iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/2658983
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T17:51:14Z","timestamp":1720374674536},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2015,2,23]],"date-time":"2015-02-23T00:00:00Z","timestamp":1424649600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2015,2,23]]},"abstract":"A revealing picture of how personal health information searches become the property of private corporations.<\/jats:p>","DOI":"10.1145\/2658983","type":"journal-article","created":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T13:41:09Z","timestamp":1424785269000},"page":"68-77","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Privacy implications of health information seeking on the web"],"prefix":"10.1145","volume":"58","author":[{"given":"Timothy","family":"Libert","sequence":"first","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA"}]}],"member":"320","published-online":{"date-parts":[[2015,2,23]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.336995"},{"key":"e_1_2_1_3_1","volume-title":"Flash cookies and privacy ii: Now with HTML5 and etag respawning. Available at SSRN 1898390","author":"Ayenson M.","year":"2011","unstructured":"Ayenson , M. , Wambach , D. , Soltani , A. , Good , N. and Hoofnagle , C . Flash cookies and privacy ii: Now with HTML5 and etag respawning. Available at SSRN 1898390 , 2011 . Ayenson, M., Wambach, D., Soltani, A., Good, N. and Hoofnagle, C. Flash cookies and privacy ii: Now with HTML5 and etag respawning. Available at SSRN 1898390, 2011."},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 12th Workshop on the Economics of Information Security","author":"Castellucia C.","year":"2013","unstructured":"Castellucia , C. , Grumbach , S. Olejnik , L. et al. Data harvesting 2.0: From the visible to the Invisible Web . In Proceedings of the 12th Workshop on the Economics of Information Security , 2013 . Castellucia, C., Grumbach, S. Olejnik, L. et al. Data harvesting 2.0: From the visible to the Invisible Web. In Proceedings of the 12th Workshop on the Economics of Information Security, 2013."},{"key":"e_1_2_1_5_1","volume-title":"New York Times, (2012","author":"Duhigg C.","year":"2012","unstructured":"Duhigg , C. How companies learn your secrets . New York Times, (2012 ), 2012 . Duhigg, C. How companies learn your secrets. New York Times, (2012), 2012."},{"key":"e_1_2_1_6_1","volume-title":"Wall Street Journal","author":"Dwoskin E.D.E.","year":"2013","unstructured":"Dwoskin , E.D.E. Data broker removes rape-victims list after journal inquiry . Wall Street Journal , 2013 . Dwoskin, E.D.E. Data broker removes rape-victims list after journal inquiry. Wall Street Journal, 2013."},{"key":"e_1_2_1_7_1","first-page":"18","article-title":"How unique is your Web browser?","volume":"1","author":"Eckersley P","year":"2010","unstructured":"Eckersley , P . How unique is your Web browser? Privacy Enhancing Technologies. Springer , 2010 , 1 -- 18 . Eckersley, P. How unique is your Web browser? Privacy Enhancing Technologies. Springer, 2010, 1--18.","journal-title":"Privacy Enhancing Technologies. Springer"},{"key":"e_1_2_1_8_1","volume-title":"et al. Hypertext transfer protocol","author":"Fielding R.","year":"1999","unstructured":"Fielding , R. et al. Hypertext transfer protocol ( 1999 ), http\/1.1. Fielding, R. et al. Hypertext transfer protocol (1999), http\/1.1."},{"key":"e_1_2_1_9_1","volume-title":"Health online","author":"Fox S.","year":"2013","unstructured":"Fox , S. and Duggan , M . Health online 2013 . Pew Internet and American Life Project . Fox, S. and Duggan, M. Health online 2013. Pew Internet and American Life Project."},{"key":"e_1_2_1_10_1","volume-title":"Ethics: Survey of Consumer Attitudes about Health Web Sites","author":"Grimes-Gruczka T.","year":"2000","unstructured":"Grimes-Gruczka , T. , Gratzer , C. and Dialogue , C . Ethics: Survey of Consumer Attitudes about Health Web Sites . California HealthCare Foundation , 2000 . Grimes-Gruczka, T., Gratzer, C. and Dialogue, C. Ethics: Survey of Consumer Attitudes about Health Web Sites. California HealthCare Foundation, 2000."