{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T16:49:30Z","timestamp":1776790170380,"version":"3.51.2"},"reference-count":88,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T00:00:00Z","timestamp":1521158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10676-018-9452-x","type":"journal-article","created":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T10:29:14Z","timestamp":1521196154000},"page":"127-142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":225,"title":["Societal and ethical issues of digitization"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5161-5855","authenticated-orcid":false,"given":"Lamb\u00e8r","family":"Royakkers","sequence":"first","affiliation":[]},{"given":"Jelte","family":"Timmer","sequence":"additional","affiliation":[]},{"given":"Linda","family":"Kool","sequence":"additional","affiliation":[]},{"given":"Rinie","family":"van Est","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,16]]},"reference":[{"issue":"2","key":"9452_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.29012\/jpc.v6i2.638","volume":"6","author":"A Acquisti","year":"2014","unstructured":"Acquisti, A., Gross, R., & Stutzman, F. (2014). Face recognition and privacy in the age of augmented reality. Journal of Privacy and Confidentiality, 6(2), 1\u201320.","journal-title":"Journal of Privacy and Confidentiality"},{"issue":"4","key":"9452_CR2","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1080\/15027570.2010.536402","volume":"9","author":"R Arkin","year":"2010","unstructured":"Arkin, R. (2010). The case for ethical autonomy in unmanned systems. Journal of Military Ethics, 9(4), 332\u2013341.","journal-title":"Journal of Military Ethics"},{"issue":"Aug\/Sep","key":"9452_CR3","first-page":"18","volume":"143","author":"A Balkan","year":"2016","unstructured":"Balkan, A. (2016). Digital being. Arena Magazine, 143(Aug\/Sep),18\u201320.","journal-title":"Arena Magazine"},{"issue":"3","key":"9452_CR4","first-page":"83","volume":"87","author":"E Barbry","year":"2012","unstructured":"Barbry, E. (2012). The internet of things, legal aspects: What will change (everything). Communications & Strategies, 87(3), 83\u2013100.","journal-title":"Communications & Strategies"},{"issue":"3","key":"9452_CR5","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10676-010-9236-4","volume":"12","author":"J Borenstein","year":"2010","unstructured":"Borenstein, J., & Pearson, Y. (2010). Robot caregivers: Harbingers of expanded freedom for all? Ethics and Information Technology, 12(3), 277\u2013288.","journal-title":"Ethics and Information Technology"},{"key":"9452_CR6","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-94-007-6833-8_8","volume-title":"Emerging pervasive information and communication technologies","author":"B Brinkman","year":"2014","unstructured":"Brinkman, B. (2014). Ethics and pervasive augmented reality: Some challenges and approaches. In K. D. Pimple (Ed.), Emerging pervasive information and communication technologies, pp.\u00a0149\u2013175. Dordrecht: Springer."},{"issue":"2","key":"9452_CR7","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1093\/idpl\/ips003","volume":"2","author":"FH Cate","year":"2012","unstructured":"Cate, F. H., Kuner, C., Millard, C., & Svantesson, D. J. B. (2012). The challenge of \u201cbig data\u201d for data protection. International Data Privacy Law, 2(2), 47\u201349.","journal-title":"International Data Privacy Law"},{"key":"9452_CR8","unstructured":"Citron, D. K., & Pasquale, F. (2014). The scored society: Due process for automated predictions. Washington Law Review, 89, 1. https:\/\/ssrn.com\/abstract=2376209 ."