{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:09:21Z","timestamp":1726848561809},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s11948-014-9621-1","type":"journal-article","created":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T07:56:18Z","timestamp":1420012578000},"page":"1-29","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":88,"title":["The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy"],"prefix":"10.1007","volume":"22","author":[{"given":"Fiachra","family":"O\u2019Brolch\u00e1in","sequence":"first","affiliation":[]},{"given":"Tim","family":"Jacquemard","sequence":"additional","affiliation":[]},{"given":"David","family":"Monaghan","sequence":"additional","affiliation":[]},{"given":"Noel","family":"O\u2019Connor","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Novitzky","sequence":"additional","affiliation":[]},{"given":"Bert","family":"Gordijn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,1]]},"reference":[{"key":"9621_CR1","unstructured":"Allen, A. (2011). Privacy and medicine. In E. N. Zalta (Ed.), The Stanford encyclopedia of philosophy (Spring 2011). Retrieved from http:\/\/plato.stanford.edu\/archives\/spr2011\/entries\/privacy-medicine\/"},{"issue":"2","key":"9621_CR2","doi-asserted-by":"crossref","first-page":"501","DOI":"10.2466\/02.09.18.PR0.110.2.501-517","volume":"110","author":"CS Andreassen","year":"2012","unstructured":"Andreassen, C. S., Torsheim, T., Brunborg, G. S., & Pallesen, S. (2012). Development of a Facebook addiction scale. Psychological Reports, 110(2), 501\u2013517. doi: 10.2466\/02.09.18.PR0.110.2.501-517 .","journal-title":"Psychological Reports"},{"key":"9621_CR3","unstructured":"arXiv, E. T. F. (2012). Evidence emerges that Iran is building its own hidden internet. Retrieved March 31, 2014 from http:\/\/www.technologyreview.com\/view\/429447\/evidence-emerges-that-iran-is-building-its-own-hidden-internet\/"},{"key":"9621_CR4","unstructured":"Barrett, D. (2013). One surveillance camera for every 11 people in Britain, says CCTV survey. Retrieved from http:\/\/www.telegraph.co.uk\/technology\/10172298\/One-surveillance-camera-for-every-11-people-in-Britain-says-CCTV-survey.html"},{"key":"9621_CR5","unstructured":"BBC News. (2012). Facebook party invite sparks riot in Haren, Netherlands. Retrieved March 31, 2014 from http:\/\/www.bbc.co.uk\/news\/world-europe-19684708"},{"key":"9621_CR6","unstructured":"BBC News. (2014a). Facebook attacked for emotion study. Retrieved June 30, 2014 from http:\/\/www.bbc.com\/news\/technology-28051930"},{"key":"9621_CR7","unstructured":"BBC News. (2014b). Turkey \u201cblocks YouTube access.\u201d Retrieved March 27, 2014 from http:\/\/www.bbc.com\/news\/world-europe-26773702"},{"key":"9621_CR8","unstructured":"Behavioural Insights Team. (2014). Retrieved February 26, 2014 from https:\/\/www.gov.uk\/government\/organisations\/behavioural-insights-team"},{"key":"9621_CR9","volume-title":"The panopticon writings","author":"J Bentham","year":"1995","unstructured":"Bentham, J. (1995). The panopticon writings. London: Verso."},{"issue":"3","key":"9621_CR10","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1080\/87568225.2011.581922","volume":"25","author":"I Birky","year":"2011","unstructured":"Birky, I., & Collins, W. (2011). Facebook: Maintaining ethical practice in the cyberspace age. Journal of College Student Psychotherapy, 25(3), 193\u2013203.","journal-title":"Journal of College Student Psychotherapy"},{"issue":"1","key":"9621_CR11","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010069907461","volume":"1","author":"P Brey","year":"1999","unstructured":"Brey, P. (1999). The ethics of representation and action in virtual reality. Ethics and Information Technology, 1(1), 5\u201314. doi: 10.1023\/A:1010069907461","journal-title":"Ethics and Information Technology"},{"key":"9621_CR12","doi-asserted-by":"crossref","unstructured":"Brey, P., & S\u00f8raker, J. H. (2009). Philosophy