{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:44:08Z","timestamp":1725497048402},"edition-number":"1","reference-count":9,"publisher":"Wiley","isbn-type":[{"type":"print","value":"9780471383932"},{"type":"electronic","value":"9780470050118"}],"license":[{"start":{"date-parts":[[2007,12,14]],"date-time":"2007-12-14T00:00:00Z","timestamp":1197590400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Data are<jats:italic>personally identifiable<\/jats:italic>if they can be attributed to a particular individual. Therefore,<jats:italic>data privacy<\/jats:italic>is concerned with the protection of personally identifiable information that, if unconditionally published, would violate an individual's privacy. For example, the right to solitude is violated if surveillance cameras peer into homes and are used to monitor the activities of occupants. An individual's right to secrecy is broken if personal health or financial data are made public. The right to anonymity is jeopardized by a system requiring all shop customers to provide identity documents when making purchases.<\/jats:p>","DOI":"10.1002\/9780470050118.ecse493","type":"other","created":{"date-parts":[[2007,12,6]],"date-time":"2007-12-06T17:49:24Z","timestamp":1196963364000},"source":"Crossref","is-referenced-by-count":0,"title":["Data Privacy"],"prefix":"10.1002","author":[{"given":"Alastair","family":"Beresford","sequence":"first","affiliation":[]},{"given":"David","family":"Scott","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,12,14]]},"reference":[{"key":"e_1_2_6_2_2_1","unstructured":"Center for Democracy and Technology. Available:http:\/\/www.cdt.org."},{"key":"e_1_2_6_2_3_1","unstructured":"Electronic Frontier Foundation. Available:http:\/\/www.eff.org."},{"key":"e_1_2_6_2_4_1","unstructured":"Electronic Privacy Information Center. Available:http:\/\/www.epic.org."},{"key":"e_1_2_6_2_5_1","unstructured":"Privacy International Privacy and Human Rights Survey. Available:http:\/\/www.privacyinternational.org\/survey."},{"volume-title":"Security Engineering","year":"2001","author":"Anderson R.","key":"e_1_2_6_3_2_1"},{"volume-title":"Database Nation: The Death of Privacy in the 21st Century","year":"2001","author":"Garfinkel S.","key":"e_1_2_6_3_3_1"},{"volume-title":"Code and Other Laws of Cyberspace","year":"2000","author":"Lessig L.","key":"e_1_2_6_3_4_1"},{"volume-title":"The Unwanted Gaze: The Distruction of Privacy in America","year":"2001","author":"Rosen J.","key":"e_1_2_6_3_5_1"},{"key":"e_1_2_6_3_6_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-0121-9","volume-title":"Elements of Statistical Disclosure Control","author":"Willenborg L.","year":"2001"}],"container-title":["Wiley Encyclopedia of Computer Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9780470050118.ecse493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T03:32:01Z","timestamp":1708399921000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/9780470050118.ecse493"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12,14]]},"ISBN":["9780471383932","9780470050118"],"references-count":9,"alternative-id":["10.1002\/9780470050118.ecse493","10.1002\/9780470050118"],"URL":"https:\/\/doi.org\/10.1002\/9780470050118.ecse493","archive":["Portico"],"relation":{},"subject":[],"published":{"date-parts":[[2007,12,14]]}}}