{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:33:14Z","timestamp":1759091594146,"version":"3.41.0"},"reference-count":29,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T00:00:00Z","timestamp":1332979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2012,3,29]]},"abstract":"<jats:p>People everywhere are generating ever-increasing amounts of data, often without being fully aware of who is recording what about them. For example, initiatives such as mandated smart metering, expected to be widely deployed in the UK in the next few years and already attempted in countries such as the Netherlands, will generate vast quantities of detailed, personal data about huge segments of the population. Neither the impact nor the potential of this society-wide data gathering are well understood. Once data is gathered, it will be processed -- and society is only now beginning to grapple with the consequences for privacy, both legal and ethical, of these actions, e.g., Brown et al. There is the potential for great harm through, e.g., invasion of privacy; but also the potential for great benefits by using this data to make more efficient use of resources, as well as releasing its vast economic potential. In this editorial we briefly discuss work in this area, the challenges still faced, and some potential avenues for addressing them.<\/jats:p>","DOI":"10.1145\/2185376.2185390","type":"journal-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:13Z","timestamp":1334667193000},"page":"94-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Privacy analytics"],"prefix":"10.1145","volume":"42","author":[{"given":"Hamed","family":"Haddadi","sequence":"first","affiliation":[{"name":"Queen Mary University of London, London, United Kingdom"}]},{"given":"Richard","family":"Mortier","sequence":"additional","affiliation":[{"name":"University of Nottingham, Nottingham, United Kingdom"}]},{"given":"Steven","family":"Hand","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2012,3,29]]},"reference":[{"volume-title":"Proceedings of the Twenty First Workshop on Information Systems and Economics (WISE)","year":"2009","author":"Acquisti A.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","first-page":"118","volume-title":"Proceedings of the 13th international conference on Information hiding, IH'11","author":"Acs G.","year":"2011"},{"volume-title":"Not Just Data.","year":"2001","author":"Adams A.","key":"e_1_2_1_3_1"},{"issue":"2","key":"e_1_2_1_4_1","first-page":"219","article-title":"Using NHS patient data for research without consent. Law","volume":"2","author":"Brown I.","year":"2010","journal-title":"Innovation and Technology"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/784591.784753"},{"volume-title":"S. Foresti, and P. Samarati. k-Anonymity. In T. Yu and S","year":"2007","author":"Ciriani V.","key":"e_1_2_1_6_1"},{"volume-title":"No to mandatory smart metering does not equal privacy! In Tilburg Institute for Law, Technology, and Society","year":"2009","author":"Cuijpers C.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_4"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993574.1993605"},{"key":"e_1_2_1_12_1","unstructured":"G. Greenleaf. Global Data Privacy in a Networked World. 2011.  G. Greenleaf. Global Data Privacy in a Networked World. 2011."},{"volume-title":"Eighth ACM Workshop on Hot Topics in Networks (HotNets-VIII)","year":"2009","author":"Guha S.","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859983.1859993"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.462.0255"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1028128.1028156"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0911686107"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2011.5716491"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851199"},{"volume-title":"Proceedings of Digital Futures","year":"2010","author":"Mortier R.","key":"e_1_2_1_20_1"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851322.1851334"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046564"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070575"},{"volume-title":"Secured histories: computing group statistics on encrypted data while preserving individual privacy. CoRR, abs\/1012.2152","year":"2010","author":"Rieffel E. G.","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1920505"},{"key":"e_1_2_1_26_1","unstructured":"UK Cabinet Office. Better Choices: Better Deals. http:\/\/www.cabinetoffice.gov.uk\/resource-library\/better-choices-better-deals\/ April 2011.  UK Cabinet Office. Better Choices: Better Deals. http:\/\/www.cabinetoffice.gov.uk\/resource-library\/better-choices-better-deals\/ April 2011."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653726"},{"key":"e_1_2_1_28_1","unstructured":"World Economic Forum and Bain eds. Personal data: The emergence of a new asset class. http:\/\/www3.weforum.org\/docs\/WEF_ITTC_PersonalDataNewAsset_Report_2011.pdf Jan. 2011.  World Economic Forum and Bain eds. Personal data: The emergence of a new asset class. http:\/\/www3.weforum.org\/docs\/WEF_ITTC_PersonalDataNewAsset_Report_2011.pdf Jan. 2011."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185216.2185282"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2185376.2185390","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2185376.2185390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:02Z","timestamp":1750241162000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2185376.2185390"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,29]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,3,29]]}},"alternative-id":["10.1145\/2185376.2185390"],"URL":"https:\/\/doi.org\/10.1145\/2185376.2185390","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2012,3,29]]},"assertion":[{"value":"2012-03-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}