{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:26:13Z","timestamp":1729650373440,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/cybersec.2012.6246173","type":"proceedings-article","created":{"date-parts":[[2012,7,31]],"date-time":"2012-07-31T17:52:55Z","timestamp":1343757175000},"page":"306-311","source":"Crossref","is-referenced-by-count":4,"title":["Data breach on the critical information infrastructures: Lessons from the Wikileaks"],"prefix":"10.1109","author":[{"given":"Ida Madieha","family":"Abdul Ghani Azmi","sequence":"first","affiliation":[]},{"given":"Sonny","family":"Zulhuda","sequence":"additional","affiliation":[]},{"given":"Sigit Puspito","family":"Wigati Jarot","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1080\/10811680802388881"},{"key":"11","first-page":"1043","article-title":"Stealing information: Application of a criminal anti theft statute to leaks of confidential government information","volume":"55","author":"dmitrieva","year":"0","journal-title":"Fla L Rev"},{"key":"12","first-page":"233","article-title":"Lapdogs, watchdogs, and scapegoats: The press and the national security information","volume":"83","author":"papandrea","year":"0","journal-title":"Ind L J"},{"key":"3","article-title":"Data breach: Cause, circumstance, remedies","author":"bandal","year":"2010","journal-title":"Secure Asia"},{"journal-title":"Security Report","year":"2008","key":"2"},{"journal-title":"Wikileaks Inside Julian Assange's War on Secrecy","year":"2011","author":"leigh","key":"1"},{"key":"10","first-page":"455","article-title":"The classified Information Protection Act: Killing the messenger or killing the message","volume":"50","author":"michalec","year":"0","journal-title":"Clev St L Rev"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-11768-0","author":"edwards","year":"1990","journal-title":"Information Technology and the Law"},{"key":"6","article-title":"Getting it right: Protecting American critical infrastructure in cyberspace","volume":"20","author":"condron","year":"2007","journal-title":"Harvard Journal of Law and Technology"},{"journal-title":"Critical Infrastructure Protection Survey of World-wide Activities","year":"2004","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/9781118255803"},{"key":"9","first-page":"801","article-title":"Plugging the leak: The case for a legislative resolution of the conflict between the demands of secrecy and the need for an open government","volume":"71","year":"0","journal-title":"Va L Rev"},{"key":"8","first-page":"203","author":"meier","year":"0","journal-title":"Changing with the Times How the Government Must Adapt to Prevent the Publication of Its Secrets"}],"event":{"name":"2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","start":{"date-parts":[[2012,6,26]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2012,6,28]]}},"container-title":["Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6238218\/6246077\/06246173.pdf?arnumber=6246173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T18:16:12Z","timestamp":1497982572000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6246173\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/cybersec.2012.6246173","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}