{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T22:14:19Z","timestamp":1648851259066},"reference-count":10,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"4","license":[{"start":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T00:00:00Z","timestamp":1563494400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T00:00:00Z","timestamp":1563494400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wirtsch Inform Manag"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1365\/s35764-019-00194-6","type":"journal-article","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T13:03:29Z","timestamp":1563541409000},"page":"216-223","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Informationssicherheit \u2013 lean &amp; agil"],"prefix":"10.1365","volume":"11","author":[{"given":"Inge","family":"Hanschke","sequence":"first","affiliation":[]},{"given":"Clemens","family":"Schwarz","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"key":"194_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-658-27063-6","volume-title":"Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten \u2013 Eine kompakte Einf\u00fchrung f\u00fcr die Praxis","author":"I Hanschke","year":"2019","unstructured":"Hanschke, I. (2019). Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten \u2013 Eine kompakte Einf\u00fchrung f\u00fcr die Praxis. M\u00fcnchen: Springer."},{"key":"194_CR2","doi-asserted-by":"crossref","DOI":"10.3139\/9783446459731","volume-title":"Informationssicherheit und Datenschutz \u2013 Einfach und effektiv","author":"I Hanschke","year":"2019","unstructured":"Hanschke, I. (2019). Informationssicherheit und Datenschutz \u2013 Einfach und effektiv. M\u00fcnchen: Hanser."},{"key":"194_CR3","volume-title":"IT-Grundschutz-Kompendium 2019. Edition 2019","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)","year":"2019","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) (2019). IT-Grundschutz-Kompendium 2019. Edition 2019. \n                    https:\/\/www.bsi.bund.de\/DE\/Themen\/ITGrundschutz\/ITGrundschutzDownloads\/itgrundschutzDownloads_node.html\n                    \n                  . Zugegriffen: 8. Juli 2019"},{"key":"194_CR4","volume-title":"Umsetzungshinweise zum IT-Grundschutz-Kompendium Edition 2019","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)","year":"2019","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) (2019). Umsetzungshinweise zum IT-Grundschutz-Kompendium Edition 2019. \n                    https:\/\/www.bsi.bund.de\/DE\/Themen\/ITGrundschutz\/ITGrundschutzDownloads\/itgrundschutzDownloads_node.html\n                    \n                  . Zugegriffen: 8. Juli 2019"},{"key":"194_CR5","volume-title":"BSI-Standard. 200-1: Managementsysteme f\u00fcr Informationssicherheit","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)","year":"2019","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) (2019). BSI-Standard. 200-1: Managementsysteme f\u00fcr Informationssicherheit. \n                    https:\/\/www.bsi.bund.de\/DE\/Themen\/ITGrundschutz\/ITGrundschutzStandards\/ITGrundschutzStandards_node.html\n                    \n                  . Zugegriffen: 8. Juli 2019"},{"key":"194_CR6","volume-title":"BSI-Standard. 200-2: IT-Grundschutz-Methodik","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)","year":"2019","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) (2019). BSI-Standard. 200-2: IT-Grundschutz-Methodik. \n                    https:\/\/www.bsi.bund.de\/DE\/Themen\/ITGrundschutz\/ITGrundschutzStandards\/ITGrundschutzStandards_node.html\n                    \n                  . Zugegriffen: 8. Juli 2019"},{"key":"194_CR7","volume-title":"BSI-Standard. 200-3: Risikomanagement. Leitfaden Basis-Absicherung","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)","year":"2019","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) (2019). BSI-Standard. 200-3: Risikomanagement. Leitfaden Basis-Absicherung. \n                    https:\/\/www.bsi.bund.de\/DE\/Themen\/ITGrundschutz\/ITGrundschutzStandards\/ITGrundschutzStandards_node.html\n                    \n                  . Zugegriffen: 8. Juli 2019"},{"key":"194_CR8","volume-title":"BSI-Standard. 100-4: Notfallmanagement","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)","year":"2019","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) (2019). BSI-Standard. 100-4: Notfallmanagement. \n                    https:\/\/www.bsi.bund.de\/DE\/Themen\/ITGrundschutz\/ITGrundschutzStandards\/ITGrundschutzStandards_node.html\n                    \n                  . Zugegriffen: 8. Juli 2019"},{"key":"194_CR9","volume-title":"Kriminalit\u00e4tsbek\u00e4mpfung \u2013 Ein Blick in die Zukunft","author":"C Schwarz","year":"2015","unstructured":"Schwarz, C. (2015). Digitale Daten im pers\u00f6nlichen Umfeld \u2013 Fakten-basierte Entscheidungsfindung im Bereich der Sicherheit. In H. Artk\u00e4mper & H. Clages (Hrsg.), Kriminalit\u00e4tsbek\u00e4mpfung \u2013 Ein Blick in die Zukunft. Stuttgart: Richard Booberg."},{"key":"194_CR10","volume-title":"Routenplaner: Cyber-Sicherheit f\u00fcr Handwerksbetriebe","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)","year":"2019","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) (2019). Routenplaner: Cyber-Sicherheit f\u00fcr Handwerksbetriebe. \n                    https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/ACS\/routenplaner_print.html?nn=10027584\n                    \n                  . Zugegriffen: 8. Juli 2019"}],"container-title":["Wirtschaftsinformatik &amp; Management"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-019-00194-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s35764-019-00194-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-019-00194-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T23:06:13Z","timestamp":1595027173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s35764-019-00194-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,19]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["194"],"URL":"https:\/\/doi.org\/10.1365\/s35764-019-00194-6","relation":{},"ISSN":["1867-5905","1867-5913"],"issn-type":[{"value":"1867-5905","type":"print"},{"value":"1867-5913","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,19]]},"assertion":[{"value":"19 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}