{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:05:40Z","timestamp":1743012340402,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":18,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048188642"},{"type":"electronic","value":"9789048188659"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-8865-9_4","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:12:18Z","timestamp":1280754738000},"page":"53-74","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Responding to the Inevitable Outcomes of Profiling: Recent Lessons from Consumer Financial Markets, and Beyond"],"prefix":"10.1007","author":[{"given":"Tal","family":"Zarsky","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,3]]},"reference":[{"key":"4_CR1","unstructured":"Baker, Stephen. 2008. The numerati. New York: Houghton Mifflin Harcourt."},{"key":"4_CR2","volume-title":"Privacy in perspective.","author":"Fred H. Cate","year":"2001","unstructured":"Cate, Fred H. 2001. Privacy in perspective. Washington, DC: AEI Press."},{"key":"4_CR3","unstructured":"Cate, Fred H. 2006. The failure of fair information practice principles. In Consumer Protection in the Age of the Information Economy, ed. J.K. Winn, 358. Williston: Ashgate."},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1038\/scientificamerican0892-96","volume":"267","author":"David. Chaum","year":"1992","unstructured":"Chaum, David. 1992. Achieving electronic privacy. Scientific American 267: 96\u2013101.","journal-title":"Scientific American"},{"key":"4_CR5","unstructured":"Duhigg, Charles. 2009. What does your credit-card company know about you? New York Times Magazine."},{"key":"4_CR6","volume-title":"Persuasion and privacy in cyberspace","author":"Laura J. Gurak","year":"1999","unstructured":"Gurak, Laura J. 1999. Persuasion and privacy in cyberspace. New Haven, CT: Yale Univ. Press."},{"key":"4_CR7","volume-title":"Exit, voice and loyalty.","author":"Albert O. Hirschman","year":"1970","unstructured":"Hirschman, Albert O. 1970. Exit, voice and loyalty. Cambridge, MA: Harvard Univ. Press."},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.2307\/1600574","volume":"70","author":"Russel B. Korobkin","year":"2003","unstructured":"Korobkin, Russel B. 2003. Bounded rationality, standard form contracts, and unconscionability, University of Chicago Law Review 70: 1203\u20131295.","journal-title":"University of Chicago Law Review"},{"key":"4_CR9","unstructured":"Lemos, Robert. 2007. Researchers reverse Netflix anonymization. Security Focus (December 4)."},{"key":"4_CR10","unstructured":"Lieber, Ron. 2009. American Express kept a (very) watchful eye on charges. New York Times."},{"issue":"2","key":"4_CR11","doi-asserted-by":"publisher","first-page":"403","DOI":"10.2307\/4144456","volume":"52","author":"Francesco. Parisi","year":"2004","unstructured":"Parisi, Francesco. 2004. The harmonization of legal warranties in european sales law: An economic analysis. American Journal of Comparative Law 52 (2): 403\u2013431.","journal-title":"American Journal of Comparative Law"},{"key":"4_CR12","first-page":"745","volume":"52","author":"Michael E. Staten","year":"2003","unstructured":"Staten, Michael E., and Fred H. Cate. 2003. The impact of opt-in privacy rules on retail credit markets: A case study of MBNA. Duke Law Journal 52: 745\u2013786.","journal-title":"Duke Law Journal"},{"key":"4_CR13","volume-title":"Understanding privacy.","author":"Daniel J. Solove","year":"2008","unstructured":"Solove, Daniel J. 2008. Understanding privacy. Cambridge, MA: Harvard Univ. Press."},{"key":"4_CR14","unstructured":"Stone, Brad. 2008. Banks mine data and woo troubled borrowers. New York Times."},{"key":"4_CR15","volume-title":"None of your business","author":"Swire","year":"1998","unstructured":"Swire, Peter S., and Robert E. Litan, 1998. None of your business. Washington, DC: Brookings Institution Press."},{"key":"4_CR16","unstructured":"Thompson, Clive. 2008. If you liked this, you\u2019re sure to love that. New York Times, November 23, 2008."},{"key":"4_CR17","first-page":"1","volume":"5","author":"Zarsky","year":"2002\u20132003.","unstructured":"Zarsky, Tal Z. 2002\u20132003. Mine your own business! Making the case for the implications of the data mining of personal information in the forum of public opinion. Yale Journal of Law and Technology 5: 1\u201357.","journal-title":"Yale Journal of Law and Technology"},{"issue":"1","key":"4_CR18","first-page":"22","volume":"56","author":"Tal Z. Zarsky","year":"2004","unstructured":"Zarsky, Tal Z. 2004. Desperately seeking solutions: Using implementation-based solutions for the troubles of information privacy in the age of data mining and the internet society. Maine Law Review 56 (1): 22,28.","journal-title":"Maine Law Review"}],"container-title":["Data Protection in a Profiled World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-8865-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T10:46:43Z","timestamp":1720694803000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-8865-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9789048188642","9789048188659"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-8865-9_4","relation":{},"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"3 August 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}