{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T06:04:25Z","timestamp":1760853865582},"reference-count":81,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1080\/01972243.2015.1107166","type":"journal-article","created":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T15:50:42Z","timestamp":1450799442000},"page":"51-63","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":27,"title":["Data aggregators, consumer data, and responsibility online: Who is tracking consumers online and should they stop?"],"prefix":"10.1080","volume":"32","author":[{"given":"Kirsten","family":"Martin","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,12,22]]},"reference":[{"key":"cit0001","first-page":"205\u201324.","volume-title":"Shaping technology\/building society: Studies in socio-technical change","author":"Akrich M.","year":"2000"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.5840\/soctheorpract20032915"},{"key":"cit0003","author":"Angwin J.","year":"2010","journal-title":"Wall Street Journal"},{"issue":"1","key":"cit0007","first-page":"09","volume":"75","author":"Beales H. J.","year":"2008","journal-title":"University of Chicago Law Review"},{"issue":"1","key":"cit0008","first-page":"1","volume":"54","author":"Bedi M.","year":"2013","journal-title":"Boston College Law Review"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511625138.009"},{"issue":"4","key":"cit0010","doi-asserted-by":"crossref","first-page":"485","DOI":"10.24908\/ss.v8i4.4184","volume":"8","author":"Bennett C.","year":"2011","journal-title":"Surveillance & Society"},{"key":"cit0011","volume-title":"Panopticon or the inspection house","volume":"2","author":"Bentham J.","year":"1791"},{"key":"cit0012","volume-title":"Of bicycles, Bakelites, and bulbs: Toward a theory of sociotechnical change","author":"Bijker W.","year":"1995"},{"key":"cit0013","first-page":"962","volume":"39","author":"Bloustein E.","year":"1964","journal-title":"New York University Law Review"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.678878"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v16i5.3493"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2014.915278"},{"key":"cit0017","first-page":"1027","volume":"87","author":"Calo R.","year":"2012","journal-title":"Notre Dame Law Review"},{"key":"cit0018","first-page":"97","volume":"66","author":"Calo R.","year":"2013","journal-title":"Stanford Law Review"},{"issue":"1","key":"cit0019","first-page":"181","volume":"75","author":"Cohen J.","year":"2008","journal-title":"University of Chicago Law Review"},{"key":"cit0020","author":"Cranor L. F.","year":"2014","journal-title":"Presented at 42nd Research Conference on Communication, Information and Internet Policy (TPRC 2014), March 31."},{"issue":"2","key":"cit0021","doi-asserted-by":"crossref","first-page":"252","DOI":"10.5465\/amr.1994.9410210749","volume":"19","author":"Donaldson T.","year":"1994","journal-title":"Academy of Management Review"},{"key":"cit0022","author":"Duhigg C.","year":"2012","journal-title":"The New York Times"},{"issue":"4","key":"cit0023","first-page":"929","volume":"14","author":"Etzioni A.","year":"2012","journal-title":"University of Pennsylvania Journal of Constitutional Law"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1215\/9780822390169-018"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674332485"},{"key":"cit0027","first-page":"657","volume":"46","author":"Hartzog W.","year":"2012","journal-title":"Georgia Law Review"},{"key":"cit0029","first-page":"1","volume":"101","author":"Hartzog W.","year":"2013","journal-title":"California Law Review"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2012.709479"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1080\/019722499128583"},{"key":"cit0033","author":"Horwitz S.","year":"2011","journal-title":"The Washington Post"},{"key":"cit0035","first-page":"951","volume":"107","author":"Kerr O.","year":"2009","journal-title":"Michigan Law Review"},{"issue":"3","key":"cit0036","first-page":"311","volume":"111","author":"Kerr O.","year":"2012","journal-title":"Michigan Law Review"},{"key":"cit0037","author":"Kravets D.","year":"2013","journal-title":"Wired"},{"key":"cit0038","author":"Kravets D.","year":"2013","journal-title":"Wired"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(02)00359-4"},{"key":"cit0041","first-page":"225","volume-title":"Shaping technology\/building societies: Studies in socio-technical change","author":"Latour L.","year":"2000"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866932"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381970"},{"key":"cit0045","volume":"7","author":"Leon P. G.","year":"2013","journal-title":"Proceedings of the ninth symposium on usable privacy and security"},{"key":"cit0046","author":"Loftus T.","year":"2011","journal-title":"Wall Street Journal"},{"key":"cit0047","author":"Loftus T.","year":"2011","journal-title":"Wall Street Journal"},{"key":"cit0048","author":"Loftus T.","year":"2011","journal-title":"Wall Street Journal"},{"key":"cit0049","author":"Lohr