{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T07:06:37Z","timestamp":1776495997993,"version":"3.51.2"},"reference-count":85,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T00:00:00Z","timestamp":1556064000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"European Commission Horizon 2020 Research and Innovation programme","award":["No 731873"],"award-info":[{"award-number":["No 731873"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10676-019-09503-4","type":"journal-article","created":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T17:02:35Z","timestamp":1556125355000},"page":"209-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Reassessing values for emerging big data technologies: integrating design-based and application-based approaches"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2030-7555","authenticated-orcid":false,"given":"Karolina","family":"La Fors","sequence":"first","affiliation":[]},{"given":"Bart","family":"Custers","sequence":"additional","affiliation":[]},{"given":"Esther","family":"Keymolen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,24]]},"reference":[{"key":"9503_CR1","first-page":"205","volume-title":"Shaping technology\/building society: Studies in sociotechnical change","author":"M Akrich","year":"1992","unstructured":"Akrich, M. (1992). The De-scription of technical objects. In W. Bijker & J. Law (Eds.), Shaping technology\/building society: Studies in sociotechnical change (pp. 205\u2013224). Cambridge, MA: MIT Pres."},{"key":"9503_CR2","volume-title":"Metaphysics Books I-IX. Translated by H. Tredennick","author":"Aristotle","year":"1947","unstructured":"Aristotle, (1947). Metaphysics Books I-IX. Translated by H. Tredennick. Cambridge MA, London: Harvard University Press."},{"key":"9503_CR3","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1017\/CBO9781107590205.004","volume-title":"Privacy, big data, and the public good frameworks for engagement","author":"S Barocas","year":"2014","unstructured":"Barocas, S., & Nissenbaum, H. (2014). Big Data\u2019s end run around anonymity and consent. In J. Lane, V. Stodden, S. Bender, & H. Nissenbaum (Eds.), Privacy, big data, and the public good frameworks for engagement (pp. 44\u201375). Cambridge: Cambridge University Press."},{"key":"9503_CR4","first-page":"671","volume":"104","author":"S Barocas","year":"2016","unstructured":"Barocas, S., & Selbst, A. D. (2016). Big Data\u2019s disparate impact. California Law Review, 104, 671.","journal-title":"California Law Review"},{"key":"9503_CR5","volume-title":"Principles of biomedical ethics","author":"T Beauchamp","year":"2012","unstructured":"Beauchamp, T., & Childress, J. F. (2012a). Principles of biomedical ethics (7th ed.). New York: Oxford University Press.","edition":"7"},{"key":"9503_CR6","volume-title":"Principles of biomedical ethics","author":"TL Beauchamp","year":"2012","unstructured":"Beauchamp, T. L., & Childress, J. F. (2012b). Principles of biomedical ethics (7th ed.). New York: Oxford University Press.","edition":"7"},{"key":"9503_CR7","unstructured":"Beckledge, P. (2008). Marxism and ethics. International Socialism A Quarterly Review of Socialist Theory, 120. Retrieved from http:\/\/isj.org.uk\/marxism-and-ethics\/ ."},{"key":"9503_CR8","volume-title":"Of Bicycles, Bakelites and Bulbs: Toward a theory of sociotechnical Change","author":"W Bijker","year":"1995","unstructured":"Bijker, W. (1995). Of Bicycles, Bakelites and Bulbs: Toward a theory of sociotechnical Change. Cambridge, MA: MIT Press."},{"key":"9503_CR9","volume-title":"Shaping technology\/building society studies in sociotechnical change","author":"W Bijker","year":"1992","unstructured":"Bijker, W., & Law, J. (1992). Shaping technology\/building society studies in sociotechnical change. Cambridge, Massachusetts: The MIT Press."