{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T04:17:42Z","timestamp":1728274662418},"reference-count":45,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2020,10,4]],"date-time":"2020-10-04T00:00:00Z","timestamp":1601769600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media & Society"],"published-print":{"date-parts":[[2020,11]]},"abstract":" Online tracking in its various forms is a backbone of digitalization that has sparked hopes and fears alike: It opens up new opportunities for users and businesses as it enables individually targeted content. At the same time, the encompassing tracking of often unaware and ill-informed users and the opaque practices of data procession has alarmed critics from multiple sides. How can we better understand but also proactively and constructively shape the emerging Tracked Society? Our special issues seek to shed light on these questions from various perspectives and disciplines. In this introduction, we give a brief overview of the topic in general and our special issue in particular. <\/jats:p>","DOI":"10.1177\/1461444820924629","type":"journal-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T06:26:19Z","timestamp":1601879179000},"page":"1945-1956","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["The tracked society: Interdisciplinary approaches on online tracking"],"prefix":"10.1177","volume":"22","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9117-8482","authenticated-orcid":false,"given":"Ren\u00e9","family":"K\u00f6nig","sequence":"first","affiliation":[{"name":"University of Stuttgart, Germany"}]},{"given":"Steffen","family":"Uphues","sequence":"additional","affiliation":[{"name":"University of Stuttgart, Germany"}]},{"given":"Verena","family":"Vogt","sequence":"additional","affiliation":[{"name":"University of Stuttgart, Germany"}]},{"given":"Barbara","family":"Kolany-Raiser","sequence":"additional","affiliation":[{"name":"University of Stuttgart, Germany"}]}],"member":"179","published-online":{"date-parts":[[2020,10,4]]},"reference":[{"key":"bibr1-1461444820924629","unstructured":"Anderson C (2008) The end of theory: the data deluge makes the scientific method obsolete. Wired Magazine 16:07. Available at: http:\/\/www.wired.com\/science\/discoveries\/magazine\/16-07\/pb_theory"},{"key":"bibr2-1461444820924629","doi-asserted-by":"publisher","DOI":"10.4159\/9780674238879"},{"key":"bibr3-1461444820924629","unstructured":"Bau J, Mayer J, Paskov H, et al. (2013) A promising direction for web tracking countermeasures. Proceedings of W2SP. Available at: https:\/\/www.ieee-security.org\/TC\/W2SP\/2013\/papers\/s2p3.pdf"},{"key":"bibr4-1461444820924629","doi-asserted-by":"crossref","unstructured":"Beales H, Muris TJ (2019) Privacy and consumer control. George mason law & economics research paper no 19\u201327. Available at: https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3449242","DOI":"10.2139\/ssrn.3449242"},{"key":"bibr5-1461444820924629","doi-asserted-by":"crossref","unstructured":"Becher SI, Benoliel U (2019) Law in books and law in action: the readability of privacy policies and the GDPR. Available at: https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3334095","DOI":"10.1007\/978-3-030-49028-7_9"},{"key":"bibr6-1461444820924629","first-page":"43","author":"Bechmann G","year":"2005","journal-title":"10 Jahre ITAS"},{"key":"bibr7-1461444820924629","doi-asserted-by":"publisher","DOI":"10.4324\/9780203366134"},{"key":"bibr8-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.678878"},{"key":"bibr9-1461444820924629","unstructured":"Costanza-Chock S (2018) Design justice: towards an intersectional feminist framework for design theory and practice. ID 3189696, SSRN Scholarly Paper, 3 June. Rochester, NY: Social Science Research Network. Available at: https:\/\/papers.ssrn.com\/abstract=3189696 (accessed 17 July 2018)."},{"key":"bibr10-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716679678"},{"key":"bibr11-1461444820924629","doi-asserted-by":"publisher","DOI":"10.4324\/9780203070086"},{"key":"bibr12-1461444820924629","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.596"},{"volume-title":"Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor","year":"2018","author":"Eubanks V","key":"bibr13-1461444820924629"},{"key":"bibr14-1461444820924629","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v8i3.4165"},{"key":"bibr15-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812472322"},{"key":"bibr16-1461444820924629","unstructured":"Graham M (2012) Big data and the end of theory? Available at: https:\/\/www.theguardian.com\/news\/datablog\/2012\/mar\/09\/big-data-theory (accessed 26 August 2019)."