{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T09:12:50Z","timestamp":1778663570838,"version":"3.51.4"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Department of Health and Social Care UK","award":["Connected Health Cities project"],"award-info":[{"award-number":["Connected Health Cities project"]}]},{"DOI":"10.13039\/100004440","name":"Wellcome Trust","doi-asserted-by":"publisher","award":["102215"],"award-info":[{"award-number":["102215"]}],"id":[{"id":"10.13039\/100004440","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014013","name":"UKRI","doi-asserted-by":"crossref","award":["Innovation Fellowship"],"award-info":[{"award-number":["Innovation Fellowship"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000265","name":"Medical Research Council UK","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000265","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Data Sci."],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Data visualizations are a valuable tool used during both statistical analysis and the interpretation of results as they graphically reveal useful information about the structure, properties and relationships between variables, which may otherwise be concealed in tabulated data. In disciplines like medicine and the social sciences, where collected data include sensitive information about study participants, the sharing and publication of individual-level records is controlled by data protection laws and ethico-legal norms. Thus, as data visualizations \u2013 such as graphs and plots \u2013 may be linked to other released information and used to identify study participants and their personal attributes, their creation is often prohibited by the terms of data use. These restrictions are enforced to reduce the risk of breaching data subject confidentiality, however they limit analysts from displaying useful descriptive plots for their research features and findings.<\/jats:p><jats:p>Here we propose the use of anonymization techniques to generate privacy-preserving visualizations that retain the statistical properties of the underlying data while still adhering to strict data disclosure rules. We demonstrate the use of (i)\u00a0the well-known <jats:italic>k<\/jats:italic>-anonymization process which preserves privacy by reducing the granularity of the data using suppression and generalization, (ii) a novel deterministic approach that replaces individual-level observations with the centroids of each <jats:italic>k<\/jats:italic> nearest neighbours, and (iii) a probabilistic procedure that perturbs individual attributes with the addition of random stochastic noise. We apply the proposed methods to generate privacy-preserving data visualizations for exploratory data analysis and inferential regression plot diagnostics, and we discuss their strengths and limitations.<\/jats:p>","DOI":"10.1140\/epjds\/s13688-020-00257-4","type":"journal-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T14:14:40Z","timestamp":1610028880000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Privacy preserving data visualizations"],"prefix":"10.1140","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8908-2441","authenticated-orcid":false,"given":"Demetris","family":"Avraam","sequence":"first","affiliation":[]},{"given":"Rebecca","family":"Wilson","sequence":"additional","affiliation":[]},{"given":"Oliver","family":"Butters","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Burton","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Nicolaides","sequence":"additional","affiliation":[]},{"given":"Elinor","family":"Jones","sequence":"additional","affiliation":[]},{"given":"Andy","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Burton","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,7]]},"reference":[{"key":"257_CR1","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1146\/annurev-soc-071312-145551","volume":"40","author":"K Healy","year":"2014","unstructured":"Healy K, Moody J (2014) Data visualization in sociology. Annu Rev Sociol 40:105\u2013128. https:\/\/doi.org\/10.1146\/annurev-soc-071312-145551","journal-title":"Annu Rev