},{"key":"9503_CR10","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1007\/978-1-4020-4425-0_8568","volume-title":"Encyclopaedia of the history of science, technology, and medicine in non-western cultures","author":"AL Booth","year":"2008","unstructured":"Booth, A. L. (2008). Environment and nature: The natural environment in native American thought. In H. Selin (Ed.), Encyclopaedia of the history of science, technology, and medicine in non-western cultures (pp. 809\u2013810). The Netherlands: Springer."},{"key":"9503_CR11","volume-title":"Six provocations of big data","author":"D Boyd","year":"2011","unstructured":"Boyd, D., & Crawford, K. (2011). Six provocations of big data. Oxford: Oxford Internet Institute."},{"key":"9503_CR12","first-page":"33","volume-title":"Public accountability: Designs, dilemmas and experiences","author":"J Braithwaite","year":"2006","unstructured":"Braithwaite, J. (2006). Accountability and responsibility through restorative justice. In M. Dowdle (Ed.), Public accountability: Designs, dilemmas and experiences (pp. 33\u201351). Cambridge, MA: Cambridge University Press."},{"issue":"1","key":"9503_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11569-012-0141-7","volume":"6","author":"PAE Brey","year":"2012","unstructured":"Brey, P. A. E. (2012). Anticipatory Ethics for Emerging Technologies. Nanoethics, 6(1), 1\u201313.","journal-title":"Nanoethics"},{"key":"9503_CR14","unstructured":"Bronskill, J. (2018). Families with kids getting caught by no-fly lists are taking their case to Ottawa."},{"key":"9503_CR15","volume-title":"Discrimination and privacy in the information society","author":"T Calders","year":"2013","unstructured":"Calders, T., & Custers, B. H. M. (2013). What is data mining and how does it work? In T. Calders, B. H. M. Custers, B. Schermer, & T. Zarsky (Eds.), Discrimination and privacy in the information society. Berlin, Heidelberg: Springer."},{"key":"9503_CR16","volume-title":"Japanese environmental philosophy","year":"2017","unstructured":"Callicott, B. J., & McRae, J. (Eds.). (2017). Japanese environmental philosophy. Oxford: Oxford University Press."},{"key":"9503_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-8625-6","volume-title":"African indigenous ethics in global bioethics: Interpreting Ubuntu (advancing global bioethics)","author":"LT Chuwa","year":"2014","unstructured":"Chuwa, L. T. (2014). African indigenous ethics in global bioethics: Interpreting Ubuntu (advancing global bioethics) (1st ed.). Dordrecht: Springer.","edition":"1"},{"key":"9503_CR18","unstructured":"Confucius. (1997). The Analects of Confucius. (S. Translated by Leys, Ed.)."},{"key":"9503_CR19","unstructured":"Cukier, K., & Mayer-Sch\u00f6nberger, V. (2013). The rise of Big Data: How it is changing the way we think about the world. 92 Foreign Aff., 28."},{"key":"9503_CR20","volume-title":"Ethics, computing and genomics: Moral controversies in computational genomics","author":"BHM Custers","year":"2005","unstructured":"Custers, B. H. M. (2005). The risks of epidemiological data mining. In H. Tavani (Ed.), Ethics, computing and genomics: Moral controversies in computational genomics. Boston: Jones and Bartlett Publishers Inc."},{"key":"9503_CR21","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3091018","volume-title":"Lists of ethical, legal, societal and economic issues of big data technologies","author":"BHM Custers","year":"2017","unstructured":"Custers, B. H. M., La Fors, K., Jozwiak, M., Keymolen, E., Bachlechner, D., Friedewald, M., et al. (2017). Lists of ethical, legal, societal and economic issues of big data technologies. Leiden: Leiden University."