, J., Campbell, M. A., & Kavanagh, D. J. (2012). Can a parent do too much for their child? An examination by parenting professionals of the concept of overparenting. Australian Journal of Guidance and Counseling, 22(2), 249\u2013265.","journal-title":"Australian Journal of Guidance and Counseling"},{"key":"9405_CR27","unstructured":"Madison, R. (2014). Life360 app aims to become leader in family network. Utah Business, May 21. http:\/\/www.utahbusiness.com\/articles\/view\/life360_app_aims_to_become_leader_in_family_networ . Accessed 14 Sept 2015."},{"issue":"4","key":"9405_CR28","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1080\/13504620701581612","volume":"13","author":"K Malone","year":"2007","unstructured":"Malone, K. (2007). The bubble-wrap generation: Children growing up in walled gardens. Environmental Education Research, 13(4), 513\u2013527. doi: 10.1080\/13504620701581612 .","journal-title":"Environmental Education Research"},{"key":"9405_CR29","unstructured":"Mandel, E. (2014). How the Napa earthquake affected Bay Area sleepers. The Jawbone blog, August 25. https:\/\/jawbone.com\/blog\/napa-earthquake-effect-on-sleep\/ . Accessed 14 Sept 2015."},{"issue":"3","key":"9405_CR30","doi-asserted-by":"crossref","first-page":"331","DOI":"10.24908\/ss.v1i3.3344","volume":"1","author":"S Mann","year":"2003","unstructured":"Mann, S., Nolan, J., & Wellman, B. (2003). Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & Society, 1(3), 331\u2013355.","journal-title":"Surveillance & Society"},{"key":"9405_CR31","unstructured":"Miedema, F., & Post, B. (2006). Evaluatie pilot elektronische volgsystemen: 4. Samenvatting en conclusies (final report). Nijmegen: WODC. www.wodc.nl\/images\/1255-samenvatting_tcm44-59339.pdf ."},{"key":"9405_CR32","unstructured":"Mimo. (2015). Mimo: The world\u2019s smartest baby monitor. http:\/\/mimobaby.com\/ . Accessed 14 Sept 2015."},{"key":"9405_CR33","unstructured":"Morozov, E. (2013\/2014). To save everything, click here: Technology, solutionism, and the urge to fix problems that don\u2019t exist. London: Penguin."},{"key":"9405_CR34","volume-title":"Parenting out of control: Anxious parents in uncertain times","author":"MK Nelson","year":"2010","unstructured":"Nelson, M. K. (2010). Parenting out of control: Anxious parents in uncertain times. New York: NYU Press."},{"key":"9405_CR35","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s00779-006-0078-3","volume":"11","author":"L Palen","year":"2007","unstructured":"Palen, L., & Hughes, A. (2007). When home base is not a place: Parents\u2019 use of mobile telephones. Personal and Ubiquitous Computing, 11, 339\u2013348.","journal-title":"Personal and Ubiquitous Computing"},{"key":"9405_CR36","unstructured":"Pasquale, F. (2015). The algorithmic self. The Hedgehog review: Critical reflections on contemporary culture (Vol. 17, No. 1). http:\/\/www.iasc-culture.org\/THR\/THR_article_2015_Spring_Pasquale.php ."},{"key":"9405_CR37","volume-title":"The better angels of our nature: Why violence has declined","author":"S Pinker","year":"2011","unstructured":"Pinker, S. (2011). The better angels of our nature: Why violence has declined. New York: Viking Penguin."},{"key":"9405_CR38","unstructured":"RookieDongle. (2016). RookieDongle: Protecting young drivers. https:\/\/www.rookiedongle.com\/ . Accessed 14 Mar 2016."},{"key":"9405_CR39","volume-title":"Enchanted objects: Design, human desire, and the Internet of Things","author":"D Rose","year":"2014","unstructured":"Rose, D. (2014). Enchanted objects: Design, human desire, and the Internet of Things. New York: Scribner."},{"key":"9405_CR40","unstructured":"SafeT. (2014). SafeT children tracker. http:\/\/www.safet.me . Accessed 14 Sept 2015."},{"key":"9405_CR41","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1007\/s10826-013-9716-3","volume":"23","author":"HH Schiffrin","year":"2014","unstructured":"Schiffrin, H. H., Liss, M., Miles-McLean, H., Geary, K. A., Erchull, M. J., & Tashner, T. (2014). Helping or hovering? The effects of helicopter parenting on college students\u2019 well-being. Journal of Child and Family Studies, 23, 548\u2013557.","journal-title":"Journal of Child and Family Studies"},{"key":"9405_CR42","volume-title":"Data and Goliath. The hidden battles to collect your data and control your world","author":"B Schneier","year":"2015","unstructured":"Schneier, B. (2015). Data and Goliath. The hidden battles to collect your data and control your world. London: W. W. Norton & Company."},{"key":"9405_CR43","volume-title":"Age of context: Mobile, sensors, data and the future of privacy","author":"R Scoble","year":"2014","unstructured":"Scoble, R., & Israel, S. (2014). Age of context: Mobile, sensors, data and the future of privacy. US: Patrick Brewster Press."},{"key":"9405_CR44","unstructured":"Shellenbarger, S. (2005). Tucking the kids in\u2014In the dorm: Colleges ward off overinvolved parents. The Wall Street Journal, July 28. http:\/\/www.wsj.com\/articles\/SB112250452603298007 . Accessed 21 Mar 2016."