{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:02:49Z","timestamp":1725976969447},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662557198"},{"type":"electronic","value":"9783662557204"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-662-55720-4_20","type":"book-chapter","created":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T08:04:13Z","timestamp":1525766653000},"page":"201-207","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["IT-Sicherheit muss gelebt werden"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Kremer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,9]]},"reference":[{"key":"20_CR1","unstructured":"Bitkom Research (2017) 6 von 10 Unternehmen f\u00fchlen sich von IT-Angriffen bedroht. Studie vom 11.10.2017. \nhttps:\/\/www.bitkom-research.de\/Presse\/Pressearchiv-2017\/6-von-10-Unternehmen-fuehlen-sich-von-IT-Angriffen-bedroht\n\n. Zugegriffen am 08.12.2017"},{"key":"20_CR2","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) (2016) Ransomware. Bedrohungslage, Pr\u00e4vention & Reaktion. \nhttps:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Cyber-Sicherheit\/Themen\/Ransomware.pdf?__blob=publicationFile&v=2\n\n. Zugegriffen am 08.12.2017"},{"key":"20_CR3","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) (2017) Die Lage der IT-Sicherheit in Deutschland 2017. Frankfurt am Main. \nhttps:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Lageberichte\/Lagebericht2017.pdf;jsessionid=A12FD86D94F94A85BC545F966552E97D.2_cid360?__blob=publicationFile&v=3\n\n. Zugegriffen am 08.12.2017"},{"key":"20_CR4","unstructured":"Deutschland sicher im Netz e.V. (DsiN) (2016) DsiN-SicherheitsMonitor 2016 Mittelstand. \nhttps:\/\/www.sicher-im-netz.de\/sites\/default\/files\/download\/dsin_sicherheitsmonitor_2016_web.pdf\n\n. Zugegriffen am 08.12.2017"},{"key":"20_CR5","unstructured":"Deutschland sicher im Netz e.V. (DsiN) (2017) DsiN-Sicherheitsindex 2017. Berlin. \nhttps:\/\/www.sicher-im-netz.de\/sites\/default\/files\/download\/dsin_sicherheitsindex_2017_web_0.pdf\n\n. Zugegriffen am 08.12.2017"},{"key":"20_CR6","unstructured":"Seeholzer M (2016) Locky legt Firma lahm. Merkur Online. \nhttps:\/\/www.merkur.de\/lokales\/ebersberg\/hohenlinden-ort28823\/computervirus-verschluesselt-daten-kripospezialisten-ermitteln-6167031.html\n\n. Zugegriffen am 08.12.2017"}],"container-title":["Digitalisierung im Spannungsfeld von Politik, Wirtschaft, Wissenschaft und Recht"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-55720-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T08:07:21Z","timestamp":1525766841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-55720-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783662557198","9783662557204"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-55720-4_20","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}