of computing and information technology. In M. Anthonie (Ed.), Philosophy of technology and engineering sciences (pp. 1341\u20131407). Amsterdam: North-Holland. Retrieved from http:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780444516671500513","DOI":"10.1016\/B978-0-444-51667-1.50051-3"},{"key":"9621_CR13","unstructured":"Buss, S. (2008). Personal Autonomy. In E. N. Zalta (Ed.), The Stanford encyclopedia of philosophy (Fall 2008). Retrieved from http:\/\/plato.stanford.edu\/archives\/fall2008\/entries\/personal-autonomy\/"},{"key":"9621_CR14","unstructured":"Cadwalladr, C. (2014). Charlotte Laws\u2019 fight with Hunter Moore, the internet\u2019s revenge porn king. The Guardian. Retrieved from http:\/\/www.theguardian.com\/culture\/2014\/mar\/30\/charlotte-laws-fight-with-internet-revenge-porn-king"},{"key":"9621_CR15","unstructured":"Cameron, D. (2014). CeBIT 2014: David Cameron\u2019s speech\u2014Speeches\u2014GOV.UK. Retrieved April 10, 2014 from https:\/\/www.gov.uk\/government\/speeches\/cebit-2014-david-camerons-speech"},{"key":"9621_CR16","volume-title":"The shallows: How the internet is changing the way we think, read and remember","author":"N Carr","year":"2010","unstructured":"Carr, N. (2010). The shallows: How the internet is changing the way we think, read and remember. London: Atlantic Books."},{"key":"9621_CR17","unstructured":"Cellan-Jones, R. (2014). Facebook buys the future. Retrieved March 27, 2014 from http:\/\/www.bbc.com\/news\/technology-26746694"},{"key":"9621_CR18","doi-asserted-by":"crossref","unstructured":"Coll, S., Glassey, O., & Balleys, C. (2011). Building social networks ethics beyond \"privacy\": A sociological perspective. International Review of Information Ethics, 16, 47\u201353.","DOI":"10.29173\/irie202"},{"key":"9621_CR19","unstructured":"Commission, E. (2012). Proposal for a regulation of the European Parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (general data protection regulation). European Commission. Retrieved from http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=COM:2012:0011:FIN:EN:PDF"},{"key":"9621_CR20","unstructured":"Correa, C. (2013). Why video games are more addictive and bigger than movies will ever be. Retrieved Feb 23, 2014 from http:\/\/www.forbes.com\/sites\/christophercorrea\/2013\/04\/11\/why-video-games-are-addictive-and-bigger-than-movies-will-ever-be\/"},{"issue":"1","key":"9621_CR21","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/0160-791X(95)00023-K","volume":"18","author":"M Cranford","year":"1996","unstructured":"Cranford, M. (1996). The social trajectory of virtual reality: Substantive ethics in a world without constraints. Technology in Society, 18(1), 79\u201392. doi: 10.1016\/0160-791X(95)00023-K","journal-title":"Technology in Society"},{"issue":"2","key":"9621_CR22","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.1468-2885.2011.01378.x","volume":"21","author":"RE Dubrofsky","year":"2011","unstructured":"Dubrofsky, R. E. (2011). Surveillance on reality television and Facebook: From authenticity to flowing data. Communication Theory, 21(2), 111\u2013129.","journal-title":"Communication Theory"},{"key":"9621_CR23","unstructured":"Duhigg, C. (2012). How companies learn your secrets. The New York Times. New York. Retrieved from http:\/\/www.nytimes.com\/2012\/02\/19\/magazine\/shopping-habits.html?pagewanted=all&_r=0"},{"key":"9621_CR24","unstructured":"Eichenwald, K. (2013). Facebook leans. In Vanity fair (May). Retrieved from http:\/\/www.vanityfair.com\/business\/2013\/05\/facebook-future-mark-zuckerberg-sheryl-sandberg"},{"key":"9621_CR25","unstructured":"Expected Results-REVERIE. (2014). Retrieved from http:\/\/www.reveriefp7.eu\/project\/expected-results\/"},{"key":"9621_CR26","unstructured":"Facebook Newsroom. (2014). Company Info|Facebook newsroom. Retrieved from