{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:32:47Z","timestamp":1768343567949,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819604364","type":"print"},{"value":"9789819604371","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-96-0437-1_1","type":"book-chapter","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T16:55:08Z","timestamp":1732640108000},"page":"3-15","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of the Adoption and Implementation of DICT\u2019s Six-Stage Cybersecurity Incident Response Model in Philippine Government Agencies"],"prefix":"10.1007","author":[{"given":"Daenielle D.","family":"Cruz","sequence":"first","affiliation":[]},{"given":"Ma. Enrica Clarisse M.","family":"Dio","sequence":"additional","affiliation":[]},{"given":"Kaye C.","family":"Rapadas","sequence":"additional","affiliation":[]},{"given":"Paula Beatrice O.","family":"Rebenque","sequence":"additional","affiliation":[]},{"given":"Keinaz N.","family":"Domingo","sequence":"additional","affiliation":[]},{"given":"Jerome E.","family":"Gutierrez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"1_CR1","unstructured":"Department of Information and Communications.: National Cybersecurity Plan 2023\u20132028, Quezon City (2024)"},{"issue":"10","key":"1_CR2","first-page":"421","volume":"4","author":"S Bera","year":"2023","unstructured":"Bera, S.: The dark side of the web: unveiling the alarming rise of cyber-attacks. Int. J. Res. Publ. Rev. 4(10), 421\u2013424 (2023)","journal-title":"Int. J. Res. Publ. Rev."},{"issue":"11","key":"1_CR3","first-page":"10","volume":"4","author":"PGG Espiritu","year":"2023","unstructured":"Espiritu, P.G.G., Jocson, J.C.: Navigating cybersecurity challenges in the era of digital transformation: threats and mitigation strategies in The Philippines. Int. J. Progr. Res. Sci. Eng. 4(11), 10\u201323 (2023)","journal-title":"Int. J. Progr. Res. Sci. Eng."},{"issue":"8822","key":"1_CR4","first-page":"1199","volume":"2252","author":"N De Ramos","year":"2022","unstructured":"De Ramos, N., Espinolla, F., II.: Cybersecurity program for Philippine [4 education institutions: a multiple-case study. Int. J. Eval. Res. Educ. ISSN 2252(8822), 1199 (2022)","journal-title":"Int. J. Eval. Res. Educ. ISSN"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Pamela, A., Zarcilla-Genecela, E.: In Routledge Companion to Global Cyber-Security Strategy, 1st edn, pp. 315\u2013324. London, United Kingdom (2021)","DOI":"10.4324\/9780429399718-26"},{"key":"1_CR6","unstructured":"Office of the President of the Philippines: Adopting The National Cybersecurity Plan 2023\u20132028 and Directing the Implementation Thereof. Executive Order 58 (2024)"},{"key":"1_CR7","unstructured":"Quezon City Council: Ordinance No. SP-3238, S-2023: 22nd City Council 47th regular session. Quezon City, Philippines (2023)"},{"key":"1_CR8","unstructured":"Christine, D., Thinyane, M.: Cyber resilience in asia-pacific: a review of national cybersecurity strategies. Macau (2020)"},{"key":"1_CR9","unstructured":"European Commission: Data protection in the EU: The General Data Protection Regulation (GDPR), the Data Protection Law Enforcement Directive, and other rules concerning the protection of personal data (2018)"},{"key":"1_CR10","unstructured":"Mendoza, Jma.E.: 2 terabytes of DOST data breached in latest hacking incident. INQUIRER (2024)"},{"key":"1_CR11","unstructured":"Kuzhanthaivel, A.: Philippine education ministry hit by data leak exposing 210,020 records. iTnews Asia (2024)"},{"key":"1_CR12","unstructured":"Fowler, J.: Over 200k Records of Students and Parents in the Philippines Exposed in High School Voucher Program Portal Data Breach. vpnMentor (2024)"},{"key":"1_CR13","unstructured":"Del Rosario, R.: \u201cThere was no hacking\u201d, DepEd-Cabuyao clarifies following alleged cyberattack. Manila Bulletin (2024)"},{"key":"1_CR14","unstructured":"Crisostomo, S.: DICT: China-linked group attempted to hack DENR database. Philstar (2024)"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(21)00009-9","volume":"2021","author":"N Shinde","year":"2021","unstructured":"Shinde, N., Kulkarni, P.: Cyber incident response and planning: a flexible approach. Comput. Fraud Secur. 2021, 14\u201319 (2021)","journal-title":"Comput. Fraud Secur."},{"key":"1_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2021.101693","volume":"30","author":"G Dhillon","year":"2021","unstructured":"Dhillon, G., Smith, K., Dissanayaka, I.: Information systems security research agenda: exploring the gap between research and practice. J. Strateg. Inf. Syst. 30, 101693 (2021)","journal-title":"J. Strateg. Inf. Syst."