{"entities":{"Q4251":{"pageid":27348,"ns":120,"title":"Item:Q4251","lastrevid":85792,"modified":"2020-04-14T17:45:19Z","type":"item","id":"Q4251","labels":{"en":{"language":"en","value":"Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic"}},"descriptions":{"en":{"language":"en","value":"journal article from 'arXiv:2003.08567 [cs]' published on March 19, 2020"}},"aliases":{},"claims":{"P3":[{"mainsnak":{"snaktype":"value","property":"P3","datavalue":{"value":{"entity-type":"item","numeric-id":210,"id":"Q210"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4251$66D6811F-F8A0-4F85-ACE7-B9EC5C2B64A1","rank":"normal"}],"P15":[{"mainsnak":{"snaktype":"value","property":"P15","datavalue":{"value":"https://arxiv.org/pdf/2003.08567.pdf","type":"string"},"datatype":"url"},"type":"statement","id":"Q4251$b5849da4-4e31-2c99-a710-1d00a09e19bf","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P15","datavalue":{"value":"https://drive.google.com/file/d/1UGY07m8GNrUaj9bGRx07vDMccxTcGRQS/view","type":"string"},"datatype":"url"},"type":"statement","qualifiers":{"P126":[{"snaktype":"value","property":"P126","hash":"b257a205c8dc291a93cb98660e54eec1a8bab9a6","datavalue":{"value":"summary","type":"string"},"datatype":"string"}]},"qualifiers-order":["P126"],"id":"Q4251$08303a4d-454d-f5fd-b943-01188a76e167","rank":"normal"}],"P212":[{"mainsnak":{"snaktype":"value","property":"P212","datavalue":{"value":"2003.08567","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q4251$34f5b019-40a8-fcaa-44ff-a340a2e67ea5","rank":"normal"}],"P110":[{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4138,"id":"Q4138"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4251$e2dfad34-46ce-604e-463e-1a8e611ba8ac","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4048,"id":"Q4048"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4251$1ad08833-406e-d193-f75c-f8eb9dfcc549","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4209,"id":"Q4209"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4251$8e1432a3-4852-256b-751d-2745a425dbeb","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4258,"id":"Q4258"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4251$e5185e1c-4c6f-9b0a-2dd3-975f5a5f81ad","rank":"normal"}],"P203":[{"mainsnak":{"snaktype":"value","property":"P203","datavalue":{"value":".As a beginning to the discussion of how to develop and deploy contact-tracing technologies in a manner which best protects the privacy and data security of its users,we have reviewed various technological methods for contact-tracing and have discussed the risks to both individuals and societies.PrivateKit:SafePaths eliminates the risk of government surveillance.","type":"string"},"datatype":"string"},"type":"statement","id":"Q4251$12b7e664-4991-e106-4319-986e8e40ff55","rank":"normal"}],"P112":[{"mainsnak":{"snaktype":"value","property":"P112","datavalue":{"value":{"entity-type":"item","numeric-id":4240,"id":"Q4240"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4251$14418c1e-475f-0788-a2d2-c352486bc8b8","rank":"normal"}],"P100":[{"mainsnak":{"snaktype":"value","property":"P100","datavalue":{"value":{"time":"+2020-03-19T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q4251$3d354060-4069-5d4a-5567-79646e253bab","rank":"normal"}]},"sitelinks":{}}}}