{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:10:41Z","timestamp":1740132641690,"version":"3.37.3"},"reference-count":14,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1109\/mc.2022.3192948","type":"journal-article","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T19:47:41Z","timestamp":1664308061000},"page":"113-118","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Engineering"],"prefix":"10.1109","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2097-7914","authenticated-orcid":false,"given":"Joseph","family":"Williams","sequence":"first","affiliation":[{"name":"Infosys Consulting"}]},{"given":"Lisa","family":"Nee","sequence":"additional","affiliation":[{"name":"Infosys Consulting"}]}],"member":"263","reference":[{"journal-title":"Privacy engineering The what why and how","year":"2019","author":"fennessy","key":"ref10"},{"journal-title":"How data privacy regulations affect your supply chain","year":"0","author":"coca","key":"ref11"},{"journal-title":"Are you still using real data to train your AI?","year":"0","author":"strickland","key":"ref12"},{"journal-title":"Why everyone needs a data privacy vault","year":"0","author":"falconer","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-207"},{"journal-title":"Businesses can lose half of customers after a data breach research shows","year":"2022","author":"truta","key":"ref4"},{"key":"ref3","article-title":"Privacy fines: GDPR sanctions in 2021 exceeded $1 Billion","author":"schwartz","year":"2022","journal-title":"Bankinfosecurity"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.37"},{"journal-title":"Coffee with privacy pros DPO vs CPO lawyer vs technician The dualities of privacy","year":"2022","author":"coseglia","key":"ref5"},{"journal-title":"Global comprehensive privacy law mapping chart","year":"2022","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"journal-title":"International Association of Privacy Professionals","year":"2011","author":"cavouikian","key":"ref2"},{"journal-title":"The role of the chief privacy officer in 2020","year":"2022","author":"mcdougall","key":"ref1"},{"journal-title":"New rules on data protection pose compliance issues for firms","year":"2022","author":"edwards","key":"ref9"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/9903856\/09903879.pdf?arnumber=9903879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:07:51Z","timestamp":1667524071000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9903879\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10]]},"references-count":14,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/mc.2022.3192948","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"type":"print","value":"0018-9162"},{"type":"electronic","value":"1558-0814"}],"subject":[],"published":{"date-parts":[[2022,10]]}}}