{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T17:23:03Z","timestamp":1772126583174,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T00:00:00Z","timestamp":1471996800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s10676-016-9410-4","type":"journal-article","created":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T12:13:36Z","timestamp":1472040816000},"page":"39-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Privacy exchanges: restoring consent in privacy self-management"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3578-5376","authenticated-orcid":false,"given":"Mario","family":"Pascalev","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,24]]},"reference":[{"key":"9410_CR1","unstructured":"Apache Software Foundation. (2014). Welcome to Apache\u2122 Hadoop\u00ae! https:\/\/hadoop.apache.org\/index.pdf . Accessed 14 January 2016."},{"key":"9410_CR2","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1017\/CBO9781107590205.004","volume-title":"Privacy, big data, and the public good: Frameworks for engagement","author":"S Barocas","year":"2014","unstructured":"Barocas, S., & Nissenbaum, H. (2014). Big data\u2019s end run around anonymity and consent. In J. Lane, V. Stodden, S. Bender, & H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement (pp. 44\u201375). New York: Cambridge University Press."},{"key":"9410_CR3","unstructured":"Beal, V. (2016). Public key cryptography. http:\/\/www.webopedia.com\/TERM\/P\/public_key_cryptography.html . Accessed 17 Aug 2016."},{"key":"9410_CR4","volume-title":"Principles of biomedical ethics","author":"TL Beauchamp","year":"2009","unstructured":"Beauchamp, T. L., & Childress, J. F. (2009). Principles of biomedical ethics. New York: Oxford University Press."},{"key":"9410_CR5","unstructured":"Boninger, F., & Molnar, A. (2016). Learning to be watched: Surveillance culture at school. The eighteenth annual report on schoolhouse commercialism trends. National Center for Education Policy at the University of Colorado at Boulder. http:\/\/nepc.colorado.edu\/files\/publications\/RB%20Boninger-Molnar%20Trends.pdf . Accessed 17 May 2016."},{"key":"9410_CR6","first-page":"164","volume-title":"Privacy, due process and the computational turn: The philosophy of law meets the philosophy of technology","author":"F Brunton","year":"2013","unstructured":"Brunton, F., & Nissenbaum, H. (2013). Political and ethical perspectives on data obfuscation. In M. Hildebrandt & K. De Vries (Eds.), Privacy, due process and the computational turn: The philosophy of law meets the philosophy of technology (pp. 164\u2013188). New York: Routledge."},{"key":"9410_CR7","first-page":"995","volume":"82","author":"R Calo","year":"2014","unstructured":"Calo, R. (2014). Digital market manipulation. George Washington Law Review, 82, 995\u20131051.","journal-title":"George Washington Law Review"},{"key":"9410_CR8","unstructured":"Cook, T. (2016). A message to our customers. https:\/\/www.apple.com\/customer-letter\/ . Accessed 17 May 2016."},{"key":"9410_CR9","unstructured":"Dwoskin, E. (2016). A shift away from big data: Tech firms race to protect users. The Washington Post. May 23. A1; A12."},{"key":"9410_CR10","unstructured":"Earle, G. (2016). Google\u2019s extraordinary access to Obama revealed as White House visitor logs show 427 meetings between company and administration officials. Daily Mail. May 17, 2016. http:\/\/www.dailymail.co.uk\/news\/article-3595166\/Google-s-extraordinary-access-revealed-White-House-visitor-logs-meeting-meeting-company-execs-Obama-administration-officials.html#ixzz492RElb9J . Accessed 17 May 2016."},{"key":"9410_CR11","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1038\/nature07634","volume":"457","author":"J Ginsburg","year":"2009","unstructured":"Ginsburg, J., et al. (2009). Detecting influenza epidemics using search engine query data. Nature, 457, 1012\u20131014.","journal-title":"Nature"},{"key":"9410_CR12","unstructured":"Goldberg, R. (2016). Lack of trust in internet privacy and security may deter economic and other online activities. May 13, 2016. https:\/\/www.ntia.doc.gov\/blog\/2016\/lack-trust-internet-privacy-and-security-may-deter-economic-and-other-online-activities . Accessed 17 May 2016."},{"key":"9410_CR13","first-page":"657","volume":"46","author":"W Harzog","year":"2012","unstructured":"Harzog, W. (2012). Chain-link confidentiality. Georgia Law Review, 46, 657\u2013704.","journal-title":"Georgia Law Review"},{"key":"9410_CR14","volume-title":"Pax technica: How the internet of things may set us free or lock us up","author":"P Howard","year":"2015","unstructured":"Howard, P. (2015). Pax technica: How the internet of things may set us free or lock us up. New Haven: Yale University Press."},{"key":"9410_CR15","volume-title":"Ethics of Big Data: Balancing risk and innovation","author":"D Kord","year":"2012","unstructured":"Kord, D., & Patterson, D. (2012). Ethics of Big Data: Balancing risk and innovation. Sebastopol, CA: O\u2019Reilly."},{"key":"9410_CR16","unstructured":"Madrigal, A. (2012). If it was your job to read privacy policies for 8\u00a0h per day, it would take you 76 work days to complete the task. http:\/\/www.theatlantic.com\/technology\/archive\/2012\/03\/reading-the-privacy-policies-you-encounter-in-a-year-would-take-76-work-days\/253851\/ . Accessed 14 Jan 2016."},{"key":"9410_CR17","volume-title":"Big Data: A revolution that will transform how we live, work, and think","author":"V Mayer-Schonberger","year":"2013","unstructured":"Mayer-Schonberger, V., & Cukier, K. (2013). Big Data: A revolution that will transform how we live, work, and think. New York: Houghton Mifflin Harcourt."},{"key":"9410_CR18","first-page":"1702","volume":"57","author":"P Ohm","year":"2010","unstructured":"Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57, 1702\u20131777.","journal-title":"UCLA Law Review"},{"key":"9410_CR19","volume-title":"Intellectual privacy: Rethinking civil liberties in the digital age","author":"N Richards","year":"2014","unstructured":"Richards, N. (2014). Intellectual privacy: Rethinking civil liberties in the digital age. New York: Oxford University Press."},{"key":"9410_CR20","volume-title":"Data and Goliath: The hidden battles to capture your data and control your world","author":"B Schneier","year":"2015","unstructured":"Schneier, B. (2015). Data and Goliath: The hidden battles to capture your data and control your world. New York: W.W. Norton."},{"key":"9410_CR21","first-page":"1880","volume":"126","author":"DJ Solove","year":"2013","unstructured":"Solove, D. J. (2013). Privacy self-management and the consent paradox. Harvard Law Review, 126, 1880\u20131903.","journal-title":"Harvard Law Review"},{"key":"9410_CR22","unstructured":"Strauss, V. (2015). Report: Big education firms spend millions lobbying for pro-testing policies. The Washington Post. March 30, 2015. https:\/\/www.washingtonpost.com\/news\/answer-sheet\/wp\/2015\/03\/30\/report-big-education-firms-spend-millions-lobbying-for-pro-testing-policies\/ . Accessed 17 May 2016."},{"key":"9410_CR23","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1080\/15236803.1998.12022042","volume":"4","author":"JJ Thomson","year":"1975","unstructured":"Thomson, J. J. (1975). The right to privacy. Philosophy and Public Affairs, 4, 295\u2013314.","journal-title":"Philosophy and Public Affairs"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9410-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-016-9410-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9410-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9410-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T18:52:08Z","timestamp":1568314328000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-016-9410-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,24]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["9410"],"URL":"https:\/\/doi.org\/10.1007\/s10676-016-9410-4","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,24]]}}}