{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:30:18Z","timestamp":1740123018767,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T00:00:00Z","timestamp":1552867200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s10676-019-09500-7","type":"journal-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T14:04:15Z","timestamp":1552917855000},"page":"117-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The moral limits of the market: the case of consumer scoring data"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9565-4562","authenticated-orcid":false,"given":"Adam","family":"Pham","sequence":"first","affiliation":[]},{"given":"Clinton","family":"Castro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,18]]},"reference":[{"key":"9500_CR1","unstructured":"Acquisti, A., Taylor, C. R., & Wagman, L. (2016). The economics of privacy. SSRN Scholarly Paper. Rochester, NY: Social Science Research Network. Retrieved March 8, 2016 from https:\/\/papers.ssrn.com\/abstract=2580411 ."},{"issue":"3","key":"9500_CR2","doi-asserted-by":"publisher","first-page":"488","DOI":"10.2307\/1879431","volume":"84","author":"GA Akerlof","year":"1970","unstructured":"Akerlof, G. A. (1970). The market for \u2018Lemons\u2019: Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84(3), 488\u2013500. https:\/\/doi.org\/10.2307\/1879431 .","journal-title":"The Quarterly Journal of Economics"},{"key":"9500_CR3","volume-title":"The New Jim Crow: mass incarceration in the age of colorblindness","author":"M Alexander","year":"2012","unstructured":"Alexander, M., & West, C. (2012). The New Jim Crow: mass incarceration in the age of colorblindness. New York: The New Press."},{"issue":"3","key":"9500_CR4","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1177\/1461444816676645","volume":"20","author":"M Ananny","year":"2018","unstructured":"Ananny, M., & Crawford, K. (2018). Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability. New Media & Society, 20(3), 973\u2013989. https:\/\/doi.org\/10.1177\/1461444816676645 .","journal-title":"New Media & Society"},{"issue":"2","key":"9500_CR5","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1017\/S0266267100001218","volume":"6","author":"E Anderson","year":"1990","unstructured":"Anderson, E. (1990). The ethical limitations of the market. Economics and Philosophy, 6(2), 179\u2013205. https:\/\/doi.org\/10.1017\/S0266267100001218 .","journal-title":"Economics and Philosophy"},{"key":"9500_CR6","volume-title":"Value in ethics and economics","author":"E Anderson","year":"1995","unstructured":"Anderson, E. (1995). Value in ethics and economics (Revised\u00a0edn.). Cambridge: Harvard University Press.","edition":"Revised"},{"key":"9500_CR7","unstructured":"Angwin, J., & Larson, J. (2015). The tiger mom tax: Asians are nearly twice as likely to get a higher price from Princeton review. Retrieved September 1, 2015 from, https:\/\/www.propublica.org\/article\/asians-nearly-twice-as-likely-to-get-higher-price-from-princeton-review ."},{"key":"9500_CR8","unstructured":"Angwin, J., Larson, K., Mattu, S., & Kirchner, L. (2016a) \u201cMachine Bias.\u201d ProPublica. Retrieved May 23, 2016 from, https:\/\/www.propublica.org\/article\/machine-bias-risk-assessments-in-criminal-sentencing ."},{"key":"9500_CR9","unstructured":"Angwin, J., & Parris, Jr. T. (2016b). Facebook lets advertisers exclude users by race. Retrieved October 28, 2016 from https:\/\/www.propublica.org\/article\/facebook-lets-advertisers-exclude-users-by-race ."},{"key":"9500_CR10","unstructured":"Angwin, J., Tobin, A., & Varner, M. (2017a). Facebook (still) letting housing advertisers exclude users by race. Retrieved November 21, 2017 from. https:\/\/www.propublica.org\/article\/facebook-advertising-discrimination-housing-race-sex-national-origin ."