{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T15:56:59Z","timestamp":1756310219059},"reference-count":9,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2016,8,7]]},"DOI":"10.1080\/01972243.2016.1177764","type":"journal-article","created":{"date-parts":[[2016,5,31]],"date-time":"2016-05-31T23:49:02Z","timestamp":1464738542000},"page":"269-279","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":8,"title":["Ethics of the software vulnerabilities and exploits market"],"prefix":"10.1080","volume":"32","author":[{"given":"Marty J.","family":"Wolf","sequence":"first","affiliation":[]},{"given":"Nir","family":"Fresco","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,5,31]]},"reference":[{"key":"cit0001","first-page":"1011","volume":"162","author":"Bambauer D. E.","year":"2014","journal-title":"University of Pennsylvania Law Review"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v9i1.1113"},{"key":"cit0004","doi-asserted-by":"crossref","DOI":"10.4324\/9780203942147","volume-title":"Decoding Liberation: The promise of free and open source software","author":"Chopra S.","year":"2008"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199641321.001.0001"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1002\/9780470281819.ch10"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1016\/S0048-7333(03)00047-7"},{"key":"cit0013","doi-asserted-by":"crossref","first-page":"3","DOI":"10.7551\/mitpress\/5326.003.0005","volume-title":"Perspectives on free and open source software","author":"Lakhani K. R.","year":"2005"},{"issue":"4","key":"cit0015","first-page":"451","volume":"28","author":"Oriola T. A.","year":"2011","journal-title":"The John Marshall Journal of Information Technology & Privacy Law"},{"key":"cit0017","author":"Taddeo M.","year":"2016","journal-title":"Topoi"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2016.1177764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T07:36:47Z","timestamp":1718609807000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2016.1177764"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,31]]},"references-count":9,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,5,31]]},"published-print":{"date-parts":[[2016,8,7]]}},"alternative-id":["10.1080\/01972243.2016.1177764"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2016.1177764","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,31]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}