S.","year":"2012","journal-title":"The New York Times"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-012-1215-8"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-012-9300-3"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v18i12.4838"},{"key":"cit0095","author":"Martin K.","year":"2015","journal-title":"Journal of Public Policy & Marketing"},{"key":"cit0050","author":"Mattioli D.","year":"2012","journal-title":"Wall Street Journal"},{"key":"cit0054","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"cit0055","first-page":"89","volume":"66","author":"Mayer J.","year":"2013","journal-title":"Stanford Law Review Online"},{"key":"cit0056","first-page":"543","volume":"4","author":"McDonald A. M.","year":"2008","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"cit0057","author":"McDonald A.","year":"2010","journal-title":"Presented at 38th research conference on communication, information and Internet policy (TPRC 2010), March 31"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2009.02.025"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.26.2.202"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2011.07.019"},{"key":"cit0061","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum H.","year":"2009"},{"key":"cit0062","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"cit0092","first-page":"57","author":"Ohm P.","year":"2009","journal-title":"UCLA Law Review"},{"key":"cit0063","first-page":"1417","author":"Ohm P.","year":"2009","journal-title":"University of Illinois Law Review"},{"key":"cit0093","volume":"88","author":"Ohm P.","year":"2015","journal-title":"Southern California Law Review"},{"key":"cit0064","author":"Pariser E.","year":"2011","journal-title":"CNN"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2013.825358"},{"key":"cit0066","author":"Popkin H.","year":"2010","journal-title":"NBC News"},{"key":"cit0067","doi-asserted-by":"publisher","DOI":"10.1080\/01972240701572921"},{"key":"cit0068","first-page":"323","volume":"4","author":"Rachels J.","year":"1975","journal-title":"Philosophy and Public Affairs"},{"issue":"4","key":"cit0069","doi-asserted-by":"crossref","first-page":"497","DOI":"10.24908\/ss.v8i4.4185","volume":"8","author":"Regan P.","year":"2011","journal-title":"Surveillance and Society"},{"key":"cit0070","volume-title":"The unwanted gaze: The destruction of privacy in America","author":"Rosen J.","year":"2000"},{"key":"cit0071","volume-title":"Privacy by design: A counterfactual analysis of Google and Facebook privacy incidents (Public Law Research Paper No. 12-43)","author":"Rubenstein I.","year":"2012"},{"key":"cit0072","doi-asserted-by":"publisher","DOI":"10.1086\/224567"},{"key":"cit0073","first-page":"1814","volume":"86","author":"Schwartz P.","year":"2011","journal-title":"New York University Law Review"},{"key":"cit0074","author":"Shilton K.","year":"2013","journal-title":"Paper presented at TPRC 41: The 41st research conference on communication, information and Internet policy, Arlington, VA, September 27\u201329"},{"issue":"2","key":"cit0075","first-page":"370","volume":"14","author":"Sloan R.","year":"2014","journal-title":"Journal of High Technology Law"},{"key":"cit0076","first-page":"1880","volume":"126","author":"Solove D.","year":"2013","journal-title":"Harvard Law Review"},{"key":"cit0077","author":"Sprenger P.","year":"1999","journal-title":"Wired"},{"key":"cit0078","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v13i7.2077"},{"key":"cit0079","author":"Steel E.","year":"2010","journal-title":"Wall Street Journal Digits"},{"key":"cit0080","author":"Steel E.","year":"2011","journal-title":"Wall Street Journal"},{"key":"cit0081","author":"Steel E.","year":"2011","journal-title":"Wall Street Journal"},{"key":"cit0082","first-page":"614","volume":"70","author":"Strandburg K.","year":"2011","journal-title":"Maryland Law Review"},{"key":"cit0083","first-page":"63","volume":"64","author":"Tene O.","year":"2012","journal-title":"Stanford Law Review"},{"issue":"5","key":"cit0084","first-page":"240","volume":"11","author":"Tene O.","year":"2013","journal-title":"Northwestern Journal of Technology and Intellectual Property"},{"key":"cit0087","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"cit0089","doi-asserted-by":"publisher","DOI":"10.1108\/09685221111115863"},{"key":"cit0090","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2013.825687"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2015.1107166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T04:04:07Z","timestamp":1599969847000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2015.1107166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,22]]},"references-count":81,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,12,22]]},"published-print":{"date-parts":[[2016,1]]}},"alternative-id":["10.1080\/01972243.2015.1107166"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2015.1107166","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,22]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}