},{"key":"bibr17-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1177\/2056305115603080"},{"key":"bibr18-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-21665-8"},{"key":"bibr19-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811420986"},{"key":"bibr20-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1509\/jm.15.0420"},{"key":"bibr21-1461444820924629","first-page":"47","volume-title":"The SAGE Encyclopedia of Surveillance, Security, and Privacy","author":"Lutz JM","year":"2018"},{"volume-title":"The Electronic Eye: The Rise of Surveillance Society","year":"1994","author":"Lyon D","key":"bibr22-1461444820924629"},{"key":"bibr23-1461444820924629","unstructured":"McDonald AM, Cranor LF (2008) The cost of reading privacy policies. I\/S: A Journal of Law and Policy for the Information Society 4(3): 540\u2013565."},{"key":"bibr24-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.676056"},{"key":"bibr25-1461444820924629","unstructured":"Morris DZ (2016) Netflix: geography, age, and gender are \u201cgarbage\u201d for predicting taste. Available at: https:\/\/fortune.com\/2016\/03\/27\/netflix-predicts-taste\/ (accessed 26 August 2019)."},{"key":"bibr26-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1515\/9780804772891"},{"key":"bibr27-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"bibr28-1461444820924629","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061"},{"key":"bibr29-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1177\/2053951714564228"},{"issue":"4","key":"bibr30-1461444820924629","first-page":"97","volume":"19","author":"Pohle J","year":"2018","journal-title":"CRi"},{"issue":"5","key":"bibr31-1461444820924629","first-page":"133","volume":"19","author":"Pohle J","year":"2018","journal-title":"CRi"},{"key":"bibr32-1461444820924629","first-page":"20","volume":"8","author":"Puschmann C","year":"2014","journal-title":"International Journal of Communication"},{"key":"bibr33-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1145\/358916.361990"},{"key":"bibr34-1461444820924629","unstructured":"Sandvig C, Hamilton K, Karahalios K, et al. (2014) Auditing algorithms: research methods for detecting discrimination on internet platforms. In: Data and discrimination: converting critical concerns into productive inquiry, 64th annual meeting of the international communication association, 22 May. Available at: http:\/\/social.cs.uiuc.edu\/papers\/pdfs\/ICA2014-Sandvig.pdf"},{"key":"bibr35-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1515\/9789048531011"},{"volume-title":"Web-Tracking-Report 2014","year":"2014","author":"Schneider M","key":"bibr36-1461444820924629"},{"key":"bibr37-1461444820924629","unstructured":"Simmel G (1950) Knowledge, truth, and falsehood in human relations. In: Wolff KH (ed.) The Sociology of Georg Simmel. Glencoe: Free Press, pp. 307\u2013316. Available at: https:\/\/archive.org\/details\/sociologyofgeorg030082mbp"},{"volume-title":"Understanding Privacy","year":"2008","author":"Solove DJ","key":"bibr38-1461444820924629"},{"key":"bibr39-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.09.038"},{"issue":"2","key":"bibr40-1461444820924629","first-page":"319","volume-title":"The ethics and analytics of tracking mobility using mobile phone data","volume":"34","author":"Taylor L","year":"2016"},{"key":"bibr41-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1177\/2053951717736335"},{"key":"bibr42-1461444820924629","first-page":"4677","volume":"1109","author":"Toubiana V","year":"2011","journal-title":"arXiv preprint arXiv:"},{"key":"bibr43-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190889760.001.0001"},{"key":"bibr44-1461444820924629","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00072"},{"volume-title":"The Age of Surveillance Capitalism: The Fight for the Future at the New Frontier of Power","year":"2019","author":"Zuboff S","key":"bibr45-1461444820924629"}],"container-title":["New Media & Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444820924629","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444820924629","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444820924629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T22:40:53Z","timestamp":1728254453000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444820924629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,4]]},"references-count":45,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["10.1177\/1461444820924629"],"URL":"https:\/\/doi.org\/10.1177\/1461444820924629","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"type":"print","value":"1461-4448"},{"type":"electronic","value":"1461-7315"}],"subject":[],"published":{"date-parts":[[2020,10,4]]}}}