Sociol"},{"key":"257_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1038\/nmeth.f.301","volume":"7","author":"SI O\u2019Donoghue","year":"2010","unstructured":"O\u2019Donoghue SI, Gavin A-C, Gehlenborg N, Goodsell DS, H\u00e9rich\u00e9 J-K, Nielsen CB, North C, Olson AJ, Procter JB, Shattuck DW, Walter T, Wong B (2010) Visualizing biological data\u2013now and in the future. Nat Methods 7:2\u20134. https:\/\/doi.org\/10.1038\/nmeth.f.301","journal-title":"Nat Methods"},{"issue":"1","key":"257_CR3","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1146\/annurev-biodatasci-080917-013424","volume":"1","author":"SI O\u2019Donoghue","year":"2018","unstructured":"O\u2019Donoghue SI, Baldi BF, Clark SJ, Darling AE, Hogan JM, Kaur S, Maier-Hein L, McCarthy DJ, Moore WJ, Stenau E, Swedlow JR, Vuong J, Procter JB (2018) Visualization of biomedical data. Annu Rev Biomed Data Sci 1(1):275\u2013304. https:\/\/doi.org\/10.1146\/annurev-biodatasci-080917-013424","journal-title":"Annu Rev Biomed Data Sci"},{"key":"257_CR4","doi-asserted-by":"publisher","first-page":"1290","DOI":"10.1145\/3025453.302591","volume-title":"Proceedings of the 2017 CHI conference on human factors in computing systems","author":"J Matejka","year":"2017","unstructured":"Matejka J, Fitzmaurice G (2017) Same stats, different graphs: generating datasets with varied appearance and identical statistics through simulated annealing. In: Proceedings of the 2017 CHI conference on human factors in computing systems. ACM, New York, pp 1290\u20131294. https:\/\/doi.org\/10.1145\/3025453.302591"},{"issue":"3","key":"257_CR5","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/S0378-7206(97)00041-4","volume":"33","author":"J Morrison","year":"1998","unstructured":"Morrison J, Vogel D (1998) The impacts of presentation visuals on persuasion. Inf Manag 33(3):125\u2013135. https:\/\/doi.org\/10.1016\/S0378-7206(97)00041-4","journal-title":"Inf Manag"},{"issue":"1","key":"257_CR6","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1177\/1075547014555997","volume":"37","author":"A Lazard","year":"2015","unstructured":"Lazard A, Atkinson L (2015) Putting environmental infographics center stage: the role of visuals at the elaboration likelihood model\u2019s critical point of persuasion. Sci Commun 37(1):6\u201333. https:\/\/doi.org\/10.1177\/1075547014555997","journal-title":"Sci Commun"},{"issue":"22","key":"257_CR7","doi-asserted-by":"publisher","first-page":"3040","DOI":"10.1002\/sim.6549","volume":"34","author":"SP Duke","year":"2015","unstructured":"Duke SP, Bancken F, Crowe B, Soukup M, Botsis T, Forshee R (2015) Seeing is believing: good graphic design principles for medical research. Stat Med 34(22):3040\u20133059. https:\/\/doi.org\/10.1002\/sim.6549","journal-title":"Stat Med"},{"key":"257_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7","volume-title":"The EU General Data Protection Regulation (GDPR): a practical guide","author":"P Voigt","year":"2017","unstructured":"Voigt P, von dem Bussche A (2017) The EU General Data Protection Regulation (GDPR): a practical guide, 1st edn. Springer, Berlin","edition":"1"},{"issue":"2","key":"257_CR9","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.clsr.2018.01.002","volume":"34","author":"M Mourby","year":"2018","unstructured":"Mourby M, Mackey E, Elliot M, Gowans H, Wallace SE, Bell J, Smith H, Aidinlis S, Kaye J (2018) Are \u2018pseudonymised\u2019 data always personal data? Implications of the GDPR for administrative data research in the UK. Comput Law Secur Rev 34(2):222\u2013233. https:\/\/doi.org\/10.1016\/j.clsr.2018.01.002","journal-title":"Comput Law Secur Rev"},{"key":"257_CR10","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-319-23633-9_9","volume-title":"Medical data privacy handbook","author":"N Shlomo","year":"2015","unstructured":"Shlomo N (2015) Statistical disclosure limitation for health data: a statistical agency perspective. In: Gkoulalas-Divanis A, Loukides G (eds) Medical data privacy handbook. Springer, Berlin, pp 201\u2013230"},{"issue":"20","key":"257_CR11","doi-asserted-by":"publisher","first-page":"3241","DOI":"10.1093\/bioinformatics\/btv279","volume":"31","author":"PR