{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T04:43:51Z","timestamp":1761021831390,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,6]],"date-time":"2019-04-06T00:00:00Z","timestamp":1554508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,6]]},"DOI":"10.1145\/3325917.3325923","type":"proceedings-article","created":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T15:39:51Z","timestamp":1560353991000},"page":"70-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Using Robust Data Governance to Mitigate the Impact of Cybercrime"],"prefix":"10.1145","author":[{"given":"Gerald","family":"Onwujekwe","sequence":"first","affiliation":[{"name":"Department of Information Systems, Virginia Commonwealth, University, Richmond, VA, US"}]},{"given":"Manoj","family":"Thomas","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Virginia Commonwealth, University, Richmond, VA, US"}]},{"given":"Kweku-Muata","family":"Osei-Bryson","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Virginia Commonwealth, University, Richmond, VA, US"}]}],"member":"320","published-online":{"date-parts":[[2019,4,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Cybercrime, organized crime, and societal responses","author":"Viano E.","year":"2016","unstructured":"Viano , E. : Cybercrime, organized crime, and societal responses . Springer Science +Business Media, New York, NY ( 2016 ). Viano, E.: Cybercrime, organized crime, and societal responses. Springer Science+Business Media, New York, NY (2016)."},{"key":"e_1_3_2_1_2_1","volume-title":"Springer Berlin Heidelberg","author":"Combatting","year":"2016","unstructured":"Combatting cybercrime and cyberterrorism. Springer Berlin Heidelberg , New York, NY ( 2016 ). Combatting cybercrime and cyberterrorism. Springer Berlin Heidelberg, New York, NY (2016)."},{"key":"e_1_3_2_1_3_1","first-page":"15","volume":"12","author":"Clarke S.","year":"2016","unstructured":"Clarke , S. : Reducing the impact of cyberthreats with robust data governance. Computer Fraud & Security . 2016 , 12 -- 15 (2016). Clarke, S.: Reducing the impact of cyberthreats with robust data governance. Computer Fraud & Security. 2016, 12--15 (2016).","journal-title":"Computer Fraud & Security"},{"key":"e_1_3_2_1_4_1","unstructured":"Cyberattack https:\/\/en.wikipedia.org\/w\/index.php?title=Cyberattack&oldi d=866903223 (2018).  Cyberattack https:\/\/en.wikipedia.org\/w\/index.php?title=Cyberattack&oldi d=866903223 (2018)."},{"key":"e_1_3_2_1_5_1","first-page":"15","volume":"13","author":"Epps C.","year":"2017","unstructured":"Epps , C. : Best practices to deal with top cybercrime activities. Computer Fraud & Security . 2017 , 13 -- 15 (2017). Epps, C.: Best practices to deal with top cybercrime activities. Computer Fraud & Security. 2017, 13--15 (2017).","journal-title":"Computer Fraud & Security"},{"key":"e_1_3_2_1_6_1","unstructured":"Cyclance Business Brief: Protecting Data Under the GDPR https:\/\/media.bitpipe.com\/io_14x\/io_142963\/item_1719467\/ GDPR_BusinessBrief.pdf (2017).  Cyclance Business Brief: Protecting Data Under the GDPR https:\/\/media.bitpipe.com\/io_14x\/io_142963\/item_1719467\/ GDPR_BusinessBrief.pdf (2017)."},{"key":"e_1_3_2_1_7_1","unstructured":"GDPR Compliance Checklist: A 9-Step Guide. 14.  GDPR Compliance Checklist: A 9-Step Guide. 14."},{"key":"e_1_3_2_1_8_1","unstructured":"McIrvine S.: GDPR Readiness Starts With the Mainframe: Here's Why. 5.  McIrvine S.: GDPR Readiness Starts With the Mainframe: Here's Why. 5."},{"key":"e_1_3_2_1_9_1","volume-title":"the Security Dimension Information security, governance and regulation in harmony. 11","author":"GDPR","year":"2018","unstructured":"GDPR : the Security Dimension Information security, governance and regulation in harmony. 11 ( 2018 ). GDPR: the Security Dimension Information security, governance and regulation in harmony. 11 (2018)."},{"key":"e_1_3_2_1_10_1","unstructured":"Supervisor: GDPR COMPLIANCE REPORT https:\/\/crowdresearchpartners.com\/portfolio\/gdpr- compliance-report\/.  Supervisor: GDPR COMPLIANCE REPORT https:\/\/crowdresearchpartners.com\/portfolio\/gdpr- compliance-report\/."},{"key":"e_1_3_2_1_11_1","unstructured":"How Will The GDPR Affect Cyber-crime? | redstor https:\/\/www.redstor.com\/news\/how-will-gdpr-effect-cyber- crime.  How Will The GDPR Affect Cyber-crime? | redstor https:\/\/www.redstor.com\/news\/how-will-gdpr-effect-cyber- crime."},{"key":"e_1_3_2_1_12_1","unstructured":"Cybercriminals Likely to Use GDPR to Extort Money https:\/\/www.channelpartnersonline.com\/2018\/02\/28\/cybercri minals-likely-to-use-gdpr-to-extort-money\/.  Cybercriminals Likely to Use GDPR to Extort Money https:\/\/www.channelpartnersonline.com\/2018\/02\/28\/cybercri minals-likely-to-use-gdpr-to-extort-money\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Is the GDPR an Opportunity for Cybercriminals? - Panda Security https:\/\/www.pandasecurity.com\/mediacenter\/security\/gdpr- opportunity-cybercriminals\/ (2017).  Is the GDPR an Opportunity for Cybercriminals? - Panda Security https:\/\/www.pandasecurity.com\/mediacenter\/security\/gdpr- opportunity-cybercriminals\/ (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/381641.381662"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1897816.1897829"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-006-8731-y"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/10580530701586136"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662240610710969"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Hua J. Chen Y. Luo X. (Robert): Are We Ready for Cyber Terrorist Attacks?