{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T03:53:55Z","timestamp":1768881235854,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T00:00:00Z","timestamp":1615507200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T00:00:00Z","timestamp":1615507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001831","name":"Delft University of Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001831","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s10676-020-09568-6","type":"journal-article","created":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T08:02:26Z","timestamp":1615536146000},"page":"19-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Ethics in the COVID-19 pandemic: myths, false dilemmas, and moral overload"],"prefix":"10.1007","volume":"23","author":[{"given":"Georgy","family":"Ishmaev","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Dennis","sequence":"additional","affiliation":[]},{"given":"M. Jeroen","family":"van den Hoven","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,12]]},"reference":[{"issue":"6221","key":"9568_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., et al. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509. https:\/\/doi.org\/10.1126\/science.aaa1465.","journal-title":"Science"},{"key":"9568_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/S2589-7500(20)30184-9","author":"I Braithwaite","year":"2020","unstructured":"Braithwaite, I., Callender, T., Bullock, M., & Aldridge, R. W. (2020). Automated and partly automated contact tracing: A systematic review to inform the control of COVID-19. The Lancet Digital Health. https:\/\/doi.org\/10.1016\/S2589-7500(20)30184-9.","journal-title":"The Lancet Digital Health"},{"issue":"10","key":"9568_CR4","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D. (1985). Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10), 1030\u20131044. https:\/\/doi.org\/10.1145\/4372.4373.","journal-title":"Communications of the ACM"},{"key":"9568_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/9781119471219","volume-title":"Evil online","author":"D Cocking","year":"2018","unstructured":"Cocking, D., & Van den Hoven, J. (2018). Evil online. Hoboken: Wiley."},{"key":"9568_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/14651858.CD013652","author":"JJ Deeks","year":"2020","unstructured":"Deeks, J. J., Dinnes, J., Takwoingi, Y., Davenport, C., Spijker, R., Taylor-Phillips, S., et al. (2020). Antibody tests for identification of current and past infection with SARS-CoV-2. Cochrane Database of Systematic Reviews. https:\/\/doi.org\/10.1002\/14651858.CD013652.","journal-title":"Cochrane Database of Systematic Reviews"},{"issue":"1","key":"9568_CR7","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1038\/srep01376","volume":"3","author":"Y-A de Montjoye","year":"2013","unstructured":"de Montjoye, Y.-A., Hidalgo, C. A., Verleysen, M., & Blondel, V. D. (2013). Unique in the crowd: The privacy bounds of human mobility. Scientific Reports, 3(1), 1376. https:\/\/doi.org\/10.1038\/srep01376.","journal-title":"Scientific Reports"},{"issue":"11","key":"9568_CR8","doi-asserted-by":"publisher","first-page":"2259","DOI":"10.1111\/jasp.12176","volume":"43","author":"J Drury","year":"2013","unstructured":"Drury, J., et al. (2013). Psychological disaster myths in the perception and management of mass emergencies: Psychological disaster myths. Journal of Applied Social Psychology, 43(11), 2259\u20132270. https:\/\/doi.org\/10.1111\/jasp.12176.","journal-title":"Journal of Applied Social Psychology"},{"issue":"6491","key":"9568_CR9","doi-asserted-by":"publisher","first-page":"eabb6936","DOI":"10.1126\/science.abb6936","volume":"368","author":"L Ferretti","year":"2020","unstructured":"Ferretti, L., Wymant, C., Kendall, M., Zhao, L., Nurtay, A., Abeler-D\u00f6rner, L., et al. (2020). Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science, 368(6491), eabb6936. https:\/\/doi.org\/10.1126\/science.abb6936.","journal-title":"Science"},{"key":"9568_CR10","unstructured":"Gasser, U., Gertner, N., Goldsmith, J. L., Landau, S., Nye, J. S., O\u2019Brien, D., et al. (2016). Don\u2019t panic: Making progress on the \"Going Dark\" debate. The Berkman Center for Internet & Society Study at Harvard University. Retrieved from https:\/\/cyber.harvard.edu\/pubrelease\/dont-panic\/Dont_Panic_Making_Progress_on_Going_Dark_Debate.pdf."