{"id":94,"date":"2022-11-13T14:20:11","date_gmt":"2022-11-13T19:20:11","guid":{"rendered":"https:\/\/blogs.shu.edu\/policy-government-security\/?page_id=94"},"modified":"2022-11-17T15:24:17","modified_gmt":"2022-11-17T20:24:17","slug":"works-cited","status":"publish","type":"page","link":"https:\/\/blogs.shu.edu\/policy-government-security\/works-cited\/","title":{"rendered":"Works Cited"},"content":{"rendered":"<p>Aaronson, Susan Ariel. \u201c<a href=\"https:\/\/cepr.org\/voxeu\/columns\/inadequate-data-protection-threat-economic-and-national-security\" target=\"_blank\" rel=\"noopener\">Inadequate Data Protection: A Threat to Economic and National Security.<\/a>\u201d <em>CEPR<\/em>, 5 Feb. 2020<\/p>\n<p>Aiyer, Bharath, et al. \u201c<a href=\"https:\/\/www.mckinsey.com\/capabilities\/risk-and-resilience\/our-insights\/cybersecurity\/new-survey-reveals-2-trillion-dollar-market-opportunity-for-cybersecurity-technology-and-service-providers.\">New Survey Reveals $2 Trillion Market Opportunity for Cybersecurity Technology and Service Providers.<\/a>\u201d <em>McKinsey &amp; Company<\/em>, McKinsey &amp; Company, 1 Nov. 2022<\/p>\n<p>Andriotis, AnnaMaria. \u201c<a href=\"https:\/\/www.wsj.com\/articles\/visa-mastercard-draw-new-government-scrutiny-over-debit-card-routing-11666024794?mod=hp_lead_pos12.\">WSJ News Exclusive | Visa, MasterCard Draw New Government Scrutiny over Debit-Card Routing.<\/a>\u201d <em>The Wall Street Journal<\/em>, Dow Jones &amp; Company, 17 Oct. 2022<\/p>\n<p>Bahar, Michael. \u201c<a href=\"https:\/\/us.eversheds-sutherland.com\/mobile\/NewsCommentary\/Legal-Alerts\/243354\/Colorados-new-privacy-law-How-it-stacks-up-against-other-US-privacy-laws.\">Colorado&#8217;s New Privacy Law: How It Stacks up against Other US Privacy Laws.<\/a>\u201d<em>\u00a0Eversheds Sutherland<\/em>, 15 July 2021<\/p>\n<p>Bannister, Adam. \u201c<a href=\"https:\/\/portswigger.net\/daily-swig\/russia-behind-cyber-attack-on-satellite-internet-network-ka-sat-that-disrupted-ukrainian-infrastructure-eu.\">Russia behind Cyber-Attack on Satellite Internet Network KA-Sat That Disrupted Ukrainian Infrastructure \u2013 EU.<\/a>\u201d <em>The Daily Swig | Cybersecurity News and Views<\/em>, 10 May 2022<\/p>\n<p>Bernstein, Corinne. \u201c<a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/personally-identifiable-information-PII#:~:text=Personally%20identifiable%20information%20(PII)%20is,anonymous%20data%20is%20considered%20PII.\">Personally Identifiable Information (PII).<\/a>\u201d <em>SearchSecurity<\/em>, TechTarget, 24 Sept. 2021<\/p>\n<p>Bloomberg Law. \u201c<a href=\"https:\/\/pro.bloomberglaw.com\/brief\/what-is-the-vcdpa\/.\">What Is the VCDPA and When Does It Take Effect.<\/a>\u201d <em>Bloomberg Law<\/em>, 4 Aug. 2021<\/p>\n<p>Carnegie Endowment for International Peace. \u201c<a href=\"https:\/\/carnegieendowment.org\/specialprojects\/fincyber\/guides\/board-guide.\">Board-Level Guide: Cybersecurity Leadership &#8211; Cyber Resilience and Financial Organizations.