{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T16:20:04Z","timestamp":1649089204992},"reference-count":10,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"2","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1365\/s40702-016-0211-3","type":"journal-article","created":{"date-parts":[[2016,4,5]],"date-time":"2016-04-05T16:20:22Z","timestamp":1459873222000},"page":"254-264","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["IT-Konsumerisierung: Strategien und Ma\u00dfnahmen in mittelst\u00e4ndischen Unternehmen"],"prefix":"10.1365","volume":"53","author":[{"given":"Matthias","family":"von Entre\u00df-F\u00fcrsteneck","sequence":"first","affiliation":[]},{"given":"Nils","family":"Urbach","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Buck","sequence":"additional","affiliation":[]},{"given":"Torsten","family":"Eymann","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2016,4,5]]},"reference":[{"key":"211_CR1","volume-title":"Best practices for exploiting the Consumerization of information technologies \u2013 leveraging the benefits, avoiding the pitfalls","author":"Aerospace Industries Association","year":"2011","unstructured":"Aerospace Industries Association (2011) Best Practices for Exploiting the Consumerization of Information Technologies \u2013 Leveraging the Benefits, Avoiding the Pitfalls. http:\/\/www.aia-aerospace.org\/assets\/report_consumerization.pdf , Zugegriffen: M\u00e4rz 2016"},{"issue":"1","key":"211_CR2","first-page":"10","volume":"2013","author":"W Boelmann","year":"2013","unstructured":"Boelmann W (2013) Bring your own device? Disaster? Everything? Business Technology (1):10\u201316","journal-title":"Bus Technol"},{"key":"211_CR3","volume-title":"Studie zur IT-Sicherheit in kleinen und mittleren Unternehmen \u2013 Grad der Sensibilisierung des Mittelstandes in Deutschland","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik","year":"2011","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (2011) Studie zur IT-Sicherheit in kleinen und mittleren Unternehmen \u2013 Grad der Sensibilisierung des Mittelstandes in Deutschland. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Studien\/KMU\/Studie_IT-Sicherheit_KMU.pdf?__blob=publicationFile , Zugegriffen: M\u00e4rz 2016"},{"key":"211_CR4","unstructured":"Computerwoche (2014) IDC-Studie: Choose your own Device hat Bring your own Device \u00fcberholt (49):8\u20139"},{"key":"211_CR5","volume-title":"The genie is out of the bottle: managing the infiltration of consumer IT into the Workforce","author":"J Harris","year":"2011","unstructured":"Harris J, Ives B, Junglas I (2011) The Genie is out of the Bottle: Managing the Infiltration of Consumer IT into the Workforce. Accenture Institute for High Performance. http:\/\/nstore.accenture.com\/IM\/FinancialServices\/AccentureLibrary\/data\/pdf\/genie-out-of-bottle-it-workforce.pdf , Zugegriffen: M\u00e4rz 2016"},{"key":"211_CR6","volume-title":"How to build a consumerization of IT strategy. Microsoft recommendations for a consumerization of IT strategy","author":"A Harteveld","year":"2012","unstructured":"Harteveld A (2012) How to build a consumerization of IT strategy. Microsoft recommendations for a consumerization of IT strategy. http:\/\/az370354.vo.msecnd.net\/whitepapers\/How-to-build-a-consumerization-of-IT-strategy.pdf , Zugegriffen: M\u00e4rz 2016"},{"key":"211_CR7","volume-title":"IT-Organisation in KMU","author":"C Payr","year":"2003","unstructured":"Payr C (2003) IT-Organisation in KMU. Josef Eul, Lohmar, K\u00f6ln"},{"key":"211_CR8","volume-title":"Consumerization of IT \u2013 managing and securing consumerized enterprise IT","author":"Trend Micro","year":"2011","unstructured":"Trend Micro (2011) Consumerization of IT \u2013 managing and securing consumerized enterprise IT. http:\/\/www.trendmicro.co.uk\/media\/wp\/consumerization-of-it-whitepaper-en.pdf , Zugegriffen: M\u00e4rz 2016"},{"issue":"6","key":"211_CR9","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/s11576-012-0338-y","volume":"54","author":"F Wei\u00df","year":"2012","unstructured":"Wei\u00df F, Leimeister JM (2012) Consumerization. IT-Innovationen aus dem Konsumentenumfeld als Herausforderung f\u00fcr die Unternehmens-IT. Wirtschaftsinformatik 54(6):351\u2013354","journal-title":"Wirtschaftsinformatik"},{"key":"211_CR10","volume-title":"Consumerization: Herausforderungen f\u00fcr das betriebliche Informationsmanagement durch iPhone und Co","author":"F Wei\u00df","year":"2013","unstructured":"Wei\u00df F, Leimeister JM (2013) Consumerization: Herausforderungen f\u00fcr das betriebliche Informationsmanagement durch iPhone und Co. 11th International Conference on Wirtschaftsinformatik, 27th February\u201301st March 2013, Leipzig, Germany"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-016-0211-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s40702-016-0211-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-016-0211-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T05:07:32Z","timestamp":1559624852000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s40702-016-0211-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":10,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["211"],"URL":"https:\/\/doi.org\/10.1365\/s40702-016-0211-3","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}