{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T09:08:47Z","timestamp":1726045727148},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030312381"},{"type":"electronic","value":"9783030312398"}],"license":[{"start":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T00:00:00Z","timestamp":1569369600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-31239-8_3","type":"book-chapter","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T06:03:26Z","timestamp":1569305006000},"page":"30-43","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Analysis of Cybersecurity Legislation and Policy Creation on the State Level"],"prefix":"10.1007","author":[{"given":"Adam","family":"Alexander","sequence":"first","affiliation":[]},{"given":"Paul","family":"Graham","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Jackson","sequence":"additional","affiliation":[]},{"given":"Bryant","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Tania","family":"Williams","sequence":"additional","affiliation":[]},{"given":"Jaehong","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,25]]},"reference":[{"key":"3_CR1","unstructured":"National Governors Association: Meet the threat: a compact to improve State Cybersecurity (2017). \n                    https:\/\/www.in.gov\/cybersecurity\/files\/NGA%20Cyber%20Compact.pdf"},{"key":"3_CR2","unstructured":"Holcomb, E.J.: Exec. Order No. 17-11. Continuing the Indiana Executive Council on cybersecurity. State of Indiana Executive Department, 9 January 2017. \n                    https:\/\/www.in.gov\/cybersecurity\/3812.htm"},{"issue":"2","key":"3_CR3","first-page":"353","volume":"68","author":"C Lowry","year":"2016","unstructured":"Lowry, C.: What\u2019s in your mobile wallet? An analysis of trends in mobile payments and regulation. Fed. Commun. Law J. 68(2), 353\u2013384 (2016). \n                    http:\/\/www.fclj.org\/wp-content\/uploads\/2016\/09\/68.2.4-Carolyn-Lowry.pdf","journal-title":"Fed. Commun. Law J."},{"issue":"4","key":"3_CR4","first-page":"1503","volume":"107","author":"NA Sales","year":"2013","unstructured":"Sales, N.A.: Regulating cyber-security. Northwest. Univ. Law Rev. 107(4), 1503\u20131568 (2013)","journal-title":"Northwest. Univ. Law Rev."},{"key":"3_CR5","first-page":"31","volume":"104","author":"R Clarke","year":"2009","unstructured":"Clarke, R.: War from cyberspace. Natl. Interest 104, 31\u201336 (2009). \n                    https:\/\/nationalinterest.org\/article\/war-from-cyberspace-3278","journal-title":"Natl. Interest"},{"key":"3_CR6","first-page":"85","volume":"171","author":"MJ Glennon","year":"2012","unstructured":"Glennon, M.J.: State-level cybersecurity. Policy Rev. 171, 85\u2013102 (2012)","journal-title":"Policy Rev."},{"issue":"4","key":"3_CR7","first-page":"1349","volume":"41","author":"C Bosch","year":"2014","unstructured":"Bosch, C.: Securing the smart grid: protecting national security and privacy through mandatory, enforceable interoperability standards. Fordham Urban Law J. 41(4), 1349\u20131406 (2014)","journal-title":"Fordham Urban Law J."},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/3180493","volume":"61","author":"F Schneider","year":"2018","unstructured":"Schneider, F.: Impediments with policy interventions to foster cybersecurity. Commun. ACM 61(3), 36\u201338 (2018)","journal-title":"Commun. ACM"},{"issue":"1","key":"3_CR9","first-page":"69","volume":"8","author":"S Godara","year":"2013","unstructured":"Godara, S.: Role of \u2018intermediaries\u2019 in the cyber world: a comparative study of the legislative policies & recent judicial trends. VIDHIGYA J. Legal Aware. 8(1), 69\u201380 (2013)","journal-title":"VIDHIGYA J. Legal Aware."},{"issue":"5","key":"3_CR10","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1177\/1461444816686325","volume":"19","author":"M Bulger","year":"2017","unstructured":"Bulger, M., Burton, P., O\u2019Neill, B., Staksrud, E.: Where policy and practice collide: comparing United States, South African and European Union approaches to protecting children online. New Media Soc. 19(5), 750\u2013764 (2017)","journal-title":"New Media Soc."},{"key":"3_CR11","unstructured":"State of Cybersecurity, Airtable: \n                    https:\/\/airtable.com\/shrCcYzKJGH1jyvrx"},{"key":"3_CR12","unstructured":"Brown Jr., E.G.: Exec. Order No. B-34-15. Establishing the California Cybersecurity Integration Center, CA.Gov (2015). \n                    https:\/\/www.calhospitalprepare.org\/sites\/main\/files\/file-attachments\/b-34-15_cal-csic.pdf"},{"key":"3_CR13","unstructured":"Brown Jr., E.G.: Governor\u2019s Veto Message, California Legislative Information, 11 October 2017. \n                    https:\/\/leginfo.legislature.ca.gov\/faces\/billStatusClient.xhtml?bill_id=201720180AB1306"},{"key":"3_CR14","unstructured":"Brown Jr., E.G.: Governor\u2019s Veto Message, California Legislative Information, 14 October 2017. \n                    http:\/\/leginfo.legislature.ca.gov\/faces\/billStatusClient.xhtml?billid=201720180AB531"},{"key":"3_CR15","unstructured":"Martinez, S.: House Executive Message No. 57, New Mexico Secretary of State, 7 April 2017. \n                    https:\/\/static.votesmart.org\/static\/vetotext\/61925.pdf"},{"key":"3_CR16","unstructured":"Ducey, D.A.: Re:Senate Bill 1434, Office of the Governor, May 18, 2016. \n                    https:\/\/azgovernor.gov\/sites\/default\/files\/sb_1434_veto_letter.pdf"},{"key":"3_CR17","unstructured":"Ducey, D.A.: RE: House Bill 2566, Arizona State Legislature, 9 April 2015. \n                    https:\/\/www.azleg.gov\/govlettr\/52leg\/1R\/HB2566.pdf"}],"container-title":["Advances in Intelligent Systems and Computing","National Cyber Summit (NCS) Research Track"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31239-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T06:12:44Z","timestamp":1569305564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-31239-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,25]]},"ISBN":["9783030312381","9783030312398"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31239-8_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,9,25]]},"assertion":[{"value":"25 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Cyber Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Huntsville, AL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ncs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nationalcybersummit.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}