},{"issue":"1","key":"9568_CR57","doi-asserted-by":"publisher","first-page":"e12","DOI":"10.1371\/journal.pone.0000012","volume":"1","author":"D Klinkenberg","year":"2006","unstructured":"Klinkenberg, D., Fraser, C., & Heesterbeek, H. (2006). The effectiveness of contact tracing in emerging epidemics. PLoS ONE, 1(1), e12. https:\/\/doi.org\/10.1371\/journal.pone.0000012.","journal-title":"PLoS ONE"},{"issue":"5","key":"9568_CR13","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1038\/s41591-020-0851-2","volume":"26","author":"LS Lau","year":"2020","unstructured":"Lau, L. S., Samari, G., Moresky, R. T., Casey, S. E., Kachur, S. P., Roberts, L. F., et al. (2020). COVID-19 in humanitarian settings and lessons learned from past epidemics. Nature Medicine, 26(5), 647\u2013648. https:\/\/doi.org\/10.1038\/s41591-020-0851-2.","journal-title":"Nature Medicine"},{"key":"9568_CR14","doi-asserted-by":"crossref","unstructured":"Leith, D., & Farrell, S. (2020a). Contact tracing app privacy: What data is shared by Europe's GAEN contact tracing apps. Retrieved from https:\/\/www.scss.tcd.ie\/Doug.Leith\/pubs\/contact_tracing_app_traffic.pdf.","DOI":"10.1109\/INFOCOM42981.2021.9488728"},{"key":"9568_CR15","doi-asserted-by":"crossref","unstructured":"Leith, D., & Farrell, S. (2020b). Measurement-based evaluation of Google\/AppleExposure Notification API for proximity detection in a light-rail tram. Retrieved from https:\/\/www.scss.tcd.ie\/Doug.Leith\/pubs\/luas.pdf.","DOI":"10.1371\/journal.pone.0239943"},{"key":"9568_CR16","doi-asserted-by":"publisher","DOI":"10.1136\/medethics-2020-106388","author":"M Loi","year":"2020","unstructured":"Loi, M. (2020). How to fairly incentivise digital contact tracing. Journal of Medical Ethics. https:\/\/doi.org\/10.1136\/medethics-2020-106388.","journal-title":"Journal of Medical Ethics"},{"key":"9568_CR17","doi-asserted-by":"publisher","unstructured":"Pearce, P., Dave, V., Grier, C., Levchenko, K., Guha, S., McCoy, D., et al. (2014). Characterizing large-scale click fraud in zeroaccess. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security\u2014CCS \u201914. (pp. 141\u2013152. doi: https:\/\/doi.org\/10.1145\/2660267.2660369).","DOI":"10.1145\/2660267.2660369"},{"issue":"1","key":"9568_CR18","doi-asserted-by":"publisher","first-page":"3069","DOI":"10.1038\/s41467-019-10933-3","volume":"10","author":"L Rocher","year":"2019","unstructured":"Rocher, L., Hendrickx, J. M., & de Montjoye, Y.-A. (2019). Estimating the success of re-identifications in incomplete datasets using generative models. Nature Communications, 10(1), 3069. https:\/\/doi.org\/10.1038\/s41467-019-10933-3.","journal-title":"Nature Communications"},{"key":"9568_CR19","first-page":"1162","volume":"2015","author":"P Rogaway","year":"2015","unstructured":"Rogaway, P. (2015). The moral character of cryptographic work. IACR Cryptology ePrint Archive, 2015, 1162.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"9568_CR20","doi-asserted-by":"crossref","unstructured":"Salathe, M., Althaus, C. L., Anderdagg, N., Antonioli, D., Ballouz, T., Bugnion, E., et al. (2020). Early evidence of effectiveness of digital contact tracing for SARS-CoV-2 in Switzerland.","DOI":"10.4414\/smw.2020.20457"},{"key":"9568_CR22","doi-asserted-by":"publisher","unstructured":"Show evidence that apps for COVID-19 contact-tracing are secure and effective. (2020). Nature, 580(7805), 563\u2013563. https:\/\/doi.org\/10.1038\/d41586-020-01264-1","DOI":"10.1038\/d41586-020-01264-1"},{"issue":"2","key":"9568_CR23","doi-asserted-by":"publisher","first-page":"205395172094253","DOI":"10.1177\/2053951720942539","volume":"7","author":"L Taylor","year":"2020","unstructured":"Taylor, L. (2020). The price of certainty: How the politics of pandemic data demand an ethics of care. Big Data & Society, 7(2), 205395172094253. https:\/\/doi.org\/10.1177\/2053951720942539.","journal-title":"Big Data & Society"},{"issue":"1","key":"9568_CR100","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1177\/0002716205285589","volume":"604","author":"K Tierney","year":"2006","unstructured":"Tierney, K., Bevc, C., & Kuligowski, E. (2006). Metaphors matter: Disaster myths, media frames, and their consequences in