{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:21:32Z","timestamp":1747282892138,"version":"3.37.3"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100013276","name":"Interreg","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100013276","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1109\/ice\/itmc58018.2023.10332338","type":"proceedings-article","created":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T18:48:01Z","timestamp":1701715681000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Information Security Challenges in the Digitalisation of the Austrian Food Industry: Assessment of Food Suppliers and Implications"],"prefix":"10.1109","author":[{"given":"Claudia","family":"Hetzenauer","sequence":"first","affiliation":[{"name":"Vorarlberg University of Applied Sciences,Master Program Business Administration: BPM,Dornbirn,Austria"}]},{"given":"Martin","family":"Dobler","sequence":"additional","affiliation":[{"name":"Vorarlberg University of Applied Sciences,Research Centre Business Informatics,Dornbirn,Austria"}]},{"given":"Armin","family":"Simma","sequence":"additional","affiliation":[{"name":"Vorarlberg University of Applied Sciences,Competence Area Informatics,Dornbirn,Austria"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/c2012-0-07222-5"},{"volume-title":"Digitalisierung von kleinen und mittleren Unterneh- men in Deutschland - ein Forschungs\u00fcberblick","year":"2020","author":"Brockhaus","key":"ref2"},{"article-title":"Bundesgesetz zur Gew\u00e4hrleistung eines hohen Sicherheitsniveaus von Netz- und Informationssystemen (Netz- und Informationssystemsicherheitsgesetz \u2013 NISG)","volume-title":"Bundesge- setz zur Gew\u00e4hrleistung eines hohen Sicherheitsniveaus von Netz- und Informationssyste- men (Netz- und Informationssystemsicherheitsgesetz \u2013 NISG)","year":"2019","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.08.337"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41089-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-17713-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-20345-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-018-1025-y"},{"key":"ref9","article-title":"Schwachstellen und Angriffsketten in der Wert sch\u00f6pfungskette der Fleischproduktion","volume-title":"SICHERHEIT 2020","author":"Hofmeier","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-18488-9_3"},{"volume-title":"Cybersecurity: Systematisierung, Forschungsstand und Innovationspotenziale","year":"2021","author":"Latzenhofer","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1365\/s40702-015-0197-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-55890-4"},{"volume-title":"\u00d6sterreichische Strategie f\u00fcr Cybersicherheit 2021","year":"2021","author":"Bundeskanzleramt","key":"ref14"},{"year":"2022","key":"ref15","article-title":"\u00d6sterreichisches Informationssicherheitshandbuch"},{"article-title":"\u00d6sterreichisches Programm zum Schutz kritischer Infrastrukturen (APCIP)","volume-title":"\u00d6sterrei- chisches Programm zum Schutz kritischer Infrastrukturen (APCIP). \u00d6sterreichisches Programm zum Schutz kritischer Infrastrukturen (APCIP)","year":"2015","key":"ref16"},{"volume-title":"IT-Sicherheit f\u00fcr Kritische Infrastrukturen \u2013 State of the Art","year":"2018","author":"Rudel","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2019.09.022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61692-012-8.ch001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-55890-4_16"}],"event":{"name":"2023 IEEE International Conference on Engineering, Technology and Innovation (ICE\/ITMC)","start":{"date-parts":[[2023,6,19]]},"location":"Edinburgh, United Kingdom","end":{"date-parts":[[2023,6,22]]}},"container-title":["2023 IEEE International Conference on Engineering, Technology and Innovation (ICE\/ITMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10332254\/10332258\/10332338.pdf?arnumber=10332338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T18:33:29Z","timestamp":1707330809000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10332338\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ice\/itmc58018.2023.10332338","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]}}}