{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:15:51Z","timestamp":1775283351820,"version":"3.50.1"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2008,10,1]],"date-time":"2008-10-01T00:00:00Z","timestamp":1222819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2008,10]]},"abstract":"<jats:p>As popular search engines face the sometimes conflicting interests of protecting privacy while retaining query logs for a variety of uses, numerous technical measures have been suggested to both enhance privacy and preserve at least a portion of the utility of query logs. This article seeks to assess seven of these techniques against three sets of criteria: (1) how well the technique protects privacy, (2) how well the technique preserves the utility of the query logs, and (3) how well the technique might be implemented as a user control. A user control is defined as a mechanism that allows individual Internet users to choose to have the technique applied to their own query logs.<\/jats:p>","DOI":"10.1145\/1409220.1409222","type":"journal-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T12:18:30Z","timestamp":1225196310000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":60,"title":["A survey of query log privacy-enhancing techniques from a policy perspective"],"prefix":"10.1145","volume":"2","author":[{"given":"Alissa","family":"Cooper","sequence":"first","affiliation":[{"name":"Center for Democracy &amp; Technology, District of Columbia"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the 16th International World Wide Web Conference (WWW'07)","author":"Adar E.","year":"2007"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148177"},{"key":"e_1_2_1_3_1","unstructured":"Article 29 Data Protection Working Party. 2008. Opinion on data protection issues related to search engines. http:\/\/www.cbpweb.nl\/downloads_int\/Opinie%20WP29%20zoekmachines.pdf.  Article 29 Data Protection Working Party. 2008. Opinion on data protection issues related to search engines. http:\/\/www.cbpweb.nl\/downloads_int\/Opinie%20WP29%20zoekmachines.pdf."},{"key":"e_1_2_1_4_1","unstructured":"Ask.com. 2007. Ask.com puts you in control of your search privacy with the launch of \u2018AskEraser\u2019. http:\/\/www.irconnect.com\/ask\/pages\/news_releases.html?d=132847.  Ask.com. 2007. Ask.com puts you in control of your search privacy with the launch of \u2018AskEraser\u2019. http:\/\/www.irconnect.com\/ask\/pages\/news_releases.html?d=132847."},{"key":"e_1_2_1_5_1","unstructured":"Barbaro M. and Zeller T. 2006. A face is exposed for AOL searcher no. 4417749. In The New York Times. http:\/\/www.nytimes.com\/2006\/08\/09\/technology\/09aol.html?ex=1312776000.  Barbaro M. and Zeller T. 2006. A face is exposed for AOL searcher no. 4417749. In The New York Times. http:\/\/www.nytimes.com\/2006\/08\/09\/technology\/09aol.html?ex=1312776000."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 16th International World Wide Web Conference (WWW'07)","author":"Bar-Ilan J.","year":"2007"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009048"},{"key":"e_1_2_1_8_1","unstructured":"Center for Democracy &amp; Technology. 2006. Digital search &amp; seizure: Updating privacy protections to keep pace with technology. http:\/\/www.cdt.org\/publications\/digital-search-and-seizure.pdf.  Center for Democracy &amp; Technology. 2006. Digital search &amp; seizure: Updating privacy protections to keep pace with technology. http:\/\/www.cdt.org\/publications\/digital-search-and-seizure.pdf."},{"key":"e_1_2_1_9_1","unstructured":"Center for Democracy &amp; Technology. 2007. Search privacy practices: A work in progress. http:\/\/www.cdt.org\/privacy\/20070808searchprivacy.pdf.  Center for Democracy &amp; Technology. 2007. Search privacy practices: A work in progress. http:\/\/www.cdt.org\/privacy\/20070808searchprivacy.pdf."},{"key":"e_1_2_1_10_1","unstructured":"Cranor L. 2007. Making privacy disclosures to consumers more usable. http:\/\/www.ftc.gov\/bcp\/workshops\/ehavioral\/presentations\/6lcranor.pdf.  Cranor L. 2007. Making privacy disclosures to consumers more usable. http:\/\/www.ftc.gov\/bcp\/workshops\/ehavioral\/presentations\/6lcranor.pdf."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277953"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511489"},{"key":"e_1_2_1_13_1","unstructured":"European Parliament. 1995. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:31995L0046:EN:NOT.  European Parliament. 1995. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:31995L0046:EN:NOT."},{"key":"e_1_2_1_14_1","unstructured":"European Parliament and the Council of the European Union. 2006. Directive on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002\/58\/EC. http:\/\/www.ispai.ie\/DR%20as%20published%20OJ%2013-04-06.pdf.  European Parliament and the Council of the European Union. 2006. Directive on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002\/58\/EC. http:\/\/www.ispai.ie\/DR%20as%20published%20OJ%2013-04-06.pdf."},{"key":"e_1_2_1_15_1","unstructured":"Fleischer P. 2007. Google response to Data Protection Working Party. http:\/\/64.233.179.110\/blog_resources\/Google_response_Working_Party_06_2007.pdf.  Fleischer P. 2007. Google response to Data Protection Working Party. http:\/\/64.233.179.110\/blog_resources\/Google_response_Working_Party_06_2007.pdf."