{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T14:34:37Z","timestamp":1777300477402,"version":"3.51.4"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,2,13]],"date-time":"2019-02-13T00:00:00Z","timestamp":1550016000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10676-019-09499-x","type":"journal-article","created":{"date-parts":[[2019,2,12]],"date-time":"2019-02-12T22:15:29Z","timestamp":1550009729000},"page":"181-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Digital health fiduciaries: protecting user privacy when sharing health data"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4998-8390","authenticated-orcid":false,"given":"Chirag","family":"Arora","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,13]]},"reference":[{"issue":"1","key":"9499_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1093\/cybsec\/tyv009","volume":"1","author":"H Abelson","year":"2015","unstructured":"Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., et al. Weitzner, D. J. (2015). Keys under doormats: Mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), 69\u201379. \n                    https:\/\/doi.org\/10.1093\/cybsec\/tyv009\n                    \n                  .","journal-title":"Journal of Cybersecurity"},{"issue":"4","key":"9499_CR2","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSP.2013.86","volume":"11","author":"A Acquisti","year":"2013","unstructured":"Acquisti, A., Adjerid, I., & Brandimarte, L. (2013). Gone in 15s: The limits of privacy transparency and control. IEEE Security Privacy, 11(4), 72\u201374. \n                    https:\/\/doi.org\/10.1109\/MSP.2013.86\n                    \n                  .","journal-title":"IEEE Security Privacy"},{"key":"9499_CR3","doi-asserted-by":"publisher","unstructured":"Adjerid, I., Acquisti, A., Brandimarte, L., & Loewenstein, G. (2013). Sleights of privacy: framing, disclosures, and the limits of transparency. In Proceedings of the ninth symposium on usable privacy and security (pp.\u00a09:1\u20139:11). New York, NY: ACM. \n                    https:\/\/doi.org\/10.1145\/2501604.2501613\n                    \n                  .","DOI":"10.1145\/2501604.2501613"},{"key":"9499_CR4","unstructured":"Art. 5 GDPR\u2014Principles relating to processing of personal data. (n.d.). Retrieved December 13, 2018 from \n                    https:\/\/gdpr-info.eu\/art-5-gdpr\/\n                    \n                  ."},{"key":"9499_CR6","unstructured":"Art. 12 GDPR. (n.d.). Retrieved February 6, 2018 from \n                    https:\/\/gdpr-info.eu\/art-12-gdpr\/\n                    \n                  ."},{"key":"9499_CR5","unstructured":"Art. 25 GDPR\u2014Data protection by design and by default. (n.d.). Retrieved December 19, 2018 from \n                    https:\/\/gdpr-info.eu\/art-25-gdpr\/\n                    \n                  ."},{"key":"9499_CR7","unstructured":"Article 29 Working Party. (2015). ANNEX\u2014health data in apps and devices. Retrieved February 8, 2018 from \n                    http:\/\/webcache.googleusercontent.com\/search?q=cache:MlBCtv-DN6gJ:ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/other-document\/files\/2015\/20150205_letter_art29wp_ec_health_data_after_plenary_annex_en.pdf+&cd=1&hl=en&ct=clnk&gl=nl&client=firefox-b-ab\n                    \n                  ."},{"key":"9499_CR8","unstructured":"Athinaiou, M. (2017, July 17). Why has healthcare become such a target for cyber-attackers? Retrieved August 28, 2018 from \n                    http:\/\/theconversation.com\/why-has-healthcare-become-such-a-target-for-cyber-attackers-80656\n                    \n                  ."},{"key":"9499_CR9","unstructured":"Balkin, J. (2014, May 3). Balkinization: Information fiduciaries in the digital age. Retrieved October 31, 2017 from \n                    https:\/\/balkin.blogspot.nl\/2014\/03\/information-fiduciaries-in-digital-age.html\n                    \n                  ."