},{"issue":"2","key":"9452_CR9","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10677-009-9186-2","volume":"13","author":"M Coeckelbergh","year":"2010","unstructured":"Coeckelbergh, M. (2010). Health care, capabilities, and AI assistive technologies. Ethical Theory and Moral Practice, 13(2), 181\u2013190.","journal-title":"Ethical Theory and Moral Practice"},{"key":"9452_CR10","doi-asserted-by":"publisher","unstructured":"Datta, A., Tschantz, M. C., & Datta, A. (2015). Automated experiments on ad privacy settings. A tale of opacity, choice, and discrimination. Proceedings on Privacy Enhancing Technologies (PoPETs 2015) (pp.\u00a092\u2013112). https:\/\/doi.org\/10.1515\/popets-2015-0007 .","DOI":"10.1515\/popets-2015-0007"},{"key":"9452_CR11","first-page":"81","volume-title":"Biometrics, Privacy and Agency","author":"PJA Hert De","year":"2012","unstructured":"De Hert, P. J. A., & Sprokkereef, A. C. J. (2012). Second generation biometrics: The ethical, legal and social context. In E. Mordini & D. Tzovaras (Eds.), Biometrics, Privacy and Agency (pp.\u00a081\u2013101). Berlin: Springer."},{"issue":"1","key":"9452_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s00146-012-0435-x","volume":"29","author":"T Dotson","year":"2014","unstructured":"Dotson, T. (2014). Authentic virtual others? The promise of post-modern technologies. AI & Society, 29(1), 11\u201321.","journal-title":"AI & Society"},{"key":"9452_CR13","unstructured":"Dwoskin, E., & Rusli, E. M. (2015). The technology that unmasks your hidden emotions. Wall Street Journal (January 28). Accessed August 1, 2017, from https:\/\/wsj.com\/articles\/startups-see-your-face-unmask-your-emotions-1422472398#:bLk8dH_DkLSJvA ."},{"key":"9452_CR14","volume-title":"Towards a new digital ethics: Data dignity and technology. Opinion 4\/2015","author":"EDPS","year":"2015","unstructured":"EDPS (2015). Towards a new digital ethics: Data dignity and technology. Opinion 4\/2015. Brussels: European Data Protection Supervisor."},{"key":"9452_CR15","unstructured":"EDPS (2016). Press Release: EDPS starts work on a new digital ethics. EDPS\/2016\/05. Accessed June 23, 2017, from https:\/\/secure.edps.europa.eu\/EDPSWEB\/webdav\/site\/mySite\/shared\/Documents\/EDPS\/PressNews\/Press\/2016\/EDPS-2016-05-EDPS_Ethics_Advisory_Group_EN.pdf ."},{"key":"9452_CR16","volume-title":"The onlife manifesto. Being human in a hyperconnected era","year":"2015","unstructured":"Floridi, L. (Ed.). (2015). The onlife manifesto. Being human in a hyperconnected era. Cham: Springer."},{"key":"9452_CR17","volume-title":"Persuasive technology: Using computers to change what we think and do","author":"BJ Fogg","year":"2002","unstructured":"Fogg, B. J. (2002). Persuasive technology: Using computers to change what we think and do. Boston: Morgan Kaufmann."},{"key":"9452_CR18","unstructured":"Frenken, K., Meelen, T., Arets, M., & Van de Glind, P. (2015). Smarter regulation for the sharing economy. The Guardian (20 May). Accessed September 17, 2017, from https:\/\/www.theguardian.com\/science\/political-science\/2015\/may\/20\/smarter-regulation-for-the-sharing-economy ."},{"key":"9452_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.eist.2017.01.003","volume":"23","author":"K Frenken","year":"2017","unstructured":"Frenken, K., & Schor, J. (2017). Putting the sharing economy into perspective. Environmental Innovation and Societal Transitions, 23, 3\u201310.","journal-title":"Environmental Innovation and Societal Transitions"},{"key":"9452_CR20","unstructured":"Geser, H. (2010). Augmenting things, establishments and human beings. In: Sociology in Switzerland: Towards cybersociety and vireal social relations. Accessed June 13, 2017, from http:\/\/socio.ch\/intcom\/t_hgeser24.pdf ."},{"key":"9452_CR21","unstructured":"Gibbs, S. (2015). Samsung\u2019s voice-recording smart TVs breach privacy law, campaigners claim. The Guardian (27 February). Accessed June 20, 2017, from http:\/\/theguardian.com\/technology\/2015\/feb\/27\/samsung-voice-recording-smart-tv-breach-privacy-law-campaigners-claim ."