<\/a>\u201d <em>Carnegie Endowment for International Peace<\/em><\/p>\n<p>CISA. \u201c<a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/tips\/ST04-001.\">Security Tip (ST04-001).<\/a>\u201d <em>CISA<\/em>, 6 May 2009<\/p>\n<p>Citrix. \u201c<a href=\"https:\/\/www.citrix.com\/solutions\/digital-workspace\/what-is-a-cloud-service.html.\">What Is a Cloud Service? \u2013 Cloud Services Solutions &#8211; Citrix.<\/a>\u201d <em>Citrix.com<\/em><\/p>\n<p>Collins. \u201c<a href=\"https:\/\/www.collinsdictionary.com\/us\/dictionary\/english\/forefront.\">Forefront Definition and Meaning: Collins English Dictionary.<\/a>\u201d <em>Forefront Definition and Meaning | Collins English Dictionary<\/em>, HarperCollins Publishers Ltd<\/p>\n<p>Columbus, Louis. \u201c<a href=\"https:\/\/venturebeat.com\/security\/2022-cybersecurity-forecasts-predict-growth-emphasizing-resilience\/#:~:text=The%20global%20cybersecurity%20software%2C%20services,%25%20CAGR%2C%20according%20to%20Statista.\">2022 Cybersecurity Forecasts Predict Growth, Emphasizing Resilience.<\/a>\u201d <em>VentureBeat<\/em>, VentureBeat, 5 July 2022<\/p>\n<p>Cover, Rob. \u201c<a href=\"https:\/\/www.sciencedirect.com\/topics\/psychology\/digital-surveillance.\">Digital Surveillance.<\/a>\u201d <em>Digital Surveillance &#8211; an Overview | ScienceDirect Topics<\/em>, 2016<\/p>\n<p>CrowdStrike. \u201c<a href=\"https:\/\/www.crowdstrike.com\/cybersecurity-101\/endpoint-security\/endpoint-detection-and-response-edr\/.\">What Is Endpoint Detection &amp; Response?: EDR Security Definition.<\/a>\u201d <em>Crowdstrike.com<\/em>, 23 Mar. 2022<\/p>\n<p>Cveticanin, Nikolina. \u201c<a href=\"https:\/\/dataprot.net\/statistics\/cyber-warfare-statistics\/.\">The Largest Battlefield in History &#8211; 30 Cyber Warfare Statistics.<\/a>\u201d <em>Dataprot<\/em>, 2 Nov. 2022<\/p>\n<p>Editor, CSRC Content. \u201c<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/cyberspace.\">Cyberspace &#8211; Glossary: CSRC.<\/a>\u201d <em>CSRC Content Editor<\/em><\/p>\n<p>Eira, Astrid. \u201c<a href=\"https:\/\/financesonline.com\/cybercrime-trends\/.\">16 Latest Cybercrime Trends &amp; Predictions for 2022\/2023 and Beyond.<\/a>\u201d <em>Financesonline.com<\/em>, FinancesOnline.com, 7 Nov. 2022<\/p>\n<p>Chaos Untethered. \u201c<a href=\"https:\/\/www.youtube.com\/watch?v=Qa-4Y6FRKF0.\">Elon Musk on Assassin Drones and Ai Propaganda.<\/a>\u201d <em>YouTube<\/em>, YouTube, 17 Nov. 2021<\/p>\n<p>Faithfull, Mark. \u201c<a href=\"https:\/\/secureteam.co.uk\/articles\/the-current-and-future-trends-in-cyber-crime\/.\">The Current and Future Trends in Cyber Crime.<\/a>\u201d <em>SecureTeam<\/em>, 30 Sept. 2022<\/p>\n<p>Fernando, Jason. \u201c<a href=\"https:\/\/www.investopedia.com\/terms\/c\/cagr.asp.\">Compound Annual Growth Rate (CAGR) Formula and Calculation.<\/a>\u201d <em>Investopedia<\/em>, Investopedia, 9 Nov. 2022<\/p>\n<p>G2 &#8211; Business Software Reviews. \u201c<a href=\"https:\/\/www.g2.com\/categories\/cloud-ddos-mitigation.