{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:38Z","timestamp":1750306598256,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,8]],"date-time":"2015-06-08T00:00:00Z","timestamp":1433721600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,8]]},"DOI":"10.1145\/2746090.2746110","type":"proceedings-article","created":{"date-parts":[[2015,6,25]],"date-time":"2015-06-25T14:43:22Z","timestamp":1435243402000},"page":"196-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Using 'big' metadata for criminal intelligence"],"prefix":"10.1145","author":[{"given":"Alana","family":"Maurushat","sequence":"first","affiliation":[{"name":"UNSW, Sydney, Australia"}]},{"given":"Lyria","family":"Bennett-Moses","sequence":"additional","affiliation":[{"name":"UNSW, Sydney, Australia"}]},{"given":"David","family":"Vaile","sequence":"additional","affiliation":[{"name":"UNSW, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2015,6,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"15th Report of the 44th Parliament Parliamentary Joint Committee on Human Rights (October 2014) http:\/\/www.aph.gov.au\/~\/media\/Committees\/Senate\/committee\/humanrights_ctte\/reports\/2014\/15_44\/15th%20Report.pdf  15th Report of the 44 th Parliament Parliamentary Joint Committee on Human Rights (October 2014) http:\/\/www.aph.gov.au\/~\/media\/Committees\/Senate\/committee\/humanrights_ctte\/reports\/2014\/15_44\/15th%20Report.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"Attorney Generals Department \"Data Retention Bill -- Proposed Data Set\" October 2014 at http:\/\/www.attorneygeneral.gov.au\/Mediareleases\/Documents\/DataRetentionDraftDataSet30October2014.pdf  Attorney Generals Department \"Data Retention Bill -- Proposed Data Set\" October 2014 at http:\/\/www.attorneygeneral.gov.au\/Mediareleases\/Documents\/DataRetentionDraftDataSet30October2014.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"Australia Law Reform Commission \"Report into Serious Invasions of Privacy in the Digital Era\" September 2014 at http:\/\/www.alrc.gov.au\/publications\/serious-invasionsprivacy-digital-era-alrc-report-123  Australia Law Reform Commission \"Report into Serious Invasions of Privacy in the Digital Era\" September 2014 at http:\/\/www.alrc.gov.au\/publications\/serious-invasionsprivacy-digital-era-alrc-report-123"},{"key":"e_1_3_2_1_4_1","volume-title":"A Little Science Can Separate Data Privacy Facts from Folklore,\" Info\/law Blog","author":"Barth-Jones D.","year":"2014","unstructured":"D. Barth-Jones , \" The Antidote for ' Anecdata' : A Little Science Can Separate Data Privacy Facts from Folklore,\" Info\/law Blog , Harvard University , November 21, 2014 , at http:\/\/blogs.law.harvard.edu\/infolaw\/2014\/11\/21\/the-antidote-for-anecdata-a-little-science-can-separate-data-privacy-facts-from-folklore\/ D. Barth-Jones, \"The Antidote for 'Anecdata': A Little Science Can Separate Data Privacy Facts from Folklore,\" Info\/law Blog, Harvard University, November 21, 2014, at http:\/\/blogs.law.harvard.edu\/infolaw\/2014\/11\/21\/the-antidote-for-anecdata-a-little-science-can-separate-data-privacy-facts-from-folklore\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"e_1_3_2_1_6_1","first-page":"229","volume-title":"Principles of Big Data: Preparing, Sharing and Analyzing Complex Information","author":"Berman J.","year":"2013","unstructured":"J. Berman , Principles of Big Data: Preparing, Sharing and Analyzing Complex Information , Elsevier , 2013 , p 229 . J. Berman, Principles of Big Data: Preparing, Sharing and Analyzing Complex Information, Elsevier, 2013, p 229."},{"key":"e_1_3_2_1_7_1","volume-title":"June 8","author":"Cavoukian A.","year":"2012","unstructured":"A. Cavoukian , and J. Jonas , Privacy by Design in the Age of Big Data , June 8 , 2012 , at http:\/\/privacybydesign.ca\/content\/uploads\/2012\/06\/pbd-big_data.pdf A. Cavoukian, and J. Jonas, Privacy by Design in the Age of Big Data, June 8, 2012, at http:\/\/privacybydesign.ca\/content\/uploads\/2012\/06\/pbd-big_data.pdf"},{"key":"e_1_3_2_1_8_1","volume-title":"Sydney","author":"Casanova P.","year":"2014","unstructured":"P. Casanova , \" CAPER Regulatory Model : Platform to Fight Organised Crime\" AustLII Workshop on Privacy , Sydney , September , 2014 , at http:\/\/www.austlii.edu.au\/austlii\/seminars\/2014\/3.html P. Casanova, \"CAPER Regulatory Model: Platform to Fight Organised Crime\" AustLII Workshop on Privacy, Sydney, September, 2014, at