},{"key":"9499_CR10","first-page":"1183","volume":"49","author":"JM Balkin","year":"2015","unstructured":"Balkin, J. M. (2015). Information fiduciaries and the first amendment. U.C. Davis Law Review, 49, 1183.","journal-title":"U.C. Davis Law Review"},{"key":"9499_CR11","unstructured":"Barocas, S., & Nissenbaum, H. (2009). On notice: The trouble with notice and consent (SSRN Scholarly Paper No. ID 2567409). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=2567409\n                    \n                  ."},{"key":"9499_CR12","first-page":"611","volume":"84","author":"K Brennan-Marquez","year":"2015","unstructured":"Brennan-Marquez, K. (2015). Fourth amendment fiduciaries. Fordham Law Review, 84, 611.","journal-title":"Fordham Law Review"},{"key":"9499_CR13","unstructured":"Brinig, M. F. (2011). Parents, trusted but not trustees or (Foster) parents as Fiduciaries (SSRN Scholarly Paper No. ID 1767412). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=1767412\n                    \n                  ."},{"issue":"3","key":"9499_CR14","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1080\/13600834.2017.1330740","volume":"26","author":"S Bu-Pasha","year":"2017","unstructured":"Bu-Pasha, S. (2017). Cross-border issues under EU data protection law with regards to personal data protection. Information and Communications Technology Law, 26(3), 213\u2013228. \n                    https:\/\/doi.org\/10.1080\/13600834.2017.1330740\n                    \n                  .","journal-title":"Information and Communications Technology Law"},{"key":"9499_CR15","unstructured":"Byres, E. J., Franz, M., & Miller, D. (2004). The use of attack trees in assessing vulnerabilities in scada systems. In IEEE conference international infrastructure survivability workshop (IISW\u201904). Institute for Electrical and Electronics Engineers."},{"key":"9499_CR16","unstructured":"Bywater, A., & Armstrong, J. (2015, March 6). EU health data definition concerning lifestyle and wellbeing apps. Retrieved February 8, 2018 from \n                    http:\/\/www.corderycompliance.com\/eu-health-data-definition-concerning-lifestyle-and-wellbeing-apps\/\n                    \n                  ."},{"key":"9499_CR17","first-page":"385","volume":"51","author":"A Candeub","year":"2013","unstructured":"Candeub, A. (2013). Transparency in the administrative state. Houston Law Review, 51, 385.","journal-title":"Houston Law Review"},{"key":"9499_CR18","unstructured":"Cestui que trust. (2006). Retrieved December 4, 2017 from \n                    https:\/\/legal-dictionary.thefreedictionary.com\/cestui+que+trust\n                    \n                  ."},{"issue":"4\u20135","key":"9499_CR19","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1177\/1367549415584857","volume":"18","author":"K Crawford","year":"2015","unstructured":"Crawford, K., Lingel, J., & Karppi, T. (2015). Our metrics, ourselves: A hundred years of self-tracking from the weight scale to the wrist wearable device. European Journal of Cultural Studies, 18(4\u20135), 479\u2013496. \n                    https:\/\/doi.org\/10.1177\/1367549415584857\n                    \n                  .","journal-title":"European Journal of Cultural Studies"},{"key":"9499_CR20","volume-title":"Law of torts (hornbook series)","author":"D Dobbs","year":"2008","unstructured":"Dobbs, D. (2008). Law of torts (hornbook series). Eagan: West Academic."},{"key":"9499_CR21","unstructured":"Drozd, S., & Dale, R. (2006, March 27). General principles of medical malpractice litigation. Lerners Lawyers. Retrieved from \n                    http:\/\/www.lerners.ca\/lernx\/general-principles-of-medical-malpractice-litigation\/\n                    \n                  ."