{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:00:26Z","timestamp":1725544826358},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642116292"},{"type":"electronic","value":"9783642116315"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11631-5_14","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T08:44:11Z","timestamp":1264841051000},"page":"151-160","source":"Crossref","is-referenced-by-count":4,"title":["Economics of Personal Data Management: Fair Personal Information Trades"],"prefix":"10.1007","author":[{"given":"A.","family":"Tasidou","sequence":"first","affiliation":[]},{"given":"P. S.","family":"Efraimidis","sequence":"additional","affiliation":[]},{"given":"V.","family":"Katos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/1-4020-8090-5_13","volume-title":"The Economics of Information Security","author":"A. Acquisti","year":"2004","unstructured":"Acquisti, A.: Privacy and security of personal information: Technological solutions and economic incentives. In: Camp, J., Lewis, R. (eds.) The Economics of Information Security, pp. 165\u2013178. Kluwer, Dordrecht (2004)"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"200","DOI":"10.5210\/fm.v6i8.877","volume":"6","author":"E. Adar","year":"2001","unstructured":"Adar, E., Huberman, B.A.: A market for secrets. First Monday\u00a06, 200\u2013201 (2001)","journal-title":"First Monday"},{"key":"14_CR3","unstructured":"Anderson, R.: U.k. government loses personal data on 25 million citizens. EDRI-gram\u00a05.22 (November 21, 2007)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, R., Moore, T.: The economics of information security. Science\u00a0314(5799)","DOI":"10.1126\/science.1130992"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-540-40956-4_14","volume-title":"Privacy Enhancing Technologies","author":"S.-C. Cha","year":"2003","unstructured":"Cha, S.-C., Joung, Y.-J.: From p3p to data licenses. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 205\u2013222. Springer, Heidelberg (2003)"},{"key":"14_CR6","unstructured":"Efraimidis, P.S., Drosatos, G., Nalbadis, F., Tasidou, A.: Towards privacy in personal data management. Accepted for publication in Information Management and Computer Security, Emerald"},{"key":"14_CR7","unstructured":"Georgakopoulos, G.: Privacy enhancing technologies for personal data management. Master\u2019s thesis, Dept. Electr.& Comp. Eng., DUTH, Greece (October 2008)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Goldberg, I.: Privacy-enancing technologies for the internet iii: Ten years later. In: Acquisti, A., Gritzalis, S., Lambrinoudakis, C., di Vimercati, S. (eds.) Digital Privacy: Theory, Technologies, and Practices, December 2007, ch.\u00a01 (2007)","DOI":"10.1201\/9781420052183.ch1"},{"key":"14_CR9","volume-title":"HICSS 2006: Proceedings of the 39th Annual Hawaii International Conference on System Sciences","author":"R. Gopal","year":"2006","unstructured":"Gopal, R., Garfinkel, R., Nunez, M., Rice, D.: Electronic markets for private information: Economic and security considerations. In: HICSS 2006: Proceedings of the 39th Annual Hawaii International Conference on System Sciences, Washington, DC, USA. IEEE Computer Society, Los Alamitos (2006)"},{"key":"14_CR10","unstructured":"Greenstadt, R., Smith, M.D.: Protecting personal information: Obstacles and directions. In: WEIS 2005 (2005)"},{"issue":"3","key":"14_CR11","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1108\/09685220410542615","volume":"12","author":"S. Gritzalis","year":"2004","unstructured":"Gritzalis, S.: Enhancing web privacy and anonymity in the digital era. Information Management and Computer Security\u00a012(3), 255\u2013287 (2004)","journal-title":"Information Management and Computer Security"},{"issue":"5","key":"14_CR12","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MSP.2005.137","volume":"3","author":"A.H. Bernardo","year":"2005","unstructured":"Bernardo, A.H., Adar, E., Fine, L.R.: Valuating privacy. IEEE Security and Privacy\u00a03(5), 22\u201325 (2005)","journal-title":"IEEE Security and Privacy"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1108\/09685220810862760","volume":"16","author":"V. Katos","year":"2008","unstructured":"Katos, V., Patel, A.: A partial equilibrium view on security and privacy. Information Management & Computer Security\u00a016, 74\u201383 (2008)","journal-title":"Information Management & Computer Security"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/11573036_52","volume-title":"Advances in Informatics","author":"S.K. Katsikas","year":"2005","unstructured":"Katsikas, S.K., Lopez, J., Pernul, G.: Trust, privacy and security in e-business: Requirements and solutions. In: Bozanis, P., Houstis, E.N. (eds.) PCI 2005. LNCS, vol.\u00a03746, pp. 548\u2013558. Springer, Heidelberg (2005)"},{"key":"14_CR15","unstructured":"Kleinberg, J., Papadimitriou, C., Raghavan, P.: On the value of private information. TARK: Theoretical Aspects of Reasoning about Knowledge\u00a08 (2001)"},{"issue":"9","key":"14_CR16","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/234215.234476","volume":"39","author":"K.C. Laudon","year":"1996","unstructured":"Laudon, K.C.: Markets and privacy. Commun. ACM\u00a039(9), 92\u2013104 (1996)","journal-title":"Commun. ACM"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A.: Payword and micromint: two simple micropayment schemes. In: CryptoBytes, vol.\u00a02, pp. 69\u201387 (1996)","DOI":"10.1007\/3-540-62494-5_6"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Tasidou, A., Efraimidis, P.S., Katos, V.: Economics of personal data management: Fair personal information trades. Technical Report LPDP-2009-01, Dept. Electr.& Comp. Eng., DUTH, Greece (2009)","DOI":"10.1007\/978-3-642-11631-5_14"},{"key":"14_CR19","unstructured":"Varian, H.: Economic aspects of personal privacy. U.S. Dept. of Commerce, Privacy and Self-Regulation in the Information Age (1996)"},{"key":"14_CR20","unstructured":"Wikipedia. Fair trade, http:\/\/en.wikipedia.org\/wiki\/Fair_trade"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Next Generation Society. Technological and Legal Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11631-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T21:03:46Z","timestamp":1685394226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11631-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642116292","9783642116315"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11631-5_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}