hurricane katrina. The ANNALS of the American Academy of Political and Social Science, 604(1), 57\u201381. https:\/\/doi.org\/10.1177\/0002716205285589.","journal-title":"The ANNALS of the American Academy of Political and Social Science"},{"key":"9568_CR24","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511498725","volume-title":"Information technology and moral philosophy","author":"J Van Den Hoven","year":"2008","unstructured":"Van Den Hoven, J. (2008). Information technology, privacy, and the protection of personal data. In M. J. van den Joven & J. Weckert (Eds.), Information technology and moral philosophy. Cambridge: Cambridge University Press."},{"issue":"1","key":"9568_CR25","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s11948-011-9277-z","volume":"18","author":"J Van den Hoven","year":"2012","unstructured":"Van den Hoven, J., Lokhorst, G.-J., & Van de Poel, I. (2012). Engineering and the problem of moral overload. Science and Engineering Ethics, 18(1), 143\u2013155. https:\/\/doi.org\/10.1007\/s11948-011-9277-z.","journal-title":"Science and Engineering Ethics"},{"key":"9568_CR26","volume-title":"Designing in ethics","year":"2017","unstructured":"van den Hoven, J., Miller, S., & Podge, T. (Eds.). (2017). Designing in ethics. Cambridge: Cambridge University Press."},{"key":"9568_CR27","volume-title":"Handbook of ethics, values, and technological design: Sources, theory, values and application domains","year":"2015","unstructured":"van den Hoven, J., Vermaas, P. E., & Van de Poel, I. (Eds.). (2015). Handbook of ethics, values, and technological design: Sources, theory, values and application domains. New York: Springer."},{"key":"9568_CR28","volume-title":"Responsible Innovation 1","year":"2014","unstructured":"van den Hoven, J., Doorn, N., Swierstra, T., Koops, B.-J., & Romijn, H. (Eds.). (2014). Responsible Innovation 1. Dordrecht: Springer."},{"issue":"6","key":"9568_CR29","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.1007\/s11948-016-9862-2","volume":"25","author":"J van den Hoven","year":"2019","unstructured":"van den Hoven, J. (2019). Ethics and the UN sustainable development goals: The case for comprehensive engineering: commentary on \u201cusing student engagement to relocate ethics to the core of the engineering curriculum.\u201d Science and Engineering Ethics, 25(6), 1789\u20131797. https:\/\/doi.org\/10.1007\/s11948-016-9862-2.","journal-title":"Science and Engineering Ethics"},{"key":"9568_CR30","doi-asserted-by":"publisher","DOI":"10.4337\/9781784718862","volume-title":"International handbook on responsible innovation","author":"R von Schomberg","year":"2019","unstructured":"von Schomberg, R., & Hankins, J. (2019). International handbook on responsible innovation. Cheltenham: Edward Elgar Publishing."},{"key":"9568_CR31","unstructured":"World Health Organization. (2020). Risk communication and community engagement readiness and initial response for novel coronaviruses (nCoV): Interim guidance, January 2020. World Health Organization; WHO IRIS. Retrieved from https:\/\/apps.who.int\/iris\/handle\/10665\/330377."},{"key":"9568_CR32","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-020-00740-y","author":"M Zastrow","year":"2020","unstructured":"Zastrow, M. (2020). South Korea is reporting intimate details of COVID-19 cases: Has it helped? Nature. https:\/\/doi.org\/10.1038\/d41586-020-00740-y.","journal-title":"Nature"},{"key":"9568_CR33","unstructured":"Zuboff, S. (2020). The age of surveillance capitalism: The fight for a human future at the new frontier of power (First Trade Paperback Edition). PublicAffairs."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-020-09568-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-020-09568-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-020-09568-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T07:35:56Z","timestamp":1671608156000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-020-09568-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,12]]},"references-count":31,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["9568"],"URL":"https:\/\/doi.org\/10.1007\/s10676-020-09568-6","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,12]]},"assertion":[{"value":"12 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}