{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:03:40Z","timestamp":1755799420080,"version":"3.44.0"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T00:00:00Z","timestamp":1537833600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001663","name":"Volkswagen Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10676-018-9482-4","type":"journal-article","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T06:05:28Z","timestamp":1537855528000},"page":"303-313","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Treating sensitive topics online: a privacy dilemma"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2719-9721","authenticated-orcid":false,"given":"Paula","family":"Helm","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,25]]},"reference":[{"key":"9482_CR1","unstructured":"Acquisti, A., & Gross, R. (2005). Information revelation and privacy in online social networks. In R. Gross & A. Acquisti. Proceedings of the 2005 Workshop on Privacy in the Electronic Society (WPES), ACM (pp. 71\u201380)."},{"key":"9482_CR2","volume-title":"Contours of privacy.","author":"A Acquisti","year":"2009","unstructured":"Acquisti, A., & Gross, R. (2009). Information revelation and privacy in online social networks. In D. Matheson (ed), Contours of privacy. Cambridge: Cambridge Scholars Publishing."},{"key":"9482_CR3","first-page":"7","volume":"2","author":"A Acquisti","year":"2012","unstructured":"Acquisti, A., Stutzan, F., & Gross, R. (2012). Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality,2, 7\u201341.","journal-title":"Journal of Privacy and Confidentiality"},{"key":"9482_CR8","unstructured":"Alcoholics Anonymous. (1935\u20131939). Folder: \u2018Correspondences 1935\u20131939\u2019. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices."},{"key":"9482_CR9","unstructured":"Alcoholics Anonymous. (1935\u20131955). Folder: \u2018Anonymity Breaches\u2019. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices."},{"key":"9482_CR4","volume-title":"Alcoholics anonymous comes of age","author":"Alcoholics Anonymous","year":"1957","unstructured":"Alcoholics Anonymous. (1957). Alcoholics anonymous comes of age. New York: The Grapevine Inc."},{"key":"9482_CR5","volume-title":"The A.A. service manual. Twelve concepts for world service","author":"Alcoholics Anonymous","year":"2013","unstructured":"Alcoholics Anonymous. (2013). The A.A. service manual. Twelve concepts for world service. New York: The A.A. Grapevine, Inc."},{"key":"9482_CR6","volume-title":"The environment and social behavior","author":"I Altman","year":"1975","unstructured":"Altman, I. (1975). The environment and social behavior. Monterey: Brooks and Cole."},{"key":"9482_CR10","doi-asserted-by":"crossref","unstructured":"Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday. 11(9).","DOI":"10.5210\/fm.v11i9.1394"},{"key":"9482_CR11","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1017\/CBO9781107590205.004","volume-title":"Privacy, big data, and the public good: Frameworks for engagement","author":"S Barocas","year":"2014","unstructured":"Barocas, S., & Nissenbaum, H. (2014). Big data\u2019s end run around anonymity and consent. In J. Lane, V. Stodden, S. Bender & H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement (pp.\u00a044\u201375). New York: Cambridge University Press."},{"key":"9482_CR12","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s11623-016-0549-2","volume":"1\/2016","author":"C Becker","year":"2016","unstructured":"Becker, C., & Seubert, S. (2016). Privatheit, kommunikative Freiheit und Demokratie. Datenschutz und Datensicherheit, 1\/2016, 73\u201378.","journal-title":"Datenschutz und Datensicherheit"},{"key":"9482_CR13","doi-asserted-by":"crossref","DOI":"10.21983\/P3.0125.1.00","volume-title":"The critique of digital capitalism: An Analysis of the political economy of digital culture and technology","author":"M Betancourt","year":"2016","unstructured":"Betancourt, M. (2016). The critique of digital capitalism: An Analysis of the political economy of digital culture and technology. Brooklyn: Punctum Books."},{"key":"9482_CR14","volume-title":"Individual and group privacy","author":"E Bloustein","year":"1978","unstructured":"Bloustein, E. (1978). Individual and group privacy. New Brunswick: Transaction Books."