{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T03:17:08Z","timestamp":1775099828236,"version":"3.50.1"},"reference-count":171,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"IHUB ANUBHUTI-IIITD FOUNDATION Doctoral Fellowship"},{"name":"IHUB-ANUBHUTI-IIITD FOUNDATION"},{"name":"Department of Science and Technology, India"},{"name":"Infosys Centre for Artificial Intelligence"},{"DOI":"10.13039\/100012913","name":"Tata Consultancy Services","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012913","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Affective Comput."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1109\/taffc.2023.3278230","type":"journal-article","created":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T18:42:59Z","timestamp":1684867379000},"page":"4-17","source":"Crossref","is-referenced-by-count":8,"title":["Opacity, Transparency, and the Ethics of Affective Computing"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2540-1356","authenticated-orcid":false,"given":"Manohar","family":"Kumar","sequence":"first","affiliation":[{"name":"Indraprastha Institute of Information Technology, New Delhi, Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8137-106X","authenticated-orcid":false,"given":"Aisha","family":"Aijaz","sequence":"additional","affiliation":[{"name":"Indraprastha Institute of Information Technology, New Delhi, Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2730-2646","authenticated-orcid":false,"given":"Omkar","family":"Chattar","sequence":"additional","affiliation":[{"name":"Indraprastha Institute of Information Technology, New Delhi, Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6526-0087","authenticated-orcid":false,"given":"Jainendra","family":"Shukla","sequence":"additional","affiliation":[{"name":"Indraprastha Institute of Information Technology, New Delhi, Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2421-3935","authenticated-orcid":false,"given":"Raghava","family":"Mutharaju","sequence":"additional","affiliation":[{"name":"Indraprastha Institute of Information Technology, New Delhi, Delhi, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2010.91"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1196\/annals.1382.016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0953-5438(01)00055-8"},{"key":"ref4","article-title":"Affective computing, emotional development, and autism","author":"Messinger","year":"2015","journal-title":"The Oxford Handbook Affect. Comput."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.rasd.2019.05.005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493502"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00052-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780199942237.013.006"},{"key":"ref9","article-title":"Evaluation of affective computing systems from a dimensional metaethical position","author":"Reynolds","year":"2005","journal-title":"Proc. First Augmented Cogn. Int. Conf."},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1140.001.0001","volume-title":"Affective Computing Cambridge","author":"Picard","year":"1997"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-801851-4.00009-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/985921.985999"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2012.2225458"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/00141844.2021.2007154"},{"issue":"2","key":"ref15","first-page":"75","article-title":"Disclosive ethics and information technology: Disclosing facial recognition systems","volume-title":"Ethics Inf. Technol.","volume":"7","author":"Introna","year":"2005"},{"key":"ref16","volume-title":"Being and Time","author":"Heidegger","year":"1967"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-018-0824-x"},{"key":"ref18","article-title":"A typology of privacy","volume":"38","author":"Koops","year":"2016","journal-title":"Univ. Pennsylvania J. Int. Law"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10699-010-9190-y"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/6115.001.0001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3998\/mpub.10257"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/0263276411427744"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5749\/j.ctv1hggkmv"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1108\/14779960480000246"},{"key":"ref25","volume-title":"Secrecy: On the Ethics of Concealment and Revelation","author":"Bok","year":"1982"},{"key":"ref26","article-title":"Technological opacity, predictability, and self-driving cars\u2019(2016)","volume":"38","author":"Surden","year":"2016","journal-title":"Cardozo Law Rev."},{"key":"ref27","article-title":"Surveillance as loss of obscurity","volume":"72","author":"Hartzog","year":"2015","journal-title":"Washington Lee Law Rev."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1111\/j.1088-4963.1998.tb00057.x"},{"key":"ref29","volume-title":"A Question of Trust: The BBC Reith Lectures 2002","author":"O\u2019neill","year":"2002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5040\/9781350030275.article-070"},{"key":"ref31","article-title":"Its all for your own good","author":"Waldron","year":"2014"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-90723-9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-017-0263-5"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32236-6_51"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/572260.572264"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1140.001.0001"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-8265-8_1243"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780199942237.001.0001"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1094-144"},{"key":"ref40","first-page":"417","article-title":"Positive affect and decision making","author":"Isen","year":"2000","journal-title":"Handbook of Emotions 2nd Ed."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0953-5438(01)00053-4"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/S0953-5438(01)00059-5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11097-015-9448-5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1093\/analys\/58.1.7"},{"issue":"4","key":"ref45","first-page":"275","article-title":"How emotion is made and measured","volume-title":"Int. J. Hum.