---Examining the Role of Individual Resilience. Information & Management. (2018).  Hua J. Chen Y. Luo X. (Robert): Are We Ready for Cyber Terrorist Attacks?---Examining the Role of Individual Resilience. Information & Management. (2018).","DOI":"10.1016\/j.im.2018.04.008"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.04.006"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.02.004"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2013.792303"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.05.017"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/14684520710747266"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2461256.2461266"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:ISFI.0000025782.13582.87"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1108\/14684520410543670"},{"key":"e_1_3_2_1_28_1","first-page":"241","volume":"3","author":"Otto B.","year":"2011","unstructured":"Otto , B. : Data Governance . Business & Information Systems Engineering; Berkeley. 3 , 241 -- 244 ( 2011 ). Otto, B.: Data Governance. Business & Information Systems Engineering; Berkeley. 3, 241--244 (2011).","journal-title":"Berkeley."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-01-2017-0007"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2003.06.001"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629210"},{"key":"e_1_3_2_1_32_1","first-page":"20","volume":"56","author":"Crawford D.","year":"2013","unstructured":"Crawford , D. : Emerging Cyber Threats Ring In The New Year. Communications of the ACM. 56 , 20 -- 20 ( 2013 ). Crawford, D.: Emerging Cyber Threats Ring In The New Year. Communications of the ACM. 56, 20--20 (2013).","journal-title":"Emerging Cyber Threats Ring In The New Year. Communications of the ACM."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1205918"},{"key":"e_1_3_2_1_34_1","volume-title":"Nunamaker","author":"Samtani S.","year":"2017","unstructured":"Samtani , S. , Chinn , R. , Chen , H. , Nunamaker , J.F. : Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence. Journal of Management Information Systems . 34, 1023--1053 ( 2017 ). Samtani, S., Chinn, R., Chen, H., Nunamaker, J.F.: Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence. Journal of Management Information Systems. 34, 1023--1053 (2017)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1148928.1700954"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.044"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2317016.2317038"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2015.05.001"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290204"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-009-9203-y"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.11.050"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435446"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.11.004"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-06-2015-0260"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2010.02.008"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-12-2015-0394"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:ISFI.0000025779.42497.30"},{"key":"e_1_3_2_1_48_1","first-page":"2233","volume":"58","author":"Rebollo O.","year":"2015","unstructured":"Rebollo , O. , Mellado , D. , Fernandez-Medina , E. : IS Gcloud : a Security Governance Framework for Cloud Computing. Comput J. 58 , 2233 -- 2254 ( 2015 ). Rebollo, O., Mellado, D., Fernandez-Medina, E.: ISGcloud: a Security Governance Framework for Cloud Computing. Comput J. 58, 2233--2254 (2015).","journal-title":"Security Governance Framework for Cloud Computing. Comput J."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-015-9599-5"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-07-2015-0070"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.09.030"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-011-0173-5"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22660"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.05.009"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2009.07.004"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.03.019"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2011.632650"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.065"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00488"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/41.7.429"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240802191670"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260308"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.046"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2654847"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.11.028"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.049"},{"key":"e_1_3_2_1_67_1","unstructured":"Cerf V.G.: Take Two Aspirin and Call Me in the Morning.  Cerf V.G.: Take Two Aspirin and Call Me in the Morning."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2012.10.004"},{"key":"e_1_3_2_1_69_1","first-page":"339","volume":"6","author":"Nofer M.","year":"2014","unstructured":"Nofer , M. , Hinz , O. , Muntermann , J. , Ro\u00dfnagel , H. : The Economic Impact of Privacy Violations and Security Breaches: A Laboratory Experiment . Business & Information Systems Engineering; Berkeley. 