{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:57:24Z","timestamp":1725901044793},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642316678"},{"type":"electronic","value":"9783642316685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31668-5_1","type":"book-chapter","created":{"date-parts":[[2012,6,28]],"date-time":"2012-06-28T04:34:43Z","timestamp":1340858083000},"page":"1-13","source":"Crossref","is-referenced-by-count":1,"title":["Are They Making Our Privates Public? \u2013 Emerging Risks of Governmental Open Data Initiatives"],"prefix":"10.1007","author":[{"given":"Thomas P.","family":"Keenan","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"http:\/\/techpresident.com\/blog-entry\/and-then-there-were-102-nycs-datamine-glitch\n                    \n                    \n                   (accessed August 26, 2011)"},{"key":"1_CR2","unstructured":"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-122\/sp800-122.pdf\n                    \n                    \n                   p. 7 (accessed August 26, 2011)"},{"key":"1_CR3","unstructured":"http:\/\/data.edmonton.ca\/City-Administration\/2010-Municipal-Election-Results-Raw-Data-View\/gw7p-ee8r\n                    \n                    \n                   (accessed December 30, 2011)"},{"key":"1_CR4","unstructured":"Zijlstra, T.: A court has ordered Slovak NGO Fair-Play Alliance to take down data from their award winning Open Data application, \n                    \n                      http:\/\/www.epsiplatform.eu\/news\/news\/open_data_challenge_winner_ordered_to_remove_certain_data\n                    \n                    \n                   (accessed August 26, 2011)"},{"key":"1_CR5","unstructured":"http:\/\/www.squidoo.com\/gov-food-stamps#module63313422\n                    \n                    \n                   (accessed August 26, 2011)"},{"key":"1_CR6","unstructured":"http:\/\/we.ideascale.com\/a\/dtd\/Stable-Renters--Public-Scoring-for-Apartments-and-Landlords\/106829-12001\n                    \n                    \n                   (accessed August 26, 2011)"},{"key":"1_CR7","unstructured":"http:\/\/www.scmagazineus.com\/hurricane-katrina-evacuees-victims-of-data-breach\/article\/155121\/\n                    \n                    \n                   (accessed August 26, 2011)"},{"key":"1_CR8","unstructured":"http:\/\/techpresident.com\/blog-entry\/open-data-makes-good-advertising-mta\n                    \n                    \n                   (accessed August 26, 2011)"},{"key":"1_CR9","unstructured":"http:\/\/ir.ancestry.com\/releasedetail.cfm?ReleaseID=552742\n                    \n                    \n                   (accessed August 26, 2011)"},{"key":"1_CR10","unstructured":"Gormley, M.V.: Oxymoron: Privacy and the Internet, \n                    \n                      http:\/\/www.rootsweb.ancestry.com\/~mistclai\/privacy.html\n                    \n                    \n                   (accessed August 26, 2011)"},{"key":"1_CR11","unstructured":"US National Academy of Sciences, The Value of Genetic and Genomic Technologies, Washington, DC (2010), \n                    \n                      http:\/\/www.ncbi.nlm.nih.gov\/books\/NBK52756\/pdf\/TOC.pdf\n                    \n                    \n                  , with Spiegel\u2019s comments in the online discussion \n                    \n                      http:\/\/www.ncbi.nlm.nih.gov\/books\/NBK52749\/"},{"key":"1_CR12","unstructured":"http:\/\/www.lossofprivacy.com\/index.php\/2007\/06\/ancestrycom-adding-dna-test-results-to-their-site\/\n                    \n                    \n                   (accessed August 26, 2011)"},{"key":"1_CR13","unstructured":"Privacy International, PI files complaint about online DNA genealogical testing firm, \n                    \n                      https:\/\/www.privacyinternational.org\/article\/pi-files-complaint-about-online-dna-genealogical-testing-firm\n                    \n                    \n                   (accessed August 26)"},{"key":"1_CR14","first-page":"1701","volume":"57","author":"P. Ohm","year":"2010","unstructured":"Ohm, P.: Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review\u00a057, 1701 (2010)","journal-title":"UCLA Law Review"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-540-75551-7_12","volume-title":"Privacy Enhancing Technologies","author":"T.G. Abbott","year":"2007","unstructured":"Abbott, T.G., Lai, K.J., Lieberman, M.R., Price, E.C.: Browser-Based Attacks on Tor. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.\u00a04776, pp. 184\u2013199. Springer, Heidelberg (2007)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust De-Anonymization of Large Sparse Datasets. In: IEEE Symposium on Security and Privacy, Oakland, CA, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"1_CR17","unstructured":"Albanescius, C.: Netflix Prize Scrapped Over Privacy Concerns, \n                    \n                      http:\/\/www.pcmag.com\/article2\/0,2817,2361349,00.asp\n                    \n                    \n                   (accessed December 30, 2011)"},{"key":"1_CR18","unstructured":"O\u2019Hara, K., et al.: Avoiding the Jigsaw Effect: Experiences with Ministry of Justice Reoffending Data, research paper, \n                    \n                      http:\/\/eprints.ecs.soton.ac.uk\/23072\/8\/AVOIDINGTHEJIGSAWEFFECT.pdf\n                    \n                    \n                   (accessed December 30, 2011)"},{"key":"1_CR19","unstructured":"quoted on home page, \n                    \n                      opendatachallenge.org\n                    \n                    \n                   (accessed August 26, 2011)"},{"key":"1_CR20","unstructured":"Eaves, D.: blog posting, \n                    \n                      http:\/\/eaves.ca\/2010\/10\/06\/how-governments-misunderstand-the-risks-of-open-data\/\n                    \n                    \n                   (accessed December 28, 2011)"},{"key":"1_CR21","unstructured":"Fertik, M., Thompson, D.: Wild West 2.0: How To Protect and Restore Your Online Reputation on the Untamed Social Frontier. In: AMACOM, New York, pp. 50\u201353 (2010)"},{"key":"1_CR22","unstructured":"http:\/\/www.ftc.gov\/opa\/2006\/01\/choicepoint.shtm\n                    \n                    \n                   (accessed August 26, 2011)"},{"key":"1_CR23","unstructured":"http:\/\/wiki.civiccommons.org\/Open_Data_Policy#Privacy_.26_Security\n                    \n                    \n                   (accessed August 26, 2011)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31668-5_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:43:15Z","timestamp":1620128595000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31668-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642316678","9783642316685"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31668-5_1","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}