{"id":"https://openalex.org/W2072865839","doi":"https://doi.org/10.1109/mts.2012.2232154","title":"Privacy - The times they are a-changin' [Introduction]","display_name":"Privacy - The times they are a-changin' [Introduction]","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W2072865839","doi":"https://doi.org/10.1109/mts.2012.2232154","mag":"2072865839"},"language":"en","primary_location":{"id":"doi:10.1109/mts.2012.2232154","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mts.2012.2232154","pdf_url":null,"source":{"id":"https://openalex.org/S101091692","display_name":"IEEE Technology and Society Magazine","issn_l":"0278-0097","issn":["0278-0097","1937-416X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Technology and Society Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052920699","display_name":"MG Michael","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"MG Michael","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5052796632","display_name":"Katina Michael","orcid":"https://orcid.org/0000-0003-3118-5557"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Katina Michael","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052920699"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9226,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.84808131,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"31","issue":"4","first_page":"20","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9448999762535095,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9448999762535095,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/viewpoints","display_name":"Viewpoints","score":0.7228549718856812},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.7063247561454773},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6135678291320801},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5586254000663757},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5366724133491516},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5357657074928284},{"id":"https://openalex.org/keywords/the-right-to-privacy","display_name":"The Right to Privacy","score":0.48340025544166565},{"id":"https://openalex.org/keywords/special-section","display_name":"Special section","score":0.45889899134635925},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4571123421192169},{"id":"https://openalex.org/keywords/section","display_name":"Section (typography)","score":0.4555070400238037},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40678879618644714},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3829323351383209},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.3537854552268982},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.21006536483764648},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16974607110023499},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.13863679766654968},{"id":"https://openalex.org/keywords/human-rights","display_name":"Human rights","score":0.12671443819999695},{"id":"https://openalex.org/keywords/aesthetics","display_name":"Aesthetics","score":0.09992283582687378}],"concepts":[{"id":"https://openalex.org/C2776035091","wikidata":"https://www.wikidata.org/wiki/Q7928819","display_name":"Viewpoints","level":2,"score":0.7228549718856812},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.7063247561454773},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6135678291320801},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5586254000663757},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5366724133491516},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5357657074928284},{"id":"https://openalex.org/C14587133","wikidata":"https://www.wikidata.org/wiki/Q7760779","display_name":"The Right to Privacy","level":3,"score":0.48340025544166565},{"id":"https://openalex.org/C2993458768","wikidata":"https://www.wikidata.org/wiki/Q3477549","display_name":"Special section","level":2,"score":0.45889899134635925},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4571123421192169},{"id":"https://openalex.org/C2780129039","wikidata":"https://www.wikidata.org/wiki/Q1931107","display_name":"Section (typography)","level":2,"score":0.4555070400238037},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40678879618644714},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3829323351383209},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.3537854552268982},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.21006536483764648},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16974607110023499},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.13863679766654968},{"id":"https://openalex.org/C169437150","wikidata":"https://www.wikidata.org/wiki/Q8458","display_name":"Human rights","level":2,"score":0.12671443819999695},{"id":"https://openalex.org/C107038049","wikidata":"https://www.wikidata.org/wiki/Q35986","display_name":"Aesthetics","level":1,"score":0.09992283582687378},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C61696701","wikidata":"https://www.wikidata.org/wiki/Q770766","display_name":"Engineering physics","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mts.2012.2232154","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mts.2012.2232154","pdf_url":null,"source":{"id":"https://openalex.org/S101091692","display_name":"IEEE Technology and Society Magazine","issn_l":"0278-0097","issn":["0278-0097","1937-416X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Technology and Society Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3106511255","https://openalex.org/W2381943935","https://openalex.org/W116288322","https://openalex.org/W2617230171","https://openalex.org/W3175527458","https://openalex.org/W3122740195","https://openalex.org/W2263052668","https://openalex.org/W2277804169","https://openalex.org/W1737468703","https://openalex.org/W194355227"],"abstract_inverted_index":{"This":[0],"special":[1],"section":[2],"is":[3,36,46,164],"dedicated":[4],"to":[5,56,62,70,84,109,114,129,145,151],"privacy":[6,153],"in":[7,117],"the":[8,14,21,30,68,118,158,166],"information":[9,76],"age.":[10],"In":[11],"particular,":[12],"since":[13],"rise":[15],"of":[16,23,94,103,157,168,171],"mobile":[17],"social":[18],"media":[19],"and":[20,41,113,125,170],"advent":[22],"cloud":[24],"computing,":[25],"few":[26],"can":[27],"dispute":[28],"that":[29,45,135,149],"times":[31],"have":[32,63,81,110],"indeed":[33],"changed.":[34],"Privacy":[35,160],"now":[37,131],"understood":[38],"\"in":[39],"context\"":[40],"within":[42],"a":[43,91,142,155],"framework":[44],"completely":[47],"different":[48],"from":[49],"what":[50],"it":[51],"once":[52],"was.":[53],"The":[54],"right":[55,69],"be":[57],"let":[58],"alone":[59],"physically":[60],"seems":[61],"been":[64],"up":[65,140],"turned":[66],"by":[67],"give":[71],"away":[72],"virtually":[73],"as":[74,77],"much":[75],"we":[78,133,136],"like.":[79],"We":[80,121],"endeavoured":[82],"here":[83],"offer":[85],"an":[86],"international":[87],"Special":[88],"Section":[89],"with":[90,141],"wide":[92],"range":[93],"perspectives.":[95],"Some":[96],"articles":[97],"digress":[98],"on":[99],"viewpoints,":[100],"but":[101],"all":[102],"our":[104],"expert":[105],"authors":[106],"are":[107],"willing":[108],"open":[111],"dialogue":[112],"seriously":[115],"engage":[116],"public":[119],"forum.":[120],"must":[122],"capture":[123],"these":[124],"other":[126],"consonant":[127],"opportunities":[128],"speak":[130],"while":[132],"can,":[134],"might":[137],"together":[138],"come":[139],"global":[143],"approach":[144],"arrest":[146],"alarming":[147],"developments":[148],"threaten":[150],"turn":[152],"into":[154],"thing":[156],"past.":[159],"does":[161],"matter.":[162],"It":[163],"both":[165],"stuff":[167],"dreams":[169],"identity.":[172]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
