{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:29:56Z","timestamp":1766428196865,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T00:00:00Z","timestamp":1742860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Israel's Council for Higher Education"},{"name":"McCourt School of Public Policy and Georgetown University"},{"name":"ERC","award":["101125913"],"award-info":[{"award-number":["101125913"]}]},{"name":"NSF grant","award":["CCF 2217678"],"award-info":[{"award-number":["CCF 2217678"]}]},{"name":"Dieter Schwarz Foundation's TUM-HUJI Joint AI Research Hub"},{"name":"Simons Foundation Collaboration"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,25]]},"DOI":"10.1145\/3709025.3712211","type":"proceedings-article","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T18:20:11Z","timestamp":1741890011000},"page":"17-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["On the Rival Nature of Data: Tech and Policy Implications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0522-9763","authenticated-orcid":false,"given":"Ayelet","family":"Gordon-Tapiero","sequence":"first","affiliation":[{"name":"Hebrew University, Dept. of Computer Science, Jerusalem, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2780-6656","authenticated-orcid":false,"given":"Katrina","family":"Ligett","sequence":"additional","affiliation":[{"name":"Hebrew University, Dept. of Computer Science, Jerusalem, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6632-8645","authenticated-orcid":false,"given":"Kobbi","family":"Nissim","sequence":"additional","affiliation":[{"name":"Georgetown University, Dept. of Computer Science, Washington D.C., USA"}]}],"member":"320","published-online":{"date-parts":[[2025,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Communication from the Commission to the European Parliament the Council the European Economic and Social Committee and the Committee of the Regions A European Strategy for Data 19.2.2020."},{"key":"e_1_3_2_1_2_1","unstructured":"Regulation (EU) 2022\/1925 of the European Parliament and of the Council of 14 September 2022 on Contestable and Fair Markets in the Digital Sector and Amending Directives (EU) 2019\/1937 and (EU) 2020\/1828 (Digital Markets Act)."},{"key":"e_1_3_2_1_3_1","unstructured":"Regulation (EU) 2022\/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market for Digital Services and amending Directive 2000\/31\/EC (Digital Services Act)."},{"key":"e_1_3_2_1_4_1","unstructured":"Regulation (EU) 2022\/868 of the European Parliament and of the Council of 30 May 2022 on European Data Governance and Amending Regulation (EU) 2018\/1724 (Data Governance Act)."},{"key":"e_1_3_2_1_5_1","unstructured":"Regulation (EU) 2023\/2854 of the European Parliament and of the Council of 13 December 2023 on Harmonised Rules on Fair Access to and Use of Data and amending Regulation (EU) 2017\/2394 and Directive (EU) 2020\/1828 (Data Act)."},{"key":"e_1_3_2_1_6_1","unstructured":"Regulation (EU) 2024\/1689 of the European Parliament and of the Council of 13 June 2024 Laying Down Harmonised Rules on Artificial Intelligence and amending Regulations (EC) No 300\/2008 (EU) No 167\/2013 (EU) No 168\/2013 (EU) 2018\/858 (EU) 2018\/1139 and (EU) 2019\/2144 and Directives 2014\/90\/EU (EU) 2016\/797 and (EU) 2020\/1828 (Artificial Intelligence Act)."},{"key":"e_1_3_2_1_7_1","volume-title":"Dep't of Commerce, no. 3:21-cv-211-rah-ecm-kcn, (M.D. Ala","author":"State of Alabama v. U.S.","year":"2021","unstructured":"State of Alabama v. U.S. Dep't of Commerce, no. 3:21-cv-211-rah-ecm-kcn, (M.D. Ala. June 29, 2021)."},{"key":"e_1_3_2_1_8_1","volume-title":"Stepping-up: The Census bureau tries to be a good data steward in the 21st century","author":"Abowd John M","year":"2019","unstructured":"John M Abowd. Stepping-up: The Census bureau tries to be a good data steward in the 21st century. 2019."},{"key":"e_1_3_2_1_9_1","volume-title":"Kobbi Nissim, Micheal Jose Reymond, Sidhant Saraogi, and Alexandra Wood. A principled approach to defining anonymization as applied to EU data protection law.","author":"Altman Micah","year":"2022","unstructured":"Micah Altman, Aloni Cohen, Francesca Falzon, Evangelia Anna Markatou, Kobbi Nissim, Micheal Jose Reymond, Sidhant Saraogi, and Alexandra Wood. A principled approach to defining anonymization as applied to EU data protection law. 2022."