{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T17:41:14Z","timestamp":1649180474932},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,2,19]],"date-time":"2013-02-19T00:00:00Z","timestamp":1361232000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1007\/s11623-013-0056-7","type":"journal-article","created":{"date-parts":[[2013,2,18]],"date-time":"2013-02-18T20:20:59Z","timestamp":1361218859000},"page":"173-176","source":"Crossref","is-referenced-by-count":0,"title":["Die Umsetzungsl\u00fccke: Warum IT-Sicherheit im Mittelstand ein zentrales Thema bleibt"],"prefix":"10.1007","volume":"37","author":[{"given":"Franz","family":"B\u00fcllingen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,2,19]]},"reference":[{"key":"56_CR1","volume-title":"Trends in der IT-Sicherheit, Januar 2011","year":"2010","unstructured":"BITKOM (Hg.) (2010): Trends in der IT-Sicherheit, Januar 2011, Institut Aris im Auftrag von BITKOM, Berlin"},{"key":"56_CR2","unstructured":"BKA (Hg.)(o.J.): Cybercrime \u2014 Handlungsempfehlungen f\u00fcr die Wirtschaft in F\u00e4llen von Cybercrime, Wiesbaden"},{"key":"56_CR3","unstructured":"BSI (Hg.) (2011): BSI-Lagebericht \u201eDie Lage der IT-Sicherheit in Deutschland 2011\u201c, Bad Godesberg"},{"key":"56_CR4","unstructured":"BSI (Hg.) (2011): Studie zur IT-Sicherheit in kleinen und mittleren Unternehmen. Grad der Sensibilisierung des Mittelstandes in Deutschland, Bad Godesberg"},{"key":"56_CR5","unstructured":"B\u00fcllingen, F.; Hillebrand, A. (2012): IT-Sicherheitsniveau in kleinen und mittleren Unternehmen, Bad Honnef"},{"issue":"10","key":"56_CR6","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s11623-009-0159-3","volume":"33","author":"Franz B\u00fcllingen","year":"2009","unstructured":"B\u00fcllingen, F.; Hillebrand, A.; Oczko, M.; Ritscher, M. (2009): IT-Sicherheit als kritischer Erfolgsfaktor mobiler Gesch\u00e4ftsanwendungen, in: Datenschutz und Datensicherheit (DuD) 19\/2009, S. 611\u2013616","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"56_CR7","unstructured":"Deutsche Telekom \/ T-Systems (Hg.) (2011): Sicherheitsreport 2011. Eine repr\u00e4sentative Studie zum Thema Sicherheit in Deutschland im Auftrag von T-Systems, Bonn"},{"key":"56_CR8","volume-title":"IT-Sicherheitslage im Mittelstand 2011","year":"2011","unstructured":"DsiN.de (Hg.) (2011): IT-Sicherheitslage im Mittelstand 2011. Eine Studie von Deutschland sicher im Netz, Berlin"},{"key":"56_CR9","unstructured":"Financial Times Deutschland (26.11.2012): \u201eIT-Sicherheit: EU pr\u00fcft Meldepfl icht f\u00fcr Hackerangriff e\u201c, S. 6"},{"key":"56_CR10","unstructured":"Financial Times Deutschland (12.11.2012): \u201eHackerabwehr: IT-Branche zittert vor Meldezwang\u201c S. 7"},{"key":"56_CR11","unstructured":"NEG (Hg.) (2011): Netz- und Informationssicherheit in Unternehmen 2011, Ergebnisse einer Befragung von kleinen und mittelst\u00e4ndischen Unternehmen in Deutschland"},{"key":"56_CR12","unstructured":"Picot, A. (2012): Sicherheit im Internet \u2014 Wie unsere Zukunft von Sicherheit, Vertrauen und Datenschutz abh\u00e4ngt. Einf\u00fchrung zur M\u00fcnchener Kreis Fachkonferenz vom 29. M\u00e4rz 2012, M\u00fcnchen"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0056-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-013-0056-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0056-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0056-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:22:35Z","timestamp":1559398955000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-013-0056-7"}},"subtitle":["Ergebnisse einer empirischen Erhebung"],"short-title":[],"issued":{"date-parts":[[2013,2,19]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,3]]}},"alternative-id":["56"],"URL":"https:\/\/doi.org\/10.1007\/s11623-013-0056-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2,19]]}}}