{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T02:11:45Z","timestamp":1767665505361},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,7,30]],"date-time":"2011-07-30T00:00:00Z","timestamp":1311984000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,7,30]],"date-time":"2011-07-30T00:00:00Z","timestamp":1311984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1007\/s11948-011-9298-7","type":"journal-article","created":{"date-parts":[[2011,7,29]],"date-time":"2011-07-29T15:35:15Z","timestamp":1311953715000},"page":"83-92","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Data Sharing and Dual-Use Issues"],"prefix":"10.1007","volume":"19","author":[{"given":"Louise","family":"Bezuidenhout","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,30]]},"reference":[{"issue":"5610","key":"9298_CR2","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1126\/science.299.5610.1149","volume":"299","author":"R Atlas","year":"2003","unstructured":"Atlas, R., Campbell, P., Cozzarelli, N. R., et al. (2003). Statement on scientific publication and security. Science,\n                  299(5610), 1149.","journal-title":"Science"},{"key":"9298_CR3","volume-title":"The ethics toolkit","author":"J Baggini","year":"2007","unstructured":"Baggini, J., & Fosl, P. S. (2007). The ethics toolkit. Oxford: Blackwell Publishing."},{"key":"9298_CR5","unstructured":"Evans, N. G. (2010). Dual-use bioethics: The nuclear connection, research report for the wellcome trust project on `building a sustainable capacity in dual-use bioethics\u2019. Bradford: University of Bradford."},{"issue":"3","key":"9298_CR6","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1128\/JVI.75.3.1205-1210.2001","volume":"75","author":"RJ Jackson","year":"2001","unstructured":"Jackson, R. J., Ramsay, A. J., Christensen, C. D., Beaton, S., Hall, D. F., & Ramshaw, I. A. (2001). Expression of mouse interleukin-4 by a recombinant ectromelia virus suppresses cytolytic lymphocyte responses and overcomes genetic resistance to mousepox. Journal of Virology,\n                  75(3), 1205\u20131210.","journal-title":"Journal of Virology"},{"key":"9298_CR7","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1111\/j.1467-8519.2008.00695.x","volume":"22","author":"F Kuhlau","year":"2008","unstructured":"Kuhlau, F., Eriksson, S., Evers, K., & Hoglund, A. T. (2008). Taking due care: Moral obligations in dual-use research. Bioethics,\n                  22, 477\u2013487.","journal-title":"Bioethics"},{"key":"9298_CR8","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1016\/j.respol.2007.10.003","volume":"36","author":"C McLeish","year":"2007","unstructured":"McLeish, C., & Nightingale, P. (2007). Biosecurity, bioterrorism and the governance of science: The increasing convergence of science and security policy. Research Policy,\n                  36, 1635\u20131653.","journal-title":"Research Policy"},{"key":"9298_CR9","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/s11948-007-9043-4","volume":"13","author":"S Miller","year":"2007","unstructured":"Miller, S., & Selgelid, M. J. (2007). Ethical and philosophical considerations of the dual-use dilemma in the biological sciences. Science and Engineering Ethics,\n                  13, 523\u2013580.","journal-title":"Science and Engineering Ethics"},{"key":"9298_CR4","unstructured":"National Research Council. (2003). Sharing publication-related data and materials: Responsibilities of authorship in the life sciences. C. o. R. o. A. i. t. B. Sciences."},{"key":"9298_CR1","unstructured":"National Research Council. (2006). Globalization, biosecurity and the future of the life sciences. Washington D. C."},{"issue":"13 January","key":"9298_CR10","first-page":"4","volume":"2273","author":"R Nowak","year":"2001","unstructured":"Nowak, R. (2001). Disaster in the making. New Scientist,\n                  2273(13 January), 4\u20135.","journal-title":"New Scientist"},{"issue":"3","key":"9298_CR11","doi-asserted-by":"publisher","first-page":"71","DOI":"10.2218\/ijdc.v4i3.115","volume":"4","author":"G Pryor","year":"2009","unstructured":"Pryor, G. (2009). Multi-scale data sharing in the life sciences: Some lessons for policy makers. International Journal of Digital Curation,\n                  4(3), 71\u201382.","journal-title":"International Journal of Digital Curation"},{"key":"9298_CR12","doi-asserted-by":"publisher","DOI":"10.1057\/9780230223158","volume-title":"Biotechnology, security and the search for limits","author":"B Rappert","year":"2007","unstructured":"Rappert, B. (2007). Biotechnology, security and the search for limits. New York: Palgrave Macmillan."},{"issue":"1","key":"9298_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3152\/030234207X276509","volume":"35","author":"B Rappert","year":"2008","unstructured":"Rappert, B. (2008). The benefits, risks, and threats of biotechnology. Science and Public Policy,\n                  35(1), 37\u201343.","journal-title":"Science and Public Policy"},{"key":"9298_CR14","volume-title":"Education and ethics in the life sciences","year":"2010","unstructured":"Rappert, B. (Ed.). (2010). Education and ethics in the life sciences. Canberra: Australian National University Press."