{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:33:02Z","timestamp":1776094382742,"version":"3.50.1"},"reference-count":79,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1080\/01972243.2015.1107167","type":"journal-article","created":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T15:50:42Z","timestamp":1450799442000},"page":"14-27","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":58,"title":["The emotional context of information privacy"],"prefix":"10.1080","volume":"32","author":[{"given":"Luke","family":"Stark","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,12,22]]},"reference":[{"key":"cit0001","first-page":"1","volume-title":"Language and the politics of emotion","author":"Abu-Lughod L.","year":"1990"},{"key":"cit0002","first-page":"227","volume":"10","author":"Acquisti A.","year":"2012","journal-title":"Journal on Telecommunications & High Technology Law"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01883.x"},{"key":"cit0006","doi-asserted-by":"crossref","DOI":"10.4324\/9780203075319","volume-title":"Infoglut: How too much information is changing the way we think and know","author":"Andrejevic M.","year":"2013"},{"key":"cit0007","volume-title":"I know who you are and i saw what you did: Social networks and the death of privacy","author":"Andrews L.","year":"2012"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"cit0009","author":"Barocas S.","journal-title":"California Law Review"},{"key":"cit0010","volume-title":"Paper presented at the Engaging Data Forum: The First International Forum on the Application and Management of Personal Electronic Information","author":"Barocas S.","year":"2009"},{"key":"cit0011","first-page":"52","volume":"155","author":"Bartow A.","year":"2006","journal-title":"University of Pennsylvania Law Review"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.3233\/IP-2011-0257"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9760.2006.00235.x"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.11.016"},{"key":"cit0015","volume-title":"Paper presented at A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society","author":"Boyd D.","year":"2011"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.678878"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1145\/1120212.1120435"},{"issue":"5","key":"cit0019","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.2307\/1229517","volume":"52","author":"Cohen J. E.","year":"2000","journal-title":"Stanford Law Review Online"},{"key":"cit0020","first-page":"1904","volume":"126","author":"Cohen J. E.","year":"2013","journal-title":"Harvard Law Review"},{"key":"cit0021","first-page":"273","volume":"10","author":"Cranor L. F.","year":"2012","journal-title":"Journal on Telecommunications & High Technology Law"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1126\/science.1256297"},{"key":"cit0024","first-page":"55","volume-title":"Where the action is: The foundations of embodied interaction","author":"Dourish P.","year":"2004"},{"issue":"4","key":"cit0025","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1070960.1070982","volume":"12","author":"Dourish P.","year":"2005","journal-title":"Interactions"},{"issue":"2","key":"cit0026","first-page":"357","volume":"68","author":"Dror O. E.","year":"2001","journal-title":"Social Research"},{"key":"cit0029","first-page":"35","volume":"66","author":"Dwork C.","year":"2013","journal-title":"Stanford Law Review Online"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1037\/h0030377"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1145\/2677199.2687903"},{"issue":"9","key":"cit0032","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/S0308-5961(02)00027-7","volume":"26","author":"Fransman M.","year":"2002","journal-title":"Telecommunications Policy"},{"key":"cit0033","volume-title":"The virtual window: From Alberti to Microsoft","author":"Friedberg A.","year":"2009"},{"key":"cit0034","first-page":"71","volume":"69","author":"Garvin L. T.","year":"1998","journal-title":"University of Colorado Law Review"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-007-0161-4"},{"key":"cit0036","volume-title":"The Breakup 2.0","author":"Gershon I.","year":"2010"},{"key":"cit0037","author":"Goel V.","year":"2014","journal-title":"NYTimes.com."},{"key":"cit0038","first-page":"2932","volume":"8","author":"Hasinoff A. A.","year":"2014","journal-title":"International Journal of Communication"},{"key":"cit0039","volume-title":"On time and being","author":"Heidegger M.","year":"1972"},{"key":"cit0040","author":"Hill K.","year":"2014","journal-title":"Forbes"},{"key":"cit0041","doi-asserted-by":"crossref","DOI":"10.1525\/9780520930414","volume-title":"The managed heart: Commercialization of human feeling","author":"Hochschild A. R.","year":"2003","edition":"2"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55415-5_38"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2579403"},{"key":"cit0044","doi-asserted-by":"crossref","first-page":"221","DOI":"10.7551\/mitpress\/9042.003.0015","volume-title":"Media technologies: Essays on communication, materiality, and sociality","author":"Jackson S. J.","year":"2014"},{"key":"cit0045","volume-title":"A casual revolution: Reinventing video games and their players","author":"Juul J.","year":"2010"},{"issue":"3","key":"cit0046","first-page":"392","volume":"52","author":"Kerr I.","year":"2007","journal-title":"Criminal Law