{"id":"https://openalex.org/W3211803660","doi":"https://doi.org/10.1145/3460120.3482789","title":"Towards Building a Responsible Data Economy","display_name":"Towards Building a Responsible Data Economy","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3211803660","doi":"https://doi.org/10.1145/3460120.3482789","mag":"3211803660"},"language":"en","primary_location":{"id":"doi:10.1145/3460120.3482789","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3482789","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102480144","display_name":"Dawn Song","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dawn Song","raw_affiliation_strings":["University of California, Berkeley, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5102480144"],"corresponding_institution_ids":["https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1643787,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9541000127792358,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6362376809120178},{"id":"https://openalex.org/keywords/digital-economy","display_name":"Digital economy","score":0.6295346021652222},{"id":"https://openalex.org/keywords/valuation","display_name":"Valuation (finance)","score":0.5688251852989197},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5585224032402039},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5502552390098572},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5400600433349609},{"id":"https://openalex.org/keywords/digital-data","display_name":"Digital data","score":0.47709375619888306},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.45802223682403564},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.4568113386631012},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4316127300262451},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4204634130001068},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.41210633516311646},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.21400853991508484},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14517205953598022},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12887105345726013},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.09832799434661865},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.09733867645263672}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6362376809120178},{"id":"https://openalex.org/C203043789","wikidata":"https://www.wikidata.org/wiki/Q138461","display_name":"Digital economy","level":2,"score":0.6295346021652222},{"id":"https://openalex.org/C186027771","wikidata":"https://www.wikidata.org/wiki/Q4008379","display_name":"Valuation (finance)","level":2,"score":0.5688251852989197},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5585224032402039},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5502552390098572},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5400600433349609},{"id":"https://openalex.org/C2778864079","wikidata":"https://www.wikidata.org/wiki/Q173285","display_name":"Digital data","level":3,"score":0.47709375619888306},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.45802223682403564},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.4568113386631012},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4316127300262451},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4204634130001068},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.41210633516311646},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.21400853991508484},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14517205953598022},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12887105345726013},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.09832799434661865},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.09733867645263672},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3460120.3482789","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3482789","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W1265951235","https://openalex.org/W4390203642","https://openalex.org/W189247940","https://openalex.org/W3210671189","https://openalex.org/W3217417625"],"abstract_inverted_index":{"Data":[0],"is":[1,17],"a":[2,12,87,90],"key":[3],"driver":[4],"of":[5,14,99,117],"modern":[6],"economy":[7],"and":[8,19,31,76,83,113,137],"AI/machine":[9],"learning,":[10,67],"however,":[11],"lot":[13],"this":[15,49,130],"data":[16,23,59,74,92,100,111,135,138,147],"sensitive":[18,22],"handling":[20],"the":[21,45],"has":[24],"caused":[25],"unprecedented":[26],"challenges":[27,34],"for":[28,57,73,89],"both":[29],"individuals":[30],"businesses.":[32],"These":[33],"will":[35,52,123,141],"only":[36],"get":[37],"more":[38,96],"severe":[39],"as":[40,68,70],"we":[41],"move":[42],"forward":[43],"in":[44],"digital":[46],"era.":[47],"In":[48],"talk,":[50],"I":[51,122,140],"talk":[53,125],"about":[54,126],"technologies":[55,72,82],"needed":[56],"responsible":[58,91,97],"use":[60,98],"including":[61,133],"secure":[62],"computing,":[63],"differential":[64],"privacy,":[65],"federated":[66],"well":[69],"blockchain":[71,84],"rights,":[75],"how":[77],"to":[78,85,94],"combine":[79],"privacy":[80],"computing":[81],"building":[86],"platform":[88],"economy,":[93],"enable":[95,114],"that":[101,129],"maximizes":[102],"social":[103],"welfare":[104],"&":[105],"economic":[106],"efficiency":[107],"while":[108],"protecting":[109],"users'":[110],"rights":[112],"fair":[115],"distribution":[116],"value":[118],"created":[119],"from":[120],"data.":[121],"also":[124,142],"new":[127,144],"paradigms":[128],"approach":[131],"enables":[132],"decentralized":[134],"science":[136],"DAO.":[139],"discuss":[143],"frameworks":[145],"on":[146],"valuation.":[148]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
