{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:17Z","timestamp":1750308437725,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,23]]},"DOI":"10.1145\/3372938.3372939","type":"proceedings-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T03:54:01Z","timestamp":1578455641000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["On the Intersection of Big Data and Privacy"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Jernejcic","sequence":"first","affiliation":[{"name":"The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA"}]},{"given":"Houssain","family":"Kettani","sequence":"additional","affiliation":[{"name":"The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Age of Context: Mobile, sensors, data and the futre of privacy","author":"Scoble R.","year":"2014","unstructured":"Scoble , R. , & Israel , S. ( 2014 ). Age of Context: Mobile, sensors, data and the futre of privacy . Patrick Brewster Press . Scoble, R., & Israel, S. (2014). Age of Context: Mobile, sensors, data and the futre of privacy. Patrick Brewster Press."},{"key":"e_1_3_2_1_2_1","volume-title":"Merriam-Webster Dictionary. Merriam-Webster.com","author":"Merriam-Webster","year":"2017","unstructured":"Merriam-Webster . (Ed.) ( 2017 ) Merriam-Webster Dictionary. Merriam-Webster.com . Merriam-Webster. (Ed.) (2017) Merriam-Webster Dictionary. Merriam-Webster.com."},{"key":"e_1_3_2_1_3_1","unstructured":"Popken B. (2018 May 10). Google sells the future powered by your personal data. Tech & Media. Retrieved from https:\/\/www.nbcnews.com\/tech\/tech-news  Popken B. (2018 May 10). Google sells the future powered by your personal data. Tech & Media. Retrieved from https:\/\/www.nbcnews.com\/tech\/tech-news"},{"key":"e_1_3_2_1_4_1","volume-title":"Ethics in Information Technology","author":"Reynolds G. W.","year":"2018","unstructured":"Reynolds , G. W. ( 2018 ). Ethics in Information Technology ( 6 th ed.). Boston : Cengage Learning . Reynolds, G. W. (2018). Ethics in Information Technology (6th ed.). Boston: Cengage Learning.","edition":"6"},{"key":"e_1_3_2_1_5_1","unstructured":"Lomas N. (2016 August 25). WhatsApp's privacy u-turn on sharing data with Facebook draws more heat in Europe. Retrieved from https:\/\/techcrunch.com  Lomas N. (2016 August 25). WhatsApp's privacy u-turn on sharing data with Facebook draws more heat in Europe. Retrieved from https:\/\/techcrunch.com"},{"key":"e_1_3_2_1_6_1","unstructured":"Lomas N. (2017 December 19). France puts Facebook on notice over WhatsApp data transfers. Retrieved from https:\/\/techcrunch.com  Lomas N. (2017 December 19). France puts Facebook on notice over WhatsApp data transfers. Retrieved from https:\/\/techcrunch.com"},{"key":"e_1_3_2_1_7_1","unstructured":"Arthur L. (2013 August 15). What is Big Data. Retrieved from https:\/\/www.forbes.com  Arthur L. (2013 August 15). What is Big Data. Retrieved from https:\/\/www.forbes.com"},{"key":"e_1_3_2_1_8_1","unstructured":"Uzialko A. C. (2018 August 3). How businesses are collecting data (and what they're doing with it). Retrieved from https:\/\/www.businessnewsdaily.com  Uzialko A. C. (2018 August 3). How businesses are collecting data (and what they're doing with it). Retrieved from https:\/\/www.businessnewsdaily.com"},{"key":"e_1_3_2_1_9_1","first-page":"413","article-title":"Standing after Snowden: Lessons on privacy harm from national security surveillance litigation","volume":"66","author":"Kaminski M. E.","year":"2017","unstructured":"Kaminski , M. E. ( 2017 ). Standing after Snowden: Lessons on privacy harm from national security surveillance litigation . DePaul Law Review , 66 , 413 -- 438 . https:\/\/scholar.law.colorado.edu\/articles\/724 Kaminski, M. E. (2017). Standing after Snowden: Lessons on privacy harm from national security surveillance litigation. DePaul Law Review, 66, 413--438. https:\/\/scholar.law.colorado.edu\/articles\/724","journal-title":"DePaul Law Review"},{"key":"e_1_3_2_1_10_1","unstructured":"Rinehart W. (2016 June 1). What exactly constitutes a privacy harm? Insight. Retrieved from https:\/\/www.americanactionforum.org\/insight  Rinehart W. (2016 June 1). What exactly constitutes a privacy harm? Insight. Retrieved from https:\/\/www.americanactionforum.org\/insight"},{"key":"e_1_3_2_1_11_1","unstructured":"Hsu J. (2018 January 29). The Strava Heat Map and the end of secrets. Security. Retrieved from https:\/\/www.wired.com  Hsu J. (2018 January 29). The Strava Heat Map and the end of secrets. Security. Retrieved from https:\/\/www.wired.com"},{"key":"e_1_3_2_1_12_1","unstructured":"Verton D. (2018 August 28). Poll shows Americans more concerned about terrorism than NSA surveillance. Defense. Retrieved from https:\/\/www.fedscoop.com  Verton D. (2018 August 28). Poll shows Americans more concerned about terrorism than NSA surveillance. Defense. Retrieved from https:\/\/www.fedscoop.com"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2015.110"}],"event":{"name":"BDIoT'19: The 4th International Conference On Big Data and Internet of Things","acronym":"BDIoT'19","location":"Rabat Morocco"},"container-title":["Proceedings of the 4th International Conference on Big Data and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372939","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372938.3372939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:58Z","timestamp":1750268998000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,23]]},"references-count":13,"alternative-id":["10.1145\/3372938.3372939","10.1145\/3372938"],"URL":"https:\/\/doi.org\/10.1145\/3372938.3372939","relation":{},"subject":[],"published":{"date-parts":[[2019,10,23]]},"assertion":[{"value":"2020-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}