-Comput. Stud.","volume":"65","author":"Boehner","year":"2007"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/6548.001.0001"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11031-018-9707-1"},{"key":"ref48","article-title":"Emotion","author":"Scarantino","year":"2021","journal-title":"The Stanford Encyclopedia of Philosophy"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-021-01290-1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0904_1"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2009.0142"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2009.0139"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2009.0190"},{"issue":"1","key":"ref55","first-page":"11","article-title":"What are people doing when they assign everyday emotion terms?","volume":"16","author":"Cowie","year":"2005","journal-title":"Psychol. Inquiry"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1177\/0266382120930866"},{"issue":"6","key":"ref57","first-page":"505","article-title":"Frown interpretation and perception: An investigation of the appearance of negative affect","volume":"48","author":"Richardson","year":"2019","journal-title":"Perception"},{"key":"ref58","article-title":"AI now 2019 report","author":"Crawford","year":"2019"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-021-00868-5"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1215\/08992363-9435427"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445939"},{"key":"ref62","volume-title":"How Emotions are Made: The Secret Life of the Brain","author":"Barrett","year":"2017"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1002\/0470013494.ch3"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1353\/pbm.2012.0031"},{"issue":"2","key":"ref65","first-page":"23","article-title":"Emotions as dynamic processes: A review of theory and research","volume":"8","author":"Vuong","year":"2019","journal-title":"Int. J. Res. Bus. Social Sci."},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.4135\/9781526451293"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-801851-4.00005-7"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1107622.1107644"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2016.08.027"},{"key":"ref70","article-title":"When tech knows you better than you know yourself","author":"Harari","year":"2018","journal-title":"Wired"},{"key":"ref71","article-title":"Neural networks allow us to \u2018read faces\u2019 in a new way","author":"Jacobs","year":"2018"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1515\/mult.1997.16.2-3.145"},{"key":"ref73","article-title":"How GPS weakens memory\u2014and what we can do about it","author":"Gonzalez-Franco","year":"2021"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01717"},{"key":"ref75","article-title":"How to beat A.I. in landing a job","author":"Ratner","year":"2020"},{"key":"ref76","article-title":"Are you prepared to be interviewed by an AI?","author":"Jaser","year":"2023","journal-title":"Harvard Bus. Rev."},{"issue":"1","key":"ref77","first-page":"122","article-title":"Where automated job interviews fall short","volume":"100","author":"Jaser","year":"2022","journal-title":"Harvard Bus. Rev."},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1515\/comp-2019-0020"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1080\/00236561003654776"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1080\/13691180802270386"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198237907.001.0001"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1086\/381696"},{"key":"ref83","first-page":"1","volume-title":"The Presentation of Self in Everyday Life","author":"Goffman","year":"1978"},{"key":"ref84","article-title":"What was authority?","volume":"1","author":"Arendt","year":"1958","journal-title":"NOMOS: Amer. Soc. Political Legal Philosophy"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.4337\/9781788972000.00011"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1111\/j.1088-4963.2003.00321.x"},{"issue":"1","key":"ref87","first-page":"58","article-title":"Manage your emotional culture","volume":"94","author":"Barsade","year":"2016","journal-title":"Harvard Bus. Rev."},{"key":"ref88","article-title":"13 the inherent dangers of unidirectional emotional bonds between humans and social robots","volume-title":"Robot Ethics: The Ethical and Social implications of robotics","author":"Scheutz","year":"2011"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2012.29"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2012.40"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s12369-013-0178-y"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12324"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/s00391-016-1066-5"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2021.654298"},{"key":"ref95","volume-title":"Feminist Morality: Transforming Culture, Society, and Politics","author":"Held","year":"1993"},{"key":"ref96","volume-title":"The Ethics of Care: Personal, Political, and Global","author":"Held","year":"2006"},{"key":"ref97","volume-title":"Caring: A Feminine Approach to Ethics and Moral Education","author":"Noddings","year":"1984"},{"key":"ref98","volume-title":"In A Different Voice: Psychological Theory and Womens Development","volume":"326","author":"Gilligan","year":"1982"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.4324\/9781003070672"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2018.00432"},{"key":"ref101","article-title":"The Ethics of Manipulation","volume-title":"The Stanford Encyclopedia of Philosophy","author":"Noggle","year":"2022"},{"key":"ref102","article-title":"Manipulatory politics","author":"Goodin","year":"1980"},{"key":"ref103","article-title":"What we owe to each other","author":"Scanlon","year":"1998"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314286"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199969104.001.0001"},{"issue":"4","key":"ref106","first-page":"995","article-title":"Digital market manipulation","volume":"82","author":"Calo","year":"2014"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.4324\/9781003320609-27"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1017\/9781316544846"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13226-1_10"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1080\/02699931.2010.550751"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-019-00087-2"},{"key":"ref112","article-title":"Facebook emotion study breached ethical guidelines, researchers say","volume":"30","author":"Arthur","year":"2014","journal-title":"The Guardian"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1057\/s41599-020-00550-7"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716666868"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3363560"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.4236\/psych.2016.71010"},{"key":"ref117","article-title":"The Ethics of AI and Emotional Intelligence","author":"Greene","year":"2020"},{"key":"ref118","article-title":"Mobile health apps leak sensitive data through APIs, report finds","author":"Horowitz","year":"2021"},{"key":"ref119","article-title":"Whistleblower: Facebook is misleading the public on progress against hate speech, violence, misinformation","author":"Pelley","year":"2021"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190056544.001.0001"},{"issue":"1","key":"ref121","doi-asserted-by":"crossref","first-page":"82","DOI":"10.18352\/ulr.420","article-title":"Online political microtargeting: Promises and threats for democracy","volume":"14","author":"Borgesius","year":"2018","journal-title":"Utrecht Law Rev."