{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:46:20Z","timestamp":1725536780682},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642037474"},{"type":"electronic","value":"9783642037481"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03748-1_2","type":"book-chapter","created":{"date-parts":[[2009,8,22]],"date-time":"2009-08-22T05:10:34Z","timestamp":1250917834000},"page":"11-21","source":"Crossref","is-referenced-by-count":2,"title":["Search Engines: Gateway to a New \u201cPanopticon\u201d?"],"prefix":"10.1007","author":[{"given":"Eleni","family":"Kosta","sequence":"first","affiliation":[]},{"given":"Christos","family":"Kalloniatis","sequence":"additional","affiliation":[]},{"given":"Lilian","family":"Mitrou","sequence":"additional","affiliation":[]},{"given":"Evangelia","family":"Kavakli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Nielsen Online: Press release, U.S. search share rankings (January 2009), \n                    \n                      http:\/\/www.nielsen-online.com\/pr\/pr_090211.pdf"},{"key":"2_CR2","unstructured":"Spanish Data Protection Agency (Agencia Espa\u00f1ola de Protecci\u00f3n de Datos): Statement on Internet Search Engines, (January 12, 2007), \n                    \n                      http:\/\/tinyurl.com\/dkopph"},{"key":"2_CR3","unstructured":"28th International Data Protection and Privacy Commissioners\u2019 Conference: Resolution on Privacy Protection and Search Engines, November 02-03, 2006, London United Kingdom (2006)"},{"key":"2_CR4","unstructured":"Article 29 Working Party (Press Release): Search Engines, Brussels (February 12, 2009), \n                    \n                      http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/news\/docs\/pr_12_02_09_en.pdf"},{"issue":"20","key":"2_CR5","first-page":"61","volume":"69","author":"P. Steiner","year":"1993","unstructured":"Steiner, P.: On the internet, nobody knows you\u2019re a dog. The New Yorker\u00a069(20), 61 (1993)","journal-title":"The New Yorker"},{"key":"2_CR6","unstructured":"Privacy International: A Race to the Bottom: Privacy Ranking of Internet Service Companies \u2013 A consultation report (June 9, 2007), \n                    \n                      http:\/\/www.privacyinternational.org\/article.shtml?cmd347=x-347-553961"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Pass, G., Chowdhury, A., Torgeson, C.: A Picture of Search. In: The First International Conference on Scalable Information Systems, Hong Kong (June 2006)","DOI":"10.1145\/1146847.1146848"},{"key":"2_CR8","unstructured":"Barbaro, M., Zeller Jr., T.: A Face Is Exposed for AOL Searcher No. 4417749. The New York Times (August 9, 2006)"},{"key":"2_CR9","unstructured":"Rochford, M.: Designing for the social: avoiding anti-social networks. Presentation given at IA Summit, 14.04.2008 and UPA London, 24.04.2008 (2008), \n                    \n                      http:\/\/www.slideshare.net\/rochford\/designing-for-the-social-avoiding-antisocial-networks"},{"key":"2_CR10","unstructured":"Wood, D.: A report on the Surveillance Society for the (UK) Information Commissioner. In: Surveillance Studies Network (September 2006)"},{"key":"#cr-split#-2_CR11.1","unstructured":"International Working Group on Data Protection in Telecommunications: Common Position on Privacy Protection and Search Engines first adopted at the 23rd Meeting in Hong Kong SAR, China (April 15, 1998);"},{"key":"#cr-split#-2_CR11.2","unstructured":"Revised and updated at the 39th meeting, Washington D.C (April 6-7, 2006)"},{"key":"2_CR12","unstructured":"Directive 1995\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, O.J. L 281\/31(November 11, 1995)"},{"key":"2_CR13","volume-title":"European Data Protection Law \u2013 Corporate Compliance and Regulation","author":"C. Kuner","year":"2007","unstructured":"Kuner, C.: European Data Protection Law \u2013 Corporate Compliance and Regulation, 2nd edn. Oxford University Press, Oxford (2007)","edition":"2"},{"key":"2_CR14","unstructured":"Article 29 Data Protection Working Party: Opinion on data protection issues related to search engines, WP 148 (April 4, 2008)"},{"key":"2_CR15","unstructured":"Fleischer, P.: Response to the Article 29 Working Party opinion on data protection issues related to search engines (September 8, 2008)"},{"key":"2_CR16","unstructured":"Article 29 Data Protection Working Party: Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based web sites, WP56 (May 30, 2002)"},{"key":"2_CR17","unstructured":"Glasner, J.: What search sites know about you, \n                    \n                      http:\/\/www.wired.com\/politics\/security\/news\/2005\/04\/67062"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/S0267-3649(00)89134-7","volume":"16","author":"L. Bygrave","year":"2000","unstructured":"Bygrave, L.: Determining Applicable Law pursuant to European Data Protection Legislation. Computer Law & Security Report\u00a016, 252\u2013257 (2000)","journal-title":"Computer Law & Security Report"},{"key":"2_CR19","unstructured":"Google Privacy Glossary, \n                    \n                      http:\/\/www.google.com\/intl\/en\/privacy_glossary.html"},{"key":"2_CR20","first-page":"461","volume":"23","author":"P. Church","year":"2007","unstructured":"Church, P., Kon, G.M.: Google at the heart of data protection storm. CLSR\u00a023, 461\u2013465 (2007)","journal-title":"CLSR"},{"issue":"3","key":"2_CR21","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1177\/0961000606066571","volume":"38","author":"J. Fry","year":"2006","unstructured":"Fry, J.: Google\u2019s Privacy Responsibilities at Home and Abroad. Journal of Librarianship and Information Science\u00a038(3), 135 (2006)","journal-title":"Journal of Librarianship and Information Science"},{"key":"2_CR22","unstructured":"Directive 2006\/24\/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002\/58\/EC, O.J. L105\/54 (April 13, 2006)"},{"key":"2_CR23","unstructured":"Helft M\/: Yahoo limits retention of search data, NY Times.com (December 17, 2008), \n                    \n                      http:\/\/www.nytimes.com\/2008\/12\/18\/technology\/internet\/18yahoo.html?_r=1&ref=technology"},{"key":"2_CR24","unstructured":"Rottenberg, M.: Executive Director of the Electronic Privacy Information Center (EPIC), as quoted in Singel, R.: Yahoo to Anonymize User Data After 90 Days (February 17, 2008), \n                    \n                      http:\/\/blog.wired.com\/business\/2008\/12\/yahoo-to-anonym.html"},{"key":"2_CR25","unstructured":"Microsoft\u2019s Privacy Principles for Live Search and Online Ad Targeting (July 23, 2007), \n                    \n                      http:\/\/tinyurl.com\/ck9zq7"},{"key":"2_CR26","unstructured":"Personal communication with John Borking, on the report he prepared with Robert-Jan Dijkman on Ixquick (January 20, 2008)"},{"key":"2_CR27","unstructured":"Ixquick\u2019s Privacy Q&A, \n                    \n                      http:\/\/www.ixquick.com\/uk\/protect_privacy.html#q"},{"key":"2_CR28","unstructured":"Borking Consultancy: Ixquick Evaluation Short Public Report (Recertification) (January 27, 2009), \n                    \n                      http:\/\/tinyurl.com\/bo7b43"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03748-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T13:34:46Z","timestamp":1552138486000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03748-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642037474","9783642037481"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03748-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}