},{"issue":"1","key":"9503_CR22","first-page":"4","volume":"6","author":"BHM Custers","year":"2016","unstructured":"Custers, B. H. M., & Ursic, H. (2016). Big data and data reuse: A taxonomy of data reuse for balancing big data benefits and personal data protection. International Data Privacy Law, 6(1), 4\u201315.","journal-title":"International Data Privacy Law"},{"issue":"3","key":"9503_CR23","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1002\/1944-2866.POI366","volume":"6","author":"BHM Custers","year":"2014","unstructured":"Custers, B. H. M., Van der Hof, S., & Schermer, B. W. (2014). Privacy expectations of social media users: The role of informed consent. Policy & Internet, 6(3), 268\u2013295.","journal-title":"Policy & Internet"},{"issue":"4","key":"9503_CR24","doi-asserted-by":"crossref","first-page":"435","DOI":"10.2966\/scrip.100413.435","volume":"10","author":"BHM Custers","year":"2013","unstructured":"Custers, B. H. M., Van der Hof, S., Schermer, B., Appleby-Arnold, S., & Brockdorff, N. (2013). Informed consent in social media use. The Gap between user expectations and EU personal data protection law. SCRIPTed, Journal of Law, Technology and Society, 10(4), 435\u2013457.","journal-title":"SCRIPTed, Journal of Law, Technology and Society"},{"key":"9503_CR25","first-page":"61","volume-title":"Privacy and the criminal law","author":"P Hert De","year":"2006","unstructured":"De Hert, P., & Gutwirth, S. (2006). Privacy, data protection and law enforcement. Opacity of the individual and transparency of power. In E. Claes, A. Duff, & S. Gutwirth (Eds.), Privacy and the criminal law (pp. 61\u2013104). Antwerp\/Oxford: Intersentia."},{"key":"9503_CR26","volume-title":"The oxford handbook of law, regulation and technology","author":"M D\u00fcwell","year":"2017","unstructured":"D\u00fcwell, M. (2017). Human dignity and the ethics and regulation of technology. In R. Brownsword & E. Scotford (Eds.), The oxford handbook of law, regulation and technology. Oxford: Oxford Handbooks Online."},{"key":"9503_CR27","volume-title":"Being Digital Citizens","author":"I Engin","year":"2015","unstructured":"Engin, I., & Ruppert, E. (2015). Being Digital Citizens. London: Rowman & Littlefield International."},{"key":"9503_CR28","unstructured":"Ethical Principles for Teachers. (2012). Retrieved from http:\/\/schoolofeducators.com\/2012\/06\/ethical-principles-for-teachers\/ ."},{"key":"9503_CR29","unstructured":"False Match Shows No Fly-List Isn\u2019t Perfect. (2010). CBS. Retrieved from https:\/\/www.cbsnews.com\/news\/false-match-shows-no-fly-list-isnt-perfect\/ ."},{"key":"9503_CR30","unstructured":"Frankel, T. C., & Whoriskey, P. (2016). Tossed aside in the \u2018white gold\u2019 rush: Indigenous people are left poor as tech world takes lithium from under their feet. The Washington Post."},{"key":"9503_CR31","unstructured":"Friedman, B., Kahn, P. H., & Borning, A. (2006). Value sensitive design and information systems. In N. P. Zhang & D. Galletta (Eds.), Human-computer interaction in management information systems: Foundations (pp. 1\u201327). New York: M. E. Sharpe. Retrieved from https:\/\/cseweb.ucsd.edu\/~goguen\/courses\/271\/friedman04.pdf ."},{"key":"9503_CR32","volume-title":"Visions of STS Counterpoints in science, technology, and society studies","author":"L Fuglslang","year":"2001","unstructured":"Fuglslang, L. (2001). Three perspectives in STS in the policy context. In S. Cutcliffe & C. Mitcham (Eds.), Visions of STS Counterpoints in science, technology, and society studies. Albany: State University of New York Press."},{"key":"9503_CR33","unstructured":"Gebru, T., Morgenstern, J., Vecchione, B., Vaughan, J. W., Wallach, H., Daume\u00e9, H., & Crawford, K. (2018). Datasheets for Datasets. In Proceedings of the 5 th Workshop on Fairness, Accountability, and Transparency in Machine Learning. Stockholm, Sweden, PMLR 80. Retrieved from http:\/\/arxiv.org\/abs\/1803.09010 ."},{"key":"9503_CR34","unstructured":"Gray, R. (2015). Google apologizes after Photos app tags black couple as gorillas: Fault in image recognition software mislabeled picture. The Daily Mail."},{"key":"9503_CR35","first-page":"62","volume":"98","author":"D Gray","year":"2013","unstructured":"Gray, D., & Citron, D. (2013). The right to quantitative privacy. Minnesota Law Review, 98, 62\u2013144.","journal-title":"Minnesota Law Review"},{"key":"9503_CR36","volume-title":"Data ethics: The new competitive advantage","author":"G Hasselbalch","year":"2016","unstructured":"Hasselbalch, G., & Tranberg, P. (2016). Data ethics: The new competitive advantage. Copenhagen: PubliShare."