{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:09:25Z","timestamp":1760044165199},"reference-count":40,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2002,11,1]],"date-time":"2002-11-01T00:00:00Z","timestamp":1036108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telematics and Informatics"],"published-print":{"date-parts":[[2002,11]]},"DOI":"10.1016\/s0736-5853(01)00017-x","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T11:37:18Z","timestamp":1034336238000},"page":"273-289","source":"Crossref","is-referenced-by-count":4,"title":["Breakthrough in privacy concerns and lawful access conflicts"],"prefix":"10.1016","volume":"19","author":[{"given":"John Olurotimi","family":"Ayoade","sequence":"first","affiliation":[]},{"given":"Toshio","family":"Kosuge","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0736-5853(01)00017-X_BIB1","unstructured":"Ministry of Post and Telecommunications, May 1998"},{"key":"10.1016\/S0736-5853(01)00017-X_BIB2","unstructured":"Organization for Economic Cooperation and Development (OECD), Paris, 1992"},{"key":"10.1016\/S0736-5853(01)00017-X_BIB3","series-title":"Computer Security Basics","author":"Russells","year":"1992"},{"key":"10.1016\/S0736-5853(01)00017-X_BIB4","series-title":"Network and Internetwork Security","author":"Stallings","year":"1995"},{"key":"10.1016\/S0736-5853(01)00017-X_BIB5","series-title":"Cryptography and Network Security: Principles and Practice","author":"Stallings","year":"1998"},{"key":"10.1016\/S0736-5853(01)00017-X_FR1","unstructured":"Big Brother: Britain's Web of Surveillance and the New Technological Order. London, 1996, p. 23"},{"key":"10.1016\/S0736-5853(01)00017-X_FR2","unstructured":"Clarke, R., June 1998. Cookies. Department of Computer Science, Australian National University. http:\/\/www.anu.edu.au\/people\/Roger.Clarke\/II\/Cookies.html#Backgrd"},{"key":"10.1016\/S0736-5853(01)00017-X_FR3","series-title":"Distributed Systems Concepts and Design","author":"Coulouris","year":"1991"},{"key":"10.1016\/S0736-5853(01)00017-X_FR4","unstructured":"Cryptome, 1999. http:\/\/cryptome.org\/dst-2.html"},{"key":"10.1016\/S0736-5853(01)00017-X_FR5","series-title":"Unix Systems Security: A Guide for Users and System Administrators","author":"Curry","year":"1995"},{"key":"10.1016\/S0736-5853(01)00017-X_FR6","series-title":"Information Warfare and Security","author":"Denning","year":"1999"},{"key":"10.1016\/S0736-5853(01)00017-X_FR7","series-title":"Cryptographic and Data Security","author":"Dennis","year":"1993"},{"key":"10.1016\/S0736-5853(01)00017-X_FR8","unstructured":"Department of Information Resources, Texas, June 1994. Information resources security and risk management policy, standards, and guidelines. http:\/\/www.dir.state.tx.us\/oops\/infosec\/, http:\/\/alw.nih.gov\/security\/pro-uth.html"},{"key":"10.1016\/S0736-5853(01)00017-X_FR9","unstructured":"Dougall, E.G. (Ed.), 1992. IFIP Transactions Computer Security"},{"key":"10.1016\/S0736-5853(01)00017-X_FR10","unstructured":"Echelon: NSA's Global Electronic Interception. http:\/\/jya.com\/echelon-dc.html"},{"key":"10.1016\/S0736-5853(01)00017-X_FR11","unstructured":"Electronic Privacy Information Center, 1997. http:\/\/www.epic.org\/crypto\/export_controls\/"},{"key":"10.1016\/S0736-5853(01)00017-X_FR12","unstructured":"European Internet Forum Policy Papers, 1998"},{"key":"10.1016\/S0736-5853(01)00017-X_FR13","doi-asserted-by":"crossref","unstructured":"Gable, G.G., Caelli, W.J. (Eds.), 1992. IFIP Transactions IT Security: The Need for International Cooperation","DOI":"10.1016\/0167-4048(92)90012-G"},{"key":"10.1016\/S0736-5853(01)00017-X_FR14","series-title":"Web Security and Commerce","author":"Garfinkel","year":"1997"},{"key":"10.1016\/S0736-5853(01)00017-X_FR15","unstructured":"Graphics Visualization