http:\/\/newsroom.fb.com\/company-info\/"},{"issue":"2","key":"9621_CR27","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1023\/A:1011846009390","volume":"3","author":"P Ford","year":"2001","unstructured":"Ford, P. (2001). A further analysis of the ethics of representation in virtual reality: Multi-user environments. Ethics and Information Technology, 3(2), 113\u2013121.","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9621_CR28","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s00146-007-0145-y","volume":"22","author":"S Gill","year":"2008","unstructured":"Gill, S. (2008). Socio-ethics of interaction with intelligent interactive technologies. Ai & Society, 22(3), 283\u2013300. doi: 10.1007\/s00146-007-0145-y","journal-title":"Ai & Society"},{"issue":"1","key":"9621_CR29","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2143\/EP.17.1.2046957","volume":"17","author":"G Gooskens","year":"2010","unstructured":"Gooskens, G. (2010). The ethical status of virtual actions. Ethical Perspectives: Journal of the European Ethics Network, 17(1), 59\u201378.","journal-title":"Ethical Perspectives: Journal of the European Ethics Network"},{"issue":"4","key":"9621_CR30","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s10796-009-9204-x","volume":"12","author":"D Gotterbarn","year":"2010","unstructured":"Gotterbarn, D. (2010). The ethics of video games: Mayhem, death, and the training of the next generation. Information Systems Frontiers, 12(4), 369\u2013377. doi: 10.1007\/s10796-009-9204-x","journal-title":"Information Systems Frontiers"},{"key":"9621_CR31","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199238781.001.0001","volume-title":"On human rights","author":"J Griffin","year":"2008","unstructured":"Griffin, J. (2008). On human rights. Oxford: Oxford University Press."},{"key":"9621_CR32","volume-title":"Brave new world","author":"A Huxley","year":"2013","unstructured":"Huxley, A. (2013). Brave new world. London: Everymans."},{"key":"9621_CR33","unstructured":"Internet of Things: The Future of Business Technology|Microsoft. (2014). Retrieved July 23, 2014 from http:\/\/www.microsoft.com\/windowsembedded\/en-us\/internet-of-things.aspx"},{"issue":"1","key":"9621_CR34","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s10676-009-9182-1","volume":"11","author":"M Johansson","year":"2009","unstructured":"Johansson, M. (2009). Why unreal punishments in response to unreal crimes might actually be a really good thing. Ethics and Information Technology, 11(1), 71\u201379.","journal-title":"Ethics and Information Technology"},{"key":"9621_CR35","unstructured":"Karmali, L. (2013). World of Warcraft down to 7.7 million subscribers. Retrieved April 22, 2014 from http:\/\/ie.ign.com\/articles\/2013\/07\/26\/world-of-warcraft-down-to-77-million-subscribers"},{"key":"9621_CR36","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s10672-010-9149-8","volume":"23","author":"G Kaupins","year":"2011","unstructured":"Kaupins, G., & Park, S. (2011). Legal and ethical implications of corporate social networks. Employee Responsibilities and Rights Journal, 23, 83\u201399.","journal-title":"Employee Responsibilities and Rights Journal"},{"issue":"15","key":"9621_CR37","doi-asserted-by":"crossref","first-page":"5802","DOI":"10.1073\/pnas.1218772110","volume":"110","author":"M Kosinski","year":"2013","unstructured":"Kosinski, M., Stillwell, D., & Graepel, T. (2013). Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences, 110(15), 5802\u20135805. doi: 10.1073\/pnas.1218772110","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"24","key":"9621_CR38","first-page":"201412469","volume":"111","author":"ADI Kramer","year":"2014","unstructured":"Kramer, A. D. I., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massivescale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111(24), 201412469. doi: 10.1073\/pnas.1320040111","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"4","key":"9621_CR39","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1108\/09593841011087770","volume":"23","author":"B Light","year":"2010","unstructured":"Light, B., & McGrath, K. (2010). Ethics and social networking sites: A disclosive analysis of Facebook. Information Technology & People, 23(4), 290\u2013311. doi: 10.1108\/09593841011087770","journal-title":"Information Technology & People"},{"key":"9621_CR40","unstructured":"Locke, J. (1689). The second treatise of government (3rd ed.). Oxford: Blackwell."},{"key":"9621_CR41","unstructured":"Lory, B. (2010). Using Facebook to assess candidates during the recruiting process: Ethical implications. NACE Knowledge Centre."},{"key":"9621_CR42","volume-title":"On liberty","author":"JS Mill","year":"1859","unstructured":"Mill, J. S. (1859). On liberty. London: Penguin."},{"key":"9621_CR44","unstructured":"Morozov, E. (2013). How Facebook could get you arrested. The Guardian. Retrieved from http:\/\/www.guardian.co.uk\/technology\/2013\/mar\/09\/facebook-arrested-evgeny-morozov-extract"},{"issue":"4","key":"9621_CR45","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1007\/s11422-012-9444-9","volume":"7","author":"YJ Mu\u00f1oz","year":"2012","unstructured":"Mu\u00f1oz, Y. J., & El-Hani, C. N. (2012). The student with a thousand faces: From the ethics in video games to becoming a citizen. Cultural Studies of Science Education, 7(4), 909\u2013943. doi: 10.1007\/s11422-012-9444-9","journal-title":"Cultural Studies of Science Education"},{"key":"9621_CR46","unstructured":"Newitz, A. (2014). Is second life about to become a ghost world? Retrieved June 26, 2014 from http:\/\/io9.com\/is-second-life-about-to-become-a-ghost-world-1594324051"},{"issue":"5\u20136","key":"9621_CR47","first-page":"559","volume":"17","author":"H Nissenbaum","year":"1998","unstructured":"Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17(5\u20136), 559\u2013596.","journal-title":"Law and Philosophy"},{"key":"9621_CR48","volume-title":"Anarchy, state and utopia","author":"Robert Nozick","year":"1974","unstructured":"Nozick, Robert. (1974). Anarchy, state and utopia. Oxford: Blackwell."},{"key":"9621_CR49","unstructured":"O\u2019Dwyer, D. (2014). Why Facebook founder had to buy WhatsApp. Retrieved July 23, 2014 from http:\/\/www.irishtimes.com\/news\/technology\/gadgets\/why-facebook-founder-had-to-buy-whatsapp-1.1700459"},{"key":"9621_CR50","unstructured":"Objectives-REVERIE. (2014). Retrieved from http:\/\/www.reveriefp7.eu\/project\/objectives\/"},{"key":"9621_CR51","unstructured":"Orwell, G. (2013). 1984. London: Penguin."},{"issue":"5","key":"9621_CR52","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1016\/j.techfore.2007.04.007","volume":"75","author":"S Papagiannidis","year":"2008","unstructured":"Papagiannidis, S., Bourlakis, M., & Li, F. (2008). Making real money in virtual worlds: MMORPGs and emerging business opportunities, challenges and ethical implications in metaverses. Technological Forecasting and Social Change, 75(5), 610\u2013622. doi: 10.1016\/j.techfore.2007.04.007","journal-title":"Technological Forecasting and Social Change"},{"key":"9621_CR53","volume-title":"The filter bubble: What the internet is hiding from you","author":"E Pariser","year":"2011","unstructured":"Pariser, E. (2011). The filter bubble: What the internet is hiding from you. London: Penguin."