Burton","year":"2015","unstructured":"Burton PR, Murtagh MJ, Boyd A, Williams JB, Dove ES, Wallace SE, Tass\u00e9 A-M, Little J, Chisholm RL, Gaye A, Hveem K, Brookes AJ, Goodwin P, Fistein J, Bobrow M, Knoppers BM (2015) Data safe havens in health research and healthcare. Bioinformatics 31(20):3241\u20133248. https:\/\/doi.org\/10.1093\/bioinformatics\/btv279","journal-title":"Bioinformatics"},{"issue":"2","key":"257_CR12","doi-asserted-by":"publisher","DOI":"10.2196\/medinform.5571","volume":"4","author":"NC Lea","year":"2016","unstructured":"Lea NC, Nicholls J, Dobbs C, Sethi N, Cunningham J, Ainsworth J, Heaven M, Peacock T, Peacock A, Jones K, Laurie G, Kalra D (2016) Data safe havens and trust: toward a common understanding of trusted research platforms for governing secure and ethical health research. JMIR Med Inform 4(2):22. https:\/\/doi.org\/10.2196\/medinform.5571","journal-title":"JMIR Med Inform"},{"issue":"5","key":"257_CR13","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557\u2013570. https:\/\/doi.org\/10.1142\/S0218488502001648","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"key":"257_CR14","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.1007\/978-0-387-39940-9_1496","volume-title":"Encyclopedia of database systems","author":"J Domingo-Ferrer","year":"2009","unstructured":"Domingo-Ferrer J (2009) Microaggregation. In: Liu L, \u00d6zsu MT (eds) Encyclopedia of database systems. Springer, Boston, pp 1736\u20131737"},{"issue":"4","key":"257_CR15","doi-asserted-by":"publisher","first-page":"433","DOI":"10.14301\/llcs.v9i4.478","volume":"9","author":"D Avraam","year":"2018","unstructured":"Avraam D, Boyd A, Goldstein H, Burton P (2018) A software package for the application of probabilistic anonymisation to sensitive individual-level data: a proof of principle with an example from the ALSPAC birth cohort study. Longit Life Course Stud 9(4):433\u2013446. https:\/\/doi.org\/10.14301\/llcs.v9i4.478","journal-title":"Longit Life Course Stud"},{"key":"257_CR16","volume-title":"PODS \u201905","author":"S Zhong","year":"2005","unstructured":"Zhong S, Yang Z, Wright R (2005) Privacy-enhancing k-anonymization of customer data. In: PODS \u201905"},{"issue":"1","key":"257_CR17","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-014-0010-4","volume":"3","author":"A Monreale","year":"2014","unstructured":"Monreale A, Rinzivillo S, Pratesi F, Giannotti F, Pedreschi D (2014) Privacy-by-design in big data analytics and social mining. EPJ Data Sci 3(1):10. https:\/\/doi.org\/10.1140\/epjds\/s13688-014-0010-4","journal-title":"EPJ Data Sci"},{"key":"257_CR18","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/1055558.1055591","volume-title":"PODS \u201904 proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems","author":"A Meyerson","year":"2004","unstructured":"Meyerson A, Williams R (2004) On the complexity of optimal k-anonymity. In: PODS \u201904 proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems. ACM, New York, pp 223\u2013228. https:\/\/doi.org\/10.1145\/1055558.1055591"},{"key":"257_CR19","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0110-7","volume":"5","author":"K Abouelmehdi","year":"2018","unstructured":"Abouelmehdi K, Beni-Hessane A, Khaloufi H (2018). Big healthcare data: preserving security and privacy. J Big Data 5:1. https:\/\/doi.org\/10.1186\/s40537-017-0110-7","journal-title":"J Big Data"},{"issue":"4","key":"257_CR20","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/s10742-016-0162-8","volume":"16","author":"GJ Matthews","year":"2016","unstructured":"Matthews GJ, Harel O, Aseltine RH (2016) Privacy protection and aggregate health data: a review of tabular cell suppression methods (not) employed in public health data systems. Health Serv Outcomes Res Methodol 16(4):258\u2013270. https:\/\/doi.org\/10.1007\/s10742-016-0162-8","journal-title":"Health Serv Outcomes Res Methodol"},{"issue":"432","key":"257_CR21","doi-asserted-by":"publisher","first-page":"1453","DOI":"10.2307\/2291538","volume":"90","author":"LH Cox","year":"1995","unstructured":"Cox LH (1995) Network models for complementary cell suppression. J Am Stat Assoc 