{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:11:47Z","timestamp":1729642307105,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/vlhcc.2013.6645245","type":"proceedings-article","created":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T20:13:08Z","timestamp":1383163988000},"page":"67-74","source":"Crossref","is-referenced-by-count":1,"title":["Protecting privacy: Towards a visual framework for handling end-user data"],"prefix":"10.1109","author":[{"given":"Ian","family":"Oliver","sequence":"first","affiliation":[]},{"given":"John","family":"Howse","sequence":"additional","affiliation":[]},{"given":"Gem","family":"Stapleton","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A Characterisation of Entropy in Terms of Information Loss","year":"0","author":"baez","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863568"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.12.019"},{"key":"12","first-page":"547","article-title":"Measures of information and entropy","author":"re?nyi","year":"0","journal-title":"Proceedings of the 4th Berkeley Symposium on Mathematics Statistics and Probability 1960"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.2001.0213"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","author":"nissenbaum","year":"2009","journal-title":"Privacy in Context Technology Policy and the Integrity of Social Life"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"journal-title":"Amendment to the Directive of Privacy and Electronic Communications","first-page":"136","year":"2009","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25073-6_17"},{"key":"6","first-page":"87","article-title":"Visualising and specifying ontologies using diagrammatic logics","volume":"112","author":"oliver","year":"2009","journal-title":"5thAustralasian Ontologies Workshop"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2011.6070384"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/203241.203251"},{"journal-title":"Directive of Privacy and Electronic Communications","year":"0","key":"9"},{"key":"8","first-page":"763","article-title":"The new casper: Query processing for location services without compromising privacy","author":"mokbel","year":"2006","journal-title":"VLDB '06"}],"event":{"name":"2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","start":{"date-parts":[[2013,9,15]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2013,9,19]]}},"container-title":["2013 IEEE Symposium on Visual Languages and Human Centric Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6631549\/6645226\/06645245.pdf?arnumber=6645245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T22:47:47Z","timestamp":1646952467000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6645245"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/vlhcc.2013.6645245","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}