{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T03:59:59Z","timestamp":1772769599874,"version":"3.50.1"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wirtsch Inform Manag"],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1007\/s35764-016-0062-2","type":"journal-article","created":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T23:44:40Z","timestamp":1576367080000},"page":"16-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["VdS-Richtlinien 3473 \u2014 Informationssicherheit f\u00fcr KMU"],"prefix":"10.1007","volume":"8","author":[{"given":"Michael","family":"Wiesner","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,10]]},"reference":[{"key":"62_CR1","unstructured":"http:\/\/www.vds.de\/cyber"},{"key":"62_CR2","unstructured":"http:\/\/www.ifm-bonn.org\/definitionen\/kmu-definition-der-eu-kommission\n                    \n                  \/"},{"key":"62_CR3","unstructured":"http:\/\/www.ifm-bonn.org\/definitionen\/kmu-definition-des-ifm-bonn\n                    \n                  \/"},{"key":"62_CR4","unstructured":"https:\/\/www.3473-wiki.de\n                    \n                  \/doku.php?id=3473:01_allgemeines"},{"key":"62_CR5","unstructured":"https:\/\/www.vds-quick-check.de\n                    \n                  \/"},{"key":"62_CR6","unstructured":"https:\/\/www.bsi.bund.de\n                    \n                  \/DE\/Themen\/ITGrundschutz\/ITGrundschutzStandards\/Standard02\/ITGStandard02_node.html"},{"key":"62_CR7","unstructured":"https:\/\/www.bsi.bund.de\n                    \n                  \/DE\/Themen\/ITGrundschutz\/ITGrundschutzStandards\/Standard04\/ITGStandard04_node.html"},{"key":"62_CR8","unstructured":"https:\/\/www.allianz-fuer-cybersicherheit.de\n                    \n                  \/ACS\/DE\/_\/downloads\/cybersicherheitslage\/umfrage2015_ergebnisse.pdf"},{"key":"62_CR9","unstructured":"https:\/\/vds.de\/verzeichnisse\/cyb\n                    \n                  \/"},{"key":"62_CR10","unstructured":"https:\/\/www.3473-wiki.de"}],"container-title":["Wirtschaftsinformatik &amp; Management"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s35764-016-0062-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s35764-016-0062-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s35764-016-0062-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T23:44:40Z","timestamp":1576367080000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s35764-016-0062-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["62"],"URL":"https:\/\/doi.org\/10.1007\/s35764-016-0062-2","relation":{},"ISSN":["1867-5905","1867-5913"],"issn-type":[{"value":"1867-5905","type":"print"},{"value":"1867-5913","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8]]},"assertion":[{"value":"10 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}