{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:10:01Z","timestamp":1743264601984,"version":"3.40.3"},"reference-count":36,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1992,5,1]],"date-time":"1992-05-01T00:00:00Z","timestamp":704678400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[1992,5,1]],"date-time":"1992-05-01T00:00:00Z","timestamp":704678400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Law &amp; Security Report"],"published-print":{"date-parts":[[1992,5]]},"DOI":"10.1016\/0267-3649(92)90045-b","type":"journal-article","created":{"date-parts":[[2003,1,9]],"date-time":"2003-01-09T12:31:12Z","timestamp":1042115472000},"page":"98-101","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information security \u2014 OECD initiatives"],"prefix":"10.1016","volume":"8","author":[{"family":"Michael Kirby","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0267-3649(92)90045-B_BIB1","first-page":"7","article-title":"Computers at Risk: Safe Computing in the Information Age","author":"United States, National Research Council","year":"1991"},{"journal-title":"The Confucian Renaissance, Federation","year":"1989","author":"Little","key":"10.1016\/0267-3649(92)90045-B_BIB3"},{"key":"10.1016\/0267-3649(92)90045-B_BIB4","first-page":"99","author":"Little","year":"1989","journal-title":"The Confucian Renaissance, Federation"},{"key":"10.1016\/0267-3649(92)90045-B_BIB5","unstructured":"Japan Information Processing Development Center, Final Announcement of Symposium, 3."},{"journal-title":"Scientific American (\u201cCommunications, Computers and Networks\u201d)","year":"1991","key":"10.1016\/0267-3649(92)90045-B_BIB6_1"},{"key":"10.1016\/0267-3649(92)90045-B_BIB6_2","first-page":"72","author":"Cerf","year":"1991","journal-title":"Networks"},{"year":"1981","series-title":"Guidelines on the Protection of Privacy and Transborder Flows of Personal Data","author":"Organisation for Economic Cooperation and Development","key":"10.1016\/0267-3649(92)90045-B_BIB7"},{"key":"10.1016\/0267-3649(92)90045-B_BIB8","unstructured":"Universal Declaration of Human Rights, art 12."},{"key":"10.1016\/0267-3649(92)90045-B_BIB10","series-title":"Paper for the XIII International Congress of Comparative Law","article-title":"Access to Information Held by the State and Privacy in Japan","author":"Horibe","year":"1990"},{"key":"10.1016\/0267-3649(92)90045-B_BIB11","series-title":"Paper for the XIII International Congress of Comparative Law","first-page":"15","article-title":"Access to Information Held by the State and Privacy in Japan","author":"Horibe","year":"1990"},{"key":"10.1016\/0267-3649(92)90045-B_BIB18","first-page":"14","author":"Council of Europe, European Committee on Crime Problems","year":"1990","journal-title":"Computer-Related Crime"},{"key":"10.1016\/0267-3649(92)90045-B_BIB19","first-page":"15","author":"Council of Europe, European Committee on Crime Problems","year":"1990","journal-title":"Computer-Related Crime"},{"key":"10.1016\/0267-3649(92)90045-B_BIB20","first-page":"16","author":"Council of Europe, European Committee on Crime Problems","year":"1990","journal-title":"Computer-Related Crime"},{"key":"10.1016\/0267-3649(92)90045-B_BIB21","first-page":"17","author":"Council of Europe, European Committee on Crime Problems","year":"1990","journal-title":"Computer-Related Crime"},{"key":"10.1016\/0267-3649(92)90045-B_BIB22","article-title":"Computer-related Crime: Analysis of Legal Policy","author":"Organisation for Economic Cooperation and Development","year":"1986","journal-title":"ICCP Report No 10"},{"journal-title":"O J No C 288","article-title":"Council decision","year":"1988","key":"10.1016\/0267-3649(92)90045-B_BIB23"},{"key":"10.1016\/0267-3649(92)90045-B_BIB24","first-page":"36","author":"Council of Europe Report","year":"1990","journal-title":"Computer-Related Crime"},{"key":"10.1016\/0267-3649(92)90045-B_BIB25","first-page":"60","author":"Council of Europe Report","year":"1990","journal-title":"Computer-Related Crime"},{"key":"10.1016\/0267-3649(92)90045-B_BIB26","first-page":"83","author":"Council of Europe Report","year":"1990","journal-title":"Computer-Related Crime"},{"key":"10.1016\/0267-3649(92)90045-B_BIB27","first-page":"3","article-title":"Toronto Statement on the