{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T16:56:38Z","timestamp":1753894598512,"version":"3.41.2"},"reference-count":15,"publisher":"Ubiquity Press, Ltd.","license":[{"start":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:00:00Z","timestamp":1490227200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3,23]]},"DOI":"10.5334\/dsj-2017-010","type":"journal-article","created":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T11:38:28Z","timestamp":1490269108000},"source":"Crossref","is-referenced-by-count":0,"title":["Starting from the End: What to do when Restricted Data is released"],"prefix":"10.5334","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8520-5598","authenticated-orcid":false,"given":"Marta","family":"Teperek","sequence":"first","affiliation":[]},{"given":"Rhys","family":"Morgan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0407-9767","authenticated-orcid":false,"given":"Michelle","family":"Ellefson","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3636-5939","authenticated-orcid":false,"given":"Danny","family":"Kingsley","sequence":"additional","affiliation":[]}],"member":"3285","reference":[{"key":"key20170323073302_B1","unstructured":"AlexinZ Does fair anonymization exist?International Review of Law, Computers & Technology2014281214410.1080\/13600869.2013.869909Available at: http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/13600869.2013.869909 (Accessed August 31, 2016)"},{"article-title":"Re-use, sharing, and archiving sensitive research data: a practical overview","year":"2011","author":"Corti","key":"key20170323073302_B2"},{"article-title":"Cancer research UK and data sharing","year":"2016","author":"Enoch","key":"key20170323073302_B3"},{"article-title":"Governance of data access","year":"2015","author":"Hobcraft","key":"key20170323073302_B4"},{"journal-title":"Introduction to Research Data Management","year":"2016","author":"Kattuman","key":"key20170323073302_B5"},{"key":"key20170323073302_B6","unstructured":"KayeJ Data sharing in genomics \u2014 re-shaping scientific practiceNature Reviews Genetics200910533133510.1038\/nrg2573Available at: http:\/\/www.nature.com\/doifinder\/10.1038\/nrg2573 (Accessed August 30, 2016)"},{"key":"key20170323073302_B7","unstructured":"MorganR Consent forms guidance2016Available at: http:\/\/www.research-integrity.admin.cam.ac.uk\/research-ethics\/ethics-application-guidance\/consent-forms-and-participant-information-sheets"},{"issue":"4","key":"key20170323073302_B8","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1016\/j.giq.2010.06.005","article-title":"On making public policy with publicly available data: The case of U.S. communications policymaking","volume":"27","author":"Napoli","year":"2010","journal-title":"Government Information Quarterly"},{"key":"key20170323073302_B9","doi-asserted-by":"crossref","DOI":"10.1787\/9789264034020-en-fr","author":"OECD","year":"2007","journal-title":"OECD Principles and Guidelines for Access to Research Data from Public Funding OECD Principles and Guidelines for Access to Research Data from Public Funding ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT"},{"article-title":"Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization","year":"2009","author":"Ohm","key":"key20170323073302_B10"},{"key":"key20170323073302_B11","first-page":"35","article-title":"Exploring re-identification risks in public domains","author":"Ramachandran","year":"2012"},{"issue":"4","key":"key20170323073302_B12","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.giq.2003.09.001","article-title":"Government secrecy: policy depths and dimensions","volume":"20","author":"Relyea","year":"2003","journal-title":"Government Information Quarterly"},{"key":"key20170323073302_B13","unstructured":"SmithM DSpaceD-Lib Magazine20039110.1045\/january2003-smithAvailable at: http:\/\/www.dlib.org\/dlib\/january03\/smith\/01smith.html (Accessed August 19, 2016)"},{"key":"key20170323073302_B14","unstructured":"TeperekM KingsleyD Funders\u2019 policies on research data management and sharingResearch Data Management Website2016Available at: http:\/\/www.data.cam.ac.uk\/funders"},{"key":"key20170323073302_B15","unstructured":"UK Open Research Data Forum Concordat on Open Research Data2016Available at: http:\/\/www.rcuk.ac.uk\/documents\/documents\/concordatonopenresearchdata-pdf\/ (Accessed August 30, 2016)"}],"container-title":["Data Science Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/doi.org\/10.5334\/dsj-2017-010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T20:29:11Z","timestamp":1658867351000},"score":1,"resource":{"primary":{"URL":"http:\/\/datascience.codata.org\/articles\/10.5334\/dsj-2017-010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,23]]},"references-count":15,"alternative-id":["10.5334\/dsj-2017-010"],"URL":"https:\/\/doi.org\/10.5334\/dsj-2017-010","relation":{},"ISSN":["1683-1470"],"issn-type":[{"type":"electronic","value":"1683-1470"}],"subject":[],"published":{"date-parts":[[2017,3,23]]},"article-number":"10"}}