{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:58Z","timestamp":1750306558781,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2683467.2683477","type":"proceedings-article","created":{"date-parts":[[2015,1,5]],"date-time":"2015-01-05T13:32:15Z","timestamp":1420464735000},"page":"105-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Data Is the New Currency"],"prefix":"10.1145","author":[{"given":"Carrie","family":"Gates","sequence":"first","affiliation":[{"name":"Dell Research, Round Rock, TX, USA"}]},{"given":"Peter","family":"Matthews","sequence":"additional","affiliation":[{"name":"CA Labs, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"volume-title":"Last Visited","year":"2014","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Karl D. Belgum. Who leads at half-time? three conflicting visions of internet privacy policy. http:\/\/www.richmond.edu\/jolt\/v6i1\/belgum.html 1999. Last Visited: April 9 2014.  Karl D. Belgum. Who leads at half-time? three conflicting visions of internet privacy policy. http:\/\/www.richmond.edu\/jolt\/v6i1\/belgum.html 1999. Last Visited: April 9 2014."},{"volume-title":"IEEE Computer Society Press","year":"1996","author":"McAfee Brynjolfssen","key":"e_1_3_2_1_3_1"},{"volume-title":"Last Visited","year":"2014","author":"Cornell University Law School Legal Information Institute (LII).","key":"e_1_3_2_1_4_1"},{"volume-title":"Last Visited","year":"2014","author":"Cornell University Law School Legal Information Institute (LII).","key":"e_1_3_2_1_5_1"},{"volume-title":"Last Visited","year":"2014","author":"SecureWorks Dell","key":"e_1_3_2_1_6_1"},{"volume-title":"Doubleday","year":"1968","author":"Dick Philip K","key":"e_1_3_2_1_7_1"},{"volume-title":"Doubleday","year":"1977","author":"Dick Philip K","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Pam Dixon. What information do data brokers have on consumers and how do they use it? http:\/\/www.commerce.senate.gov\/public\/?a=Files.Serve&File_id=e290bd4e-66e4--42ad-94c5-fcd4f9987781 December 2013. Last Visited: April 2 2014.  Pam Dixon. What information do data brokers have on consumers and how do they use it? http:\/\/www.commerce.senate.gov\/public\/?a=Files.Serve&File_id=e290bd4e-66e4--42ad-94c5-fcd4f9987781 December 2013. Last Visited: April 2 2014."},{"key":"e_1_3_2_1_10_1","article-title":"How companies learn your secrets","author":"Duhigg Charles","year":"2012","journal-title":"New York Times Magazine"},{"volume-title":"Last Visited","year":"2014","author":"Frey Carl Benedikt","key":"e_1_3_2_1_11_1"},{"volume-title":"Proceedings of The 18th Usenix Security Symposium","year":"2009","author":"Geambasu Roxana","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Government Accountability Office. Privacy: Alternatives exist for enhancing protection of personally identifiable information. http:\/\/www.gao.gov\/new.items\/d08536.pdf May 2008. GAO Report 08--536.  Government Accountability Office. Privacy: Alternatives exist for enhancing protection of personally identifiable information. http:\/\/www.gao.gov\/new.items\/d08536.pdf May 2008. GAO Report 08--536."},{"key":"e_1_3_2_1_14_1","unstructured":"Wendell Ray Guffey. Joint ownership of patents: A trap for the unwary. http:\/\/www.intelproplaw.com\/Articles\/cgi\/download.cgi?v=1091393695 2004.  Wendell Ray Guffey. Joint ownership of patents: A trap for the unwary. http:\/\/www.intelproplaw.com\/Articles\/cgi\/download.cgi?v=1091393695 2004."},{"volume-title":"Last Visited","year":"2014","author":"School Harvard Law","key":"e_1_3_2_1_15_1"},{"volume-title":"Last Visited","year":"2014","author":"Harwood Matthew","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"Javelin Strategy & Research. 2012 identity fraud survey report February 2012.  Javelin Strategy & Research. 2012 identity fraud survey report February 2012."},{"key":"e_1_3_2_1_18_1","first-page":"10","article-title":"Profiling the profilers: Deep packet inspection and behavioral advertising","author":"Kuehn Andreas","year":"2012","journal-title":"Europe and the United States"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358846"},{"volume-title":"Last Visited","year":"2014","author":"Liptak Adam","key":"e_1_3_2_1_20_1"},{"issue":"2","key":"e_1_3_2_1_21_1","article-title":"The law of unintended consequences: The digital millennium copyright act and interoperability","volume":"62","author":"Lipton Jacqueline","year":"2005","journal-title":"Washington and Lew Law Review"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600860902742562"},{"volume-title":"Last Visited","year":"2014","author":"McFarland Michael","key":"e_1_3_2_1_23_1"},{"volume-title":"Westview Press","year":"1989","author":"Moor James H.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743558"},{"volume-title":"Last Visited","year":"2014","author":"Pearce Matt","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","first-page":"338","volume":"48","author":"Prosser William L.","year":"1960","journal-title":"Privacy. California Law Review"},{"key":"e_1_3_2_1_29_1","first-page":"137","volume-title":"Proceedings of The First International Workshop in Information Hiding","author":"Reed Michael","year":"1996"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"volume-title":"The New Yorker","year":"2014","author":"Toobin Jeffrey","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:4"}],"event":{"name":"NSPW '14: New Security Paradigms Workshop","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Victoria British Columbia Canada","acronym":"NSPW '14"},"container-title":["Proceedings of the 2014 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2683467.2683477","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2683467.2683477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:59Z","timestamp":1750227179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2683467.2683477"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":33,"alternative-id":["10.1145\/2683467.2683477","10.1145\/2683467"],"URL":"https:\/\/doi.org\/10.1145\/2683467.2683477","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}