},{"key":"9499_CR22","first-page":"69","volume":"25","author":"BJ Evans","year":"2011","unstructured":"Evans, B. J. (2011). Much ado about data ownership. Harvard Journal of Law & Technology, 25, 69.","journal-title":"Harvard Journal of Law & Technology"},{"issue":"3","key":"9499_CR23","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.ajp.2012.07.011","volume":"5","author":"HM Farrell","year":"2012","unstructured":"Farrell, H. M. (2012). Transparency in psychiatric care. Asian Journal of Psychiatry, 5(3), 273\u2013274. \n                    https:\/\/doi.org\/10.1016\/j.ajp.2012.07.011\n                    \n                  .","journal-title":"Asian Journal of Psychiatry"},{"key":"9499_CR24","unstructured":"Fitbit Privacy Policy. (2016). Retrieved October 5, 2017 from \n                    https:\/\/www.fitbit.com\/nl\/legal\/privacy\n                    \n                  ."},{"key":"9499_CR25","first-page":"1","volume":"23","author":"RA Ford","year":"2016","unstructured":"Ford, R. A., & Price, W. N. I. (2016). Privacy and accountability in black-box medicine. Michigan Telecommunications and Technology Law Review, 23, 1.","journal-title":"Michigan Telecommunications and Technology Law Review"},{"key":"9499_CR26","volume-title":"Fiduciary law","author":"TT Frankel","year":"2010","unstructured":"Frankel, T. T. (2010). Fiduciary law. Oxford: Oxford University Press."},{"key":"9499_CR27","unstructured":"Gelter, M., & Helleringer, G. (2018). Fiduciary principles in European Civil Law Systems (SSRN Scholarly Paper No. ID 3142202). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=3142202\n                    \n                  ."},{"key":"9499_CR28","unstructured":"Gold, A. S. (2013). The loyalties of Fiduciary law (SSRN Scholarly Paper No. ID 2370598). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=2370598\n                    \n                  ."},{"key":"9499_CR29","first-page":"1439","volume":"86","author":"LO Gostin","year":"2001","unstructured":"Gostin, L. O., & Hodge, J. G. J. (2001). Personal privacy and common goods: A framework for balancing under the national health information privacy rule. Minnesota Law Review, 86, 1439.","journal-title":"Minnesota Law Review"},{"key":"9499_CR30","unstructured":"Guerin v. The Queen, 2 SCR 335 (C 1984). Retrieved from \n                    http:\/\/canlii.ca\/t\/1lpfn\n                    \n                  ."},{"issue":"1","key":"9499_CR31","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.amjmed.2015.05.038","volume":"129","author":"JP Higgins","year":"2016","unstructured":"Higgins, J. P. (2016). Smartphone applications for patients\u2019 health and fitness. The American Journal of Medicine, 129(1), 11\u201319. \n                    https:\/\/doi.org\/10.1016\/j.amjmed.2015.05.038\n                    \n                  .","journal-title":"The American Journal of Medicine"},{"key":"9499_CR32","unstructured":"Hintze, M. (2017). Viewing the GDPR through a de-Identification Lens: A tool for compliance, clarification, and consistency (SSRN Scholarly Paper No. ID 2909121). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=2909121\n                    \n                  ."},{"issue":"4","key":"9499_CR33","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1071\/AH080766","volume":"32","author":"CD Holman","year":"2008","unstructured":"Holman, C. D., Bass, A. J., Rosman, D. L., Smith, M. B., Semmens, J. B., Glasson, E. J., et al. Stanley, F. J. (2008). A decade of data linkage in Western Australia: Strategic design, applications and benefits of the WA data linkage system. Australian Health Review: A Publication of the Australian Hospital Association, 32(4), 766\u2013777. \n                    https:\/\/doi.org\/10.1071\/AH080766\n                    \n                  .","journal-title":"Australian Health Review: A Publication of the Australian Hospital Association"},{"key":"9499_CR34","doi-asserted-by":"publisher","unstructured":"Jensen, C., & Potts, C. (2004). Privacy policies as decision-making tools: An evaluation of online privacy notices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp.\u00a0471\u2013478). New York, NY: ACM. \n                    https:\/\/doi.org\/10.1145\/985692.985752\n                    \n                  .","DOI":"10.1145\/985692.985752"},{"key":"9499_CR35","first-page":"27","volume":"28","author":"L Johnson","year":"2003","unstructured":"Johnson, L. (2003). After enron: Remembering loyalty discourse in corporate law. Delaware Journal of Corporate Law, 28, 27.","journal-title":"Delaware Journal of Corporate Law"},{"issue":"2","key":"9499_CR36","doi-asserted-by":"publisher","first-page":"263","DOI":"10.2307\/1914185","volume":"47","author":"D Kahneman","year":"1979","unstructured":"Kahneman, D., & Tversky, A. (1979). Prospect theory: An analysis of decision under risk. Econometrica, 47(2), 263\u2013291. \n                    https:\/\/doi.org\/10.2307\/1914185\n                    \n                  .","journal-title":"Econometrica"},{"issue":"2","key":"9499_CR37","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1017\/S0963180115000614","volume":"25","author":"B Kaplan","year":"2016","unstructured":"Kaplan, B. (2016). How should health data be used? Privacy, secondary use, and big data sales. Cambridge Quarterly of Healthcare Ethics, 25(2), 312\u2013329. \n                    https:\/\/doi.org\/10.1017\/S0963180115000614\n                    \n                  .","journal-title":"Cambridge Quarterly of Healthcare Ethics"},{"key":"9499_CR38","first-page":"397","volume":"72","author":"C Konnoth","year":"2015","unstructured":"Konnoth, C. (2015). Classification and standards for health information: ethical and practical approaches. Washington and Lee Law Review Online, 72, 397.","journal-title":"Washington and Lee Law Review Online"},{"key":"9499_CR39","unstructured":"Kumar, A. (2014). Zero day exploit (SSRN Scholarly Paper No. ID 2378317). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=2378317\n                    \n                  ."},{"key":"9499_CR40","unstructured":"Licht, A. N. (2016). Motivation, information, negotiation: Why fiduciary accountability cannot be negotiable (SSRN Scholarly Paper No. ID 2811237). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=2811237\n                    \n                  ."},{"key":"9499_CR41","unstructured":"Long, B. (2017, April 11). Lewis silkin\u2014introductory guide to data sharing. Retrieved October 4, 2017 from \n                    http:\/\/www.lewissilkin.com\/Insights\/Introductory-guide-to-data-sharing\n                    \n                  ."},{"key":"9499_CR42","unstructured":"Lupton, D. (2015). Digital health technologies and digital data: New ways of monitoring, measuring and commodifying human embodiment, health and illness (SSRN Scholarly Paper No. ID 2552998). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=2552998\n                    \n                  ."},{"key":"9499_CR43","doi-asserted-by":"crossref","unstructured":"Martin, G., Martin, P., Hankin, C., Darzi, A., & Kinross, J. (2017). Cybersecurity and healthcare: how safe are we? BMJ, 358.","DOI":"10.1136\/bmj.j3179"},{"key":"9499_CR44","first-page":"543","volume":"4","author":"AM McDonald","year":"2008","unstructured":"McDonald, A. M., & Cranor, L. F. (2008). The cost of reading privacy policies. I\/S: A. Journal of Law and Policy for the Information Society, 4, 543.","journal-title":"Journal of Law and Policy for the Information Society"},{"issue":"1","key":"9499_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18060\/18959","volume":"12","author":"MJ Mehlman","year":"2015","unstructured":"Mehlman, M. J. (2015). Why physicians are fiduciaries for their patients. Indiana Health Law Review, 12(1), 1\u201364. \n                    https:\/\/doi.org\/10.18060\/18959\n                    \n                  .","journal-title":"Indiana Health Law Review"},{"issue":"2","key":"9499_CR46","doi-asserted-by":"publisher","first-page":"235","DOI":"10.7202\/1002367ar","volume":"56","author":"P Miller","year":"2011","unstructured":"Miller, P. (2011). A theory of fiduciary liability. McGill Law Journal\/Revue de Droit de McGill, 56(2), 235\u2013288. \n                    https:\/\/doi.org\/10.7202\/1002367ar\n                    \n                  .","journal-title":"McGill Law Journal\/Revue de Droit de McGill"},{"key":"9499_CR47","unstructured":"Narayanan, A., & Felten, E. (2014, July 9). No silver bullet: De-identification still doesn\u2019t work. Retrieved from \n                    http:\/\/www.privacylives.com\/wp-content\/uploads\/2015\/02\/narayanan-felten-no-silver-bullet-de-identification-2014.pdf\n                    \n                  ."