{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:12:10Z","timestamp":1725552730055},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308195"},{"type":"electronic","value":"9783540315988"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596981_8","type":"book-chapter","created":{"date-parts":[[2006,6,17]],"date-time":"2006-06-17T10:42:27Z","timestamp":1150540947000},"page":"55-61","source":"Crossref","is-referenced-by-count":1,"title":["A New Conceptual Framework Within Information Privacy: Meta Privacy"],"prefix":"10.1007","author":[{"given":"Geoff","family":"Skinner","sequence":"first","affiliation":[]},{"given":"Song","family":"Han","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","first-page":"1610","volume":"1609","author":"P.M. Schwartz","year":"1999","unstructured":"Schwartz, P.M.: Privacy and Democracy in Cyberspace. 52 VAND. L. REV.\u00a01609, 1610\u20131611 (1999)","journal-title":"52 VAND. L. REV."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases. In: Proceedings of the 28th VLDB Conference, Hong Kong, China (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"8_CR3","unstructured":"Hes, R., Borking, J.: Privacy-Enhancing Technologies: The path to anonymity. Registratiekamer, The Hague (August 2000)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-36467-6_1","volume-title":"Privacy Enhancing Technologies","author":"I. Goldberg","year":"2003","unstructured":"Goldberg, I.: Privacy-enhancing technologies for the Internet, II: Five years later. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 14\u201315. Springer, Heidelberg (2003)"},{"key":"8_CR5","unstructured":"Clarke, R.: Introduction to Dataveillance and Information Privacy, and Definitions and Terms (1999), \n                    \n                      http:\/\/www.anu.edu.au\/people\/Roger.Clarke\/DV\/Intro.html"},{"key":"8_CR6","unstructured":"Common Criteria: Common Criteria for Information Technology Evaluation (January 2004), \n                    \n                      http:\/\/www.commoncriteria.org"},{"key":"8_CR7","unstructured":"W3C: The platform for privacy preferences 1.0 (P3P1.0) specification. W3C Proposed Recommendation (January 2002), \n                    \n                      http:\/\/www.w3.org\/TR\/P3P"},{"key":"8_CR8","unstructured":"Webopedia: Definition of Metadata \u2013 What is Metadata (1998), \n                    \n                      http:\/\/www.webopedia.com\/TERM\/m\/metadata.html"},{"key":"8_CR9","unstructured":"Massacci, F., Zannone, N.: Privacy is Linking Permission to Purpose. Technical Report University of Trento, Italy (2004)"},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/293411.293475","volume":"42","author":"R. Clarke","year":"1999","unstructured":"Clarke, R.: Internet Privacy Concerns Confirm the Case for Intervention. ACM\u00a042(2), 60\u201367 (1999)","journal-title":"ACM"},{"key":"8_CR11","unstructured":"Rice, F.C.: Protecting Personal Data in your Microsoft Word Documents. MSDN Online Article (August 2002), \n                    \n                      http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/en-us\/dnword2k2\/html\/odc_ProtectWord.asp"},{"key":"8_CR12","unstructured":"Extensible Markup Language (XML), World Wide Web Consortium (W3C), \n                    \n                      http:\/\/www.w3.org\/XML\/"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Ceravolo, P., Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Advanced Metadata for Privacy-Aware Representation of Credentials. In: PDM 2005, Tokyo, Japan, April 9 (2005)","DOI":"10.1109\/ICDE.2005.184"},{"key":"8_CR14","unstructured":"RDF Vocabulary Description Language (RDFS). World Wide Web Consortium, \n                    \n                      http:\/\/www.w3.org\/TR\/rdf-schema\/"},{"key":"8_CR15","unstructured":"Web Ontology Language (OWL). World Wide Web Consortium, \n                    \n                      http:\/\/w3.org\/2004\/OWL\/"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kini, A., LeFevre, K., Wang, A., Xu, Y., Zhou, D.: Managing Healthcare Data Hippocratically. In: Proc. of ACM SIGMOD Intl. Conf. on Management of Data (2004)","DOI":"10.1145\/1007568.1007713"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596981_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:57:38Z","timestamp":1619492258000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596981_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308195","9783540315988"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11596981_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}