{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T09:54:45Z","timestamp":1773395685625,"version":"3.50.1"},"reference-count":109,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10676-022-09651-0","type":"journal-article","created":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T08:04:23Z","timestamp":1666685063000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A framework for the application of socio-technical design methodology"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2488-8043","authenticated-orcid":false,"given":"Adnan","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Brian","family":"Whitworth","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"issue":"3","key":"9651_CR1","doi-asserted-by":"publisher","first-page":"2765","DOI":"10.3233\/JIFS-179562","volume":"38","author":"A Ahmad","year":"2019","unstructured":"Ahmad, A., Azhar, A., Naqvi, S., Nawaz, A., Arshad, S., & Zeshan, F. (2019a). A methodology for sender-oriented anti-spamming. Journal of Intelligent & Fuzzy Systems, 38(3), 2765\u20132776. https:\/\/doi.org\/10.3233\/JIFS-179562","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"1","key":"9651_CR2","doi-asserted-by":"publisher","first-page":"227","DOI":"10.3233\/JIFS-179080","volume":"37","author":"A Ahmad","year":"2019","unstructured":"Ahmad, A., Whitworth, B., Zeshan, F., Janczewski, L., Ali, M., Chaudary, M. H., & Friedman, R. (2019b). A relation-aware multiparty access control. Journal of Intelligent & Fuzzy Systems, 37(1), 227\u2013239. https:\/\/doi.org\/10.3233\/JIFS-179080","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"9651_CR3","doi-asserted-by":"publisher","unstructured":"Ahmad, A., & Whitworth, B. (2011). Distributed access control for social networks. In International conference of information assurance and security (pp. 68\u201373). Malacca, Malaysia, 5\u20138 December 2011. https:\/\/doi.org\/10.1109\/ISIAS.2011.6122797.","DOI":"10.1109\/ISIAS.2011.6122797"},{"key":"9651_CR4","doi-asserted-by":"publisher","unstructured":"Ahmad, A., Whitworth, B., Zeshan, F., Bertino, E. & Friedman, R. (2017). Extending social networks with delegation. Computers & Security, 70, 546\u2013564, 2017, ISSN 0167-4048. https:\/\/doi.org\/10.1016\/j.cose.2017.07.010.","DOI":"10.1016\/j.cose.2017.07.010"},{"key":"9651_CR5","doi-asserted-by":"publisher","unstructured":"Almeida, V. A. F., Doneda, D. & Rossini, C. (2016). How Do App Stores Challenge the Global Internet Governance Ecosystem? In IEEE internet computing (vol. 20, no. 6, pp. 49\u201351), Nov.\u2013Dec. https:\/\/doi.org\/10.1109\/MIC.2016.123.","DOI":"10.1109\/MIC.2016.123"},{"key":"9651_CR6","unstructured":"Baraniuk, C. (2017). Google and Facebook duped in huge 'scam'. BBC News, 28th April 2019. Retrieved October 19, 2017, from http:\/\/www.bbc.com\/news\/technology-39744007"},{"key":"9651_CR7","doi-asserted-by":"crossref","unstructured":"Beer, D., & Burrows, R. (2007). Sociology and, of and in Web 2.0: Some Initial Considerations. Sociological Research Online, 12(5).","DOI":"10.5153\/sro.1560"},{"issue":"1","key":"9651_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1023\/A:1011957832141","volume":"34","author":"D Beu","year":"2001","unstructured":"Beu, D., & Buckley, M. R. (2001). The hypothesized relationship between accountability and ethical behavior. Journal of Business Ethics, 34(1), 57\u201374.","journal-title":"Journal of Business Ethics"},{"key":"9651_CR9","volume-title":"Accountability: Standards in financial reporting","author":"P Bird","year":"1973","unstructured":"Bird, P. (1973). Accountability: Standards in financial reporting. Accountancy Age Books."