{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:47:15Z","timestamp":1776116835433,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T00:00:00Z","timestamp":1579651200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T00:00:00Z","timestamp":1579651200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s10586-020-03052-y","type":"journal-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T19:02:32Z","timestamp":1579719752000},"page":"1845-1854","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["European strategy and legislation for cybersecurity: implications for Portugal"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9727-0557","authenticated-orcid":false,"given":"Jo\u00e3o Vidal","family":"Carvalho","sequence":"first","affiliation":[]},{"given":"Sandro","family":"Carvalho","sequence":"additional","affiliation":[]},{"given":"\u00c1lvaro","family":"Rocha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,22]]},"reference":[{"issue":"5","key":"3052_CR1","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973\u2013993 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"3052_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2005.53","author":"V Kumar","year":"2005","unstructured":"Kumar, V.: Parallel and distributed computing for cybersecurity. IEEE Distrib. Syst. Online (2005). https:\/\/doi.org\/10.1109\/MDSO.2005.53","journal-title":"IEEE Distrib. Syst. Online"},{"key":"3052_CR3","unstructured":"Comission, E.: Europeans attitudes towards cyber security. Special Eurobarometer 464a (2017)"},{"key":"3052_CR4","unstructured":"Commission, E.: Cyber security. Special Eurobarometer 423 (2015)"},{"key":"3052_CR5","unstructured":"Commission, E.: Cyber security. Special Eurobarometer 390 (2012)"},{"key":"3052_CR6","unstructured":"Barros, G., A Ciberseguran\u00e7a em Portugal. Gabinete de Estrat\u00e9gia e Estudos: Estudos Econ\u00f3micos (2018)"},{"key":"3052_CR7","doi-asserted-by":"crossref","unstructured":"Carvalho, J.V., et al.: Portuguese Concerns and Experience of Specific Cybercrimes: a Benchmarking with European Citizens. Micrads\u201919: Multidisciplinary International Conference of Research Applied to Defence and Security, Rio de Janeiro, Brazil (2019)","DOI":"10.1007\/978-981-13-9155-2_4"},{"key":"3052_CR8","unstructured":"ENISA. Enisa - Glossary. https:\/\/www.enisa.europa.eu\/topics\/threat-risk-management\/risk-management\/current-risk\/risk-management-inventory\/glossary#G51 (2019). Accessed 18 Mar 2019"},{"key":"3052_CR9","unstructured":"CPNI. Center for the Protection of National Infrastructure: Cyber. https:\/\/www.cpni.gov.uk\/cyber (2019). Accessed 20 Oct 2019"},{"key":"3052_CR10","unstructured":"NCSS. National Cyber Security Strategy. Presidency of the Government, Spain (2013)"},{"key":"3052_CR11","unstructured":"Commission, E.: Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace (2013)"},{"key":"3052_CR12","unstructured":"European, C.: Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. European, Commission: Joint Communication to the European Parliament, the Council, The European Economic and social Committee and the Committee of the Regions (2013)"},{"key":"3052_CR13","unstructured":"Juncker, J.-C.: State of the Union 2017 (2017)"},{"key":"3052_CR14","unstructured":"GDPR. Regulation (EU) 2016\/679 of the European Parliament and of the Council 2016, Official Journal of the European Union (2016)"},{"key":"3052_CR15","unstructured":"GDPR. Art. 99 GDPR: Entry into force and application 2016, Official Journal of the European Union (2016)"},{"key":"3052_CR16","unstructured":"EU. Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), 2015. Council of the European Union, Brussels (2015)"},{"key":"3052_CR17","unstructured":"Blackmer, W.S.: GDPR: Getting ready for the new EU General Data Protection Regulation. https:\/\/web.archive.org\/web\/20180514111300\/https:\/\/www.infolawgroup.com\/2016\/05\/articles\/gdpr\/gdpr-getting-ready-for-the-new-eu-general-data-protection-regulation\/ (2016). Accessed Apr 2019"},{"key":"3052_CR18","unstructured":"ENISA. ENISA - European Union Agency for Network and Information Security European Union. https:\/\/www.enisa.europa.eu (2019). Accessed Apr 2019"},{"key":"3052_CR19","unstructured":"DR. Di\u00e1rio da Rep\u00fablica, 1.\u00aa s\u00e9rie \u2014 N.\u00ba 155 \u2014 13 de agosto de 2018. https:\/\/dre.pt\/application\/conteudo\/116029384 (2018). Accessed Apr 2018"},{"key":"3052_CR20","unstructured":"WISER. WISER Cartography: EU National Strategies. https:\/\/cyberwiser.eu\/cartography (2019). Accessed Apr 2019"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03052-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-020-03052-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03052-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T00:22:19Z","timestamp":1611188539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-020-03052-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,22]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["3052"],"URL":"https:\/\/doi.org\/10.1007\/s10586-020-03052-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,22]]},"assertion":[{"value":"19 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}