{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:43:20Z","timestamp":1726760600363},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,6,28]],"date-time":"2016-06-28T00:00:00Z","timestamp":1467072000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s10676-016-9406-0","type":"journal-article","created":{"date-parts":[[2016,6,28]],"date-time":"2016-06-28T13:24:26Z","timestamp":1467120266000},"page":"199-210","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":86,"title":["Doxing: a conceptual analysis"],"prefix":"10.1007","volume":"18","author":[{"given":"David M.","family":"Douglas","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,28]]},"reference":[{"key":"9406_CR1","unstructured":"Beaujon, A. (2014). Redditors furious Newsweek \u2018doxxed\u2019 Bitcoin Founder. Poynter. http:\/\/www.poynter.org\/news\/mediawire\/242348\/redditors-furious-newsweek-outed-bitcoin-founder\/ ."},{"key":"9406_CR2","volume-title":"Secrets: On the ethics of concealment and revelation","author":"S Bok","year":"1989","unstructured":"Bok, S. (1989). Secrets: On the ethics of concealment and revelation. New York: Vintage Books."},{"issue":"4","key":"9406_CR3","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1016\/j.acalib.2006.03.005","volume":"32","author":"SL Bowers","year":"2006","unstructured":"Bowers, S. L. (2006). Privacy and library records. The Journal of Academic Librarianship, 32(4), 377\u2013383.","journal-title":"The Journal of Academic Librarianship"},{"key":"9406_CR4","doi-asserted-by":"crossref","unstructured":"Bowman-Grieve, L. (2009). Anti-abortion extremism online. First Monday 14(11). http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/2679 .","DOI":"10.5210\/fm.v14i11.2679"},{"key":"9406_CR5","unstructured":"Boyd, D. (2011). \u2018Real Names\u2019 policies are an abuse of power. Apophenia. http:\/\/www.zephoria.org\/thoughts\/archives\/2011\/08\/04\/real-names.html ."},{"key":"9406_CR6","unstructured":"Chen, A. (2012a). Unmasking Reddit\u2019s Violentacrez, the biggest troll on the web. Gawker. http:\/\/gawker.com\/5950981\/unmasking-reddits-violentacrez-the-biggest-troll-on-the-web ."},{"key":"9406_CR7","unstructured":"Chen, A. (2012b). Reddit\u2019s biggest troll fired from his real-world job; Reddit continues to censor Gawker articles. Gawker. http:\/\/gawker.com\/5951987\/reddits-biggest-troll-fired-from-his-real-world-job-reddit-continues-to-censor-gawker-articles ."},{"key":"9406_CR8","unstructured":"Chen, A. (2012c). Reddit troll Michael Brutsch defends himself on CNN: \u2018I treated Reddit as a game.\u2019 Gawker. http:\/\/gawker.com\/5953097\/reddit-troll-michael-brutsch-defends-himself-on-cnn-i-treated-reddit-as-a-game ."},{"issue":"1","key":"9406_CR9","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1080\/08838151.2014.999917","volume":"59","author":"S Chess","year":"2015","unstructured":"Chess, S., & Shaw, A. (2015). A conspiracy of fishes, or, how we learned to stop worrying about #GamerGate and embrace hegemonic masculinity. Journal of Broadcasting & Electronic Media, 59(1), 208\u2013220.","journal-title":"Journal of Broadcasting & Electronic Media"},{"key":"9406_CR10","doi-asserted-by":"crossref","DOI":"10.4159\/harvard.9780674735613","volume-title":"Hate crimes in cyberspace","author":"DK Citron","year":"2014","unstructured":"Citron, D. K. (2014). Hate crimes in cyberspace. Cambridge, MA: Harvard University Press."