},{"issue":"1","key":"9651_CR10","first-page":"85","volume":"37","author":"OM Bonahoom","year":"1953","unstructured":"Bonahoom, O. M. (1953). Moral and ethical considerations in tax practice. Marquette Law Review, 37(1), 85.","journal-title":"Marquette Law Review"},{"key":"9651_CR11","doi-asserted-by":"publisher","unstructured":"Bovens, M., Goodin, R. E., & Schillemans, T. (2014). In M. Bovens, R. E. Goodin, & T. Schillemans (Eds.), The Oxford handbook public accountability. Oxford University Press. Retrieved July 24, 2019, from from https:\/\/doi.org\/10.1093\/oxfordhb\/9780199641253.001.0001\/oxfordhb-9780199641253","DOI":"10.1093\/oxfordhb\/9780199641253.001.0001\/oxfordhb-9780199641253"},{"key":"9651_CR12","unstructured":"Brandom, R. (2015). Is Facebook\u2019s photo-tagging system violating privacy law?. The Verge, 2015. Retrieved November 17, 2019, from https:\/\/www.theverge.com\/2015\/12\/21\/10634100\/facebook-photo-tagging-lawsuit-biometric-privacy-law"},{"issue":"1\u20132","key":"9651_CR13","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1006\/cpac.2001.0525","volume":"14","author":"J Broadbent","year":"2003","unstructured":"Broadbent, J., & Laughlin, R. (2003). Control and legitimation in government accountability processes: The private finance initiative in the UK. Critical Perspectives on Accounting., 14(1\u20132), 23\u201348.","journal-title":"Critical Perspectives on Accounting."},{"key":"9651_CR15","doi-asserted-by":"publisher","unstructured":"Cahn, A., Alfeld, S., Barford, P., & Muthukrishnan, S. (2016). An Empirical Study of Web Cookies. In Proceedings of the 25th international conference on World Wide Web (WWW '16). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 891\u2013901. https:\/\/doi.org\/10.1145\/2872427.2882991","DOI":"10.1145\/2872427.2882991"},{"key":"9651_CR16","doi-asserted-by":"publisher","unstructured":"Cath, C. (2019). Internet governance and human rights: A literature review. In C. \u00d6hman, & D. Watson (Eds.), The 2018 yearbook of the digital ethics lab (pp. 105\u2013132). Digital Ethics Lab Yearbook. Springer. https:\/\/doi.org\/10.1007\/978-3-030-17152-0_8","DOI":"10.1007\/978-3-030-17152-0_8"},{"issue":"2","key":"9651_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1111\/j.1540-5842.2012.01310.x","volume":"29","author":"V Cerf","year":"2012","unstructured":"Cerf, V. (2012). The right to connect and internet censorship. New Perspectives Quarterly., 29(2), 18\u201323.","journal-title":"New Perspectives Quarterly."},{"key":"9651_CR18","unstructured":"Chaffey, D. (2020). Global social media research summary August 2020. Smart Insights, 3."},{"key":"9651_CR115","unstructured":"Convention for the Protection of Human Rights and Fundamental Freedoms, Rome, 4.XI. 1950. https:\/\/www.echr.coe.int\/documents\/convention_eng.pdf"},{"key":"9651_CR19","doi-asserted-by":"crossref","unstructured":"Coons, J. E. (1987). Consistency. In California law review, Seventy-Fifth Anniversary Issue (Vol. 75, No. 1, pp. 59\u2013113). http:\/\/www.jstor.org\/stable\/3480573","DOI":"10.2307\/3480573"},{"key":"9651_CR20","unstructured":"Copyright Law. (2016). Copyright law of the United States. Retrieved November 17, 2019, from https:\/\/www.copyright.gov\/title17\/"},{"key":"9651_CR21","doi-asserted-by":"publisher","DOI":"10.12987\/yale\/9780300181357.001.0001","volume-title":"The global war for internet governance","author":"L DeNardis","year":"2014","unstructured":"DeNardis, L. (2014). The global war for internet governance. Yale University Press."},{"key":"9651_CR22","unstructured":"Debbarma, P. (2016). Case study : Reasons why Google\u2019s Orkut failed. Medium Corporation. 2016. Retrieved November 17, 2019, from https:\/\/medium.com\/@PachaelPhillip\/case-study-reasons-why-googles-orkut-failed-after-facebook-was-launched-92dd8a7abf0"},{"issue":"2","key":"9651_CR23","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1515\/auk-2008-0207","volume":"30","author":"W Detel","year":"2008","unstructured":"Detel, W. (2008). On the concept of basic social norms. Analyse & Kritik, 30(2), 469\u2013482. https:\/\/doi.org\/10.1515\/auk-2008-0207","journal-title":"Analyse & Kritik"},{"issue":"3","key":"9651_CR24","first-page":"444","volume":"30","author":"DP Dryer","year":"1964","unstructured":"Dryer, D. P. (1964). Freedom. The Canadian Journal of Economics and Political Science \/ Revue Canadienne D\u2019economique Et De Science Politique, 30(3), 444\u2013448.","journal-title":"The Canadian Journal of Economics and Political Science \/ Revue Canadienne D'economique Et De Science