90(432):1453\u20131462. https:\/\/doi.org\/10.2307\/2291538","journal-title":"J Am Stat Assoc"},{"issue":"1","key":"257_CR22","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.aci.2014.10.001","volume":"12","author":"DA Adeniyi","year":"2016","unstructured":"Adeniyi DA, Wei Z, Yongquan Y (2016) Automated web usage data mining and recommendation system using k-nearest neighbor (knn) classification method. Appl Comput Inform 12(1):90\u2013108. https:\/\/doi.org\/10.1016\/j.aci.2014.10.001","journal-title":"Appl Comput Inform"},{"key":"257_CR23","series-title":"Data handling in science and technology","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/B978-0-444-63984-4.00012-0","volume-title":"Data fusion methodology and applications","author":"JH Kalivas","year":"2019","unstructured":"Kalivas JH (2019) Data fusion of nonoptimized models: applications to outlier detection, classification, and image library searching. In: Cocchi M (ed) Data fusion methodology and applications. Data handling in science and technology, vol 31. Elsevier, Amsterdam, pp 345\u2013370. https:\/\/doi.org\/10.1016\/B978-0-444-63984-4.00012-0"},{"key":"257_CR24","first-page":"207","volume":"10","author":"KQ Weinberger","year":"2009","unstructured":"Weinberger KQ, Saul LK (2009) Distance metric learning for large margin nearest neighbor classification. J Mach Learn Res 10:207\u2013244","journal-title":"J Mach Learn Res"},{"issue":"2","key":"257_CR25","first-page":"383","volume":"9","author":"WA Fuller","year":"1993","unstructured":"Fuller WA (1993) Masking procedures for microdata disclosure limitation. J Off Stat 9(2):383\u2013406","journal-title":"J Off Stat"},{"issue":"4","key":"257_CR26","first-page":"463","volume":"14","author":"JM Gouweleeuw","year":"1998","unstructured":"Gouweleeuw JM, Kooiman P, Willenborg LCRJ, Wolf P-P (1998) Post randomisation for statistical disclosure control: theory and implementation. J Off Stat 14(4):463\u2013478","journal-title":"J Off Stat"},{"key":"257_CR27","unstructured":"Ritchie F (2012) Output-based disclosure control for regressions. Technical report, University of the West of England"},{"key":"257_CR28","series-title":"Chapman & Hall\/CRC monographs on statistics & applied probability.","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3242-6","volume-title":"Generalized linear models","author":"P McCullagh","year":"1989","unstructured":"McCullagh P, Nelder JA (1989) Generalized linear models, 2nd edn. Chapman & Hall\/CRC monographs on statistics & applied probability. Chapman & Hall, London","edition":"2"},{"key":"257_CR29","volume-title":"Monographs on statistics and applied probability","author":"RD Cook","year":"1982","unstructured":"Cook RD, Weisberg S (1982) Residuals and influence in regression. In: Cox DR, Hinkley IV (eds) Monographs on statistics and applied probability Chapman & Hall, New York"},{"issue":"2","key":"257_CR30","first-page":"181","volume":"36","author":"DA Williams","year":"1987","unstructured":"Williams DA (1987) Generalized linear model diagnostics using the deviance and single case deletions. J R Stat Soc, Ser C, Appl Stat 36(2):181\u2013191","journal-title":"J R Stat Soc, Ser C, Appl Stat"},{"issue":"6","key":"257_CR31","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.1093\/ije\/dyu188","volume":"43","author":"A Gaye","year":"2014","unstructured":"Gaye A, Marcon Y, Isaeva J, LaFlamme P, Turner A, Jones EM, Minion J, Boyd AW, Newby CJ, Nuotio M-L, Wilson R, Butters O, Murtagh B, Demir I, Doiron D, Giepmans L, Wallace SE, Budin-Ljosne I, Oliver Schmidt C, Boffetta P, Boniol M, Bota M, Carter KW, DeKlerk N, Dibben C, Francis RW, Hiekkalinna T, Hveem K, Kvaloy K, Millar S, Perry IJ, Peters A, Phillips CM, Popham F, Raab G, Reischl E, Sheehan N, Waldenberger M, Perola M, van den Heuvel E, Macleod J, Knoppers BM, Stolk RP, Fortier I, Harris JR, Woffenbuttel BHR, Murtagh MJ, Ferretti V, Burton PR (2014) DataSHIELD: taking the analysis to the data, not the data to the analysis. Int J Epidemiol 43(6):1929\u20131944. https:\/\/doi.org\/10.1093\/ije\/dyu188","journal-title":"Int J Epidemiol"},{"key":"257_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5334\/dsj-2017-021","volume":"16","author":"RC