http:\/\/www.austlii.edu.au\/austlii\/seminars\/2014\/3.html"},{"key":"e_1_3_2_1_9_1","volume-title":"March","author":"Connolly C.","year":"2012","unstructured":"C. Connolly , and D. Vaile , \" Drowning in Codes: An Analysis of Codes of Conduct Applying to Online Activity in Australia,\" Cyberspace Law and Policy Centre , March 2012 , at http:\/\/cyberlawcentre.org\/onlinecodes\/report.pdf C. Connolly, and D. Vaile, \"Drowning in Codes: An Analysis of Codes of Conduct Applying to Online Activity in Australia,\" Cyberspace Law and Policy Centre, March 2012, at http:\/\/cyberlawcentre.org\/onlinecodes\/report.pdf"},{"key":"e_1_3_2_1_10_1","volume-title":"October 23","author":"Davies T.","year":"2014","unstructured":"T. Davies , \" Open Data Policies and Procedures : An International Comparison \", October 23 , 2014 , at http:\/\/dx.doi.org\/10.2139\/ssrn.2492520 10.2139\/ssrn.2492520 T. Davies, \"Open Data Policies and Procedures: An International Comparison\", October 23, 2014, at http:\/\/dx.doi.org\/10.2139\/ssrn.2492520"},{"key":"e_1_3_2_1_11_1","volume-title":"The Privacy Bounds of Human Mobility\" Scientific Reports 3","author":"Montjoye De","year":"2013","unstructured":"De Montjoye , Yves-Alexandre, \" Unique in the Crowd : The Privacy Bounds of Human Mobility\" Scientific Reports 3 , 2013 , at http:\/\/www.nature.com\/srep\/2013\/130325\/srep01376\/full\/srep01376.html De Montjoye, Yves-Alexandre, \"Unique in the Crowd: The Privacy Bounds of Human Mobility\" Scientific Reports 3, 2013, at http:\/\/www.nature.com\/srep\/2013\/130325\/srep01376\/full\/srep01376.html"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_13_1","volume-title":"Guide to the De-Identification of Personal Health Information","author":"Eman K. El","year":"2013","unstructured":"K. El Eman , Guide to the De-Identification of Personal Health Information , CRC Press , 2013 , at. http:\/\/www.crcpress.com\/product\/isbn\/9781466579064 (by subscription) K. El Eman, Guide to the De-Identification of Personal Health Information, CRC Press, 2013, at. http:\/\/www.crcpress.com\/product\/isbn\/9781466579064 (by subscription)"},{"issue":"5","key":"e_1_3_2_1_14_1","volume":"15","author":"Eman K. El","year":"2008","unstructured":"K. El Eman , and F. K. Dankar , \"Protecting Privacy Using K-Anonymity\" Journal of the American Medical Informatics Association Vol 15 Issue 5 , 2008 , at, http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC2528029\/ K. El Eman, and F. K. Dankar, \"Protecting Privacy Using K-Anonymity\" Journal of the American Medical Informatics Association Vol 15 Issue 5, 2008, at, http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC2528029\/","journal-title":"\"Protecting Privacy Using K-Anonymity\" Journal of the American Medical Informatics Association"},{"key":"e_1_3_2_1_15_1","volume-title":"No silver bullet: De-identification still doesn't work","author":"Felten E.","year":"2014","unstructured":"E. Felten , and A. Narayanan , \" No silver bullet: De-identification still doesn't work \" July 9, 2014 , at thttp:\/\/randomwalker.info\/publications\/no-silver-bullet-de-identification.pdf E. Felten, and A. Narayanan, \"No silver bullet: De-identification still doesn't work\" July 9, 2014, at thttp:\/\/randomwalker.info\/publications\/no-silver-bullet-de-identification.pdf"},{"key":"e_1_3_2_1_16_1","volume-title":"Against Prediction: Profiling, Policing and Punishing in an Actuarial Age","author":"Harcourt B.","year":"2007","unstructured":"B. Harcourt , Against Prediction: Profiling, Policing and Punishing in an Actuarial Age , University of Chicago Press , 2007 , at http:\/\/www.bernardharcourt.com\/documents\/readers-companion.pdf B. Harcourt, Against Prediction: Profiling, Policing and Punishing in an Actuarial Age, University of Chicago Press, 2007, at http:\/\/www.bernardharcourt.com\/documents\/readers-companion.pdf"},{"key":"e_1_3_2_1_17_1","volume-title":"How Much is Enough? Choosing \u03b5 for Differential Privacy,\" Lecture Notes in Computer Science","author":"Lee J.","year":"2011","unstructured":"J. Lee , and C. Clifton , \" How Much is Enough? Choosing \u03b5 for Differential Privacy,\" Lecture Notes in Computer Science , Springer-Verlag Berlin , Vol 7001, 2011 , at, https:\/\/gnunet.org\/sites\/default\/files\/Choosing-%CE%B5-2011Lee.pdf J. Lee, and C. Clifton, \"How Much is Enough? Choosing \u03b5 for Differential Privacy,\" Lecture Notes in Computer Science, Springer-Verlag Berlin, Vol 7001, 2011, at, https:\/\/gnunet.org\/sites\/default\/files\/Choosing-%CE%B5-2011Lee.pdf"},{"key":"e_1_3_2_1_18_1","unstructured":"A. Maurushat \"Australia\" in Cooke S. (ed) Internet Freedom (Freedom House 2014).  