\">Best Cloud Ddos Mitigation Software &#8211; G2.<\/a>\u201d <em>Best Cloud DDoS Mitigation Software<\/em>, 11 Nov. 2022<\/p>\n<p>Garber, Judith. &#8220;<a href=\"https:\/\/lowninstitute.org\/why-antitrust-laws-arent-stopping-some-hospital-mergers\/#:~:text=With%20COPAs%2C%20states%20can%20permit,used%20to%20have%20COPA%20laws.\">Why Antitrust Laws Aren&#8217;t Stopping Some Hospital Mergers.<\/a>&#8221; <em>Lown Institute<\/em>, 19 Aug. 2022<\/p>\n<p>Gardner, Amy. \u201c<a href=\"https:\/\/www.washingtonpost.com\/nation\/2022\/10\/06\/elections-deniers-midterm-elections-2022\/.\">A Majority of GOP Nominees Deny or Question the 2020 Election Results.<\/a>\u201d <em>The Washington Post<\/em>, WP Company, 19 Oct. 2022<\/p>\n<p>Gartner. \u201c<a href=\"https:\/\/www.gartner.com\/en\/insights\/future-of-work.\">Future of Work.<\/a>\u201d <em>Gartner<\/em><\/p>\n<p>Graphika. \u201c<a href=\"https:\/\/graphika.com\/reports.\">Unheard Voice.<\/a>\u201d <em>Graphika Reports<\/em>, 24 Aug. 2022<\/p>\n<p>Greig, Jonathan. \u201c<a href=\"https:\/\/therecord.media\/fbi-6-9-billion-lost-through-internet-crimes-in-2021\/#:~:text=Nearly%20%247%20billion%20was%20lost,FBI's%20annual%20Internet%20Crime%20Report.\">FBI: $6.9 Billion Lost through Internet Crimes in 2021.<\/a>\u201d <em>The Record by Recorded Future<\/em>, 24 Mar. 2022<\/p>\n<p>HNK. \u201c<a href=\"https:\/\/hnksolicitors.com\/news\/what-constitutes-misuse-of-data\/#:~:text=Data%20misuse%20occurs%20when%20companies,intentional%20action%20of%20the%20company.\">What Constitutes Misuse of Data?<\/a>\u201d <em>Higgs Newton Kenyon Solicitors<\/em>, 17 Mar. 2022<\/p>\n<p>Hooper, Kelly. \u201c<a href=\"https:\/\/www.politico.com\/news\/2022\/10\/14\/trump-testify-letter-jan-6-committee-00061859.\">Trump Doesn&#8217;t Say Whether He&#8217;ll Testify in Letter to Jan. 6 Committee.<\/a>\u201d <em>POLITICO<\/em>, 14 Oct. 2022<\/p>\n<p>Insight. \u201c<a href=\"https:\/\/www.insight.com\/en_US\/glossary\/c\/cybersecurity-mesh.html#:~:text=Cybersecurity%20mesh%20is%20a%20cyber,mesh%20uses%20a%20holistic%20approach.\">What Is Cybersecurity Mesh?<\/a>\u201d <em>Insight<\/em><\/p>\n<p>Johnson, James. \u201c<a href=\"https:\/\/warontherocks.com\/2020\/01\/ai-cyberspace-and-nuclear-weapons\/.\">Ai, Cyberspace, and Nuclear Weapons.<\/a>\u201d <em>War on the Rocks<\/em>, 31 Jan. 2020<\/p>\n<p>Jones, Dustin. \u201c<a href=\"https:\/\/www.npr.org\/2022\/05\/16\/1099034094\/what-is-the-great-replacement-theory.\">What Is the &#8216;Great Replacement&#8217; and How Is It Tied to the Buffalo Shooting Suspect?<\/a>\u201d <em>NPR<\/em>, NPR, 16 May 2022<\/p>\n<p>Kesling, Ben. \u201c<a href=\"https:\/\/www.wsj.com\/articles\/u-s-military-bans-tiktok-over-ties-to-china-11578090613?mod=article_inline.\">U.S. Military Bans TikTok over Ties to China.<\/a>\u201d <em>The Wall Street Journal<\/em>, Dow Jones &amp; Company, 3 Jan. 2020<\/p>\n<p>\u201c<a href=\"https:\/\/www.dictionary.com\/browse\/kill-switch.\">Kill Switch Definition &amp; Meaning.