{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T04:31:08Z","timestamp":1687926668386},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s11623-023-1791-z","type":"journal-article","created":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T15:18:36Z","timestamp":1687879116000},"page":"425-428","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cyberagentur: Der besondere Weg zur digitalen Souver\u00e4nit\u00e4t"],"prefix":"10.1007","volume":"47","author":[{"given":"Christian","family":"Hummert","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,27]]},"reference":[{"key":"1791_CR1","unstructured":"Andre Meister, Anna Biselli: Geheimer Bericht: Bundesrechnungshof bezweifelt Sinn der neuen Cyberagentur. 03.07.2019, (https:\/\/netzpolitik.org\/2019\/bundesrechnungshof-bezweifelt-sinn-der-neuen-cyberagentur\/)"},{"key":"1791_CR2","unstructured":"Agentur f\u00fcr Innovation in der Cybersicherheit GmbH. Strategie bis 2025. (https:\/\/www.cyberagentur.de\/strategie-bis-2025\/)"},{"key":"1791_CR3","doi-asserted-by":"crossref","unstructured":"Nina Jankowicz: How to lose the information war: Russia, fake news, and the future of conflict. Bloomsbury Publishing, 2020.","DOI":"10.5040\/9781838607715"},{"key":"1791_CR4","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2011.03327","author":"Parth Patwa","year":"2021","unstructured":"Parth Patwa, Shivam Sharma, Srinivas Pykl, Vineeth Guptha, Gitanjali Kumari, Md Shad Akhtar, Asif Ekbal, Amitava Das, Tanmoy Chakraborty: Fighting an Infodemic: Covid-19 Fake News Dataset. In: CONSTRAINT 2021, 8. Februar 2021. (https:\/\/doi.org\/10.48550\/arXiv.2011.03327)","journal-title":"CONSTRAINT"},{"key":"1791_CR5","unstructured":"Sven Herpig, Christina Rupp: Deutschlands staatliche Cybersicherheitsarchitektur, Stiftung Neue Verantwortung, September 2022. (https:\/\/www.stiftung-nv.de\/sites\/default\/files\/cybersicherheitsarchitektur_neunteauflage0922.pdf)"},{"key":"1791_CR6","unstructured":"Sven Herpig: Stellungnahme f\u00fcr die \u00f6ffentliche Anh\u00f6rung des Ausschusses f\u00fcr Digitales des Deutschen Bundestags am 25, Januar 2023 zum Thema Cybersicherheit \u2013 Zust\u00e4ndigkeiten und Instrumente in der Bundesrepublik Deutschland. Ausschussdrucksache 20(23)117, Seite 13. (https:\/\/www.bundestag.de\/resource\/blob\/929844\/6a44c7873556d39c82c150b1b8251841\/Stellungnahme-Herpig-data.pdf)"},{"key":"1791_CR7","unstructured":"Antwort der Bundesregierung auf die Kleine Anfrage der Fraktion der CDU\/CSU \u2013 Drucksache 20\/2977 \u2013 Forschungs- und Innovationspolitik der Bundesregierung. Deutscher Bundestag, Drucksache 20\/3229, 30.08.2022. (https:\/\/dserver.bundestag.de\/btd\/20\/032\/2003229.pdf)"},{"key":"1791_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-021-1423-4","author":"W Karl","year":"2021","unstructured":"Wilfried Karl, Christian Hummert: Digitale Souver\u00e4nit\u00e4t: Die Rolle der ZITiS in der deutschen Cybersicherheitsarchitektur. In: Datenschutz und Datensicherheit, Springer, April 2021. (https:\/\/doi.org\/10.1007\/s11623-021-1423-4)","journal-title":"Datenschutz und Datensicherheit"},{"key":"1791_CR9","unstructured":"John McManus, Trevor Wood-Harper: A study in project failure. ResearchGate, Juni 2008 (https:\/\/www.researchgate.net\/publication\/329539985_A_study_in_project_failure)"},{"issue":"2","key":"1791_CR10","first-page":"10","volume":"26","author":"A Roland","year":"2010","unstructured":"Alex Roland: Cloning DARPA. In: Issues in Science and Technology Policy. 26(2):10-10, 2010. (https:\/\/www.researchgate.net\/publication\/295676578_Cloning_DARPA)","journal-title":"Issues in Science and Technology Policy"},{"key":"1791_CR11","volume-title":"Overall Assessment","author":"RH van Atta","year":"2003","unstructured":"Richard H. van Atta, et al.: Transformation and Transition: DARPA\u2019s Role in Fostering and Emerging Revolution in Military Affairs, Vol. 1, Overall Assessment. Institute for Defense and Analysis, Alexandria, 2003."},{"key":"1791_CR12","unstructured":"Agentur f\u00fcr Innovation in der Cybersicherheit: Quantenprozessoren f\u00fcr den mobilen Einsatz. 16. Dezember 2022. (https:\/\/www.cyberagentur.de\/ausschreibung-der-cyberagentur-zu-mobilen-quantencomputern\/)"},{"key":"1791_CR13","unstructured":"Agentur f\u00fcr Innovation in der Cybersicherheit: Wie bleibt unser Hirn unhackbar? 17. September 2021. (https:\/\/www.cyberagentur.de\/wie-bleibt-unser-hirn-unhackbar\/)"},{"key":"1791_CR14","unstructured":"Agentur f\u00fcr Innovation in der Cybersicherheit: Mehr Cybersicherheit als in diesem Projekt geht nicht. 01. Oktober 2021. (https:\/\/www.cyberagentur.de\/projektstart-hochsicherheit-und-kritis\/)"},{"key":"1791_CR15","unstructured":"Bharath Aiyer, Jeffrey Caso, Peter Russell, Marc Sorel: New survey reveals $2 trillion market opportunity for cybersecurity technology and service providers. McKinsey & Company. 27. Oktober 2022. (https:\/\/www.mckinsey.com\/capabilities\/risk-and-resilience\/our-insights\/cybersecurity\/new-survey-reveals-2-trillion-dollar-market-opportunity-for-cybersecurity-technology-and-service-providers)"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1791-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-023-1791-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1791-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T15:27:43Z","timestamp":1687879663000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-023-1791-z"}},"subtitle":["Mehr Handlungsspielraum f\u00fcr disruptive Innovationen erforderlich"],"short-title":[],"issued":{"date-parts":[[2023,6,27]]},"references-count":15,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["1791"],"URL":"https:\/\/doi.org\/10.1007\/s11623-023-1791-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,27]]},"assertion":[{"value":"27 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}