},{"issue":"1","key":"1_CR17","first-page":"10","volume":"10","author":"H Taherdoost","year":"2021","unstructured":"Taherdoost, H.: Data collection methods and tools for research; a step-by-step guide to choose data collection technique for academic and business research projects. Int. J. Acad. Res. Manag. 10(1), 10\u201338 (2021)","journal-title":"Int. J. Acad. Res. Manag."},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/3184444.3184448","volume":"49","author":"R Baskerville","year":"2018","unstructured":"Baskerville, R., Rowe, F., Wolff, F.C.: Integration of information systems and cybersecurity countermeasures. ACM SIGMIS Database: DATABASE Adv. Inf. Syst. 49, 33\u201352 (2018)","journal-title":"ACM SIGMIS Database: DATABASE Adv. Inf. Syst."},{"key":"1_CR19","unstructured":"National Institute of Standards and Technology.: Cybersecurity Framework, Metro Manila (2024)"},{"key":"1_CR20","unstructured":"Graduate and Undergraduate cyber security programs Online. ECC University (2024)"},{"key":"1_CR21","unstructured":"How to perform a Security incident response tabletop exercise. RSI Security (2020)"},{"key":"1_CR22","unstructured":"National Security Agency.: NSA\u2019S Top Ten Cybersecurity Mitigation Strategies. In: Cybersecurity Information (2018)"},{"key":"1_CR23","unstructured":"DepEd checking data breach after hacking. Data Protection Excellence Network (2024)"},{"key":"1_CR24","unstructured":"Marquez, I.-P., Dela, C.: Philippines: National Privacy Commission issues rules for Philippine Privacy Mark certification - Global Compliance News. Global Compliance News (2024)"},{"key":"1_CR25","unstructured":"Gutierrez: NPC: Jollibee breach may be connected to worldwide string of data breaches involving 165 companies. ABS-CBN News (2024)"},{"key":"1_CR26","unstructured":"Mani, R.N.: Removing Data Silos a Top Priority for DENR, Philippines (2023)"},{"key":"1_CR27","unstructured":"Tupas & Ronda: DICT working on PNP data breach. Philstar.com. (2024)"},{"key":"1_CR28","unstructured":"Caliwan: PNP: Cybercrime cases down 36% in H1 2024. Philippine News Agency. (2024)"},{"key":"1_CR29","unstructured":"Dantes, C.: Marcos orders PNP to bolster cybersecurity, ICT systems - Manila Standard. Manila Standard. (2024)"},{"key":"1_CR30","unstructured":"Office of the President of the Philippines: Amending proclamation no. 2054 (s. 2010) by transferring the observance of the \u201ccybersecurity awareness month\u201d from September to October of every year. Proclamation no. 353 (2023)"},{"key":"1_CR31","unstructured":"Congress of the Philippines: An act protecting online consumers and merchants engaged in internet transactions, creating for this purpose electronic commerce bureau, appropriating funds therefor, and for other purposes. Republic Act No. 11967 (2023)"},{"key":"1_CR32","unstructured":"Congress of the Philippines: Directing the committee on electoral reforms and people's participation to conduct an inquiry, in aid of legislation, into the alleged hacking of sensitive data of the Commission on Elections COMELEC), which could potentially impact the May 2022 polls. P.S.R. No. 971 (2022)"},{"key":"1_CR33","unstructured":"Patdu: In re: DATA BREACH INVOLVING THE COMELEC NPC CID case no.: 17\u2013002 DATA PROCESSING SYSTEM for: violation of the data IN WAO, LANAO DEL SUR privacy act of 2012. In NPC CID case no.: 17\u2013002 (pp. 2\u201312). (2020)"},{"key":"1_CR34","unstructured":"Philippine News Agency: BIR, BOC ordered to beef up cybersecurity measures, https:\/\/www.pna.gov.ph\/articles\/1167196 (2022)"},{"key":"1_CR35","unstructured":"Patinio: Philippine News Agency: BOC boosts cybersecurity measures after data breach. (2024)"},{"key":"1_CR36","unstructured":"Secure Connections (2022)\u00a0Cybersecurity in the Philippines: Global context and local challenges"},{"key":"1_CR37","unstructured":"Arillo, C.: DICT\u2019s budget too small for its mandate. BusinessMirror (2019)"}],"container-title":["Communications in Computer and Information Science","Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0437-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T17:02:24Z","timestamp":1732640544000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0437-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819604364","9789819604371"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0437-1_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Binh Duong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/thefdse.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}