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amjmed.2009.04.012"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the Amsterdam Privacy Conference","author":"Hoofnagle C.","year":"2012","unstructured":"Hoofnagle , C. , Urban , J. and Li , S . Privacy and modern advertising: Most us Internet users want'do not track'to stop collection of data about their online activities . In Proceedings of the Amsterdam Privacy Conference , 2012 . Hoofnagle, C., Urban, J. and Li, S. Privacy and modern advertising: Most us Internet users want'do not track'to stop collection of data about their online activities. In Proceedings of the Amsterdam Privacy Conference, 2012."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135884"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866339"},{"key":"e_1_2_1_15_1","volume-title":"Sources: Target investigating data breach (2013)","author":"Krebs B.","year":"2013","unstructured":"Krebs , B. Sources: Target investigating data breach (2013) ; http:\/\/krebsonsecurity.com\/ 2013 \/12\/sourcestarget-investigating-data-breach\/. Krebs, B. Sources: Target investigating data breach (2013); http:\/\/krebsonsecurity.com\/2013\/12\/sourcestarget-investigating-data-breach\/."},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the Web 2.0 Security and Privacy Workshop","author":"Krishnamurthy B.","year":"2011","unstructured":"Krishnamurthy , B. , Naryshkin , K. and Wills , C . Privacy leakage vs. protection measures: The growing disconnect . In Proceedings of the Web 2.0 Security and Privacy Workshop , 2011 . Krishnamurthy, B., Naryshkin, K. and Wills, C. Privacy leakage vs. protection measures: The growing disconnect. In Proceedings of the Web 2.0 Security and Privacy Workshop, 2011."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526782"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177088"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_2_1_20_1","volume-title":"I know why you went to the clinic: Risks and realization of https traffic analysis. arXiv preprint arXiv:1403.0297","author":"Miller B.","year":"2014","unstructured":"Miller , B. , Huang , L. , Joseph , A. and Tygar , J . I know why you went to the clinic: Risks and realization of https traffic analysis. arXiv preprint arXiv:1403.0297 , 2014 . Miller, B., Huang, L., Joseph, A. and Tygar, J. I know why you went to the clinic: Risks and realization of https traffic analysis. arXiv preprint arXiv:1403.0297, 2014."},{"key":"e_1_2_1_21_1","unstructured":"National Institutes of Health History of Medicine Division. Greek medicine (2002); http:\/\/www.nlm.nih.gov\/hmd\/greek\/greekoath.html National Institutes of Health History of Medicine Division. Greek medicine (2002); http:\/\/www.nlm.nih.gov\/hmd\/greek\/greekoath.html"},{"key":"e_1_2_1_22_1","unstructured":"Network Advertising Initiative. NAI code of conduct 201. Network Advertising Initiative. NAI code of conduct 201."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_2_1_24_1","volume-title":"PhantomJS is a headless Webkit scriptable {browser} with a JavaScript API","author":"Phantom JS.","year":"2013","unstructured":"Phantom JS. PhantomJS is a headless Webkit scriptable {browser} with a JavaScript API , 2013 ; http:\/\/phantomjs.org\/, PhantomJS. PhantomJS is a headless Webkit scriptable {browser} with a JavaScript API, 2013; http:\/\/phantomjs.org\/,"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228315"},{"key":"e_1_2_1_26_1","volume-title":"Senate","author":"Staff","year":"2013","unstructured":"Staff of Chairman Rockefeller. A review of the data broker industry: Collection, use, and sale of consumer data for marketing purposes. U.S . Senate , 2013 . Staff of Chairman Rockefeller. A review of the data broker industry: Collection, use, and sale of consumer data for marketing purposes. U.S. Senate, 2013."