{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:25:53Z","timestamp":1742912753700,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":39,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811934544"},{"type":"electronic","value":"9789811934551"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-3455-1_2","type":"book-chapter","created":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T12:04:02Z","timestamp":1655294642000},"page":"13-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Empirical Study on the State of Practice of Information Security Management in Local Government"],"prefix":"10.1007","author":[{"given":"Frank","family":"Moses","sequence":"first","affiliation":[]},{"given":"Kurt","family":"Sandkuhl","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Kemmerich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,16]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Solms, R. von, van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97\u2013102 (2013)","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.giq.2008.05.004","volume":"26","author":"N Helbig","year":"2009","unstructured":"Helbig, N., Gil-Garcia, J.R., Ferro, E.: Understanding the complexity of electronic government: implications from the digital divide literature. Gov. Inf. Q. 26, 89\u201397 (2009)","journal-title":"Gov. Inf. Q."},{"key":"2_CR3","unstructured":"Calder, A.: EU GDPR: A Pocket Guide. IT Governance Ltd (2018)"},{"key":"2_CR4","unstructured":"EgovG: Gesetz zur F\u00f6rderung der elektronischen Verwaltung. https:\/\/www.gesetze-im-internet.de\/egovg\/BJNR274910013.html"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s10796-019-09977-z","volume":"23","author":"E Kweon","year":"2021","unstructured":"Kweon, E., Lee, H., Chai, S., Yoo, K.: The utility of information security training and education on cybersecurity incidents: an empirical evidence. Inf. Syst. Front. 23, 361\u2013373 (2021)","journal-title":"Inf. Syst. Front."},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Watson, R.T., Webster, J.: Analysing the past to prepare for the future: writing a literature review a roadmap for release 2.0. J. Decis. Syst. 29, 129\u2013147 (2020). https:\/\/doi.org\/10.1080\/12460125.2020.1798591","DOI":"10.1080\/12460125.2020.1798591"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"30","DOI":"10.14512\/tatup.29.1.30","volume":"29","author":"A Weber","year":"2020","unstructured":"Weber, A., Heiser, G., Kuhlmann, D., Schallbruch, M., Chattopadhyay, A., Guilley, S., Kasper, M., Krau\u00df, C., Kr\u00fcger, P.S., Reith, S., et al.: Sichere IT ohne Schwachstellen und Hintert\u00fcren. TATuP - Zeitschrift f\u00fcr Technikfolgenabsch\u00e4tzung in Theorie und Praxis 29, 30\u201336 (2020). https:\/\/doi.org\/10.14512\/tatup.29.1.30","journal-title":"TATuP - Zeitschrift f\u00fcr Technikfolgenabsch\u00e4tzung in Theorie und Praxis"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"11","DOI":"10.14512\/tatup.29.1.11","volume":"29","author":"K Weber","year":"2020","unstructured":"Weber, K., Christen, M., Herrmann, D.: Bedrohung, Verwundbarkeit, Werte und Schaden: Cyberattacken und Cybersicherheit als Thema der Technikfolgenabsch\u00e4tzung. TATuP - Zeitschrift f\u00fcr Technikfolgenabsch\u00e4tzung in Theorie und Praxis 29, 11\u201315 (2020). https:\/\/doi.org\/10.14512\/tatup.29.1.11","journal-title":"TATuP - Zeitschrift f\u00fcr Technikfolgenabsch\u00e4tzung in Theorie und Praxis"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Aman, W., Shukaili, J.A.: A classification of essential factors for the development and implementation of cyber security strategy