{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,11]],"date-time":"2023-06-11T09:40:41Z","timestamp":1686476441408},"reference-count":5,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"1","license":[{"start":{"date-parts":[[2011,1,25]],"date-time":"2011-01-25T00:00:00Z","timestamp":1295913600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wirtsch Inform Manag"],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1365\/s35764-011-0013-x","type":"journal-article","created":{"date-parts":[[2011,11,25]],"date-time":"2011-11-25T12:07:48Z","timestamp":1322222868000},"page":"56-63","source":"Crossref","is-referenced-by-count":0,"title":["E-Mails: Archivierung und Management \u2013 Not und Tugend"],"prefix":"10.1365","volume":"3","author":[{"given":"Daniel F.","family":"Abawi","sequence":"first","affiliation":[]},{"given":"Oliver","family":"Greiner","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2011,1,25]]},"reference":[{"key":"13_CR1","unstructured":"Schmitz, Guido: eMail-Management \u2013 notwendiges \u00dcbel oder Chance?, documanager.de, http:\/\/www.documanager.de\/magazin\/artikel_1758_e_mail_management_lifecycle.html, 1\/2008, letzter Zugriff 13. November 2010."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Ripper, J\u00f6rg: E-Mail-Archivierung: Revisionssicher ist nicht gleich rechtskonform!, WuM Heft 6, 2010, S. 44-49.","DOI":"10.1007\/BF03250520"},{"key":"13_CR3","unstructured":"Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e.V. (BITKOM, Herausgeber): Leitfaden E-Mail-Archivierung, http:\/\/www.bitkom.org\/de\/themen\/36342_32847.aspx, Juli 2005, letzter Zugriff 13. November 2010."},{"key":"13_CR4","unstructured":"Bearing Point GmbH: E-Mail Management 2008 \u2013 Herausforderungen und Trends im E-Mail Management \u2013 Executive Summary, ftp:\/\/public.dhe.ibm.com\/software\/emea\/de\/db2\/bearingpoint_studie_2008.pdf, letzter Zugriff 13. November 2010."},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Fox, Dirk: Compliance und Datenschutz, Datenschutz und Datensicherheit (DuD), 6\/2008, S. 409-411.","DOI":"10.1007\/s11623-008-0097-5"}],"container-title":["Wirtschaftsinformatik &amp; Management"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-011-0013-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s35764-011-0013-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-011-0013-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,11]],"date-time":"2023-06-11T09:10:35Z","timestamp":1686474635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s35764-011-0013-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,25]]},"references-count":5,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["13"],"URL":"https:\/\/doi.org\/10.1365\/s35764-011-0013-x","relation":{},"ISSN":["1867-5905","1867-5913"],"issn-type":[{"value":"1867-5905","type":"print"},{"value":"1867-5913","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,25]]}}}