Politique"},{"issue":"1","key":"9651_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/1949761","volume":"33","author":"CA Dykstra","year":"1939","unstructured":"Dykstra, C. A. (1939). The quest for responsibility. The American Political Science Review, 33(1), 1\u201325. https:\/\/doi.org\/10.2307\/1949761","journal-title":"The American Political Science Review"},{"key":"9651_CR26","unstructured":"EC Directive. (2003). The privacy and electronic communications (EC Directive) regulations 2003. Retrieved November 17, 2019, from http:\/\/www.legislation.gov.uk\/uksi\/2003\/2426\/contents\/made"},{"key":"9651_CR27","first-page":"209","volume":"4","author":"N Economides","year":"2008","unstructured":"Economides, N. (2008). \u201cNet Neutrality\u201d, non-discrimination, and digital distribution of content through the Internet. I\/S: A Journal of Law and Policy., 4, 209\u2013233.","journal-title":"I\/S: A Journal of Law and Policy."},{"issue":"3","key":"9651_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14763\/2017.3.712","volume":"6","author":"J Eggenschwiler","year":"2017","unstructured":"Eggenschwiler, J. (2017). Accountability challenges confronting cyberspace governance. Internet Policy Review, 6(3), 1. https:\/\/doi.org\/10.14763\/2017.3.712","journal-title":"Internet Policy Review"},{"key":"9651_CR29","unstructured":"Electronic Frontier Foundation. (2010). A bill of privacy rights for social network users. Retrieved January 23, 2021, from https:\/\/www.eff.org\/deeplinks\/2010\/05\/bill-privacy-rights-social-network-users"},{"key":"9651_CR30","unstructured":"Facebook Help, How to stop Facebook sending friend requests without my permission? Retrieved December 24, 2019, from https:\/\/www.facebook.com\/help\/community\/question\/?id=2319753068153651."},{"issue":"531","key":"9651_CR31","doi-asserted-by":"publisher","first-page":"1262","DOI":"10.1111\/j.1468-0297.2008.02169.x","volume":"118","author":"E Fehr","year":"2008","unstructured":"Fehr, E., Kremhelmer, S., & Schmidt, K. M. (2008). Fairness and the optimal allocation of ownership rights. The Economic Journal, 118(531), 1262\u20131284.","journal-title":"The Economic Journal"},{"issue":"4","key":"9651_CR32","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1109\/COMST.2014.2321628","volume":"16","author":"M Fire","year":"2014","unstructured":"Fire, M., Goldschmidt, R., & Elovici, Y. (2014). Online social networks: Threats and solutions. IEEE Communications Surveys & Tutorials, 16(4), 2019\u20132036.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"9651_CR33","doi-asserted-by":"publisher","first-page":"475","DOI":"10.2307\/794941","volume":"77","author":"C Fried","year":"1968","unstructured":"Fried, C. (1968). Privacy. The Yale Law Journal, 77(3), 475\u2013493.","journal-title":"The Yale Law Journal"},{"key":"9651_CR34","unstructured":"Friedman, B., Kahn, P., & Borning, A. (2002). Value sensitive design: Theory and methods. University of Washington technical report (pp. 2\u201312)."},{"key":"9651_CR35","doi-asserted-by":"crossref","unstructured":"Friedman, B., & Kahn Jr, P. H. (2007). Human values, ethics, and design. In The human-computer interaction handbook (pp. 1267\u20131292). CRC Press.","DOI":"10.1201\/9781410615862-78"},{"issue":"4","key":"9651_CR36","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MIC.2011.50","volume":"15","author":"H Gao","year":"2011","unstructured":"Gao, H., Hu, J., Huang, T., Wang, J., & Chen, Y. (2011). Security issues in online social networks. IEEE Internet Computing, 15(4), 56\u201363.","journal-title":"IEEE Internet Computing"},{"key":"9651_CR37","doi-asserted-by":"crossref","unstructured":"Geer, D. E. (2015). The right to be unobserved. IEEE Security & Privacy, 13(4).","DOI":"10.1109\/MSP.2015.76"},{"key":"9651_CR38","unstructured":"Gert, B., & Gert, J. (2020). The definition of morality. In E. N. Zalta (Ed.), The Stanford Encyclopedia of philosophy (Fall 2020 Edition). Retrieved October 18, 2021, from https:\/\/plato.stanford.edu\/archives\/fall2020\/entries\/morality-definition\/"},{"key":"9651_CR39","unstructured":"GCIG (Global Commission on Internet Governance). (2017). Retrieved November 17, 2017, from