{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T05:56:14Z","timestamp":1719467774225},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1109\/mc.2021.3083916","type":"journal-article","created":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T20:37:55Z","timestamp":1627936675000},"page":"125-132","source":"Crossref","is-referenced-by-count":13,"title":["2021 State of the Practice in Data Privacy and Security"],"prefix":"10.1109","volume":"54","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-9314-5388","authenticated-orcid":false,"given":"Preeti S.","family":"Chauhan","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1408-4212","authenticated-orcid":false,"given":"Nir","family":"Kshetri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"chakravarty","year":"2021","journal-title":"The Privacy question in India’s drone regulation"},{"key":"ref38","author":"feng","year":"2020","journal-title":"In China a new call to protect data privacy"},{"key":"ref33","author":"king","year":"2013","journal-title":"New EU cyber security directive to impact U S companies"},{"key":"ref32","year":"0","journal-title":"Adequacy decisions How the EU determines if a non-EU country has an adequate level of data protection"},{"key":"ref31","author":"meyer","year":"2018","journal-title":"GDPR attacks First Google Facebook now activists go after Apple Amazon LinkedIn"},{"key":"ref30","year":"0","journal-title":"DLA Piper GDPR fines and data breach survey January 2021"},{"key":"ref37","author":"chan","year":"2020","journal-title":"Pervasive personal data collection at the heart of South Korea’s COVID-19 success may not translate"},{"key":"ref36","year":"0","journal-title":"Data protection laws of the world South Korea"},{"key":"ref35","author":"nicodemus","year":"2021","journal-title":"More than a CCPA clone? Virginia passes nation’s second comprehensive privacy law"},{"key":"ref34","year":"2020","journal-title":"California privacy rights act An overview"},{"key":"ref10","year":"2017","journal-title":"Cybercrime & the internet of threats 2018"},{"key":"ref40","author":"egan","year":"2019","journal-title":"Data privacy reform gains momentum in Latin America"},{"key":"ref11","author":"sterling","year":"2017","journal-title":"Global cybercrime Costs a trillion dollars Maybe 3"},{"key":"ref12","doi-asserted-by":"crossref","author":"kshetri","year":"2021","journal-title":"Cybersecurity Management An Organizational and Strategic Approach","DOI":"10.3138\/9781487531249"},{"key":"ref13","author":"nadeau","year":"2018","journal-title":"General Data Protection Regulation (GDPR) requirements deadlines and facts"},{"key":"ref14","year":"2017","journal-title":"Gartner forecasts worldwide security spending will reach $96 billion in 2018 up 8 percent from 2017"},{"key":"ref15","author":"kahn","year":"2020","journal-title":"Cybercriminals adapt to coronavirus faster than the A I cops hunting them"},{"key":"ref16","author":"jovanovi?","year":"2019","journal-title":"Malware statistics – you’d better get your computer vaccinated"},{"key":"ref17","year":"2020","journal-title":"2020 sonicwall cyber threat report Threat actors pivot toward more targeted attacks evasive exploits"},{"key":"ref18","year":"2019","journal-title":"Phishing attacks more than doubled in 2018 to reach almost 500 million"},{"key":"ref19","year":"2021","journal-title":"FBI Releases the internet crime complaint center 2020 internet crime report including COVID-19 scam statistics"},{"key":"ref28","author":"kelly","year":"2019","journal-title":"Consumer vs enterprise security There is a difference"},{"key":"ref4","first-page":"451","article-title":"Health information privacy","volume":"80","author":"gostin","year":"1995","journal-title":"Cornell Law Review"},{"key":"ref27","year":"0","journal-title":"List of countries which have signed ratified\/acceded to the African Union Convention on Cybersecurity and Personal Data Protection"},{"key":"ref3","author":"schwartz","year":"2019","journal-title":"Data privacy and data security What’s the difference"},{"key":"ref6","year":"2020","journal-title":"9 data security best practices for 2021"},{"key":"ref29","author":"boehm","year":"2020","journal-title":"Cybersecurity’s dual mission during the coronavirus crisis"},{"key":"ref5","author":"velez","year":"2021","journal-title":"What’s in store for data privacy in 2021"},{"key":"ref8","author":"matthews","year":"2021","journal-title":"Bitcoin extortion How cryptocurrency has enabled a massive surge in ransomware attacks"},{"key":"ref7","author":"costigan","year":"2021","journal-title":"Top 10 for 2021 – Happy data privacy day!"},{"key":"ref2","author":"symanovich","year":"2020","journal-title":"Privacy vs security What’s the difference"},{"key":"ref9","year":"2021","journal-title":"Ransomware soars with 62% increase since 2019"},{"key":"ref1","author":"ritter","year":"2019","journal-title":"Data privacy Vs data secrecy The danger of worrying about the wrong issue"},{"key":"ref20","author":"wong","year":"2021","journal-title":"Facebook says iPhone users will start seeing new privacy prompt today"},{"key":"ref22","author":"ikeda","year":"2020","journal-title":"South Korean regulator fines Facebook for privacy violations social media giant shared personal data without user consent"},{"key":"ref21","author":"holmes","year":"2021","journal-title":"533 million Facebook users’ phone numbers and personal data have been leaked online"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-020-0928-y"},{"key":"ref41","author":"daniel","year":"2021","journal-title":"Data protection laws in Africa What you need to know"},{"key":"ref23","author":"mikkelsen","year":"2020","journal-title":"Privacy security and public health in a pandemic year"},{"key":"ref26","year":"2020","journal-title":"Privacy in the Age of COVID An IDAC Investigation of COVID-19 Apps"},{"key":"ref25","author":"reuter","year":"2020","journal-title":"Report COVID-19 apps fall short in privacy security"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/9504456\/09504500.pdf?arnumber=9504500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T07:06:59Z","timestamp":1672988819000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9504500\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8]]},"references-count":41,"journal-issue":{"issue":"8"},"URL":"http:\/\/dx.doi.org\/10.1109\/mc.2021.3083916","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"value":"0018-9162","type":"print"},{"value":"1558-0814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8]]}}}