<\/a>\u201d <em>Dictionary.com<\/em>, Dictionary.com<\/p>\n<p>Kim, Caitlin. \u201c<a href=\"https:\/\/www.theregreview.org\/2022\/03\/12\/saturday-seminar-data-privacy-through-lens-big-tech\/.\">Data Privacy through the Lens of Big Tech.<\/a>\u201d <em>The Regulatory Review<\/em>, 12 Mar. 2022<\/p>\n<p>LeaksID. \u201c<a href=\"https:\/\/leaksid.com\/how-to-protect-customer-pii-share-with-third-parties.\">How to Protect Personal Identifiable Information, When Share with Third Parties?<\/a>\u201d <em>LeaksID<\/em>, 10 June 2020<\/p>\n<p>Levy, Michael. \u201c<a href=\"https:\/\/www.britannica.com\/topic\/list-of-amendments-to-the-U-S-Constitution-1787122.\">List of Amendments to the U.S. Constitution.<\/a>\u201d <em>Encyclop\u00e6dia Britannica<\/em>, Encyclop\u00e6dia Britannica, Inc., 28 Sept. 2011<\/p>\n<p>Lutkevich, Ben, et al. \u201c<a href=\"https:\/\/www.techtarget.com\/searchhealthit\/definition\/personal-health-information#:~:text=Protected%20health%20information%20(PHI)%2C,an%20individual%20and%20determine%20appropriate.\">What Is Phi (Protected\/Personal Health Information)?<\/a>\u201d <em>SearchHealthIT<\/em>, TechTarget, 5 Apr. 2021<\/p>\n<p>Lutkevich, Ben. \u201c<a href=\"https:\/\/www.techtarget.com\/searchdatamanagement\/definition\/consumer-privacy.\">What Is Consumer Privacy and Which Laws Protect It?<\/a>\u201d <em>SearchDataManagement<\/em>, TechTarget, 12 Feb. 2020<\/p>\n<p>M, Shruti. \u201c<a href=\"https:\/\/www.simplilearn.com\/tutorials\/cyber-security-tutorial\/types-of-cyber-attacks.\">10 Types of Cyber Attacks You Should Be Aware in 2023.<\/a>\u201d <em>Simplilearn.com<\/em>, Simplilearn, 11 Nov. 2022<\/p>\n<p>Malik, William, et al. \u201c<a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/f\/5g-security-risks-vulnerabilities.html.\">Misunderstood Private Network 5G Security Risks &amp; Vulnerabilities.<\/a>\u201d <em>Trend Micro<\/em>, 24 June 2022<\/p>\n<p>McKinsey &amp; Company. \u201c<a href=\"https:\/\/www.mckinsey.com\/about-us\/media.\">The Global Cybersecurity Total Addressable Market May Reach $1.5 Trillion to $2 Trillion, Approximately Ten Times the Size of the Vended Market.<\/a>\u201d <em>McKinsey &amp; Company<\/em>, 2022<\/p>\n<p>Meisenzahl, Mary. \u201c<a href=\"https:\/\/www.businessinsider.com\/us-government-agencies-have-banned-tiktok-app-2020-2.\">US Government Agencies Are Banning TikTok, the Social Media App Teens Are Obsessed with, over Cybersecurity Fears &#8211; Here&#8217;s the Full List.<\/a>\u201d <em>Business Insider<\/em>, Business Insider, 25 Feb. 2020<\/p>\n<p>Metz, Cade. \u201c<a href=\"https:\/\/www.nytimes.com\/2022\/10\/15\/world\/europe\/musk-ukraine-internet-starlink.html#:~:text=Musk%20had%20helped%20provide%20Ukraine,the%20bill%20for%20the%20service.\">Elon Musk Backtracks, Saying His Company Will Continue to Fund Internet Service in Ukraine<\/a>\u201d <em>The New York Times<\/em>, The New York Times, 15 Oct. 2022<\/p>\n<p>Miller, Maggie. \u201c<a href=\"https:\/\/www.politico.com\/news\/2022\/09\/07\/hackers-ukraine-telecom-00055060.