{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T16:49:36Z","timestamp":1776790176291,"version":"3.51.2"},"reference-count":0,"publisher":"Oxford University Press (OUP)","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/pages\/standard-publication-reuse-rights"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,22]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The Federal Trade Commission (FTC) requires tech giants to identify and remove apps from their platforms that use deceitful sales tactics or violate user privacy. Tech giants have often resisted FTC orders because policing diminishes their profits. But while some firms have eventually complied with FTC demands, other firms have continued to shirk enforcement at the risk of escalating fines. What accounts for these different responses? Examining Apple, Google and Facebook, we find that tech giants willingly police consumer fraud but not consumer privacy violations. Failures to police fraud have led to public complaints and negative press attention, while failures to police data breaches often go undetected by users, the media and thus the FTC. We conclude that tech giants can act as effective regulatory agents on the government's behalf, but only when they police activities they cannot conceal.<\/jats:p>","DOI":"10.1093\/ijlit\/eaac011","type":"journal-article","created":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T16:08:34Z","timestamp":1662653314000},"page":"115-134","source":"Crossref","is-referenced-by-count":3,"title":["Fox in the henhouse: The delegation of regulatory and privacy enforcement to big tech"],"prefix":"10.1093","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4259-843X","authenticated-orcid":false,"given":"William","family":"Bendix","sequence":"first","affiliation":[{"name":"Assistant Professor, Cyber Leadership and Intelligence, Dakota State University , Madison, SD , United States"}]},{"given":"Jon","family":"MacKay","sequence":"additional","affiliation":[{"name":"Lecturer, Information Systems and Operations Management, Faculty of Business and Economics, The University of Auckland , Auckland , New Zealand"}]}],"member":"286","published-online":{"date-parts":[[2022,9,8]]},"container-title":["International Journal of Law and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/ijlit\/article-pdf\/30\/2\/115\/47186366\/eaac011.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/ijlit\/article-pdf\/30\/2\/115\/47186366\/eaac011.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T11:19:30Z","timestamp":1669115970000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/ijlit\/article\/30\/2\/115\/6694151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,1]]},"references-count":0,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,9,8]]},"published-print":{"date-parts":[[2022,11,22]]}},"URL":"https:\/\/doi.org\/10.1093\/ijlit\/eaac011","relation":{},"ISSN":["0967-0769","1464-3693"],"issn-type":[{"value":"0967-0769","type":"print"},{"value":"1464-3693","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2022,6,1]]},"published":{"date-parts":[[2022,6,1]]}}}