International Legal Vulnerability of Financial Information","author":"Kirby","year":"1990","journal-title":"Computer Law and Security Report, 2, 3. (CLSR)"},{"key":"10.1016\/0267-3649(92)90045-B_BIB28_1","series-title":"Computer Law and Security Report, 2, 3. (CLSR)","first-page":"3","article-title":"Toronto Statement of the International Legal Vulnerability of Financial Information","author":"Kirby","year":"1990"},{"first-page":"61ff","year":"1990","series-title":"Rogue Programs: Viruses, Worms and Trojan Horses","key":"10.1016\/0267-3649(92)90045-B_BIB28_2"},{"key":"10.1016\/0267-3649(92)90045-B_BIB29","first-page":"3","volume":"2","year":"1990","journal-title":"CLSR"},{"key":"10.1016\/0267-3649(92)90045-B_BIB30","first-page":"1","author":"Organisation for Economic Cooperation and Development","year":"1991","journal-title":"Press Release (SG\/Press (91)(31)) Paris"},{"key":"10.1016\/0267-3649(92)90045-B_BIB31","first-page":"2","author":"Organisation for Economic Cooperation and Development","year":"1991","journal-title":"Press Release (SG\/Press (91)(31)) Paris"},{"key":"10.1016\/0267-3649(92)90045-B_BIB32","first-page":"2","author":"Organisation for Economic Cooperation and Development","year":"1991","journal-title":"Press Release (SG\/Press (91)(31)) Paris"},{"key":"10.1016\/0267-3649(92)90045-B_BIB33","first-page":"4","author":"Organisation for Economic Cooperation and Development","year":"1991","journal-title":"Press Release (SG\/Press (91)(31)) Paris"},{"key":"10.1016\/0267-3649(92)90045-B_BIB34","first-page":"7","author":"Organisation for Economic Cooperation and Development","year":"1991","journal-title":"Press Release (SG\/Press (91)(31)) Paris"},{"key":"10.1016\/0267-3649(92)90045-B_BIB35","first-page":"20","author":"Organisation for Economic Cooperation and Development","year":"1991","journal-title":"Press Release (SG\/Press (91)(31)) Paris"},{"year":"1991","series-title":"Outcome of Proceedings","author":"European","key":"10.1016\/0267-3649(92)90045-B_BIB36"},{"key":"10.1016\/0267-3649(92)90045-B_BIB37","series-title":"Outcome of Proceedings","first-page":"2","author":"European Communities, Council, Working Party on Economic Questions (Data Protection)","year":"1991"},{"key":"10.1016\/0267-3649(92)90045-B_BIB38","series-title":"Outcome of Proceedings","first-page":"3","author":"European Communities, Council, Working Party on Economic Questions (Data Protection)","year":"1991"},{"key":"10.1016\/0267-3649(92)90045-B_BIB39","unstructured":"National Council Report, above n 1, 3."},{"key":"10.1016\/0267-3649(92)90045-B_BIB41","unstructured":"Current State of Computer Security-Related Policies and Measures, a document provided by the delegation of Japan to the OECD Expert Group, 7."},{"key":"10.1016\/0267-3649(92)90045-B_BIB42","series-title":"Information Processing Systems: Open System Interconnection: Basic Reference Model","article-title":"Security Architecture","author":"International Standards Organisation (ISO)","year":"1989"},{"key":"10.1016\/0267-3649(92)90045-B_BIB43","unstructured":"Cf D B Parker, \u201cRestating the Foundation of Information Security\u201d, confidential note (Applied Research Note 11 \u2014 Revised)."}],"container-title":["Computer Law &amp; Security Report"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:026736499290045B?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:026736499290045B?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T15:49:45Z","timestamp":1743263385000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/026736499290045B"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,5]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1992,5]]}},"alternative-id":["026736499290045B"],"URL":"https:\/\/doi.org\/10.1016\/0267-3649(92)90045-b","relation":{},"ISSN":["0267-3649"],"issn-type":[{"type":"print","value":"0267-3649"}],"subject":[],"published":{"date-parts":[[1992,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Information security \u2014 OECD initiatives","name":"articletitle","label":"Article Title"},{"value":"Computer Law & Security Report","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/0267-3649(92)90045-B","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 1992 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}]}}