{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T23:58:53Z","timestamp":1776902333099,"version":"3.51.2"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.23919\/icact.2019.8701932","type":"proceedings-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T22:58:41Z","timestamp":1556837921000},"page":"635-638","source":"Crossref","is-referenced-by-count":48,"title":["Personal Data Privacy Challenges of the Fourth Industrial Revolution"],"prefix":"10.23919","author":[{"given":"Md Mehedi Hassan","family":"ONIK","sequence":"first","affiliation":[]},{"given":"Chul-Soo","family":"KIM","sequence":"additional","affiliation":[]},{"given":"Jinhong","family":"YANG","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","author":"carey","year":"2004","journal-title":"Data Protection A Practical Guide to UK and EU Law"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8090-5_14"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2016.7800335"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/iCCECOME.2018.8659213"},{"key":"ref35","first-page":"43","author":"murphy","year":"2017","journal-title":"Property rights in personal information An economic defense of privacy"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.157"},{"key":"ref10","article-title":"Determinants of Personal Information Protection Activities in South Korea","author":"kang","year":"2018"},{"key":"ref11","author":"carey","year":"2018","journal-title":"Data Protection A Practical Guide to UK and EU Law"},{"key":"ref12","article-title":"The emerging Cloud Dilemma: Balancing innovation with cross-border privacy and outsourcing regulations","author":"gozman","year":"2018","journal-title":"J Bus Res"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-5634-3.ch061"},{"key":"ref14","first-page":"47","article-title":"Building Trust in Artificial Intelligence, Machine Learning, and Robotics","volume":"31","author":"siau","year":"2018","journal-title":"Cutter Business Technology J"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.022171667"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2491933"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2018.08.008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23143"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.060"},{"key":"ref28","first-page":"3928","article-title":"Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics","author":"d\u2019acquisto","year":"2015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-04682-8"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2014.7058837"},{"key":"ref3","author":"bungart","year":"2014","journal-title":"Industrial Internet versus Industrie 4 0 Produktion&#x2013; Technik und Wirtschaft f&#x00FC;r die deutsche Industrie"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323764"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.488"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53254-6_14"},{"key":"ref8","first-page":"259","article-title":"Blockchain in the Era of Industry 4.0","author":"onik","year":"2018","journal-title":"Data Analytics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203896"},{"key":"ref2","first-page":"66","article-title":"Industrie 4.0&#x2013;Ansto&#x00DF;, Vision, Vorgehen","volume":"8","author":"schwab","year":"2017","journal-title":"IEEE Ind Electron Mag"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1057\/s41266-017-0028-0"},{"key":"ref1","article-title":"Industrie 4.0: Mit dem Internet der Dinge auf dem Weg zur 4. industriellen Revolution","volume":"13","author":"kagermann","year":"2011","journal-title":"VDI Nachrichten"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ITechA.2015.7317398"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i3.29.18540"},{"key":"ref21","first-page":"256","article-title":"Privacy of Things ( PoT ): Personally Identifiable Information Monitoring System for Smart Homes","author":"onik","year":"2018","journal-title":"Proceedings of Symposium of the Korean Institute of Communications and Information Sciences"},{"key":"ref24","first-page":"1104","article-title":"Secure cyber-physical systems: current trends, tools and open research problems","author":"chattopadhyay","year":"2017","journal-title":"Proc Design Automation & Test Europe Conf"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2709310"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.1371"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/iCCECOME.2018.8658586"}],"event":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","location":"PyeongChang Kwangwoon_Do, Korea (South)","start":{"date-parts":[[2019,2,17]]},"end":{"date-parts":[[2019,2,20]]}},"container-title":["2019 21st International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8694794\/8701885\/08701932.pdf?arnumber=8701932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:07:13Z","timestamp":1558393633000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8701932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":35,"URL":"https:\/\/doi.org\/10.23919\/icact.2019.8701932","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}