F. Baader, D. Calvenese, D. Mcguinness, D. Nardi, and P. Patel-schneider, The Description Logic Handbook: Theory, Implementation, and Applications, 2003.
DOI : 10.1017/CBO9780511711787

T. Berners-lee, J. Hendler, and O. Lassila, The Semantic Web, Scientific American, vol.284, issue.5, pp.33-43, 2001.
DOI : 10.1038/scientificamerican0501-34

A. Boury-brisset, Ontological Approach to Military Knowledge Modeling and Management . Symposium on Military Data and Information Fusion, 2003.

E. Council, Convention on Cybercrime. CETS No.: 185 Available from: http://conventions.coe.int/Treaty, 2010.

N. Cuppens-boulahia, F. Cuppens, L. De-vergara, E. Vázquez, and J. Guerra, An ontology-based approach to react to network attacks, 2008 Third International Conference on Risks and Security of Internet and Systems, pp.280-305, 2009.
DOI : 10.1109/CRISIS.2008.4757461

G. Davis, State Security in Charge of Cybercrime Plans Available from: http://www.iol.co.za/dailynews/news/state-security-in-charge-of-cybercrime-plans- 1, p.1238243, 2012.

S. Ghernouti-hélie, A National Strategy for an Effective Cybersecurity Approach and Culture, 2010 International Conference on Availability, Reliability and Security, pp.370-373, 2010.
DOI : 10.1109/ARES.2010.119

M. Grobler and H. Bryk, Common Challenges Faced During the Establishment of a CSIRT. Presented at the ISSA conference 2010, 2010.

M. Grobler, S. Flowerday, V. Solms, R. Venter, and H. , Cyber Awareness Initiatives in South Africa: A National Perspective, Proceedings of Southern African Cyber Security Awareness Workshop (SACSAW) 2011, pp.32-41, 2011.

M. Grobler and Z. Dlamini, Global Cyber Trends a South African Reality. Article to be presented at IST-Africa, Tanzania, 2012.

T. Grüber, A translation approach to portable ontology specifications, Knowledge Acquisition, vol.5, issue.2, pp.191-220, 1993.
DOI : 10.1006/knac.1993.1008

. Guy, Cyber Security Policy Will Go Before Cabinet For Approval This Year. Available from: http://www.defenceweb.co.za/index.php?option=com_content&view=article&id=13783:cy ber-security-policy-will-go-before-cabinet-for-approval-this- year&catid=48, pp.20-20, 2011.

. Internetworldstats, Internet Usage Statistics for Africa Available from, 2012.

J. C. Jansen-van-vuuren, M. M. Grobler, and J. Zaaiman, The Influence of Cyber Security Levels of South African Citizens on National Security, Proceedings of ICIW 2012, pp.138-147, 2012.

F. D. Kramer, Cyberpower and National Security: Policy Recommendations for a Strategic Framework, Cyberpower and National Security, pp.3-23, 2009.

R. Muller, State of South Africa's Internet. MyBroadband.co.za Available from: http://mybroadband.co.za/news/broadband/17987-state-of-south-africa-s-Internet.html, [Accessed, 2011.

N. F. Noy and D. L. Mcguiness, Ontology Development 101: A Guide to Creating Your First Ontology, 2001.

L. J. Phahlamohlaka, J. C. Jansen-van-vuuren, and J. Radebe, Cyber Security Awareness Toolkit for National Security: an Approach to South Africa's Cyber Security Policy Implementation, Proceedings of the First IFIP TC9/ TC11 Southern African Cyber Security Awareness Workshop, pp.1-14, 2011.

. Protégé-ontology-editor, Available from: http://protege, 2012.

T. Ritchey, Wicked Problems Structuring Social Messes with Morphological Analysis Adapted from a lecture given at the Royal Institute of Technology in Stockholm, 2004.

B. Smith, K. Miettinen, and W. Mandrivk, The Ontology of Command and Control, Proceedings of the 14th International Command and Control Research and Technology Symposium, 2009.