{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T22:10:12Z","timestamp":1719094212901},"reference-count":45,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2017,3,15]]},"DOI":"10.1080\/01972243.2016.1271071","type":"journal-article","created":{"date-parts":[[2017,3,8]],"date-time":"2017-03-08T16:24:51Z","timestamp":1488990291000},"page":"76-85","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["Ready to forget: American attitudes toward the right to be forgotten"],"prefix":"10.1080","volume":"33","author":[{"given":"Leticia","family":"Bode","sequence":"first","affiliation":[]},{"given":"Meg Leta","family":"Jones","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2017,3,8]]},"reference":[{"key":"cit0001","first-page":"369","volume":"16","author":"Ambrose M.","year":"2013","journal-title":"Stanford Technology Law Review"},{"key":"cit0002","first-page":"99","volume":"29","author":"Ambrose M.","year":"2012","journal-title":"Santa Clara Journal of Computers and High Technology Law"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.5325\/jinfopoli.3.2013.0001"},{"key":"cit0004","volume-title":"Restatement (2d) of torts","author":"American Law Institute","year":"1977"},{"key":"cit0005","first-page":"1","volume":"55","author":"Ardia D. S.","year":"2013","journal-title":"William & Mary Law Review"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2012.01.006"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1086\/269200"},{"key":"cit0008","author":"Baker J.","year":"2014","journal-title":"The Register"},{"key":"cit0009","first-page":"247","volume":"63","author":"Bamberger K.","year":"2010","journal-title":"Stanford Law Review"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12166"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1177\/1745691610393980"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.05.009"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.polisci.10.072805.103054"},{"key":"cit0017","first-page":"61","volume":"89","author":"Citron D.","year":"2009","journal-title":"Boston University Law Review"},{"key":"cit0018","first-page":"1904","volume":"126","author":"Cohen J.","year":"2013","journal-title":"Harvard Law Review"},{"key":"cit0021","author":"Falkenberg K.","year":"2014","journal-title":"Forbes"},{"key":"cit0023","author":"Gilbert D.","year":"2014","journal-title":"International Business Times"},{"key":"cit0026","unstructured":"House of Lords, European Union Committee. 2014. EU data protection law: A \u2018right to be forgotten\u2019? (2nd Report of Session 2014\u201315). http:\/\/www.publications.parliament.uk\/pa\/ld201415\/ldselect\/ldeucom\/40\/40.pdf (accessed October 15, 2016)."},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262015950.001.0001"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.4324\/9780203413845"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1145\/2753237"},{"issue":"3","key":"cit0032","first-page":"229","volume":"8","author":"Koops B.","year":"2011","journal-title":"SCRIPTed"},{"issue":"1","key":"cit0033","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1111\/j.1530-2415.2007.00119.x","volume":"7","author":"Levenson J. S.","year":"2007","journal-title":"Analyses of Social Issues and Public Policy"},{"key":"cit0034","author":"Luckerson V.","year":"2014","journal-title":"Time"},{"key":"cit0036","author":"Masing J.","year":"2014","journal-title":"Verfassungsblog"},{"key":"cit0038","volume-title":"Delete: The virtue of forgetting in the digital age","author":"Mayer-Sch\u00f6nberger V.","year":"2009"},{"key":"cit0039","author":"Newman A.","year":"2013","journal-title":"Foreign Affairs"},{"key":"cit0040","doi-asserted-by":"crossref","DOI":"10.7591\/9781501729218","volume-title":"Protectors of privacy: Regulating personal data in the global economy","author":"Newman A.","year":"2008"},{"key":"cit0062","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H. 2010.Privacy in Context: Technology, Policy, and the Integrity of Social Life. Palo Alto, CA: Stanford Law Books.","DOI":"10.1515\/9780804772891"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107590205.006"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-013-0434-y"},{"key":"cit0044","volume-title":"Academic commentary: Google Spain","author":"Powles J.","year":"2015"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.2307\/3478805"},{"key":"cit0046","volume-title":"Privacy matters\u2014Why the EU needs new personal data protection rules","author":"Reding V.","year":"2010"},{"key":"cit0047","first-page":"357","volume":"9","author":"Richards N. M.","year":"2011","journal-title":"Journal of Telecommunications and High Technology Law"},{"key":"cit0048","first-page":"88","volume":"64","author":"Rosen J.","year":"2012","journal-title":"Stanford Law Review Online"},{"key":"cit0049","volume-title":"How to conduct your own survey","author":"Salant P.","year":"1994"},{"key":"cit0050","author":"Salzman M.","year":"2015","journal-title":"The Guardian"},{"key":"cit0051","author":"Sidhu D.","year":"2014","journal-title":"New Republic"},{"key":"cit0053","volume-title":"The digital person","author":"Solove D.","year":"2004"},{"key":"cit0054","first-page":"583","volume":"114","author":"Solove D.","year":"2014","journal-title":"Columbia Law Review"},{"key":"cit0056","author":"Travis A.","year":"2014","journal-title":"The Guardian"},{"key":"cit0057","volume-title":"Making news","author":"Tuchman G.","year":"1978"},{"key":"cit0058","author":"Ward S. F.","year":"2014","journal-title":"ABA Journal"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511818691"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2016.1271071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T21:55:50Z","timestamp":1719093350000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2016.1271071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,8]]},"references-count":45,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,3,8]]},"published-print":{"date-parts":[[2017,3,15]]}},"alternative-id":["10.1080\/01972243.2016.1271071"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2016.1271071","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,8]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}