{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:10:56Z","timestamp":1775913056402,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/bigdata.2018.8622621","type":"proceedings-article","created":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T03:07:18Z","timestamp":1548385638000},"page":"5027-5033","source":"Crossref","is-referenced-by-count":81,"title":["Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR"],"prefix":"10.1109","author":[{"given":"Nils","family":"Gruschka","sequence":"first","affiliation":[]},{"given":"Vasileios","family":"Mavroeidis","sequence":"additional","affiliation":[]},{"given":"Kamer","family":"Vishi","sequence":"additional","affiliation":[]},{"given":"Meiko","family":"Jensen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989345"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"ref12","article-title":"A Face Is Exposed for AOL Searcher No. 4417749","author":"barbaro","year":"2006","journal-title":"The New York Times"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1126\/science.339.6117.262"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1376","DOI":"10.1038\/srep01376","article-title":"Unique in the Crowd: The privacy bounds of human mobility","volume":"3","author":"montjoye","year":"2013","journal-title":"Scientific Reports"},{"key":"ref15","first-page":"995","article-title":"Incompatible: The GDPR in the Age of Big Data","volume":"47","author":"zarsky","year":"2016","journal-title":"Seton Hall L Rev"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0019-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2012.15"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref28","author":"kindt","year":"2013","journal-title":"Privacy and Data Protection Issues of Biometric Applications A Comparative Legal Analysis ser Law"},{"key":"ref4","article-title":"Biology: The big challenges of big data","author":"marx","year":"2013"},{"key":"ref27","article-title":"Hashing of personally identifiable information is not sufficient","author":"marx","year":"2018","journal-title":"BWINF Gesellschaft fr Informatik e V"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1126\/science.1197869"},{"key":"ref6","author":"hill","year":"2012","journal-title":"How Target Figured Out A Teen Girl Was Pregnant before Her Father Did"},{"key":"ref29","first-page":"385","article-title":"Multi-biometric template protection on smart-phones: An approach based on binarized statistical features and bloom filters","author":"stokkenes","year":"2016","journal-title":"Iberoamerican Congress on Pattern Recognition"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref8","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance)","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/ejhg.2015.239"},{"key":"ref2","article-title":"What Is Big Data&#x0192;","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref1","article-title":"NIST Big Data Interoperability Framework: Volume 1, Definitions","year":"2018","journal-title":"National Institute of Standards and Technology Tech Rep NIST SP 1500-1r1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2362522"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2577036"},{"key":"ref23","article-title":"The anonymisation of personal data","year":"2017"},{"key":"ref26","article-title":"Data-driven threat hunting using sysmon","author":"mavroeidis","year":"0"},{"key":"ref25","first-page":"85","article-title":"Trust network analysis with subjective logic","author":"j\u00f8sang","year":"2006","journal-title":"Proceedings of the 29th Australasian Computer Science Conference-Volume 48"}],"event":{"name":"2018 IEEE International Conference on Big Data (Big Data)","location":"Seattle, WA, USA","start":{"date-parts":[[2018,12,10]]},"end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610059\/8621858\/08622621.pdf?arnumber=8622621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:52:30Z","timestamp":1643226750000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8622621\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2018.8622621","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}