{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:41:21Z","timestamp":1773772881640,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100002403","name":"Taibah University, Saudi Arabia, which provided a PhD scholarship that covered funding for this work","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002403","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001775","name":"University of Technology Sydney, Australia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001775","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3061425","type":"journal-article","created":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T20:57:53Z","timestamp":1614113873000},"page":"33769-33781","source":"Crossref","is-referenced-by-count":27,"title":["A Review of Passenger Digital Information Privacy Concerns in Smart Airports"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1791-6907","authenticated-orcid":false,"given":"Maha Ibrahim","family":"Alabsi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6239-6280","authenticated-orcid":false,"given":"Asif Qumer","family":"Gill","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2021","journal-title":"Passenger Name Record (PNR)"},{"key":"ref38","year":"2020","journal-title":"Security and Facilitation"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jairtraman.2019.101720"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"236","DOI":"10.69554\/UVLU6436","article-title":"Extending the airport boundary: Connecting physical security and cybersecurity","volume":"12","author":"willemsen","year":"2018","journal-title":"Journal of Airport Management"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00092"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2016.09.010"},{"key":"ref37","article-title":"Airport passenger processing technology: A biometric airport journey","author":"patel","year":"2018"},{"key":"ref36","author":"harteveldt","year":"2021","journal-title":"The Future of Airline Distribution 2016&#x2013;2021"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCASIT48058.2019.8973152"},{"key":"ref34","year":"2020","journal-title":"Smart Security Getting Smarter"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2748998"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"ref29","first-page":"3","article-title":"Seven types of privacy","author":"finn","year":"2012","journal-title":"European Data Protection Coming of Age"},{"key":"ref2","year":"2021","journal-title":"IATA Forecast Predicts 8 2 Billion Air Travelers in 2037"},{"key":"ref1","year":"2019","journal-title":"Annual review 2019"},{"key":"ref20","year":"2020","journal-title":"API-PNR Toolkit"},{"key":"ref22","year":"2020","journal-title":"Passenger Facilitation"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(20)30010-2"},{"key":"ref24","year":"2019","journal-title":"Privacy"},{"key":"ref23","author":"hoffman","year":"1977","journal-title":"Modern Methods for Computer Security and Privacy"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6525606"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101786"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-4631-5.ch002"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2933241"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2853985"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600267CM"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.03.007"},{"key":"ref10","author":"giffinger","year":"2007","journal-title":"Smart Cities-\"Ranking of European Medium-Size Cities"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992441"},{"key":"ref40","first-page":"309","article-title":"Smart cities, big data, and the resilience of privacy","volume":"68","author":"hiller","year":"2016","journal-title":"Hastings LJ"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-smc.2019.0036"},{"key":"ref13","first-page":"25","article-title":"Airport smartness index&#x2014;Evaluation method of airport information services","volume":"63","author":"nagy","year":"2016","journal-title":"Osterreichische Zeitschrift Fur Verkehrswissenschaft"},{"key":"ref14","year":"2016","journal-title":"Securing Smart Airports"},{"key":"ref15","year":"2021","journal-title":"Smart Airport"},{"key":"ref16","author":"narula","year":"2020","journal-title":"Smart Airport"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.34257\/GJMBRAVOL20IS3PG25"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2018.8534523"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92267-6_43"},{"key":"ref4","year":"2021"},{"key":"ref3","author":"nau","year":"2017","journal-title":"(2017) SMART AIRPORT HOW TECHNOLOGY IS SHAPING THE FUTURE OF AIRPORTS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2767059"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipt032"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jare.2014.02.006"},{"key":"ref7","article-title":"Guidelines for performing systematic literature reviews in software engineering","volume":"5","author":"keele","year":"2007"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2018.02.039"},{"key":"ref46","article-title":"Efficient hash-chain based RFID privacy protection scheme","author":"ohkubo","year":"2004","journal-title":"Proc Int Conf Ubiquitous Comput Workshop Privacy Current Status Future Directions"},{"key":"ref45","year":"2020","journal-title":"Privacy Policy"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2874978"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.11.008"},{"key":"ref42","year":"2020","journal-title":"Australian Privacy Principles"},{"key":"ref41","author":"wolford","year":"2020","journal-title":"What is GDPR the EU&#x2019;s new data protection law?"},{"key":"ref44","year":"2020","journal-title":"General Data Protection Regulation (GDPR)"},{"key":"ref43","author":"robson","year":"2020","journal-title":"How GDPR is Affecting Airports"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09360741.pdf?arnumber=9360741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T19:00:48Z","timestamp":1724526048000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9360741\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3061425","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}