{"id":160227,"date":"2025-05-30T09:31:32","date_gmt":"2025-05-30T07:31:32","guid":{"rendered":"https:\/\/www.cde.ual.es\/?p=160227"},"modified":"2025-05-30T09:31:32","modified_gmt":"2025-05-30T07:31:32","slug":"how-do-we-protect-personal-data","status":"publish","type":"post","link":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/","title":{"rendered":"How do we protect personal data?"},"content":{"rendered":"<p style=\"text-align: justify;\">Safeguarding personal data in today&#8217;s hyper-connected world is increasingly vital. But how should we protect personal data collected through a variety of sources, such as social media platforms and self-tracking devices? The answer lies in finding the right balance between access and use of the data, and the benefits for all involved.<\/p>\n<p style=\"text-align: justify;\">A research team at the Massachusetts Institute of Technology (MIT) designed a card game as part of an experiment to demonstrate how context influences decisions. The study, based on the game, was published in the journal Humanities and Social Sciences Communications.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2023\/07\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg\" alt=\"protecci\u00f3n de datos\" width=\"585\" height=\"390\" \/><\/p>\n<h2 class=\"c-article__title\" style=\"text-align: justify;\">Data privacy is not a game<\/h2>\n<p class=\"c-article__text \" style=\"text-align: justify;\">As co-author F\u00e0bio Duarte, principal research scientist at MIT&#8217;s Senseable City Lab, commented in a press release: &#8220;There is no absolute value on privacy. Depending on the app, people may feel that the use of their data is more or less invasive&#8221;. To assess different people&#8217;s opinions on the possible trade-off between the benefits of data-driven solutions and individual privacy, the researchers developed Data Slots. Players cooperate and compete against each other. The game has been played by more than 2 000 people worldwide: in person in 18 countries and online in 79 countries. The goal is &#8220;to let people themselves propose their ideas and evaluate the benefits and privacy issues of their peers&#8217; ideas, in a participatory way,&#8221; explained Carlo Ratti, director of the Senseable City Lab. Players exchange cards representing data possibilities, generate ideas for solutions, evaluate each other&#8217;s suggestions for benefits and privacy issues, and ultimately use the strategy to come up with potential applications for data use. The cards represent twelve types of data, such as a personal profile, health metrics and vehicle location information, related to home life, work and public spaces.<\/p>\n<h2 class=\"c-article__title\" style=\"text-align: justify;\">Navigating the complexities of data privacy<\/h2>\n<p class=\"c-article__text \" style=\"text-align: justify;\">Some results reveal that Data Slots participants care a lot about health data and recognise the importance of using environmental data at work. Where there are clear benefits, they are less concerned about data privacy. &#8220;Even when it comes to health data in workspaces, if it is used in aggregate to improve the workspace, for some people it is worth combining personal health data with environmental data,&#8221; adds Simone Mora, research scientist at the Senseable City Lab. Martina Mazzarello, postdoctoral researcher at the Senseable City Lab, explained further: &#8220;Now maybe the company can do some interventions to improve overall health. It might be invasive, but it might give you some benefits back. Cities need to better understand citizens&#8217; views on data privacy. Only then will they be able to make more informed decisions on issues such as the provision of better public health services. &#8220;The bottom line is that if cities disclose what they plan to do with the data and if they involve resident stakeholders to come up with their own ideas about what they could do, that would be beneficial for us,&#8221; Duarte said. And under those assumptions, people&#8217;s privacy concerns start to diminish a lot. Overall, the results show that people&#8217;s perceptions of privacy can change due to different contexts and how data is actually applied. &#8220;We show that the values attributed to data are combinatorial, situational, transactional and contextual,&#8221; the authors conclude.<\/p>\n<p><strong>More information: <a href=\"https:\/\/cordis.europa.eu\/article\/id\/458269-how-do-we-protect-personal-data\/es\">European Commission<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Safeguarding personal data in today&#8217;s hyper-connected world is increasingly vital. But how should we protect personal data collected through a variety of sources, such as social media platforms and self-tracking devices? The answer lies in finding the right balance between access and use of the data, and the benefits for all involved. A research team [&hellip;]<\/p>\n","protected":false},"author":101012,"featured_media":137982,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[4076,4075,346],"tags":[2278,2558,14613,1488,368,7512,350,405,2788,4567,351],"class_list":{"0":"post-160227","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersec","8":"category-defence-security","9":"category-eu-news","10":"tag-comision-europea-en","11":"tag-cordis","12":"tag-data-privacy","13":"tag-european-commission","14":"tag-european-union","15":"tag-game","16":"tag-investigacion-en","17":"tag-investigation","18":"tag-news","19":"tag-noticias-en","20":"tag-union-europea-en","21":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How