{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T09:58:25Z","timestamp":1771235905052,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11623-022-1667-7","type":"journal-article","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T16:13:36Z","timestamp":1663949616000},"page":"605-610","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cloud-Paradigma in der \u00f6ffentlichen Verwaltung"],"prefix":"10.1007","volume":"46","author":[{"given":"Clemens","family":"Doubrava","sequence":"first","affiliation":[]},{"given":"Vera","family":"Sikes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,23]]},"reference":[{"key":"1667_CR1","unstructured":"SO\/IEC 17788: Information technology \u2013 Cloud Computing \u2013 Overview and Vocabulary (2014), https:\/\/www.iso.org\/standard\/60544.html"},{"key":"1667_CR2","unstructured":"DIN ISO\/IEC 17788: Informationstechnik \u2013 Cloud Computing \u2013 \u00dcbersicht und Vokabular (ISO\/IEC 17788:2014)"},{"key":"1667_CR3","unstructured":"NIST Special Publication 800-145: The NIST Definition of Cloud Computing"},{"key":"1667_CR4","unstructured":"KPMG in Zusammenarbeit mit bitkom research: \u201eCloud-Monitor 2021\u201c"},{"key":"1667_CR5","unstructured":"Statistisches Bundesamt, Pressemitteilung Nr.\u00a0241 vom 21. Mai 2021"},{"key":"1667_CR6","unstructured":"\u201eLandesbetrieb IT.NRW \u2013 Statistik und IT-Dienstleistungen\u201c \u2013 Quelle: https:\/\/www.it.nrw\/statistik\/eckdaten\/nutzung-von-informations-und-kommunikationstechnologien-unternehmen-101990 Stand vom 24. Januar 2022"},{"key":"1667_CR7","unstructured":"EUROSTAT (https:\/\/ec.europa.eu\/eurostat\/statistics-explained\/index.php?title=Cloud_computing_-_statistics_on_the_use_by_enterprises abgerufen am 29.6.2022)"},{"key":"1667_CR8","unstructured":"Mindeststandard des BSI zur Nutzung externer Cloud-Dienste nach \u00a7 8 Absatz 1 Satz 1 BSIG \u2013 Version 2.0 vom 07.07.2021, https:\/\/www.bsi.bund.de\/DE\/Themen\/Oeffentliche-Verwaltung\/Mindeststandards\/Externe_Cloud-Dienste\/Externe_Cloud-Dienste_node.html"},{"key":"1667_CR9","unstructured":"DsiN SICHERHEITSINDEX 2022 - Digitale Sicherheitslage von Verbraucher:innen in Deutschland, eine Studie von Deutschland sicher im Netz (DsiN)"},{"key":"1667_CR10","unstructured":"Cloud Security Alliance: \u201eTop Threats to Cloud Computing \u2013 Pandemic Eleven\u201d, 2022"},{"key":"1667_CR11","unstructured":"Summary of the AWS Service Event in the Northern Virginia (US-EAST-1) Region December 10th, 2021, https:\/\/aws.amazon.com\/de\/message\/12721\/ CVE-2021-44228"},{"key":"1667_CR12","unstructured":"BSI CyberSicherheitswarnung CSW-Nr.\u00a02021-549032-15M0, Version 1.5, 17.12.2021 \u201eKritische Schwachstelle in log4j ver\u00f6ffentlicht (CVE-2021-44228)\u201c"},{"key":"1667_CR13","unstructured":"Verdict \u201e88\u202f% of UK data breaches caused by human error, not cyberattacks\u201d, https:\/\/www.verdict.co.uk\/uk-data-breaches-human-error\/"},{"key":"1667_CR14","unstructured":"Data Center Insider \u201eDer Feuerwehrbericht zum Brand im Stra\u00dfburger OVHcloud-Rechenzentrum beklagt M\u00e4ngel\u201c, 23.03.2022, https:\/\/www.datacenter-insider.de\/der-feuerwehrbericht-zum-brand-im-strassburger-ovhcloud-rechenzentrum-beklagt-maengel-a-1105122\/"},{"key":"1667_CR15","unstructured":"BSI \u201eCloud Computing Compliance Criteria Catalogue \u2013 C5:2020\u201d \u2013 Kriterienkatalog Cloud Computing, https:\/\/www.bsi.bund.de\/C5"},{"key":"1667_CR16","doi-asserted-by":"crossref","unstructured":"NIST Special Publication 800-207 \u201cZero Trust Architecture\u201d, 2020, https:\/\/doi.org\/10.6028\/NIST.SP.800-207","DOI":"10.6028\/NIST.SP.800-207"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-022-1667-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-022-1667-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-022-1667-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T16:47:14Z","timestamp":1663951634000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-022-1667-7"}},"subtitle":["Ist Cloud Computing in der \u00f6ffentlichen Verwaltung angekommen?"],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":16,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["1667"],"URL":"https:\/\/doi.org\/10.1007\/s11623-022-1667-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"23 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}