Wilson","year":"2017","unstructured":"Wilson RC, Butters OW, Avraam D, Baker J, Tedds JA, Turner A, Murtagh M, Burton PR (2017) DataSHIELD - new directions and dimensions. Data Sci J 16:1\u201321. https:\/\/doi.org\/10.5334\/dsj-2017-021","journal-title":"Data Sci J"},{"key":"257_CR33","doi-asserted-by":"publisher","unstructured":"Avraam D, Wilson R, Burton P (2017) Synthetic ALSPAC longitudinal datasets for the Big Data VR project. Wellcome Open Res 2(74). https:\/\/doi.org\/10.12688\/wellcomeopenres.12441.1","DOI":"10.12688\/wellcomeopenres.12441.1"},{"key":"257_CR34","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/ICDEW.2006.46","volume-title":"22nd International Conference on Data Engineering Workshops (ICDEW\u201906)","author":"G Skinner","year":"2006","unstructured":"Skinner G, Han S, Chang E (2006) Defining and protecting meta privacy: a new conceptual framework within information privacy. In: 22nd International Conference on Data Engineering Workshops (ICDEW\u201906), p 101. https:\/\/doi.org\/10.1109\/ICDEW.2006.46"},{"issue":"5","key":"257_CR35","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1197\/jamia.M2716","volume":"15","author":"K El Emam","year":"2008","unstructured":"El Emam K, Dankar FK (2008) Protecting privacy using k-anonymity. J Am Med Inform Assoc 15(5):627\u2013637. https:\/\/doi.org\/10.1197\/jamia.M2716","journal-title":"J Am Med Inform Assoc"},{"key":"257_CR36","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/COMPSAC.2016.198","volume-title":"2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)","author":"O Angiuli","year":"2016","unstructured":"Angiuli O, Waldo J (2016) Statistical tradeoffs between generalization and suppression in the de-identification of large-scale data sets. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), pp 589\u2013593. https:\/\/doi.org\/10.1109\/COMPSAC.2016.198"},{"key":"257_CR37","first-page":"901","volume-title":"Proceedings of the 31st international conference on very large data bases","author":"CC Aggarwal","year":"2005","unstructured":"Aggarwal CC (2005) On k-anonymity and the curse of dimensionality. In: Proceedings of the 31st international conference on very large data bases. VLDB Endowment, Trondheim, pp 901\u2013909"},{"key":"257_CR38","unstructured":"Bhowmik A, Ghosh J, Koyejo O (2015) Generalized linear models for aggregated data. Proceedings of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS)"},{"issue":"4","key":"257_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v067.i04","volume":"67","author":"M Templ","year":"2015","unstructured":"Templ M, Kowarik A, Meindl B (2015) Statistical disclosure control for micro-data using the R package sdcMicro. J Stat Softw 67(4):1\u201336. https:\/\/doi.org\/10.18637\/jss.v067.i04","journal-title":"J Stat Softw"},{"issue":"5","key":"257_CR40","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1080\/02664763.2017.1322558","volume":"45","author":"H Goldstein","year":"2018","unstructured":"Goldstein H, Browne WJ, Charlton C (2018) A Bayesian model for measurement and misclassification errors alongside missing data, with an application to higher education participation in Australia. J Appl Stat 45(5):918\u2013931. https:\/\/doi.org\/10.1080\/02664763.2017.1322558","journal-title":"J Appl Stat"}],"container-title":["EPJ Data Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-020-00257-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1140\/epjds\/s13688-020-00257-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-020-00257-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T14:15:22Z","timestamp":1610028922000},"score":1,"resource":{"primary":{"URL":"https:\/\/epjdatascience.springeropen.com\/articles\/10.1140\/epjds\/s13688-020-00257-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,7]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["257"],"URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-020-00257-4","relation":{},"ISSN":["2193-1127"],"issn-type":[{"value":"2193-1127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,7]]},"assertion":[{"value":"20 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"2"}}