do we protect personal data? | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do we protect personal data? | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\" \/>\n<meta property=\"og:description\" content=\"Safeguarding personal data in today&#8217;s hyper-connected world is increasingly vital. But how should we protect personal data collected through a variety of sources, such as social media platforms and self-tracking devices? The answer lies in finding the right balance between access and use of the data, and the benefits for all involved. A research team [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/\" \/>\n<meta property=\"og:site_name\" content=\"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cdeuniversidadalmeria\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-30T07:31:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2023\/07\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"BECACDE1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cdeualmeria\" \/>\n<meta name=\"twitter:site\" content=\"@cdeualmeria\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"BECACDE1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/\"},\"author\":{\"name\":\"BECACDE1\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/person\\\/bf2f837cf3353e2161fe1087adbd728f\"},\"headline\":\"How do we protect personal data?\",\"datePublished\":\"2025-05-30T07:31:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/\"},\"wordCount\":541,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg\",\"keywords\":[\"Comision Europea\",\"CORDIS\",\"data privacy\",\"European Commission\",\"European Union\",\"Game\",\"Investigaci\u00f3n\",\"investigation\",\"News\",\"noticias\",\"Uni\u00f3n Europea\"],\"articleSection\":[\"Cybersecurity\",\"Defence &amp; Security\",\"EU News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/\",\"name\":\"How do we protect personal data? | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg\",\"datePublished\":\"2025-05-30T07:31:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg\",\"width\":2560,\"height\":1708,\"caption\":\"protecci\u00f3n de datos\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/how-do-we-protect-personal-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EU News\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/category\\\/eu-news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Defence &amp; Security\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/category\\\/eu-news\\\/defence-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/category\\\/eu-news\\\/defence-security\\\/cybersec\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"How do we protect personal data?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#website\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/\",\"name\":\"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\",\"description\":\"Centro de Documentaci\u00f3n Europea de la Universidad de Almer\u00eda\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\"},\"alternateName\":\"CDE Almer\u00eda\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cde.ual.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\",\"name\":\"Centro de Documentaci\u00f3n Europea de Almer\u00eda\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cde-logo-3.png\",\"contentUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cde-logo-3.png\",\"width\":1400,\"height\":300,\"caption\":\"Centro de Documentaci\u00f3n Europea de Almer\u00eda\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cdeuniversidadalmeria\\\/\",\"https:\\\/\\\/x.com\\\/cdeualmeria\",\"https:\\\/\\\/www.tiktok.com\\\/@cdealmeria\",\"https:\\\/\\\/www.instagram.com\\\/cdealmeria\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/cde-almera-812b26a9\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/person\\\/bf2f837cf3353e2161fe1087adbd728f\",\"name\":\"BECACDE1\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/16a4c1e422b5dec818ee13eab3353b19db9cfd278cc10f9b0e1188a37671d9d4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/16a4c1e422b5dec818ee13eab3353b19db9cfd278cc10f9b0e1188a37671d9d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/16a4c1e422b5dec818ee13eab3353b19db9cfd278cc10f9b0e1188a37671d9d4?s=96&d=mm&r=g\",\"caption\":\"BECACDE1\"},\"sameAs\":[\"http:\\\/\\\/www.cdealmeria.