{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T02:20:39Z","timestamp":1767666039782,"version":"3.41.0"},"reference-count":4,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2013,9,1]],"date-time":"2013-09-01T00:00:00Z","timestamp":1377993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["XRDS"],"published-print":{"date-parts":[[2013,9]]},"abstract":"<jats:p>Protecting data privacy and anonymity requires a better understanding of the conditions and mechanisms under which they may be threatened.<\/jats:p>","DOI":"10.1145\/2508973","type":"journal-article","created":{"date-parts":[[2013,9,26]],"date-time":"2013-09-26T20:29:34Z","timestamp":1380227374000},"page":"36-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Understanding the Data Environment"],"prefix":"10.1145","volume":"20","author":[{"given":"Elaine","family":"Mackey","sequence":"first","affiliation":[{"name":"Data Environment Analysis Service"}]},{"given":"Mark","family":"Elliot","sequence":"additional","affiliation":[{"name":"UK Anonymisation Network"}]}],"member":"320","published-online":{"date-parts":[[2013,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7802-8"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118348239"},{"key":"e_1_2_1_3_1","first-page":"6","volume":"1999","author":"Elliot M. J.","journal-title":"Spring"},{"volume-title":"Proceedings of UNECE Worksession on Statistical Confidentiality","year":"2009","author":"Mackey E. M.","key":"e_1_2_1_4_1"}],"container-title":["XRDS: Crossroads, The ACM Magazine for Students"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2508973","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2508973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:34Z","timestamp":1750231714000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2508973"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":4,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["10.1145\/2508973"],"URL":"https:\/\/doi.org\/10.1145\/2508973","relation":{},"ISSN":["1528-4972","1528-4980"],"issn-type":[{"type":"print","value":"1528-4972"},{"type":"electronic","value":"1528-4980"}],"subject":[],"published":{"date-parts":[[2013,9]]},"assertion":[{"value":"2013-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}