{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:51:23Z","timestamp":1772113883697,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1109\/isi53945.2021.9624816","type":"proceedings-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T23:55:42Z","timestamp":1638316542000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Quantifying Use and Abuse of Personal Information"],"prefix":"10.1109","author":[{"given":"Joe","family":"Harrison","sequence":"first","affiliation":[]},{"given":"Joshua","family":"Lyons","sequence":"additional","affiliation":[]},{"given":"Lauren","family":"Anderson","sequence":"additional","affiliation":[]},{"given":"Lauren","family":"Maunder","sequence":"additional","affiliation":[]},{"given":"Paul","family":"O'Donnell","sequence":"additional","affiliation":[]},{"given":"Kiernan B.","family":"George","sequence":"additional","affiliation":[]},{"given":"Alan J.","family":"Michaels","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"2021","journal-title":"uBlock Origin"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.04.005"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21752-5_2"},{"key":"ref13","author":"pridohl","year":"2020","journal-title":"Privacyscanner"},{"key":"ref14","first-page":"1129","article-title":"FPDetective: dusting the web for fingerprinters","author":"acar","year":"2013","journal-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security"},{"key":"ref15","first-page":"397","article-title":"Who&#x2019;s calling? Characterizing robocalls through audio and metadata analysis","author":"prasad","year":"2020","journal-title":"29th USENIX Security Symposium"},{"key":"ref16","article-title":"PR3 email honeypot","author":"seigneur","year":"2003","journal-title":"Tech Rep TCD-CS-2003-39"},{"key":"ref17","year":"2018","journal-title":"Race and ethnicity in the united states"},{"key":"ref18","year":"2020","journal-title":"Get a whole new identity at the fake name generator"},{"key":"ref19","year":"2021"},{"key":"ref4","author":"ramadorai","year":"2019","journal-title":"The market for data privacy"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3361758.3361784"},{"key":"ref6","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"ref8","author":"altaweel","year":"2015","journal-title":"Web privacy census"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12927-012-0008-z"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5220\/0006362103630369"},{"key":"ref9","year":"2021","journal-title":"Easylist"},{"key":"ref20","year":"2021"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v8i1.14550","article-title":"Vader: A parsimonious rule-based model for sentiment analysis of social media text","volume":"8","author":"hutto","year":"2014","journal-title":"Proceedings of the International AAAI Conference on Web and Social Media"},{"key":"ref21","author":"michaels","year":"2021","journal-title":"UaA GitHub"}],"event":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","location":"San Antonio, TX, USA","start":{"date-parts":[[2021,11,2]]},"end":{"date-parts":[[2021,11,3]]}},"container-title":["2021 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9624673\/9624675\/09624816.pdf?arnumber=9624816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T20:01:31Z","timestamp":1673899291000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9624816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isi53945.2021.9624816","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]}}}