},{"key":"9406_CR11","first-page":"655","volume":"71","author":"MA Franks","year":"2012","unstructured":"Franks, M. A. (2012). sexual harassment 2.0. Maryland Law Review, 71, 655.","journal-title":"Maryland Law Review"},{"issue":"7","key":"9406_CR12","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1080\/1369118X.2013.836553","volume":"17","author":"L Gao","year":"2014","unstructured":"Gao, L., & Stanyer, J. (2014). Hunting corrupt officials online: The human flesh search engine and the search for justice in China. Information, Communication & Society, 17(7), 814\u2013829.","journal-title":"Information, Communication & Society"},{"issue":"3","key":"9406_CR13","doi-asserted-by":"crossref","first-page":"421","DOI":"10.2307\/795891","volume":"89","author":"R Gavison","year":"1980","unstructured":"Gavison, R. (1980). Privacy and the limits of law. The Yale Law Journal, 89(3), 421\u2013471.","journal-title":"The Yale Law Journal"},{"key":"9406_CR14","volume-title":"Bad pharma: How drug companies mislead doctors and harm patients","author":"Ben Goldacre","year":"2012","unstructured":"Goldacre, Ben. (2012). Bad pharma: How drug companies mislead doctors and harm patients. London: Fourth Estate."},{"key":"9406_CR15","unstructured":"Goodman, L. M. (2014). The face behind Bitcoin. Newsweek. http:\/\/www.newsweek.com\/2014\/03\/14\/face-behind-bitcoin-247957.html ."},{"key":"9406_CR16","unstructured":"Honan, M. (2014). What is doxing? Wired. http:\/\/www.wired.com\/2014\/03\/doxing\/ ."},{"key":"9406_CR17","unstructured":"Jouvenal, J. (2013). Stalkers use online ads as weapon against victims. The Washington Post. http:\/\/www.washingtonpost.com\/local\/i-live-in-fear-of-anyone-coming-to-my-door\/2013\/07\/14\/26c11442-e359-11e2-aef3-339619eab080_story.html ."},{"issue":"5","key":"9406_CR18","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.2307\/3312652","volume":"144","author":"S Levmore","year":"1996","unstructured":"Levmore, S. (1996). The anonymity tool. University of Pennsylvania Law Review, 144(5), 2191\u20132236.","journal-title":"University of Pennsylvania Law Review"},{"key":"9406_CR19","first-page":"127","volume":"36","author":"MG Manning","year":"2012","unstructured":"Manning, M. G. (2012). A tale of three hoaxes: When literature offends the law. Columbia Journal of Law & the Arts, 36, 127\u2013156.","journal-title":"Columbia Journal of Law & the Arts"},{"key":"9406_CR20","doi-asserted-by":"crossref","DOI":"10.5040\/9798400656026","volume-title":"Gendertrolling: How misogyny went viral","author":"Karla Mantilla","year":"2015","unstructured":"Mantilla, Karla. (2015). Gendertrolling: How misogyny went viral. Santa Barbara, CA: Praeger."},{"issue":"2","key":"9406_CR21","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1080\/019722499128565","volume":"15","author":"GT Marx","year":"1999","unstructured":"Marx, G. T. (1999). What\u2019s in a name? Some reflections on the sociology of anonymity. The Information Society, 15(2), 99\u2013112.","journal-title":"The Information Society"},{"key":"9406_CR22","unstructured":"Mattise, N. (2015). Anti-doxing strategy\u2014Or, How to Avoid 50 Qurans and $287 of Chick-Fil-A. Ars Technica. http:\/\/arstechnica.com\/security\/2015\/03\/anti-doxing-strategy-or-how-to-avoid-50-qurans-and-287-of-chick-fil-a\/ ."},{"key":"9406_CR23","unstructured":"Mill, J. S. (1989). On liberty and other writings. Edited by Stefan Collini. Cambridge: Cambridge University Press [1859]."},{"key":"9406_CR37","unstructured":"Nakamoto, S. (n.d.). Bitcoin: A peer-to-peer electronic cash system. Bitcoin. https:\/\/bitcoin.org\/bitcoin.pdf ."},{"issue":"2","key":"9406_CR24","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1080\/08989620590957175","volume":"12","author":"S Ngai","year":"2005","unstructured":"Ngai, S., Gold, J. L., Gill, S. S., & Rochon, P. A. (2005). Haunted manuscripts: Ghost authorship in the medical literature. Accountability in Research, 12(2), 103\u2013114.","journal-title":"Accountability in Research"},{"key":"9406_CR25","first-page":"68","volume-title":"The offensive internet: Speech, privacy, and reputation","author":"MC Nussbaum","year":"2010","unstructured":"Nussbaum, M. C. (2010). Objectification and internet misogyny. In S. Levmore & M. C. Nussbaum (Eds.), The offensive internet: Speech, privacy, and reputation (pp. 68\u201387). Cambridge, MA: Harvard University Press."