{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T14:00:53Z","timestamp":1762956053705},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T00:00:00Z","timestamp":1553472000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T00:00:00Z","timestamp":1553472000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Nat Mach Intell"],"DOI":"10.1038\/s42256-019-0042-3","type":"journal-article","created":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T17:04:01Z","timestamp":1553533441000},"page":"168-169","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Consumer protection requires artificial intelligence"],"prefix":"10.1038","volume":"1","author":[{"given":"Marco","family":"Lippi","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Contissa","sequence":"additional","affiliation":[]},{"given":"Francesca","family":"Lagioia","sequence":"additional","affiliation":[]},{"given":"Hans-Wolfgang","family":"Micklitz","sequence":"additional","affiliation":[]},{"given":"Przemys\u0142aw","family":"Pa\u0142ka","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Sartor","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Torroni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,25]]},"reference":[{"key":"42_CR1","unstructured":"Zuboff, S. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (Profile Books, 2019)."},{"key":"42_CR2","first-page":"252","volume":"2","author":"M Hildebrandt","year":"2018","unstructured":"Hildebrandt, M. Geo. L. Tech. Rev. 2, 252\u2013273 (2018).","journal-title":"Geo. L. Tech. Rev."},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Galbraith, J. K. The Anatomy of Power (Houghton-Mifflin, 1983).","DOI":"10.1080\/05775132.1983.11470852"},{"key":"42_CR4","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.dss.2013.07.009","volume":"57","author":"N Hu","year":"2014","unstructured":"Hu, N., Koh, N. S. & Reddy, S. K. Decis. Support Syst. 57, 42\u201353 (2014).","journal-title":"Decis. Support Syst."},{"key":"42_CR5","first-page":"9","volume":"4","author":"S Ruggieri","year":"2010","unstructured":"Ruggieri, S., Pedreschi, D. & Turini, F. ACM Trans. Knowl. Discov. D. 4, 9 (2010).","journal-title":"ACM Trans. Knowl. Discov. D."},{"key":"42_CR6","doi-asserted-by":"publisher","first-page":"2432","DOI":"10.1109\/JSYST.2015.2504102","volume":"11","author":"SH Wu","year":"2017","unstructured":"Wu, S.-H., Chou, M.-J., Tseng, C.-H., Lee, Y.-J. & Chen, K.-T. IEEE Syst. J. 11, 2432\u20132443 (2017).","journal-title":"IEEE Syst. J."},{"key":"42_CR7","doi-asserted-by":"publisher","unstructured":"Obar, J. A. & Oeldorf-Hirsch, A. Inf. Commun. Soc. https:\/\/doi.org\/10.1080\/1369118X.2018.1486870 (2018).","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"42_CR8","doi-asserted-by":"publisher","unstructured":"Lippi, M. et al. Artif. Intell. Law https:\/\/doi.org\/10.1007\/s10506-019-09243-2 (2019).","DOI":"10.1007\/s10506-019-09243-2"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Contissa, G. et al. CLAUDETTE Meets GDPR: Automating the Evaluation of Privacy Policies Using Artificial Intelligence (BEUC, 2018).","DOI":"10.2139\/ssrn.3208596"},{"key":"42_CR10","unstructured":"Costante, E., Sun, Y., Petkovi\u00b4c, M. & den Hartog, J. in Proc. 2012 ACM Workshop on Privacy in the Electronic Society 91\u201396 (ACM, 2012)."},{"key":"42_CR11","unstructured":"Tomuro, N., Lytinen, S. & Hornsburg, K. in Proc. Sixth ACM Conference on Data and Application Security and Privacy 133\u2013135 (ACM, 2016)."},{"key":"42_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/3127519","volume":"18","author":"RN Zaeem","year":"2018","unstructured":"Zaeem, R. N., German, R. L. & Barber, S. K. ACM Trans. Internet Technol. 18, 53 (2018).","journal-title":"ACM Trans. Internet Technol."},{"key":"42_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3230665","volume":"13","author":"S Wilson","year":"2018","unstructured":"Wilson, S. et al. ACM Trans. Web 13, 1 (2018).","journal-title":"ACM Trans. Web"},{"key":"42_CR14","unstructured":"Solon, O. NBC News https:\/\/www.nbcnews.com\/tech\/internet\/facial-recognition-s-dirty-little-secret-millions-online-photos-scraped-n981921 (12 March 2019)."},{"key":"42_CR15","unstructured":"Rubin, J., Gordon, M. I., Nguyen, N. & Rinard, M. in 2015 30th IEEE\/ACM International Conference on Automated Software Engineering 647\u2013657 (IEEE, 2015)."},{"key":"42_CR16","unstructured":"Gordon, M. I. et al. in 2015 Network and Distributed System Security Symposium 110 (NDSS, 2015)."},{"key":"42_CR17","unstructured":"Joshi, K. P. et al. in AAAI Fall Symposium 149\u2013152 (AAAI, 2016)."},{"key":"42_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MPRV.2018.03367733","volume":"17","author":"A Das","year":"2018","unstructured":"Das, A., Degeling, M., Smullen, D. & Sadeh, N. M. IEEE Pervasive Comput. 17, 35\u201346 (2018).","journal-title":"IEEE Pervasive Comput."}],"container-title":["Nature Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.nature.com\/articles\/s42256-019-0042-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s42256-019-0042-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s42256-019-0042-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T19:37:44Z","timestamp":1671305864000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.nature.com\/articles\/s42256-019-0042-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,25]]},"references-count":18,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2019,4]]}},"alternative-id":["42"],"URL":"https:\/\/doi.org\/10.1038\/s42256-019-0042-3","relation":{},"ISSN":["2522-5839"],"issn-type":[{"value":"2522-5839","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,25]]},"assertion":[{"value":"25 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}