{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T10:11:04Z","timestamp":1695809464975},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,11,20]],"date-time":"2009-11-20T00:00:00Z","timestamp":1258675200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s11948-009-9187-5","type":"journal-article","created":{"date-parts":[[2009,11,19]],"date-time":"2009-11-19T12:19:46Z","timestamp":1258633186000},"page":"31-43","source":"Crossref","is-referenced-by-count":12,"title":["Parallel, Embedded or Just Part of the Team: Ethicists Cooperating Within a European Security Research Project"],"prefix":"10.1007","volume":"17","author":[{"given":"A.","family":"van Gorp","sequence":"first","affiliation":[]},{"given":"S.","family":"van der Molen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,11,20]]},"reference":[{"key":"9187_CR1","volume-title":"The ethics of technological risks","author":"L Asveld","year":"2008","unstructured":"Asveld, L., & en Roeser, S. (2008). The ethics of technological risks. London: Earthscan Publishers."},{"key":"9187_CR19","unstructured":"Bakker, F., De Graaf, H., De Haas, S., Kedde, H., Kruijer, H., & Wijsen, C. (2009). Sexuele gezondheid in Nederland, Rutgers Nisso groep, Nederland, http:\/\/www.rutgersnissogroep.nl ."},{"key":"9187_CR2","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/s10677-007-9071-9","volume":"10","author":"M Cholbi","year":"2007","unstructured":"Cholbi, M. (2007). Moral expertise and the credential problem. Ethical Theory and Moral Practice, 10, 323\u2013334.","journal-title":"Ethical Theory and Moral Practice"},{"key":"9187_CR3","volume-title":"The power of knowledge; ethical, legal, and technological aspects of data mining and group profiling in epidemiology","author":"BHM Custers","year":"2004","unstructured":"Custers, B. H. M. (2004). The power of knowledge; ethical, legal, and technological aspects of data mining and group profiling in epidemiology. Tilburg: Wolf Legal Publishers."},{"key":"9187_CR4","unstructured":"European Data Protection Directive 95\/46\/EC. (1995)."},{"key":"9187_CR5","unstructured":"Krumpal, I., Rauhut, H., B\u00f6hr, D., Naumann, E. (2008). How likely is \u201clikely\u201d? Subjective perception and communication of victimization probabilities. In Proceedings of the 7th International Conference on Social Science Methodology, Naples (pp. 1\u201319), Sept 1\u20135."},{"key":"9187_CR6","first-page":"119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 119\u2013157.","journal-title":"Washington Law Review"},{"key":"9187_CR7","volume-title":"The spiral of silence\u2014public opinion, our social skin","author":"E Noelle-Neumann","year":"1993","unstructured":"Noelle-Neumann, E. (1993). The spiral of silence\u2014public opinion, our social skin. Chicago: University of Chicago Press."},{"key":"9187_CR8","doi-asserted-by":"crossref","first-page":"115","DOI":"10.2307\/3327906","volume":"32","author":"P Singer","year":"1972","unstructured":"Singer, P. (1972). Moral experts. Analysis, 32, 115\u2013117.","journal-title":"Analysis"},{"key":"9187_CR9","volume-title":"Public appearances\/private realities: The psychology of self-monitoring","author":"M Snyder","year":"1987","unstructured":"Snyder, M. (1987). Public appearances\/private realities: The psychology of self-monitoring. New York: W.H. Freeman and Co."},{"key":"9187_CR10","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s11948-008-9079-0","volume":"15","author":"S Burg Van der","year":"2008","unstructured":"Van der Burg, S. (2008). Imagining the future of photoacoustic mammography. Science and Engineering Ethics, 15, 97\u2013110.","journal-title":"Science and Engineering Ethics"},{"key":"9187_CR11","unstructured":"Van Gorp, A. (2009). Ethics in and during technological research; an addition to ICT ethics and science ethics. In M. Duewel & P. Sollie (Eds.), Evaluating new technologies. Dordrecht: Springer."},{"issue":"3","key":"9187_CR12","doi-asserted-by":"crossref","first-page":"437","DOI":"10.2143\/EPN.18.3.2033208","volume":"18","author":"P Tongeren Van","year":"2008","unstructured":"Van Tongeren, P. (2008). Schaamte. Ethische perspectieven, 18(3), 437\u2013450.","journal-title":"Ethische perspectieven"},{"key":"9187_CR13","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s11948-007-9033-6","volume":"14","author":"J Varelius","year":"2008","unstructured":"Varelius, J. (2008). Ethics consultation and autonomy. Science and Engineering Ethics, 14, 65\u201376.","journal-title":"Science and Engineering Ethics"},{"key":"9187_CR14","first-page":"462","volume-title":"Readings in cyberethics","author":"A Vedder","year":"2004","unstructured":"Vedder, A. (2004). KDD, privacy individuality and fairness. In R. Spinello & H. Tavani (Eds.), Readings in cyberethics (2nd ed., pp. 462\u2013470). Sudbury, MA: Jones and Bartlett Publishers.","edition":"2"},{"key":"9187_CR15","unstructured":"Vedder, A., & Custers, B. (2009). Whose responsibility is it anyway? Dealing with the consequences of new technologies. In M. Duewel & P. Sollie (Eds.), Evaluating new technologies. Dordrecht: Springer."},{"key":"9187_CR16","unstructured":"Wittebrood, K. (2006). Slachtoffers van criminaliteit; feiten en achtergronden. Den Haag: Sociaal en Cultureel Planbureau."},{"key":"9187_CR17","unstructured":"http:\/\/www.cpsi-fp7.eu ."},{"key":"9187_CR18","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1007\/s11948-006-0063-2","volume":"12","author":"S Zwart","year":"2006","unstructured":"Zwart, S., Van de Poel, I., Van Mil, H., & Brumsen, M. (2006). A network approach for distinguishing ethical issues in research and development. Science and Engineering Ethics, 12, 663\u2013684.","journal-title":"Science and Engineering Ethics"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-009-9187-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-009-9187-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-009-9187-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T21:10:27Z","timestamp":1559423427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-009-9187-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,20]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["9187"],"URL":"https:\/\/doi.org\/10.1007\/s11948-009-9187-5","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,11,20]]}}}