{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T16:30:00Z","timestamp":1776789000974,"version":"3.51.2"},"reference-count":29,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Organizational Computing and Electronic Commerce"],"published-print":{"date-parts":[[2018,7,3]]},"DOI":"10.1080\/10919392.2018.1484598","type":"journal-article","created":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T17:03:23Z","timestamp":1531501403000},"page":"269-282","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":111,"title":["Exploring SME cybersecurity practices in developing countries"],"prefix":"10.1080","volume":"28","author":[{"given":"Salah","family":"Kabanda","sequence":"first","affiliation":[{"name":"Department of Information Systems, University of Cape Town, Cape Town, South Africa"}]},{"given":"Maureen","family":"Tanner","sequence":"additional","affiliation":[{"name":"Department of Information Systems, University of Cape Town, Cape Town, South Africa"}]},{"given":"Cameron","family":"Kent","sequence":"additional","affiliation":[{"name":"Department of Information Systems, University of Cape Town, Cape Town, South Africa"}]}],"member":"301","published-online":{"date-parts":[[2018,7,13]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.523"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.26634\/jfet.1.1.968"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1002\/j.1681-4835.2014.tb00439.x"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.443"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.08.001"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2528608"},{"key":"CIT0007","first-page":"340","volume":"8","author":"AlSlamy N. M. A.","year":"2008","journal-title":"International Journal of Computer Science and Network"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00095.x"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1177\/1541931214581064"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1177\/1541931215591185"},{"key":"CIT0015","first-page":"339","author":"Craig R.","year":"2016","journal-title":"In AStakeholder Approach to Corporate Social Responsibility"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvman.2016.09.025"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.2307\/2095101"},{"key":"CIT0019","volume":"1","author":"Dlamini Z.","year":"2013","journal-title":"Information Wharf Security Researcher Teachers Studies"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.28945\/3576"},{"key":"CIT0025","volume-title":"Automated nids signature creation using honeypots","author":"Kreibich C.","year":"2003"},{"key":"CIT0027","first-page":"130","author":"Lee W.","year":"2001","journal-title":"Security and Privacy"},{"key":"CIT0028","first-page":"1","author":"Leung S.","year":"2012","journal-title":"CISSP CISA CBCP"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.09.009"},{"issue":"8","key":"CIT0030","first-page":"5446","volume":"11","author":"Mirza M.","year":"2016","journal-title":"International Journal of Applied Engineering Research"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1145\/2076450"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.11.009"},{"issue":"6","key":"CIT0037","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1002\/smj.831","volume":"31","author":"Souitaris V.","year":"2010","journal-title":"Strategic Management Journal"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.04.011"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.12.007"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2010.04.001"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.4135\/9781446218556.n6"}],"container-title":["Journal of Organizational Computing and Electronic Commerce"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10919392.2018.1484598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T06:23:03Z","timestamp":1720419783000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10919392.2018.1484598"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,3]]},"references-count":29,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,7,13]]},"published-print":{"date-parts":[[2018,7,3]]}},"alternative-id":["10.1080\/10919392.2018.1484598"],"URL":"https:\/\/doi.org\/10.1080\/10919392.2018.1484598","relation":{},"ISSN":["1091-9392","1532-7744"],"issn-type":[{"value":"1091-9392","type":"print"},{"value":"1532-7744","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hoce20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hoce20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}