{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T23:16:26Z","timestamp":1751411786946,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031622762"},{"type":"electronic","value":"9783031622779"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62277-9_29","type":"book-chapter","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T04:01:58Z","timestamp":1718164918000},"page":"443-456","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Community Security Operations Centre (ComSOC) Model for SMMEs in Developing Countries"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5926-9417","authenticated-orcid":false,"given":"Nombeko","family":"Ntingi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4353-1253","authenticated-orcid":false,"given":"Jaco","family":"du Toit","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3586-6632","authenticated-orcid":false,"given":"Sebastiaan","family":"von Solms","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,13]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Ntingi, N., Duvenage, P., du Toit, J., von Solms, B.: Effective cyber threat hunting: where and how does it fit? In: Chester: Proceedings of the 21st European Conference on Cyber Warfare and Security, pp. 206\u2013213 (2022)","DOI":"10.34190\/eccws.21.1.240"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Ntingi, N., du Toit, J., von Solms, B.: Towards an active cyber defence framework for SMMEs in developing countries. In: European Conference on Cyber Warfare and Security, pp. 341\u2013348. Academic Conferences International Ltd, Athens (2023)","DOI":"10.34190\/eccws.22.1.1053"},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"85701","DOI":"10.1109\/ACCESS.2022.3197899","volume":"10","author":"A Chidukwani","year":"2022","unstructured":"Chidukwani, A., Zander, S., Koutsakis, P.: A survey on the cyber security of small-to-medium businesses: challenges, research focus and recommendations. IEEE Access 10, 85701\u201385719 (2022)","journal-title":"IEEE Access"},{"key":"29_CR4","unstructured":"Vasquez, C.: Policy. Retrieved from Cyberscoop (2023). https:\/\/cyberscoop.com\/cisa-goldstein-secure-by-design\/"},{"issue":"3","key":"29_CR5","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1080\/10919392.2018.1484598","volume":"28","author":"S Kabanda","year":"2018","unstructured":"Kabanda, S., Tanner, M., Kent, C.: Exploring SME cybersecurity practices in developing countries. J. Organ. Comput. Electron. Commer. 28(3), 269\u2013282 (2018). https:\/\/doi.org\/10.1080\/10919392.2018.1484598","journal-title":"J. Organ. Comput. Electron. Commer."},{"key":"29_CR6","doi-asserted-by":"publisher","first-page":"85701","DOI":"10.1109\/ACCESS.2022.3197899","volume":"10","author":"A Chidukwani","year":"2022","unstructured":"Chidukwani, A., Zander, S., Koutsakis, P.: A survey on the cyber security of small-to-medium businesses: challenges, research focus and recommendations. IEEE Access 10, 85701\u201385719 (2022)","journal-title":"IEEE Access"},{"key":"29_CR7","unstructured":"OSIbeyond: Is Cybersecurity as a Service (CSaaS) Enough for Your Company? Retrieved from OSIbeyond (2022). https:\/\/www.osibeyond.com\/blog\/is-cybersecurity-as-a-service-csaas-enough-for-your-company\/"},{"key":"29_CR8","unstructured":"Hamel, L.: MDR vs. MSSP Which one is right for your organisation? Retrieved from Red Canary (2022). https:\/\/redcanary.com\/blog\/mdr-vs-mssp\/"},{"key":"29_CR9","unstructured":"Schatz, D.: Thoughts on Managed Security Services Provider Engagement. ISSA J. 26\u201331 (2014)"},{"issue":"6","key":"29_CR10","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1007\/s10796-019-09959-1","volume":"21","author":"M Heidt","year":"2019","unstructured":"Heidt, M., Gerlach, J.P., Buxmann, P.: Investigating the security divide between SME and large companies: how SME characteristics influence organizational IT security. Inform. Syst. Front. 21(6), 1285\u20131305 (2019)","journal-title":"Inform. Syst. Front."},{"key":"29_CR11","unstructured":"BIO-Key: Pros and Cons: Cybersecurity Outsourcing. Retrieved from BIO-Key (2023). https:\/\/blog.bio-key.com\/pros-and-cons-cybersecurity-outsourcing"},{"key":"29_CR12","unstructured":"Peffers, K., et al.: The Design Science Research Process: A model for producing and presenting information. In: Proceedings of First International Conference on Design Science Research in Information Systems and Technology DESRIST, pp. 83\u2013106. Retrieved 18 April 2022 (2006). https:\/\/www.researchgate.net\/publication\/228650671_The_design_science_research_process_A_model_for_producing_and_presenting_information_systems_research"},{"issue":"08","key":"29_CR13","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MC.2016.223","volume":"49","author":"C Paulsen","year":"2016","unstructured":"Paulsen, C.: Cybersecuring small businesses. Computer 49(08), 92\u201397 (2016). https:\/\/doi.org\/10.1109\/MC.2016.223","journal-title":"Computer"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"International Monetary Fund: IMF Staff Country Reports, from International Moneytary Fund (2022). https:\/\/www.imf.org\/en\/Publications\/CR\/Issues\/2022\/06\/16\/South-Africa-Financial-Sector-Assessment-Program-Technical-Note-on-Financial-Safety-Net-and-519719. Retrieved 2 Oct 2023","DOI":"10.5089\/9798400214486.002"},{"key":"29_CR15","unstructured":"State Security Agency: National Cybersecurity Policy Framework (NCPF) (2015). https:\/\/www.gov.za\/sites\/default\/files\/gcis_document\/201512\/39475gon609.pdf. Retrieved 8 Apr 2022"},{"key":"29_CR16","unstructured":"indeed: What is a distributed system? Retrieved from Guide to Distributed Systems (With Definition and Examples) (2022). https:\/\/ca.indeed.com\/career-advice\/career-development\/distributed-system"},{"key":"29_CR17","unstructured":"allBusiness: Definition of homogeneous. allBusiness (2023). https:\/\/www.allbusiness.com\/hombarrons_dictionary\/dictionary-homogeneous-4959823-1.html"},{"key":"29_CR18","unstructured":"Korolov, M.: AI in cybersecurity: raising the stakes for enterprise defence. AI Business (2022). https:\/\/aibusiness.com\/verticals\/ai-in-cybersecurity-raising-the-stakes-for-enterprise-defense"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62277-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T14:06:39Z","timestamp":1722175599000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62277-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031622762","9783031622779"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62277-9_29","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}