{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T18:02:42Z","timestamp":1769191362125,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/kaleidoscope.2015.7383634","type":"proceedings-article","created":{"date-parts":[[2016,1,21]],"date-time":"2016-01-21T18:13:12Z","timestamp":1453399992000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Regulation and standardization of data protection in cloud computing"],"prefix":"10.1109","author":[{"given":"Martin G.","family":"Lohe","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Faculty of Economics and Management, Chair of Innovation Economics"}]},{"given":"Knut","family":"Blind","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Faculty of Economics and Management, Chair of Innovation Economics"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s11151-011-9295-7","article-title":"Cloud Computing: Architectural and Policy Implications","volume":"38","author":"christopher s","year":"2011","journal-title":"Review of Industrial Organization"},{"key":"ref11","article-title":"Privacy concerns about data collection may lead to dumbing down smart devices TechRepublic","author":"alex","year":"2014"},{"key":"ref12","article-title":"Regulierte Selbstregulierung als Form modernen Regierens","author":"wolfgang","year":"2011"},{"key":"ref13","article-title":"It's a Jungle Out There","author":"niamh christina","year":"2014"},{"key":"ref14","article-title":"Article 29 Working Party, Opinion 05\/2012 on Cloud Computing","year":"2012"},{"key":"ref15","first-page":"1409","article-title":"Regulating Privacy by Design","volume":"26","author":"ira s","year":"2011","journal-title":"Berkeley Technology Law Journal"},{"key":"ref16","first-page":"647","article-title":"Data security and privacy protection issues in cloud computing","volume":"1","author":"deyan","year":"2012","journal-title":"Intl Conference on Computer Science and Electronics Engineering (ICCSEE) IEEE"},{"key":"ref17","article-title":"The economics of standardization: an update","author":"peter","year":"2010","journal-title":"Report for the UK Department of Business Innovation and Skills (BIS)"},{"key":"ref18","article-title":"ISO 27018 - the international standard for protecting PII in the public cloud - Where are we now?","author":"matthew","year":"2015"},{"key":"ref19","article-title":"Korea encourages cloud computing adoption with world-first law","author":"daniel","year":"2015"},{"key":"ref4","first-page":"405","article-title":"The economics of privacy","volume":"71","author":"richard a","year":"1981","journal-title":"American Economic Review"},{"key":"ref3","article-title":"Privacy and freedom","author":"alan f","year":"1967"},{"key":"ref6","first-page":"1061","article-title":"Privacy Costs and Personal Data Protection: Economic and Legal Perspectives","volume":"24","author":"sasha","year":"2009","journal-title":"Berkeley Technology Law Journal"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1287\/mksc.1040.0103","article-title":"Conditioning Prices on Purchase History","volume":"24","author":"alessandro","year":"2005","journal-title":"Marketing Science"},{"key":"ref8","article-title":"The Economics of Privacy, Data Protection and Surveillance","author":"ian","year":"2013","journal-title":"Handbook on the Economics of the Internet"},{"key":"ref7","article-title":"Is there a cost to privacy breaches? An event study","author":"alessandro","year":"2006"},{"key":"ref2","article-title":"E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus actual Behavior","author":"sarah","year":"2001"},{"key":"ref1","article-title":"Oslo Manual. Guidelines for Collecting and Interpreting Innovation Data","year":"2005","journal-title":"OECD and Eurostat"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","article-title":"Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences","volume":"15","author":"bernhard","year":"2009","journal-title":"Journal of Computer-Mediated Communication"}],"event":{"name":"2015 ITU Kaleidoscope: Trust in the Information Society (K-2015)","location":"Barcelona, Spain","start":{"date-parts":[[2015,12,9]]},"end":{"date-parts":[[2015,12,11]]}},"container-title":["2015 ITU Kaleidoscope: Trust in the Information Society (K-2015)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7372261\/7383613\/07383634.pdf?arnumber=7383634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T19:41:43Z","timestamp":1623181303000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7383634\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/kaleidoscope.2015.7383634","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}