},{"key":"9298_CR15","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.1073\/pnas.96.4.1651","volume":"96","author":"AH Reid","year":"1999","unstructured":"Reid, A. H., Fanning, T. G., Hultin, J. V., & Taubenberger, J. K. (1999). Origin and evolution of the 1918 \u2018Spanish\u2019 influenza hemagglutinin gene. PNAS,\n                  96, 1651\u20131656.","journal-title":"PNAS"},{"key":"9298_CR16","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1002\/ddr.10406","volume":"63","author":"DB Resnik","year":"2005","unstructured":"Resnik, D. B., & Shamoo, A. E. (2005). Bioterrorism and the responsible conduct of biomedical research. Drug Development Research,\n                  63, 121\u2013133.","journal-title":"Drug Development Research"},{"issue":"5444","key":"9298_CR17","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1126\/science.286.5444.1475","volume":"286","author":"J Rotblat","year":"1999","unstructured":"Rotblat, J. (1999). A Hippocratic oath for scientists. Science,\n                  286(5444), 1475.","journal-title":"Science"},{"issue":"10 September","key":"9298_CR18","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1038\/461171a","volume":"461","author":"PN Schofield","year":"2009","unstructured":"Schofield, P. N., Bubela, T., Weaver, T., et al. (2009). Post-publication sharing of data and tools. Nature,\n                  461(10 September), 171\u2013173.","journal-title":"Nature"},{"issue":"1","key":"9298_CR19","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1038\/embor.2009.270","volume":"11","author":"MJ Selgelid","year":"2010","unstructured":"Selgelid, M. J., & Weir, L. (2010). The mousepox experience: An interview with Ronald Jackson and Ian Ramshaw on dual-use research. EMBO Reports,\n                  11(1), 18\u201324.","journal-title":"EMBO Reports"},{"key":"9298_CR20","unstructured":"Shea, D. A. (2007). Oversight of dual-use biological research: The national science advisory board for biosecurity. CRS report for congress. C. R. Service."},{"issue":"5307","key":"9298_CR21","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1126\/science.275.5307.1793","volume":"275","author":"JK Taubenberger","year":"1997","unstructured":"Taubenberger, J. K., Reid, Ann. H., Krafft, A. E., Bijwaard, K. E., & Fanning, T. G. (1997). Initial genetic characterization of the 1918 \u2018Spanish\u2019 influenza virus. Science,\n                  275(5307), 1793\u20131796.","journal-title":"Science"},{"key":"9298_CR22","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1038\/nature04230","volume":"437","author":"JK Taubenberger","year":"2005","unstructured":"Taubenberger, J. K., Reid, A. H., Lourens, R. M., Wang, R., Jin, G., & Fanning, T. G. (2005). Characterization of the 1918 influenza virus polymerase genes. Nature,\n                  437, 889\u2013893.","journal-title":"Nature"},{"key":"9298_CR23","doi-asserted-by":"crossref","unstructured":"Toronto_International_Data_Release_Workshop_Authors. (2009). Prepublication data sharing. Nature 461(10 September), 168\u2013170.","DOI":"10.1038\/461168a"},{"issue":"Special issue","key":"9298_CR24","doi-asserted-by":"publisher","first-page":"S10","DOI":"10.1038\/sj.embor.7400726","volume":"7","author":"J van Aken","year":"2006","unstructured":"van Aken, J. (2006). When risk outweighs benefit: Dual-use research needs a scientifically sound risk-benefit analysis and legally binding biosecurity measures. EMBO reports,\n                  7(Special issue), S10\u2013S13.","journal-title":"EMBO reports"},{"key":"9298_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/sj.hdy.6800911","volume":"98","author":"J van Aken","year":"2007","unstructured":"van Aken, J. (2007). Is it wise to resurrect a deadly virus? Heredity,\n                  98, 1\u20132.","journal-title":"Heredity"},{"issue":"45","key":"9298_CR26","first-page":"A3014","volume":"101","author":"J van Aken","year":"2004","unstructured":"van Aken, J., Johannsen, S., & Kollek, R. (2004). Die Terror-Angst und ihre Folgen. Deutsches Aerzteblatt,\n                  101(45), A3014\u2013A3916.","journal-title":"Deutsches Aerzteblatt"},{"key":"9298_CR27","doi-asserted-by":"crossref","unstructured":"von Schomberg, R. (2007). From the ethics of technology towards an ethics of knowledge policy and knowledge assessment. A working document from the European Commissions Services. European Commissions Services.","DOI":"10.2139\/ssrn.2436380"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-011-9298-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11948-011-9298-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-011-9298-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-011-9298-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T09:33:33Z","timestamp":1660642413000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11948-011-9298-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,30]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,3]]}},"alternative-id":["9298"],"URL":"https:\/\/doi.org\/10.1007\/s11948-011-9298-7","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,30]]},"assertion":[{"value":"20 June 2011","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2011","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2011","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}