{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T04:00:16Z","timestamp":1648699216042},"reference-count":6,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"1","license":[{"start":{"date-parts":[[2011,1,25]],"date-time":"2011-01-25T00:00:00Z","timestamp":1295913600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wirtsch Inform Manag"],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1365\/s35764-011-0012-y","type":"journal-article","created":{"date-parts":[[2011,11,25]],"date-time":"2011-11-25T07:07:48Z","timestamp":1322204868000},"page":"50-55","source":"Crossref","is-referenced-by-count":1,"title":["Manipulation und Klebezettelchen \u2013 Warum IT-Sicherheit nur mit den Anwendern funktioniert"],"prefix":"10.1365","volume":"3","author":[{"given":"Oliver","family":"Tacke","sequence":"first","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2011,1,25]]},"reference":[{"key":"12_CR1","unstructured":"Statistisches Bundesamt (2010): Unternehmen und Arbeitsst\u00e4tten, Wiesbaden."},{"key":"12_CR2","unstructured":"Steinkamp, Markus (2009): Trau, schau, wem \u2013 Gef\u00e4hrdungen durch Social Business Networks, Teil 1, in: IT-Grundschutz, 4. Jg., Nr. 4, S. 13-14."},{"key":"12_CR3","unstructured":"Tversky, Amos; Kahneman, Daniel (2008): Judgment under uncertainty: Heuristics and biases, in: Tversky, Amos; Kahneman, Daniel (Hrsg.): Judgment under uncertainty: Heuristics and biases, 24. Aufl., S. 3-22."},{"key":"12_CR4","unstructured":"We\u00dfelmann, Bettina; Wiele, Johannes (2010): Gesch\u00e4rfte Sinne, in: iX, 23. Jg., Nr. 3, S. 131-133."},{"key":"12_CR5","unstructured":"Schumacher, Stefan (2009): Psychologische Grundlagen des Social Engineering, in: UpTimes, 8. Jg., Nr. 1, S. 77-97."},{"key":"12_CR6","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (2009): IT-Grundschutz-Kataloge, 11. Erg\u00e4nzungslieferung, K\u00f6ln."}],"container-title":["Wirtschaftsinformatik &amp; Management"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-011-0012-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s35764-011-0012-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-011-0012-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T11:40:09Z","timestamp":1572954009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s35764-011-0012-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,25]]},"references-count":6,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["12"],"URL":"https:\/\/doi.org\/10.1365\/s35764-011-0012-y","relation":{},"ISSN":["1867-5905","1867-5913"],"issn-type":[{"value":"1867-5905","type":"print"},{"value":"1867-5913","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,25]]}}}