},{"key":"9503_CR37","unstructured":"Hern, A. (2015). Flickr complaints offensive auto-tagging photos."},{"key":"9503_CR38","doi-asserted-by":"publisher","DOI":"10.4324\/9780203427644","volume-title":"Privacy, due process and the computational turn: The philosophy of law meets the philosophy of technology","author":"M Hildebrandt","year":"2013","unstructured":"Hildebrandt, M., & de Vries, K. (2013). Privacy, due process and the computational turn: The philosophy of law meets the philosophy of technology. London: Routledge."},{"key":"9503_CR39","volume-title":"The practice of virtue","author":"R Hurthouse","year":"2006","unstructured":"Hurthouse, R. (2006). Applying virtue ethics to our treatment of the other animals. In J. Welchman (Ed.), The practice of virtue. Indianapolis: Hackett Publishing Company."},{"key":"9503_CR40","volume-title":"Feminist ethics","author":"A Jagger","year":"1991","unstructured":"Jagger, A. (1991). Feminist ethics: Projects, problems, prospects. In C. Card (Ed.), Feminist ethics. Lawrence: University of Kansas Press."},{"key":"9503_CR41","unstructured":"Jasperneite, J. (2012). Was hinter Begriffen wie Industrie 4.0 steckt. Computer & Automation, December 1."},{"key":"9503_CR42","unstructured":"Jennings, L., Souvereign, A., Bottorff, N., Pederson Mussel, M., & Vye, C. (2005). Nine ethical values of master therapists. Journal of Mental Health Counseling, 27(1), 32\u201347. Retrieved from http:\/\/amhcajournal.org\/doi\/abs\/10.17744\/mehc.27.1.lmm8vmdujgev2qhp?code=amhc-site ."},{"issue":"3","key":"9503_CR43","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1177\/0095399704263479","volume":"36","author":"PH Jos","year":"2004","unstructured":"Jos, P. H., & Tompkins, M. E. (2004). The accountability paradox in an age of reinvention. Administration and Society, 36(3), 255\u2013281.","journal-title":"Administration and Society"},{"key":"9503_CR44","unstructured":"Josephson Institute of Ethics. (2010). 12 ethical principles for business executives. Retrieved from http:\/\/josephsononbusinessethics.com\/2010\/12\/12-ethical-principles-for-business-executives\/ ."},{"issue":"2013\u20132014","key":"9503_CR45","first-page":"65","volume":"66","author":"I Kerr","year":"2013","unstructured":"Kerr, I., & Earle, J. (2013). Prediction, preemption, presumption: How big data threatens big picture privacy. Stanford Law Review Online, 66(2013\u20132014), 65\u201373.","journal-title":"Stanford Law Review Online"},{"key":"9503_CR46","volume-title":"Trust on the line: a philosophical exploration of trust in the networked era","author":"E Keymolen","year":"2016","unstructured":"Keymolen, E. (2016). Trust on the line: a philosophical exploration of trust in the networked era. Rotterdam: Erasmus University of Rotterdam."},{"issue":"2","key":"9503_CR47","first-page":"483","volume":"38","author":"B-J Koops","year":"2017","unstructured":"Koops, B.-J., Newell, B. C., Timan, T., \u0160korv\u00e1nek, I., Chokrevski, T., & Gali\u010d, M. (2017). A typology of privacy. University of Pennsylvania Journal of International Law, 38(2), 483\u2013575.","journal-title":"University of Pennsylvania Journal of International Law"},{"issue":"2","key":"9503_CR48","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.clsr.2016.01.010","volume":"32","author":"K Fors-Owczynik La","year":"2016","unstructured":"La Fors-Owczynik, K. (2016). Monitoring Migrants or Making Migrants \u201cMisfit\u201d? Data protoction and human rights perspectives on Dutch identity management practices regarding migrants. Computer Law and Security Review, 32(2), 433\u2013449.","journal-title":"Computer Law and Security Review"},{"key":"9503_CR49","volume-title":"Digitizing identities: Doing identity in a networked world","author":"K Fors-Owczynik La","year":"2015","unstructured":"La Fors-Owczynik, K., & Van der Ploeg, I. (2015). Migrants at\/as risk: Identity verification and risk assessment technologies in The Netherlands. In I. Van der Ploeg & J. Pridmore (Eds.), Digitizing identities: Doing identity in a networked world. London: Routledge."