{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:30:12Z","timestamp":1730277012710,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T00:00:00Z","timestamp":1605139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T00:00:00Z","timestamp":1605139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T00:00:00Z","timestamp":1605139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,12]]},"DOI":"10.1109\/istas50296.2020.9462236","type":"proceedings-article","created":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T22:31:27Z","timestamp":1624919487000},"page":"394-401","source":"Crossref","is-referenced-by-count":1,"title":["Tesseract Optimization for Data Privacy and Sharing Economics"],"prefix":"10.1109","author":[{"given":"Shubhadip","family":"Ray","sequence":"first","affiliation":[]},{"given":"Tharangini","family":"Palanivel","sequence":"additional","affiliation":[]},{"given":"Norbert","family":"Herman","sequence":"additional","affiliation":[]},{"given":"Yixuan","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S1441-3582(06)70052-0"},{"key":"ref11","first-page":"227","article-title":"Factors that influence Internet users&#x2019; privacy perception","volume":"iti","author":"mekovec","year":"2011","journal-title":"Proc of 26th International Conference on Information Technology Interface"},{"journal-title":"Privacy and Information Sharing","year":"2016","author":"rainie","key":"ref12"},{"journal-title":"To Share or Not to Share?","year":"2017","author":"cavallaro","key":"ref13"},{"journal-title":"Data Privacy Day 2019 Reminds Businesses and Consumers About the Value of Personal Data and the Need to Protect It","year":"2019","key":"ref14"},{"journal-title":"Survey 58% will share personal data under the right circumstances","year":"2018","author":"sterling","key":"ref15"},{"journal-title":"The Personal Data Locker A Project Whose Time Has Come","year":"2019","author":"siegel","key":"ref16"},{"journal-title":"The wired guide to your personal data (and who is using it)","year":"2019","author":"matsakis","key":"ref17"},{"key":"ref18","article-title":"The Nature and Predictive Power of P: Global Evidence","author":"falk","year":"2015","journal-title":"IZA Discussion Paper No 9504"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102807"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/10548408.2013.751237"},{"journal-title":"Facebook blasts Apple in new ads over iPhone privacy change","year":"2020","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.62.16949"},{"journal-title":"Travel and tourism industry in the U S - Statistics & Facts","year":"2019","author":"lock","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-007-9000-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"journal-title":"PEW Trusts Health Care & U S Policy Projects Health Information Technology","year":"2017","key":"ref2"},{"journal-title":"Winning over the empowered consumer - Why trust matters","year":"2011","key":"ref1"},{"journal-title":"Guidance on the protection of personal identifiable information","year":"0","key":"ref9"},{"key":"ref20","article-title":"Privacy Personalization Paradox. The study of GDPR Policy as a potential solution","author":"katarzyna","year":"2019","journal-title":"Jagiellonian University Repository"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2020.02.006"},{"key":"ref21","article-title":"Towards Solving the Personalization-Privacy Paradox for Smart Personal Assistants","author":"knote","year":"2019","journal-title":"Hawaii International Conference on System Sciences (HICSS)"}],"event":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","start":{"date-parts":[[2020,11,12]]},"location":"Tempe, AZ, USA","end":{"date-parts":[[2020,11,15]]}},"container-title":["2020 IEEE International Symposium on Technology and Society (ISTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9462115\/9462166\/09462236.pdf?arnumber=9462236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:50:14Z","timestamp":1656453014000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9462236\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/istas50296.2020.9462236","relation":{},"subject":[],"published":{"date-parts":[[2020,11,12]]}}}