{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T07:40:09Z","timestamp":1733298009799,"version":"3.30.1"},"reference-count":31,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IP"],"published-print":{"date-parts":[[2017,11,8]]},"DOI":"10.3233\/ip-170419","type":"journal-article","created":{"date-parts":[[2017,10,17]],"date-time":"2017-10-17T16:21:00Z","timestamp":1508257260000},"page":"291-309","source":"Crossref","is-referenced-by-count":13,"title":["Advancing the EU data economy: Conditions for realizing the full potential of data reuse"],"prefix":"10.1177","volume":"22","author":[{"given":"Bart","family":"Custers","sequence":"first","affiliation":[{"name":"eLAW, Center for Law and Digital Technologies, Leiden University, Leiden, The Netherland"}]},{"given":"Daniel","family":"Bachlechner","sequence":"additional","affiliation":[{"name":"Fraunhofer ISI, Germany"}]}],"member":"179","reference":[{"key":"10.3233\/IP-170419_ref2","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ijinfomgt.2014.10.007","article-title":"Beyond the hype: Big data concepts, methods and analytics","volume":"35","author":"Gandomi,","year":"2015","journal-title":"International Journal of Information Management"},{"key":"10.3233\/IP-170419_ref3","unstructured":"Laney, D. (2001) 3D Data Management: Controlling Data Volume, Velocity and Variety. Gartner. Stamford CT: META Group Inc."},{"key":"#cr-split#-10.3233\/IP-170419_ref4.1","unstructured":"Tene, O., and Polonetsky, J. (2012) Privacy in the Age of Big Data"},{"key":"#cr-split#-10.3233\/IP-170419_ref4.2","unstructured":"A Time for Big Decisions, 64 Stanford Law Review Online, Feb 2, 2012, 63-69."},{"key":"10.3233\/IP-170419_ref5","unstructured":"Mayer-Sch\u00f6nberger, V., and Cukier, K. (2013) Big Data: A Revolution That Will Transform How We Live, Work and Think, New York: Houghton, Mifflin, Harcourt Publishing Company."},{"key":"10.3233\/IP-170419_ref6","unstructured":"Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburg, C., and Hung Byers, A. (2011) Big Data: The next frontier for innovation, competition and productivity, Seoul: McKinsey Global Institute. See http:\/\/www.mckinsey.com\/business-functions\/business-technology\/our-insights\/big-data-the-next-frontier-for-innovation."},{"key":"10.3233\/IP-170419_ref7","unstructured":"Burns, E. (2016) Why haven\u2019t SMEs cashed in on big data benefits yet? TechTarget. http:\/\/searchbusinessanalytics.techtarget.com\/feature\/Why-havent-SMEs-cashed-in-on-big-data-benefits-yet."},{"key":"10.3233\/IP-170419_ref8","unstructured":"CORDIS (2014)Helping SMEs fish the Big Data ocean, Community Research and Development Information Service (CORDIS). http:\/\/cordis.europa.eu\/result\/rcn\/93077_en.html"},{"key":"10.3233\/IP-170419_ref9","doi-asserted-by":"crossref","unstructured":"Custers, B.H.M., and Ursic, H. (2016) Big Data and Data Reuse; A Taxonomy of Data Reuse for Balancing Big Data Benefits and Personal Data Protection, International Data Privacy Law, 1-12. doi: 10.1093\/idpl\/ipv028.","DOI":"10.1093\/idpl\/ipv028"},{"key":"10.3233\/IP-170419_ref10","unstructured":"Lessig, L. (2006) Code Version 2.0, New York: Basic Books."},{"issue":"2","key":"10.3233\/IP-170419_ref13","doi-asserted-by":"crossref","first-page":"209","DOI":"10.21552\/EDPL\/2016\/2\/10","article-title":"Legal Barriers and Enablers to Big Data Reuse \u2013 A critical Assessment of the Challenges for the EU Law","volume":"2","author":"Ursic,","year":"2016","journal-title":"European Data Protection Law Review"},{"key":"10.3233\/IP-170419_ref14","unstructured":"McDonald, A.M., and Cranor, L.F. (2008) The cost of reading privacy policies. I\/S Journal for Law and Policy for the Information Society. http:\/\/www.aleecia.com\/authors-drafts\/readingPolicyCost-AV.pdf."},{"key":"10.3233\/IP-170419_ref15","first-page":"1880","article-title":"Privacy self-management and the consent dilemma","volume":"126","author":"Solove,","year":"2013","journal-title":"Harvard Law Review"},{"key":"10.3233\/IP-170419_ref18","doi-asserted-by":"crossref","unstructured":"Kaisler, S., Armour, F., Espinosa, J.A., and Money, W. (2013) Big Data: Issues and Challenges Moving Forward. In Proceedings of the 46th Hawaii International Conference on System Sciences (HICSS), p. 995-1004. IEEE.","DOI":"10.1109\/HICSS.2013.645"},{"issue":"4","key":"10.3233\/IP-170419_ref19","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/1594977.1592577","article-title":"BCube: