{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T17:08:44Z","timestamp":1725988124965},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319988269"},{"type":"electronic","value":"9783319988276"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98827-6_3","type":"book-chapter","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T11:48:21Z","timestamp":1534765701000},"page":"29-46","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The State of e-Government Security in South Africa: Analysing the National Information Security Policy"],"prefix":"10.1007","author":[{"given":"Bukelwa","family":"Ngoqo","sequence":"first","affiliation":[]},{"given":"Kennedy","family":"Njenga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,21]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50, 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Alotaibi, M., Furnell, S., Clarke, N.: Information security policies: a review of challenges and influencing factors. In: Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITS-2016), 5\u20137 December 2016, Barcelona, Spain (2016). ISBN 978-1-908320-73-5","DOI":"10.1109\/ICITST.2016.7856729"},{"key":"3_CR3","unstructured":"Auditor-General South Africa: The Drivers of Internal Control: Information Technology Management as a Driver of Audit Outcomes. Consolidated General report on the 2011\u201312 national and provincial audit outcomes (2012). \nhttps:\/\/www.agsa.co.za\/Portals\/0\/MFMA2011-12Extracts\/MFMA_2011-12_consolidated_reports\/AGSA_MFMA_CONSOLIDATED_REPORT_2011_12.pdf\n\n. Accessed 12 July 2016"},{"key":"3_CR4","first-page":"128","volume":"12","author":"F Cloete","year":"2012","unstructured":"Cloete, F.: E-government lessons from South Africa 2001\u20132011: institutions, state of progress and measurement. Afr. J. Inf. Commun. 12, 128\u2013142 (2012)","journal-title":"Afr. J. Inf. Commun."},{"key":"3_CR5","unstructured":"Crous, M.: Service delivery in the South African public service: implementation of the Batho Pele principles by statistics South Africa. J. Publ. Adm. 39(4.1) (2004)"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1108\/ICS-12-2015-0048","volume":"24","author":"A Veiga Da","year":"2016","unstructured":"Da Veiga, A.: Comparing the information security culture of employees who had read the information security policy and those who had not Illustrated through an empirical study. Inf. Comput. Secur. 24(2), 139\u2013151 (2016)","journal-title":"Inf. Comput. Secur."},{"key":"3_CR7","unstructured":"Etsebeth, V.: Information security policies - the legal risk of uninformed personnel. In: Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5\u20137 July 2006, Sandton, South Africa (2006). ISBN 1-86854-636-5"},{"issue":"9","key":"3_CR8","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1177\/1049732305276687","volume":"15","author":"H Hsieh","year":"2005","unstructured":"Hsieh, H., Shannon, S.E.: Three approaches to qualitative content analysis. Qual. Health Res. 15(9), 1277\u20131288 (2005)","journal-title":"Qual. Health Res."},{"key":"3_CR9","first-page":"29","volume":"52","author":"N Kortjan","year":"2014","unstructured":"Kortjan, N., Von Solms, R.: A conceptual framework for cyber-security awareness and education in SA. South Afr. Comput. J. (SACJ) 52, 29\u201341 (2014)","journal-title":"South Afr. Comput. J. (SACJ)"},{"key":"3_CR10","volume-title":"Fundamentals of Network Security","author":"E Maiwald","year":"2004","unstructured":"Maiwald, E.: Fundamentals of Network Security. McGraw-Hill Education, New York (2004)"},{"key":"3_CR11","first-page":"166","volume":"5","author":"JE Mbowe","year":"2014","unstructured":"Mbowe, J.E., Zlotnikova, I., Msanjila, S.S., Oreku, G.S.: A conceptual framework for threat assessment based on organization\u2019s information security policy. J. Inf. Secur. 5, 166\u2013177 (2014)","journal-title":"J. Inf. Secur."},{"issue":"1","key":"3_CR12","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1108\/02640471011023360","volume":"28","author":"SM Mutula","year":"2010","unstructured":"Mutula, S.M., Mostert, J.: Challenges and opportunities of E-Government in South Africa. Electron. Libr. 28(1), 38\u201353 (2010)","journal-title":"Electron. Libr."},{"key":"3_CR13","unstructured":"Ngobeni, S.J., Grobler, M.M.: Information security policies for governmental organisations: the minimum criteria. In: Proceedings of ISSA, 6\u20138 July 2009, Johannesburg, South Africa, pp. 455\u2013466 (2009)"},{"issue":"1","key":"3_CR14","first-page":"451","volume":"16","author":"MN Njotini","year":"2013","unstructured":"Njotini, M.N.: Protecting critical databases: towards risk based assessment of Critical Information Infrastructures (CIIS) in South Africa. Potchefstroomse Elektroniese Regsblad (PER) 16(1), 451\u2013481 (2013)","journal-title":"Potchefstroomse Elektroniese Regsblad (PER)"},{"key":"3_CR15","volume-title":"Advances in Content Analysis","author":"KE Rosengren","year":"1981","unstructured":"Rosengren, K.E.: Advances in Content Analysis. Sage Publications, Beverly Hills (1981)"},{"key":"3_CR16","unstructured":"Shava, F.B., Van Greunen, D.: Designing user security metrics for security awareness at higher and tertiary institutions. In: Proceedings of the 8th International Development Informatics Association Conference, 3\u20134 November 2014, Port Elizabeth, South Africa, pp. 280\u2013296 (2014)"},{"key":"3_CR17","unstructured":"South Africa. Department of Communications: National Integrated ICT Policy. Government Gazette, No. 37261, 24 January 2014"},{"key":"3_CR18","unstructured":"South Africa. Department of Public Service and Administration: Draft position Paper on Information Security. Version 0.3 (2015)"},{"key":"3_CR19","unstructured":"Tuyikeze, T., Pottas, D.: An information security policy development life cycle. In: Proceedings of the South African Information Security Multi-Conference (SAISMC), Port Elizabeth, South Africa, pp. 165\u2013176, 17\u201318 May 2010. ISBN 978-1-84102-256-7"},{"key":"3_CR20","volume-title":"Principles of Information Security","author":"ME Whitman","year":"2003","unstructured":"Whitman, M.E., Mattord, H.J.: Principles of Information Security. Course Technology, Boston (2003)"},{"key":"3_CR21","unstructured":"World Bank: New-Economy Sector Study: Electronic Government and Governance: Lessons for Argentina (2002). \nhttp:\/\/documents.worldbank.org\/curated\/en\/527061468769894044\/pdf\/266390WP0E1Gov1gentina1Final1Report.pdf\n\n. Accessed 17 Feb 2017"},{"issue":"4","key":"3_CR22","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1108\/09593841211278794","volume":"25","author":"F Zhao","year":"2012","unstructured":"Zhao, F., Scavarda, A.J., Waxin, M.: Key issues and challenges in e-Government development: an integrative case study of the number one eCity in the Arab world. Inf. Technol. People 25(4), 395\u2013422 (2012)","journal-title":"Inf. Technol. People"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98827-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T11:50:50Z","timestamp":1534765850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98827-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319988269","9783319988276"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98827-6_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}