},{"key":"9452_CR22","doi-asserted-by":"publisher","first-page":"58","DOI":"10.3141\/2424-07","volume":"2424","author":"NJ Goodall","year":"2014","unstructured":"Goodall, N. J. (2014). Ethical decision making during automated vehicle crashes. Transportation Research Record: Journal of the Transportation Research Board, 2424, 58\u201365.","journal-title":"Transportation Research Record: Journal of the Transportation Research Board"},{"key":"9452_CR23","unstructured":"Greenberg, A., & Zetter, K. (2015). How the internet of things got hacked. Wired (28 December). Accessed June 2, 2017, from http:\/\/wired.com\/2015\/12\/2015-the-year-the-internet-of-things-got-hacked ."},{"key":"9452_CR24","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226321394.001.0001","volume-title":"How we became posthuman: Virtual bodies in cybernetics, literature, and informatics","author":"NK Hayles","year":"1999","unstructured":"Hayles, N. K. (1999). How we became posthuman: Virtual bodies in cybernetics, literature, and informatics. Chicago: University of Chicago Press."},{"issue":"2","key":"9452_CR25","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1108\/14779961211226985","volume":"10","author":"OI Heimo","year":"2012","unstructured":"Heimo, O. I., Hakkala, A., & Kimppa, K. K. (2012). How to abuse biometric passport systems. Journal of Information. Communication and Ethics in Society, 10(2), 68\u201381.","journal-title":"Journal of Information. Communication and Ethics in Society"},{"issue":"12","key":"9452_CR26","first-page":"50","volume":"15","author":"D Helbing","year":"2015","unstructured":"Helbing, D., Frey, B. S., Gigerenzer, G., Hafen, E., Hagner, M., Hofstetter, et al. (2015). Digitale demokratie statt datendiktatur. Digital manifest. Spektrum der Wissenschaft, 15(12), 50\u201361.","journal-title":"Spektrum der Wissenschaft"},{"key":"9452_CR27","unstructured":"Hern, A. (2014). Hacker fakes German minister\u2019s fingerprints using photos of her hands. The Guardian (30 December). Accessed May 15, 2017, from https:\/\/theguardian.com\/technology\/2014\/dec\/30\/hacker-fakes-german-ministers-fingerprints-using-photos-of-her-hands ."},{"key":"9452_CR28","first-page":"41","volume-title":"Digital enlightenment yearbook 2012","author":"M Hildebrandt","year":"2012","unstructured":"Hildebrandt, M. (2012). The dawn of a critical transparency right for the profiling era. In J. Bus (Ed.), Digital enlightenment yearbook 2012 (pp.\u00a041\u201356). Amsterdam: IOS Press."},{"key":"9452_CR29","doi-asserted-by":"publisher","DOI":"10.4337\/9781849808774","volume-title":"Smart technologies and the end(s) of law: Novel entanglements of law and technology","author":"M Hildebrandt","year":"2015","unstructured":"Hildebrandt, M. (2015). Smart technologies and the end(s) of law: Novel entanglements of law and technology. Cheltenham: Edward Elgar."},{"issue":"1","key":"9452_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/1468-2230.12165","volume":"79","author":"M Hildebrandt","year":"2016","unstructured":"Hildebrandt, M. (2016). Law as information in the era of data-driven agency. The Modern Law Review, 79(1), 1\u201330.","journal-title":"The Modern Law Review"},{"key":"9452_CR31","first-page":"45","volume-title":"Ubiquitous computing in the workplace. Advances in Intelligent Systems and Computing (volume 333)","author":"LM Hilty","year":"2015","unstructured":"Hilty, L. M. (2015). Ethical issues in ubiquitous computing: Three technology assessment studies revisited. In K. Kinder-Kurlanda & C. Ehrwein Nihan (Eds.), Ubiquitous computing in the workplace. Advances in Intelligent Systems and Computing (volume 333) (pp.\u00a045\u201360). Cham: Springer."},{"key":"9452_CR32","volume-title":"Dicht op de huid. Gezichts- en emotieherkenning in Nederland","author":"A Janssen","year":"2015","unstructured":"Janssen, A., Kool, L., & Timmer, J. (2015). Dicht op de huid. Gezichts- en emotieherkenning in Nederland. The Hague: Rathenau Instituut."