{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:28:51Z","timestamp":1775744931487,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,28]]},"DOI":"10.1109\/istas52410.2021.9629173","type":"proceedings-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T21:19:56Z","timestamp":1638825596000},"page":"1-7","source":"Crossref","is-referenced-by-count":7,"title":["Cloud computing data breaches: A review of U.S. regulation and data breach notification literature"],"prefix":"10.1109","author":[{"given":"David","family":"Kolevski","sequence":"first","affiliation":[]},{"given":"Katina","family":"Michael","sequence":"additional","affiliation":[]},{"given":"Roba","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Freeman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.011"},{"key":"ref38","article-title":"Soft Law&#x201D; Governance Of Artificial Intelligence","author":"marchant","year":"2019","journal-title":"Pulse"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.10.655"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.089"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176332"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2015.58"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-1356-7_13"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-94-007-1356-7_2","article-title":"The growing gap between emerging technologies and the law","author":"marchant","year":"2011","journal-title":"The Growing Gap between Emerging Technologies and Legal-Ethical Oversight"},{"key":"ref35","article-title":"Equifax Data Breach Settlement","year":"2020","journal-title":"Federal Trade Commission protecting America&#x2019;s Consumers"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSEC49089.2020.9215374"},{"key":"ref10","first-page":"417","article-title":"147 million social security numbers for sale: Developing data protection legislation after mass cybersecurity breaches","volume":"104","author":"kuhn","year":"2018","journal-title":"Iowa Law Rev"},{"key":"ref40","article-title":"Partners: Demand For Cloud Services Is &#x2018;Up Significantly&#x2019; For 2021","author":"alspach","year":"2021","journal-title":"CRN"},{"key":"ref11","first-page":"45","article-title":"Experimenting with privacy: Driving efficiency through a state-informed federal data breach notification and data protection law","volume":"18","author":"tschider","year":"2015","journal-title":"Tul J Tech & Intell Prop"},{"key":"ref12","first-page":"1195","article-title":"Free at what cost?: Cloud computing privacy under the stored communications act","volume":"98","author":"robison","year":"2010","journal-title":"Georgetown Law Journal"},{"key":"ref13","first-page":"2189","article-title":"Cloud cover: privacy protections and the Stored Communications Act in the age of cloud computing","volume":"86","author":"nguyen","year":"2011","journal-title":"Notre Dame Law Review"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2016.01.002"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbankfin.2017.12.002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2897834"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(12)70072-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2018.01.005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/1080569912443081"},{"key":"ref28","first-page":"460","article-title":"The Equifax breach: What we learned and how we can protect consumer data","volume":"30","author":"siracusa","year":"2018","journal-title":"Loyola Consumer Law Review"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.14"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.4451227"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2012.11.010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/1944-2866.POI334"},{"key":"ref29","first-page":"771","article-title":"Privacy, mass intrusion, and the modern data breach","volume":"69","author":"mills","year":"2017","journal-title":"Florida Law Review"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/19331680802425479"},{"key":"ref8","first-page":"215","article-title":"Secure my data or pay the price: Consumer remedy for the negligent enablement of data breach","volume":"4","author":"fisher","year":"2013","journal-title":"William Mary Law Rev"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5325\/jinfopoli.5.2015.0129"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.102"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"},{"key":"ref9","first-page":"229","article-title":"Cloud Computing Providers and Data Security Law: Building Trust with United States Companies","volume":"16","author":"harshbarger","year":"2011","journal-title":"J Technology Law and Policy"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.03"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2011.6085778"},{"key":"ref21","first-page":"257","article-title":"Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches","volume":"40","author":"bonner","year":"2012","journal-title":"Washington University Journal of Law and Policy"},{"key":"ref24","first-page":"437","article-title":"Hacking the current system: Congress&#x2019; attempt to pass data security and breach notification legislation","volume":"2015","author":"newman","year":"2015","journal-title":"University of Illinois Journal of Law Technology and Policy"},{"key":"ref23","first-page":"24","article-title":"Do federal regulations help or hinder patient data security?","volume":"23","author":"kass","year":"2015","journal-title":"Health Data Management"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2011.08.008"},{"key":"ref26","first-page":"215","article-title":"The Equifax data breach and the resulting legal recourse","volume":"13","author":"kenny","year":"2018","journal-title":"Brooklyn Journal of Corporate Financial & Commercial Law"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.18060\/3911.0037"}],"event":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","location":"Waterloo, ON, Canada","start":{"date-parts":[[2021,10,28]]},"end":{"date-parts":[[2021,10,31]]}},"container-title":["2021 IEEE International Symposium on Technology and Society (ISTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9628888\/9629117\/09629173.pdf?arnumber=9629173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:54:02Z","timestamp":1652201642000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9629173\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,28]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/istas52410.2021.9629173","relation":{},"subject":[],"published":{"date-parts":[[2021,10,28]]}}}