\">Ukraine&#8217;s Largest Telecom Stands against Russian Cyberattacks.<\/a>\u201d <em>POLITICO<\/em>, 7 Sept. 2022<\/p>\n<p>Muro, Diego. \u201c<a href=\"https:\/\/www.cidob.org\/publicaciones\/serie_de_publicacion\/notes_internacionals_cidob\/n1_163\/what_does_radicalisation_look_like_four_visualisations_of_socialisation_into_violent_extremism.\">What Does Radicalisation Look like? Four Visualisations of Socialisation into Violent Extremism.<\/a>\u201d <em>CIDOB<\/em>, Dec. 2016<\/p>\n<p>Pengelly, Martin. \u201c<a href=\"https:\/\/www.theguardian.com\/us-news\/2022\/aug\/29\/us-civil-war-fears-poll.\">More than 40% of Americans Think Civil War Likely within a Decade.<\/a>\u201d <em>The Guardian<\/em>, Guardian News and Media, 30 Aug. 2022<\/p>\n<p>Poliveiraa, UNODC. \u201c<a href=\"https:\/\/www.unodc.org\/e4j\/en\/cybercrime\/module-1\/key-issues\/global-connectivity-and-technology-usage-trends.html.\">Cybercrime Module 1 Key Issues: Global Connectivity and Technology Usage Trends.<\/a>\u201d <em>Cybercrime Module 1 Key Issues: Global Connectivity and Technology Usage Trends<\/em>, May 2019<\/p>\n<p>Radar Team. \u201c<a href=\"https:\/\/radar.com\/blog\/location-data-privacy-checklist.\">Location Data Privacy Checklist.<\/a>\u201d <em>Radar Blog<\/em>, 23 Feb. 2021<\/p>\n<p>Rimol, Meghan. \u201c<a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-05-31-gartner-identifies-top-five-trends-in-privacy-through-2024.\">Gartner Identifies Top Five Trends in Privacy through 2024.<\/a>\u201d <em>Gartner<\/em>, 31 May 2022<\/p>\n<p>Sample, Ian. \u201c<a href=\"https:\/\/www.theguardian.com\/technology\/2020\/jan\/13\/what-are-deepfakes-and-how-can-you-spot-them.\">What Are Deepfakes \u2013\u00a0and How Can You Spot Them?<\/a>\u201d <em>The Guardian<\/em>, Guardian News and Media, 13 Jan. 2020<\/p>\n<p>Sanders, Robert. \u201c<a href=\"https:\/\/futurism.com\/experts-predict-by-2040-more-crime-will-be-committed-by-machines-than-by-humans.\">Experts Predict: \u2018by 2040 More Crime Will Be Committed by Machines than by Humans.\u2019<\/a>\u201d <em>Futurism<\/em>, Futurism, 27 Sept. 2016<\/p>\n<p>Sava, Justina Alexandra. \u201c<a href=\"https:\/\/www.statista.com\/statistics\/595182\/worldwide-security-as-a-service-market-size\/.\">Global Cybersecurity Market Forecast 2026.<\/a>\u201d <em>Statista<\/em>, 26 July 2022<\/p>\n<p>SCOTUS. \u201c<a href=\"https:\/\/www.supremecourt.gov\/opinions\/21pdf\/19-1392_6j37.pdf.\">Supreme Court of the United States.<\/a>\u201d <em>Dobbs, State Health Officer of the Mississippi Department of Health, ET AL. v. Jackson Women&#8217;s Health Organization ET AL<\/em>, Oct. 2021<\/p>\n<p>Secuvy Inc. \u201c<a href=\"https:\/\/secuvy.ai\/blog\/five-data-privacy-trends-to-watch-in-2022-and-beyond\/.\">Five Data Privacy Trends to Watch in 2022 and Beyond.<\/a>\u201d <em>Secuvy<\/em>, 16 Feb. 2022<\/p>\n<p>Sganga, Nicole. \u201c<a href=\"https:\/\/www.cbsnews.com\/news\/dragonbridge-china-us-midterm-elections-influence-campaign-mandiant\/.