{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:49:47Z","timestamp":1725716987449},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642357633"},{"type":"electronic","value":"9783642357640"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35764-0_2","type":"book-chapter","created":{"date-parts":[[2013,2,18]],"date-time":"2013-02-18T14:41:39Z","timestamp":1361198499000},"page":"17-29","source":"Crossref","is-referenced-by-count":5,"title":["Implementing Critical Information Infrastructure Protection Structures in Developing Countries"],"prefix":"10.1007","author":[{"given":"Ian","family":"Ellefsen","sequence":"first","affiliation":[]},{"given":"Sebastiaan","family":"von Solms","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Akamai Technologies, State of the Internet, vol. 1(4), Cambridge, Massachusetts (\n                    \n                      www.akamai.com\/stateoftheinternet\n                    \n                    \n                  ), 2008.","key":"2_CR1"},{"unstructured":"Akamai Technologies, State of the Internet, vol. 2(3), Cambridge, Massachusetts (\n                    \n                      www.akamai.com\/stateoftheinternet\n                    \n                    \n                  ), 2009.","key":"2_CR2"},{"unstructured":"S. Baker, S. Waterman and G. Ivanov, In the Crossfire: Critical Infrastructure in the Age of Cyber War, Technical Report, McAfee, Santa Clara, California, 2010.","key":"2_CR3"},{"key":"2_CR4","volume-title":"RFC2350: Expectations for Computer Security Incident Response","author":"N. Brownlee","year":"1998","unstructured":"N. Brownlee and E. Guttman, RFC2350: Expectations for Computer Security Incident Response, 1998."},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-16806-2_3","volume-title":"Critical Infrastructure Protection IV","author":"I. Ellefsen","year":"2010","unstructured":"I. Ellefsen and S. von Solms, Critical information infrastructure protection in the developing world, in Critical Infrastructure Protection IV, T. Moore and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 29\u201340, 2010."},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-642-15479-9_30","volume-title":"What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience","author":"I. Ellefsen","year":"2010","unstructured":"I. Ellefsen and S. von Solms, C-SAW: Critical information infrastructure protection through simplification, in What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, J. Berleur, M. Hercheui and L. Hilty (Eds.), Springer, Boston, Massachusetts, pp. 315\u2013325, 2010."},{"key":"2_CR7","volume-title":"Proceedings of the IST-Africa Conference","author":"I. Ellefsen","year":"2010","unstructured":"I. Ellefsen and S. von Solms, The community-oriented computer security, advisory and warning team, Proceedings of the IST-Africa Conference, 2010."},{"unstructured":"European Network and Information Security Agency, Baseline Capabilities for National\/Governmental CERTs, Heraklion, Crete, Greece (\n                    \n                      www.enisa.europa.eu\/act\/cert\/support\/baseline-capabilities\n                    \n                    \n                  ), 2009.","key":"2_CR8"},{"unstructured":"European Network and Information Security Agency, EISAS \u2013 European Information Sharing and Alert System for Citizens and SMEs, Heraklion, Crete, Greece (\n                    \n                      www.enisa.europa.eu\/act\/cert\/other-work\/eisas_folder\/eisas_roadmap\/at_download\/fullReport\n                    \n                    \n                  ), 2011.","key":"2_CR9"},{"unstructured":"L. Harris, CIOs drive expansion into Africa, ITWeb Brainstorm, November 11, 2011.","key":"2_CR10"},{"issue":"4","key":"2_CR11","first-page":"13","volume":"4","author":"J. Harrison","year":"2008","unstructured":"J. Harrison and K. Townsend, An update on WARPs, ENISA Quarterly Review, vol. 4(4), pp. 13\u201315, 2008.","journal-title":"ENISA Quarterly Review"},{"unstructured":"R. Heacock, Internet filtering in Sub-Saharan Africa, Technical Report, OpenNet Initiative, Harvard University, Cambridge, Massachusetts (\n                    \n                      opennet.net\/sites\/opennet.net\/files\/ONI_SSAfrica_2009.pdf\n                    \n                    \n                  ), 2009.","key":"2_CR12"},{"unstructured":"International Telecommunication Union, ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009, Geneva, Switzerland (\n                    \n                      www.itu.int\/ITU-D\/cyb\/cybersecurity\/docs\/itu-cybersecur\n                    \n                    \n                  \n                  \n                    \n                      ity-work-programme-developing-countries.pdf\n                    \n                    \n                  ), 2007.","key":"2_CR13"},{"unstructured":"G. Killcrece, Steps for Creating National CSIRTs, CERT Coordination Center, Carnegie Mellon University, Pittsburgh, Pennsylvania (\n                    \n                      www.cert.org\/archive\/pdf\/NationalCSIRTs.pdf\n                    \n                    \n                  ), 2004.","key":"2_CR14"},{"unstructured":"H. Lipson, Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, Special Report CMU\/SEI-2002-SR-009, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania (\n                    \n                      www.cert.org\/archive\/pdf\/02sr009.pdf\n                    \n                    \n                  ), 2002.","key":"2_CR15"},{"unstructured":"President\u2019s Information Technology Advisory Committee, Cyber Security: A Crisis of Prioritization, Report to the President, National Coordination Office for Information Technology Research and Development, Arlington, Virginia (\n                    \n                      www.nitrd.gov\/pitac\/reports\/20050301_cybersecurity\/cybersecurity.pdf\n                    \n                    \n                  ), 2005.","key":"2_CR16"},{"unstructured":"S. Song, African undersea cables, Many possibilities, Durbanville, South Africa (\n                    \n                      manypossibilities.net\/african-undersea-cables\n                    \n                    \n                  ), 2010.","key":"2_CR17"},{"unstructured":"United States Government Accountability Office, Technology Assessment: Cybersecurity for Critical Infrastructure Protection, GAO-04-321, Washington, DC (\n                    \n                      www.gao.gov\/new.items\/d04321.pdf\n                    \n                    \n                  ), 2004.","key":"2_CR18"},{"key":"2_CR19","volume-title":"Handbook for Computer Security Response Teams (CSIRTs), Handbook CMU\/SEI-2003-HB-002","author":"M. West-Brown","year":"2003","unstructured":"M. West-Brown, D. Stikvoort, K. Kossakowski, G. Killcrece, R. Ruefle and M. Zajicek, Handbook for Computer Security Response Teams (CSIRTs), Handbook CMU\/SEI-2003-HB-002, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania (\n                    \n                      www.cert.org\/archive\/pdf\/csirt-handbook.pdf\n                    \n                    \n                  ), 2003."}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35764-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T04:25:00Z","timestamp":1557548700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35764-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642357633","9783642357640"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35764-0_2","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}