{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:08:13Z","timestamp":1743131293871,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030628024"},{"type":"electronic","value":"9783030628031"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62803-1_20","type":"book-chapter","created":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T06:18:04Z","timestamp":1605075484000},"page":"248-261","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cybersecurity and Cybercrime Combatting Culture for African Police Services"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9212-550X","authenticated-orcid":false,"given":"Louise","family":"Leenen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2836-9403","authenticated-orcid":false,"given":"Joey","family":"Jansen van Vuuren","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7923-0447","authenticated-orcid":false,"given":"Anna-Marie","family":"Jansen van Vuuren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,10]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","unstructured":"Newhouse, W., Keith, S., Scribner, B., Witte, G.: National initiative for cybersecurity education (NICE): cybersecurity framework. NIST Special Publication (2017). https:\/\/doi.org\/10.6028\/NIST.SP.800-181","DOI":"10.6028\/NIST.SP.800-181"},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1525\/aa.1948.50.1.02a00020","volume":"50","author":"MJ Herskovits","year":"1948","unstructured":"Herskovits, M.J.: The contribution of Afro-American studies to africanist research. Am. Anthropologist 50(1), 1\u201310 (1948). https:\/\/doi.org\/10.1525\/aa.1948.50.1.02a00020","journal-title":"Am. Anthropologist"},{"key":"20_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/hrm.3930240312","volume-title":"Organizational Culture and Leadership. A Dynamic View","author":"EH Schein","year":"1985","unstructured":"Schein, E.H.: Organizational Culture and Leadership. A Dynamic View. Jossey-Bass, San Francisco (1985). https:\/\/doi.org\/10.1002\/hrm.3930240312"},{"key":"20_CR4","doi-asserted-by":"publisher","unstructured":"European Agency for Network and Information Security (ENISA): Cyber security culture in organisations (2017). https:\/\/doi.org\/10.2824\/10543","DOI":"10.2824\/10543"},{"key":"20_CR5","unstructured":"Gcaza, N., Von Solms, R., van Vuuren, J.J.: An ontology for a national cybersecurity culture environment. In: The Nineth International Symposium on Human Aspects of Information Security and Assurance (HAISA), pp. 1\u201310 (2015)"},{"key":"20_CR6","unstructured":"Reid, R., van Niekerk, J.: Towards an education campaign for fostering a societal cyber secure culture. In: The Eighth International Symposium in Human Aspects of Information Security and Assurance (HAISA), pp 174\u2013184 (2014)"},{"key":"20_CR7","unstructured":"Ponemon Institute: The human factor in data protection (2017). https:\/\/www.ponemon.org\/blog\/the-human-factor-in-data-protection"},{"key":"20_CR8","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-319-58553-6_9","volume-title":"Information Security Education for a Global Digital Society","author":"N Gcaza","year":"2017","unstructured":"Gcaza, N., von Solms, R.: Cybersecurity culture: an ill-defined problem. In: Bishop, M., Futcher, L., Miloslavskaya, N., Theocharidou, M. (eds.) WISE 2017. IAICT, vol. 503, pp. 98\u2013109. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58553-6_9"},{"key":"20_CR9","first-page":"46","volume":"31","author":"T Schlienger","year":"2003","unstructured":"Schlienger, T., Teufel, S.: Information security culture - from analysis to change. S. Afr. Comput. J. 31, 46\u201352 (2003)","journal-title":"S. Afr. Comput. J."