},{"key":"9452_CR33","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-1-4471-5230-9_16","volume-title":"Security and privacy in biometrics","author":"NC Juul","year":"2013","unstructured":"Juul, N. C. (2013). Recommendation on the use of biometric technology. In P. Campisi (Ed.), Security and privacy in biometrics (pp.\u00a0415\u2013433). London: Springer."},{"key":"9452_CR34","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-007-7522-0","volume-title":"Privacy and data protection issues of biometric applications. A comparative legal analysis","author":"EJ Kindt","year":"2013","unstructured":"Kindt, E. J. (2013). Privacy and data protection issues of biometric applications. A comparative legal analysis. Dordrecht: Springer."},{"key":"9452_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4990-3","volume-title":"Ethical and social issues in the information age","author":"JM Kizza","year":"2013","unstructured":"Kizza, J. M. (2013). Ethical and social issues in the information age. London: Springer."},{"issue":"12","key":"9452_CR36","first-page":"624","volume":"80","author":"EJ Koops","year":"2005","unstructured":"Koops, E. J., & Prinsen, M. M. (2005). Glazen woning, transparant lichaam: Een toekomstblik op huisrecht en lichamelijke integriteit. Nederlands Juristenblad, 80(12), 624\u2013630.","journal-title":"Nederlands Juristenblad"},{"issue":"15","key":"9452_CR37","doi-asserted-by":"publisher","first-page":"5802","DOI":"10.1073\/pnas.1218772110","volume":"110","author":"M Kosinski","year":"2013","unstructured":"Kosinski, M., Stillwell, D., & Graepel, T. (2013). Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences, 110(15), 5802\u20135805.","journal-title":"Proceedings of the National Academy of Sciences,"},{"issue":"24","key":"9452_CR38","doi-asserted-by":"publisher","first-page":"8788","DOI":"10.1073\/pnas.1320040111","volume":"111","author":"ADI Kramer","year":"2014","unstructured":"Kramer, A. D. I., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111(24), 8788\u20138790.","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"9452_CR39","volume-title":"De kracht van platformen. Nieuwe strategie\u00ebn voor innoveren in een digitaliserende wereld","year":"2014","unstructured":"Kreijveld, M., Deuten, J., & Est, R. Van (Eds.). (2014). De kracht van platformen. Nieuwe strategie\u00ebn voor innoveren in een digitaliserende wereld. The Hague\/Deventer: Rathenau Instituut\/Vakmedianet."},{"issue":"1","key":"9452_CR40","first-page":"1","volume":"15","author":"P Lee","year":"2012","unstructured":"Lee, P. (2012). Remoteness, risk and aircrew ethos. Air Power Review, 15(1), 1\u201319.","journal-title":"Air Power Review"},{"key":"9452_CR41","volume-title":"Last child in the woods: Saving our children from nature-deficit disorder","author":"R Louv","year":"2005","unstructured":"Louv, R. (2005). Last child in the woods: Saving our children from nature-deficit disorder. Chapel Hill, NC: Algonquin Books."},{"issue":"2","key":"9452_CR42","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s12053-010-9102-6","volume":"4","author":"S Maan","year":"2011","unstructured":"Maan, S., Merkus, B., Ham, J., & Midden, C. (2011). Making it not too obvious. The effect of ambient light feedback on space heating energy consumption. Energy Efficiency, 4(2), 175\u2013183.","journal-title":"Energy Efficiency"},{"key":"9452_CR43","doi-asserted-by":"publisher","unstructured":"Madary, M., & Metzinger, T. K. (2016). Real virtuality: A code of ethical conduct. Recommendations for good scientific practice and the consumers of VR-technology. Frontiers in Robotics and AI, 3(3), https:\/\/doi.org\/10.3389\/frobt.2016.00003 .","DOI":"10.3389\/frobt.2016.00003"},{"key":"9452_CR44","volume-title":"Big data: A revolution that will transform how we live, work and think","author":"V Mayer-Schonberger","year":"2013","unstructured":"Mayer-Schonberger, V., & Cukier, K. (2013). Big data: A revolution that will transform how we live, work and think. Houghton: Mifflin Harcourt."