{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:13:14Z","timestamp":1759104794711,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333316"},{"type":"electronic","value":"9783642333323"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33332-3_20","type":"book-chapter","created":{"date-parts":[[2012,9,21]],"date-time":"2012-09-21T06:43:55Z","timestamp":1348209835000},"page":"215-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward"],"prefix":"10.1007","author":[{"given":"Marthie","family":"Grobler","sequence":"first","affiliation":[]},{"given":"Joey Jansen","family":"van Vuuren","sequence":"additional","affiliation":[]},{"given":"Louise","family":"Leenen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Acts: Acts Online (2012), \n                      http:\/\/www.acts.co.za\/\n                     (accessed March 28, 2012)"},{"key":"20_CR2","volume-title":"The Description Logic Handbook: Theory, Implementation, and Applications","author":"F. Baader","year":"2003","unstructured":"Baader, F., Calvenese, D., McGuinness, D., Nardi, D., Patel-Schneider, P.: The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, Cambridge (2003)"},{"issue":"5","key":"20_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1038\/scientificamerican0501-34","volume":"284","author":"T. Berners-Lee","year":"2001","unstructured":"Berners-Lee, T., Hendler, J., Lassila, O.: The Semantic Web. Scientific American\u00a0284(5), 33\u201343 (2001)","journal-title":"Scientific American"},{"key":"20_CR4","volume-title":"Symposium on Military Data and Information Fusion","author":"A. Boury-Brisset","year":"2003","unstructured":"Boury-Brisset, A.: Ontological Approach to Military Knowledge Modeling and Management. In: Symposium on Military Data and Information Fusion, Czech Republic, Prague (2003)"},{"key":"20_CR5","unstructured":"Council of Europe: Convention on Cybercrime. CETS No.: 185 (2010), \n                      http:\/\/conventions.coe.int\/Treaty\/Commun\/ChercheSig.asp?NT=185&CM=8&DF=28\/10\/2010&CL=ENG\n                     (accessed March 28, 2012)"},{"issue":"4","key":"20_CR6","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1504\/IJICS.2009.031041","volume":"3","author":"N. Cuppens-Boulahia","year":"2009","unstructured":"Cuppens-Boulahia, N., Cuppens, F., de Vergara, L., V\u00e1zquez, E., Guerra, J., Debar, H.: An Ontology-based Approach to React to Network Attacks. International Journal of Information and Computer Security\u00a03(4), 280\u2013305 (2009)","journal-title":"International Journal of Information and Computer Security"},{"key":"20_CR7","unstructured":"Davis, G.: State Security in Charge of Cybercrime Plans (2012), \n                      http:\/\/www.iol.co.za\/dailynews\/news\/state-security-in-charge-of-cybercrime-plans-1.1238243\n                     (accessed February 21, 2012)"},{"key":"20_CR8","unstructured":"Department of Communications: National Cybersecurity Policy Framework for South Africa \u2013 Draft. Unpublished document (2011)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Ghernouti-H\u00e9lie, S.: A National Strategy for an Effective Cybersecurity Approach and Culture. In: ARES 2010 International Conference on Availability, Reliability and Security, Krakow, pp. 370\u2013373 (2010)","DOI":"10.1109\/ARES.2010.119"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Grobler, M., Bryk, H.: Common Challenges Faced During the Establishment of a CSIRT. Presented at the ISSA Conference 2010, Sandton, South Africa (2010)","DOI":"10.1109\/ISSA.2010.5588307"},{"key":"20_CR11","unstructured":"Grobler, M., Flowerday, S., Von Solms, R., Venter, H.: Cyber Awareness Initiatives in South Africa: A National Perspective. In: Proceedings of Southern African Cyber Security Awareness Workshop (SACSAW 2011), pp. 32\u201341 (2011)"},{"key":"20_CR12","unstructured":"Grobler, M., Dlamini, Z.: Global Cyber Trends a South African Reality. In: Proceedings of IST-Africa Conference (IST-Africa 2012) (2012)"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"T. Gr\u00fcber","year":"1993","unstructured":"Gr\u00fcber, T.: A translation approach to portable ontology specifications. Knowledge Acquisition\u00a05, 191\u2013220 (1993)","journal-title":"Knowledge Acquisition"},{"key":"20_CR14","unstructured":"Guy: Cyber Security Policy Will Go Before Cabinet For Approval This Year (2011), \n                      http:\/\/www.defenceweb.co.za\/index.php?option=com_content&view=article&id=13783:cyber-security-policy-will-go-before-cabinet-for-approval-this-year&catid=48:Information%20%20Communication%20Technologies&Itemid=109\n                     (accessed February 24, 2012)"},{"key":"20_CR15","unstructured":"ICT Procurement: Cyber Security Mandate Transferred (2012), \n                      http:\/\/ictprocurement.com\/security\/cyber-security-mandate-transferred.html\n                     (Accessed May 3, 2012)"},{"key":"20_CR16","unstructured":"Internetworldstats: Internet Usage Statistics for Africa (2012), \n                      http:\/\/www.internetworldstats.com\/stats1.htm\n                     (accessed February 27, 2012)"},{"key":"20_CR17","unstructured":"Jansen van Vuuren, J.C., Grobler, M.M., Zaaiman, J.: The Influence of Cyber Security Levels of South African Citizens on National Security. In: Proceedings of ICIW 2012, Seattle, USA, pp. 138\u2013147 (2012)"},{"key":"20_CR18","first-page":"3","volume-title":"Cyberpower and National Security","author":"F.D. Kramer","year":"2009","unstructured":"Kramer, F.D.: Cyberpower and National Security: Policy Recommendations for a Strategic Framework. In: Kramer, F.D., Star, S.H., Wentz, L.K. (eds.) Cyberpower and National Security, pp. 3\u201323. Centre for Technical and National Security Policy, Washington (2009)"},{"key":"20_CR19","unstructured":"Moyo, A. , Kayle, A.: DOC Calls for Collaboration, Security Innovation (2012), \n                      www.itweb.co.za\/index.php?option=Com_content&view=article&id=54874\n                     (accessed August 8, 2012)"},{"key":"20_CR20","unstructured":"Noy, N.F., McGuiness, D.L.: Ontology Development 101: A Guide to Creating Your First Ontology. Technical Report KSL-01-05. Stanford Knowledge Systems Laboratory (2001)"},{"key":"20_CR21","unstructured":"Phahlamohlaka, L.J., Jansen van Vuuren, J.C., Radebe, J.: Cyber Security Awareness Toolkit for National Security: an Approach to South Africa\u2019s Cyber Security Policy Implementation. In: Proceedings of the First IFIP TC9\/ TC11 Southern African Cyber Security Awareness Workshop 2011 (SACSAW 2011), Gaborone, Botswana, pp. 1\u201314 (2011)"},{"key":"20_CR22","unstructured":"OWL 2 Web Ontology Language (2012), \n                      http:\/\/www.w3.org\/TR\/owl-overview\n                     (accessed March 27, 2012)"},{"key":"20_CR23","unstructured":"Prot\u00e9g\u00e9 ontology editor (2012), \n                      http:\/\/protege.stanford.edu\/\n                     (accessed February 7, 2012)"},{"key":"20_CR24","unstructured":"Ritchey, T.: Wicked Problems. Structuring Social Messes with Morphological Analysis. Adapted from a lecture given at the Royal Institute of Technology in Stockholm (2004), \n                      www.swemorph.com\/downloads.html\n                     (2005)"},{"key":"20_CR25","volume-title":"Proceedings of the 14th International Command and Control Research and Technology Symposium, Buffalo","author":"B. Smith","year":"2009","unstructured":"Smith, B., Miettinen, K., Mandrivk, W.: The Ontology of Command and Control. In: Proceedings of the 14th International Command and Control Research and Technology Symposium, Buffalo, National Centre for Ontological Research, New York (2009)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Critical Infrastructures and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33332-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T05:22:33Z","timestamp":1620710553000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33332-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333316","9783642333323"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33332-3_20","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}