},{"key":"9500_CR11","unstructured":"Angwin, J., Varner, M., & Ariana, T. (2017b). Facebook enabled advertisers to reach \u2018Jew Haters. Retrieved September 14, 2017 from https:\/\/www.propublica.org\/article\/facebook-enabled-advertisers-to-reach-jew-haters ."},{"key":"9500_CR12","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394","author":"SB Barnes","year":"2006","unstructured":"Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday. https:\/\/doi.org\/10.5210\/fm.v11i9.1394 .","journal-title":"First Monday"},{"issue":"4","key":"9500_CR13","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B Berendt","year":"2005","unstructured":"Berendt, B., G\u00fcnther, O., & Spiekermann, S. (2005). Privacy in E-Commerce: Stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101\u2013106. https:\/\/doi.org\/10.1145\/1053291.1053295 .","journal-title":"Communications of the ACM"},{"key":"9500_CR14","unstructured":"Citron, D., & Pasquale, F. (2014). The scored society: Due process for automated predictions. Faculty Scholarship. Retrieved January 1, 2014 from http:\/\/digitalcommons.law.umaryland.edu\/fac_pubs\/1431 ."},{"key":"9500_CR15","unstructured":"DeCew, J. (2018). Privacy. In E. N. Zalta (Eds.), The Stanford Encyclopedia of Philosophy. Spring 2018. Metaphysics Research Lab, Stanford University, 2018. Retrieved from https:\/\/plato.stanford.edu\/archives\/spr2018\/entries\/privacy\/ ."},{"key":"9500_CR16","unstructured":"Dixon, P., & Gellman, B. (2014). The Scoring of America: How secret consumer scores threaten your privacy and your future. World Privacy Forum, 2014."},{"key":"9500_CR17","unstructured":"Duhigg, C. (2012). How companies learn your secrets. The New York Times, February 16, 2012, sec. Magazine. Retrieved from https:\/\/www.nytimes.com\/2012\/02\/19\/magazine\/shopping-habits.html ."},{"key":"#cr-split#-9500_CR18.1","unstructured":"EU General Data Protection Regulation (GDPR). (2016). Regulation"},{"key":"#cr-split#-9500_CR18.2","unstructured":"(EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation), OJ 2016 L 119\/1."},{"key":"9500_CR19","unstructured":"Experian. (2017). Summarized credit statistics. Retrieved Februrary 1, 2017 from http:\/\/www.experian.com\/assets\/marketing-services\/productsheets\/summarized-credit-stat.pdf ."},{"key":"9500_CR20","unstructured":"Fair Isaac Corporation. (2000). Fair, Isaac \u2018Demystifies\u2019 FICO scores with list of score factors, Web-Based Explanation Service. Retrieved June 8, 2000 from http:\/\/www.prnewswire.com\/news-releases\/fair-isaac-demystifies-fico-scoreswith-list-of-score-factors-web-based-explanation-service-73492572.html ."},{"key":"9500_CR21","volume-title":"Data brokers: A call for transparency and accountability","author":"Federal Trade Commission","year":"2015","unstructured":"Federal Trade Commission. (2015). Data brokers: A call for transparency and accountability. Scotts Valley: CreateSpace Independent Publishing Platform."},{"issue":"11","key":"9500_CR22","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/s11920-014-0494-4","volume":"16","author":"T Glenn","year":"2014","unstructured":"Glenn, T., & Monteith, S. (2014). Privacy in the digital world: Medical and health data outside of HIPAA protections. Current Psychiatry Reports, 16(11), 494.","journal-title":"Current Psychiatry Reports"},{"key":"9500_CR23","unstructured":"Harris, E., Perlroth, N., Popper, N., & Stout, H. (2014). A sneaky path into target customers\u2019 wallets. The New York Times, January 17, 2014."},{"key":"9500_CR24","unstructured":"Hoofnagle, C. J., & King, J. (2007). Consumer Information Sharing: Where the Sun Still Don\u2019t Shine. SSRN Scholarly Paper. Rochester, NY: Social Science Research Network. Retrieved December 17, 2007 from https:\/\/papers.ssrn.com\/abstract=1137990 ."