https:\/\/www.cigionline.org\/initiatives\/global-commission-internet-governance"},{"key":"9651_CR40","doi-asserted-by":"crossref","unstructured":"Greenbaum, J. (1996, November). Back to labor: Returning to labor process discussions in the study of work. In Proceedings of the 1996 ACM conference on computer supported cooperative work (pp. 229\u2013237).","DOI":"10.1145\/240080.240259"},{"key":"9651_CR41","doi-asserted-by":"crossref","unstructured":"Grudin, J. (1988, January). Why CSCW applications fail: problems in the design and evaluation of organizational interfaces. In Proceedings of the 1988 ACM conference on Computer-supported cooperative work (pp. 85\u201393).","DOI":"10.1145\/62266.62273"},{"key":"9651_CR42","volume-title":"The concept of law","author":"HLA Hart","year":"1961","unstructured":"Hart, H. L. A. (1961). The concept of law."},{"key":"9651_CR125","unstructured":"Helsinki Final Act, 1 August 1975. https:\/\/www.osce.org\/helsinki-final-act"},{"key":"9651_CR43","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1080\/07421222.1999.11518247","volume":"16","author":"PJ Hu","year":"1999","unstructured":"Hu, P. J., Chau, P. Y. K., Sheng, O. R. L., & Tam, K. Y. (1999). Examining the technology acceptance model using physician acceptance of telemedicine. Journal of Management Information Systems, 16, 91\u2013112.","journal-title":"Journal of Management Information Systems"},{"key":"9651_CR44","doi-asserted-by":"publisher","unstructured":"Hu, H., Ahn, G., Zhao, Z., & Yang, D. (2014). Game theoretic analysis of multiparty access control in online social networks. In Proceedings of the 19th ACM symposium on Access control models and technologies (SACMAT '14) (pp. 93\u2013102). ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/2613087.2613097","DOI":"10.1145\/2613087.2613097"},{"key":"9651_CR110","unstructured":"International Covenant on Civil and Political Rights (ICCPR), 16 December 1966. General Assembly resolution 2200A (XXI). https:\/\/www.ohchr.org\/en\/instruments-mechanisms\/instruments\/international-covenant-civil-and-political-rights"},{"key":"9651_CR120","unstructured":"International Covenant on Economic, Social and Cultural Rights, 16 December 1966. General Assembly resolution 2200A (XXI). https:\/\/www.ohchr.org\/en\/instruments-mechanisms\/instruments\/international-covenant-economic-social-and-cultural-rights"},{"key":"9651_CR45","unstructured":"ICO (Information Commissioner\u2019s Office).(2017).International enforcement operation finds website privacy notices are too vague and generally inadequate. Retrieved November 17, 2019, from https:\/\/ico.org.uk\/about-the-ico\/news-and-events\/news-and-blogs\/2017\/10\/international-enforcement-operation-finds-website-privacy-notices-are-too-vague-and-generally-inadequate\/"},{"key":"9651_CR46","doi-asserted-by":"publisher","unstructured":"Ilia, P., Carminati, B., Ferrari, E., Fragopoulou, P., & Ioannidis, S. (2017). SAMPAC: Socially-aware collaborative multi-party access control. In Proceedings of the seventh ACM on conference on data and application security and privacy (CODASPY '17) (pp. 71\u201382). ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/3029806.3029834.","DOI":"10.1145\/3029806.3029834"},{"issue":"9","key":"9651_CR47","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MCOM.2013.6588663","volume":"51","author":"L Jin","year":"2013","unstructured":"Jin, L., Chen, Y., Wang, T., Hui, P., & Vasilakos, A. V. (2013). Understanding user behavior in online social networks: A survey. IEEE Communications Magazine, 51(9), 144\u2013150.","journal-title":"IEEE Communications Magazine"},{"key":"9651_CR48","volume-title":"Computer ethics","author":"DG Johnson","year":"1985","unstructured":"Johnson, D. G. (1985). Computer ethics. Prentice-Hall Inc."},{"key":"9651_CR49","unstructured":"Kash, J. (2018). 10 reasons why most online business startups fail? Design Hill 13-04-2018. Retrieved February 3, 2021, from https:\/\/www.designhill.com\/design-blog\/reasons-why-most-online-business-startups-fail\/"},{"key":"9651_CR50","volume-title":"General theory of law and state","author":"H Kelsen","year":"1949","unstructured":"Kelsen, H. (1949). General theory of law and state. Harvard University Press."