},{"key":"9405_CR45","volume-title":"The virtual","author":"R Shields","year":"2003","unstructured":"Shields, R. (2003). The virtual. London: Routledge."},{"key":"9405_CR46","volume-title":"Innovations","author":"R Silverstone","year":"2002","unstructured":"Silverstone, R. (2002). Proper distance: Towards an ethics for cyberspace. In G. Liest\u00f8l, A. Morrison, & T. Rasmussen (Eds.), Innovations. Cambridge, MA: MIT press."},{"key":"9405_CR47","volume-title":"Media and morality: On the rise of the Mediapolis","author":"R Silverstone","year":"2007","unstructured":"Silverstone, R. (2007). Media and morality: On the rise of the Mediapolis. Cambridge: Polity Press."},{"issue":"3","key":"9405_CR48","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1080\/13600834.2014.970377","volume":"23","author":"B Simpson","year":"2014","unstructured":"Simpson, B. (2014). Tracking children, constructing fear: GPS and the manufacture of family safety. Information & Communications Technology Law, 23(3), 273\u2013285. doi: 10.1080\/13600834.2014.970377 .","journal-title":"Information & Communications Technology Law"},{"issue":"4","key":"9405_CR49","doi-asserted-by":"crossref","first-page":"1072","DOI":"10.1111\/1467-8624.00210","volume":"71","author":"H Stattin","year":"2000","unstructured":"Stattin, H., & Kerr, M. (2000). Parental monitoring: A reinterpretation. Child Development, 71(4), 1072\u20131085.","journal-title":"Child Development"},{"key":"9405_CR50","doi-asserted-by":"crossref","first-page":"841","DOI":"10.2307\/1130361","volume":"57","author":"L Steinberg","year":"1986","unstructured":"Steinberg, L., & Silverberg, S. B. (1986). The vicissitudes of autonomy in early adolescence. Child Development, 57, 841\u2013851.","journal-title":"Child Development"},{"issue":"4\u20135","key":"9405_CR51","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1177\/1367549415577392","volume":"18","author":"T Striphas","year":"2015","unstructured":"Striphas, T. (2015). Algorithmic culture. European Journal of Cultural Studies, 18(4\u20135), 395\u2013412.","journal-title":"European Journal of Cultural Studies"},{"issue":"2","key":"9405_CR52","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1089\/big.2012.0002","volume":"1","author":"M Swan","year":"2013","unstructured":"Swan, M. (2013). The quantified self: Fundamental disruption in big data science and biological discovery. Big Data, 1(2), 85\u201399.","journal-title":"Big Data"},{"issue":"1","key":"9405_CR53","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/1748895813507067","volume":"15","author":"A Thumala","year":"2015","unstructured":"Thumala, A., Goold, B., & Loader, I. (2015). Tracking devices: On the reception of a novel security good. Criminology & Criminal Justice, 15(1), 3\u201322.","journal-title":"Criminology & Criminal Justice"},{"key":"9405_CR54","unstructured":"Tomas, D. (1991\/1992). Old rituals for new space: Rites de passage and Wiliam Gibson\u2019s cultural model of cyberspace. In M. Benedikt (Ed.), Cyberspace: First steps (pp. 31\u201348). Cambridge, MA: MIT Press."},{"key":"9405_CR55","unstructured":"TopSpy (2014). FAQs\u20141TopSpy cell phone spy app. http:\/\/www.1topspy.com\/faq.html . Accessed 14 Sept 2015."},{"key":"9405_CR56","unstructured":"United Nations Human Rights Office of the High Commissioner. (1989). Convention on the rights of the child, November 20. http:\/\/www.ohchr.org\/en\/professionalinterest\/pages\/crc.aspx . Accessed 14 Mar 2016."},{"key":"9405_CR57","volume-title":"Information technology and moral philosophy","year":"2008","unstructured":"van den Hoven, J., & Weckert, J. (Eds.). (2008). Information technology and moral philosophy. Cambridge: Cambridge University Press."},{"key":"9405_CR58","doi-asserted-by":"crossref","DOI":"10.7208\/chicago\/9780226852904.001.0001","volume-title":"Moralizing technology: Understanding and designing the morality of things","author":"PP Verbeek","year":"2011","unstructured":"Verbeek, P. P. (2011). Moralizing technology: Understanding and designing the morality of things. Chicago: University of Chicago press."},{"key":"9405_CR59","first-page":"175","volume-title":"Blackwell handbook of adolescence","author":"MJ Zimmer-Gembeck","year":"2003","unstructured":"Zimmer-Gembeck, M. J., & Collins, W. A. (2003). Autonomy development during adolescence. In G. R. Adams & M. Berzonsky (Eds.), Blackwell handbook of adolescence (pp. 175\u2013204). Oxford: Blackwell Publishers."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9405-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-016-9405-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9405-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T21:21:39Z","timestamp":1568064099000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-016-9405-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,21]]},"references-count":59,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["9405"],"URL":"https:\/\/doi.org\/10.1007\/s10676-016-9405-1","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,21]]}}}