{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T18:18:31Z","timestamp":1770574711745,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T00:00:00Z","timestamp":1634601600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,19]]},"DOI":"10.1145\/3487075.3487112","type":"proceedings-article","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T20:35:15Z","timestamp":1638909315000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Smart Data Analysis and Data Governance"],"prefix":"10.1145","author":[{"given":"Yunzhong","family":"Feng","sequence":"first","affiliation":[{"name":"Hebei Normal University, P.R. China"}]},{"given":"Xiaohua","family":"Feng","sequence":"additional","affiliation":[{"name":"Computer Science and Technology, University of Bedfordshire, UK"}]}],"member":"320","published-online":{"date-parts":[[2021,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE Xplore 2019 Smart City Congress, Proceeding of International Workshop ACE-2019","author":"Feng X.","year":"2019","unstructured":"X. Feng , Y. Feng , ( 2019 a). \u201c Computer Laws Consideration on Smart City Data Planning of Chongli 2022 \u201d IEEE Xplore 2019 Smart City Congress, Proceeding of International Workshop ACE-2019 , Leicester, UK X. Feng, Y. Feng, (2019a). \u201cComputer Laws Consideration on Smart City Data Planning of Chongli 2022\u201d IEEE Xplore 2019 Smart City Congress, Proceeding of International Workshop ACE-2019, Leicester, UK"},{"key":"e_1_3_2_1_2_1","volume-title":"23rd EURO Working Group on Transportation Meeting, EWGT 2020","author":"Alexakos C.","year":"2020","unstructured":"C. Alexakos , C. Katsini , K. Votis , A. Lalas , D. Tzovaras and D. Serpanos ( 2020 ) \u201c Enabling Digital Forensics Readiness for Internet of Vehicles \u201d 23rd EURO Working Group on Transportation Meeting, EWGT 2020 , Paphos, Cyprus, ScienceDirect. .sciencedirect.com. Transportation Research Procedia 52. 339\u2013346. C. Alexakos, C. Katsini, K. Votis, A. Lalas, D. Tzovaras and D. Serpanos (2020) \u201cEnabling Digital Forensics Readiness for Internet of Vehicles\u201d 23rd EURO Working Group on Transportation Meeting, EWGT 2020, Paphos, Cyprus, ScienceDirect. .sciencedirect.com. Transportation Research Procedia 52. 339\u2013346."},{"key":"e_1_3_2_1_3_1","volume-title":"Microsoft.","author":"Woehler L.","year":"2014","unstructured":"L. Woehler ( 2014 ). \u201c The first cloud computing platform to conform to ISO\/IEC 27018, the only international set of privacy controls in the cloud \u201d, Microsoft. L. Woehler (2014). \u201cThe first cloud computing platform to conform to ISO\/IEC 27018, the only international set of privacy controls in the cloud\u201d, Microsoft."},{"key":"e_1_3_2_1_4_1","volume-title":"Euro Cloud Expo","author":"Hawthorn N.","year":"2015","unstructured":"N. Hawthorn , ( 2015 ), \u201c White paper: How European Union data protection affects your data in the cloud \u201d, the new EU data protection regulations, Skyhigh and DMH Stallard LLP, Euro Cloud Expo 2015. N. Hawthorn, (2015), \u201cWhite paper: How European Union data protection affects your data in the cloud\u201d, the new EU data protection regulations, Skyhigh and DMH Stallard LLP, Euro Cloud Expo 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE International Workshop ACE-2021","author":"Xu J.","year":"2021","unstructured":"J. Xu ( 2021 ) \u201c Legal Protection of Personal Data in China \u201d, IEEE International Workshop ACE-2021 , Canada. J. Xu (2021) \u201cLegal Protection of Personal Data in China\u201d, IEEE International Workshop ACE-2021, Canada."