},{"key":"9452_CR45","first-page":"423","volume":"19","author":"SD Meinrath","year":"2011","unstructured":"Meinrath, S. D., Losey, J., & Pickard, V. W. (2011). Digital feudalism: Enclosures and erasures from the digital rights management to the digital divide. Commlaw Conspectus, 19, 423\u2013479.","journal-title":"Commlaw Conspectus"},{"issue":"3","key":"9452_CR46","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1111\/j.1540-4560.2009.01613.x","volume":"65","author":"GF Melson","year":"2009","unstructured":"Melson, G. F., Kahn, P. H., Beck, A., & Friedman, B. (2009). Robotic pets in human lives: Implications for the human-animal bond and for human relationships with personified technologies. Journal of Social Issues, 65(3), 545\u2013569.","journal-title":"Journal of Social Issues"},{"key":"9452_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-94-007-3892-8","volume-title":"Second generation biometrics: The ethical, legal and social context. The International Library of Ethics, Law and Technology (volume 11)","author":"E Mordini","year":"2012","unstructured":"Mordini, E., Tzovaras, D., & Ashton, H. (2012). Introduction. In E. Mordini & D. Tzovaras (Eds.), Second generation biometrics: The ethical, legal and social context. The International Library of Ethics, Law and Technology (volume 11) (pp.\u00a01\u201319). Dordrecht: Springer."},{"key":"9452_CR48","unstructured":"Morozov, E. (2014). The rise of data and the death of politics. The Guardian (20 July). Accessed May 15, 2017, from https:\/\/www.theguardian.com\/technology\/2014\/jul\/20\/rise-of-data-death-of-politics-evgeny-morozov-algorithmic-regulation ."},{"issue":"1","key":"9452_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11948-014-9621-1","volume":"22","author":"F O\u2019Brolchain","year":"2016","unstructured":"O\u2019Brolchain, F., Jacquemard, T., Monaghan, D., O\u2019Connor, N., Novitzky, P., & Gordijn, B. (2016). The convergence of virtual reality and social networks: Threats to privacy and autonomy. Science and Engineering Ethics, 22(1), 1\u201329.","journal-title":"Science and Engineering Ethics"},{"key":"9452_CR50","volume-title":"The filter bubble: What the Internet is hiding from you","author":"E Pariser","year":"2011","unstructured":"Pariser, E. (2011). The filter bubble: What the Internet is hiding from you. New York: Penguin Press."},{"key":"9452_CR51","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2017.2757","author":"G Parker","year":"2017","unstructured":"Parker, G., & Van Alstyne, M. W. (2017). Innovation, openness, and platform control. Management Science. https:\/\/doi.org\/10.1287\/mnsc.2017.2757 .","journal-title":"Management Science"},{"key":"9452_CR52","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061","volume-title":"The black box society: The secret algorithms that control money and information","author":"F Pasquale","year":"2015","unstructured":"Pasquale, F. (2015). The black box society: The secret algorithms that control money and information. Cambridge, MA: Harvard University Press."},{"key":"9452_CR53","unstructured":"Peck, D. (2013). They\u2019re watching you at work. The Atlantic. December 2013 issue. Accessed March 17, 2017, from http:\/\/www.theatlantic.com\/magazine\/archive\/2013\/12\/theyre-watching-you-at-work\/354681\/ ."},{"key":"9452_CR54","first-page":"85","volume":"93","author":"SR Peppet","year":"2014","unstructured":"Peppet, S. R. (2014). Regulating the internet of things: First steps towards managing discrimination, privacy, security and consent. Texas Law Review, 93, 85\u2013176.","journal-title":"Texas Law Review"},{"key":"9452_CR55","volume-title":"Agency in the internet of things","author":"AG Pereira","year":"2013","unstructured":"Pereira, A. G., Benessia, A., & Curvelo, P. (2013). Agency in the internet of things. Luxembourg: Publications Office of the European Union."