{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T02:12:03Z","timestamp":1767838323724,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T00:00:00Z","timestamp":1549843200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T00:00:00Z","timestamp":1549843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["700510"],"award-info":[{"award-number":["700510"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s10676-019-09501-6","type":"journal-article","created":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T15:26:09Z","timestamp":1549898769000},"page":"7-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Agile ethics: an iterative and flexible approach to assessing ethical, legal and social issues in the agile development of crisis management information systems"],"prefix":"10.1007","volume":"23","author":[{"given":"Inga","family":"Kroener","sequence":"first","affiliation":[]},{"given":"David","family":"Barnard-Wills","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9370-0617","authenticated-orcid":false,"given":"Julia","family":"Muraszkiewicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,11]]},"reference":[{"issue":"2","key":"9501_CR1","doi-asserted-by":"publisher","first-page":"185","DOI":"10.24908\/ss.v12i2.5242","volume":"12","author":"M Andrejevic","year":"2014","unstructured":"Andrejevic, M., & Gates, K. (2014). Big data surveillance. Surveillance and Society, 12(2), 185\u2013196.","journal-title":"Surveillance and Society"},{"key":"9501_CR2","volume-title":"Surveillance and identity: Discourse, subjectivity and the state, ashgate","author":"D Barnard-Wills","year":"2012","unstructured":"Barnard-Wills, D. (2012). Surveillance and identity: Discourse, subjectivity and the state, ashgate. Farnham: Routledge."},{"key":"9501_CR3","volume-title":"Big data, surveillance and crisis management","year":"2017","unstructured":"Boersma, K., & Fonio, C. (Eds.) (2017). Big data, surveillance and crisis management. Routledge, London."},{"key":"9501_CR4","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.geoforum.2014.02.002","volume":"53","author":"R Burns","year":"2014","unstructured":"Burns, R. (2014). Moments of closure in the knowledge politics of digital humanitarianism. Geoforum, 53, 51\u201362.","journal-title":"Geoforum"},{"key":"9501_CR5","unstructured":"Busher, M., Bylund, M., Sanches, P., Ramirez, L., & Wood, L. (2013). A New Manhatten Project? Interoperability and Ethics in Emergency Response systems of systems. Proceedings of the 10th International ISCRAM conference, Baden-Baden, Germany, May 2013."},{"issue":"4","key":"9501_CR6","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1057\/ejis.2009.26","volume":"18","author":"L Cao","year":"2009","unstructured":"Cao, L., Mohan, K., Peng, X., & Ramesh, B. (2009). A framework for adapting agile development methodologies. European Journal of Information Systems, 18(4), 332\u2013343.","journal-title":"European Journal of Information Systems"},{"key":"9501_CR7","unstructured":"Cavoukian, A. (date unknown). \u2018Privacy by design. The 7th Foundational Principles.\u2019 [Online] https:\/\/www.ipc.on.ca\/wp-content\/uploads\/Resources\/7foundationalprinciples.pdf."},{"key":"9501_CR8","unstructured":"Cavoukian, A. (2012). Operationalizing privacy by design: A guide to implementing strong privacy practices. Information and Privacy Commissioner, Ontario, Canada, December 2012."},{"issue":"2","key":"9501_CR9","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.clsr.2009.02.002","volume":"25","author":"R Clarke","year":"2009","unstructured":"Clarke, R. (2009). Privacy impact assessment: Its origin and development. Computer Law and Security Review, 25(2), 123\u2013135.","journal-title":"Computer Law and Security Review"},{"issue":"11","key":"9501_CR10","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/2.963450","volume":"34","author":"A Cockburn","year":"2001","unstructured":"Cockburn, A., Highsmith, J. (2001). Agile software development: The people factor. Computer, 34(11), 131\u2013133. https:\/\/doi.org\/10.1109\/2.963450.","journal-title":"Computer"},{"issue":"3","key":"9501_CR11","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1287\/isre.1090.0236","volume":"20","author":"K Conboy","year":"2009","unstructured":"Conboy, K. (2009). Agility from first principles: Reconstructing the concept of agility. Information Systems Development. Information Systems Research, 20(3), 329\u2013354.","journal-title":"Information Systems Development. Information Systems Research"},{"issue":"6","key":"9501_CR12","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1080\/13691180701750991","volume":"10","author":"M Crang","year":"2009","unstructured":"Crang, M., & Graham, S. (2009). Sentient cities: Ambient intelligence and the politics of urban space. Information, Communication and Society, 10(6), 789\u2013817.","journal-title":"Information, Communication and Society"},{"key":"9501_CR13","unstructured":"De Hert, P., Kloza, D., Wright, D., Wadhwa, K., Hosein, G., & Davies, S. (2012). Recommendations for a privacy impact assessment framework for the European Union. Deliverable for the PIAF Project [Online] http:\/\/www.piafproject.eu\/ref\/PIAF_D3_final.pdf."