},{"issue":"3","key":"9500_CR25","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1017\/S0963180114000589","volume":"24","author":"B Kaplan","year":"2015","unstructured":"Kaplan, B. (2015). Selling health data: De-identification, privacy, and speech. Cambridge Quarterly of Healthcare Ethics: CQ: The International Journal of Healthcare Ethics Committees, 24(3), 256\u2013271. https:\/\/doi.org\/10.1017\/S0963180114000589 .","journal-title":"Cambridge Quarterly of Healthcare Ethics: CQ: The International Journal of Healthcare Ethics Committees"},{"issue":"9","key":"9500_CR26","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/234215.234476","volume":"39","author":"KC Laudon","year":"1996","unstructured":"Laudon, K. C. (1996). Markets and privacy. Communications of the ACM, 39(9), 92\u2013104. https:\/\/doi.org\/10.1145\/234215.234476 .","journal-title":"Communications of the ACM"},{"issue":"7553","key":"9500_CR27","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436\u2013444. https:\/\/doi.org\/10.1038\/nature14539 .","journal-title":"Nature"},{"key":"9500_CR28","unstructured":"Mui, Y. Q. (2011). Little-known firms tracking data used in credit scores. The Washington Post, July 16, 2011."},{"key":"9500_CR29","volume-title":"Weapons of math destruction: How big data increases inequality and threatens democracy","author":"C O\u2019Neil","year":"2016","unstructured":"O\u2019Neil, C. (2016). Weapons of math destruction: How big data increases inequality and threatens democracy (1st\u00a0ed.). New York: Crown.","edition":"1"},{"key":"9500_CR30","doi-asserted-by":"publisher","unstructured":"Obar, J. A., & Oeldorf-Hirsch, A. (2016) The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Networking Services (August 24, 2016). In TPRC 44: The 44th Research Conference on Communication, Information and Internet Policy 2016. https:\/\/doi.org\/10.2139\/ssrn.2757465 . Retrieved from SSRN https:\/\/ssrn.com\/abstract=2757465 .","DOI":"10.2139\/ssrn.2757465"},{"key":"9500_CR31","volume-title":"The Black Box Society: The secret algorithms that control money and information","author":"F Pasquale","year":"2016","unstructured":"Pasquale, F. (2016). The Black Box Society: The secret algorithms that control money and information. Cambridge: Harvard University Press."},{"key":"9500_CR32","unstructured":"PublicData \u201cPolicies and Positions.\u201d Retrieved February 1, 2018 from http:\/\/www.publicdata.com\/mobilepandp.html ."},{"key":"9500_CR49","unstructured":"Posner, R. (1981). The economics of privacy. American Economic Review, January, 405."},{"key":"9500_CR50","unstructured":"Ramirez, E. (2013). The privacy challenges of big data: A view from the lifeguard\u2019s chair. Aspen, CO."},{"key":"9500_CR35","unstructured":"Rosenberg, M., Confessore, N., & Cadwalladr, C. (2018). \u201cHow Trump Consultants Exploited the Facebook Data of Millions.\u201d The New York Times, March 17, 2018."},{"key":"9500_CR36","volume-title":"The Color of Law: A forgotten history of how our government segregated america","author":"R Rothstein","year":"2017","unstructured":"Rothstein, R. (2017). The Color of Law: A forgotten history of how our government segregated america (1st\u00a0ed.). New York: Liveright.","edition":"1"},{"key":"9500_CR37","volume-title":"What Money Can\u2019t Buy: The Moral Limits of Markets","author":"MJ Sandel","year":"2013","unstructured":"Sandel, M. J. (2013). What Money Can\u2019t Buy: The Moral Limits of Markets. (Reprint ed.). New York: Farrar Straus Giroux."},{"issue":"1","key":"9500_CR38","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1111\/j.1467-9264.2008.00246.x","volume":"108","author":"D Satz","year":"2008","unstructured":"Satz, D. (2008). XIV\u2014the moral limits of markets: The case of human kidneys. Proceedings of the Aristotelian Society, 108(1), 269\u2013288. https:\/\/doi.org\/10.1111\/j.1467-9264.2008.00246.x .","journal-title":"Proceedings of the Aristotelian Society"},{"key":"9500_CR34","volume-title":"Why some things should not be for sale: The moral limits of markets","author":"D Satz","year":"2012","unstructured":"Satz, D. (2012). Why some things should not be for sale: The moral limits of markets (Reprint ed.). New York: Oxford University Press.","edition":"Reprint"},{"key":"9500_CR39","volume-title":"On ethics & economics","author":"A Sen","year":"1999","unstructured":"Sen, A. (1999). On ethics & economics. New Delhi: Oxford."