{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T15:52:26Z","timestamp":1712850746289},"reference-count":5,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"1","license":[{"start":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T00:00:00Z","timestamp":1643068800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T00:00:00Z","timestamp":1643068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Hochschule Konstanz Technik, Wirtschaft und Gestaltung"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wirtsch Inform Manag"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1365\/s35764-021-00380-5","type":"journal-article","created":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T17:03:43Z","timestamp":1643130223000},"page":"10-19","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["IT-Compliance in KMU\u00a0\u2013 Experteninterviews zum Status quo"],"prefix":"10.1365","volume":"14","author":[{"given":"Nico","family":"Deistler","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Rentrop","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2022,1,25]]},"reference":[{"key":"380_CR1","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1365\/s40702-020-00612-z","volume":"57","author":"N Deistler","year":"2020","unstructured":"Deistler, N., & Rentrop, C. (2020). IT-Compliance in KMU\u2014State of the art. HMD, 57, 1047\u20131057.","journal-title":"HMD"},{"key":"380_CR2","unstructured":"Hillebrand, A., Niederpr\u00fcm, A., Sch\u00e4fer, S., Thiele, S., & Henseler-Unger, I. (2017). Aktuelle Lage der IT-Sicherheit in KMU.WIK Wissenschaftliches Institut f\u00fcr Infrastruktur und Kommunikationsdienste GmbH. https:\/\/www.wik.org\/fileadmin\/Sonstige_Dateien\/IT-Sicherheit_in_KMU\/WIK-Studie_Aktuelle_Lage_der_IT-Sicherheit_in_KMU_Langfassung__2_.pdf. Zugegriffen: 28. Nov. 2020."},{"key":"380_CR3","unstructured":"Bitkom (2018). Bitkom-Mittelstandsbericht 2018. Studie. https:\/\/www.bitkom.org\/Bitkom\/Publikationen\/Bitkom-Mittelstandsbericht-2018.html. Zugegriffen: 20. Nov. 2020."},{"key":"380_CR4","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-531-91826-6_23","volume-title":"Methoden der vergleichenden Politik- und Sozialwissenschaft. Neue Entwicklungen und Anwendungen","author":"M Meuser","year":"2009","unstructured":"Meuser, M., & Nagel, U. (2009). Das Experteninterview \u2013 konzeptionelle Grundlagen und methodische Anlage. In S. Pickel, G. Pickel, H.-J. Lauth & D. Jahn (Hrsg.), Methoden der vergleichenden Politik- und Sozialwissenschaft. Neue Entwicklungen und Anwendungen (S. 465\u2013479). Wiesbaden: VS."},{"key":"380_CR5","volume-title":"Basics of qualitative research: techniques and procedures for developing grounded theory","author":"J Corbin","year":"2014","unstructured":"Corbin, J., & Strauss, A. (2014). Basics of qualitative research: techniques and procedures for developing grounded theory. Thousand Oaks: SAGE."}],"container-title":["Wirtschaftsinformatik &amp; Management"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-021-00380-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s35764-021-00380-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-021-00380-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T15:03:15Z","timestamp":1645023795000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s35764-021-00380-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,25]]},"references-count":5,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["380"],"URL":"https:\/\/doi.org\/10.1365\/s35764-021-00380-5","relation":{},"ISSN":["1867-5905","1867-5913"],"issn-type":[{"value":"1867-5905","type":"print"},{"value":"1867-5913","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,25]]},"assertion":[{"value":"22 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}