{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:03:09Z","timestamp":1725976989741},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662557198"},{"type":"electronic","value":"9783662557204"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-662-55720-4_48","type":"book-chapter","created":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T08:04:13Z","timestamp":1525766653000},"page":"529-541","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Von Asymmetrien und Unsicherheiten im Cyber-Raum \u2013 Cyber-Sicherheit als gesamtstaatliche Aufgabe"],"prefix":"10.1007","author":[{"given":"Philipp","family":"von Saldern","sequence":"first","affiliation":[]},{"given":"Lukas W.","family":"Sch\u00e4fer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,9]]},"reference":[{"key":"48_CR1","unstructured":"Aust S, Kade C, Schuster J (2017) Wir wehren 4500 Cyberangriffe am Tag ab. welt.de. https:\/\/www.welt.de\/politik\/deutschland\/article163733870\/Wir-wehren-4500-Cyberangriffe-am-Tag-ab.html. Zugegriffen am 04.09.2017"},{"key":"48_CR2","unstructured":"Bendiek A (2016) Sorgfaltsverantwortung im Cyberraum \u2013 Leitlinien f\u00fcr eine deutsche Cyber-Au\u00dfen- und Sicherheitspolitik. Stiftung Wissenschaft und Politik. https:\/\/www.swp-berlin.org\/publikation\/sorgfaltsverantwortung-im-cyberraum\/. Zugegriffen am 04.09.2017"},{"key":"48_CR4","unstructured":"Bitkom (2017) Wirtschaftsschutz in der digitalen Welt. https:\/\/www.google.de\/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ved=0ahUKEwiGuYDXlPXWAhXFKlAKHd1sCDoQFggsMAE&url=https%3A%2F%2Fwww.bitkom.org%2FPresse%2FAnhaenge-an-PIs%2F2017%2F07-Juli%2FBitkom-Charts-Wirtschaftsschutz-in-der-digitalen-Welt-21-07-2017.pdf&usg=AOvVaw1RUEknqlI2yNNbCmh_7n24. Zugegriffen am 16.10.2017"},{"key":"48_CR5","unstructured":"Borchert H, Juhl F (2011) Securing cyberspace: building blocks for a public-private cooperation agenda. In: Schr\u00f6fl J, Rajaee BM, Muhr D (Hrsg) Hybrid and cyber war as consequences of the asymmetry \u2013 a comprehensive approach answering hybrid actors and activites in cyberspace, 1.\u00a0Aufl. Peter Lang, Frankfurt am Main\/New York, S\u00a0155\u2013174"},{"key":"48_CR6","volume-title":"Sicherheitspolitik in neuen Dimensionen. Kompendium zum erweiterten Sicherheitsbegriff","author":"Bundesakademie f\u00fcr Sicherheitspolitik","year":"2001","unstructured":"Bundesakademie f\u00fcr Sicherheitspolitik (2001) Sicherheitspolitik in neuen Dimensionen. Kompendium zum erweiterten Sicherheitsbegriff. E. S. Mittler und Sohn Verlag, Hamburg"},{"key":"48_CR7","unstructured":"Bundesministerium des Innern (2011) Cyber-Sicherheitsstrategie f\u00fcr Deutschland. https:\/\/www.google.de\/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0ahUKEwjjjaXOlfXWAhXDKsAKHdH6AfsQFgg4MAQ&url=http%3A%2F%2Fwww.it-planungsrat.de%2FSharedDocs%2FDownloads%2FDE%2FPressemitteilung%2FCyber%2520Sicherheitsstrategie%25202011.pdf%3F__blob%3DpublicationFile&usg=AOvVaw1kA_1RUX2zi_hVtgLTvCVt. Zugegriffen am 16.10.2017"},{"key":"48_CR8","unstructured":"Cavelty MD (2010) Cyber-Security. In: Burgess JP (Hrsg) The routledge handbook of new security studies, 1.\u00a0Aufl. Routledge, London\/New York, S\u00a0154\u2013162"},{"key":"48_CR9","unstructured":"Dickow M, Bashir N (2016) Sicherheit im Cyberspace. Bundeszentrale f\u00fcr Politische Bildung. http:\/\/www.bpb.de\/apuz\/235533\/sicherheit-im-cyberspace?p=all. Zugegriffen am 04.09.2017"},{"key":"48_CR10","unstructured":"Djeffal C (2017) Deutschland braucht nicht ein Digitalministerium, sondern viele! S\u00fcddeutsche Zeitung. http:\/\/www.sueddeutsche.de\/digital\/digitalisierung-deutschland-braucht-nicht-ein-digitalministerium-sondern-viele-1.3669617. Zugegriffen am 17.10.2017"},{"key":"48_CR11","unstructured":"dpa (2016) Cyber-Angriffe auf Regierungsnetz \u201eviel