6 , 339 -- 348 ( 2014 ). Nofer, M., Hinz, O., Muntermann, J., Ro\u00dfnagel, H.: The Economic Impact of Privacy Violations and Security Breaches: A Laboratory Experiment. Business & Information Systems Engineering; Berkeley. 6, 339--348 (2014).","journal-title":"Berkeley."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.09.031"},{"key":"e_1_3_2_1_71_1","first-page":"189","volume":"12","author":"Tallon P.P.","year":"2013","unstructured":"Tallon , P.P. , Short , J.E. , Harkins , M.W. : The Evolution of Information Governance at Intel. MIS Quarterly Executive. 12 , 189 -- 198 ( 2013 ). Tallon, P.P., Short, J.E., Harkins, M.W.: The Evolution of Information Governance at Intel. MIS Quarterly Executive. 12, 189--198 (2013).","journal-title":"Intel. MIS Quarterly Executive."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017480"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300306"},{"key":"e_1_3_2_1_74_1","first-page":"137","volume":"28","author":"Epstein D.","year":"2013","unstructured":"Epstein , D. : The making of institutions of information governance: the case of the Internet Governance Forum. Journal of Information Technology; Basingstoke. 28 , 137 -- 149 ( 2013 ). Epstein, D.: The making of institutions of information governance: the case of the Internet Governance Forum. Journal of Information Technology; Basingstoke. 28, 137--149 (2013).","journal-title":"Basingstoke."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810891.1810904"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"key":"e_1_3_2_1_77_1","unstructured":"Brenner S.W.: U.S. Cybercrime Law: Defining Offenses.  Brenner S.W.: U.S. Cybercrime Law: Defining Offenses."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.3390\/su10010095"},{"key":"e_1_3_2_1_79_1","volume-title":"K.: A systematic literature review of data governance and cloud data governance. Personal and Ubiquitous Computing.","author":"Al-Ruithe M.","year":"2018","unstructured":"Al-Ruithe , M. , Benkhelifa , E. , Hameed , K.: A systematic literature review of data governance and cloud data governance. Personal and Ubiquitous Computing. ( 2018 ). Al-Ruithe, M., Benkhelifa, E., Hameed, K.: A systematic literature review of data governance and cloud data governance. Personal and Ubiquitous Computing. (2018)."},{"key":"e_1_3_2_1_80_1","volume-title":"Waltham, MA","author":"Ladley J.","year":"2012","unstructured":"Ladley , J. : Data governance: how to design, deploy, and sustain an effective data governance program. Morgan Kaufmann , Waltham, MA ( 2012 ). Ladley, J.: Data governance: how to design, deploy, and sustain an effective data governance program. Morgan Kaufmann, Waltham, MA (2012)."},{"key":"e_1_3_2_1_81_1","volume-title":"Risk Management, and Compliance","author":"Hill D.","year":"2009","unstructured":"Hill , D. : Data Protection: Governance , Risk Management, and Compliance . CRC Press ( 2009 ). Hill, D.: Data Protection: Governance, Risk Management, and Compliance. CRC Press (2009)."},{"key":"e_1_3_2_1_82_1","unstructured":"McDowall R.D.: Data governance to ensure GXP data integrity requires a multilayered approach that runs throughout a regulated organization. Although data governance features in the majority of GXP data integrity guidance documents any approach should be business- driven rather than regulatory-driven. In the first part we discuss the subject at a corporate level. 8.  McDowall R.D.: Data governance to ensure GXP data integrity requires a multilayered approach that runs throughout a regulated organization. Although data governance features in the majority of GXP data integrity guidance documents any approach should be business- driven rather than regulatory-driven. In the first part we discuss the subject at a corporate level. 8."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1177\/0340035216672238"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.352"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.5555\/1611416"},{"key":"e_1_3_2_1_86_1","first-page":"15","volume":"12","author":"Mansfield-Devine S.","year":"2017","unstructured":"Mansfield-Devine , S. : Data governance: going beyond compliance. Computer Fraud & Security . 2017 , 12 -- 15 (2017). Mansfield-Devine, S.: Data governance: going beyond compliance. Computer Fraud & Security. 2017, 12--15 (2017).","journal-title":"Computer Fraud & Security"}],"event":{"name":"ICISDM 2019: 2019 The 3rd International Conference on Information System and Data Mining","sponsor":["University of Houston"],"location":"Houston TX USA","acronym":"ICISDM 2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325917.3325923","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3325917.3325923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:08Z","timestamp":1750204388000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325917.3325923"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,6]]},"references-count":86,"alternative-id":["10.1145\/3325917.3325923","10.1145\/3325917"],"URL":"https:\/\/doi.org\/10.1145\/3325917.3325923","relation":{},"subject":[],"published":{"date-parts":[[2019,4,6]]},"assertion":[{"value":"2019-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}