},{"key":"9500_CR40","unstructured":"Sweeney, L. \u201cDiscrimination in Online Ad Delivery.\u201d ArXiv:1301.6822 [Cs]. Retrieved January 28, 2013 from. http:\/\/arxiv.org\/abs\/1301.6822 ."},{"key":"9500_CR41","unstructured":"Sweeney, L. (2015) Only You, Your Doctor, and Many Others May Know. Technology Science. Retrieved September 29, 2015 from https:\/\/techscience.org\/a\/2015092903\/ ."},{"key":"9500_CR42","volume-title":"The Aisles have eyes: How retailers track your shopping, strip your privacy, and define your power","author":"J Turow","year":"2017","unstructured":"Turow, J. (2017). The Aisles have eyes: How retailers track your shopping, strip your privacy, and define your power. New Haven: Yale University Press."},{"key":"9500_CR43","unstructured":"Turow, J., Bleakley, A., Bracken, J., Carpini, M. X. D., Draper, N., Feldman, L., Good, N., et al. (2014). Americans, Marketers, and the Internet: 1999\u20132012.\u201d SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, Retrieved April 11, 2014 from. https:\/\/papers.ssrn.com\/abstract=2423753 ."},{"key":"9500_CR44","unstructured":"Tutt, A. (2016). An FDA for Algorithms. SSRN Scholarly Paper. Rochester, NY: Social Science Research Network. Retrieved March 15, 2016 from https:\/\/papers.ssrn.com\/abstract=2747994 ."},{"key":"9500_CR45","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1017\/CBO9780511498725.016","volume-title":"Information Technology and Moral Philosophy","author":"J Hoven van den","year":"2008","unstructured":"van den Hoven, J. (2008). Information technology, privacy, and the protection of personal data. In M. J. van den Hoven & J. Weckert (Eds.), Information Technology and Moral Philosophy (p.\u00a0301). Cambridge: Cambridge University Press."},{"key":"9500_CR51","unstructured":"United States. (2004). The health insurance portability and accountability act (HIPAA). [Washington, D.C.]: U.S. Dept. of Labor, Employee Benefits Security Administration. http:\/\/purl.fdlp.gov\/GPO\/gpo10291 ."},{"key":"9500_CR46","unstructured":"van den Hoven, J., Blaauw, M., Pieters, W., & Warnier, M. (2018). Privacy and information technology. In E. N. Zalta (Eds.), The Stanford Encyclopedia of Philosophy. Summer 2018. Metaphysics Research Lab, Stanford University, 2018. Retrieved from https:\/\/plato.stanford.edu\/archives\/sum2018\/entries\/it-privacy\/ ."},{"key":"9500_CR47","volume-title":"Spheres of justice: A defense of pluralism and equality","author":"M Walzer","year":"1983","unstructured":"Walzer, M. (1983). Spheres of justice: A defense of pluralism and equality. New York: Basic Books."},{"key":"9500_CR48","unstructured":"Yu, P. S., & Dietrich, S. M. (2012). Broken records: How errors by criminal background checking companies harm workers and businesses. National Consumer Law Center, April 11, 2012."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09500-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-019-09500-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09500-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T16:31:40Z","timestamp":1694709100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-019-09500-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,18]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["9500"],"URL":"https:\/\/doi.org\/10.1007\/s10676-019-09500-7","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2019,3,18]]},"assertion":[{"value":"18 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}