{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:02:23Z","timestamp":1775023343908,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,10,3]],"date-time":"2018-10-03T00:00:00Z","timestamp":1538524800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10676-018-9484-2","type":"journal-article","created":{"date-parts":[[2018,10,3]],"date-time":"2018-10-03T02:52:02Z","timestamp":1538535122000},"page":"11-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Augmented reality, augmented ethics: who has the right to augment a particular physical space?"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3381-6562","authenticated-orcid":false,"given":"Erica L.","family":"Neely","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,3]]},"reference":[{"issue":"2","key":"9484_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.29012\/jpc.v6i2.638","volume":"6","author":"A Acquisti","year":"2014","unstructured":"Acquisti, A., Gross, R., & Stutzman, F. (2014). Face recognition and privacy in the age of augmented reality. Journal of Privacy and Confidentiality, 6(2), 1\u201320.","journal-title":"Journal of Privacy and Confidentiality"},{"key":"9484_CR2","volume-title":"World of warcraft","author":"Blizzard Entertainment","year":"2004","unstructured":"Blizzard Entertainment. (2004). World of warcraft. Irvine: Blizzard Entertainment."},{"key":"9484_CR3","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-94-007-6833-8_8","volume-title":"Emerging pervasive information and communication technologies (PICT): Ethical challenges, opportunities and safeguards","author":"B Brinkman","year":"2014","unstructured":"Brinkman, B. (2014). Ethics and pervasive augmented reality: Some challenges and approaches. In K. D. Pimple (Ed.), Emerging pervasive information and communication technologies (PICT): Ethical challenges, opportunities and safeguards (pp.\u00a0149\u2013175). Dordrecht: Springer."},{"issue":"1","key":"9484_CR4","first-page":"235","volume":"55","author":"CJ Cifrino","year":"2014","unstructured":"Cifrino, C. J. (2014). Virtual property, virtual rights: Why contract law, not property law, must be the governing paradigm in the law of virtual worlds. Boston College Law Review, 55(1), 235\u2013264.","journal-title":"Boston College Law Review"},{"issue":"3","key":"9484_CR5","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1093\/itnow\/bwu067","volume":"56","author":"B Dainow","year":"2014","unstructured":"Dainow, B. (2014). Ethics in emerging technology. Itnow, 56(3), 16\u201318. \n                    https:\/\/doi.org\/10.1093\/itnow\/bwu067\n                    \n                  .","journal-title":"Itnow"},{"key":"9484_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-016-9164-5","author":"A Doshi","year":"2016","unstructured":"Doshi, A., Smith, R. T., Thomas, B. H., & Bouras, C. (2016). Use of projector based augmented reality to improve manual spot-welding precision and accuracy for automotive manufacturing. The International Journal of Advanced Manufacturing Technology. \n                    https:\/\/doi.org\/10.1007\/s00170-016-9164-5\n                    \n                  .","journal-title":"The International Journal of Advanced Manufacturing Technology"},{"issue":"3","key":"9484_CR7","doi-asserted-by":"publisher","first-page":"3069","DOI":"10.1021\/nn500614k","volume":"8","author":"S Feng","year":"2014","unstructured":"Feng, S., Caire, R., Cortazar, B., Turan, M., Wong, A., & Ozcan, A. (2014). Immunochromatographic diagnostic test analysis using Google Glass. ACS Nano, 8(3), 3069\u20133079. \n                    https:\/\/doi.org\/10.1021\/nn500614k\n                    \n                  .","journal-title":"ACS Nano"},{"key":"9484_CR8","unstructured":"Friedman, B., & Kahn, P. H. (2000). New directions: A value-sensitive design approach to augmented reality. In DARE 2000: Design of Augmented Reality Environments, Elsinore, Denmark (pp.\u00a0163\u2013164). New York: ACM."},{"issue":"1","key":"9484_CR9","first-page":"507","volume":"22","author":"B Glushko","year":"2007","unstructured":"Glushko, B. (2007). Tales of the (Virtual) city: Governing property disputes in virtual worlds. Berkeley Technology Law Journal, 22(1), 507\u2013532.","journal-title":"Berkeley Technology Law Journal"},{"issue":"2","key":"9484_CR10","first-page":"443","volume":"20","author":"SJ Horowitz","year":"2007","unstructured":"Horowitz, S. J. (2007). Competing lockean claims to virtual property. Harvard Journal of Law & Technology, 20(2), 443\u2013458.","journal-title":"Harvard Journal of Law & Technology"},{"key":"9484_CR11","volume-title":"Second life","author":"Linden Research Inc","year":"2003","unstructured":"Linden Research Inc. (2003). Second life. San Francisco: Linden Research Inc."