A. Maurushat \"Australia\" in Cooke S. (ed) Internet Freedom (Freedom House 2014)."},{"key":"e_1_3_2_1_19_1","unstructured":"National Statistical Service (NSS) Confidentiality Information Series. http:\/\/www.nss.gov.au\/nss\/home.NSF\/pages\/Confidentiality+Information+Sheets  National Statistical Service (NSS) Confidentiality Information Series. http:\/\/www.nss.gov.au\/nss\/home.NSF\/pages\/Confidentiality+Information+Sheets"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","DOI":"10.1201\/b13097","volume-title":"The Complete Book of Data Anonymization: From Planning to Implementation","author":"Raghunathan B.","year":"2013","unstructured":"B. Raghunathan , The Complete Book of Data Anonymization: From Planning to Implementation , CRC Press , 2013 , at http:\/\/www.crcpress.com\/product\/isbn\/9781439877302 ( B. Raghunathan, The Complete Book of Data Anonymization: From Planning to Implementation, CRC Press, 2013, at http:\/\/www.crcpress.com\/product\/isbn\/9781439877302 ("},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511803161","volume-title":"Models, Reasoning, and Inference","author":"Pearl J.","year":"2009","unstructured":"J. Pearl , Causaltity : Models, Reasoning, and Inference , Cambridge University Press , 2009 , at http:\/\/bayes.cs.ucla.edu\/BOOK-2K\/ J. Pearl, Causaltity: Models, Reasoning, and Inference, Cambridge University Press, 2009, at http:\/\/bayes.cs.ucla.edu\/BOOK-2K\/"},{"key":"e_1_3_2_1_22_1","volume-title":"September 15","author":"Tockar A.","year":"2014","unstructured":"A. Tockar , \" Tiding with the Stars : Passenger Privacy in the NYC Taxicab Dataset,\" Neustar Research , September 15 , 2014 , at http:\/\/research.neustar.biz\/2014\/09\/15\/riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset\/ A. Tockar, \"Tiding with the Stars: Passenger Privacy in the NYC Taxicab Dataset,\" Neustar Research, September 15, 2014, at http:\/\/research.neustar.biz\/2014\/09\/15\/riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset\/"},{"key":"e_1_3_2_1_23_1","volume-title":"September 8","author":"Tockar A.","year":"2014","unstructured":"A. Tockar , \" Differential Privacy : The Basics\" Neustar Research , September 8 , 2014 , at http:\/\/research.neustar.biz\/2014\/09\/08\/differential-privacy-the-basics\/ A. Tockar, \"Differential Privacy: The Basics\" Neustar Research, September 8, 2014, at http:\/\/research.neustar.biz\/2014\/09\/08\/differential-privacy-the-basics\/"},{"key":"e_1_3_2_1_24_1","first-page":"32174","author":"U. S. Public Policy Council of the Association for Computing Machinery, \"Big Data and Consumer Privacy in the Internet Economy\" 79","year":"2014","unstructured":"U. S. Public Policy Council of the Association for Computing Machinery, \"Big Data and Consumer Privacy in the Internet Economy\" 79 FR 32174 , 2014 . U. S. Public Policy Council of the Association for Computing Machinery, \"Big Data and Consumer Privacy in the Internet Economy\" 79 FR 32174, 2014.","journal-title":"FR"}],"event":{"name":"ICAIL '15: 15th International Conference on Artificial Intelligence and Law","sponsor":["Center for IP Law & Markets Center for Intellectual Property Law & Markets, University of San Diego School of Law","TrademarkNow TrademarkNow","The International Association for Artificial Intelligence and Law","Davis Polk Davis Polk & Wardwell LLP","Legal Robot Legal Robot","Thomson Reuters Thomson Reuters Corporation","SIGAI ACM Special Interest Group on Artificial Intelligence"],"location":"San Diego California","acronym":"ICAIL '15"},"container-title":["Proceedings of the 15th International Conference on Artificial Intelligence and Law"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746090.2746110","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2746090.2746110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:44Z","timestamp":1750227404000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746090.2746110"}},"subtitle":["understanding limitations and appropriate safeguards"],"short-title":[],"issued":{"date-parts":[[2015,6,8]]},"references-count":24,"alternative-id":["10.1145\/2746090.2746110","10.1145\/2746090"],"URL":"https:\/\/doi.org\/10.1145\/2746090.2746110","relation":{},"subject":[],"published":{"date-parts":[[2015,6,8]]},"assertion":[{"value":"2015-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}