},{"key":"20_CR10","unstructured":"International Telecommunications Union: ITU corporate annual report (2008). https:\/\/www.itu.int\/osg\/csd\/stratplan\/AR2008_web.pdf"},{"key":"20_CR11","unstructured":"Kortjan, N., Von Solms, R.: Fostering a cyber security culture: a case of South Africa. In: ZA-WWW 2012 Conference (2012)"},{"key":"20_CR12","unstructured":"Mlamedal, B., Roislien, H.E.: The norwegian cyber security culture. Norwegian Centre for Information Security (NorSIS) (2016). https:\/\/norsis.no\/wp-content\/uploads\/2016\/09\/The-Norwegian-Cybersecurity-culture-web.pdf"},{"key":"20_CR13","unstructured":"OECD recommendation of the council on digital security risk management for economic and social prosperity (2015). https:\/\/legalinstruments.oecd.org\/en\/instruments\/116.OECD\/LEGAL\/0415"},{"key":"20_CR14","unstructured":"Veltsos, C.: Building a cybersecurity culture around layer 8. Security Intelligence (2017). https:\/\/securityintelligence.com\/building-a-cybersecurity-culture-around-layer-8\/"},{"key":"20_CR15","unstructured":"HMICFRS Cyber: Keep the light on. An inspection of the police response to cyber-dependent crime (2019). https:\/\/www.justiceinspectorates.gov.uk\/hmicfrs\/publications\/keep-the-light-on-police-response-to-cyber-dependent-crime\/"},{"key":"20_CR16","unstructured":"Florentine, S.: Closing the cybersecurity talent gap, one woman at a time (2015). https:\/\/www.cio.com\/article\/3005637\/cyber-attacks-espionage\/closing-the-cybersecurity-talent-gap-one-woman-at-a-time.html"},{"key":"20_CR17","unstructured":"Workforce Intelligence Network for Southeast Michigan: Cybersecurity skills gap analysis (2017). https:\/\/winintelligence.org\/wp-content\/uploads\/2017\/07\/FINAL-Cybersecurity-Skills-Gap-2017-Web-1.pdf"},{"key":"20_CR18","unstructured":"CSIS Intel Security: Hacking the skills shortage (2016). https:\/\/www.csis.org\/programs\/technology-policy-program\/cybersecurity-and-warfare\/other-projects-cybersecurity-0"},{"key":"20_CR19","unstructured":"NICE Cybersecurity Workforce Framework Work Roles: National initiative for cybersecurity careers and studies (2017). https:\/\/niccs.us-cert.gov\/nice-cybersecurity-workforce-framework-work-roles"},{"key":"20_CR20","unstructured":"e-Governance Academy (EGA): National cyber security index 2017 South Africa (2018). https:\/\/ncsi.ega.ee\/country\/za\/"},{"key":"20_CR21","unstructured":"Usmani, K.A., Appayya, J.A.: Capacity building is the key to fight against cybercrime: the mauritian perspective. Glob. Cyber Expertise Mag 4, 4\u20136 (2017)"},{"key":"20_CR22","unstructured":"Global Project on Cybercrime: Capacity building on cybercrime (2013). http:\/\/www.combattingcybercrime.org\/files\/virtual-library\/capacity-building\/capacity-building-on-cybercrime.pdf"},{"key":"20_CR23","unstructured":"Seger, A.: Cybercrime strategies. Global Project on Cybercrime (2012). https:\/\/rm.coe.int\/16802fa3e1"},{"key":"20_CR24","unstructured":"Federal Buro of Investigation (FBI): Offer online cyber training for law enforcement first responders (2016). https:\/\/www.fbi.gov\/news\/stories\/online-cyber-training-for-law-enforcement-first-responders"},{"key":"20_CR25","unstructured":"Christopoulos, G.: First responders and cyber forensics (2017). https:\/\/www.cepol.europa.eu\/media\/blog\/first-responders-cyber-forensics"},{"key":"20_CR26","unstructured":"Shook, S.: Cybercrime investigation body of knowledge (2019). https:\/\/www.cibok.org\/en\/"},{"key":"20_CR27","unstructured":"Leenen, L., van Vuuren, J.C.J.: Framework for the cultivation of a military cybersecurity culture. In: 14th International Conference on Cyber Warfare and Security (ICCWS) (2019)"},{"key":"20_CR28","unstructured":"PCI Security Standards Council: Best practices for implementing a security awareness program (2014). https:\/\/www.pcisecuritystandards.org\/documents\/PCI_DSS_V1.0_Best_Practices_for_Implementing_Security_Awareness_Program.pdf"},{"key":"20_CR29","unstructured":"Snyder, D., Powers, J.D., Bodine-Baron, W., Fox, B., Kendrick, L., Powell, M.H.: Improving the cybersecurity of U.S. Air force military systems throughout their life cycles. RAND Corporation (2015)"}],"container-title":["IFIP Advances in Information and Communication Technology","Human-Centric Computing in a Data-Driven Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62803-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:29:32Z","timestamp":1731284972000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-62803-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030628024","9783030628031"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62803-1_20","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Human Choice and Computers","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hcc14.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was cancelled due to the COVID-19 crisis.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}