},{"key":"9484_CR12","volume-title":"Two treatises of government","author":"J Locke","year":"1689","unstructured":"Locke, J. (1689\/1988). Two treatises of government (3rd\u00a0edn.). Cambridge: Cambridge University Press.","edition":"3"},{"key":"9484_CR13","doi-asserted-by":"crossref","unstructured":"Narumi, T., Nishizaka, S., Kajinami, T., Tanikawa, T., & Hirose, M. (2011). Augmented reality flavors: Gustatory display based on edible marker and cross-modal interaction. Paper presented at the Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vancouver, BC, Canada.","DOI":"10.1145\/1978942.1978957"},{"issue":"2","key":"9484_CR14","first-page":"395","volume":"36","author":"JW Nelson","year":"2011","unstructured":"Nelson, J. W. (2011). A virtual property solution: How privacy law can protect the citizens of virtual worlds. Oklahoma City University Law Review, 36(2), 395\u2013420.","journal-title":"Oklahoma City University Law Review"},{"key":"9484_CR15","volume-title":"Pok\u00e9mon GO","author":"Niantic Inc","year":"2016","unstructured":"Niantic Inc. (2016). Pok\u00e9mon GO. San Francisco: Niantic Inc."},{"key":"9484_CR16","unstructured":"Peterson, A. (2016). Holocaust Museum to visitors: Please stop catching Pok\u00e9mon here. The Washington Post."},{"issue":"4","key":"9484_CR17","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/2580723.2580730","volume":"57","author":"F Roesner","year":"2014","unstructured":"Roesner, F., Kohno, T., & Molnar, D. (2014). Security and privacy for augmented reality systems. Communications of the ACM, 57(4), 88\u201396.","journal-title":"Communications of the ACM"},{"key":"9484_CR18","volume-title":"The social contract and other later political writings","author":"J-J Rousseau","year":"1762","unstructured":"Rousseau, J.-J. (1762\/1997). The social contract. In V. Gourevitch (Ed.), The social contract and other later political writings. Cambridge: Cambridge University Press."},{"key":"9484_CR19","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10676-011-9285-3","volume":"14","author":"L Strikwerda","year":"2012","unstructured":"Strikwerda, L. (2012). Theft of virtual items in online multiplayer computer games: An ontological and moral analysis. Ethics and Information Technology, 14, 89\u201397. \n                    https:\/\/doi.org\/10.1007\/s10676-011-9285-3\n                    \n                  .","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9484_CR20","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1080\/13600834.2014.891870","volume":"23","author":"L Strikwerda","year":"2014","unstructured":"Strikwerda, L. (2014). Should virtual cybercrime be regulated by means of criminal law? A philosophical, legal-economic, pragmatic and constitutional dimension. Information & Communications Technology Law, 23(1), 31\u201360. \n                    https:\/\/doi.org\/10.1080\/13600834.2014.891870\n                    \n                  .","journal-title":"Information & Communications Technology Law"},{"key":"9484_CR21","volume-title":"Augmented reality law, privacy, and ethics: Law, society, and emerging AR technologies","author":"BD Wassom","year":"2015","unstructured":"Wassom, B. D. (2015). Augmented reality law, privacy, and ethics: Law, society, and emerging AR technologies. Waltham: Elsevier."},{"issue":"3","key":"9484_CR22","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1145\/2874239.2874257","volume":"45","author":"MJ Wolf","year":"2015","unstructured":"Wolf, M. J., Grodzinsky, F., & Miller, K. (2015). Augmented reality all around us: Power and perception at a crossroads. ACM Computers and Society, 45(3), 126\u2013131.","journal-title":"ACM Computers and Society"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9484-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-018-9484-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9484-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T19:19:14Z","timestamp":1570043954000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-018-9484-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,3]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["9484"],"URL":"https:\/\/doi.org\/10.1007\/s10676-018-9484-2","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,3]]},"assertion":[{"value":"3 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The author declares that she has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}