},{"key":"9501_CR14","volume-title":"The global struggle for human rights: Universal principles in world politics","author":"D DeLaet","year":"2006","unstructured":"DeLaet, D. (2006). The global struggle for human rights: Universal principles in world politics. Belmont: Wadsworth Publishing Co Inc."},{"key":"9501_CR15","unstructured":"Dette, R. (2016). Do no digital harm: Mitigating technology risks in Humanitarian contexts. Global Public Policy Institute [Online] https:\/\/cooperation.epfl.ch\/files\/content\/sites\/cooperation\/files\/Tech4Dev%202016\/1282-Dette-SE01-HUM_FullPaper.pdf."},{"issue":"2","key":"9501_CR16","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1353\/hrq.2007.0016","volume":"29","author":"J Donnelly","year":"2007","unstructured":"Donnelly, J. (2007). The relative universality of human rights. Human Rights Quarterly, 29(2), 281\u2013306.","journal-title":"Human Rights Quarterly"},{"key":"9501_CR17","unstructured":"Finn, R., Friedewald, M., Gellert, R., Gutwirth, R., H\u00fcsing, B., Kukk, P., Mordini, E., Sch\u00fbtz, P., Venier, S., & Wright, D. (2011). Privacy, data protection and ethical issues in new and emerging technologies: Five case studies. Deliverable for the Prescient Project [Online] https:\/\/www.prescient-project.eu\/prescient\/inhalte\/documents\/deliverables.php."},{"issue":"9","key":"9501_CR18","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1002\/spe.1100","volume":"41","author":"D Greer","year":"2011","unstructured":"Greer, D., & Hamon, Y. (2011). Agile software development. Software\u2014Practice and Experience, 41(9), 943\u2013944. https:\/\/doi.org\/10.1002\/spe.1100.","journal-title":"Software\u2014Practice and Experience"},{"issue":"1","key":"9501_CR19","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1177\/0002716205285404","volume":"604","author":"JR Harrald","year":"2006","unstructured":"Harrald, J. R. (2006). Agility and discipline: Critical success factors for disaster response. The ANNALS of the American Academy of Political and Social Science, 604(1), 256\u2013272. https:\/\/doi.org\/10.1177\/0002716205285404.","journal-title":"The ANNALS of the American Academy of Political and Social Science"},{"key":"9501_CR20","volume-title":"Understanding attacks on humanitarian aid workers. Conflict Trends","author":"K Hoelscher","year":"2015","unstructured":"Hoelscher, K., et al. (2015). Understanding attacks on humanitarian aid workers. Conflict Trends, vol. 6, PRIO: Oslo."},{"key":"9501_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91068-0","volume-title":"Technologies for development from innovation to social impact","author":"S Hostettler","year":"2018","unstructured":"Hostettler, S., Besson, N.S., Bolay, J-C. (2018). Technologies for development from innovation to social impact. Cham: SpringerOpen."},{"key":"9501_CR22","unstructured":"Humanitarian Outcomes (2015). Aid worker security report: Figures at a glance\u20142016. [Online] https:\/\/aidworkersecurity.org\/sites\/default\/files\/HO_AidWorkerSecPreview_1015_G.PDF_.pdf."},{"key":"9501_CR23","unstructured":"Iannelli, O. (2018). D3.2\u2014Socio-cultural considerations for future development. Deliverable for the iTRACK project [Online] https:\/\/www.itrack-project.eu\/."},{"key":"9501_CR24","unstructured":"ICO. (2014). Conducting privacy impact assessments code of practice. [Online] https:\/\/ico.org.uk\/media\/for-organisations\/documents\/1595\/pia-code-of-practice.pdf."},{"key":"9501_CR25","unstructured":"International Conference of Data Protection and Privacy Commissioners (2009). International Standards on the Protection of Personal Data and Privacy: The Madrid Resolution. Madrid. [Online] https:\/\/icdppc.org\/wp-content\/uploads\/2015\/02\/The-Madrid-Resolution.pdf."},{"key":"9501_CR26","volume-title":"Big data, surveillance and crisis management","author":"X Kerasidou","year":"2017","unstructured":"Kerasidou, X., Petersen, K., & B\u00fcscher, M. (2017). Intersecting ingelligence. In K. Boersma & C. Fonio (Eds.), Big data, surveillance and crisis management. London: Routledge."},{"key":"9501_CR27","volume-title":"Hacia Un Nuevo Derecho Europeo De Protecci\u00f3n De Datos","author":"I Kroener","year":"2015","unstructured":"Kroener, I., & Wright, D. (2015). Privacy impact assessment policy issues. In A. R. Lombarte, R. G. Mahamut (Eds.) Hacia Un Nuevo Derecho Europeo De Protecci\u00f3n De Datos. Valencia: Towards A New European Data Protection Regime, Tirant lo Blanch."