\">China-Linked Influence Campaign Targeting U.S. Midterms, Security Firm Says.<\/a>\u201d <em>CBS News<\/em>, CBS Interactive, 26 Oct. 2022<\/p>\n<p>Shabaz, Adrian. \u201c<a href=\"https:\/\/freedomhouse.org\/report\/freedom-net\/2021\/global-drive-control-big-tech.\">Freedom on the Net 2021: The Global Drive to Control Big Tech.<\/a>\u201d <em>Freedom House<\/em>, 2021<\/p>\n<p>Sindani, Susan. \u201c<a href=\"https:\/\/prezi.com\/p\/fitvacoaa3nn\/understanding-the-process-of-radicalisation\/\">Understanding the Process of Radicalisation.<\/a>\u201d <em>Prezi.com<\/em>, 1 Nov. 2022<\/p>\n<p>Singleton, Camielle. \u201c<a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\/.\">IBM Security X-Force Threat Intelligence Index.<\/a>\u201d <em>IBM<\/em>, 23 Feb. 2022<\/p>\n<p>Sukianto, Axel. \u201c<a href=\"https:\/\/www.upguard.com\/blog\/reduce-cybersecurity-risk#:~:text=Creating%20data%20backups%20and%20encrypting,Using%20strong%20and%20complex%20passwords.\">10 Ways to Reduce Cybersecurity Risk for Your Organization: Upguard.<\/a>\u201d <em>RSS<\/em>, 27 Sept. 2022<\/p>\n<p>Thompson, Mark. \u201c<a href=\"https:\/\/iapp.org\/resources\/article\/ccpa-cpra-related-legislation-tracker\/.\">CCPA-\/CPRA-Related Legislation Tracker.<\/a>\u201d <em>CCPA-\/CPRA-Related Legislation Tracker<\/em>, Oct. 2022<\/p>\n<p>Trend Micro. \u201c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/cybercriminals.\">Cybercriminals.<\/a>\u201d <em>Definition<\/em>, 2022<\/p>\n<p>Trifunovic, Darko. \u201c<a href=\"https:\/\/nsf-journal.hr\/online-issues\/focus\/id\/1317#.Y25ze3bMI2w.\">Cyber War &#8211; Trends and Technologies.<\/a>\u201d <em>National Security And The Future<\/em>, 2021<\/p>\n<p>Tunggal, Abi Tyas. \u201c<a href=\"https:\/\/www.upguard.com\/blog\/vendor-risk-assessment-questionnaire-template.\">Free Vendor Risk Assessment Questionnaire Template: Upguard.<\/a>\u201d <em>RSS<\/em>, 15 Aug. 2022<\/p>\n<p>U.S. D.O.D. \u201c<a href=\"https:\/\/www.defense.gov\/News\/Releases\/Release\/Article\/2833006\/strategic-direction-for-cybersecurity-maturity-model-certification-cmmc-program\/.\">Strategic Direction for Cybersecurity Maturity Model Certification (CMMC) Program.<\/a>\u201d <em>U.S. Department of Defense<\/em>, 4 Nov. 2021<\/p>\n<p>Walker, Laura Petrone and Jemima, et al. \u201c<a href=\"https:\/\/www.verdict.co.uk\/what-is-the-splinternet-and-why-does-it-matter\/.\">What Is the Splinternet and Why Does It Matter?<\/a>\u201d <em>Verdict<\/em>, 30 June 2022<\/p>\n<p>Ware, Jacob. \u201c<a href=\"https:\/\/www.cfr.org\/blog\/elections-violence-and-future-american-democracy.\">Elections, Violence, and the Future of American Democracy.<\/a>\u201d <em>Council on Foreign Relations<\/em>, Council on Foreign Relations, 3 Oct. 2022<\/p>\n<p>WH.gov. \u201c<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/08\/09\/fact-sheet-chips-and-science-act-will-lower-costs-create-jobs-strengthen-supply-chains-and-counter-china\/.