},{"key":"9503_CR50","volume-title":"Science in action: How to follow scientists and engineers through society","author":"B Latour","year":"1987","unstructured":"Latour, B. (1987). Science in action: How to follow scientists and engineers through society. Cambridge, Massachusetts: Harvard University Press."},{"key":"9503_CR51","unstructured":"Lohr, S. (2012). The age of big data. The New York Times."},{"key":"9503_CR52","volume-title":"Evaluating new technologies: Methodological problems for the ethical assessment of technology developments","author":"NLJL Manders-Huits","year":"2009","unstructured":"Manders-Huits, N. L. J. L., & Van den Hoven, J. (2009). The need for a value-sensitive design of communication infrastructures. In P. Sollie & M. Duwell (Eds.), Evaluating new technologies: Methodological problems for the ethical assessment of technology developments. Berlin: Springer."},{"key":"9503_CR53","volume-title":"The Oxford Handbook of Philosophy and Race","author":"LA McBride","year":"2017","unstructured":"McBride, L. A. (2017). Insurrectionist ethics and racism. In N. Zack (Ed.), The Oxford Handbook of Philosophy and Race. Oxford: Oxford Handbooks Online."},{"key":"9503_CR54","unstructured":"McCormick, T. M. (2013). Principles of bioethics. Ethics in Medicine. Retrieved from https:\/\/depts.washington.edu\/bioethx\/tools\/princpl.html ."},{"key":"9503_CR55","volume-title":"Ethica thomistica: The moral philosophy of Thomas Aquinas","author":"R McInerny","year":"1997","unstructured":"McInerny, R. (1997). Ethica thomistica: The moral philosophy of Thomas Aquinas. Washington: Catholic University of America Press."},{"key":"9503_CR56","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-1-4419-5765-8","volume-title":"Food ethics","author":"B Mepham","year":"2010","unstructured":"Mepham, B. (2010). The ethical matrix as a tool in policy interventions : The obesity crisis. In F.-T. Gottwald, et al. (Eds.), Food ethics (pp. 17\u201329). Berlin: Springer Science and Media Business. https:\/\/doi.org\/10.1007\/978-1-4419-5765-8 ."},{"key":"9503_CR57","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10806-006-9022-9","volume":"20","author":"K Millar","year":"2007","unstructured":"Millar, K., Thorstensen, E., Tomkins, S., et al. (2007). Developing the ethical Delphi. Journal of Agricultural and Environmental Ethics, 20, 53\u201363. https:\/\/doi.org\/10.1007\/s10806-006-9022-9 .","journal-title":"Journal of Agricultural and Environmental Ethics"},{"key":"9503_CR58","volume-title":"Homo digitalis Preadviezen van","author":"L Moerel","year":"2016","unstructured":"Moerel, L., Prins, J. E. J., Hildebrandt, M., Tjong Tjin Tai, T. F. E., Zwenne, G. J., & Schmidt, A. H. J. (2016). Homo digitalis Preadviezen van. Philadelphia: Wolters Kluwer Publishing."},{"key":"9503_CR59","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI16234_03","volume-title":"Privacy in context technology policy and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H. (2010). Privacy in context technology policy and the integrity of social life. Hillsdale, NJ: Erlbaum Associates Inc. https:\/\/doi.org\/10.1207\/S15327051HCI16234_03 ."},{"key":"9503_CR60","unstructured":"NSPE Ethics Reference Guide for Engineers. (2017). Retrieved from https:\/\/www.nspe.org\/resources\/ethics\/code-ethics%3E%0A ."},{"key":"9503_CR61","unstructured":"OECD. (2014). Data Driven Innovation for Growth and Well-Being: Interim Synthesis Report. Paris."