{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:23:52Z","timestamp":1743063832148,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642152566"},{"type":"electronic","value":"9783642152573"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15257-3_1","type":"book-chapter","created":{"date-parts":[[2010,8,4]],"date-time":"2010-08-04T15:12:58Z","timestamp":1280934778000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["The 5 Waves of Information Security \u2013 From Kristian Beckman to the Present"],"prefix":"10.1007","author":[{"given":"S. H.","family":"von Solms","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"ACISP 2009, Proceedings of ACISP 2009, Brisbane, Australia (July 2009)"},{"key":"1_CR2","unstructured":"CISCO 2009, A Comprehensive Proactive Approach to Web based Threats (2009), \n                    \n                      http:\/\/www.ironport.com\/pdf\/ironport_web_reputation_whitepaper.pdf\n                    \n                    \n                   (accessed May 2010)"},{"key":"1_CR3","unstructured":"Sophos 2009, The Sophos Security Threat Report (2009), \n                    \n                      http:\/\/www.sophos.com\/sophos\/.\/sophos-security-threat-report-jan-2009-na.pdf\n                    \n                    \n                   (accessed May 2010)"},{"key":"1_CR4","unstructured":"Symantec 2010, The Wild, Wild West Web, Symantec (2010), \n                    \n                      http:\/\/www.computerworld.com\/pdfs\/Messagelabs_Wild_Wild_Web.pdf\n                    \n                    \n                   (accessed June 2010)"},{"key":"1_CR5","unstructured":"The Risk Digest 1(1) (1985), \n                    \n                      http:\/\/catless.ncl.ac.uk\/Risks\/1.01.html\n                    \n                    \n                   (accessed April 2009)"},{"key":"1_CR6","unstructured":"UK Cybercrime 2009, The UK Cybercrime Report (2009), \n                    \n                      https:\/\/www.garlik.com\/cybercrime_report.php\n                    \n                    \n                   (accessed March 2010)"},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/S0167-4048(00)07021-8","volume":"9","author":"B. Solms von","year":"2000","unstructured":"von Solms, B.: Information Security \u2013 The Third Wave? Computers and Security\u00a09, 615\u2013620 (2000)","journal-title":"Computers and Security"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2006.03.004","volume":"25","author":"B. Solms von","year":"2006","unstructured":"von Solms, B.: Information Security \u2013 The Fourth Wave. Computers and Security\u00a025, 165\u2013168 (2006)","journal-title":"Computers and Security"},{"key":"1_CR9","unstructured":"von Solms, B.: Information Security \u2013 The Fifth Wave. In preparation \u2013 to be submitted to Computers and Security (2010)"},{"key":"1_CR10","unstructured":"Washington Post, Cybercrime is winning the battle over Cyberlaw (2008), \n                    \n                      http:\/\/voices.washingtonpost.com\/securityfix\/2008\/12\/report_cybercrime_is_winning_t.html\n                    \n                    \n                   (accessed June 2010)"},{"key":"1_CR11","unstructured":"Wikipedia, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Strategic_Defense_Initiative\n                    \n                    \n                  , (accessed April 2009)"}],"container-title":["IFIP Advances in Information and Communication Technology","Security and Privacy \u2013 Silver Linings in the Cloud"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15257-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T18:50:59Z","timestamp":1552848659000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15257-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642152566","9783642152573"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15257-3_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2010]]}}}