},{"key":"9651_CR51","doi-asserted-by":"crossref","unstructured":"Kim, M., Song, C., Kim, H., Park, D., Kwon, Y., Namkung, E., & Carlsson, M. (2019, September). Scam detection assistant: Automated protection from scammers. In 2019 first international conference on societal automation (SA) (pp. 1\u20138). IEEE.","DOI":"10.1109\/SA47457.2019.8938036"},{"issue":"1","key":"9651_CR52","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/356802.356806","volume":"12","author":"R Kling","year":"1980","unstructured":"Kling, R. (1980). Social analyses of computing: Theoretical perspectives in recent empirical research. ACM Computing Surveys (CSUR), 12(1), 61\u2013110.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"3","key":"9651_CR53","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1023\/A:1008695307062","volume":"7","author":"M Korpela","year":"1998","unstructured":"Korpela, M., Soriyan, H. A., Olufokunbi, K. C., Onayade, A. A., Davies-Adetugbo, A., & Adesanmi, D. (1998). Community participation in health informatics in Africa: An experiment in tripartite partnership in Ile-Ife, Nigeria. Computer Supported Cooperative Work (CSCW), 7(3), 339\u2013358.","journal-title":"Computer Supported Cooperative Work (CSCW)"},{"issue":"6","key":"9651_CR54","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TVCG.2010.194","volume":"16","author":"B Lee","year":"2010","unstructured":"Lee, B., Riche, N., Karlson, A., Carpendale, S., SparkClouds. (2010). Visualizing trends in tag clouds. IEEE Transactions on Visualization and Computer Graphics, 16(6), 1182\u20131189.","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"9651_CR55","unstructured":"Lessig, L. (2006). Code: And other laws of cyberspace, Version 2.0. Basic Books."},{"key":"9651_CR56","unstructured":"Lessig, L. (2012). Against perpetual copyright. The Lessig Wiki."},{"key":"9651_CR57","unstructured":"Littleton, A. C. (1966). Accounting evolution to 1900, 2nd edition, Russell and Russell."},{"key":"9651_CR58","first-page":"169","volume-title":"Social and political philosophy","author":"J Locke","year":"1963","unstructured":"Locke, J. (1963). An essay concerning the true original extent and end of civil government: Second of Two Treatises on Government\u2016 (1690). In J. Somerville & R. E. Santoni (Eds.), Social and political philosophy (pp. 169\u2013204). Anchor."},{"key":"9651_CR59","unstructured":"Masnick, M: Techdirt: Disney Claims House Of Mouse Built With Copyright, Ignores Public Domain Foundation: Techdirt, 11th September, 2012. Retrieved November 17, 2019, from https:\/\/www.techdirt.com\/articles\/20120910\/02485220325\/disney-claims-house-mouse-built-with-copyright-ignores-public-domain-foundation.shtml"},{"key":"9651_CR60","volume-title":"1934","author":"GH Mead","year":"1934","unstructured":"Mead, G. H. (1934). 1934. University of Chicago Press."},{"key":"9651_CR61","unstructured":"Mehnaz, S., & Bertino, E. (2019). A fine-grained approach for anomaly detection in file system accesses with enhanced temporal user profiles. IEEE Transactions on Dependable and Secure Computing."},{"key":"9651_CR62","doi-asserted-by":"crossref","unstructured":"Mislove, A., Viswanath, B., Gummadi, K. P., & Druschel, P. (2010). You are who you know: inferring user profiles in online social networks. In: Proceedings of the third ACM international conference on web search and data mining (pp. 251\u2013260).","DOI":"10.1145\/1718487.1718519"},{"key":"9651_CR63","doi-asserted-by":"crossref","unstructured":"Muhammad, T., & Ahmad, A. (2021). A joint sharing approach for online privacy preservation, World Wide Web, (accepted).","DOI":"10.1007\/s11280-021-00876-5"},{"issue":"6","key":"9651_CR64","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/153571.255960","volume":"36","author":"MJ Muller","year":"1993","unstructured":"Muller, M. J., & Kuhn, S. (1993). Participatory design. Communications of the ACM, 36(6), 24\u201328.","journal-title":"Communications of the ACM"},{"key":"9651_CR65","doi-asserted-by":"crossref","unstructured":"Muller, M. J. (1997). Ethnocritical heuristics for reflecting on work with users and other interested parties. In Computers and design in context (pp. 349\u2013380).","DOI":"10.7551\/mitpress\/1966.003.0014"},{"key":"9651_CR66","volume-title":"The turn to infrastructure in internet governance","author":"F Musiani","year":"2015","unstructured":"Musiani, F., Cogburn, D. L., DeNardis, L., & Levinson, N. S. (2015). The turn to infrastructure in internet governance. Palgrave Macmillan US."