{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:54Z","timestamp":1750219854809,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3,25]]},"DOI":"10.1145\/3599732.3641325","type":"proceedings-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T17:27:20Z","timestamp":1710782840000},"page":"44-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["How to Survive Private Data Leak Incidents in Campus IT Systems?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2967-5557","authenticated-orcid":false,"given":"Yong","family":"Jin","sequence":"first","affiliation":[{"name":"Tokyo Institute of Technology, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8529-5116","authenticated-orcid":false,"given":"Matsuura","family":"Satoshi","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5636-7774","authenticated-orcid":false,"given":"Masahiko","family":"Tomoishi","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology, Japan"}]}],"member":"320","published-online":{"date-parts":[[2024,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Box","year":"2023","unstructured":"Box. 2023. File sharing: Securely share any file type and file size outside the firewall. Retrieved December 26, 2023 from https:\/\/www.box.com\/file-sharing\""},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","author":"M\u00a0Security Media\u00a0Relations","year":"2019","unstructured":"IBM\u00a0Security Media\u00a0Relations. 2019. IBM Study Shows Data Breach Costs on the Rise; Financial Impact Felt for Years. Retrieved December 26, 2023 from https:\/\/newsroom.ibm.com\/2019-07-23-IBM-Study-Shows-Data-Breach-Costs-on-the-Rise-Financial-Impact-Felt-for-Years"},{"key":"e_1_3_2_1_3_1","volume-title":"Is Slack better than email?Retrieved","author":"A\u00a0Salesforce\u00a0company Slack\u00a0Technologies","year":"2023","unstructured":"A\u00a0Salesforce\u00a0company. Slack\u00a0Technologies, LLC. 2023. Is Slack better than email?Retrieved December 26, 2023 from https:\/\/slack.com\/why\/slack-vs-email"}],"event":{"name":"SIGUCCS '24: ACM SIGUCCS Annual Conference 2024","sponsor":["SIGUCCS ACM Special Interest Group on University and College Computing Services"],"location":"Chicago IL USA","acronym":"SIGUCCS '24"},"container-title":["Proceedings of the 2024 ACM SIGUCCS Annual Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3599732.3641325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3599732.3641325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:12Z","timestamp":1750178832000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3599732.3641325"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,25]]},"references-count":3,"alternative-id":["10.1145\/3599732.3641325","10.1145\/3599732"],"URL":"https:\/\/doi.org\/10.1145\/3599732.3641325","relation":{},"subject":[],"published":{"date-parts":[[2024,3,25]]},"assertion":[{"value":"2024-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}