},{"key":"e_1_3_2_1_6_1","volume-title":"Overview of the General Data Protection Regulation (GDPR)\u201d. https:\/\/ico.org.uk\/for-organisations\/data-protection-reform\/overview-of-the-gdpr","author":"ICO","year":"2016","unstructured":"ICO ( 2016 ) \u201c Overview of the General Data Protection Regulation (GDPR)\u201d. https:\/\/ico.org.uk\/for-organisations\/data-protection-reform\/overview-of-the-gdpr . ICO (2016) \u201cOverview of the General Data Protection Regulation (GDPR)\u201d. https:\/\/ico.org.uk\/for-organisations\/data-protection-reform\/overview-of-the-gdpr."},{"key":"e_1_3_2_1_7_1","volume-title":"3rd ACM International Conference on CS & Application Eng. CSAE","author":"Feng X.","year":"2019","unstructured":"X. Feng and Y. Feng ( 2019 ) \u201c Smart Cities Design Consideration \u201d, represented at the 3rd ACM International Conference on CS & Application Eng. CSAE 2019, China. X. Feng and Y. Feng (2019) \u201cSmart Cities Design Consideration\u201d, represented at the 3rd ACM International Conference on CS & Application Eng. CSAE 2019, China."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN50884.2021.9333939"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceeding of IEEE International Workshop ACE-2019","author":"Okai E.","year":"2019","unstructured":"E. Okai , X. Feng , ( 2019 ) \u201c Smart City Challenges \u201d, Proceeding of IEEE International Workshop ACE-2019 . E. Okai, X. Feng, (2019) \u201cSmart City Challenges\u201d, Proceeding of IEEE International Workshop ACE-2019."},{"key":"e_1_3_2_1_10_1","volume-title":"Big Data Optimization: Recent Developments and Challenges. In the series of \u201cStudies in Big Data","year":"2016","unstructured":"Ali Emrouznejad ( 2016 ). \u201c Big Data Optimization: Recent Developments and Challenges. In the series of \u201cStudies in Big Data \u201d, Springer-Verlag , ISBN : 978-3-319-30263-8. Ali Emrouznejad (2016). \u201cBig Data Optimization: Recent Developments and Challenges. In the series of \u201cStudies in Big Data\u201d, Springer-Verlag, ISBN: 978-3-319-30263-8."},{"key":"e_1_3_2_1_11_1","volume-title":"Law Enforcement\u201d. NIST. USA. [Accessed 19\/04\/2019]","author":"National Institute of Standards and Technology","year":"2018","unstructured":"National Institute of Standards and Technology ( 2018 ) \u201c Law Enforcement\u201d. NIST. USA. [Accessed 19\/04\/2019] National Institute of Standards and Technology (2018) \u201cLaw Enforcement\u201d. NIST. USA. [Accessed 19\/04\/2019]"},{"key":"e_1_3_2_1_12_1","volume-title":"NHS Big Data Intelligence on Blockchain Applications\u201d. Big Data Intelligence for Smart Applications. Editors","author":"Feng X.","year":"2021","unstructured":"X. Feng , ( 2021 ) \u201c NHS Big Data Intelligence on Blockchain Applications\u201d. Big Data Intelligence for Smart Applications. Editors B. Youssef, Yassine M, Series : Studies in Computational Intelligence, Vol 994, Publisher Springer International Switzerland . eBook ISBN 978-3-030-87954-9. X. Feng, (2021) \u201cNHS Big Data Intelligence on Blockchain Applications\u201d. Big Data Intelligence for Smart Applications. Editors B. Youssef, Yassine M, Series: Studies in Computational Intelligence, Vol 994, Publisher Springer International Switzerland. eBook ISBN 978-3-030-87954-9."},{"key":"e_1_3_2_1_13_1","volume-title":"About MKSmart","year":"2017","unstructured":"MKSmart , ( 2017 ) \u201c About MKSmart \u201d. Milton Keynes City Council . http:\/\/www.mksmart.org\/about\/ [Accessed 20\/May\/2019]. MKSmart, (2017) \u201cAbout MKSmart\u201d. Milton Keynes City Council. http:\/\/www.mksmart.org\/about\/ [Accessed 20\/May\/2019]."