},{"key":"9651_CR67","unstructured":"Novak, E. & Li, Q. (2012). A survey of security and privacy in online social networks (pp. 1\u201332), College of William and Mary Computer Science. Technical Report."},{"key":"9651_CR68","unstructured":"O'Flaherty, K. (2021). Is it time to leave WhatsApp\u2014And is Signal the answer? The Guardian 24-01-2021. Retrieved February 3, 2021, from https:\/\/www.theguardian.com\/technology\/2021\/jan\/24\/is-it-time-to-leave-whatsapp-and-is-signal-the-answer"},{"key":"9651_CR69","unstructured":"O'Reilly, L. (2011). Four reasons why MySpace failed to retain the social network crown. Marketing Week 12th Jan 2011. Retrieved February 3, 2019, from https:\/\/www.marketingweek.com\/2011\/01\/12\/four-reasons-why-myspace-failed-to-retain-the-social-network-crown\/"},{"key":"9651_CR70","doi-asserted-by":"publisher","unstructured":"Pang, J., and Zhang, Y. (2015). A new access control scheme for Facebook-style social networks. In Computers & security (Vol. 54, pp. 44\u201359). ISSN 0167-4048. https:\/\/doi.org\/10.1016\/j.cose.2015.04.013.","DOI":"10.1016\/j.cose.2015.04.013"},{"issue":"4","key":"9651_CR71","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1177\/1748048518757139","volume":"80","author":"A Pettrachin","year":"2018","unstructured":"Pettrachin, A. (2018). Towards a universal declaration on internet rights and freedoms? International Communication Gazette, 80(4), 337\u2013353. https:\/\/doi.org\/10.1177\/1748048518757139","journal-title":"International Communication Gazette"},{"issue":"9","key":"9651_CR72","doi-asserted-by":"publisher","first-page":"467","DOI":"10.17705\/1jais.00139","volume":"8","author":"J Porra","year":"2007","unstructured":"Porra, J., & Hirscheim, R. (2007). A lifetime of theory and action on the ethical use of computers. JAIS, 8(9), 467\u2013478.","journal-title":"JAIS"},{"issue":"4","key":"9651_CR74","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1177\/1748048518757121","volume":"80","author":"D Redeker","year":"2018","unstructured":"Redeker, D., Gill, L., & Gasser, U. (2018). Towards digital constitutionalism? Mapping attempts to craft an internet bill of rights. International Communication Gazette, 80(4), 302\u2013319. https:\/\/doi.org\/10.1177\/1748048518757121","journal-title":"International Communication Gazette"},{"key":"9651_CR75","doi-asserted-by":"crossref","unstructured":"Ridley, M. (2010). The rational optimist: How prosperity evolves. Harper.","DOI":"10.1016\/S0262-4079(10)61556-4"},{"key":"9651_CR76","unstructured":"Robertson, A. (2016). Facebook is asking users to judge the truthfulness of news headlines. The Verge 2016. Retrieved July 24, 2019, from https:\/\/www.theverge.com\/2016\/12\/5\/13849108\/facebook-misleading-clickbait-news-headlines-survey"},{"key":"9651_CR77","volume-title":"The nature of human values","author":"M Rokeach","year":"1973","unstructured":"Rokeach, M. (1973). The nature of human values. The Free Press."},{"key":"9651_CR78","doi-asserted-by":"publisher","first-page":"174375","DOI":"10.1109\/ACCESS.2020.3007141","volume":"8","author":"A Samreen","year":"2020","unstructured":"Samreen, A., Ahmad, A., Zeshan, F., Ahmad, F., Ahmed, S., & Khan, Z. A. (2020). A collaborative method for protecting teens against online predators over social networks: A behavioral analysis. IEEE Access, 8, 174375\u2013174393. https:\/\/doi.org\/10.1109\/ACCESS.2020.3007141","journal-title":"IEEE Access"},{"issue":"4","key":"9651_CR79","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1111\/j.1540-4560.1994.tb01196.x","volume":"50","author":"SH Schwartz","year":"1994","unstructured":"Schwartz, S. H. (1994). Are there universal