{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T03:33:08Z","timestamp":1777433588965,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642414756","type":"print"},{"value":"9783642414763","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41476-3_1","type":"book-chapter","created":{"date-parts":[[2013,9,22]],"date-time":"2013-09-22T21:30:06Z","timestamp":1379885406000},"page":"1-17","source":"Crossref","is-referenced-by-count":8,"title":["Ten National Cyber Security Strategies: A Comparison"],"prefix":"10.1007","author":[{"given":"H. A. M.","family":"Luiijf","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kim","family":"Besseling","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maartje","family":"Spoelstra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Patrick","family":"de Graaf","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Rauscher, K.F., Yashenko, V. (eds.): Critical Technology Foundations. EastWest Institute, London (2011), \n                  \n                    http:\/\/www.ewi.info\/system\/files\/reports\/Russia-U%20S%20%20bilateral%20on%20terminology%20v76%20%282%29.pdf"},{"key":"1_CR2","unstructured":"The White House, Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, Washington, DC, USA (2010), \n                  \n                    http:\/\/www.whitehouse.gov\/assets\/documents\/Cyberspace_Policy_Review_final.pdf"},{"key":"1_CR3","unstructured":"European Commission, A Digital Agenda for Europe \u2013 COM(2010) 245 final\/2, Brussels, Belgium (2010), http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:52010DC0245R(01):EN:NOT"},{"key":"1_CR4","unstructured":"Attorney General, Cyber Security Strategy, Australia (2009), \n                  \n                    http:\/\/www.ag.gov.au\/www\/agd\/agd.nsf\/Page\/CyberSecurity_CyberSecurity#h2strategy"},{"key":"1_CR5","unstructured":"Public Safety Canada, Canada\u2019s Cyber Security Strategy: For a stronger and more prosperous Canada (2010), \n                  \n                    http:\/\/www.publicsafety.gc.ca\/prg\/ns\/cybr-scrty\/_fl\/ccss-scc-eng.pdf"},{"key":"1_CR6","unstructured":"S\u00e9curit\u00e9 publique Canada, Strat\u00e9gie de cybers\u00e9curit\u00e9 du Canada: Renforcer le Canada et accro\u00eetre sa prosp\u00e9rit\u00e9, Ottawa, Canada (2010), \n                  \n                    http:\/\/www.publicsafety.gc.ca\/prg\/ns\/cybr-scrty\/_fl\/ccss-scc-fra.pdf"},{"key":"1_CR7","unstructured":"Ministry of Interior, Cyber Security Strategy of the Czech Republic for the 2011-2015 period (Strategii pro oblast kybernetick\u00e9 bezpe\u010dnosti \u010cesk\u00e9 republiky na obdob\u00ed 2011-2015), Prague, Czech Republic (2011), \n                  \n                    http:\/\/www.enisa.europa.eu\/media\/news-items\/CZ_Cyber_Security_Strategy_20112015.PDF"},{"key":"1_CR8","unstructured":"Secr\u00e9tariat g\u00e9n\u00e9ral de la d\u00e9fense et de la s\u00e9curit\u00e9 nationale, D\u00e9fense et s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information: Strat\u00e9gie de la France (2011), \n                  \n                    http:\/\/www.ssi.gouv.fr\/IMG\/pdf\/2011-02-15_Defense_et_securite_des_systemes_d_information_strategie_de_la_France.pdf"},{"key":"1_CR9","unstructured":"Secr\u00e9tariat g\u00e9n\u00e9ral de la d\u00e9fense et de la s\u00e9curit\u00e9 nationale, D\u00e9fense et S\u00e9curit\u00e9 nationale: Le Livre Blanc, Paris, France (2008), \n                  \n                    http:\/\/www.defense.gouv.fr\/portail-defense\/enjeux2\/politique-de-defense\/livre-blanc-2008"},{"key":"1_CR10","unstructured":"Bundesministerium des Innern, Cyber Sicherheitsstrategie f\u00fcr Deutschland (2011), \n                  \n                    http:\/\/www.bmi.bund.de\/SharedDocs\/Downloads\/DE\/Themen\/OED_Verwaltung\/Informationsgesellschaft\/cyber.pdf?