and Usability Center. http:\/\/www.gvu.gatech.edu\/user_surveys"},{"key":"10.1016\/S0736-5853(01)00017-X_FR16","unstructured":"IFIP Security and Control of Information Technology in Society, 1994"},{"key":"10.1016\/S0736-5853(01)00017-X_FR17","unstructured":"Information Infrastructure Task Force, June 1997. http:\/\/www.iitf.nist.gov\/ipc\/privacy.html"},{"key":"10.1016\/S0736-5853(01)00017-X_FR18","unstructured":"International Covenant on Civil and Political Rights, January 1997. http:\/\/www.hrweb.org\/legal\/"},{"key":"10.1016\/S0736-5853(01)00017-X_FR19","unstructured":"Internet Law and Policy Forum, April 1999. http:\/\/www.ilpf.org\/"},{"key":"10.1016\/S0736-5853(01)00017-X_FR20","doi-asserted-by":"crossref","unstructured":"Internet Privacy Coalition, May 6, 1999. http:\/\/www.privacy.org\/ipc\/","DOI":"10.1016\/S1361-3723(00)87710-6"},{"key":"10.1016\/S0736-5853(01)00017-X_FR21","unstructured":"Internet Security Policy: A Technical Guide. 1997"},{"key":"10.1016\/S0736-5853(01)00017-X_FR22","unstructured":"I-Ways Digest of Electronic Commerce Policy and Regulation, fourth quarter, 1998"},{"key":"10.1016\/S0736-5853(01)00017-X_FR23","series-title":"IFIP Transactions Database Security Status and Prospectus","year":"1992"},{"key":"10.1016\/S0736-5853(01)00017-X_FR24","unstructured":"Legal and Regulatory Issues for the European Trusted Service Infrastructure, 1999"},{"key":"10.1016\/S0736-5853(01)00017-X_FR25","series-title":"Cyber Law Policies and Challenges","author":"Munir","year":"1999"},{"key":"10.1016\/S0736-5853(01)00017-X_FR26","unstructured":"Network Security Issues, August 1997. http:\/\/www.seas.upenn.edu\/\u223ctcom500\/commerce"},{"key":"10.1016\/S0736-5853(01)00017-X_FR27","unstructured":"Overview of Security Issues for Electronic Commerce and Electronic Service Delivery, March 12, 1998. http:\/\/www.aepos.com\/Home.nsf\/Rt\/archives\/articles\/securityandprivacy.html"},{"key":"10.1016\/S0736-5853(01)00017-X_FR28","unstructured":"Privacy International, 1999. Big Brother Incorporated, http:\/\/www.privacy.org\/pi\/reports\/"},{"key":"10.1016\/S0736-5853(01)00017-X_FR29","series-title":"Web Security","author":"Rubin","year":"1997"},{"key":"10.1016\/S0736-5853(01)00017-X_FR30","series-title":"Web Security (A Step-by-step Reference Guide)","author":"Stein","year":"1998"},{"key":"10.1016\/S0736-5853(01)00017-X_FR31","unstructured":"United Nations Electronic Commerce Policy, December 1999"},{"key":"10.1016\/S0736-5853(01)00017-X_FR32","doi-asserted-by":"crossref","unstructured":"Universal Declaration of Human Rights, January 27, 1997. http:\/\/www.hrweb.org\/legal","DOI":"10.2307\/4065296"},{"key":"10.1016\/S0736-5853(01)00017-X_FR33","unstructured":"Universal Declaration of Human Rights, 1998. http:\/\/www.un.org\/Overview\/rights.html"},{"key":"10.1016\/S0736-5853(01)00017-X_FR34","series-title":"Computers System and Network Security: Principles and Practice","author":"White","year":"1999"},{"key":"10.1016\/S0736-5853(01)00017-X_FR35","unstructured":"Privacy as a computer language. Wired News, May 21, 1998. http:\/\/www.wired.com\/news\/"}],"container-title":["Telematics and Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S073658530100017X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S073658530100017X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T14:10:17Z","timestamp":1583417417000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S073658530100017X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,11]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2002,11]]}},"alternative-id":["S073658530100017X"],"URL":"https:\/\/doi.org\/10.1016\/s0736-5853(01)00017-x","relation":{},"ISSN":["0736-5853"],"issn-type":[{"value":"0736-5853","type":"print"}],"subject":[],"published":{"date-parts":[[2002,11]]}}}