},{"issue":"7","key":"9482_CR15","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1177\/1461444814543995","volume":"16","author":"D Boyd","year":"2014","unstructured":"Boyd, D, & Marwick, A. E. (2014). Networked privacy: How teenagers negotiate context in social media. New Media + Society, 16(7), 1051\u20131067.","journal-title":"New Media + Society"},{"key":"9482_CR16","doi-asserted-by":"publisher","first-page":"31","DOI":"10.4135\/9781848607941.n1","volume-title":"The SAGE handbook of grounded theory","author":"A Bryant","year":"2007","unstructured":"Bryant, A. (2007). Grounded theory in historical perspective: An epistemological account. In A. Bryant & K. Charmaz (Eds.), The SAGE handbook of grounded theory (pp.\u00a031\u201357). Los Angeles: Sage."},{"key":"9482_CR17","volume-title":"Configuring the networked self: Law, code and the play of everyday practice","author":"J Cohen","year":"2012","unstructured":"Cohen, J. (2012). Configuring the networked self: Law, code and the play of everyday practice. New Haven: Yale University Press."},{"key":"9482_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1100\/2012\/657671","volume":"2012","author":"Charlotte Colman","year":"2012","unstructured":"Colman, C., & Laenen, F. (2012). \u201cRecovery Came First\u201d: Desistance versus recovery in the criminal careers of drug using offenders. The Scientific World Journal: 1\u20139.","journal-title":"The Scientific World Journal"},{"key":"9482_CR19","unstructured":"Crawford, K. (2013). The hidden biases in big data. Harvard Business Review. Retrieved August 5, 2017, from, https:\/\/hbr.org\/2013\/04\/the-hidden-biases-in-big-data ."},{"key":"9482_CR20","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.chb.2014.03.010","volume":"35","author":"R Wolf De","year":"2014","unstructured":"De Wolf, R., Willaert, K., & Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444\u2013454.","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"9482_CR21","first-page":"129","volume":"5","author":"P Dourish","year":"2003","unstructured":"Dourish, P., & Palen, L. (2003). Unpacking \u201cPrivacy\u201d for a Network World. Computer Human Interaction, 5(1), 129\u2013136.","journal-title":"Computer Human Interaction"},{"key":"9482_CR22","first-page":"71","volume-title":"Contours of privacy","author":"T Dumsday","year":"2009","unstructured":"Dumsday, T. (2009). Anonymity and privacy: Conceptual links and normative implications. In D. Matheson (Ed.), Contours of privacy (pp.\u00a071\u201384). Cambridge: Cambridge Scholars Publishing."},{"key":"9482_CR23","volume-title":"The limits of privacy","author":"A Etzioni","year":"1999","unstructured":"Etzioni, A. (1999). The limits of privacy. New York: Basic Books."},{"issue":"1","key":"9482_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13347-014-0157-8","volume":"27","author":"L Floridi","year":"2014","unstructured":"Floridi, L. (2014). Open data, data protection and group privacy. Philosophical Technology, 27(1), 1\u20133.","journal-title":"Philosophical Technology"},{"key":"9482_CR25","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-319-46608-8_5","volume-title":"Group privacy: New challenges of data technologies","author":"L Floridi","year":"2017","unstructured":"Floridi, L. (2017). Group privacy: A defence and an interpretation. In L. Taylor, L. Floridi & L. B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp.\u00a083\u2013100). New York: Springer."},{"issue":"3","key":"9482_CR26","doi-asserted-by":"publisher","first-page":"475","DOI":"10.2307\/794941","volume":"77","author":"C Fried","year":"1968","unstructured":"Fried, C. (1968). Privacy. The Yale Law Journal, 77(3), 475\u2013493.","journal-title":"The Yale Law Journal"},{"key":"9482_CR27","volume-title":"The anonymous society: Identity, transformation and anonymity in 12 steps","author":"C Frois","year":"2009","unstructured":"Frois, C. (2009). The anonymous society: Identity, transformation and anonymity in 12 steps. Cambridge: Cambridge Scholars Publishing."