in public sector organizations. Int. J. Adv. Comput. Sci. Appl 12 (2021). https:\/\/doi.org\/10.14569\/IJACSA.2021.0120820","DOI":"10.14569\/IJACSA.2021.0120820"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Ahmad, S.U., Kashyap, S., Shetty, S.D., Sood, N.: Cybersecurity during COVID-19. In: Joshi, A., Mahmud, M., Ragel, R.G., Thakur, N.V. (eds.) Information and Communication Technology for Competitive Strategies (ICTCS 2020), vol. 191, pp. 1045\u20131056. Springer Singapore, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-0739-4_96","DOI":"10.1007\/978-981-16-0739-4_96"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Alagarsamy, S., Selvaraj, K., Govindaraj, V., Kumar, A.A., HariShankar, S., Narasimman, G.L.: Automated Data analytics approach for examining the background economy of Cybercrime. In: 2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA), pp. 332\u2013336. IEEE, Coimbatore, India (2021). https:\/\/doi.org\/10.1109\/ICIRCA51532.2021.9544845","DOI":"10.1109\/ICIRCA51532.2021.9544845"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TETC.2019.2915098","volume":"9","author":"JP Kesan","year":"2021","unstructured":"Kesan, J.P., Zhang, L.: An empirical investigation of the relationship between local government budgets, IT expenditures, and cyber losses. IEEE Trans. Emerg. Top. Comput. 9, 582\u2013596 (2021). https:\/\/doi.org\/10.1109\/TETC.2019.2915098","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Bouzoubaa, K., Taher, Y., Nsiri, B.: Predicting DOS-DDOS attacks: review and evaluation study of feature selection methods based on wrapper process. Int. J. Adv. Comput. Sci. Appl. 12 (2021). https:\/\/doi.org\/10.14569\/IJACSA.2021.0120517","DOI":"10.14569\/IJACSA.2021.0120517"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"16","DOI":"10.37544\/2191-0073-2020-03-16","volume":"10","author":"N M\u00fcller","year":"2020","unstructured":"M\u00fcller, N.: Es muss nicht kompliziert sein. Technische Sicherheit 10, 16\u201318 (2020). https:\/\/doi.org\/10.37544\/2191-0073-2020-03-16","journal-title":"Technische Sicherheit"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Alhashim, S.S., Rahman, M.M.H.: Cybersecurity threats in line with awareness in Saudi Arabia. In: 2021 International Conference on Information Technology (ICIT), pp. 314\u2013319. IEEE, Amman, Jordan (2021). https:\/\/doi.org\/10.1109\/ICIT52682.2021.9491711","DOI":"10.1109\/ICIT52682.2021.9491711"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Andreasson, A., Artman, H., Brynielsson, J., Franke, U.: A census of Swedish public sector employee communication on cybersecurity during the COVID-19 pandemic. In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1\u20138. IEEE, Dublin, Ireland (2021). https:\/\/doi.org\/10.1109\/CyberSA52016.2021.9478241","DOI":"10.1109\/CyberSA52016.2021.9478241"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1080\/01900692.2016.1242614","volume":"40","author":"BW Wirtz","year":"2017","unstructured":"Wirtz, B.W., Weyerer, J.C.: Cyberterrorism and cyber attacks in the public sector: how public administration copes with digital threats. Int. J. Public Adm. 40, 1085\u20131100 (2017). https:\/\/doi.org\/10.1080\/01900692.2016.1242614","journal-title":"Int. J. Public Adm."},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s11416-017-0305-7","volume":"13","author":"S-K Park","year":"2017","unstructured":"Park, S.-K., Lee, S.-H., Kim, T.-Y., Jun, H.-J., Kim, T.