},{"key":"9452_CR56","volume-title":"Big Data: Seizing opportunities, preserving values","author":"J Podesta","year":"2014","unstructured":"Podesta, J., Pritzker, P., Moniz, E., Holdren, J., & Zients, J. (2014). Big Data: Seizing opportunities, preserving values. Washington: Executive Office of the President."},{"key":"9452_CR57","unstructured":"Rani, A. (2013). The Japanese men who prefer virtual girlfriends to sex. BBC, 24-10-2013. Accessed October 14, 2017, from http:\/\/www.bbc.com\/news\/magazine-24614830 . ."},{"key":"9452_CR58","unstructured":"Renaud, K., Hoskins, A., & Von Solms, R. (2015). Biometric identification: Are we ethically ready? Information Security for South Africa (ISSA2015). Johannesburg (12\u201313 August). Accessed August 1, 2017, from http:\/\/ieeexplore.ieee.org\/document\/7335051\/?reload=true ."},{"key":"9452_CR59","first-page":"85","volume":"82","author":"B Rogers","year":"2015","unstructured":"Rogers, B. (2015). The social costs of Uber. The University of Chicago Law Review Dialogue, 82, 85\u2013102.","journal-title":"The University of Chicago Law Review Dialogue"},{"issue":"10","key":"9452_CR60","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed Internet of Things. Computer Networks, 57(10), 2266\u20132279.","journal-title":"Computer Networks"},{"issue":"3","key":"9452_CR61","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s10676-010-9240-8","volume":"12","author":"LMM Royakkers","year":"2010","unstructured":"Royakkers, L. M. M., & Van Est, Q. (2010). The cubicle warrior: The marionette of the digitalized warfare. Ethics and Information Technology, 12(3), 289\u2013296.","journal-title":"Ethics and Information Technology"},{"key":"9452_CR62","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/978-3-319-47301-7_14","volume-title":"Biometric security and privacy. Opportunities & challenges in the big data era","author":"M Sandhya","year":"2017","unstructured":"Sandhya, M., & Prasad, M. V. N. K. (2017). Biometric template protection: A systematic literature review of approaches and modalities. In R. Jiang et al. (Eds.), Biometric security and privacy. Opportunities & challenges in the big data era (pp.\u00a0323\u2013370). Cham: Springer."},{"key":"9452_CR63","unstructured":"Scholz, L. H. (2017). Algorithmic contracts. Stanford Technology Law Review."},{"key":"9452_CR64","volume-title":"Platform cooperativism. Challenging the corporate sharing economy","author":"T Scholz","year":"2016","unstructured":"Scholz, T. (2016). Platform cooperativism. Challenging the corporate sharing economy. New York: Rosa Luxemburg Stiftung."},{"issue":"1","key":"9452_CR65","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10676-012-9304-z","volume":"15","author":"RFJ Seddon","year":"2013","unstructured":"Seddon, R. F. J. (2013). Getting \u2018virtual\u2019 wrongs right. Ethics and Information Technology, 15(1), 1\u201311.","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9452_CR66","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10676-014-9338-5","volume":"16","author":"A Sharkey","year":"2014","unstructured":"Sharkey, A. (2014). Robots and human dignity: A consideration of the effects of robot care on the dignity of older people. Ethics and Information Technology, 16(1), 63\u201375.","journal-title":"Ethics and Information Technology"},{"issue":"4","key":"9452_CR67","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1080\/15027570.2010.537903","volume":"9","author":"N Sharkey","year":"2010","unstructured":"Sharkey, N. (2010). Saying \u2018no!