},{"key":"9503_CR62","first-page":"63","volume":"64","author":"T Omer","year":"2012","unstructured":"Omer, T., & Polonetsky, J. (2012). Privacy in the age of big data: a time for big decisions. Stanford Law Review Online, 64, 63.","journal-title":"Stanford Law Review Online"},{"issue":"1","key":"9503_CR63","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10676-012-9295-9","volume":"14","author":"U Pagallo","year":"2012","unstructured":"Pagallo, U. (2012). Cracking down on autonomy: Three challenges to design in IT law. Ethics and Information Technology, 14(1), 319\u2013328.","journal-title":"Ethics and Information Technology"},{"key":"9503_CR64","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/1472-6939-13-10","volume":"13","author":"K Page","year":"2012","unstructured":"Page, K. (2012). The four principles: Can they be measured and do they predict ethical decision-making? BMC Medical Ethics, 13, 10.","journal-title":"BMC Medical Ethics"},{"key":"9503_CR65","volume-title":"Values and ethics in social work practice","author":"L Parrott","year":"2014","unstructured":"Parrott, L. (2014). Values and ethics in social work practice. Los Angeles: SAGE Publications."},{"issue":"2","key":"9503_CR66","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1136\/jme.24.2.110","volume":"24","author":"J Price","year":"1998","unstructured":"Price, J., Price, D., Williams, G., & Hoffenberg, R. (1998). Changes in medical student attitudes as they progress through a medical course. J Med Ethics, 24(2), 110.","journal-title":"J Med Ethics"},{"key":"9503_CR67","unstructured":"Richards, N. M., & King, J. (2014). Big Data ethics. Wake Forest Law Review, May 19th."},{"issue":"1","key":"9503_CR68","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s10676-016-9394-0","volume":"18","author":"M Sax","year":"2016","unstructured":"Sax, M. (2016). Big Data: Finders keepers, losers weepers? Ethics and Information Technology, 18(1), 25\u201331.","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9503_CR69","first-page":"171","volume":"16","author":"BW Schermer","year":"2014","unstructured":"Schermer, B. W., Custers, B. H. M., & Van der Hof, S. (2014). The crisis of consent: How stronger legal protection may lead to weaker consent in data protection. Ethics and Information Technology, 16(2), 171\u2013182.","journal-title":"Ethics and Information Technology"},{"key":"9503_CR70","unstructured":"Society of Professional Journalists. (2014). Society of professional journalists code of ethics. Retrieved from https:\/\/www.spj.org\/ethicscode.asp ."},{"key":"9503_CR71","volume-title":"Privacy, big data, and the public good: Frameworks for engagement","author":"K Strandburg","year":"2014","unstructured":"Strandburg, K. (2014). Monitoring, datafication, and consent: Legal approaches to privacy in the big data context. In J. Lane, V. Stodden, S. Bender, & H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement. Cambridge, MA: Cambridge University Press."},{"key":"9503_CR72","doi-asserted-by":"crossref","unstructured":"Synder, J. E., & Gauthier, C. C. (2008). The underlying principles of ethical patient care. In Evidence-based Medical Ethics (pp. 11\u201317). Humana Press.","DOI":"10.1007\/978-1-60327-246-9_2"},{"key":"9503_CR73","unstructured":"Tims, A. (2015). Licence revoked dvla errors drivers stripped entitlements. The Guardian. Retrieved from https:\/\/www.theguardian.com\/money\/2015\/jun\/20\/licence-revoked-dvla-errors-drivers-stripped-entitlements ."},{"key":"9503_CR74","unstructured":"Tischner, J. (2005). The ethics of solidarity. Cracow."},{"issue":"3","key":"9503_CR75","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MEMB.2010.936553","volume":"29","author":"G Turchetti","year":"2010","unstructured":"Turchetti, G., Spanoni, E., & Geisler, E. (2010). Health technology assessment. IEEE Engineering in Medicine and Biology Magazine, 29(3), 70\u201376.","journal-title":"IEEE Engineering in Medicine and Biology Magazine"},{"key":"9503_CR76","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780190498511.001.0001","volume-title":"Technology and the virtues: A philosophical guide for a future worth wanting","author":"S Vallor","year":"2016","unstructured":"Vallor, S. (2016). Technology and the virtues: A philosophical guide for a future worth wanting. New York: Oxford University Press."