__blob=publicationFile"},{"key":"1_CR11","unstructured":"Federal Ministry of the Interior, Cyber Security Strategy for Germany, Germany (2011), \n                  \n                    http:\/\/www.cio.bund.de\/SharedDocs\/Publikationen\/DE\/Strategische-Themen\/css_engl_download.pdf?__blob=publicationFile"},{"key":"1_CR12","unstructured":"Information Security Strategy for Protecting the Nation, Information Security Policy Council, Tokyo, Japan (2010), \n                  \n                    http:\/\/www.nisc.go.jp\/eng\/pdf\/New_Strategy_English.pdf"},{"key":"1_CR13","unstructured":"The First National Strategy on Information Security: towards the realization of a trustworthy society, Information Security Policy Council, Tokyo, Japan (2006), \n                  \n                    http:\/\/www.nisc.go.jp\/eng\/pdf\/national_strategy_001_eng.pdf"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Netherlands Ministry of Security and Justice, De Nationale Cyber Security Strategie: Slagkracht door samenwerking, The Hague, The Netherlands (2011), \n                  \n                    http:\/\/www.rijksoverheid.nl\/bestanden\/documenten-en-publicaties\/rapporten\/2011\/02\/22\/nationale-cyber-security-strategie-slagkracht-door-samenwerking\/de-nationale-cyber-security-strategie-definitief.pdf","DOI":"10.7767\/sus.2011.2011.1.189"},{"key":"1_CR15","unstructured":"Netherlands Ministry of Security and Justice, The National Cyber Security Strategy (NCSS): Success through Cooperation, The Hague, Netherlands (2011), \n                  \n                    http:\/\/www.enisa.europa.eu\/media\/news-items\/dutch-cyber-security-strategy-2011"},{"key":"1_CR16","unstructured":"Ministry of Economic Development, New Zealand\u2019s Cyber Security Strategy, New Zealand (2011), \n                  \n                    http:\/\/www.dpmc.govt.nz\/dpmc\/publications\/nzcss"},{"key":"1_CR17","unstructured":"Cabinet Office, Cyber Security Strategy of the United Kingdom: safety, security and resilience in cyber space, London, United Kingdom (2009), \n                  \n                    http:\/\/www.official-documents.gov.uk\/document\/cm76\/7642\/7642.pdf"},{"key":"1_CR18","unstructured":"HM Government, The National Security Strategy Update 2009: Security for the Next Generation, London, United Kingdom (2009), \n                  \n                    http:\/\/www.official-documents.gov.uk\/document\/cm75\/7590\/7590.pdf"},{"key":"1_CR19","unstructured":"HM Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, London, United Kingdom (2010), http:\/\/www.direct.gov.uk\/prod_consum_dg\/groups\/dg_digitalassets\/@dg\/@en\/documents\/digitalasset\/dg_191639.pdf?CID=PDF&PLA=furl&CRE=nationalsecuritystrategy"},{"key":"1_CR20","unstructured":"The National Strategy to Secure Cyberspace, The White House, USA (2003), \n                  \n                    http:\/\/www.us-cert.gov\/reading_room\/cyberspace_strategy.pdf"},{"key":"1_CR21","unstructured":"http:\/\/lafiga.firedoglake.com\/2011\/06\/03\/finally-an-intelligent-use-for-cupcakes-hacking-terrorist-sites\n                  \n                  \n                 (last visited June 30, 2013)"},{"key":"1_CR22","unstructured":"Council of Europe, Convention on Cybercrime, ETS No. 185 (2001), \n                  \n                    http:\/\/conventions.coe.int\/Treaty\/EN\/Treaties\/html\/185.htm"},{"key":"1_CR23","unstructured":"The White House, International Strategy for Cyberspace, Washington, DC, USA (2011), \n                  \n                    http:\/\/www.whitehouse.gov\/sites\/default\/files\/rss_viewer\/international_strategy_for_cyberspace.pdf"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructure Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41476-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T09:08:11Z","timestamp":1558084091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41476-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642414756","9783642414763"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41476-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}