{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T12:08:38Z","timestamp":1747915718957,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T00:00:00Z","timestamp":1577923200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T00:00:00Z","timestamp":1577923200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s10676-019-09525-y","type":"journal-article","created":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T18:08:30Z","timestamp":1577988510000},"page":"163-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Internet privacy, technology, and personal information"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0032-5986","authenticated-orcid":false,"given":"Marjorie S.","family":"Price","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,2]]},"reference":[{"key":"9525_CR1","unstructured":"Behavioral advertising across multiple sites. (2009, October 27). cdt. Retrieved November 13, 2018, https:\/\/cdt.org\/insight\/behavioral-advertising-across-multiple-sites\/."},{"key":"9525_CR2","unstructured":"Cameron, D. (2013, August 22). How targeted advertising works. The Washington Post. Retrieved November 3, 2018. https:\/\/www.washingtonpost.com\/apps\/g\/page\/business\/how-targeted-advertising-works\/412."},{"issue":"3","key":"9525_CR3","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1080\/00048400600895821","volume":"84","author":"J Cohen","year":"2006","unstructured":"Cohen, J., & Meskin, A. (2006). An objective counterfactual theory of information. Australasian Journal of Philosophy,84(3), 333\u2013352.","journal-title":"Australasian Journal of Philosophy"},{"issue":"3","key":"9525_CR5","doi-asserted-by":"publisher","first-page":"281","DOI":"10.2307\/2183143","volume":"75","author":"K Donnellan","year":"1966","unstructured":"Donnellan, K. (1966). Reference and definite descriptions. The Philosophical Review,75(3), 281\u2013304.","journal-title":"The Philosophical Review"},{"key":"9525_CR6","volume-title":"Seeing and knowing","author":"FI Dretske","year":"1969","unstructured":"Dretske, F. I. (1969). Seeing and knowing. Chicago: The University of Chicago Press."},{"key":"9525_CR7","volume-title":"Knowledge and the flow of information","author":"FI Dretske","year":"1981","unstructured":"Dretske, F. I. (1981). Knowledge and the flow of information. Cambridge, MA.: The MIT Press."},{"key":"9525_CR8","unstructured":"Eichelberger, L. (1997\u20132014). The cookie controversy. Introduction. Cookie Central. Retrieved October 30, 2018, from www.cookiecentral.com\/ccstory\/cc7htm."},{"key":"9525_CR9","unstructured":"Geary, J. (2012, April 23). Tracking the trackers: What are cookies? An introduction to web tracking. The Guardian. Retrieved October 28, 2018, from https:\/\/www.theguardian.com\/technology\/2012\/apr\/23\/cookies-and-web-tracking-intro."},{"key":"9525_CR10","unstructured":"General Data Protection Regulation, GDPR. (2016). General data protection regulation (GDPR)--Final Text. Intersoft Consulting. Official Journal of the European Union. Retrieved November 26, 2018, from https:\/\/gdpr-info.eu\/."},{"key":"9525_CR11","unstructured":"Hackett, R. (2015, March 27). How much do data breaches cost companies? Shockingly little. Fortune. Retrieved November 12, 2018, from https:\/\/fortune.com\/2015\/03\/27\/how-much-do-data-breaches-actually-cost-big-companies-shockingly-little\/."},{"issue":"1","key":"9525_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1017\/S0140525X00014783","volume":"6","author":"B Loewer","year":"1983","unstructured":"Loewer, B. (1983). Information and belief. Behavioral and Brain Sciences,6(1), 75\u201376.","journal-title":"Behavioral and Brain Sciences"},{"key":"9525_CR13","doi-asserted-by":"publisher","DOI":"10.1119\/1.1937571","volume-title":"The structure of science","author":"E Nagel","year":"1961","unstructured":"Nagel, E. (1961). The structure of science. New York: Harcourt, Brace & World Inc."},{"key":"9525_CR15","unstructured":"State laws related to internet privacy. (2018, September 24). NCLS. Retrieved November 18, 2018, from www.ncls.org\/research\/telecommunications-and-information-technology\/state-laws-related-to-internet-privacy.aspx."},{"key":"9525_CR4","unstructured":"The data brokers: Selling your personal information. (2014). CBS News. CBS Interactive Inc. Retrieved November 17, 2018, from https:\/\/cbsnews.com\/news\/the-data-brokers-selling-your-personal-information\/."},{"issue":"4","key":"9525_CR16","first-page":"295","volume":"4","author":"JJ Thomson","year":"1975","unstructured":"Thomson, J. J. (1975). The right to privacy. Philosophy & Public Affairs,4(4), 295\u2013314.","journal-title":"Philosophy & Public Affairs"},{"key":"9525_CR17","unstructured":"Webwise Team. (2012, October 10) Cookies on the BBC website. BBC. Retrieved October 28, 2018, from, www.bbc.com."},{"key":"9525_CR18","unstructured":"What are internet cookies. (2018). Hotspot Shield. Anchor Free Inc. Retrieved November 24, 2018, from https:\/\/www.hotspotshield.com\/resources\/what-are-internet-cookies."},{"key":"9525_CR19","unstructured":"What is a cookie and why is it important? (n.d.) BigCommerce. Retrieved October 30, 2018, from https:\/\/www.bigcommerce.com\/ecommerce-answers\/what-cookie-and-why-it-important\/."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09525-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-019-09525-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09525-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T01:45:38Z","timestamp":1609465538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-019-09525-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,2]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["9525"],"URL":"https:\/\/doi.org\/10.1007\/s10676-019-09525-y","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2020,1,2]]},"assertion":[{"value":"2 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}