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2447976.2447990"},{"key":"e_1_2_1_28_1","volume-title":"The Daily You: How the New Advertising Industry is Defining Your Identity and Your Worth","author":"Turow J.","year":"2012","unstructured":"Turow , J. The Daily You: How the New Advertising Industry is Defining Your Identity and Your Worth . Yale University Press , 2012 . Turow, J. The Daily You: How the New Advertising Industry is Defining Your Identity and Your Worth. Yale University Press, 2012."},{"key":"e_1_2_1_29_1","volume-title":"Americans & online privacy: The system is broken","author":"Turow J.","year":"2003","unstructured":"Turow , J. and Center , A.P.P . Americans & online privacy: The system is broken . Annenberg Public Policy Center , University of Pennsylvania, 2003 . Turow, J. and Center, A.P.P. Americans & online privacy: The system is broken. Annenberg Public Policy Center, University of Pennsylvania, 2003."},{"key":"e_1_2_1_30_1","volume-title":"Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214","author":"Turow J.","year":"2009","unstructured":"Turow , J. King , J. , Hoofnagle , C.J. , Bleakley , A. and Hennessy , M . Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214 , 2009 . Turow, J. King, J., Hoofnagle, C.J., Bleakley, A. and Hennessy, M. Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214, 2009."},{"key":"e_1_2_1_31_1","first-page":"1996","author":"United States","year":"1996","unstructured":"United States . Health Insurance Portability and Accountability Act of 1996 . Public Law, 1996 , 104--191. United States. Health Insurance Portability and Accountability Act of 1996. Public Law, 1996, 104--191.","journal-title":"Health Insurance Portability and Accountability Act of"},{"key":"e_1_2_1_32_1","volume-title":"Complying with the FTC's health breach notification rule","author":"U.S. Federal Trade Commission","year":"2010","unstructured":"U.S. Federal Trade Commission . Complying with the FTC's health breach notification rule , 2010 ; http:\/\/www.business.ftc.gov\/documents\/bus56-complyingftcs-health-breach-noti_cation-rule\/ U.S. Federal Trade Commission. Complying with the FTC's health breach notification rule, 2010; http:\/\/www.business.ftc.gov\/documents\/bus56-complyingftcs-health-breach-noti_cation-rule\/"},{"key":"e_1_2_1_33_1","volume-title":"Protecting consumer privacy in an era of rapid change preliminary staff report","author":"U.S. Federal Trade Commission","year":"2010","unstructured":"U.S. Federal Trade Commission . Protecting consumer privacy in an era of rapid change preliminary staff report , 2010 ; http:\/\/www.ftc.gov\/sites\/default\/_les\/documents\/reports\/federal-trade-commission-bureau-consumer-protection-preliminary-ftc-sta_-report-protecting-consumer\/101201privacyreport.pdf\/ U.S. Federal Trade Commission. Protecting consumer privacy in an era of rapid change preliminary staff report, 2010; http:\/\/www.ftc.gov\/sites\/default\/_les\/documents\/reports\/federal-trade-commission-bureau-consumer-protection-preliminary-ftc-sta_-report-protecting-consumer\/101201privacyreport.pdf\/"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of NDSS","author":"Yen T.-F.","year":"2012","unstructured":"Yen , T.-F. , Xie , Y. , Yu , F. , Yu , R.P. and Abadi , M . Host fingerprinting and tracking on the Web: Privacy and security implications . In Proceedings of NDSS , 2012 . Yen, T.-F., Xie, Y., Yu, F., Yu, R.P. and Abadi, M. Host fingerprinting and tracking on the Web: Privacy and security implications. In Proceedings of NDSS, 2012."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2658983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T20:26:06Z","timestamp":1672431966000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2658983"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,23]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,2,23]]}},"alternative-id":["10.1145\/2658983"],"URL":"https:\/\/doi.org\/10.1145\/2658983","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,23]]},"assertion":[{"value":"2015-02-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}