{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T12:50:50Z","timestamp":1677761450097},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T00:00:00Z","timestamp":1490918400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11623-017-0781-4","type":"journal-article","created":{"date-parts":[[2017,3,30]],"date-time":"2017-03-30T16:16:10Z","timestamp":1490890570000},"page":"308-313","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Ende-zu-Ende sichere E-Mail-Kommunikation"],"prefix":"10.1007","volume":"41","author":[{"given":"Verena","family":"Zimmermann","sequence":"first","affiliation":[]},{"given":"Birgit","family":"Henhapl","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Joachim","family":"Vogt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,31]]},"reference":[{"key":"781_CR1","volume-title":"Usenix Security","author":"A Whitten","year":"1999","unstructured":"Whitten, A. and J.D. Tygar: Why Johnny Can\u2019t Encrypt: A Usability Evaluation of PGP 5.0. In: Usenix Security, 1999."},{"key":"781_CR2","volume-title":"Symposium On Usable Privacy and Security (SOUPS)","author":"S Sheng","year":"2006","unstructured":"Sheng, S., et al.: Why Johnny still can\u2019t encrypt: evaluating the usability of email encryption software. In: Symposium On Usable Privacy and Security (SOUPS), 2006."},{"key":"781_CR3","volume-title":"Why Johnny Still, Still Can\u2019t Encrypt: Evaluating the Usability of a Modern PGP Client","author":"S Ruoti","year":"2015","unstructured":"Ruoti, S., et al.: Why Johnny Still, Still Can\u2019t Encrypt: Evaluating the Usability of a Modern PGP Client. 2015."},{"key":"781_CR4","volume-title":"34th Annual ACM Conference on Human Factors and Computing Systems (CHI 2016)","author":"S Ruoti","year":"2016","unstructured":"Ruoti, S., et al.: \u201cWe\u2019re on the Same Page\u201d: A Usability Study of Secure Email Using Pairs of Novice Users. In: 34th Annual ACM Conference on Human Factors and Computing Systems (CHI 2016). San Jose, CA,USA, 2016."},{"key":"781_CR5","unstructured":"Bundesministerium f\u00fcr Wirtschaft und Energie, Bundesministerium des Innern, Bundesministerium f\u00fcr Verkehr und digitale Infrastruktur: Digitale Agenda 2014-2017. https:\/\/www.digitale-agenda.de\/Content\/DE\/_Anlagen\/2014\/08\/2014-08-20-digitale-agenda.pdf?__blob=publicationFile&v=6 (Stand 31.01.2017)"},{"key":"781_CR6","unstructured":"1&1 De-Mail GmbH: Deutschland wird Verschl\u00fcsselungsstandort Nr. 1. http:\/\/www.krypto-charta.de\/ (Stand: 31.01.2017)"},{"key":"781_CR7","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1016\/B978-044481862-1.50096-0","volume":"2","author":"C Lewis","year":"1997","unstructured":"Lewis, C. and C. Wharton: Cognitive walkthroughs. Handbook of human- computer interaction, 1997. 2: p. 717\u2013732.","journal-title":"Handbook of human- computer interaction"},{"key":"781_CR8","volume-title":"Usability inspection methods","author":"C Wharton","year":"1994","unstructured":"Wharton, C., et al.: The cognitive walkthrough method: A practitioner\u2019s guide. In: Usability inspection methods. John Wiley & Sons, Inc., 1994."},{"key":"781_CR9","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/s11623-016-0599-5","volume":"40.5","author":"V Schochlow","year":"2016","unstructured":"Schochlow, V., et al.: Bewertung der GMX\/Mailvelope-Ende-zu-Ende- Verschl\u00fcsselung. Datenschutz und Datensicherheit (DuD) 40.5 (2016), S. 295\u2013299.","journal-title":"Datenschutz und Datensicherheit (DuD)"},{"key":"781_CR10","unstructured":"Lehmann, A.: Sicher Kommunizieren einfach erkl\u00e4rt. http:\/\/www.alexanderlehmann.net\/VerschluesselungEinfachErklaert\/05-Nachrichte nVerschluesselnEinfachErklaert_SPON.mp4 (Stand 17.01.2017)"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-017-0781-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-017-0781-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-017-0781-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T09:52:05Z","timestamp":1498384325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-017-0781-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,31]]},"references-count":10,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["781"],"URL":"https:\/\/doi.org\/10.1007\/s11623-017-0781-4","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,31]]}}}