},{"key":"e_1_2_1_16_1","first-page":"447","article-title":"Are Google searches private&quest; An originalist interpretation of the fourth amendment in online communication cases","volume":"22","author":"Foley J.","year":"2007","journal-title":"Berkeley Techn. Law J."},{"key":"e_1_2_1_17_1","unstructured":"Google. 2007. Google search privacy: Personalized search. http:\/\/youtube.com\/watch?v=UsUBnPRtTbI.  Google. 2007. Google search privacy: Personalized search. http:\/\/youtube.com\/watch?v=UsUBnPRtTbI."},{"key":"e_1_2_1_18_1","unstructured":"Government Accountability Office. 2007. B-308603 presidential signing statements accompanying the fiscal year 2006 appropriations acts. http:\/\/www.gao.gov\/decisions\/appro\/308603.htm.  Government Accountability Office. 2007. B-308603 presidential signing statements accompanying the fiscal year 2006 appropriations acts. http:\/\/www.gao.gov\/decisions\/appro\/308603.htm."},{"key":"e_1_2_1_19_1","volume-title":"Identity Trail: Privacy, Anonymity and Identity in a Networked Society","author":"Howe D.","year":"2008"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775067"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321573"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135835"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242657"},{"key":"e_1_2_1_24_1","unstructured":"Microsoft. 2007. Microsoft privacy principles for live search and online ad targeting. http:\/\/download.microsoft.com\/download\/3\/7\/f\/37f14671-ddee-499b-a794-077b3673f186\/Microsoft%E2%80%99s%20Privacy%20Principles%20for%20Live%20Search%20and%20Online%20Ad%20Targeting.pdf.  Microsoft. 2007. Microsoft privacy principles for live search and online ad targeting. http:\/\/download.microsoft.com\/download\/3\/7\/f\/37f14671-ddee-499b-a794-077b3673f186\/Microsoft%E2%80%99s%20Privacy%20Principles%20for%20Live%20Search%20and%20Online%20Ad%20Targeting.pdf."},{"key":"e_1_2_1_25_1","unstructured":"Microsoft. 2006. Microsoft live labs: Accelerating search in academic research. http:\/\/research.microsoft.com\/ur\/us\/fundingopps\/RFPs\/Search_2006_RFP.aspx.  Microsoft. 2006. Microsoft live labs: Accelerating search in academic research. http:\/\/research.microsoft.com\/ur\/us\/fundingopps\/RFPs\/Search_2006_RFP.aspx."},{"key":"e_1_2_1_26_1","unstructured":"Nakashima E. 2006. AOL takes down site with users' search data. The Washington Post. http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2006\/08\/07\/AR2006080701150.html.  Nakashima E. 2006. AOL takes down site with users' search data. The Washington Post. http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2006\/08\/07\/AR2006080701150.html."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081899"},{"key":"e_1_2_1_28_1","unstructured":"Rasch M. 2006. Google's data minefield. In The Register. http:\/\/www.theregister.co.uk\/2006\/01\/31\/google_subpoena_us_government\/.  Rasch M. 2006. Google's data minefield. In The Register. http:\/\/www.theregister.co.uk\/2006\/01\/31\/google_subpoena_us_government\/."},{"key":"e_1_2_1_29_1","unstructured":"Reimer J. 2007. Your ISP may be selling your web clicks. Ars Technica. http:\/\/arstechnica.com\/news.ars\/post\/20070315-your-isp-may-be-selling-your-web-clicks.html.  Reimer J. 2007. Your ISP may be selling your web clicks. Ars Technica. http:\/\/arstechnica.com\/news.ars\/post\/20070315-your-isp-may-be-selling-your-web-clicks.html."},{"key":"e_1_2_1_30_1","volume-title":"Transcript: Debate on the foreign intelligence surveillance act. In El Paso Times","author":"Roberts C.","year":"2007"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.989940"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(01)00042-5"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4571(2000)9999:9999%3C::AID-ASI1591%3E3.3.CO;2-I"},{"key":"e_1_2_1_34_1","unstructured":"Sweeney L. 2000. Uniqueness of simple demographics in the U.S. population LIDAP-WP4. Laboratory for International Data Privacy Carnegie Mellon University.  Sweeney L. 2000. Uniqueness of simple demographics in the U.S. population LIDAP-WP4. Laboratory for International Data Privacy Carnegie Mellon University."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_1_36_1","unstructured":"United States Department of Health and Human Services. 2005. Protection of human subjects. http:\/\/www.hhs.gov\/ohrp\/humansubjects\/guidance\/45cfr46.htm.  United States Department of Health and Human Services. 2005. Protection of human subjects. http:\/\/www.hhs.gov\/ohrp\/humansubjects\/guidance\/45cfr46.htm."},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 16th International World Wide Web Conference (WWW'07)","author":"Xiong L."}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409220.1409222","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1409220.1409222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:21Z","timestamp":1750258041000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409220.1409222"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["10.1145\/1409220.1409222"],"URL":"https:\/\/doi.org\/10.1145\/1409220.1409222","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"value":"1559-1131","type":"print"},{"value":"1559-114X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,10]]},"assertion":[{"value":"2007-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}