{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T04:02:43Z","timestamp":1692676963346},"reference-count":18,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"1","license":[{"start":{"date-parts":[[2017,1,4]],"date-time":"2017-01-04T00:00:00Z","timestamp":1483488000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1365\/s40702-016-0285-y","type":"journal-article","created":{"date-parts":[[2017,1,4]],"date-time":"2017-01-04T14:56:08Z","timestamp":1483541768000},"page":"111-123","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["IT-Risikomanagement von Cloud-Dienstleistungen im Kontext des IT-Sicherheitsgesetzes","IT Risk Management of Cloud Computing Services in the Context of the German IT Security Law"],"prefix":"10.1365","volume":"54","author":[{"given":"Michael","family":"Adelmeyer","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Petrick","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Teuteberg","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2017,1,4]]},"reference":[{"key":"285_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-658-01115-4","volume-title":"IT security risk management \u2013 perceived IT security risks in the context of cloud computing","author":"T Ackermann","year":"2013","unstructured":"Ackermann T (2013) IT security risk management \u2013 perceived IT security risks in the context of cloud computing. Springer Gabler, Wiesbaden"},{"key":"285_CR2","volume-title":"Verordnung zur Bestimmung Kritischer Infrastrukturen nach dem BSI-Gesetz (BSI-Kritisverordnung \u2013 BSI-KritisV)","author":"BMI","year":"2016","unstructured":"BMI (2016) Verordnung zur Bestimmung Kritischer Infrastrukturen nach dem BSI-Gesetz (BSI-Kritisverordnung \u2013 BSI-KritisV). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/IT_SiG\/BSI_Kritis_VO.pdf . Zugegriffen: 15. September 2016"},{"key":"285_CR3","volume-title":"Eckpunktepapier Sicherheitsempfehlungen f\u00fcr Cloud Computing Anbieter","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik","year":"2012","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (2012) Eckpunktepapier Sicherheitsempfehlungen f\u00fcr Cloud Computing Anbieter. BSI, Bonn"},{"key":"285_CR4","volume-title":"Anforderungskatalog Cloud Computing \u2013 Kriterien zur Beurteilung der Informationssicherheit von Cloud-Diensten","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik","year":"2016","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (2016a) Anforderungskatalog Cloud Computing \u2013 Kriterien zur Beurteilung der Informationssicherheit von Cloud-Diensten. BSI, Bonn"},{"key":"285_CR5","volume-title":"Orientierungshilfe zu Inhalten und Anforderungen an branchenspezifische Sicherheitsstandards (B3S) gem\u00e4\u00df \u00a7 8a (2) BSIG","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik","year":"2016","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (2016b) Orientierungshilfe zu Inhalten und Anforderungen an branchenspezifische Sicherheitsstandards (B3S) gem\u00e4\u00df \u00a7 8a (2) BSIG. BSI, Bonn"},{"key":"285_CR6","doi-asserted-by":"crossref","DOI":"10.1515\/9783486859164","volume-title":"IT-Sicherheit: Konzepte-Verfahren-Protokolle","author":"C Eckert","year":"2014","unstructured":"Eckert C (2014) IT-Sicherheit: Konzepte-Verfahren-Protokolle. de Gruyter, Oldenbourg"},{"key":"285_CR7","volume-title":"Vorschlag f\u00fcr eine Richtlinie des europ\u00e4ischen Parlaments und des Rates \u00fcber Ma\u00dfnahmen zur Gew\u00e4hrleistung einer hohen gemeinsamen Netz- und Informationssicherheit in der Union. COM\/2013\/48\/FINAL","author":"EU-Kommission","year":"2013","unstructured":"EU-Kommission (2013) Vorschlag f\u00fcr eine Richtlinie des europ\u00e4ischen Parlaments und des Rates \u00fcber Ma\u00dfnahmen zur Gew\u00e4hrleistung einer hohen gemeinsamen Netz- und Informationssicherheit in der Union. COM\/2013\/48\/FINAL"},{"key":"285_CR8","first-page":"244","volume":"6","author":"M Goldshteyn","year":"2015","unstructured":"Goldshteyn M, Adelmeyer M (2015) Die Auswirkungen des IT-Sicherheitsgesetzes auf die Interne Revision. Z Interne