},{"key":"e_1_3_2_1_10_1","first-page":"38","volume-title":"AEA Papers and Proceedings","volume":"108","author":"Arrieta-Ibarra Imanol","year":"2014","unstructured":"Imanol Arrieta-Ibarra, Leonard Goff, Diego Jim\u00e9nez-Hern\u00e1ndez, Jaron Lanier, and Glen E. Weyl. Should we treat data as labor? Moving beyond \"free\". In AEA Papers and Proceedings, volume 108, pages 38--42. American Economic Association 2014 Broadway, Suite 305, Nashville, TN 37203, 2018."},{"key":"e_1_3_2_1_11_1","volume-title":"Data pollution. 11 J. Legal Analysis, page 104","author":"Ben-Shahar Omri","year":"2019","unstructured":"Omri Ben-Shahar. Data pollution. 11 J. Legal Analysis, page 104, 2019."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaf0918"},{"key":"e_1_3_2_1_13_1","first-page":"1469","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Cohen Aloni","year":"2022","unstructured":"Aloni Cohen. Attacks on deidentification's defenses. In 31st USENIX Security Symposium (USENIX Security 22), pages 1469--1486, 2022."},{"issue":"1","key":"e_1_3_2_1_14_1","article-title":"Linear program reconstruction in practice","volume":"10","author":"Cohen Aloni","year":"2020","unstructured":"Aloni Cohen and Kobbi Nissim. Linear program reconstruction in practice. J. Priv. Confidentiality, 10(1), 2020.","journal-title":"J. Priv. Confidentiality"},{"key":"e_1_3_2_1_15_1","volume-title":"Data reconstruction: When you see it and when you don't. arXiv preprint arXiv:2405.15753","author":"Cohen Edith","year":"2024","unstructured":"Edith Cohen, Haim Kaplan, Yishay Mansour, Shay Moran, Kobbi Nissim, Uri Stemmer, and Eliad Tsfadia. Data reconstruction: When you see it and when you don't. arXiv preprint arXiv:2405.15753, 2024."},{"key":"e_1_3_2_1_16_1","volume-title":"Estimating the reproducibility of psychological science. Science, 349(6251):aac4716","author":"Collaboration Open Science","year":"2015","unstructured":"Open Science Collaboration. Estimating the reproducibility of psychological science. Science, 349(6251):aac4716, 2015."},{"key":"e_1_3_2_1_17_1","volume-title":"Gaining or losing control? an empirical study on the real use of data control rights and policy implications. 109 Iowa L. Rev., page","author":"Corren Ella","year":"2017","unstructured":"Ella Corren. Gaining or losing control? an empirical study on the real use of data control rights and policy implications. 109 Iowa L. Rev., page 2017, 2023."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2218605120"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746580"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250804"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_26"},{"key":"e_1_3_2_1_25_1","first-page":"285","article-title":"Eur","volume":"5","author":"Fluitt Aaron","year":"2019","unstructured":"Aaron Fluitt, Aloni Cohen, Micah Altman, Kobbi Nissim, Salome Viljoen, and Alexandra Wood. Data protection's composition problem. Eur. Data Prot. L. Rev., 5:285, 2019.","journal-title":"Data Prot. L. Rev."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401926"},{"key":"e_1_3_2_1_27_1","volume-title":"Privacy and the limits of law. 89 Yale L.J., page 421","author":"Gavison Ruth","year":"1980","unstructured":"Ruth Gavison. Privacy and the limits of law. 89 Yale L.J., page 421, 1980."},{"issue":"1","key":"e_1_3_2_1_28_1","first-page":"3","article-title":"The garden of forking paths: Why multiple comparisons can be a problem, even when there is no \"fishing expedition\" or \"p-hacking\" and the research hypothesis was posited ahead of time. Department of Statistics","volume":"348","author":"Gelman Andrew","year":"2013","unstructured":"Andrew Gelman and Eric Loken. The garden of forking paths: Why multiple comparisons can be a problem, even when there is no \"fishing expedition\" or \"p-hacking\" and the research hypothesis was posited ahead of time. Department of Statistics, Columbia University, 348(1-17):3, 2013.","journal-title":"Columbia University"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.33.1.131"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.20191330"},{"key":"e_1_3_2_1_31_1","first-page":"1","volume-title":"11th Innovations in Theoretical Computer Science Conference (ITCS 2020), volume 151 of Leibniz International Proceedings in Informatics (LIPIcs)","author":"Jung Christopher","year":"2020","unstructured":"Christopher Jung, Katrina Ligett, Seth Neel, Aaron Roth, Saeed Sharifi-Malvajerdi, and Moshe Shenfeld. A New Analysis of Differential Privacy's Generalization Guarantees. In Thomas Vidick, editor, 11th Innovations in Theoretical Computer Science Conference (ITCS 2020), volume 151 of Leibniz International Proceedings in Informatics (LIPIcs), pages 31:1--31:17, Dagstuhl, Germany, 2020. