{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T09:48:25Z","timestamp":1695980905891},"reference-count":17,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"3","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1365\/s40702-020-00606-x","type":"journal-article","created":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T13:07:13Z","timestamp":1584364033000},"page":"571-583","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Weird Sociotechnical Systems"],"prefix":"10.1365","volume":"57","author":[{"given":"Sebastian","family":"Klipper","sequence":"first","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"606_CR1","unstructured":"Bratus S, Locasto ME, Patterson ML, Sassaman L, Shubina A (2016) Exploit programming from buffer overflows to \u201cweird machines\u201d and theory of computation. http:\/\/langsec.org\/papers\/Bratus.pdf. Zugegriffen: 16. Febr. 2020"},{"key":"606_CR2","volume-title":"Assumption of breach: the new security paradigm","author":"J Carr","year":"2014","unstructured":"Carr\u00a0J (2014) Assumption of breach: the new security paradigm. Oreilly, Sebastopol"},{"key":"606_CR3","doi-asserted-by":"publisher","DOI":"10.1515\/9783486859164","volume-title":"IT-Sicherheit: Methoden \u2013 Verfahren \u2013 Protokolle","author":"C Eckert","year":"2014","unstructured":"Eckert\u00a0C (2014) IT-Sicherheit: Methoden \u2013 Verfahren \u2013 Protokolle, 9.\u00a0Aufl. Oldenbourg, M\u00fcnchen","edition":"9"},{"key":"606_CR4","unstructured":"Friemel C (2018) Interesse an verschl\u00fcsselten Mails steigt. https:\/\/newsroom.gmx.net\/2018\/08\/24\/interesse-an-verschluesselten-mails-steigt\/. Zugegriffen: 16. Febr. 2020"},{"key":"606_CR5","unstructured":"Green M (2018) Was the Efail disclosure horribly screwed up? https:\/\/blog.cryptographyengineering.com\/2018\/05\/17\/was-the-efail-disclosure-horribly-screwed-up\/. Zugegriffen: 16. Febr. 2020"},{"key":"606_CR7","volume-title":"ISO\/IEC 31010:2009\u2014Risk management\u2014Risk assessment techniques","author":"ISO\/IEC","year":"2009","unstructured":"ISO\/IEC (2009) ISO\/IEC 31010:2009\u2014Risk management\u2014Risk assessment techniques"},{"key":"606_CR6","volume-title":"ISO\/IEC 27001:2013\u2014information technology\u2014Security techniques\u2014Information security management systems\u2014Requirements, A.12.6\u2014Technical vulnerability management","author":"ISO\/IEC","year":"2013","unstructured":"ISO\/IEC (2013) ISO\/IEC 27001:2013\u2014information technology\u2014Security techniques\u2014Information security management systems\u2014Requirements, A.12.6\u2014Technical vulnerability management"},{"key":"606_CR9","unstructured":"Klipper S (2017) Homo Carens Securitate: Der Mensch, der den Mangel an Sicherheit leidet: Vom Homo Oeconomicus zum Weird Human (Einreichung und Vortrag beim 4. Forschungstag NRW). https:\/\/cyclesec.com\/wp-content\/uploads\/CfP-Einreichung-ForschungstagNRW2017.pdf. Zugegriffen: 16. Febr. 2020"},{"key":"606_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-8348-2164-5","volume-title":"Konfliktmanagement f\u00fcr Sicherheitsprofis","author":"S Klipper","year":"2015","unstructured":"Klipper\u00a0S (2015) Konfliktmanagement f\u00fcr Sicherheitsprofis, 2.\u00a0Aufl. Springer Vieweg, Wiesbaden","edition":"2"},{"key":"606_CR10","volume-title":"Der Faktor Mensch in der Informationssicherheit, Kurseinheit EIS04 der Wilhelm B\u00fcchner Hochschule, Darmstadt","author":"S Klipper","year":"2017","unstructured":"Klipper\u00a0S, Spangenberg\u00a0M (2017) Der Faktor Mensch in der Informationssicherheit, Kurseinheit EIS04 der Wilhelm B\u00fcchner Hochschule, Darmstadt"},{"key":"606_CR11","unstructured":"MITRE Corporation (2019) CWE\u2122\u2014A community-developed list of common software security weaknesses V.3.4.1. https:\/\/cwe.mitre.org\/. Zugegriffen: 16. Febr. 2020"},{"key":"606_CR12","unstructured":"M\u00fcller J, Brinkmann M, Poddebniak D, B\u00f6ck H, Schinzel S, Somorovsky J, Schwenk J (2019) \u201cJohnny, you are fired!\u201d\u2014spoofing openPGP and S\/MIME signatures in emails. https:\/\/www.usenix.org\/system\/files\/sec19fall_muller_prepub.pdf. Zugegriffen: 16. Febr. 2020"},{"key":"606_CR13","unstructured":"Poddebniak D, Dresen C, M\u00fcller J, Ising F, Schinzel S, Friedberger S, Somorovsky J, Schwenk J (2018) Efail: breaking S\/MIME and OpenPGP email encryption using exfiltration channels. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity18\/sec18-poddebniak.pdf. Zugegriffen: 16. Febr. 2020"},{"key":"606_CR14","unstructured":"Ropohl G (2009) Allgemeine Technologie. https:\/\/publikationen.bibliothek.kit.edu\/1000011529\/924536. Zugegriffen: 16. Febr. 2020"},{"key":"606_CR15","volume-title":"Secrets & Lies: IT-Sicherheit in einer vernetzten Welt","author":"B Schneier","year":"2001","unstructured":"Schneier\u00a0B (2001) Secrets & Lies: IT-Sicherheit in einer vernetzten Welt. dpunkt.verlag, Heidelberg"},{"key":"606_CR16","volume-title":"Arbeitssituationsanalyse","author":"O Strohm","year":"2011","unstructured":"Strohm\u00a0O, Ulrich\u00a0E (2011) Unternehmen umfassend bewerten. In: Meyn\u00a0C, Peter\u00a0G, Dechmann\u00a0U, Georg\u00a0A, Katenkamp\u00a0O (Hrsg) Arbeitssituationsanalyse. VS, Wiesbaden"},{"key":"606_CR17","volume-title":"Einf\u00fchrung in die Allgemeine Betriebswirtschaftslehre","author":"G W\u00f6he","year":"2016","unstructured":"W\u00f6he\u00a0G (2016) Einf\u00fchrung in die Allgemeine Betriebswirtschaftslehre, 26.\u00a0Aufl. Vahlen, M\u00fcnchen","edition":"26"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-020-00606-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s40702-020-00606-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-020-00606-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T17:58:29Z","timestamp":1695923909000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s40702-020-00606-x"}},"subtitle":["Wie Menschen, Maschinen und Organisationen angegriffen werden, um die Sicherheit der soziotechnischen Systeme zu kompromitieren, in die sie eingebettet sind","How People, Machines and Organizations are Attacked to Compromise the Security of the Socio-Technical Systems in Which They are Embedded"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["606"],"URL":"https:\/\/doi.org\/10.1365\/s40702-020-00606-x","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"24 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}