a high performance, server-centric network architecture for modular data centers","volume":"39","author":"Guo,","year":"2009","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"10.3233\/IP-170419_ref20","doi-asserted-by":"crossref","unstructured":"Wang, G., and Ng, T.S.E. (2010) The Impact of Virtualization on Network Performance of Amazon EC2 Data Center. In Proceedings of INFOCOM 2010, p. 1-9. Piscataway, NJ, USA: IEEE.","DOI":"10.1109\/INFCOM.2010.5461931"},{"issue":"2","key":"10.3233\/IP-170419_ref21","first-page":"535","article-title":"A Survey on Recent Trends, Process and Development in Data Masking for Testing","volume":"8","author":"Ravikumar,","year":"2011","journal-title":"International Journal of Computer Science Issues"},{"issue":"2","key":"10.3233\/IP-170419_ref22","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1017\/S106828050000798X","article-title":"Rural Community Participation, Social Networks, and Broadband Use: Examples from Localized and National Survey Data","volume":"40","author":"Stern,","year":"2011","journal-title":"Agricultural and Resource Economics Review"},{"key":"10.3233\/IP-170419_ref25","unstructured":"Bray, T., Paoli, J., Sperberg-McQueen, C.M., Maler, E., Yergeau, F., and Cowan, J. (2006) Extensible Markup Language (XML) 1.1 (Second Edition): W3C Recommendation. http:\/\/www.w3.org\/TR\/2006\/REC-xml11-20060816\/."},{"issue":"4","key":"10.3233\/IP-170419_ref26","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MC.2012.132","article-title":"Discovering JavaScript Object Notation","volume":"45","author":"Severance,","year":"2012","journal-title":"Computer"},{"key":"10.3233\/IP-170419_ref27","unstructured":"Graves, A., and Bustos-Jim\u00e9nez, J. (2014) Towards Visual Overviews for Open Government Data. In Proceedings of Data Wiz 2014."},{"key":"10.3233\/IP-170419_ref28","unstructured":"Moyle, K., Blackall, L., Hudson, F., and Mason, J. (2012) Open Data and Open Data and Open Standards."},{"key":"10.3233\/IP-170419_ref29","unstructured":"WP29 (2016)Guidelines on the right to data portability, Article 29 Data Protection Working Party (WP29), WP242\/16, Brussels 13 December 2016"},{"key":"10.3233\/IP-170419_ref31","unstructured":"Kuner, C. (2012) The European Commission\u2019s Proposed Data Protection Regulation: A Copernican Revolution in European Data Protection Law, Privacy and Security Law Report. 11 PVLR 06, 02\/06\/2012."},{"key":"10.3233\/IP-170419_ref32","first-page":"53","article-title":"Putting the Right to Data Portability into a Competition Law Perspective","author":"Graef,","year":"2013","journal-title":"The Journal of the Higher School of Economics, Annual Review"},{"key":"10.3233\/IP-170419_ref33","doi-asserted-by":"crossref","unstructured":"Swire, P., and Lagos, Y. (2013) Why the Right to Data Portability Likely Reduces Consumer Welfare: Antitrust and Privacy Critique. 72 Maryland Law Review 335.","DOI":"10.2139\/ssrn.2159157"},{"key":"10.3233\/IP-170419_ref34","unstructured":"ISO\/IEC JTC 1 (2014) Big Data, preliminary report, Geneva: ISO."},{"key":"#cr-split#-10.3233\/IP-170419_ref35.1","unstructured":"Benson, P.R. (2009) Data Portability: It is about the Data"},{"key":"#cr-split#-10.3233\/IP-170419_ref35.2","unstructured":"the Quality of the Data. MIT Information Quality Industry Symposium, July 15-17, 2009."},{"key":"10.3233\/IP-170419_ref36","unstructured":"Malcorps, G., and Quintana-Soria, I. (2007) The Vienna Agreement \u2013 CEN as an International Partner. CEN StandarDays, Day 2, Session 5, 2007. Brussels: CEN."},{"issue":"3","key":"10.3233\/IP-170419_ref38","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1002\/1944-2866.POI366","article-title":"Privacy Expectations of Social Media Users: The Role of Informed Consent in Privacy Policies","volume":"6","author":"Custers,","year":"2014","journal-title":"Policy & Internet"}],"container-title":["Information Polity"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IP-170419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T06:35:58Z","timestamp":1733294158000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IP-170419"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,8]]},"references-count":31,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/ip-170419","relation":{},"ISSN":["1570-1255","1875-8754"],"issn-type":[{"type":"print","value":"1570-1255"},{"type":"electronic","value":"1875-8754"}],"subject":[],"published":{"date-parts":[[2017,11,8]]}}}