-S.: A performance evaluation of information security training in public sector. J. Comput. Virol. Hacking Tech. 13, 289\u2013296 (2017). https:\/\/doi.org\/10.1007\/s11416-017-0305-7","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"2_CR19","doi-asserted-by":"publisher","unstructured":"Alharbe, M.A.: Measuring the influence of methods to raise the E-awareness of cybersecurity for medina region employees. In: Saeed, F., Al-Hadhrami, T., Mohammed, F., Mohammed, E. (eds.) Advances on Smart and Soft Computing, vol. 1188, pp. 403\u2013410. Springer Singapore, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-6048-4_35","DOI":"10.1007\/978-981-15-6048-4_35"},{"key":"2_CR20","doi-asserted-by":"publisher","unstructured":"Coppolino, L., D\u2019Antonio, S., Mazzeo, G., Romano, L., Sgaglione, L.: How to protect public administration from cybersecurity threats: the COMPACT project. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 573\u2013578. IEEE, Krakow (2018). https:\/\/doi.org\/10.1109\/WAINA.2018.00147","DOI":"10.1109\/WAINA.2018.00147"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Drmola, J., Kasl, F., Loutock\u00fd, P., Mare\u0161, M., Pitner, T., Vostoupal, J.: The matter of cybersecurity expert workforce scarcity in the Czech Republic and its alleviation through the proposed qualifications framework. In: The 16th International Conference on Availability, Reliability and Security, pp. 1\u20136. ACM, Vienna Austria (2021). https:\/\/doi.org\/10.1145\/3465481.3469186","DOI":"10.1145\/3465481.3469186"},{"key":"2_CR22","unstructured":"Lehto, M.: ECCWS 2020 19th European Conference on Cyber Warfare: Warfare and Security (2020)"},{"key":"2_CR23","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1057\/s41284-020-00250-6","volume":"34","author":"M Phelps","year":"2021","unstructured":"Phelps, M.: The role of the private sector in counter-terrorism: a scoping review of the literature on emergency responses to terrorism. Secur. J. 34, 599\u2013620 (2021). https:\/\/doi.org\/10.1057\/s41284-020-00250-6","journal-title":"Secur. J."},{"key":"2_CR24","doi-asserted-by":"publisher","unstructured":"Choi, I., Lee, J., Kwon, T., Kim, K., Choi, Y., Song, J.: An easy-to-use framework to build and operate ai-based intrusion detection for in-situ monitoring. In: 2021 16th Asia Joint Conference on Information Security (AsiaJCIS), pp. 1\u20138. IEEE, Seoul, Korea, Republic of (2021). https:\/\/doi.org\/10.1109\/AsiaJCIS53848.2021.00011","DOI":"10.1109\/AsiaJCIS53848.2021.00011"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Dreyling, R., Jackson, E., Pappel, I.: Cyber security risk analysis for a virtual assistant G2C digital service using FAIR model. In: 2021 Eighth International Conference on eDemocracy & eGovernment (ICEDEG), pp. 33\u201340. IEEE, Quito, Ecuador (2021). https:\/\/doi.org\/10.1109\/ICEDEG52154.2021.9530938","DOI":"10.1109\/ICEDEG52154.2021.9530938"},{"key":"2_CR26","doi-asserted-by":"publisher","first-page":"1682","DOI":"10.3390\/electronics10141682","volume":"10","author":"C Mironeanu","year":"2021","unstructured":"Mironeanu, C., Archip, A., Amarandei, C.-M., Craus, M.: Experimental cyber attack detection framework. Electronics 10, 1682 (2021). https:\/\/doi.org\/10.3390\/electronics10141682","journal-title":"Electronics"},{"key":"2_CR27","doi-asserted-by":"publisher","unstructured":"Savold, R., Dagher, N., Frazier, P., McCallam, D.: Architecting cyber defense: a survey of the leading cyber reference architectures and frameworks. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 127\u2013138. IEEE, New York, NY, USA (2017). https:\/\/doi.org\/10.1109\/CSCloud.2017.37","DOI":"10.1109\/CSCloud.2017.37"},{"key":"2_CR28","doi-asserted-by":"publisher","unstructured":"Maglaras, L., Drivas, G., Chouliaras, N., Boiten, E., Lambrinoudakis, C., Ioannidis, S.: Cybersecurity in the Era of digital transformation: the case of Greece. In: 2020 International Conference on Internet of Things and Intelligent Applications (ITIA), pp. 1\u20135. IEEE, Zhenjiang, China (2020). https:\/\/doi.org\/10.1109\/ITIA50152.2020.9312297","DOI":"10.1109\/ITIA50152.2020.9312297"},{"key":"2_CR29","doi-asserted-by":"publisher","unstructured":"Bendiek, A., Schallbruch, M.: Stiftung Wissenschaft Und Politik: Europe\u2019s third way in cyberspace: what part does the new EU Cybersecurity Act play? SWP Comment (2019). https:\/\/doi.org\/10.18449\/2019C52","DOI":"10.18449\/2019C52"},{"key":"2_CR30","doi-asserted-by":"publisher","first-page":"762","DOI":"10.25046\/aj050490","volume":"5","author":"AA Garba","year":"2020","unstructured":"Garba, A.A., Siraj, M.M., Othman, S.H.: An explanatory review on cybersecurity capability maturity models. Adv. Sci. Technol. Eng. Syst. J. 5, 762\u2013769 (2020). https:\/\/doi.org\/10.25046\/aj050490","journal-title":"Adv. Sci. Technol. Eng. Syst. J."},{"key":"2_CR31","doi-asserted-by":"publisher","unstructured":"Zakaria, K.N., Zainal, A., Othman, S.H., Kassim, M.N.: Feature extraction and selection method of cyber-attack and threat profiling in cybersecurity audit. In: 2019 International Conference on Cybersecurity (ICoCSec), pp. 1\u20136. IEEE, Negeri Sembilan, Malaysia (2019). https:\/\/doi.org\/10.1109\/ICoCSec47621.2019.8970786","DOI":"10.1109\/ICoCSec47621.2019.8970786"},{"key":"2_CR32","doi-asserted-by":"publisher","unstructured":"Yin, R.K.: The case study crisis: some answers. Admin. Sci. Quart 26, 58. https:\/\/doi.org\/10.2307\/2392599","DOI":"10.2307\/2392599"},{"key":"2_CR33","doi-asserted-by":"publisher","first-page":"532","DOI":"10.5465\/amr.1989.4308385","volume":"14","author":"KM Eisenhardt","year":"1989","unstructured":"Eisenhardt, K.M.: Building theories from case study research. Acad. Manag. Rev. 14, 532\u2013550 (1989). https:\/\/doi.org\/10.5465\/amr.1989.4308385","journal-title":"Acad. Manag. Rev."},{"key":"2_CR34","unstructured":"BSI-Standard 200\u20131: Managementsysteme f\u00fcr Informationssicherheit (ISMS). Bundesamt f\u00fcr Sicherheit in der Informationstechnik. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Grundschutz\/BSI_Standards\/standard_200_1.html?nn=128578"},{"key":"2_CR35","unstructured":"DIN ISO\/IEC 27001. DIN (2018)"},{"key":"2_CR36","first-page":"159","volume":"1","author":"P Mayring","year":"2004","unstructured":"Mayring, P.: Qualitative content analysis. Companion Qual. Res. 1, 159\u2013176 (2004)","journal-title":"Companion Qual. Res."},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Leeser, D.C.: Digitalisierung in KMU kompakt: Compliance und IT-Security. Springer Vieweg, Berlin [Heidelberg] (2020)","DOI":"10.1007\/978-3-662-59738-5"},{"key":"2_CR38","unstructured":"BSI-Standard 200\u20133: Risikomanagement. Bundesamt f\u00fcr Sicherheit in der Informationstechnik. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Grundschutz\/BSI_Standards\/standard_200_3.html?nn=128620"},{"key":"2_CR39","unstructured":"CMMI Institute\u2014Home. https:\/\/cmmiinstitute.com"}],"container-title":["Smart Innovation, Systems and Technologies","Human Centred Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-3455-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T12:04:20Z","timestamp":1655294660000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-3455-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811934544","9789811934551"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-3455-1_2","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}