Rheault, E.;                     Nerayo, M.;                     Leonard, J.;                     Kolenbrander, J.;                     Henshaw, C.;                     Boswell, M.;                     Michaels, A.J.    
        Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine. J. Cybersecur. Priv. 2024, 4, 572-593.
    https://doi.org/10.3390/jcp4030027
    AMA Style
    
                                Rheault E,                                 Nerayo M,                                 Leonard J,                                 Kolenbrander J,                                 Henshaw C,                                 Boswell M,                                 Michaels AJ.        
                Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine. Journal of Cybersecurity and Privacy. 2024; 4(3):572-593.
        https://doi.org/10.3390/jcp4030027
    
    Chicago/Turabian Style
    
                                Rheault, Elliott,                                 Mary Nerayo,                                 Jaden Leonard,                                 Jack Kolenbrander,                                 Christopher Henshaw,                                 Madison Boswell,                                 and Alan J. Michaels.        
                2024. "Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine" Journal of Cybersecurity and Privacy 4, no. 3: 572-593.
        https://doi.org/10.3390/jcp4030027
    
    APA Style
    
                                Rheault, E.,                                 Nerayo, M.,                                 Leonard, J.,                                 Kolenbrander, J.,                                 Henshaw, C.,                                 Boswell, M.,                                 & Michaels, A. J.        
        
        (2024). Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine. Journal of Cybersecurity and Privacy, 4(3), 572-593.
        https://doi.org/10.3390/jcp4030027