[1]
R. N. Lutfiah and Tunjung Sulaksono, “Cross-Border Data Security: Analysis of High-Profile Violations and Mitigation Strategies”, J. Sistem Inf. (J. Inf. Sys.), vol. 21, no. 2, pp. 23–46, Oct. 2025.