},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1186713"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.29173\/irie91"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780190622879.013.10"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55394-8_1"},{"key":"ref126","article-title":"Working with affective computing: Exploring uk public perceptions of ai enabled workplace surveillance","author":"Urquhart","year":"2022"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1177\/1350508405048578"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/s00420-018-1352-1"},{"issue":"3","key":"ref129","first-page":"671","article-title":"Alex rosenblat, uberland. how algorithms are rewriting the rules of work, oakland, university of california press, 2018, 272 pp","volume":"61","author":"Semi","year":"2020","journal-title":"Rassegna Ital. di Sociologia"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.3349\/ymj.2018.59.2.187"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1111\/jan.14236"},{"key":"ref132","article-title":"Gamified Life","author":"Gabrielle","year":"2018"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-018-9493-1"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvkjb25m"},{"key":"ref135","article-title":"Colleges mine data on their applicants","author":"Belkin","year":"2019"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.3021467"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/263593"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75479-6_36-1"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1002\/da.22730"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.9410"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/s10892-010-9095-6"},{"key":"ref142","article-title":"What is wrongful discrimination","volume":"43","author":"Arneson","year":"2006","journal-title":"San Diego Law Rev."},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.4159\/9780674043244"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2477899"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1177\/0967010614544204"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.4337\/9781849808774"},{"key":"ref147","article-title":"Facial analysis AI is being used in job interviews\u2013it will probably reinforce inequality","volume":"7","author":"Manokha","year":"2019","journal-title":"The Conversation"},{"key":"ref148","first-page":"241","article-title":"The forms of capital. cultural theory: An anthology","volume-title":"Handbook of Theory and Research for the Sociology of Education","author":"Bourdieu","year":"1986"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715622512"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-14981-6"},{"key":"ref151","doi-asserted-by":"crossref","DOI":"10.1007\/s00146-023-01634-z","article-title":"When facial recognition does not \u2018recognise\u2019: Erroneous identifications and resulting liabilities","volume-title":"AI & SOCIETY","author":"Raposo","year":"2023"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1140.001.0001"},{"key":"ref153","article-title":"Big techs trojan horse to win your trust","author":"Beard","year":"2020"},{"key":"ref154","article-title":"What is the Internet of Things","volume":"6","author":"Kobie","year":"2015","journal-title":"The Guardian"},{"key":"ref155","article-title":"AI should augment human intelligence, not replace it","author":"De Cremer","year":"2021","journal-title":"Harvard Bus. Rev."},{"key":"ref156","article-title":"Beware trading privacy for convenience","author":"Wang","year":"2013","journal-title":"Harvard Bus. Rev."},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/BF00383350"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1080\/00220485.2016.1252294"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv19fvzzk.69"},{"key":"ref160","volume-title":"The Morality of Freedom","author":"Raz","year":"1986"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1017\/S1477175612000280"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1093\/019924989x.003.0004"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1086\/233648"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49044-7_20"},{"key":"ref165","first-page":"130","article-title":"Visualizing the surveillance archive: Critical art and the dangers of transparency","author":"Monahan","year":"2020"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012456832336"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1093\/jlb\/lsac006"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.18574\/nyu\/9780814708965.001.0001"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1016\/S0272-4944(05)80199-9"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v8i2.2855"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-9498-9_2"},{"key":"ref172","article-title":"Privacy and Information Technology","author":"van den Hoven","year":"2020","journal-title":"The Stanford Encyclopedia of Philosophy"}],"container-title":["IEEE Transactions on Affective Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165369\/10454109\/10132379.pdf?arnumber=10132379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T23:35:48Z","timestamp":1729467348000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10132379\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":171,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/taffc.2023.3278230","relation":{},"ISSN":["1949-3045","2371-9850"],"issn-type":[{"value":"1949-3045","type":"electronic"},{"value":"2371-9850","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]}}}