{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T09:53:19Z","timestamp":1649325199415},"reference-count":19,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"1","license":[{"start":{"date-parts":[[2015,12,23]],"date-time":"2015-12-23T00:00:00Z","timestamp":1450828800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1365\/s40702-015-0196-3","type":"journal-article","created":{"date-parts":[[2015,12,23]],"date-time":"2015-12-23T14:13:45Z","timestamp":1450880025000},"page":"87-97","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Mobile Applikationen im Arbeitsalltag: Geringe Literacy als Sicherheitsgefahr f\u00fcr Unternehmen"],"prefix":"10.1365","volume":"53","author":[{"given":"Christoph","family":"Buck","sequence":"first","affiliation":[]},{"given":"Daniela","family":"Kaubisch","sequence":"additional","affiliation":[]},{"given":"Torsten","family":"Eymann","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2015,12,23]]},"reference":[{"issue":"1","key":"196_CR1","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1365\/s11621-014-0318-2","volume":"31","author":"C Buck","year":"2014","unstructured":"Buck C, Horbel C, Kessler T, Germelmann CC (2014) Mobile consumer apps: big data brother is watching you. Mark Rev St. Gallen 31(1):26\u201334","journal-title":"Mark Rev St. Gallen"},{"key":"196_CR2","volume-title":"Secrets: on the ethics of concealment and revelation","author":"S Bok","year":"1983","unstructured":"Bok S (1983) Secrets: on the ethics of concealment and revelation. Pantheon Books, New York"},{"issue":"1","key":"196_CR3","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1086\/314309","volume":"27","author":"MC Campbell","year":"2000","unstructured":"Campbell MC, Kirmani A (2000) Consumers\u2019 use of persuasion knowledge: the effects of accessibility and cognitive capacity on perceptions of an influence agent. J Cons Res 27(1):69\u201383","journal-title":"J Cons Res"},{"issue":"1","key":"196_CR4","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev T, Hart P (2006) An extended privacy calculus model for e-commerce transactions. Inf Syst Res 17(1):61\u201380","journal-title":"Inf Syst Res"},{"key":"196_CR5","unstructured":"Egele M, Kruegely C, Kirda E, Vigna G (2011) PiOS: Detecting Privacy Leaks in iOS Applications. http:\/\/www.cs.ucsb.edu\/~chris\/research\/doc\/ndss11_pios.pdf . Zugegriffen: 2. Sept. 2015"},{"key":"196_CR6","first-page":"49","volume-title":"Information systems security, lecture notes in computer science, 7093","author":"W Enck","year":"2011","unstructured":"Enck W (2011) Defending users against smartphone apps: techniques and future directions. In: Hutchison D et al (Hrsg) Information systems security, lecture notes in computer science, 7093. Springer, Berlin, S\u00a049\u201370"},{"key":"196_CR7","volume-title":"Privatsph\u00e4re. Der Wandel eines liberalen Rechts im Zeitalter des Internets. Campus Forschung, 951","author":"M Hotter","year":"2011","unstructured":"Hotter M (2011) Privatsph\u00e4re. Der Wandel eines liberalen Rechts im Zeitalter des Internets. Campus Forschung, 951. Campus-Verlag, Frankfurt a.\u00a0M."},{"key":"196_CR8","volume-title":"Mobile device management","author":"H Kersten","year":"2012","unstructured":"Kersten H, Klett G (2012) Mobile device management. mitp Verlags GmbH & Co. KG, Heidelberg"},{"key":"196_CR9","unstructured":"Kovacs G (2012) Beobachten wir die Beobachter. http:\/\/www.ted.com\/talks\/gary_kovacs_tracking_the_trackers\/transcript?language=de . Zugegriffen: 2. Sept. 2015"},{"key":"196_CR10","volume-title":"Qualitative Sozialforschung","author":"S Lamnek","year":"1995","unstructured":"Lamnek S (1995) Qualitative Sozialforschung. Psychologie-Verl.-Union, M\u00fcnchen"},{"issue":"6","key":"196_CR11","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1016\/j.elerap.2011.07.003","volume":"10","author":"C Liao","year":"2011","unstructured":"Liao C, Liu CC, Chen K (2011) Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: an integrated model. Electron Commer Res Appl 10(6):702\u2013715","journal-title":"Electron Commer Res Appl"},{"issue":"0","key":"196_CR12","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","volume":"34","author":"A Mylonas","year":"2013","unstructured":"Mylonas A, Kastania A, Gritzalis D (2013) Delegate the smartphone user? Security awareness in smartphone platforms. Comput Secur 34(0):47\u201366","journal-title":"Comput Secur"},{"issue":"2","key":"196_CR13","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1177\/0093650211418338","volume":"40","author":"YJ Park","year":"2013","unstructured":"Park YJ (2013) Digital literacy and privacy behavior online. Commun Res 40(2):215\u2013236","journal-title":"Commun Res"},{"key":"196_CR14","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-8348-8256-1_10","volume-title":"IT-Sicherheit zwischen Regulierung und Innovation. Tagungsband zur zweiten EICT-Konferenz IT-Sicherheit","author":"J Posegga","year":"2011","unstructured":"Posegga J, Schreckling D (2011) Next generation mobile application security. In: Bub U (Hrsg) IT-Sicherheit zwischen Regulierung und Innovation. Tagungsband zur zweiten EICT-Konferenz IT-Sicherheit, 1.\u00a0Aufl. Vieweg + Teubner Verlag (IT-Sicherheit und Datenschutz), Wiesbaden, S\u00a0181\u2013200","edition":"1"},{"key":"196_CR15","volume-title":"Der Wert des Privaten","author":"B R\u00f6ssler","year":"2001","unstructured":"R\u00f6ssler B (2001) Der Wert des Privaten. Suhrkamp (Suhrkamp Taschenbuch Wissenschaft, 1530), Frankfurt a.\u00a0M."},{"key":"196_CR16","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-90-6704-731-9_2","volume-title":"Innovating government","author":"A Vedder","year":"2011","unstructured":"Vedder A (2011) Privacy 3.0. In: van der Hof S, Groothuis MM (Hrsg) Innovating government, Bd.\u00a020. T. M. C. Asser Press (Information Technology and Law Series), Hague, S\u00a017\u201328"},{"key":"196_CR17","unstructured":"Warren SD, Brandeis LD (1890) The Right to Privacy. In: Harvard Law Review 1890, 05.12.1890 (Nr. 5), S\u00a01\u201337. http:\/\/groups.csail.mit.edu\/mac\/classes\/6.805\/articles\/privacy\/Privacy_brand_warr2.html . Zugegriffen: 2. Sept. 2015"},{"issue":"3","key":"196_CR18","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"256","author":"M Weiser","year":"1991","unstructured":"Weiser M (1991) The computer fort he 21st Century. Sci Am 256(3):94\u2013104","journal-title":"Sci Am"},{"key":"196_CR19","unstructured":"Xu H, Rosson MB, Gupta S, Caroll JM (2012) Measuring Mobile User\u2019s Privacy Concerns for Information Privacy. Thirty Third International Conference on Information Systems"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-015-0196-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s40702-015-0196-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-015-0196-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T05:07:32Z","timestamp":1559624852000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s40702-015-0196-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,23]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["196"],"URL":"https:\/\/doi.org\/10.1365\/s40702-015-0196-3","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,23]]}}}