aspects in the structure and contents of human values? Journal of Social Issues, 50(4), 19\u201345.","journal-title":"Journal of Social Issues"},{"issue":"1","key":"9651_CR80","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1111\/j.1464-0597.1999.tb00047.x","volume":"48","author":"SH Schwartz","year":"1999","unstructured":"Schwartz, S. H. (1999). A theory of cultural values and some implications for work. Applied Psychology, 48(1), 23\u201347.","journal-title":"Applied Psychology"},{"issue":"3","key":"9651_CR81","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1037\/0022-3514.53.3.550","volume":"53","author":"SH Schwartz","year":"1987","unstructured":"Schwartz, S. H., & Bilsky, W. (1987). Toward a universal psychological structure of human values. Journal of Personality and Social Psychology, 53(3), 550.","journal-title":"Journal of Personality and Social Psychology"},{"key":"9651_CR82","volume-title":"Human rights reference handbook","author":"M Sepuldeva","year":"2004","unstructured":"Sepuldeva, M., Van Banning, T., & van Genugten, W. J. M. (2004). Human rights reference handbook. University for Peace."},{"issue":"1","key":"9651_CR83","first-page":"77","volume":"18","author":"H Shah","year":"2011","unstructured":"Shah, H. (2011). Accountability: Has it been hollowed out in the modern state? Journal of Political Studies, 18(1), 77\u201391.","journal-title":"Journal of Political Studies"},{"key":"9651_CR84","volume-title":"Back to the beginning\u2014Core values","author":"R Sidorowicz","year":"2002","unstructured":"Sidorowicz, R. (2002). Back to the beginning\u2014Core values. Refresher Publications Inc."},{"key":"9651_CR85","unstructured":"Streitfeld, D. (2014). The New York Times, May 13, 2014. Retrieved July 30, 2019, from http:\/\/www.nytimes.com\/2014\/05\/14\/technology\/google-should-erase-web-links-to-some-personal-data-europes-highest-court-says.html?_r=0"},{"key":"9651_CR86","unstructured":"Suchman, L. (1997). Do categories have politics? The language\/action perspective reconsidered. In Human values and the design of computer technology (pp. 91\u2013106)."},{"key":"9651_CR87","doi-asserted-by":"crossref","unstructured":"Suntaxi-O\u00f1a, G., & Varadharajan, V. (2015). A comparative analysis of the social graph model and multiparty access control model for online social networks. International Journal of Future Computer and Communication, Vol. 4, No. 5.","DOI":"10.18178\/ijfcc.2015.4.5.404"},{"key":"9651_CR89","doi-asserted-by":"publisher","unstructured":"Tappenden, A. F., and Miller, J. (2014). Automated cookie collection testing. ACM Transactions on Software Engineering Methodology. 23, 1, Article 3. https:\/\/doi.org\/10.1145\/2559936.","DOI":"10.1145\/2559936"},{"key":"9651_CR88","unstructured":"TFG (The TypeFace Group). (2020). Social network value per user\u2014How much is your audience worth? TFG website. Retrieved February 3, 2021, from https:\/\/www.thetypefacegroup.co.uk\/social-network-value-per-user\/"},{"key":"9651_CR90","unstructured":"The Madrid Privacy Declaration. (2009). Global privacy standards for a global world. Retrieved January 23, 2021, from https:\/\/www.intgovforum.org\/cms\/documents\/contributions\/open-consultations\/2010-february\/394-the-madrid-privacy-declaration\/file"},{"key":"9651_CR91","unstructured":"Timberg, C., & Dwoskin, E. (2020). Silicon Valley is getting tougher on Trump and his supporters over hate speech and disinformation. The Washington Post. Retrieved February 2, 2021."},{"key":"9651_CR92","volume-title":"The importance of us","author":"R Tuomela","year":"1995","unstructured":"Tuomela, R. (1995). The importance of us."