\">Fact Sheet: Chips and Science Act Will Lower Costs, Create Jobs, Strengthen Supply Chains, and Counter China.<\/a>\u201d <em>The White House<\/em>, The United States Government, 9 Aug. 2022<\/p>\n<p>WH.gov. \u201c<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/06\/03\/fact-sheet-executive-order-addressing-the-threat-from-securities-investments-that-finance-certain-companies-of-the-peoples-republic-of-china\/.\">Fact Sheet: Executive Order Addressing the Threat from Securities Investments That Finance Certain Companies of the People&#8217;s Republic of China.<\/a>\u201d <em>The White House<\/em>, The United States Government, 4 June 2021<\/p>\n<p>WH.gov. \u201c<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/10\/11\/fact-sheet-biden-harris-administration-delivers-on-strengthening-americas-cybersecurity\/.\">Fact Sheet:\u00a0Biden-Harris Administration Delivers on Strengthening America&#8217;s Cybersecurity.<\/a>\u201d <em>The White House<\/em>, The United States Government, 10 Oct. 2022<\/p>\n<p>Wolford, Ben. \u201c<a href=\"https:\/\/gdpr.eu\/what-is-gdpr\/#:~:text=The%20General%20Data%20Protection%20Regulation,to%20people%20in%20the%20EU.\">What Is GDPR, the EU&#8217;s New Data Protection Law?<\/a>\u201d <em>GDPR.eu<\/em>, 26 May 2022<\/p>\n<p>Wood, Molly. \u201c<a href=\"https:\/\/www.wired.com\/story\/we-need-to-talk-about-cloud-neutrality\/.\">We Need to Talk about &#8216;Cloud Neutrality&#8217;.<\/a>\u201d <em>Wired<\/em>, Conde Nast, 10 Feb. 2020<\/p>\n<p>Et Ciso \u201c<a href=\"https:\/\/ciso.economictimes.indiatimes.com\/news\/gartner-identifies-top-five-trends-in-privacy-through-2024\/91921264.\">Gartner Identifies Top Five Trends in Privacy through 2024 &#8211; Et Ciso.<\/a>\u201d <em>ETCISO.in<\/em>, 31 May 2022<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aaronson, Susan Ariel. \u201cInadequate Data Protection: A Threat to Economic and National Security.\u201d CEPR, 5 Feb. 2020 Aiyer, Bharath, et al. \u201cNew Survey Reveals $2&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/blogs.shu.edu\/policy-government-security\/works-cited\/\">Continue Reading<span class=\"screen-reader-text\">Works Cited<\/span><\/a><\/div>\n","protected":false},"author":5455,"featured_media":0,"parent":0,"menu_order":10,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[],"tags":[],"class_list":["post-94","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/94","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/users\/5455"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/comments?post=94"}],"version-history":[{"count":4,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/94\/revisions"}],"predecessor-version":[{"id":205,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/94\/revisions\/205"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/media?parent=94"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/categories?post=94"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/tags?post=94"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}