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How do we protect personal data? | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/","og_locale":"en_US","og_type":"article","og_title":"How do we protect personal data? | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","og_description":"Safeguarding personal data in today&#8217;s hyper-connected world is increasingly vital. But how should we protect personal data collected through a variety of sources, such as social media platforms and self-tracking devices? The answer lies in finding the right balance between access and use of the data, and the benefits for all involved. A research team [&hellip;]","og_url":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/","og_site_name":"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","article_publisher":"https:\/\/www.facebook.com\/cdeuniversidadalmeria\/","article_published_time":"2025-05-30T07:31:32+00:00","og_image":[{"width":2560,"height":1708,"url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2023\/07\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"BECACDE1","twitter_card":"summary_large_image","twitter_creator":"@cdeualmeria","twitter_site":"@cdeualmeria","twitter_misc":{"Written by":"BECACDE1","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/#article","isPartOf":{"@id":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/"},"author":{"name":"BECACDE1","@id":"https:\/\/www.cde.ual.es\/#\/schema\/person\/bf2f837cf3353e2161fe1087adbd728f"},"headline":"How do we protect personal data?","datePublished":"2025-05-30T07:31:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/"},"wordCount":541,"commentCount":0,"publisher":{"@id":"https:\/\/www.cde.ual.es\/#organization"},"image":{"@id":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2023\/07\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg","keywords":["Comision Europea","CORDIS","data privacy","European Commission","European Union","Game","Investigaci\u00f3n","investigation","News","noticias","Uni\u00f3n Europea"],"articleSection":["Cybersecurity","Defence &amp; Security","EU News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/","url":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/","name":"How do we protect personal data? | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","isPartOf":{"@id":"https:\/\/www.cde.ual.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/#primaryimage"},"image":{"@id":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2023\/07\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg","datePublished":"2025-05-30T07:31:32+00:00","breadcrumb":{"@id":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/#primaryimage","url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2023\/07\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg","contentUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2023\/07\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg","width":2560,"height":1708,"caption":"protecci\u00f3n de datos"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cde.ual.es\/en\/how-do-we-protect-personal-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.cde.ual.es\/en\/"},{"@type":"ListItem","position":2,"name":"EU News","item":"https:\/\/www.cde.ual.es\/en\/category\/eu-news\/"},{"@type":"ListItem","position":3,"name":"Defence &amp; Security","item":"https:\/\/www.cde.ual.es\/en\/category\/eu-news\/defence-security\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity","item":"https:\/\/www.cde.ual.es\/en\/category\/eu-news\/defence-security\/cybersec\/"},{"@type":"ListItem","position":5,"name":"How do we protect personal data?"}]},{"@type":"WebSite","@id":"https:\/\/www.cde.ual.es\/#website","url":"https:\/\/www.cde.ual.es\/","name":"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","description":"Centro de Documentaci\u00f3n Europea de la Universidad de Almer\u00eda","publisher":{"@id":"https:\/\/www.cde.ual.es\/#organization"},"alternateName":"CDE Almer\u00eda","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cde.ual.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cde.ual.es\/#organization","name":"Centro de Documentaci\u00f3n Europea de Almer\u00eda","url":"https:\/\/www.cde.ual.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cde.ual.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2025\/07\/cde-logo-3.png","contentUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2025\/07\/cde-logo-3.png","width":1400,"height":300,"caption":"Centro de Documentaci\u00f3n Europea de Almer\u00eda"},"image":{"@id":"https:\/\/www.cde.ual.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cdeuniversidadalmeria\/","https:\/\/x.com\/cdeualmeria","https:\/\/www.tiktok.com\/@cdealmeria","https:\/\/www.instagram.com\/cdealmeria\/","https:\/\/www.linkedin.com\/in\/cde-almera-812b26a9\/"]},{"@type":"Person","@id":"https:\/\/www.cde.ual.es\/#\/schema\/person\/bf2f837cf3353e2161fe1087adbd728f","name":"BECACDE1","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/16a4c1e422b5dec818ee13eab3353b19db9cfd278cc10f9b0e1188a37671d9d4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/16a4c1e422b5dec818ee13eab3353b19db9cfd278cc10f9b0e1188a37671d9d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/16a4c1e422b5dec818ee13eab3353b19db9cfd278cc10f9b0e1188a37671d9d4?s=96&d=mm&r=g","caption":"BECACDE1"},"sameAs":["http:\/\/www.cdealmeria.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts\/160227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/users\/101012"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/comments?post=160227"}],"version-history":[{"count":1,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts\/160227\/revisions"}],"predecessor-version":[{"id":160230,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts\/160227\/revisions\/160230"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/media\/137982"}],"wp:attachment":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/media?parent=160227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/categories?post=160227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/tags?post=160227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}