{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:06:01Z","timestamp":1774368361320,"version":"3.50.1"},"reference-count":43,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2016,4,2]]},"DOI":"10.1080\/0144929x.2015.1128976","type":"journal-article","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T23:45:28Z","timestamp":1459381528000},"page":"268-276","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":8,"title":["Controlling information behaviour: the case for access          control"],"prefix":"10.1080","volume":"35","author":[{"given":"Paul A.","family":"Watters","sequence":"first","affiliation":[{"name":"Centre for Information Technology, Massey University","place":["Auckland, New Zealand"]}]},{"given":"Jacqueline","family":"Ziegler","sequence":"additional","affiliation":[{"name":"Centre for Information Technology, Massey University","place":["Auckland, New Zealand"]}]}],"member":"301","published-online":{"date-parts":[[2016,3,30]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1355\/9789812308900"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2008.0226"},{"key":"e_1_3_4_4_1","unstructured":"Clinton W. J. 1995. \u201cExecutive Order 12958.\u201d http:\/\/www.gpo.gov\/fdsys\/pkg\/WCPD-1995-04-24\/pdf\/WCPD-1995-04-24-Pg634.pdf."},{"key":"e_1_3_4_5_1","doi-asserted-by":"crossref","unstructured":"De Boever J. 2008. \u201cValue Networks of P2P TV: An Analysis of Actors and Their Roles.\u201d In Internet and Web Applications and Services 2008. Third International Conference on ICIW'08 686\u2013695. Piscataway: IEEE.","DOI":"10.1109\/ICIW.2008.30"},{"key":"e_1_3_4_6_1","unstructured":"Deibert R. J. 2009. \u201cThe Geopolitics of Internet Control: Censorship Sovereignty and Cyberspace.\u201d In The Routledge Handbook of Internet Politics edited by Philip Howard 323\u2013336. London: Routledge."},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-007-9145-x"},{"key":"e_1_3_4_8_1","unstructured":"Films Videos and Publications Classification Act. 1993. http:\/\/www.legislation.govt.nz\/act\/public\/1993\/0094\/latest\/DLM312895.html."},{"key":"e_1_3_4_9_1","unstructured":"Films Videos and Publications Classification Amendment Act. 2005. http:\/\/www.legislation.govt.nz\/act\/public\/2005\/0002\/latest\/DLM333252.html."},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1360-0443.2008.02145.x"},{"key":"e_1_3_4_11_1","unstructured":"Gibson C. 2014. \u201cThe Ethics of Piracy for Personal Use.\u201d Thesis Submitted for the Degree of Master of Arts Otago University. http:\/\/otago.ourarchive.ac.nz\/handle\/10523\/4954."},{"key":"e_1_3_4_12_1","first-page":"113","article-title":"Essay: From Having Copies to Experiencing Works:\n            The Development of an Access Right in US Copyright Law","volume":"50","author":"Ginsburg J. C.","year":"2002","unstructured":"Ginsburg, J. C. 2002. \u201cEssay: From Having Copies to Experiencing Works: The Development of an Access Right in US Copyright Law.\u201d Journal of the Copyright Society of the USA 50: 113.","journal-title":"Journal of the Copyright Society of the USA"},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.1386\/jdtv.3.2.141_1"},{"key":"e_1_3_4_14_1","first-page":"1119","article-title":"Regulation of the Internet: Three Persistent\n            Fallacies","volume":"73","author":"Goldsmith J.","year":"1997","unstructured":"Goldsmith, J. 1997. \u201cRegulation of the Internet: Three Persistent Fallacies.\u201d Chicago-Kent Law Review 73: 1119\u20131131.","journal-title":"Chicago-Kent Law Review"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177705148"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/00242530110381127"},{"key":"e_1_3_4_17_1","doi-asserted-by":"crossref","unstructured":"Ho W. H. and P. A. Watters. 2004. \u201cStatistical and Structural Approaches to Filtering Internet Pornography.\u201d In 2004 IEEE International Conference on Systems Man and Cybernetics Vol. 5 4792\u20134798. Piscataway: IEEE October.","DOI":"10.1109\/ICSMC.2004.1401289"},{"key":"e_1_3_4_18_1","unstructured":"Jakarta Post. 2014. \u201cStudents Protest Prostitution Gambling Dens (28\/01\/14).\u201d http:\/\/www.thejakartapost.com\/news\/2014\/01\/28\/students-protest-prostitution-gambling-dens.html."},{"key":"e_1_3_4_19_1","first-page":"1119","article-title":"Regulation and the\n          Internet","volume":"26","author":"Kass S.","year":"1998","unstructured":"Kass, S. 1998. \u201cRegulation and the Internet.\u201d Southern University Law Review 26: 1119\u20131131.","journal-title":"Southern University Law Review"},{"key":"e_1_3_4_20_1","doi-asserted-by":"crossref","unstructured":"Keilty P. 2012. \u201cEmbodiment and Desire in Browsing Online Pornography.\u201d In Proceedings of the 2012 iConference 41\u201347. New York: ACM February.","DOI":"10.1145\/2132176.2132182"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199106)42:5<361::AID-ASI6>3.0.CO;2-#"},{"key":"e_1_3_4_22_1","doi-asserted-by":"crossref","unstructured":"Latapy M. C. Magnien and R. Fournier. 2011. \u201cQuantifying Paedophile Queries in a Large p2p System.