},{"key":"9651_CR93","doi-asserted-by":"crossref","unstructured":"Turilli, M., & Floridi, L. (2009). The ethics of information transparency. Ethics and Information Technology, 11(2).","DOI":"10.1007\/s10676-009-9187-9"},{"key":"9651_CR94","unstructured":"Universal Declaration of Human Rights (UDHR), 10 December 1948, 217 A (III). Retrieved September 26, 2021, from https:\/\/www.refworld.org\/docid\/3ae6b3712c.html"},{"key":"9651_CR95","first-page":"29","volume":"30","author":"K Vasak","year":"1977","unstructured":"Vasak, K. (1977). Human rights: A thirty-year struggle: The sustained efforts to give force of law to the Universal Declaration of Human Rights. UNESCO Courier, 30, 29\u201332.","journal-title":"UNESCO Courier"},{"key":"9651_CR96","doi-asserted-by":"crossref","unstructured":"Voloch, N., Nissim, P., Elmakies, M., & Gudes, E. (2019, July). A role and trust access control model for preserving privacy and image anonymization in social networks. In IFIP international conference on trust management (pp. 19\u201327). Springer.","DOI":"10.1007\/978-3-030-33716-2_2"},{"key":"9651_CR97","unstructured":"Waldron, J. (2016). In E. N. Zalta (Ed.), Property and ownership, The Stanford Encyclopedia of Philosophy (Winter 2016 Edition). Retrieved from http:\/\/plato.stanford.edu\/archives\/win2016\/entries\/property\/"},{"key":"9651_CR98","unstructured":"Wenar, L. (2021). \"Rights\". In E. N. Zalta (Ed.), The Stanford Encyclopedia of philosophy (Spring 2021 Edition). Retrieved October 18, 2021, from https:\/\/plato.stanford.edu\/archives\/spr2021\/entries\/rights\/"},{"key":"9651_CR99","unstructured":"Wentworth, D. (2002). Mickey rattles the bars: The supreme court hearing of Eldred v. Ashcroft, Berkman Center for Internet & Society, Harvard."},{"key":"9651_CR100","doi-asserted-by":"crossref","unstructured":"Whitworth, B., & De Moor, A. (Eds.). (2009). Handbook of Research on Socio-Technical Design and Social Networking Systems. Hershey, PA: IGI.\u201d ISBN: 978-1-60566-264-0.","DOI":"10.4018\/978-1-60566-264-0"},{"key":"9651_CR101","unstructured":"Whitworth, B., & Ahmad, A. (2014). The social design of technical systems: Building technologies for communities. Interaction Design Foundation."},{"key":"9651_CR102","unstructured":"Wilde, D., (2019). Over 1,000 Android apps take your data, even despite permission blocks, 9to5Google 09-07-2019. Retrieved February 3, 2021, from https:\/\/9to5google.com\/2019\/07\/09\/android-app-data-permissions\/"},{"issue":"1","key":"9651_CR103","first-page":"359","volume":"7","author":"HP Young","year":"2015","unstructured":"Young, H. P. (2015). The evolution of social norms. Economics, 7(1), 359\u2013387.","journal-title":"Economics"},{"key":"9651_CR104","doi-asserted-by":"crossref","unstructured":"Zajonc, R. (1965). Social facilitation. Science, 149(3681), 269\u2013274. American Association for the Advancement of Science. Retrieved February 3, 2019, from http:\/\/www.jstor.org\/stable\/1715944","DOI":"10.1126\/science.149.3681.269"},{"key":"9651_CR105","first-page":"349","volume":"13","author":"S Zeebaree","year":"2020","unstructured":"Zeebaree, S., Ameen, S., & Sadeeq, M. (2020). Social media networks security threats, risks and recommendation: A case study in the kurdistan region. International Journal of Innovation, Creativity and Change, 13, 349\u2013365.","journal-title":"International Journal of Innovation, Creativity and Change"},{"key":"9651_CR106","doi-asserted-by":"crossref","unstructured":"Zhang, J., Gu, Z., Jang, J., Wu, H., Stoecklin, M. P., Huang, H., & Molloy, I. (2018, May). Protecting intellectual property of deep neural networks with watermarking. In Proceedings of the 2018 on Asia conference on computer and communications security (pp. 159\u2013172).","DOI":"10.1145\/3196494.3196550"},{"key":"9651_CR107","doi-asserted-by":"crossref","unstructured":"Ziccardi, G. (2019). The right to data oblivion. DATA POLITICS (p. 231).","DOI":"10.4324\/9781315167305-12"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-022-09651-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-022-09651-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-022-09651-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T14:12:41Z","timestamp":1701267161000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-022-09651-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":109,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["9651"],"URL":"https:\/\/doi.org\/10.1007\/s10676-022-09651-0","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,25]]},"assertion":[{"value":"20 April 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"46"}}