erfolgreicher\u201c als fr\u00fcher. http:\/\/www.bild.de\/politik\/aktuelles\/politik-inland\/cyberangriffe-auf-regierungsnetz-viel-erfolgreicher-47680604.bild.html. Zugegriffen am 04.09.2017"},{"key":"48_CR12","unstructured":"Europol (2013) EU Serious and Organised Crime Threat Assessment (SOCTA 2013). https:\/\/www.europol.europa.eu\/activities-services\/main-reports\/eu-serious-and-organised-crime-threat-assessment-socta-2013. Zugegriffen am 04.09.2017"},{"key":"48_CR13","unstructured":"Kaldor M (1999) New and old wars: organized violence in a global era, 1. Aufl. Stanford University Press, Cambridge"},{"key":"48_CR14","unstructured":"Klimburg A (2012) Gesamtstaatliche Ans\u00e4tze zur Cybersicherheit. Erfahrungen aus \u00d6sterreich. Strat Sicherh 1:463\u2013472"},{"key":"48_CR15","unstructured":"Lewis JA, Neuneck G (2013) The cyber index \u2013 international security trends and realities. United Nations Institute for Disarmament Research. www.unidir.org\/files\/publications\/pdfs\/cyber-index-2013-en-463.pdf. Zugegriffen am 16.10.2017"},{"key":"48_CR16","unstructured":"Malisevic N (2011) Options for tackling current and future cyber threats. In: Schr\u00f6fl J, Rajaee BM, Muhr D (Hrsg) Hybrid and cyber war as consequences of the asymmetry \u2013 a comprehensive approach answering hybrid actors and activites in cyberspace, 1.\u00a0Aufl. Peter Lang, Frankfurt am Main\/New York, S\u00a0187\u2013200"},{"key":"48_CR17","unstructured":"Muhr D, Riemer A (2011) Take off your sunglasses: hybridity and cyber warfare \u2013 driving moments for asymmetric warfare. In: Schr\u00f6fl J, Rajaee BM, Muhr D (Hrsg) Hybrid and cyber war as consequences of the asymmetry \u2013 a comprehensive approach answering hybrid actors and activites in cyberspace, 1.\u00a0Aufl. Peter Lang, Frankfurt am Main\/New York, S\u00a057\u201390"},{"key":"48_CR18","unstructured":"M\u00fchleck KH (2017) Cyber als Antrieb struktureller Ver\u00e4nderungen in der Bundeswehr. Wehrtechnischer Report 1:6\u201313"},{"key":"48_CR19","unstructured":"M\u00fcnkler H (2002) Die neuen Kriege, 1.\u00a0Aufl. Rowohlt, Hamburg"},{"key":"48_CR20","unstructured":"M\u00fcnkler H (2004) Die neuen Kriege. Der B\u00fcrger im Staat 4:179\u2013184"},{"key":"48_CR21","unstructured":"United Nations (2016) Outcome document of the high-level meeting of the General Assembly on the overall review of the implementation of the outcomes of the World Summit on the Information Society. https:\/\/www.google.de\/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0ahUKEwjPzPPQmvXWAhXJPFAKHQtSBkQQFggvMAE&url=http%3A%2F%2Functad.org%2Fen%2FPublicationsLibrary%2Fares70d125_en.pdf&usg=AOvVaw10z48jdQ8d3jdanUn4Q2Wi. Zugegriffen am 16.10.2017"},{"key":"48_CR22","unstructured":"Schreiber W (2016) Der neue unsichtbare Krieg? Zum Begriff der \u201ehybriden\u201c Kriegf\u00fchrung. Bundeszentrale f\u00fcr politische Bildung. http:\/\/www.bpb.de\/apuz\/232962\/der-neue-unsichtbare-krieg?p=2. Zugegriffen am 04.09.2017"},{"key":"48_CR23","unstructured":"Schulze M (2017) Verschl\u00fcsselung in Gefahr \u2013 Weltweit schw\u00e4chen Staaten die Cyber-Sicherheit \u2013 Deutschland sollte dagegenhalten. Stiftung Wissenschaft und Politik. https:\/\/www.swp-berlin.org\/publikation\/verschluesselung-in-gefahr\/. Zugegriffen am 04.09.2017"}],"container-title":["Digitalisierung im Spannungsfeld von Politik, Wirtschaft, Wissenschaft und Recht"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-55720-4_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T08:16:26Z","timestamp":1525767386000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-55720-4_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783662557198","9783662557204"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-55720-4_48","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}