{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:25:53Z","timestamp":1740144353134,"version":"3.37.3"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/tifs.2017.2769025","type":"journal-article","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T20:36:49Z","timestamp":1509568609000},"page":"874-887","source":"Crossref","is-referenced-by-count":3,"title":["Plausible Deniability in Web Search\u2014From Detection to Assessment"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7640-9668","authenticated-orcid":false,"given":"Pol","family":"Mac Aonghusa","sequence":"first","affiliation":[]},{"given":"Douglas J.","family":"Leith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1186\/s13174-016-0044-x"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/TNET.2011.2178036"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1002\/spe.2403"},{"key":"ref32","first-page":"169","article-title":"Privad: Practical privacy in online advertising","author":"guha","year":"2011","journal-title":"Proc 8th USENIX Conf Netw Syst Design Implement (NSDI)"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/SP.2011.37"},{"key":"ref30","article-title":"XRay: Enhancing the Web&#x2019;s transparency with differential correlation","volume":"abs 1407 2323","author":"lecuyer","year":"2014","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1007\/978-3-642-14527-8_2"},{"year":"2016","journal-title":"A users guide how to raise information security awareness","key":"ref36"},{"year":"2016","journal-title":"Fake Privacy Gadgets From Anonabox to Sever Fighting a Strange and Profitable Epidemic","key":"ref35"},{"year":"2016","journal-title":"Charlatans The New Wave of Privacy Profiteers","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.14778\/3055540.3055542"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.14722\/ndss.2015.23163"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1287\/opre.2015.1458"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.ins.2013.04.007"},{"year":"2011","author":"pariser","journal-title":"The Filter Bubble What the Internet Is Hiding from You","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2460276.2460278"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/1879141.1879152"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.datak.2009.06.004"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.ins.2012.06.025"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2911451.2914753"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2676733.2676734"},{"year":"2016","journal-title":"Mozilla Lightbeam","key":"ref28"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/2488388.2488435"},{"year":"2016","journal-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-319-04483-5_5"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","author":"nissenbaum","year":"2009","journal-title":"Privacy in Context Technology Policy and the Integrity of Social Life"},{"year":"2016","journal-title":"Privacy Badger","key":"ref29"},{"key":"ref5","first-page":"745","article-title":"&#x2018;I&#x2019;ve got nothing to hide&#x2019; and other misunderstandings of privacy","volume":"44","author":"solove","year":"2007","journal-title":"San Diego Law Review"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-642-36973-5_31"},{"year":"2011","author":"boyd","article-title":"Social privacy in networked publics: Teens&#x2019; attitudes, practices, and strategies","key":"ref7"},{"key":"ref2","article-title":"Don&#x2019;t let Google know I&#x2019;m lonely","volume":"19","author":"aonghusa","year":"2016","journal-title":"ACM Trans Privacy Secur"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-3-642-20161-5_13"},{"year":"2017","journal-title":"Online Oxford English Dictionary","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/Trustcom.2015.421"},{"key":"ref22","first-page":"417","article-title":"TrackMeNot: Resisting surveillance in Web search","author":"howe","year":"2009","journal-title":"Lessons from the Identity Trail Anonymity Privacy and Identity in a Networked Society"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/SP.2012.36"},{"key":"ref42","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"year":"2016","journal-title":"Timeline of Web Search Engines&#x2014;Wikipedia The Free Encyclopedia","key":"ref24"},{"key":"ref41","article-title":"Measuring the effectiveness of privacy tools for limiting behavioral advertising","author":"balebako","year":"2012","journal-title":"Semantic Scholar"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/2030112.2030139"},{"year":"2016","journal-title":"History of Search Engines&#x2014;Chronological List of Internet Search Engines&#x2014;WordStream","key":"ref26"},{"year":"2016","journal-title":"Search Engine History","key":"ref25"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8245900\/08091296.pdf?arnumber=8091296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:23:14Z","timestamp":1642004594000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8091296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":42,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2769025","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2018,4]]}}}