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3572912"},{"key":"e_1_3_2_1_33_1","volume-title":"DIMACS workshop on co-development of computer science and law. https:\/\/www.youtube.com\/watch?v=ZZugFpAOA64","author":"Ligett Katrina Ligett","year":"2020","unstructured":"Katrina Ligett Ligett and Kobbi Nissim. Data co-ops: Challenges, and how to get there. DIMACS workshop on co-development of computer science and law. https:\/\/www.youtube.com\/watch?v=ZZugFpAOA64, Nov 2020."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584318.3584327"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1108\/JICES-04-2019-0044"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1708274114"},{"key":"e_1_3_2_1_37_1","first-page":"7","volume-title":"Public goods and public choices. Alternatives for delivering public services: Toward improved performance","author":"Ostrom Vincent","year":"1977","unstructured":"Vincent Ostrom, Elinor Ostrom, and Savas ES. Public goods and public choices. Alternatives for delivering public services: Toward improved performance, pages 7--49, 1977."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/13991.001.0001"},{"key":"e_1_3_2_1_39_1","volume-title":"Radical markets: Uprooting capitalism and democracy for a just society","author":"Posner Eric","year":"2018","unstructured":"Eric Posner and Eric Weyl. Radical markets: Uprooting capitalism and democracy for a just society. Princeton University Press, 2018."},{"key":"e_1_3_2_1_40_1","volume-title":"Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression","author":"Samarati Pierangela","year":"1998","unstructured":"Pierangela Samarati and Latanya Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. 1998."},{"key":"e_1_3_2_1_41_1","volume-title":"Technology, autonomy, and manipulation. Internet Pol'y Rev., 8:1","author":"Susser Daniel","year":"2019","unstructured":"Daniel Susser, Beate Roessler, and Helen Nissenbaum. Technology, autonomy, and manipulation. Internet Pol'y Rev., 8:1, 2019."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.3386\/w24839"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1257\/jel.20221580"},{"key":"e_1_3_2_1_44_1","first-page":"573","article-title":"A relational theory of data governance","volume":"131","author":"Viljoen Salom\u00e9","year":"2021","unstructured":"Salom\u00e9 Viljoen. A relational theory of data governance. Yale LJ, 131:573, 2021.","journal-title":"Yale LJ"},{"key":"e_1_3_2_1_45_1","first-page":"209","article-title":"A primer for a non-technical audience","volume":"21","author":"Wood Alexandra","year":"2018","unstructured":"Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R O'Brien, Thomas Steinke, and Salil Vadhan. Differential privacy: A primer for a non-technical audience. Vand. J. Ent. & Tech. L., 21:209, 2018.","journal-title":"Vand. J. Ent. & Tech. L."}],"event":{"name":"CSLAW '25: Symposium on Computer Science and Law","sponsor":["ACM Association for Computing Machinery"],"location":"Munich Germany","acronym":"CSLAW '25"},"container-title":["Proceedings of the Symposium on Computer Science and Law on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709025.3712211","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3709025.3712211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:47:24Z","timestamp":1756237644000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709025.3712211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,25]]},"references-count":45,"alternative-id":["10.1145\/3709025.3712211","10.1145\/3709025"],"URL":"https:\/\/doi.org\/10.1145\/3709025.3712211","relation":{},"subject":[],"published":{"date-parts":[[2025,3,25]]},"assertion":[{"value":"2025-03-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}