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00282"},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE International Workshop ACE2020","author":"Feng X.","year":"2020","unstructured":"X. Feng , ( 2020 ) \u201c Artificial Intelligence and Cyber Security \u201d, IEEE International Workshop ACE2020 , Calgary, Canada. X. Feng, (2020) \u201cArtificial Intelligence and Cyber Security\u201d, IEEE International Workshop ACE2020, Calgary, Canada."},{"key":"e_1_3_2_1_16_1","volume-title":"A Managers Guide to IT Law","author":"Holt J.","year":"2011","unstructured":"J. Holt ( 2011 ) \u201c A Managers Guide to IT Law \u201d, British Computer Society , 2 nd Ed. ISBN 10: 1906124752, ISBN 13: 9781906124755. J. Holt (2011) \u201cA Managers Guide to IT Law\u201d, British Computer Society, 2nd Ed. ISBN 10: 1906124752, ISBN 13: 9781906124755.","edition":"2"},{"key":"e_1_3_2_1_17_1","volume-title":"The 19th International Conference of Internet.","author":"Adegoroy A.","year":"2020","unstructured":"A. Adegoroy , ( 2020 ) \u201c A new perspective on the issue of privacy: Covid-19 pandemic vs. privacy \u201d. The 19th International Conference of Internet. A. Adegoroy, (2020) \u201cA new perspective on the issue of privacy: Covid-19 pandemic vs. privacy\u201d. The 19th International Conference of Internet."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech52372.2021.00140"},{"key":"e_1_3_2_1_19_1","volume-title":"Introduction to Hadoop Security: A Hands-on Approach to Securing Big Data Clusters","author":"Bean J.","year":"2016","unstructured":"J. Bean ( 2016 ) \u201c Introduction to Hadoop Security: A Hands-on Approach to Securing Big Data Clusters \u201d O'Reilly Media , ISBN : 1771375051. J. Bean (2016) \u201cIntroduction to Hadoop Security: A Hands-on Approach to Securing Big Data Clusters\u201d O'Reilly Media, ISBN: 1771375051."},{"key":"e_1_3_2_1_20_1","volume-title":"Tdwi. https:\/\/tdwi.org\/articles\/2017\/09\/15\/diq-all-data-governance-in-big-data-world.aspx","author":"Washington E.","year":"2017","unstructured":"E. Washington ( 2017 ) \u201c Why Data Governance is Crucial for Big Data Environments \u201d, Tdwi. https:\/\/tdwi.org\/articles\/2017\/09\/15\/diq-all-data-governance-in-big-data-world.aspx E. Washington (2017) \u201cWhy Data Governance is Crucial for Big Data Environments\u201d, Tdwi. https:\/\/tdwi.org\/articles\/2017\/09\/15\/diq-all-data-governance-in-big-data-world.aspx"},{"key":"e_1_3_2_1_21_1","volume-title":"Congress","author":"The Standing Committee of the National People's Congress (2021).","year":"2021","unstructured":"The Standing Committee of the National People's Congress (2021). \u201cData Security Law \u201d, Data Security Law, states data classified protection, the legislation session passed by the Standing Committee of the National People's Congress September 2021 . The Standing Committee of the National People's Congress (2021). \u201cData Security Law\u201d, Data Security Law, states data classified protection, the legislation session passed by the Standing Committee of the National People's Congress September 2021."}],"event":{"name":"CSAE 2021: The 5th International Conference on Computer Science and Application Engineering","location":"Sanya China","acronym":"CSAE 2021"},"container-title":["Proceedings of the 5th International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487075.3487112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487075.3487112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:10Z","timestamp":1750183810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487075.3487112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,19]]},"references-count":21,"alternative-id":["10.1145\/3487075.3487112","10.1145\/3487075"],"URL":"https:\/\/doi.org\/10.1145\/3487075.3487112","relation":{},"subject":[],"published":{"date-parts":[[2021,10,19]]},"assertion":[{"value":"2021-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}