{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:13:58Z","timestamp":1725578038631},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642192272"},{"type":"electronic","value":"9783642192289"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19228-9_1","type":"book-chapter","created":{"date-parts":[[2011,2,10]],"date-time":"2011-02-10T05:59:53Z","timestamp":1297317593000},"page":"1-8","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Securing the Internet: Fact or Fiction?"],"prefix":"10.1007","author":[{"given":"Basie","family":"von Solms","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"ITNow (January 2010), http:\/\/www.bcs.org"},{"key":"1_CR2","unstructured":"Sophos, The Sophos Security Threat Report (2009), http:\/\/www.sophos.com\/sophos\/docs\/eng\/marketing_material\/sophos-security-threat-report-jan-2009-na.pdf"},{"key":"1_CR3","unstructured":"CISCO, A Comprehensive Proactive Approach to Web based Threats, CISCO IronPort Web Reputation White Paper (2009), http:\/\/www.ironport.com\/pdf\/ironport_web_reputation_whitepaper.pdf"},{"key":"1_CR4","unstructured":"UK Cybercrime, The UK Cybercrime Report (2009), http:\/\/www.garlik.com\/press.php?id=613-GRLK_PRD"},{"key":"1_CR5","unstructured":"CISCO Annual Security Report (2009), http:\/\/www.cisco.com\/en\/US\/prod\/collateral\/vpndevc\/cisco_2009_asr.pdf"},{"key":"1_CR6","unstructured":"T3.com (September 2009), http:\/\/www.T3.com"},{"key":"1_CR7","unstructured":"Washington Post, Cybercrime is winning the battle over Cyberlaw (2008), http:\/\/voices.washingtonpost.com\/securityfix\/2008\/12\/report_cybercrime_is_winning_t.html (accessed February 15, 2010)"}],"container-title":["Lecture Notes in Computer Science","Open Research Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19228-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T12:05:05Z","timestamp":1584360305000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19228-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642192272","9783642192289"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19228-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}