Quarterly"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1320040111"},{"key":"cit0048","first-page":"225","volume-title":"Shaping technology\/building society: Studies in sociotechnical change","author":"Latour B.","year":"1992"},{"key":"cit0049","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780199256044.001.0001","volume-title":"Reassembling the social: An introduction to actor-network theory","author":"Latour B.","year":"2005"},{"key":"cit0050","volume-title":"Public perceptions of privacy and security in the post-Snowden era","author":"Madden M.","year":"2014"},{"key":"cit0051","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1215\/9780822393047-002","volume-title":"The affect theory reader","author":"Massumi B.","year":"2010"},{"key":"cit0053","doi-asserted-by":"crossref","first-page":"2317","DOI":"10.1145\/2556288.2557295","volume-title":"CHI '14 proceedings of the SIGCHI conference on human factors in computing systems","author":"Meschtscherjakov A.","year":"2014"},{"issue":"3","key":"cit0055","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MAHC.2009.50","volume":"31","author":"Montfort N.","year":"2009","journal-title":"IEEE Annals of the History of Computing"},{"key":"cit0057","first-page":"72","volume-title":"CHI '94 proceedings of the SIGCHI conference on human factors in computing systems","author":"Nass C.","year":"1994"},{"issue":"2","key":"cit0058","first-page":"1","volume":"1","author":"Nippert-Eng C.","year":"2007","journal-title":"International Journal of Design"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226584546.001.0001"},{"issue":"3","key":"cit0060","first-page":"1367","volume":"26","author":"Nissenbaum H.","year":"2011","journal-title":"Berkeley Technology Law Journal"},{"key":"cit0061","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"cit0062","volume-title":"Modulated cities: Networked spaces, reconstituted subjects (Situated Technologies Pamphlets 9)","author":"Nissenbaum H.","year":"2012"},{"key":"cit0063","volume-title":"The design of everyday things","author":"Norman D. A.","year":"1989"},{"key":"cit0064","volume-title":"Emotional design: Why we love (or hate) everyday things","author":"Norman D. A.","year":"2005"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557007"},{"key":"cit0066","first-page":"106","volume-title":"The offensive Internet: Privacy, speech, and reputation","author":"Pasquale F.","year":"2010"},{"key":"cit0067","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1140.001.0001","volume-title":"Affective computing","author":"Picard R. W.","year":"2000"},{"key":"cit0068","volume-title":"Gut reactions: A perceptual theory of emotion","author":"Prinz J. J.","year":"2004"},{"key":"cit0069","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1145\/1978942.1979003","volume-title":"CHI '11 proceedings of the SIGCHI conference on human factors in computing systems","author":"Purpura S.","year":"2011"},{"key":"cit0070","volume-title":"Anonymity, privacy, and security online","author":"Rainie L.","year":"2013"},{"key":"cit0072","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1038\/456168a","volume":"456","author":"Sahakian B.","year":"2008","journal-title":"Nature"},{"key":"cit0075","doi-asserted-by":"publisher","DOI":"10.1145\/1094562.1094569"},{"key":"cit0076","volume-title":"The craftsman","author":"Sennett R.","year":"2009"},{"key":"cit0077","doi-asserted-by":"publisher","DOI":"10.1177\/0162243912436985"},{"key":"cit0078","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"cit0079","author":"Solove D. J.","year":"2006","journal-title":"ConcurringOpinions.com"},{"key":"cit0080","volume-title":"The future of reputation","author":"Solove D. J.","year":"2007"},{"key":"cit0081","volume-title":"The layers principle: Internet architecture and the law","author":"Solum L. B.","year":"2003"},{"key":"cit0082","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"cit0084","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-013-9328-z"},{"issue":"2","key":"cit0085","doi-asserted-by":"crossref","first-page":"125","DOI":"10.2307\/1192242","volume":"65","author":"Taslitz A. E.","year":"2002","journal-title":"Law and Contemporary Problems"},{"key":"cit0087","first-page":"307","volume-title":"Evocative objects: Things we think with","author":"Turkle S.","year":"2007"},{"key":"cit0088","volume-title":"Alone together: Why we expect more from technology and less from each other","author":"Turkle S.","year":"2011"},{"key":"cit0091","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"cit0092","volume-title":"Paper presented at Symposium on Usable Privacy and Security (SOUPS) 2011, July 20\u201322","author":"Wang Y.","year":"2011"},{"key":"cit0093","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1017\/CBO9780511625138.005","volume-title":"Philosophical dimensions of privacy: An anthology","author":"Warren S. D.","year":"1984"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2015.1107167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T09:17:08Z","timestamp":1718270228000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2015.1107167"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,22]]},"references-count":79,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,12,22]]},"published-print":{"date-parts":[[2016,1]]}},"alternative-id":["10.1080\/01972243.2015.1107167"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2015.1107167","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,22]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}