\u201d In INFOCOM 2011 Proceedings IEEE 401\u2013405. Piscataway: IEEE April.","DOI":"10.1109\/INFCOM.2011.5935191"},{"key":"e_1_3_4_23_1","first-page":"213","article-title":"Sex, Lies, and Library Cards: The First\n            Amendment Implications of the Use of Software Filters to Control Access to Internet\n            Pornography in Public Libraries","volume":"51","author":"Laughlin G. K.","year":"2002","unstructured":"Laughlin, G. K. 2002. \u201cSex, Lies, and Library Cards: The First Amendment Implications of the Use of Software Filters to Control Access to Internet Pornography in Public Libraries.\u201d Drake Law Review 51: 213\u2013266.","journal-title":"Drake Law Review"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/JD-05-2012-0064"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"e_1_3_4_26_1","doi-asserted-by":"crossref","unstructured":"Mee J. and P. A. Watters. 2006. \u201cDetecting and Tracing Copyright Infringements in P2P Networks.\u201d In Proceedings of the International Conference on Networking International Conference on Systems and International Conference on Mobile Communications and Learning Technologies 60. Piscataway: IEEE Computer Society.","DOI":"10.1109\/ICNICONSMCL.2006.77"},{"key":"e_1_3_4_27_1","doi-asserted-by":"crossref","unstructured":"Nubi Z. 2014. Censorship is futile. First Monday 19 (11). http:\/\/firstmonday.org\/article\/view\/5525\/4155.","DOI":"10.5210\/fm.v19i11.5525"},{"key":"e_1_3_4_28_1","doi-asserted-by":"crossref","unstructured":"Nussbaumer P. I. Slembek C. Lueg R. Mogicato and G. Schwabe. 2009. \u201cUnderstanding Information Seeking Behaviour in Financial Advisory.\u201d In ISI 2009 Constance. Germany April 1\u20133.","DOI":"10.1145\/2229156.2229161"},{"key":"e_1_3_4_29_1","author":"Page Lawrence","year":"1999","unstructured":"Page, Lawrence, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1999. The PageRank Citation Ranking: Bringing Order to the Web. Technical Report, Stanford InfoLab.","journal-title":"The PageRank Citation Ranking: Bringing Order to the Web"},{"key":"e_1_3_4_30_1","volume-title":"Self-regulation and the Internet","author":"Price M. E.","year":"2005","unstructured":"Price, M. E., & S. G. Verhulst. 2005. Self-regulation and the Internet. New York: Kluwer law international."},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22816"},{"key":"e_1_3_4_32_1","volume-title":"Foundations of Library and Information\n            Science","author":"Rubin R. E.","year":"1998","unstructured":"Rubin, R. E. 1998. Foundations of Library and Information Science. New York, NY: Neal-Schuman."},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.1093\/joclec\/nhl016"},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_3_4_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/0032258X0107400202"},{"key":"e_1_3_4_38_1","doi-asserted-by":"crossref","unstructured":"Watters P. A. 2009. \u201cData Loss in the British Government: A Bounty of Credentials for Organised Crime.\u201d In Cybercrime and Trustworthy Computing Workshop 2009 UIC-ATC'09 531\u2013536. Piscataway: IEEE.","DOI":"10.1109\/UIC-ATC.2009.73"},{"key":"e_1_3_4_39_1","volume-title":"Cyber Security: Concepts and Cases","author":"Watters P. A.","year":"2012","unstructured":"Watters, P. A. 2012. Cyber Security: Concepts and Cases. London: British Scientific."},{"key":"e_1_3_4_40_1","first-page":"59","volume-title":"Proceedings of the Second Australasian Web\n            Conference","author":"Watters P. A.","year":"2014","unstructured":"Watters, P. A. 2014. \u201cA Systematic Approach to Measuring Advertising Transparency Online: An Australian Case Study.\u201d In Proceedings of the Second Australasian Web Conference, edited by S. Cranefield, A. Trotman, and J. Yang, Vol. 155, 59\u201367, Sydney."},{"key":"e_1_3_4_41_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v18i2.4300"},{"key":"e_1_3_4_42_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb026702"},{"issue":"2","key":"e_1_3_4_43_1","first-page":"3","article-title":"Human Information\n          Behavior","volume":"3","author":"Wilson T. D.","year":"2000","unstructured":"Wilson, T. D. 2000. \u201cHuman Information Behavior.\u201d Informing Science 3 (2): 3\u201315, Special Issue on Information Science Research.","journal-title":"Informing Science"},{"key":"e_1_3_4_44_1","doi-asserted-by":"crossref","unstructured":"Ye S. J. Lang and F. Wu. 2010. \u201cCrawling Online Social Graphs.\u201d In 2010 12th International Asia-Pacific Web Conference (APWEB) 236\u2013242. Piscataway: IEEE April.","DOI":"10.1109\/APWeb.2010.10"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2015.1128976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T09:35:30Z","timestamp":1762248930000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2015.1128976"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,30]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,4,2]]}},"alternative-id":["10.1080\/0144929X.2015.1128976"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2015.1128976","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,30]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2015-11-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-11-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}