{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:00:10Z","timestamp":1743058810843,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319197128"},{"type":"electronic","value":"9783319197135"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19713-5_42","type":"book-chapter","created":{"date-parts":[[2015,5,26]],"date-time":"2015-05-26T13:19:45Z","timestamp":1432646385000},"page":"485-495","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Practical Framework and Guidelines to Enhance Cyber Security and Privacy"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Chora\u015b","sequence":"first","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Ho\u0142ubowicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,27]]},"reference":[{"key":"42_CR1","unstructured":"Chora\u015b, M. (ed.): Methodological Framework for Enhancing Cyber Security, Data Protection, and the Privacy of the Users, CIPHER Project Report published as a book with ISBN. ISBN 978-83-64539-00-8, 2014"},{"key":"42_CR2","unstructured":"Paul, I., PC World: Update: LinkedIn Confirms Account Passwords Hacked. http:\/\/www.pcworld.com\/article\/257045\/6_5m_linkedin_passwords_posted_online_after_apparent_hack.html"},{"key":"42_CR3","unstructured":"Kitten, T.: Bank Info Security, Eurograbber A Smart Trojan Attack. Hackers\u2019 Methods Reveal Banking Know-How. http:\/\/www.bankinfosecurity.com\/eurograbber-smart-trojan-attack-a-5359\/op-1"},{"key":"42_CR4","unstructured":"Brodkin, J.: Ars Technica, Dropbox Confirms It Got Hacked, Will Offer Two-Factor Authentication. http:\/\/arstechnica.com\/security\/2012\/07\/dropbox-confirms-it-got-hacked-will-offer-two-factor-authentication\/"},{"key":"42_CR5","unstructured":"Quinn, B., Arthur, C.: PlayStation Network Hackers Access Data of 77 Million Users. The Guardian (2011)"},{"key":"42_CR6","unstructured":"COBIT: http:\/\/www.isaca.org\/COBIT\/"},{"key":"42_CR7","unstructured":"ITIL: http:\/\/www.itil-officialsite.com"},{"key":"42_CR8","unstructured":"ISO: http:\/\/www.iso.org\/iso\/home\/store\/catalogue_tc\/catalogue_detail.htm?csnumber=54534"},{"key":"42_CR9","unstructured":"PCI-DSS: www.pcisecuritystandards.org\/security_standards\/"},{"key":"42_CR10","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal L 281, 23.11.1995, P.0031\u00a0+\u00a00050, http:\/\/ec.europa.eu\/justice\/newsroom\/data-protection\/news\/120125_en.htm"},{"key":"42_CR11","unstructured":"CIPHER D3.1 Test Report (official project deliverable): http:\/\/cipherproject.eu\/wp-content\/uploads\/2014\/12\/CIPHER_D3-1_FINAL.pdf"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19713-5_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T09:44:32Z","timestamp":1676454272000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19713-5_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319197128","9783319197135"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19713-5_42","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"27 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}