},{"key":"9503_CR77","volume-title":"Responsible innovation: Managing the responsible emergence of science and innovation in society","author":"J Hoven Van den","year":"2013","unstructured":"Van den Hoven, J. (2013). Value sensitive design and responsible innovation. In R. Owen, J. Bessant, & M. Heintz (Eds.), Responsible innovation: Managing the responsible emergence of science and innovation in society. New York: Wiley."},{"key":"9503_CR78","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-90-481-2229-5_3","volume-title":"Evaluating new technologies: Methodological problems for the ethical assessment of technology developments","author":"AH Vedder","year":"2009","unstructured":"Vedder, A. H., & Custers, B. H. M. (2009). Whose responsibility is it anyway? Dealing with the consequences of new technologies. In M. D\u00fcwell (Ed.), Evaluating new technologies: Methodological problems for the ethical assessment of technology developments (pp. 21\u201334). New York\/Berlin: Springer."},{"issue":"2","key":"9503_CR79","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10728-006-0019-3","volume":"14","author":"S Waltho","year":"2006","unstructured":"Waltho, S. (2006). Response to Westin and Nilstun. Health Care Analysis, 14(2), 119.","journal-title":"Health Care Analysis"},{"issue":"2","key":"9503_CR80","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10728-006-0016-6","volume":"14","author":"L Westin","year":"2006","unstructured":"Westin, L., & Nilstun, T. (2006). Principles help to analyse but often give no solution\u2014secondary prevention after a cardiac event. Health Care Analysis, 14(2), 111\u2013117.","journal-title":"Health Care Analysis"},{"key":"9503_CR81","unstructured":"World Medical Association. (2010). Declaration of Helsinki. Ethical principles for medical research involving human subjects. In D. Sturma, B. Heinrichs, & L. Honnefelder (Eds.), Jahrbuch f\u00fcr Wissenschaft und Ethik. Retrieved from https:\/\/philpapers.org\/rec\/ASSDOH ."},{"issue":"1","key":"9503_CR82","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.clsr.2011.11.007","volume":"28","author":"D Wright","year":"2012","unstructured":"Wright, D. (2012). The state of the art in privacy impact assessment. Computer Law and Security Review, 28(1), 54\u201361. https:\/\/doi.org\/10.1016\/j.clsr.2011.11.007 .","journal-title":"Computer Law and Security Review"},{"key":"9503_CR83","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-94-007-2543-0_1","volume-title":"Privacy impact assessment","author":"D Wright","year":"2012","unstructured":"Wright, D., & De Hert, P. (2012). Introduction to privacy impact assessment. In D. Wright & P. De Hert (Eds.), Privacy impact assessment (pp. 3\u201332). Netherlands: Springer."},{"issue":"2","key":"9503_CR84","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10506-016-9182-5","volume":"24","author":"I Zliobaite","year":"2016","unstructured":"Zliobaite, I., & Custers, B. (2016). Using sensitive personal data may be necessary for avoiding discrimination in data-driven decision models. Artificial Intelligence and Law, 24(2), 183\u2013201.","journal-title":"Artificial Intelligence and Law"},{"issue":"3","key":"9503_CR85","first-page":"1","volume":"13","author":"M Zook","year":"2017","unstructured":"Zook, M., Barocas, S., Crawford, K., Keller, E., Goodman, A., Hollander, R., et al. (2017). Ten simple rules for responsible big data research. Computational Biology, 13(3), 1\u201310.","journal-title":"Computational Biology"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09503-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-019-09503-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09503-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T00:39:29Z","timestamp":1694824769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-019-09503-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,24]]},"references-count":85,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["9503"],"URL":"https:\/\/doi.org\/10.1007\/s10676-019-09503-4","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,24]]},"assertion":[{"value":"24 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}