Revis 6:244\u2013255","journal-title":"Z Interne Revis"},{"key":"285_CR9","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s11623-016-0538-5","volume":"1","author":"W Grudzien","year":"2016","unstructured":"Grudzien W (2016) IT-Sicherheitsgesetz \u2013 Gedanken zur Implementierung. Datenschutz Datensicherh 1:29\u201333","journal-title":"Datenschutz Datensicherh"},{"key":"285_CR10","volume-title":"Praxisorientiertes IT-Risikomanagement: Konzeption, Implementierung und \u00dcberpr\u00fcfung","author":"M Knoll","year":"2014","unstructured":"Knoll M (2014) Praxisorientiertes IT-Risikomanagement: Konzeption, Implementierung und \u00dcberpr\u00fcfung. dpunkt.verlag, Heidelberg"},{"key":"285_CR11","volume-title":"Cloud Monitor 2016","author":"KPMG","year":"2016","unstructured":"KPMG (2016) Cloud Monitor 2016. KPMG, Berlin"},{"key":"285_CR12","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-145","volume-title":"The NIST definition of cloud computing","author":"P Mell","year":"2011","unstructured":"Mell P, Grance T (2011) The NIST definition of cloud computing. NIST Special Publication, Gaithersburg"},{"key":"285_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-1-4471-4189-1_1","volume-title":"Privacy and security for cloud computing","year":"2013","unstructured":"Pearson S, Yee G (Hrsg) (2013) Privacy and security for cloud computing. Springer, London, S\u00a03\u201342"},{"key":"285_CR14","volume-title":"Handreichung zum \u201eStand der Technik\u201c im Sinne des IT-Sicherheitsgesetzes (ITSiG)","author":"TeleTrusT \u2013 Bundesverband IT-Sicherheit e.\u202fV.","year":"2016","unstructured":"TeleTrusT \u2013 Bundesverband IT-Sicherheit e.\u202fV. (2016) Handreichung zum \u201eStand der Technik\u201c im Sinne des IT-Sicherheitsgesetzes (ITSiG). TeleTrusT, Berlin"},{"key":"285_CR15","doi-asserted-by":"crossref","first-page":"290","DOI":"10.15358\/0935-0381-2015-6-290","volume":"27","author":"F Teuteberg","year":"2015","unstructured":"Teuteberg F (2015) Kennzahlengest\u00fctztes Risikomanagement zum Monitoring von IT-Outsourcing-Aktivit\u00e4ten am Beispiel des Cloud Computing. Controlling 27:290\u2013299","journal-title":"Controlling"},{"key":"285_CR16","volume-title":"Best-Practice-Empfehlungen f\u00fcr Anforderungen an Lieferanten zur Gew\u00e4hrleistung der Informationssicherheit in Kritischen Infrastrukturen","author":"UP KRITIS","year":"2016","unstructured":"UP KRITIS (2016) Best-Practice-Empfehlungen f\u00fcr Anforderungen an Lieferanten zur Gew\u00e4hrleistung der Informationssicherheit in Kritischen Infrastrukturen. http:\/\/www.kritis.bund.de\/SharedDocs\/Downloads\/Kritis\/DE\/Anforderungen_an_Lieferanten.pdf . Zugegriffen: 15. September 2016"},{"key":"285_CR17","volume-title":"Proceedings of the 3rd International Conference on Future Internet of Things and Cloud","author":"C Wagner","year":"2015","unstructured":"Wagner C, Hudic A, Maksuti S et\u00a0al (2015) Impact of critical infrastructure requirements on service migration guidelines to the cloud. In: Proceedings of the 3rd International Conference on Future Internet of Things and Cloud Rom. IEEE Computer Society, Washington DC"},{"key":"285_CR18","series-title":"Technical Report","volume-title":"Secure cloud computing for critical infrastructure: a\u00a0survey","author":"YA Younis","year":"2013","unstructured":"Younis YA, Merabti M, Kifayat K (2013) Secure cloud computing for critical infrastructure: a\u00a0survey. Technical Report. John Moores University, Liverpool"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-016-0285-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s40702-016-0285-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-016-0285-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T14:55:19Z","timestamp":1692629719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s40702-016-0285-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,4]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["285"],"URL":"https:\/\/doi.org\/10.1365\/s40702-016-0285-y","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,4]]}}}