},{"issue":"4","key":"9499_CR48","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1162\/DAED_a_00113","volume":"140","author":"H Nissenbaum","year":"2011","unstructured":"Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 32\u201348. \n                    https:\/\/doi.org\/10.1162\/DAED_a_00113\n                    \n                  .","journal-title":"Daedalus"},{"key":"9499_CR49","unstructured":"Ohm, P. (2009). Broken promises of privacy: Responding to the surprising failure of anonymization (SSRN Scholarly Paper No. ID 1450006). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=1450006\n                    \n                  ."},{"key":"9499_CR50","volume-title":"Privacy of health records: Europeans\u2019 preferences on electronic health data storage and sharing","author":"S Patil","year":"2015","unstructured":"Patil, S., Patruni, B., Lu, H., Dunkerley, F., Fox, J., Potoglou, D., & Robinson, N. (2015). Privacy of health records: Europeans\u2019 preferences on electronic health data storage and sharing. Santa Monica: Rand Corporation."},{"key":"9499_CR51","unstructured":"Price, W. N. (2017a). Medical malpractice and black-box medicine (SSRN Scholarly Paper No. ID 2910417). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=2910417\n                    \n                  ."},{"key":"9499_CR52","unstructured":"Price, W. N. (2017b). Regulating black-box medicine (SSRN Scholarly Paper No. ID 2938391). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=2938391\n                    \n                  ."},{"key":"9499_CR53","unstructured":"Recital 39\u2014Principles of data processing. (n.d.). Retrieved December 13, 2018 from \n                    https:\/\/gdpr-info.eu\/recitals\/no-39\/\n                    \n                  ."},{"key":"9499_CR54","unstructured":"Recital 58, GDPR. (n.d.). Retrieved February 6, 2018 from \n                    https:\/\/gdpr-info.eu\/recitals\/no-58\/\n                    \n                  ."},{"key":"9499_CR55","unstructured":"Rotman, L. (2011). Fiduciary Law\u2019s \u2018Holy Grail\u2019: Reconciling theory and practice in fiduciary jurisprudence. Knowledge@SchulichLaw, 0(0). Retrieved from \n                    https:\/\/ojs.library.dal.ca\/KNOWSL\/article\/view\/4742\n                    \n                  ."},{"key":"9499_CR56","unstructured":"Rubinstein, I. (2012). Big data: The end of privacy or a new beginning? (SSRN Scholarly Paper No. ID 2157659). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=2157659\n                    \n                  ."},{"issue":"6","key":"9499_CR57","doi-asserted-by":"publisher","first-page":"563","DOI":"10.2217\/pme-2016-0057","volume":"13","author":"T Sharon","year":"2016","unstructured":"Sharon, T. (2016). The Googlization of health research: From disruptive innovation to disruptive ethics. Personalized Medicine, 13(6), 563\u2013574. \n                    https:\/\/doi.org\/10.2217\/pme-2016-0057\n                    \n                  .","journal-title":"Personalized Medicine"},{"key":"9499_CR58","first-page":"1039","volume":"91","author":"RH Sitkoff","year":"2011","unstructured":"Sitkoff, R. H. (2011). The economic structure of Fiduciary law. Boston University Law Review, 91, 1039.","journal-title":"Boston University Law Review"},{"key":"9499_CR59","first-page":"1399","volume":"55","author":"DG Smith","year":"2002","unstructured":"Smith, D. G. (2002). The critical resource theory of Fiduciary duty. Vanderbilt Law Review, 55, 1399.","journal-title":"Vanderbilt Law Review"},{"key":"9499_CR60","unstructured":"Smith, H. E. (2013). Why Fiduciary law is equitable (SSRN Scholarly Paper No. ID 2321315). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=2321315\n                    \n                  ."},{"key":"9499_CR61","first-page":"745","volume":"44","author":"DJ Solove","year":"2007","unstructured":"Solove, D. J. (2007). I\u2019ve got nothing to hide and other misunderstandings of privacy. San Diego Law Review, 44, 745.","journal-title":"San Diego Law Review"},{"key":"9499_CR62","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1007\/978-3-319-31232-3_102","volume-title":"New advances in information systems and technologies","author":"D Spagnuelo","year":"2016","unstructured":"Spagnuelo, D., & Lenzini, G. (2016). Patient-centred transparency requirements for medical data sharing systems. In New advances in information systems and technologies (pp.\u00a01073\u20131083). Cham: Springer. \n                    https:\/\/doi.org\/10.1007\/978-3-319-31232-3_102\n                    \n                  ."},{"key":"9499_CR63","unstructured":"Terry, N. (2012). Protecting patient privacy in the age of big data (SSRN Scholarly Paper No. ID 2153269). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=2153269\n                    \n                  ."},{"key":"9499_CR70","unstructured":"The Seven-Per-Cent Solution. (1976). Universal Studios."},{"issue":"2","key":"9499_CR64","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1080\/17579961.2018.1527479","volume":"10","author":"S Wachter","year":"2018","unstructured":"Wachter, S. (2018). The GDPR and the internet of things: A three-step transparency model. Law, Innovation and Technology, 10(2), 266\u2013294. \n                    https:\/\/doi.org\/10.1080\/17579961.2018.1527479\n                    \n                  .","journal-title":"Law, Innovation and Technology"},{"key":"9499_CR65","unstructured":"Williamson, O. E. (1975). Markets and hierarchies: Analysis and antitrust implications: A study in the economics of internal organization (SSRN Scholarly Paper No. ID 1496220). Rochester, NY: Social Science Research Network. Retrieved from \n                    https:\/\/papers.ssrn.com\/abstract=1496220\n                    \n                  ."},{"key":"9499_CR66","doi-asserted-by":"publisher","DOI":"10.1093\/he\/9780199290505.001.0001","volume-title":"Equity","author":"S Worthington","year":"2006","unstructured":"Worthington, S. (2006). Equity. Oxford: OUP Oxford."},{"key":"9499_CR67","first-page":"1","volume":"25","author":"J Yakowitz","year":"2011","unstructured":"Yakowitz, J. (2011). Tragedy of the data commons. Harvard Journal of Law & Technology, 25, 1.","journal-title":"Harvard Journal of Law & Technology"},{"key":"9499_CR68","first-page":"995","volume":"47","author":"TZ Zarsky","year":"2016","unstructured":"Zarsky, T. Z. (2016). Incompatible: The GDPR in the age of big data. Seton Hall Law Review, 47, 995.","journal-title":"Seton Hall Law Review"},{"key":"9499_CR69","unstructured":"Zittrain, J., & Balkin, J. M. (2016, October 3). A grand bargain to make tech companies trustworthy. The Atlantic. Retrieved from \n                    https:\/\/www.theatlantic.com\/technology\/archive\/2016\/10\/information-fiduciary\/502346\/\n                    \n                  ."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-019-09499-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09499-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09499-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,12]],"date-time":"2020-02-12T19:21:22Z","timestamp":1581535282000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-019-09499-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,13]]},"references-count":70,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["9499"],"URL":"https:\/\/doi.org\/10.1007\/s10676-019-09499-x","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,13]]},"assertion":[{"value":"13 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}