{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:01:02Z","timestamp":1750309262481,"version":"3.41.0"},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2024,7]]},"abstract":"<jats:p>Experimenting responsibly in the age of data privacy.<\/jats:p>","DOI":"10.1145\/3662188","type":"journal-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T15:34:56Z","timestamp":1717688096000},"page":"42-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["From Open Access to Guarded Trust"],"prefix":"10.1145","volume":"67","author":[{"given":"Yifei","family":"Wang","sequence":"first","affiliation":[{"name":"Meta in New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,7,2]]},"reference":[{"unstructured":"Apple. Differential Privacy Overview 2021; https:\/\/www.apple.com\/privacy\/docs\/Differential_Privacy_Overview.pdf.","key":"e_1_3_1_2_2"},{"doi-asserted-by":"publisher","key":"e_1_3_1_3_2","DOI":"10.1007\/978-3-662-49301-4_17"},{"unstructured":"California Legislative Information. California Consumer Privacy Act 2018; https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180AB375.","key":"e_1_3_1_4_2"},{"doi-asserted-by":"publisher","key":"e_1_3_1_5_2","DOI":"10.1561\/0400000042"},{"unstructured":"European Parliament. Regulation (EU) 2016\/679 General Data Protection Regulation. Official J. European Union; http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679.","key":"e_1_3_1_6_2"},{"unstructured":"Google. Google Data Practices 2023; https:\/\/safety.google\/intl\/en\/privacy\/data\/.","key":"e_1_3_1_7_2"},{"doi-asserted-by":"publisher","key":"e_1_3_1_8_2","DOI":"10.1109\/2.947100"},{"key":"e_1_3_1_9_2","doi-asserted-by":"crossref","DOI":"10.1201\/b16592","volume-title":"Software Testing: A Craftsman\u2019s Approach","author":"Jorgensen P.C.","year":"2002","unstructured":"Jorgensen, P.C. Load Testing. Software Testing: A Craftsman\u2019s Approach. CRC Press, 2002."},{"key":"e_1_3_1_10_2","volume-title":"Database Modeling and Design: Logical Design","author":"Lightstone S.","year":"2007","unstructured":"Lightstone, S., Teorey, T.J., and Nadeau, T. Data integration. Database Modeling and Design: Logical Design. Elsevier, 2007."},{"unstructured":"Pelroth N. All 3 billion Yahoo accounts were affected by 2013 attack. New York Times 2017; http:\/\/nytimes.com\/2017\/10\/03\/technology\/yahoo-hack-3-billion-users.html.","key":"e_1_3_1_11_2"},{"unstructured":"McMahan B. Moore E. Ramage D. and Ag\u00fcera y Arcas B. Communication-efficient learning of deep networks from decentralized data. arXiv:1602.05629 2017; https:\/\/arxiv.org\/abs\/1602.05629.","key":"e_1_3_1_12_2"},{"unstructured":"Spotify. Spotify Private Policy 2023; https:\/\/www.spotify.com\/us\/legal\/privacy-policy\/.","key":"e_1_3_1_13_2"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3662188","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3662188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:57:10Z","timestamp":1750291030000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3662188"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":12,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["10.1145\/3662188"],"URL":"https:\/\/doi.org\/10.1145\/3662188","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}