{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T09:50:14Z","timestamp":1713261014786},"reference-count":47,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2017,5,27]]},"DOI":"10.1080\/01972243.2017.1294127","type":"journal-article","created":{"date-parts":[[2017,4,6]],"date-time":"2017-04-06T20:10:57Z","timestamp":1491509457000},"page":"159-171","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["Am I my IP address's keeper? Revisiting the boundaries of information privacy"],"prefix":"10.1080","volume":"33","author":[{"given":"Jockum","family":"Hild\u00e9n","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2017,4,6]]},"reference":[{"key":"cit0001","author":"AmCham","year":"2009","journal-title":"European Commission"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1080\/019722497129124"},{"key":"cit0005","author":"BEUC, the European Consumers\u2019 Organisation","year":"2009","journal-title":"European Commission"},{"key":"cit0006","author":"Business Software Alliance","year":"2009","journal-title":"European Commission"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1093\/ojls\/gqu011"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1080\/13501763.2011.544505"},{"key":"cit0010","author":"Cushing T.","year":"2013","journal-title":"Techdirt,"},{"key":"cit0012","author":"Court of Justice of the European Union","year":"2016","journal-title":"Patrick Breyer v Bundesrepublik Deutschland"},{"key":"cit0013","first-page":"250","volume":"65","author":"Department of Health and Human Services","year":"2000","journal-title":"Federal Register"},{"key":"cit0014","author":"Directorate-General Justice","year":"2015","journal-title":"European Commission"},{"key":"cit0015","author":"Eckersley P.","year":"2010","journal-title":"Electronic Frontier Foundation"},{"key":"cit0021","author":"Ernesto.","year":"2012","journal-title":"Torrentfreak"},{"key":"cit0019","author":"Ernesto.","year":"2014","journal-title":"Torrentfreak"},{"key":"cit0020","author":"Ernesto.","year":"2014","journal-title":"Torrentfreak"},{"key":"cit0022","author":"European Privacy Officers\u2019 Forum","year":"2002","journal-title":"European Commission"},{"key":"cit0023","author":"European Privacy Officers\u2019 Forum","year":"2009","journal-title":"European Commission"},{"key":"cit0025","author":"Ferner J.","year":"2011","journal-title":"Ferner Legal"},{"key":"cit0026","author":"Fleischer P.","year":"2007","journal-title":"Peter Fleischer"},{"key":"cit0028","author":"Golding D.","year":"2006","journal-title":"Computer Weekly"},{"key":"cit0029","author":"Goralski W.","year":"2014","journal-title":"Juniper Networks"},{"key":"cit0030","author":"Google Statistics","year":"2017","journal-title":"Google"},{"key":"cit0036","author":"IP Location","year":"2015","journal-title":"IP Location"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2013.09.005"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2014.944730"},{"issue":"3","key":"cit0039","first-page":"681","volume":"4","author":"Lah F","year":"2008","journal-title":"ISJLP"},{"key":"cit0040","volume-title":"Code: version 2.0","author":"Lessig L.","year":"2006"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511763410"},{"key":"cit0042","author":"Mittman J. M.","year":"2008","journal-title":"Proskauer"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1207\/s15506878jobem4703_3"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1017\/S0020818308080041"},{"key":"cit0045","volume-title":"Privacy in context","author":"Nissenbaum H.","year":"2010"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"issue":"6","key":"cit0048","first-page":"1701","volume":"57","author":"Ohm P.","year":"2010","journal-title":"UCLA Law Review"},{"key":"cit0049","author":"Proboards","year":"2015","journal-title":"Proboards"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.2966\/scrip.040307.263"},{"issue":"7","key":"cit0052","first-page":"1966","volume":"126","author":"Schwartz P. M.","year":"2013","journal-title":"Harvard Law Review"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.1080\/13691180701858836"},{"key":"cit0054","author":"Tene O.","year":"2013","journal-title":"Yale Journal of Law & Technology"},{"key":"cit0055","author":"Time.lex","year":"2011","journal-title":"Time.lex."},{"key":"cit0056","author":"Triukose S.","year":"2012","journal-title":"Passive and Active Measurement Conference 2012"},{"key":"cit0057","author":"Tyson J.","year":"2001","journal-title":"HowStuffWorks.com"},{"key":"cit0058","author":"Vaughan-Nichols S. J.","year":"2011","journal-title":"ZDNET"},{"key":"cit0059","author":"W3Schools","year":"2015","journal-title":"W3Schools"},{"key":"cit0060","author":"Whitten A.","year":"2008","journal-title":"Google Public Policy Blog"},{"key":"cit0061","author":"Wikipedia","year":"2015","journal-title":"Wikipedia"},{"key":"cit0062","volume-title":"Autonomous Technology: Technics Out of Control as a Theme in Political Thought","author":"Winner L.","year":"1977"},{"key":"cit0063","author":"York D.","year":"2014","journal-title":"Internet Society"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2017.1294127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,6]],"date-time":"2017-04-06T20:10:58Z","timestamp":1491509458000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2017.1294127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,6]]},"references-count":47,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,4,6]]},"published-print":{"date-parts":[[2017,5,27]]}},"alternative-id":["10.1080\/01972243.2017.1294127"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2017.1294127","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,6]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}