{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:11:30Z","timestamp":1773922290977,"version":"3.50.1"},"reference-count":48,"publisher":"Informa UK Limited","issue":"5","license":[{"start":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T00:00:00Z","timestamp":1506988800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2017,10,20]]},"DOI":"10.1080\/01972243.2017.1354108","type":"journal-article","created":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T15:16:21Z","timestamp":1507043781000},"page":"271-281","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":9,"title":["Beyond individual-centric privacy: Information technology in social systems"],"prefix":"10.1080","volume":"33","author":[{"given":"Wolter","family":"Pieters","sequence":"first","affiliation":[{"name":"Faculty of Technology, Policy and Management, Delft University of Technology, Delft, The Netherlands"}]}],"member":"301","published-online":{"date-parts":[[2017,10,3]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(00)00074-6"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1177\/0001699305053769"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1177\/1354856507084416"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-015-9380-y"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1353\/lar.2004.0022"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.02.002"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2011.942309"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010018611096"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-0001-7"},{"key":"cit0013","first-page":"55","volume-title":"Early engagement and new technologies: Opening up the laboratory","author":"Friedman B.","year":"2014"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.so.12.080186.002315"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-011-9284-4"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1080\/01972241003712215"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1007\/BF02687078"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1007\/s12130-010-9108-6"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-010-9224-8"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.79.6.995"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03829-7_4"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2014.944730"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSOC.2010.036944"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1504\/IJSD.2005.007375"},{"key":"cit0029","volume-title":"Social systems","author":"Luhmann N.","year":"1995"},{"key":"cit0030","volume-title":"Trust and power: Two works by Niklas Luhmann","author":"Luhmann N.","year":"1979"},{"key":"cit0031","first-page":"94","volume-title":"Trust: Making and breaking cooperative relations","author":"Luhmann N.","year":"1988"},{"key":"cit0032","volume-title":"Risk: A sociological theory","author":"Luhmann N.","year":"2005"},{"key":"cit0033","doi-asserted-by":"crossref","DOI":"10.1515\/9781685850906","volume-title":"Knowledge power: Intellectual property, information, and privacy","author":"Marlin-Bennett R.","year":"2004"},{"key":"cit0034","volume-title":"Social sustainability: Towards some definitions","author":"McKenzie S.","year":"2004"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(95)00009-6"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.1177\/0894439305275852"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.2307\/2143109"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04135-8_11"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-010-9253-3"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.5840\/techne201014321"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2011.607038"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-015-9648-y"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.24.1.1"},{"key":"cit0046","first-page":"647","volume":"41","author":"Post R. C.","year":"1990","journal-title":"Case Western Reserve Law Review"},{"issue":"2","key":"cit0047","first-page":"15","volume":"17","author":"Rosen C.","year":"2007","journal-title":"New Atlantis: A Journal of Technology and Society"},{"key":"cit0048","first-page":"1525","volume":"80","author":"Rosen J.","year":"2011","journal-title":"Fordham Law Review"},{"issue":"2","key":"cit0049","first-page":"171","volume":"16","author":"Schermer B. W.","year":"2014","journal-title":"Ethics and Information Technology"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-010-9262-2"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72381-5_8"},{"key":"cit0053","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1017\/CBO9780511498725.016","volume-title":"Information technology and moral philosophy","author":"Van den Hoven J.","year":"2008"},{"key":"cit0054","doi-asserted-by":"crossref","DOI":"10.5325\/j.ctv14gp4w7","volume-title":"What things do: Philosophical reflections on technology, agency, and design","author":"Verbeek P.-P.","year":"2005"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00306"},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1093\/oep\/gpq006"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2013.825687"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2017.1354108","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2017.1354108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T22:05:00Z","timestamp":1659564300000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2017.1354108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,3]]},"references-count":48,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2017,10,3]]},"published-print":{"date-parts":[[2017,10,20]]}},"alternative-id":["10.1080\/01972243.2017.1354108"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2017.1354108","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}