},{"issue":"4","key":"9482_CR28","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1108\/14779961111191039","volume":"9","author":"C Fuchs","year":"2011","unstructured":"Fuchs, C. (2011). Towards an alternative concept of privacy. Journal of Information, Communication and Ethics in Society, 9(4), 220\u2013237.","journal-title":"Journal of Information, Communication and Ethics in Society"},{"issue":"2","key":"9482_CR29","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1177\/1527476411415699","volume":"13","author":"C Fuchs","year":"2012","unstructured":"Fuchs, C. (2012). The political economy of privacy on Facebook. Television & New Media, 13(2), 139\u2013159.","journal-title":"Television & New Media"},{"key":"9482_CR30","first-page":"233","volume":"12","author":"T Gerety","year":"1977","unstructured":"Gerety, T. (1977). Redefining privacy. Harvard Civil Rights-Civil Liberties Law Review, 12, 233\u2013296.","journal-title":"Harvard Civil Rights-Civil Liberties Law Review"},{"key":"9482_CR31","volume-title":"Strukturwandel der \u00d6ffentlichkeit: Untersuchungen zu einer Kategorie der b\u00fcrgerlichen Gesellschaft","author":"J Habermas","year":"1990","unstructured":"Habermas, J. (1990). Strukturwandel der \u00d6ffentlichkeit: Untersuchungen zu einer Kategorie der b\u00fcrgerlichen Gesellschaft. Frankfurt: Suhrkamp."},{"key":"9482_CR32","volume-title":"Faktizit\u00e4t und Geltung - Beitr\u00e4ge zur Diskurstheorie des Rechts und des demokratischen Rechtsstaats","author":"J Habermas","year":"1992","unstructured":"Habermas, J. (1992). Faktizit\u00e4t und Geltung - Beitr\u00e4ge zur Diskurstheorie des Rechts und des demokratischen Rechtsstaats. Frankfurt: Suhrkamp."},{"issue":"2","key":"9482_CR33","doi-asserted-by":"publisher","first-page":"137","DOI":"10.14361\/dcs-2016-0209","volume":"2","author":"P Helm","year":"2016","unstructured":"Helm, P. (2016a). Group privacy in times of big data. Digital Culture and Society, 2(2), 137\u2013152.","journal-title":"Digital Culture and Society"},{"key":"9482_CR7","volume-title":"Suchtkultur und Gruppentherapie: Vom anonymen Ich zum anonymen Wir","author":"P Helm","year":"2016","unstructured":"Helm, P. (2016b). Suchtkultur und Gruppentherapie: Vom anonymen Ich zum anonymen Wir. Wiesbaden: Springer."},{"issue":"2","key":"9482_CR34","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1177\/0090591792020002001","volume":"20","author":"A Honneth","year":"1992","unstructured":"Honneth, A. (1992). Integrity and disrespect: Principles of a conception of morality based on the theory of recognition. Political Theory, 20(2), 187\u2013201.","journal-title":"Political Theory"},{"key":"9482_CR35","unstructured":"K\u00fchl, S. (2014). Gruppen, Organisationen, Familien und Bewegungen. Zur Soziologie mitgliedschaftsbasierter Systeme zwischen Interaktion und Gesellschaft. Zeitschrift f\u00fcr Soziologie. Sonderheft Interaktion - Organisation - Gesellschaft revisited (pp. 65\u201385)."},{"key":"9482_CR36","volume-title":"Toward a feminist theory of the state","author":"C MacKinnon","year":"1989","unstructured":"MacKinnon, C. (1989). Toward a feminist theory of the state. Cambridge: Harvard University Press."},{"issue":"2","key":"9482_CR37","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.clsr.2016.01.014","volume":"32","author":"A Mantelero","year":"2016","unstructured":"Mantelero, A. (2016). Personal data for decisional purposes in the age of analytics: From an individual to a collective dimension of data protection. Computer Law and Security Review, 32(2), 238\u2013255.","journal-title":"Computer Law and Security Review"},{"key":"9482_CR38","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/978-3-319-46608-8_8","volume-title":"Group privacy: New challenges of data technologies","author":"A Mantelero","year":"2017","unstructured":"Mantelero, A. (2017). From group privacy to collective privacy: Towards a new dimension of privacy and data protection in the big data era. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp.\u00a0139\u2013158). New York: Springer."},{"key":"9482_CR39","doi-asserted-by":"crossref","unstructured":"Masur, P., Teutsch, D., Dienlin, T., & Trepte, S. (2017). Online-Privatheitskompetenz und deren Bedeutung f\u00fcr demokratische Gesellschaften. In S. Seubert & P. Helm (Eds.), Privatheit und Demokratie. FJSB (pp. 180\u2013189).","DOI":"10.1515\/fjsb-2017-0039"},{"issue":"4","key":"9482_CR40","first-page":"351","volume":"47","author":"S Matthews","year":"2010","unstructured":"Matthews, S. (2010). Anonymity and the social self. American Philosophical Quarterly, 47(4), 351\u2013363.","journal-title":"American Philosophical Quarterly"},{"issue":"4","key":"9482_CR41","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s13347-017-0253-7","volume":"30","author":"B Mittelstadt","year":"2017","unstructured":"Mittelstadt, B. (2017). From individual to group privacy in big data analytics. Philosophy & Technology, 30(4), 475\u2013494.","journal-title":"Philosophy & Technology"},{"issue":"2","key":"9482_CR70","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1080\/019722499128592","volume":"15","author":"H Nissenbaum","year":"1999","unstructured":"Nissenbaum, H. (1999). The meaning of anonymity in an information age. The Information Society 15(2):141\u2013144.","journal-title":"The Information Society"},{"key":"9482_CR42","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford University Press."