},{"issue":"1","key":"9621_CR54","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10676-008-9153-y","volume":"10","author":"M Parsell","year":"2008","unstructured":"Parsell, M. (2008). Pernicious virtual communities: Identity, polarisation and the Web 2.0. Ethics and Information Technology, 10(1), 41\u201356. doi: 10.1007\/s10676-008-9153-y","journal-title":"Ethics and Information Technology"},{"key":"9621_CR55","doi-asserted-by":"crossref","unstructured":"Sartor, G. (2012). Human rights in the information society: Utopias, dystopias and human values. In C. Corradetti (Ed.), Philosophical dimensions of human rights (pp. 293\u2013307). Netherlands: Springer. Retrieved from http:\/\/www.springerlink.com\/content\/q731672287x354m2\/abstract\/","DOI":"10.1007\/978-94-007-2376-4_15"},{"key":"9621_CR56","unstructured":"Skouris, V., Lenaerts, K., Ile\u0161i\u010d, M., Bay Larsen, L., von Danwitz, T., & Safjan, M. (2014). Case C-131\/12. Google Spain SL and Google Inc. v Agencia Espa\u00f1ola de Protecci\u00f3n de Datos (AEPD) and Mario Costeja Gonz\u00e1lez (Grand Chamber May 13, 2014)."},{"issue":"4","key":"9621_CR57","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1525\/srsp.2008.5.4.62","volume":"5","author":"G Soderlund","year":"2008","unstructured":"Soderlund, G. (2008). Journalist or panderer? Framing underage webcam sites. Sexuality Research and Social Policy, 5(4), 62\u201372. doi: 10.1525\/srsp.2008.5.4.62","journal-title":"Sexuality Research and Social Policy"},{"key":"9621_CR58","unstructured":"Talbot, D. (2013). Moto X and other smartphones are set to listen to their environments all the time. Retrieved May 3, 2014 from http:\/\/www.technologyreview.com\/news\/517801\/the-era-of-ubiquitous-listening-dawns\/"},{"key":"9621_CR59","unstructured":"Timberg, C., & Nakashima, E. (2013). FBI\u2019s search for \u201cMo,\u201d suspect in bomb threats, highlights use of malware for surveillance. The Washington Post. Retrieved from http:\/\/www.washingtonpost.com\/business\/technology\/fbis-search-for-mo-suspect-in-bomb-threats-highlights-use-of-malware-for-surveillance\/2013\/12\/06\/352ba174-5397-11e3-9e2c-e1d01116fd98_story_2.html"},{"key":"9621_CR60","unstructured":"Tomkins, M. (2014). New face recognition algorithm knows you better than you know yourself. Retrieved from http:\/\/www.imaging-resource.com\/news\/2014\/04\/23\/new-face-recognition-algorithm-knows-you-better-than-you-know-yourself"},{"issue":"2","key":"9621_CR61","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s10676-009-9202-1","volume":"12","author":"S Vallor","year":"2010","unstructured":"Vallor, S. (2010). Social networking technology and the virtues. Ethics and Information Technology, 12(2), 157\u2013170. doi: 10.1007\/s10676-009-9202-1","journal-title":"Ethics and Information Technology"},{"key":"9621_CR62","unstructured":"Wakefield, J. (2014). Heartbleed: Do you need to worry? Retrieved April 11, 2014 from http:\/\/www.bbc.com\/news\/technology-26969629"},{"key":"9621_CR63","unstructured":"Walker, S. (2014). Text messages warn Ukraine protesters they are \u201cparticipants in mass riot.\u201d The Guardian. Retrieved from http:\/\/www.theguardian.com\/world\/2014\/jan\/21\/ukraine-unrest-text-messages-protesters-mass-riot"},{"issue":"3","key":"9621_CR64","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1111\/1467-9973.00232","volume":"33","author":"J Weckert","year":"2002","unstructured":"Weckert, J. (2002). Lilliputian computer ethics. Metaphilosophy, 33(3), 366\u2013375.","journal-title":"Metaphilosophy"},{"key":"9621_CR65","unstructured":"Zuckerberg, M. (2014). I\u2019m excited to announce that we\u2019ve agreed to acquire Oculus VR, the leader in VR technology. Facebook.com. Retrieved March 27, 2014 from https:\/\/www.facebook.com\/zuck\/posts\/10101319050523971"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-014-9621-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-014-9621-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-014-9621-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T19:10:01Z","timestamp":1650913801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-014-9621-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,1]]},"references-count":64,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["9621"],"URL":"https:\/\/doi.org\/10.1007\/s11948-014-9621-1","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,1]]}}}