{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T01:13:48Z","timestamp":1649034828348},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T00:00:00Z","timestamp":1476316800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s11623-016-0695-6","type":"journal-article","created":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T10:32:07Z","timestamp":1476268327000},"page":"749-750","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Spielerische Bedrohungsanalyse"],"prefix":"10.1007","volume":"40","author":[{"given":"Kai","family":"Jendrian","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,13]]},"reference":[{"key":"695_CR1","unstructured":"Shostack, Adam: Drawing Developers into Threat Modelling. https:\/\/www.usenix.org\/system\/files\/conference\/3gse14\/3gse14-shostack.pdf"},{"key":"695_CR2","unstructured":"Shostack, Adam: Threat Modeling: Designing for Security. http:\/\/threatmodelingbook.com"},{"key":"695_CR3","unstructured":"Elevation of Privilege Game. https:\/\/www.microsoft.com\/en-us\/sdl\/adopt\/eop.aspx"},{"key":"695_CR4","unstructured":"EOP Game (deutsch): https:\/\/github.com\/test4bounty\/EoPCardGameGerman\/tree\/master\/PDF-all-cards"},{"key":"695_CR5","unstructured":"Microsoft: Microsoft Threat Modelling Tool 2016. https:\/\/blogs.microsoft.com\/microsoftsecure\/2015\/10\/07\/whats-new-with-microsoft-threatmodeling- tool-2016\/"},{"key":"695_CR6","unstructured":"RFC 3552: Guidelines for Writing RFC Text on Security Considerations. https:\/\/tools.ietf.org\/html\/rfc3552"},{"key":"695_CR7","unstructured":"OWASP: OWASP Threat Risk Modelling. https:\/\/www.owasp.org\/index. php\/Threat_Risk_Modeling"},{"key":"695_CR8","unstructured":"CWE\u2013Common Weakness Enumeration. http:\/\/cwe.mitre.org\/"},{"key":"695_CR9","unstructured":"CAPEC\u2013Common Attack Pattern Enumeration and Classification. https:\/\/capec.mitre.org\/"},{"key":"695_CR10","unstructured":"Wikipedia: Serious Games. https:\/\/en.wikipedia.org\/wiki\/Serious_game"},{"key":"695_CR11","unstructured":"10 common traps. http:\/\/www.tripwire.com\/state-of-security\/security-dataprotection\/threat-modeling-10-common-traps-you-dont-want-to-fall-into\/"},{"key":"695_CR12","unstructured":"Bericht \u00fcber OPM hack: https:\/\/oversight.house.gov\/wp-content\/uploads\/2016\/09\/The-OPM-Data-Breach-How-the-Government- Jeopardized-Our-National-Security-for-More-than-a-Generation.pdf"},{"key":"695_CR13","unstructured":"Wikipedia: Datenflussdiagramme. https:\/\/de.wikipedia.org\/wiki\/Datenflussdiagramm"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-016-0695-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0695-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0695-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T05:21:40Z","timestamp":1529990500000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-016-0695-6"}},"subtitle":[".. eine ernste Angelegenheit"],"short-title":[],"issued":{"date-parts":[[2016,10,13]]},"references-count":13,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["695"],"URL":"https:\/\/doi.org\/10.1007\/s11623-016-0695-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,13]]}}}