},{"issue":"6","key":"9482_CR43","first-page":"1701","volume":"57","author":"P Ohm","year":"2010","unstructured":"Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57(6), 1701\u20131777.","journal-title":"UCLA Law Review"},{"key":"9482_CR44","first-page":"2","volume":"88","author":"P Ohm","year":"2015","unstructured":"Ohm, P. (2015). Sensitive information. Southern California Law Review, 88, 2\u201355.","journal-title":"Southern California Law Review"},{"key":"9482_CR45","first-page":"118","volume-title":"The disorder of women. Democracy, feminism and political theory","author":"C Pateman","year":"1989","unstructured":"Pateman, C. (1989). Feminist critiques of the public\/private dichotomy. In C. Pateman (Ed.), The disorder of women. Democracy, feminism and political theory (pp.\u00a0118\u2013140). Stanford: Stanford University Press."},{"key":"9482_CR46","first-page":"35","volume":"13","author":"R Putnam","year":"1993","unstructured":"Putnam, R. (1993). The prosperous community: Social capital and public life. The American Prospect, 13, 35\u201342.","journal-title":"The American Prospect"},{"key":"9482_CR47","volume-title":"Bowling alone: The collapse and revival of American community","author":"R Putnam","year":"2000","unstructured":"Putnam, R. (2000). Bowling alone: The collapse and revival of American community. New York: Simon & Schuster."},{"issue":"4","key":"9482_CR48","first-page":"323","volume":"4","author":"J Rachels","year":"1975","unstructured":"Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323\u2013333.","journal-title":"Philosophy & Public Affairs"},{"key":"9482_CR49","volume-title":"Der Wert des Privaten","author":"B R\u00f6ssler","year":"1994","unstructured":"R\u00f6ssler, B. (1994). Der Wert des Privaten. Frankfurt: Suhrkamp."},{"key":"9482_CR50","first-page":"127","volume-title":"Einf\u00fchrung in Hauptbegriffe der Soziologie","author":"B Sch\u00e4fer","year":"1999","unstructured":"Sch\u00e4fer, B. (1999). Die soziale Gruppe. In H. Korte & B. Sch\u00e4fer (Eds.), Einf\u00fchrung in Hauptbegriffe der Soziologie (pp.\u00a0127\u2013142). Wiesbaden: Springer."},{"key":"9482_CR51","doi-asserted-by":"publisher","DOI":"10.4324\/9781315674841","volume-title":"Privacy and capitalism in the age of social media","author":"S Sevignani","year":"2015","unstructured":"Sevignani, S. (2015). Privacy and capitalism in the age of social media. New York: Routledge."},{"issue":"3","key":"9482_CR52","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"D Solove","year":"2006","unstructured":"Solove, D. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477\u2013560.","journal-title":"University of Pennsylvania Law Review"},{"issue":"1","key":"9482_CR53","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10676-016-9392-2","volume":"18","author":"T Stahl","year":"2016","unstructured":"Stahl, T. (2016). Indiscriminate mass surveillance and the public sphere. Ethics in Information Technology, 18(1), 33\u201339.","journal-title":"Ethics in Information Technology"},{"issue":"2","key":"9482_CR54","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1111\/jcc4.12052","volume":"19","author":"M Taddicken","year":"2014","unstructured":"Taddicken, M. (2014). The \u2018Privacy Paradox\u2019 in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248\u2013273.","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"2","key":"9482_CR55","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1177\/0263775815608851","volume":"34","author":"L Taylor","year":"2015","unstructured":"Taylor, L. (2015). No place to hide? The ethics and analytics of tracking mobility using mobile phone data. Environment and Planning D: Society and Space, 34(2), 319\u2013336.","journal-title":"Environment and Planning D: Society and Space"},{"key":"9482_CR56","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-319-46608-8_2","volume-title":"Group privacy: New challenges of data technologies","author":"L Taylor","year":"2017","unstructured":"Taylor, L. (2017). Safety in numbers? Group privacy and big data analytics in the developing world. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp.\u00a013\u201336). New York: Springer."},{"key":"9482_CR57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46608-8","volume-title":"Group privacy: New challenges of data technologies","author":"L Taylor","year":"2017","unstructured":"Taylor, L., Floridi, L., & van der Sloot, B. (2017). Group privacy: New challenges of data technologies. New York: Springer."},{"key":"9482_CR58","first-page":"165","volume-title":"Life in the wires: The CTheory Reader","author":"E Thacker","year":"2004","unstructured":"Thacker, E. (2004). Networks, swarms and multitudes. In A. Kroker (Ed.), Life in the wires: The CTheory Reader (pp.\u00a0165\u2013177). Victoria: Theory Books."},{"key":"9482_CR59","volume-title":"Democracy in America","author":"A Tocqueville","year":"1990","unstructured":"Tocqueville, A. (1990[1840]). Democracy in America. New York: Vintage Books."},{"issue":"1","key":"9482_CR61","first-page":"1","volume":"3","author":"S Trepte","year":"2017","unstructured":"Trepte, S., Reinecke, L., Ellison, N., Quiring, O., Yao, M., & Ziegele, M. (2017). A cross-cultural perspective on the privacy calculus. Social Media Society, 3(1), 1\u201313.","journal-title":"Social Media Society"},{"key":"9482_CR62","first-page":"372","volume-title":"Medienpsychologie. Schl\u00fcsselbegriffe und Konzepte","author":"S Trepte","year":"2016","unstructured":"Trepte, S., & Teutsch, D. (2016). Das \u201cPrivacy Paradox\u201d. In M. Kr\u00e4mer, S. Schwan, D. Unz & D. M. Suckf\u00fcll (Eds.), Medienpsychologie. Schl\u00fcsselbegriffe und Konzepte (pp.\u00a0372\u2013377). Stuttgart: Kohlhammer Verlag."},{"key":"9482_CR63","first-page":"544","volume":"11\/4","author":"Z Tufekci","year":"2008","unstructured":"Tufekci, Z. (2008). Can you see me now? Audience and disclosure management in online social network sites. Bulletin of Science and Technology Studies, 11\/4, 544\u2013564.","journal-title":"Bulletin of Science and Technology Studies"},{"key":"9482_CR64","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/978-3-663-01510-9_18","volume-title":"Gruppensoziologie. Perspektiven und Materialien","author":"H Tyrell","year":"1983","unstructured":"Tyrell, H. (1983). Zwischen Interaktion und Organisation II. Die Familie als Gruppe. In F. Neidhardt (Ed.), Gruppensoziologie. Perspektiven und Materialien (pp.\u00a0362\u2013390). Wiesbaden: Springer."},{"key":"9482_CR65","volume-title":"Personal information: Privacy and the law","author":"R Wacks","year":"1989","unstructured":"Wacks, R. (1989). Personal information: Privacy and the law. Oxford: Clarendon Press."},{"issue":"1","key":"9482_CR66","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1023\/A:1010066509278","volume":"1","author":"KA Wallace","year":"1999","unstructured":"Wallace, K. A. (1999). \u2018Anonymity\u2019. Ethics and Information Technology, 1(1), 23\u201335.","journal-title":"Ethics and Information Technology"},{"key":"9482_CR67","doi-asserted-by":"crossref","DOI":"10.1515\/9781400823925","volume-title":"Democracy and association","author":"ME Warren","year":"2001","unstructured":"Warren, M. E. (2001). Democracy and association. Princeton: Princeton University Press."},{"key":"9482_CR68","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-531-90549-5","volume-title":"Gegen\u00f6ffentlichkeit in der Mediengesellschaft. Analyse eines medialen Spannungsverh\u00e4ltnisses","author":"J Wimmer","year":"2007","unstructured":"Wimmer, J. (2007). Gegen\u00f6ffentlichkeit in der Mediengesellschaft. Analyse eines medialen Spannungsverh\u00e4ltnisses. Wiesbaden: Springer."},{"key":"9482_CR69","volume-title":"Five faces of oppression","author":"I Young","year":"2014","unstructured":"Young, I. (2014). Five faces of oppression. Albany: State University of New York Press."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-018-9482-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9482-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9482-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T21:47:49Z","timestamp":1755640069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-018-9482-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,25]]},"references-count":69,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["9482"],"URL":"https:\/\/doi.org\/10.1007\/s10676-018-9482-4","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2018,9,25]]},"assertion":[{"value":"25 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}