{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T04:48:38Z","timestamp":1648874918873},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,4,1]],"date-time":"2012-04-01T00:00:00Z","timestamp":1333238400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1007\/s11623-012-0094-6","type":"journal-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T04:49:18Z","timestamp":1334638158000},"page":"253-257","source":"Crossref","is-referenced-by-count":0,"title":["B\u00fcrgerbefragung zur IT-Sicherheit im Endanwenderbereich"],"prefix":"10.1007","volume":"36","author":[{"given":"Pierre","family":"Schnarz","sequence":"first","affiliation":[]},{"given":"Mark M.","family":"Seeger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,18]]},"reference":[{"key":"94_CR1","unstructured":"Ralf Benzm\u00fcller, Sabrina Berkenkopf: Malwarereport \u2014 Halbjahresbericht Januar bis Juni 2011, G-Data Software AG, 2011."},{"key":"94_CR2","unstructured":"Bundeskriminalamt (BKA): Cybercrime \u2014 Bundeslagebild 2010, Juli 2011."},{"key":"94_CR3","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): IT-Grundschutzhandbuch, 2002."},{"key":"94_CR4","unstructured":"Initiative D21: (N)Onliner Atlas 2011 \u2014 eine Topographie des digitalen Grabens durch Deutschland, 2011."},{"key":"94_CR5","unstructured":"Andreas Duscha, Adrian Hotz: Netz- und Informationssicherheit in Unternehmen, 2010."},{"key":"94_CR6","unstructured":"TNS Infratest: Digitale Gesellschaft, M\u00e4rz 2010."},{"key":"94_CR7","unstructured":"MAAWG: 2010 maawg email security awareness and usage report, March 2010."},{"key":"94_CR8","unstructured":"PandaLabs: Pandalabs quarterly report \u2014 july\u2013september 2011, 2011."},{"key":"94_CR9","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): Ins Internet mit Sicherheit, 2011."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0094-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0094-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0094-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0094-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:21:07Z","timestamp":1559413267000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0094-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":9,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,4]]}},"alternative-id":["94"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0094-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4]]}}}