{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T21:41:46Z","timestamp":1777326106323,"version":"3.51.4"},"reference-count":13,"publisher":"Association for Computing Machinery (ACM)","issue":"11","license":[{"start":{"date-parts":[[2014,10,27]],"date-time":"2014-10-27T00:00:00Z","timestamp":1414368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000082","name":"Division of Graduate Education","doi-asserted-by":"publisher","award":["DGE-0966187, CNS-1355398"],"award-info":[{"award-number":["DGE-0966187, CNS-1355398"]}],"id":[{"id":"10.13039\/100000082","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["DGE-0966187, CNS-1355398"],"award-info":[{"award-number":["DGE-0966187, CNS-1355398"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2014,10,27]]},"abstract":"<jats:p>Recognizing the inherent limitations of consent and anonymity.<\/jats:p>","DOI":"10.1145\/2668897","type":"journal-article","created":{"date-parts":[[2014,10,27]],"date-time":"2014-10-27T14:15:52Z","timestamp":1414419352000},"page":"31-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":93,"title":["Big data's end run around procedural privacy protections"],"prefix":"10.1145","volume":"57","author":[{"given":"Solon","family":"Barocas","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"Helen","family":"Nissenbaum","sequence":"additional","affiliation":[{"name":"New York University"}]}],"member":"320","published-online":{"date-parts":[[2014,10,27]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Privacy, Big Data, and the Public Good: Frameworks for Engagement","author":"Barocas S.","year":"2014","unstructured":"Barocas , S. and Nissenbaum , H . Big data's end run around anonymity and consent . In Privacy, Big Data, and the Public Good: Frameworks for Engagement . J. Lane, V. Stodden, S. Bender, and H. Nissenbaum, Eds. Cambridge University Press , NY, 2014 . Barocas, S. and Nissenbaum, H. Big data's end run around anonymity and consent. In Privacy, Big Data, and the Public Good: Frameworks for Engagement. J. Lane, V. Stodden, S. Bender, and H. Nissenbaum, Eds. Cambridge University Press, NY, 2014."},{"key":"e_1_2_1_2_1","volume-title":"USA Today (Sept. 17","author":"Barr A.","year":"2013","unstructured":"Barr , A. Google may ditch 'cookies' as online ad tracker . USA Today (Sept. 17 , 2013 ). Barr, A. Google may ditch 'cookies' as online ad tracker. USA Today (Sept. 17, 2013)."},{"key":"e_1_2_1_3_1","first-page":"378","article-title":"The failure of fair information practice principles. In Consumer Protection in the Age of the \"Information Economy","volume":"341","author":"Cate F.H","year":"2006","unstructured":"Cate , F.H . The failure of fair information practice principles. In Consumer Protection in the Age of the \"Information Economy .\" J.K. Winn, Ed. Ashgate, Burlington, VT , 2006 , 341 -- 378 . Cate, F.H. The failure of fair information practice principles. In Consumer Protection in the Age of the \"Information Economy.\" J.K. Winn, Ed. Ashgate, Burlington, VT, 2006, 341--378.","journal-title":"J.K. Winn, Ed. Ashgate, Burlington, VT"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipt005"},{"key":"e_1_2_1_5_1","first-page":"2","article-title":"Public and private concerns","volume":"10","author":"Kl\u00f6sgen W. KDD","year":"1995","unstructured":"Kl\u00f6sgen , W. KDD : Public and private concerns . IEEE Expert: Intelligent Systems and Their Applications 10 , 2 ( Feb. 1995 ), 55--57. Kl\u00f6sgen, W. KDD: Public and private concerns. IEEE Expert: Intelligent Systems and Their Applications 10, 2 (Feb. 1995), 55--57.","journal-title":"IEEE Expert: Intelligent Systems and Their Applications"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743558"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/64.395352"},{"key":"e_1_2_1_10_1","first-page":"2","article-title":"Knowledge discovery in personal data vs. privacy: A mini-symposium","volume":"10","author":"Piatetsky-Shapiro G","year":"1995","unstructured":"Piatetsky-Shapiro , G . Knowledge discovery in personal data vs. privacy: A mini-symposium . IEEE Expert: Intelligent Systems and Their Applications 10 , 2 ( Apr. 1995 ), 46--47. Piatetsky-Shapiro, G. Knowledge discovery in personal data vs. privacy: A mini-symposium. IEEE Expert: Intelligent Systems and Their Applications 10, 2 (Apr. 1995), 46--47.","journal-title":"IEEE Expert: Intelligent Systems and Their Applications"},{"key":"e_1_2_1_11_1","first-page":"7","article-title":"Privacy self-management and the consent dilemma","volume":"126","author":"Solove D.J","year":"2013","unstructured":"Solove , D.J . Privacy self-management and the consent dilemma . Harvard Law Review 126 , 7 ( May 2013 ), 1880. Solove, D.J. Privacy self-management and the consent dilemma. Harvard Law Review 126, 7 (May 2013), 1880.","journal-title":"Harvard Law Review"},{"key":"e_1_2_1_12_1","volume-title":"On the Web's cutting edge, anonymity in name only. The Wall Street Journal (Aug. 4","author":"Steel E.","year":"2010","unstructured":"Steel , E. and Angwin , J . On the Web's cutting edge, anonymity in name only. The Wall Street Journal (Aug. 4 , 2010 ). Steel, E. and Angwin, J. On the Web's cutting edge, anonymity in name only. The Wall Street Journal (Aug. 4, 2010)."},{"key":"e_1_2_1_13_1","volume-title":"The Wall Street Journal (Dec. 17","author":"Walker J.","year":"2013","unstructured":"Walker , J. Data mining to recruit sick people . The Wall Street Journal (Dec. 17 , 2013 ). Walker, J. Data mining to recruit sick people. The Wall Street Journal (Dec. 17, 2013)."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2668897","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2668897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:54Z","timestamp":1750273434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2668897"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,27]]},"references-count":13,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2014,10,27]]}},"alternative-id":["10.1145\/2668897"],"URL":"https:\/\/doi.org\/10.1145\/2668897","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,27]]},"assertion":[{"value":"2014-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}