},{"key":"9406_CR26","unstructured":"Ockenden, W., & Leslie, T. (2015). \u2018Scarily accurate\u2019: What you found in our reporter\u2019s metadata. ABC News. http:\/\/www.abc.net.au\/news\/2015-08-24\/metadata-what-you-found-will-ockenden\/6703626 ."},{"key":"9406_CR27","unstructured":"Phillips, W. (2012). What an academic who wrote her dissertation on trolls thinks of Violentacrez. The Atlantic. http:\/\/www.theatlantic.com\/technology\/archive\/2012\/10\/what-an-academic-who-wrote-her-dissertation-on-trolls-thinks-of-violentacrez\/263631\/ ."},{"key":"9406_CR28","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/10288.001.0001","volume-title":"This is why we can\u2019t have nice things: Mapping the relationship between online trolling and mainstream culture","author":"Whitney Phillips","year":"2015","unstructured":"Phillips, Whitney. (2015). This is why we can\u2019t have nice things: Mapping the relationship between online trolling and mainstream culture. Cambridge, MA: The MIT Press."},{"key":"9406_CR29","first-page":"221","volume":"48","author":"E Poole","year":"2013","unstructured":"Poole, E. (2013). Hey girls, did you know: Slut-shaming on the internet needs to stop. University of San Francisco Law Review, 48, 221\u2013260.","journal-title":"University of San Francisco Law Review"},{"issue":"3","key":"9406_CR30","doi-asserted-by":"crossref","first-page":"293","DOI":"10.2307\/1316905","volume":"4","author":"PL Reichel","year":"1977","unstructured":"Reichel, P. L. (1977). Dossier building as a social problem topic. Teaching Sociology, 4(3), 293\u2013306.","journal-title":"Teaching Sociology"},{"key":"9406_CR31","unstructured":"Reynolds, E. (2016) Revenge porn: There\u2019s no \u2018silver bullet\u2019 for ending non-consensual pornography. Wired UK. http:\/\/www.wired.co.uk\/news\/archive\/2016-03\/08\/revenge-porn-facebook-social-media ."},{"issue":"8","key":"9406_CR32","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1145\/257874.257896","volume":"40","author":"TC Rindfleisch","year":"1997","unstructured":"Rindfleisch, T. C. (1997). Privacy, information technology, and health care. Communications of the ACM, 40(8), 92\u2013100.","journal-title":"Communications of the ACM"},{"key":"9406_CR33","volume-title":"The future of reputation: Gossip, rumor, and privacy on the internet","author":"DJ Solove","year":"2007","unstructured":"Solove, D. J. (2007). The future of reputation: Gossip, rumor, and privacy on the internet. London: Yale University Press."},{"key":"9406_CR34","doi-asserted-by":"publisher","unstructured":"Trottier, D. (2016). Digital vigilantism as weaponisation of visibility. Philosophy & Technology, 1\u201318. doi: 10.1007\/s13347-016-0216-4 .","DOI":"10.1007\/s13347-016-0216-4"},{"issue":"7","key":"9406_CR35","first-page":"1596","volume":"123","author":"J Waldron","year":"2010","unstructured":"Waldron, J. (2010). Dignity and Defamation: The Visibility of Hate. Harvard Law Review, 123(7), 1596\u20131657.","journal-title":"Harvard Law Review"},{"key":"9406_CR36","doi-asserted-by":"crossref","unstructured":"Webb, L. M. (2015). Shame transfigured: Slut-shaming from Rome to cyberspace. First Monday, 20(4). http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/5464 .","DOI":"10.5210\/fm.v20i4.5464"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-016-9406-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T23:31:48Z","timestamp":1718667108000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-016-9406-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,28]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["9406"],"URL":"https:\/\/doi.org\/10.1007\/s10676-016-9406-0","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,28]]}}}