{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T23:11:12Z","timestamp":1771629072571,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811905223","type":"print"},{"value":"9789811905230","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-0523-0_21","type":"book-chapter","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T06:02:45Z","timestamp":1646028165000},"page":"327-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Research on Security Assessment of Cross Border Data Flow"],"prefix":"10.1007","author":[{"given":"Wang","family":"Na","sequence":"first","affiliation":[]},{"given":"Wu","family":"Gaofei","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Qiuling","sequence":"additional","affiliation":[]},{"given":"Hu","family":"Jinglu","sequence":"additional","affiliation":[]},{"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"issue":"01","key":"21_CR1","first-page":"110","volume":"38","author":"W Yuanshan","year":"2011","unstructured":"Yuanshan, W.: On the connotation and principle of cross-border data flow. J. Political Sci. Law 38(01), 110\u2013122 (2011)","journal-title":"J. Political Sci. Law"},{"key":"21_CR2","volume-title":"Research on information security risk assessment based on AHP and BP","author":"Z Kun","year":"2016","unstructured":"Kun, Z.: Research on information security risk assessment based on AHP and BP. Hebei University of Technology, Hebei Province (2016)"},{"key":"21_CR3","unstructured":"Xuewei, F.: Research and application of Fuzzy comprehensive Evaluation based on Analytic Hierarchy Process. Harbin Institute of Technology, Heilongjiang (2011). 10.7666\/ D.D262385"},{"issue":"11","key":"21_CR4","first-page":"43","volume":"37","author":"Z Dongmei","year":"2009","unstructured":"Dongmei, Z., Jinxing, L., Jianfeng, M.: Risk assessment of information security using fuzzy wavelet neural network. J. Huazhong Univ. Sci. Technol. 37(11), 43\u201349 (2009)","journal-title":"J. Huazhong Univ. Sci. Technol."},{"key":"21_CR5","volume-title":"The enlightenment of eu legislation on cross-border flow of personal Data to China","author":"D Shuo","year":"2018","unstructured":"Shuo, D.: The enlightenment of eu legislation on cross-border flow of personal Data to China. Shandong University, Shandong (2018)"},{"key":"21_CR6","first-page":"44","volume":"2","author":"Z Monan","year":"2020","unstructured":"Monan, Z.: Cross-border data flow: global situation and china\u2019s countermeasures. Open Guide 2, 44\u201350 (2020)","journal-title":"Open Guide"},{"key":"21_CR7","doi-asserted-by":"publisher","unstructured":"Wenhua, H., Huafeng, K.: Computer applications and software 36(8), 306\u2013310 (2019) https:\/\/doi.org\/10.3969\/j.issn.1000-386x.2019.08.051","DOI":"10.3969\/j.issn.1000-386x.2019.08.051"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"76","DOI":"10.3969\/j.issn.1001-4802.2016.03.013","volume":"3","author":"YA Zhang","year":"2016","unstructured":"Zhang, Y.A.: The enlightenment of foreign cross-border data flow security management measures to China. World Telecom 3, 76\u201380 (2016). https:\/\/doi.org\/10.3969\/j.issn.1001-4802.2016.03.013","journal-title":"World Telecom"},{"key":"21_CR9","first-page":"85","volume":"4","author":"Z Xiaolei","year":"2020","unstructured":"Xiaolei, Z.: Research on governance of cross-border data flow in Japan. Japan J. 4, 85\u2013108 (2020)","journal-title":"Japan J."},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Shin, Y.J.: A study on privacy protection tasks for cross-border data transfers. In: 2014 International Conference on IT Convergence and Security, ICITCS 2014, January 23 (2014)","DOI":"10.1109\/ICITCS.2014.7021720"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Khorev, P., Chernetsov, A.: The problem of ensuring cross-border personal data transfer and methods for its solving. In: 2020 5th International Conference on Information Technologies in Engineering Education, April (2020)","DOI":"10.1109\/Inforino48376.2020.9111864"},{"key":"21_CR12","doi-asserted-by":"publisher","unstructured":"Ram, S., Liu, J.: Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling. In: Chen, P.P., Wong, L.Y. (eds) Active Conceptual Modeling of Learning. ACM-L 2006. LNCS, vol. 4512. Springer, Berlin (2007). https:\/\/doi.org\/10.1007\/978-3-540-77503-4_3","DOI":"10.1007\/978-3-540-77503-4_3"},{"key":"21_CR13","doi-asserted-by":"publisher","unstructured":"Luo, Y., Xie, C.: Traceability system construction of agricultural products cross-border e-commerce logistics from the perspective of Blockchain technology. In: Sugumaran, V., Xu, Z., Zhou, H. (eds) Application of Intelligent Systems in Multi-modal Information Analytics. MMIA 2020. AISC, vol. 1233. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-51431-0_16","DOI":"10.1007\/978-3-030-51431-0_16"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Deng, Q.: Application analysis on Blockchain technology in cross-border payment. In: 5th International Conference on Financial Innovation and Economic Development (2020)","DOI":"10.2991\/aebmr.k.200306.050"},{"issue":"5","key":"21_CR15","first-page":"29","volume":"10","author":"S Yan","year":"2019","unstructured":"Yan, S., Bingzhi, W.: Legislative protection of personal information security in the era of cross-border data flow. Cyberspace Secur. 10(5), 29\u201333 (2019)","journal-title":"Cyberspace Secur."},{"key":"21_CR16","first-page":"85","volume":"6","author":"F Sibo","year":"2020","unstructured":"Sibo, F.: Personal data protection in cross-border data Flow. Electr. Intellectual Property 6, 85\u201397 (2020)","journal-title":"Electr. Intellectual Property"},{"key":"21_CR17","volume-title":"Regulation of Cross-border Flow of Personal Data","author":"Z Wenge","year":"2019","unstructured":"Wenge, Z.: Regulation of Cross-border Flow of Personal Data. Dalian Maritime University, Liaoning (2019)"},{"issue":"5","key":"21_CR18","first-page":"106","volume":"17","author":"L Yanhua","year":"2019","unstructured":"Yanhua, L.: The regulatory path of global cross-border data flow and China\u2019s choice. Times law Sci. 17(5), 106\u2013116 (2019)","journal-title":"Times law Sci."},{"key":"21_CR19","first-page":"237","volume":"2","author":"X Yao","year":"2017","unstructured":"Yao, X.: Korean path and EU path in cross-border data flow governance. Collection Korean Stud. 2, 237\u2013249 (2017)","journal-title":"Collection Korean Stud."},{"key":"21_CR20","unstructured":"Senyu, L.: Research on Information security Risk Assessment Method based on improved Neural Network. China University of Mining and Technology (2018)"},{"key":"21_CR21","unstructured":"Standard, B., Standard, N.Z.: Risk Management - Principles and guidelines BS ISO, 31000 (2009)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Purdy, G.: ISO 31000:2009\u2014setting a new standard for risk management. Risk Anal. Int. J. 30(6), 881\u2013886 (2010)","DOI":"10.1111\/j.1539-6924.2010.01442.x"},{"key":"21_CR23","unstructured":"Shu-ning, P., Sha, F.: Telecommunication Network Technology 8, 59\u201363 (2011)"},{"issue":"10","key":"21_CR24","first-page":"922","volume":"4","author":"G Xiaonan","year":"2018","unstructured":"Xiaonan, G., Yutang, L., Zhenbo, H., Yan, W.: Application of OCTAVE risk assessment method in e-government extranet. Inf. Secur. Res. 4(10), 922\u2013927 (2018)","journal-title":"Inf. Secur. Res."},{"issue":"1","key":"21_CR25","first-page":"11","volume":"12","author":"G Qingyun","year":"2018","unstructured":"Qingyun, G.: A review of the information security risk assessment standards. J. Inf. Secur. 12(1), 11\u201325 (2018)","journal-title":"J. Inf. Secur."}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-0523-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T06:05:56Z","timestamp":1646028356000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-0523-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811905223","9789811905230"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-0523-0_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"1 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icfcs.com.cn\/fcs2021","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}