{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T12:10:12Z","timestamp":1742731812575,"version":"3.40.2"},"reference-count":0,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Law & Security Review"],"published-print":{"date-parts":[[2009]]},"DOI":"10.1016\/j.clsr.2008.11.004","type":"journal-article","created":{"date-parts":[[2008,11,20]],"date-time":"2008-11-20T16:50:42Z","timestamp":1227199842000},"page":"69-83","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":25,"title":["Privacy, trust and policy-making: Challenges and responses"],"prefix":"10.1016","volume":"25","author":[{"given":"David","family":"Wright","sequence":"first","affiliation":[]},{"given":"Serge","family":"Gutwirth","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Friedewald","sequence":"additional","affiliation":[]},{"given":"Paul","family":"De Hert","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Langheinrich","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Moscibroda","sequence":"additional","affiliation":[]}],"member":"78","container-title":["Computer Law & Security Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364908001672?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364908001672?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T11:03:33Z","timestamp":1742727813000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0267364908001672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":0,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009]]}},"alternative-id":["S0267364908001672"],"URL":"https:\/\/doi.org\/10.1016\/j.clsr.2008.11.004","relation":{},"ISSN":["2212-473X"],"issn-type":[{"type":"print","value":"2212-473X"}],"subject":[],"published":{"date-parts":[[2009]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Privacy, trust and policy-making: Challenges and responses","name":"articletitle","label":"Article Title"},{"value":"Computer Law & Security Review","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.clsr.2008.11.004","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2009 David Wright, Professor Serge Gutwirth, Michael Friedewald, Professor Paul De Hert, Asst. Professor Marc Langheinrich, Anna Moscibroda. Published by Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}]}}