{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:17:38Z","timestamp":1732036658340},"reference-count":26,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2017,3,30]],"date-time":"2017-03-30T00:00:00Z","timestamp":1490832000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Law & Security Review"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1016\/j.clsr.2017.03.013","type":"journal-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T09:46:09Z","timestamp":1493027169000},"page":"458-469","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"title":["Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities"],"prefix":"10.1016","volume":"33","author":[{"given":"Apostolos","family":"Malatras","sequence":"first","affiliation":[]},{"given":"Ignacio","family":"Sanchez","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Beslay","sequence":"additional","affiliation":[]},{"given":"Iwen","family":"Coisel","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Vakalis","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"D'Acquisto","sequence":"additional","affiliation":[]},{"given":"Manuel Garcia","family":"Sanchez","sequence":"additional","affiliation":[]},{"given":"Matthieu","family":"Grall","sequence":"additional","affiliation":[]},{"given":"Marit","family":"Hansen","sequence":"additional","affiliation":[]},{"given":"Vasilios","family":"Zorkadis","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.clsr.2017.03.013_bib0010","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/j.clsr.2016.05.006","article-title":"Data protection authority perspectives on the impact of data protection reform on cooperation in the EU","volume":"32","author":"Barnard-Wills","year":"2016","journal-title":"Comput Law Secur Rev"},{"key":"10.1016\/j.clsr.2017.03.013_bib0015","series-title":"EXITO: the EXercise event Injection TOolkit","author":"Benoist","year":"2012"},{"key":"10.1016\/j.clsr.2017.03.013_bib0020","series-title":"Proceedings of the 27th annual computer security applications conference","first-page":"137","article-title":"The science of cyber security experimentation: the DETER project","author":"Benzel","year":"2011"},{"key":"10.1016\/j.clsr.2017.03.013_bib0025","article-title":"Cyber defense competitions and information security education: an active learning solution for a capstone course","volume":"vol. 9","author":"Conklin","year":"2006"},{"issue":"2","key":"10.1016\/j.clsr.2017.03.013_bib0030","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1093\/idpl\/ipu010","article-title":"Making the case for enhanced enforcement cooperation between data protection authorities: insights from competition law","volume":"4","author":"Dariusz","year":"2014","journal-title":"International Data Privacy Law (IDPL)"},{"key":"10.1016\/j.clsr.2017.03.013_bib0035","author":"DefCon Capture The Flag Archive"},{"key":"10.1016\/j.clsr.2017.03.013_bib0040","author":"ENISA"},{"key":"10.1016\/j.clsr.2017.03.013_bib0045","author":"ENISA"},{"key":"10.1016\/j.clsr.2017.03.013_bib0050","author":"ENISA"},{"key":"10.1016\/j.clsr.2017.03.013_bib0055","author":"ENISA"},{"issue":"6","key":"10.1016\/j.clsr.2017.03.013_bib0060","article-title":"95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","volume":"23","author":"EU Directive","year":"1995","journal-title":"Official Journal of the European Union (OJ)"},{"key":"10.1016\/j.clsr.2017.03.013_bib0065","first-page":"2","article-title":"Commission Regulation (EU) No 611\/2013 of 24 June 2013 on the measures applicable to the notification of personal data breaches under Directive 2002\/58\/EC of the European Parliament and of the Council on privacy and electronic communications","volume":"173","author":"EU Regulation","year":"2013","journal-title":"Official Journal of the European Union (OJ)"},{"key":"10.1016\/j.clsr.2017.03.013_bib0070","first-page":"1","volume":"59","author":"EU Regulation","year":"2016","journal-title":"Official Journal of the European Union (OJ)"},{"key":"10.1016\/j.clsr.2017.03.013_bib0075","author":"EXITO Narrator"},{"key":"10.1016\/j.clsr.2017.03.013_bib0080","series-title":"Netzwerke\/networks. Tagungsband des 19. Internationalen rechtsinformatik symposions irIS 2016","first-page":"495","article-title":"Cooperation among data privacy supervisory authorities: lessons from parallel European mechanisms","author":"Galetta","year":"2016"},{"key":"10.1016\/j.clsr.2017.03.013_bib0085","series-title":"Cooperation among data privacy supervisory authorities by analogy: lessons from parallel European mechanisms","author":"Galetta","year":"2016"},{"key":"10.1016\/j.clsr.2017.03.013_bib0090","series-title":"Sp 800-84. Guide to test, training, and exercise programs for it plans and capabilities","author":"Grance","year":"2006"},{"key":"10.1016\/j.clsr.2017.03.013_bib0095","series-title":"The European Union as guardian of internet privacy","first-page":"389","article-title":"Understanding the role of cooperation mechanisms of DPAs: towards a layered model of horizontal cooperation between DPAs, a structured network of DPAs and a European DPA","author":"Hijmans","year":"2016"},{"issue":"5","key":"10.1016\/j.clsr.2017.03.013_bib0100","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MSP.2005.120","article-title":"Exploring a National cybersecurity exercise for universities","volume":"3","author":"Hoffman","year":"2005","journal-title":"IEEE Secur Priv"},{"key":"10.1016\/j.clsr.2017.03.013_bib0105","author":"INCIBE"},{"key":"10.1016\/j.clsr.2017.03.013_bib0110","series-title":"Cyber exercise playbook","author":"Kick","year":"2015"},{"key":"10.1016\/j.clsr.2017.03.013_bib0115","series-title":"Workshop on principles of advanced and distributed simulation (PADS'05)","first-page":"119","article-title":"RINSE: the real-time immersive network simulation environment for network security exercises","author":"Liljenstam","year":"2005"},{"key":"10.1016\/j.clsr.2017.03.013_bib0120","author":"Open Web Application Security Project (OWASP)."},{"key":"10.1016\/j.clsr.2017.03.013_bib0125","author":"PHAEDRA"},{"key":"10.1016\/j.clsr.2017.03.013_bib0130","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.procs.2012.10.094","article-title":"Survey on serious games applied to security, safety and crisis management","volume":"15","author":"Tesei","year":"2012","journal-title":"Procedia Computer Science"},{"issue":"1","key":"10.1016\/j.clsr.2017.03.013_bib0140","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/1047124.1047386","article-title":"A real-time information warfare exercise on a virtual network","volume":"37","author":"Walden","year":"2005","journal-title":"SIGCSE Bull"}],"container-title":["Computer Law & Security Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364917300808?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364917300808?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,2]],"date-time":"2018-09-02T07:26:31Z","timestamp":1535873191000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0267364917300808"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["S0267364917300808"],"URL":"https:\/\/doi.org\/10.1016\/j.clsr.2017.03.013","relation":{},"ISSN":["0267-3649"],"issn-type":[{"value":"0267-3649","type":"print"}],"subject":[],"published":{"date-parts":[[2017,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities","name":"articletitle","label":"Article Title"},{"value":"Computer Law & Security Review","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.clsr.2017.03.013","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Apostolos Malatras, Ignacio Sanchez, Laurent Beslay, Iwen Coisel, Ioannis Vakalis; Giuseppe D'Acquisto; Manuel Garcia Sanchez; Matthieu Grall; Marit Hansen; Vasilios Zorkadis Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}]}}