{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:36:58Z","timestamp":1726043818592},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030125530"},{"type":"electronic","value":"9783030125547"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12554-7_23","type":"book-chapter","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T02:03:35Z","timestamp":1567735415000},"page":"453-464","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Leveraging Open Algorithms (OPAL) for the Safe, Ethical, and Scalable Use of Private Sector Data in Crisis Contexts"],"prefix":"10.1007","author":[{"given":"Emmanuel","family":"Letouz\u00e9","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,7]]},"reference":[{"key":"23_CR1","volume-title":"Big data: a revolution that will transform how we live, work, and think, First Mariner","author":"V Mayer-Sch\u00f6nberger","year":"2014","unstructured":"Mayer-Sch\u00f6nberger V, Cukier K (2014) Big data: a revolution that will transform how we live, work, and think, First Mariner, Books edn. Mariner Books, Houghton Mifflin Harcourt, Boston","edition":"Books"},{"key":"23_CR2","unstructured":"United Nations (2013) A new global partnership: eradicate poverty and transform economies through sustainable development, New York, NY"},{"key":"23_CR3","unstructured":"United Nations (2014) A world that counts: mobilising the data revolution for sustainable development"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Dittrich, D., & Kenneally, E. (2012).\u00a0The Menlo Report: Ethical principles guiding information and communication technology research. US Department of Homeland Security","DOI":"10.2139\/ssrn.2445102"},{"key":"23_CR5","unstructured":"Letouz\u00e9 E (2015) The law, politics, and ethics of cell phone data analytics, Data-Pop Alliance"},{"key":"23_CR6","unstructured":"\u201cSaving Big Data from Itself\u201d, Note to Self, WNYC Studios, 25-Jan-2017"},{"key":"23_CR7","unstructured":"Salah AA, Pentland A, Lepri B, Letouz\u00e9 E, Vinck P, de Montjoye YA, Dong X, Da\u011fdelen \u00d6 (2018) Data for refugees: the D4R challenge on mobility of Syrian refugees in Turkey. arXiv preprint arXiv:1807.00523"},{"key":"23_CR8","unstructured":"\u201cWaiting on hold\u2014Ebola and big data,\u201d The Economist, 27-Oct-2014"},{"key":"23_CR9","unstructured":"International Crisis Group, \u201cContaining the Shock Waves from Venezuela,\u201d International Crisis Group, Brussels, Belgium, Latin America 65, Mar. 2018"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"180286","DOI":"10.1038\/sdata.2018.286","volume":"5","author":"Y-A Montjoye de","year":"2018","unstructured":"de Montjoye Y-A et al (2018) On the privacy-conscientious use of mobile phone data. Scientific Data 5:180286","journal-title":"Scientific Data"},{"key":"23_CR11","unstructured":"de Montjoye Y-A, Kendall J, Kerry CF (2014) Enabling humanitarian use of mobile phone data. Brookings issues in technology innovation series, vol 26. Brookings Institution, Washington, DC"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1038\/srep01376","volume":"3","author":"Y-A Montjoye de","year":"2013","unstructured":"de Montjoye Y-A, Hidalgo CA, Verleysen M, Blondel VD (2013) Unique in the crowd: the privacy bounds of human mobility. Scientific Reports 3:1376","journal-title":"Scientific Reports"},{"issue":"7","key":"23_CR13","doi-asserted-by":"publisher","first-page":"e98790","DOI":"10.1371\/journal.pone.0098790","volume":"9","author":"Y-A Montjoye de","year":"2014","unstructured":"de Montjoye Y-A, Shmueli E, Wang SS, Pentland AS (2014) openPDS: protecting the privacy of metadata through safe answers. PLoS ONE 9(7):e98790","journal-title":"PLoS ONE"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-67280-9_8","volume-title":"Privacy Technologies and Policy","author":"Paul Francis","year":"2017","unstructured":"Francis P, Probst Eide S, Munz R (2017) Diffix: High-Utility Database Anonymization. In: Schweighofer E, Leitold H, Mitrakas A, Rannenberg K (eds) Privacy Technologies and Policy, vol 10518. Cham: Springer International Publishing, pp 141\u2013158"},{"issue":"5","key":"23_CR15","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1145\/3187009.3177733","volume":"11","author":"N Johnson","year":"2018","unstructured":"Johnson N, Near JP, Song D (2018) Towards practical differential privacy for SQL queries. Proc VLDB Endow 11(5):526\u2013539","journal-title":"Proc VLDB Endow"},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-0-387-70992-5_17","volume-title":"Privacy-Preserving Data Mining","author":"Shubha U. Nabar","year":"2008","unstructured":"Nabar SU, Kenthapadi K, Mishra N, Motwani R (2008) A survey of query auditing techniques for data privacy. In: Aggarwal CC, Yu PS (eds) Privacy-preserving data mining, vol 34. Boston, MA: Springer US, pp 415\u2013431"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Dwork C (2011) Differential privacy. In: van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Boston, MA: Springer US, pp 338\u2013340","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Chaum D, Cr\u00e9peau C, Damgard I (1988) Multiparty unconditionally secure protocols. In: Proceedings of the twentieth annual ACM symposium on Theory of computing\u2014STOC \u201988, Chicago, Illinois, United States, pp 11\u201319","DOI":"10.1145\/62212.62214"},{"issue":"4","key":"23_CR19","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1515\/popets-2017-0053","volume":"2017","author":"A Gasc\u00f3n","year":"2017","unstructured":"Gasc\u00f3n A et al (2017) Privacy-preserving distributed linear regression on high-dimensional data. Proc Priv Enhancing Technol 2017(4):345\u2013364","journal-title":"Proc Priv Enhancing Technol"},{"issue":"5915","key":"23_CR20","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1126\/science.1167742","volume":"323","author":"D Lazer","year":"2009","unstructured":"Lazer D et al (2009) Computational social science. Science 323(5915):721\u2013723","journal-title":"Science"},{"key":"23_CR21","unstructured":"\u201cOPAL Project,\u201d OPAL Project. [Online]. https:\/\/www.opalproject.org\/a-closer-look . Accessed 14 Feb 2019"},{"key":"23_CR22","unstructured":"McKinsey Global Institute, \u201cNotes from the AI Frontier: Applying AI for Social Good,\u201d McKinsey & Company, Dec. 2018"}],"container-title":["Guide to Mobile Data Analytics in Refugee Scenarios"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12554-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T13:27:23Z","timestamp":1610976443000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12554-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030125530","9783030125547"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12554-7_23","relation":{},"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"7 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}