\u2019 to lethal autonomous targeting. Journal of Military Ethics, 9(4), 369\u2013383.","journal-title":"Journal of Military Ethics"},{"key":"9452_CR68","first-page":"123","volume-title":"Persuasive technology. Design for health and safety. PERSUASIVE 2012. Lecture Notes in Computer Science","author":"J Smids","year":"2012","unstructured":"Smids, J. (2012). The voluntariness of persuasive technology. In M. Bang & E. L. Ragnemalm (Eds.), Persuasive technology. Design for health and safety. PERSUASIVE 2012. Lecture Notes in Computer Science (Vol.\u00a07284, pp.\u00a0123\u2013132). Berlin: Springer."},{"issue":"4","key":"9452_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11948-011-9278-y","volume":"18","author":"A Spahn","year":"2012","unstructured":"Spahn, A. (2012). And lead us (not) into persuasion\u2026? Persuasive technology and the ethics of communication. Science and Engineering Ethics, 18(4), 1\u201318.","journal-title":"Science and Engineering Ethics"},{"issue":"2","key":"9452_CR70","doi-asserted-by":"publisher","first-page":"108","DOI":"10.3167\/TRANS.2013.030207","volume":"3","author":"A Spahn","year":"2013","unstructured":"Spahn, A. (2013). Ideas in motion. Moralizing mobility? Persuasive technologies and the ethics of mobility. Transfer, 3(2), 108\u2013115.","journal-title":"Transfer"},{"issue":"3","key":"9452_CR71","first-page":"369","volume":"44","author":"BC Stahl","year":"2017","unstructured":"Stahl, B. C., Timmermans, J., & Flick, C. (2017). Ethics of emerging information and communication technologies. On the implementation of responsible research and innovation. Science and Public Policy, 44(3), 369\u2013381.","journal-title":"Science and Public Policy"},{"key":"9452_CR72","unstructured":"Stone, B. (2009). Amazon erases Orwell books from kindle. New York Times (17 July). Accessed September 4, 2017, from http:\/\/www.nytimes.com\/2009\/07\/18\/technology\/companies\/18amazon.html?_r=1 ."},{"issue":"4","key":"9452_CR88","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1109\/T-AFFC.2012.31","volume":"3","author":"JP Sullins","year":"2012","unstructured":"Sullins, J. P. (2012). Robots, love and sex: The ethics of building love machines. Affective Computing, 3(4), 398\u2013409.","journal-title":"Affective Computing"},{"key":"9452_CR73","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-12595-9_14","volume-title":"Ethics and policy of biometrics","author":"Sutrop","year":"2010","unstructured":"Sutrop (2010). Ethical issues in governing biometric technologies. In A. Kumar & D. Zhang (Eds.), Ethics and policy of biometrics (Lecture Notes in Computer Science, Volume\u00a06005, pp.\u00a0102\u2013114). Heidelberg: Springer."},{"issue":"1","key":"9452_CR74","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1111\/j.1541-1338.2011.00536.x","volume":"29","author":"M Sutrop","year":"2012","unstructured":"Sutrop, M., & Laas-Mikko, K. (2012). From identity verification to behavior prediction: Ethical implications of second generation biometrics. Review of Policy Research, 29(1), 21\u201336.","journal-title":"Review of Policy Research"},{"key":"9452_CR75","first-page":"196","volume-title":"Persuasive Technology. PERSUASIVE 2015. Lecture Notes in Computer Science","author":"J Timmer","year":"2015","unstructured":"Timmer, J., Kool, L., & van Est, R. (2015). Ethical issues in emerging applications of persuasive technologies. In T. MacTavish & S. Basapur (Eds.), Persuasive Technology. PERSUASIVE 2015. Lecture Notes in Computer Science (Vol.\u00a09072, pp.\u00a0196\u2013201). Cham: Springer."},{"issue":"2","key":"9452_CR76","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10676-009-9187-9","volume":"11","author":"M Turilli","year":"2009","unstructured":"Turilli, M., & Floridi, L. (2009). The ethics of information transparency. Ethics and Information Technology, 11(2), 105\u2013112.","journal-title":"Ethics and Information Technology"},{"key":"9452_CR87","volume-title":"Alone together. Why we expect more from technology and less from each other","author":"S Turkle","year":"2011","unstructured":"Turkle, S. (2011). Alone together. Why we expect more from technology and less from each other. New York: Basic Books."