},{"issue":"5","key":"9501_CR28","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1080\/01972243.2014.944730","volume":"30","author":"I Kroener","year":"2014","unstructured":"Kroener, I., & Wright, D. (2014). A strategy for operationalising privacy by design. The Information Society, 30(5), 355\u2013365.","journal-title":"The Information Society"},{"key":"9501_CR100","doi-asserted-by":"crossref","unstructured":"Langheinrich, M. (2001). Privacy-by-Design: Principles of Privacy-Aware ubiquitous computing. In: Umbicomp 2001: International Conference on Ubiquitous Computing (pp. 273\u2013291).","DOI":"10.1007\/3-540-45427-6_23"},{"key":"9501_CR29","volume-title":"Surveillance studies: An overview","author":"D Lyon","year":"2007","unstructured":"Lyon, D. (2007). Surveillance studies: An overview. London: Polity Press."},{"key":"9501_CR30","doi-asserted-by":"publisher","DOI":"10.1201\/b18023","volume-title":"Digital humanitarians: How BIG DATA is changing the face of humanitarian response","author":"P Meier","year":"2015","unstructured":"Meier, P. (2015). Digital humanitarians: How BIG DATA is changing the face of humanitarian response. London: CRC Press, Taylor and Francis Group."},{"issue":"3","key":"9501_CR31","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1226736.1226764","volume":"50","author":"D Mendon\u00e7a","year":"2007","unstructured":"Mendon\u00e7a, D., Jefferson, T., & Harrald, J. R. (2007). Collaborative adhocracies and mix-and-match technologies in emergency management. Communications of the ACM, 50(3), 45\u201349. https:\/\/doi.org\/10.1145\/1226736.1226764.","journal-title":"Communications of the ACM"},{"key":"9501_CR32","volume-title":"Surveillance in the time of insecurity","author":"T Monahan","year":"2010","unstructured":"Monahan, T. (2010). Surveillance in the time of insecurity. New Brunswick: Rutgers University Press."},{"key":"9501_CR33","volume-title":"To save everything, click here: Technology, solutionism and the urge to fix problems that don\u2019t exist","author":"E Morozov","year":"2013","unstructured":"Morozov, E. (2013). To save everything, click here: Technology, solutionism and the urge to fix problems that don\u2019t exist. London: Penguin."},{"key":"9501_CR34","unstructured":"Oliver, I. (2014). Privacy Engineering. CreateSpace, USA."},{"key":"9501_CR35","unstructured":"Petersen, K. (2015). ELSI guidelines for collaborative design and database of representative emergence and disaster events in Europe. Deliverable 2.2, SecInCoRe project. [Online] http:\/\/www.secincore.eu\/."},{"issue":"1","key":"9501_CR36","doi-asserted-by":"publisher","first-page":"9","DOI":"10.5038\/1911-9933.11.1.1454","volume":"11","author":"K Sandvik","year":"2017","unstructured":"Sandvik, K., & Raymond, N. A. (2017) Beyond the protective effect: Towards a theory of harm for information communication technologies in mass atrocity response. Genocide Studies and Prevention: An International Journal, 11(1), 9\u201324.","journal-title":"Genocide Studies and Prevention: An International Journal"},{"issue":"893","key":"9501_CR37","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1017\/S1816383114000344","volume":"96","author":"KB Sandvik","year":"2014","unstructured":"Sandvik, K. B., Jumbert, M. J., Karlsrud, J., & Kaufmann, M. (2014). Humanitarian technology: a critical research agenda. International Review of the Red Cross, 96(893), 219\u2013242.","journal-title":"International Review of the Red Cross"},{"key":"9501_CR38","volume-title":"Paperback oxford english dictionary","author":"C Soanes","year":"2002","unstructured":"Soanes, C. (2002). Paperback oxford english dictionary. Oxford: Oxford University Press."},{"key":"9501_CR39","unstructured":"Vinck, P. (2013). Humanitarian technology. World disasters report 2013, international federation of red cross and red crescent societies, [Online] http:\/\/www.ifrc.org\/PageFiles\/134658\/WDR%202013%20complete.pdf."},{"key":"9501_CR40","unstructured":"Wadhwa, K., & Wright, D. (2014). Following best practices in privacy impact assessments. Privacy Laws and Business, January."},{"key":"9501_CR41","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.clsr.2011.11.007","volume":"28","author":"D Wright","year":"2012","unstructured":"Wright, D. (2012). The state of the art in privacy impact assessment. Computer Law and Security Review, 28, 54\u201361.","journal-title":"Computer Law and Security Review"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-019-09501-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09501-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09501-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T05:14:00Z","timestamp":1638767640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-019-09501-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,11]]},"references-count":42,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["9501"],"URL":"https:\/\/doi.org\/10.1007\/s10676-019-09501-6","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,11]]},"assertion":[{"value":"11 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}