{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T22:20:25Z","timestamp":1758925225939},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IT Prof."],"published-print":{"date-parts":[[2020,9,1]]},"DOI":"10.1109\/mitp.2020.2992148","type":"journal-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T20:40:54Z","timestamp":1599770454000},"page":"4-12","source":"Crossref","is-referenced-by-count":5,"title":["Is Privacy Dead?"],"prefix":"10.1109","volume":"22","author":[{"given":"Nir","family":"Kshetri","sequence":"first","affiliation":[{"name":"University of North Carolina at Greensboro"}]},{"given":"Joanna F.","family":"DeFranco","sequence":"additional","affiliation":[{"name":"Penn State Great Valley School of Graduate Professional Studie"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Report: FBI spent $3 million on drones","author":"rosenberg","year":"2013"},{"key":"ref38","author":"noubir","year":"2018"},{"key":"ref33","article-title":"Huawei's video surveillance business hits snag in Philippines","author":"mandhana","year":"2019"},{"key":"ref32","article-title":"Will China use big data as a tool of the state?","author":"palmer","year":"2015"},{"key":"ref31","article-title":"One month, 500,000 face scans: How China is using A.I. to profile a minority","author":"mozur","year":"2019"},{"key":"ref30","article-title":"Xinjiang's new slavery","author":"zenz","year":"2019"},{"key":"ref37","article-title":"Will &#x2018;Stalking Apps&#x2019; be stopped?","author":"cohen","year":"2013"},{"key":"ref36","article-title":"Ecuador's all-seeing eye is made in China","author":"rollet","year":"2018"},{"key":"ref35","article-title":"Chinese facial recognition tech installed in nations vulnerable to abuse","author":"getty","year":"2019"},{"key":"ref34","article-title":"Big brother Huawei kitted out this Philippine city. Is China watching?","author":"o'rourke","year":"2019"},{"key":"ref10","article-title":"The economics of data","author":"carri\u00e8re-swallow","year":"2019"},{"key":"ref40","article-title":"Researcher: Data on 267 million Facebook users exposed","author":"bajak","year":"2019"},{"key":"ref11","article-title":"If privacy is dead, what can we do instead?","author":"hoanca","year":"2017"},{"key":"ref12","article-title":"Will the US get a federal privacy law?","author":"goswami","year":"2019"},{"key":"ref13","article-title":"5 things Google got right in 2019 &#x2013; and 5 it got wrong","author":"mccracken","year":"2019"},{"key":"ref14","article-title":"Facebook gave use data to 60 companies including Apple, Amazon, and Samsung","author":"chan","year":"2018"},{"key":"ref15","article-title":"Revealed:50 million Facebook profiles harvested for Cambridge Analytica in major data breach","author":"cadwalladr","year":"2018"},{"key":"ref16","article-title":"Facebook &#x2018;labels&#x2019; posts by hand, posing privacy questions","author":"vengattil","year":"2019","journal-title":"Reuters"},{"key":"ref17","article-title":"If Privacy Is Dead, What Can We Do Instead?","author":"hoanca","year":"2017"},{"key":"ref18","article-title":"Google reveals just how much of the world it's mapped with Street View and Earth","author":"gartenberg","year":"2019"},{"key":"ref19","article-title":"How a Google Street View image of your house predicts your risk of a car accident","year":"2019"},{"key":"ref28","article-title":"One month, 500,000 face scans: How china is using A.I. to profile a minority","author":"mozur","year":"2019"},{"key":"ref4","article-title":"Formulating values for AI is hard when humans do not agree","author":"thornhill","year":"2019"},{"key":"ref27","article-title":"China's data privacy outcry fuels case for tighter rules","author":"yang","year":"2018"},{"key":"ref3","article-title":"FTC imposes $5 billion penalty and sweeping new privacy restrictions on facebook","year":"2019"},{"key":"ref6","article-title":"Revealed: 50 million facebook profiles harvested for Cambridge Analytica in major data breach","author":"cadwalladr","year":"2018"},{"key":"ref29","article-title":"One month, 500,000 face scans: How China is using A.I. to profile a minority","author":"mozur","year":"2019"},{"key":"ref5","article-title":"U.S. FTC finds Cambridge Analytica deceived facebook users","author":"bose","year":"2019"},{"key":"ref8","article-title":"China's data privacy outcry fuels case for tighter rules","author":"yang","year":"2018"},{"key":"ref7","article-title":"The 10 biggest brand data breaches of the decade","author":"slefo","year":"2019"},{"key":"ref2","article-title":"Change your phone settings so Apple, Google can't track your movements","author":"king","year":"2019"},{"key":"ref9","article-title":"Online credit services in China accused of abusing personal data","year":"2015"},{"key":"ref1","article-title":"How Americans have viewed government surveillance and privacy since Snowden leaks","author":"geiger","year":"2018"},{"key":"ref20","article-title":"Google concedes that drive-by prying violated privacy","author":"streitfeld","year":"2013"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.intman.2005.09.010"},{"key":"ref22","article-title":"Demanding transparency from data brokers","author":"brill","year":"2013"},{"key":"ref21","article-title":"Google's &#x2018;Project Nightingale&#x2019; gathers personal health data on millions of Americans","author":"copeland","year":"2019"},{"key":"ref42","article-title":"Remarks: Big data, big issues","author":"brill","year":"2012"},{"key":"ref24","article-title":"China's cyber watchdog scolds Ant Financial over user privacy breach","year":"2018"},{"key":"ref41","article-title":"The economics of data","author":"carri\u00e8re-swallow","year":"2019"},{"key":"ref23","article-title":"Google's &#x2018;Project Nightingale&#x2019; gathers personal health data on millions of americans","author":"copeland","year":"2019"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2014.10.002"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.11.014"},{"key":"ref43","article-title":"Patients sue Walgreens for making money on their data","author":"manos","year":"2011"},{"key":"ref25","article-title":"Alipay makes changes after privacy criticism","author":"wei","year":"2018"}],"container-title":["IT Professional"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6294\/9194371\/09194429.pdf?arnumber=9194429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T20:05:24Z","timestamp":1651608324000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9194429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,1]]},"references-count":45,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/mitp.2020.2992148","relation":{},"ISSN":["1520-9202","1941-045X"],"issn-type":[{"value":"1520-9202","type":"print"},{"value":"1941-045X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,1]]}}}