{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:05:42Z","timestamp":1725674742480},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642290923"},{"type":"electronic","value":"9783642290930"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29093-0_11","type":"book-chapter","created":{"date-parts":[[2012,4,9]],"date-time":"2012-04-09T10:40:40Z","timestamp":1333968040000},"page":"116-124","source":"Crossref","is-referenced-by-count":2,"title":["Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa \u2013 Has the CIIP and Cyber Security Rubicon Been Crossed?"],"prefix":"10.1007","author":[{"given":"Basie","family":"von Solms","sequence":"first","affiliation":[]},{"given":"Elmarie","family":"Kritzinger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Carr, J.: Inside Cyber Warfare. O\u2019Reilly (2009)"},{"key":"11_CR2","unstructured":"http:\/\/www.foreignpolicy.com\/articles\/2010\/03\/24\/africas_cyber_wmd"},{"key":"11_CR3","unstructured":"http:\/\/blogs.technet.com\/b\/microsoft_on_the_issues_africa\/archive\/2010\/07\/01\/laying-the-foundation-for-cybersecurity-in-africa.aspx"},{"key":"11_CR4","unstructured":"Ellefsen, D., von Solms, S.H.: A Community-Oriented Approach to CIIP in Developing Countries, CIP Report, Center for Infrastructure Protection and Homeland Security, vol. 9(12). George Mason University, USA (2011)"},{"key":"11_CR5","unstructured":"http:\/\/ictdegov.org\/e-gov\/WA-epart.html"},{"key":"11_CR6","unstructured":"Akuta, E.A.M., Ong\u2019oa, I.M., Jones, C.R.: Combating cyber crime in Sub-Sahara Africa; A Discourse on Law, Policy and Pricatice. Journal of Peace, Gender and Development Studies\u00a01(4), 129\u2013137"},{"key":"11_CR7","unstructured":"http:\/\/news.bbc.co.uk\/2\/hi\/business\/8194241.stm"},{"key":"11_CR8","unstructured":"http:\/\/allafrica.com\/stories\/201102150340.html"},{"key":"11_CR9","unstructured":"http:\/\/www.mikekujawski.ca\/2009\/03\/16\/latest-mobile-phone-statistics-from-africa-and-what-this-means\/"},{"key":"11_CR10","unstructured":"http:\/\/internationaldigitalmarketing.com\/2010\/10\/29\/mobile-marketing-trends-smartphones-conquering-africa\/"},{"key":"11_CR11","unstructured":"www.cisco.com\/en\/US\/annual_security_report.html"},{"key":"11_CR12","unstructured":"Kritzinger, E., von Solms, S.H.: A New Role for Information Service Providers (ISPs) as Part of Critical Information Infrastructure Protection in Africa, CIP Report, Center for Infrastructure Protection and Homeland Security, USA, vol. 9(12) (2011)"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.cose.2010.08.001","volume":"29","author":"E. Kritzinger","year":"2010","unstructured":"Kritzinger, E., von Solms, S.H.: Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security\u00a029, 840\u2013847 (2010)","journal-title":"Computers & Security"},{"key":"11_CR14","unstructured":"http:\/\/www.enisa.europa.eu\/about-enisa"},{"key":"11_CR15","unstructured":"http:\/\/www.enisa.europa.eu\/"},{"key":"11_CR16","unstructured":"http:\/\/www.itu.int\/ITU-D\/cyb\/events\/2009\/tunis\/index.htm"},{"key":"11_CR17","unstructured":"http:\/\/www.first.org\/members"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29093-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T02:59:44Z","timestamp":1556679584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29093-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642290923","9783642290930"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29093-0_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}