},{"key":"9452_CR77","volume-title":"Fundamental right to data protection: Normative value in the context of counter-terrorism surveillance","author":"M Tzanou","year":"2017","unstructured":"Tzanou, M. (2017). Fundamental right to data protection: Normative value in the context of counter-terrorism surveillance. Oxford: Hart."},{"issue":"1","key":"9452_CR78","first-page":"44","volume":"43","author":"I Ploeg Van der","year":"2007","unstructured":"Van der Ploeg, I. (2007). Genetics, biometrics and the informatization of the body. Ann Ist Super Sanita, 43(1), 44\u201350.","journal-title":"Ann Ist Super Sanita"},{"key":"9452_CR79","volume-title":"Intimate technology: The battle for our body and behaviour","author":"R Est Van","year":"2014","unstructured":"Van Est, R. (2014). Intimate technology: The battle for our body and behaviour. The Hague: Rathenau Instituut."},{"key":"9452_CR80","volume-title":"Working on the robot society. Visions and insights from science about the relation technology and employment","author":"R Est Van","year":"2015","unstructured":"Van Est, R., & Kool, L. (2015). Working on the robot society. Visions and insights from science about the relation technology and employment. The Hague: Rathenau Instituut."},{"key":"9452_CR81","volume-title":"Robots in healthcare: Design, use and implementation","author":"A Wynsberghe Van","year":"2015","unstructured":"Van Wynsberghe, A. (2015). Robots in healthcare: Design, use and implementation. Farnham: Ashgate."},{"key":"9452_CR82","unstructured":"Walker, S. (2016). Face recognition app taking Russia by storm may bring end to public anonymity. The Guardian (17 May). Accessed May 15, 2017, from https:\/\/theguardian.com\/technology\/2016\/may\/17\/findface-face-recognition-app-end-public-anonymity-vkontakte ."},{"key":"9452_CR83","unstructured":"Walsh, K. (2016). Nest reminds customers that ownership isn\u2019t what it used to be. EFF (5 April). Accessed May 27, 2017, from https:\/\/www.eff.org\/deeplinks\/2016\/04\/nest-reminds-customers-ownership-isnt-what-it-used-be ."},{"issue":"3","key":"9452_CR84","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1145\/2874239.2874257","volume":"45","author":"MJ Wolf","year":"2015","unstructured":"Wolf, M. J., Grodzinsky, F., & Miller, K. (2015). Augmented reality all around us: Power and perception at a crossroads. SIGCAS Computers & Society, 45(3), 126\u2013131.","journal-title":"SIGCAS Computers & Society"},{"key":"9452_CR85","unstructured":"Zarksy (2013). Transparent predictions, SSRN. Accessed January 4, 2018, from http:\/\/papers.ssrn.com\/sol3\/ papers.cfm?abstract_id = 2324240 ."},{"issue":"1","key":"9452_CR86","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1057\/jit.2015.5","volume":"30","author":"S Zuboff","year":"2015","unstructured":"Zuboff, S. (2015). Big other: Surveillance capitalism and the prospects of an information civilization. Journal of Information Technology, 30(1), 75\u201389.","journal-title":"Journal of Information Technology"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-018-9452-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9452-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9452-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T20:54:42Z","timestamp":1570913682000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-018-9452-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,16]]},"references-count":88,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["9452"],"URL":"https:\/\/doi.org\/10.1007\/s10676-018-9452-x","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,16]]},"assertion":[{"value":"16 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}