{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:43Z","timestamp":1750220143679,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union's Horizon 2020 Research and Innovation Programme","award":["57286"],"award-info":[{"award-number":["57286"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3544456","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The cybersecurity-related ethical issues of cloud technology and how to avoid them"],"prefix":"10.1145","author":[{"given":"Aleksandra","family":"Pawlicka","sequence":"first","affiliation":[{"name":"ITTI Sp. z o.o., Poland and University of Warsaw, Poland"}]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"}]},{"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Poland and Adam Mickiewicz University, Poland"}]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"}]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"5 Things You Must Know About Cyber Security in the Cloud. SimpliLearn","author":"Arora Shivam","year":"2022","unstructured":"Shivam Arora. 2022. 5 Things You Must Know About Cyber Security in the Cloud. SimpliLearn (2022)."},{"key":"e_1_3_2_1_2_1","volume-title":"The Naked Truth About Internet Security. ProgrammableWeb","author":"Berlind David","year":"2014","unstructured":"David Berlind. 2014. The Naked Truth About Internet Security. ProgrammableWeb (2014)."},{"key":"e_1_3_2_1_3_1","volume-title":"Does Legal Cloud Computing Create Ethical Issues for Attorneys?Nextpoint","author":"Beumer Michael","year":"2016","unstructured":"Michael Beumer. 2016. Does Legal Cloud Computing Create Ethical Issues for Attorneys?Nextpoint (2016). https:\/\/www.nextpoint.com\/ediscovery-blog\/legal-cloud-computing-ethical-issues\/"},{"volume-title":"legal and environmental impacts of digital technology. BBC GCSE","year":"2022","key":"e_1_3_2_1_4_1","unstructured":"Bitesize. 2022. Ethical, legal and environmental impacts of digital technology. BBC GCSE (2022)."},{"key":"e_1_3_2_1_5_1","volume-title":"The Cloud as Critical Infrastructure. GovInfosecurity","author":"Chabrow Eric","year":"2013","unstructured":"Eric Chabrow. 2013. The Cloud as Critical Infrastructure. GovInfosecurity (2013)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-021-00113-9"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-016-9759-0"},{"key":"e_1_3_2_1_8_1","unstructured":"ENISA. 2022. Cloud and Big Data. (2022). https:\/\/www.enisa.europa.eu\/topics\/cloud-and-big-data?tab=details"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/IS4SI-2017-04016"},{"key":"e_1_3_2_1_10_1","volume-title":"Cloud Computing","author":"Hoang Paulina","year":"2011","unstructured":"Paulina Hoang. 2011. Cloud Computing. George Mason University(2011). https:\/\/mason.gmu.edu\/$$phoang3\/it103project.html"},{"key":"e_1_3_2_1_11_1","unstructured":"Hanna Jett. 2015. MALPRACTICE AND ETHICAL RISKS IN CLOUD COMPUTING. Texas Lawyers\u2019 Insurance Exchange(2015)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2850-3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102685"},{"key":"e_1_3_2_1_14_1","volume-title":"Issues in Cloud Computing. GeeksforGeeks","author":"Mahali Ankit","year":"2022","unstructured":"Ankit Mahali. 2022. Issues in Cloud Computing. GeeksforGeeks (2022). https:\/\/www.geeksforgeeks.org\/issues-in-cloud-computing\/"},{"key":"e_1_3_2_1_15_1","volume-title":"Importance of Ethics in Cloud Security. The International Journal Research Publication\u2019s","author":"Malhotra Pallavi","year":"2018","unstructured":"Pallavi Malhotra. 2018. Importance of Ethics in Cloud Security. The International Journal Research Publication\u2019s; Research Journal of Science & IT Management 8, 1 (2018)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"Brid Murphy and Marta Rocchi. 2021. Ethics and Cloud Computing. 105\u2013128. https:\/\/doi.org\/10.1007\/978-3-030-54660-1_6","DOI":"10.1007\/978-3-030-54660-1_6"},{"key":"e_1_3_2_1_17_1","unstructured":"Jack Newton. 2021. The Ethics and Security of Cloud Computing. Infrastructure Technologies(2021) 16\u201320. https:\/\/www.apexfamilylaw.com\/wp-content\/uploads\/2021\/07\/Clio_The-Ethics-and-Security-of-Cloud-Computing.pdf"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-020-01510-3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409181"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2021.07.010"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.002"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2016.73014"},{"key":"e_1_3_2_1_23_1","volume-title":"Top 5 Cloud Security Data Breaches in Recent Years. MUO","author":"Siyal Gaurav","year":"2022","unstructured":"Gaurav Siyal. 2022. Top 5 Cloud Security Data Breaches in Recent Years. MUO (2022)."},{"key":"e_1_3_2_1_24_1","volume-title":"Facts & Trends for","author":"Sumina Vladimir","year":"2022","unstructured":"Vladimir Sumina. 2022. 26 Cloud Computing Statistics, Facts & Trends for 2022. Cloudwarts (2022)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.59"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2874239.2874242"},{"key":"e_1_3_2_1_27_1","unstructured":"Nikki Williams. 2014. The Naked Truth: Cloud Ethics and Personal Responsibility. Digital Ethics & Policy(2014). https:\/\/digitalethics.org\/essays\/naked-truth-cloud-ethics-and-personal-responsibility"}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","acronym":"ARES 2022","location":"Vienna Austria"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3544456","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3544456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:57Z","timestamp":1750186797000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3544456"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":27,"alternative-id":["10.1145\/3538969.3544456","10.1145\/3538969"],"URL":"https:\/\/doi.org\/10.1145\/3538969.3544456","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}