{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:43:51Z","timestamp":1764996231422,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"3","license":[{"start":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T00:00:00Z","timestamp":1588032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T00:00:00Z","timestamp":1588032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100009057","name":"University of Graz","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100009057","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2020,6]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title><jats:p>Die Digitalisierung hat in den letzten Jahren ein komplexes, sich scheinbar st\u00e4ndig ver\u00e4nderndes Feld m\u00f6glicher Risiken hervorgebracht, dessen Ausma\u00dfe f\u00fcr Unternehmen zunehmend schwer erkennbar sind. Entsprechend wichtig wird die Frage, wie Entscheidungstr\u00e4gerInnen und MitarbeiterInnen Gefahren im digitalen Raum besser erkennen, ad\u00e4quat einsch\u00e4tzen und auf diese reagieren k\u00f6nnen. Da sich Entscheidungstr\u00e4gerInnen in kleineren KMU meist \u00fcber Internetrecherchen oder in der Tagespresse \u00fcber Cybersecurity informieren, h\u00e4ngt ihre Risikoeinsch\u00e4tzung und Ma\u00dfnahmensetzung davon ab, wie Cybersecurity-Themen in diversen Medien dargestellt und diskutiert werden. Basierend auf einer Diskursanalyse von 504 Medienberichten zum Thema Cybersecurity in Unternehmen zwischen 2010 und 2019 kommt der Beitrag zu dem Ergebnis, dass sich die Medien weniger an langfristig bestehenden Bedrohungslagen orientiert haben, sondern vielmehr an den spektakul\u00e4rsten Zwischenf\u00e4llen und typischen Rollenverteilungen zwischen \u201eGut\u201c und \u201eB\u00f6se\u201c. Insgesamt wurde der Cyberspace als ein unsicherer Raum f\u00fcr Unternehmen dargestellt \u2013 teilweise aufgrund des Verhaltens ihrer eigenen MitarbeiterInnen. F\u00fcr IT-Unternehmen, Polizeibeh\u00f6rden und die Forschung bedeutet der Nachvollzug des medialen Cybersecurity-Diskurses eine verbesserte Einsicht in die selektive und situative Behandlung von Bedrohungslagen durch Medien und die damit verbundenen Verzerrungen unternehmerischer Risikoeinsch\u00e4tzungen. Zentral f\u00fcr die unternehmerische Cybersecurity ist zudem die Kompetenz der MitarbeiterInnen, die Gefahren akkurat erkennen zu k\u00f6nnen.<\/jats:p>","DOI":"10.1365\/s40702-020-00618-7","type":"journal-article","created":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T07:02:47Z","timestamp":1588057367000},"page":"584-596","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cybersecurity im medialen Diskurs","Cybersecurity in Media Discourse"],"prefix":"10.1365","volume":"57","author":[{"given":"Eva-Maria","family":"Griesbacher","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3196-565X","authenticated-orcid":false,"given":"Martin","family":"Griesbacher","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2020,4,28]]},"reference":[{"key":"618_CR1","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3390\/fi11030073","volume":"11","author":"H Aldawood","year":"2019","unstructured":"Aldawood\u00a0H, Skinner\u00a0G (2019) Reviewing cyber security social engineering training and awareness programs\u2014Pitfalls and ongoing issues. Future Internet 11:73. https:\/\/doi.org\/10.3390\/fi11030073","journal-title":"Future Internet"},{"issue":"2","key":"618_CR2","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1177\/1206331211430016","volume":"15","author":"D Barnard-Wills","year":"2012","unstructured":"Barnard-Wills\u00a0D, Ashenden\u00a0D (2012) Securing virtual space: cyber war, cyber terror, and risk. Space Cult 15(2):110\u2013123","journal-title":"Space Cult"},{"issue":"2","key":"618_CR3","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1590\/0034-7329201500202","volume":"58","author":"L Cruz Lobato","year":"2015","unstructured":"Cruz Lobato\u00a0L, Kenkel\u00a0KM (2015) Discourses of cyberspace securitization in Brazil and in the United States. Rev Bras Pol\u00edt Int 58(2):23\u201343","journal-title":"Rev Bras Pol\u00edt Int"},{"issue":"1","key":"618_CR4","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1300\/J516v04n01_03","volume":"4","author":"M Dunn Cavelty","year":"2008","unstructured":"Dunn Cavelty\u00a0M (2008) Cyber-terror\u2014Looming threat or phantom menace? The framing of the US cyber-threat debate. J\u00a0Inf Technol Polit 4(1):19\u201336","journal-title":"J Inf Technol Polit"},{"key":"618_CR5","unstructured":"ENISA (2019) Enisa threat landscapes. www.enisa.europa.eu. Zugegriffen: 29. Sept. 2019"},{"key":"618_CR6","doi-asserted-by":"publisher","DOI":"10.2838\/552336","volume-title":"Special Eurobarometer 431 \u201eData protection\u201c","author":"Eurobarometer","year":"2015","unstructured":"Eurobarometer (2015) Special Eurobarometer 431 \u201eData protection\u201c https:\/\/doi.org\/10.2838\/552336"},{"key":"618_CR7","doi-asserted-by":"publisher","first-page":"4667","DOI":"10.1002\/sec.1657","volume":"9","author":"M Evans","year":"2016","unstructured":"Evans\u00a0M, Maglaras\u00a0LA, He\u00a0Y, Janicke\u00a0H (2016) Human behaviour as an aspect of cybersecurity assurance. Secur Commun Netw 9:4667\u20134679. https:\/\/doi.org\/10.1002\/sec.1657","journal-title":"Secur Commun Netw"},{"key":"618_CR8","volume-title":"Kapitalistischer Realismus","author":"G Franck","year":"2010","unstructured":"Franck\u00a0G (2010) Kapitalismus Zweipunktnull: \u00dcber die Kommerzialisierung der \u00d6konomie der Aufmerksamkeit. In: Neckel\u00a0S (Hrsg) Kapitalistischer Realismus. Campus, Frankfurt a.M."},{"key":"618_CR9","unstructured":"Hillebrand A, Niederpr\u00fcm A, Sch\u00e4fer S, Thile S, Henseler-Unger I (2017) Aktuelle Lage der IT-Sicherheit in KMU, Bad Honnef: Wissenschaftliches Instiut f\u00fcr Infrastruktur und Kommunikationsdienste. https:\/\/www.it-sicherheit-in-der-wirtschaft.de\/ITS\/Redaktion\/DE\/PDF-Anlagen\/Studien\/aktuelle-lage-der-it-sicherheit-in-kmu-langfassung.pdf. Zugegriffen: 14. Juni 2019"},{"key":"618_CR10","volume-title":"LAE 3.0 \u2013 Leseranalyse Entscheidungstr\u00e4ger 2018","author":"IFES Institut f\u00fcr empirische Sozialforschung","year":"2018","unstructured":"IFES Institut f\u00fcr empirische Sozialforschung (2018) LAE 3.0 \u2013 Leseranalyse Entscheidungstr\u00e4ger 2018. Prorecon, Wien"},{"key":"618_CR11","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ijinfomgt.2018.10.017","volume":"45","author":"L Li","year":"2019","unstructured":"Li\u00a0L, He\u00a0W, Xu\u00a0L, Ash\u00a0I, Anwar\u00a0M, Yuan\u00a0X (2019) Investigating the impact of cybersecurity policy awareness on employees\u2019 cybersecurity behavior. Int J Inf Manage 45:13\u201324. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.10.017","journal-title":"Int J Inf Manage"},{"key":"618_CR12","volume-title":"Die Natur der Gesellschaft. Verhandlungen des 33. Kongresses der Deutschen Gesellschaft f\u00fcr Soziologie in Kassel 2006","author":"HA Mieg","year":"2008","unstructured":"Mieg\u00a0HA (2008) Expertisierung vs. Professionalisierung: relative und andere Experten aus Sicht der psychologischen Expertiseforschung. In: Rehberg\u00a0KS (Hrsg) Die Natur der Gesellschaft. Verhandlungen des 33. Kongresses der Deutschen Gesellschaft f\u00fcr Soziologie in Kassel 2006. Campus, Frankfurt a.M."},{"key":"618_CR13","first-page":"54","volume-title":"CEUR Workshop Proceedings, 9th Conference on Semantic Technology for Intelligence, Defense, and Security","author":"A Oltramari","year":"2014","unstructured":"Oltramari\u00a0A, Cranor\u00a0LF, Walls\u00a0JR, McDaniel\u00a0P (2014) Building an ontology of cyber security. In: CEUR Workshop Proceedings, 9th Conference on Semantic Technology for Intelligence, Defense, and Security Fairfax, United States, S\u00a054\u201361"},{"key":"618_CR14","unstructured":"Reichmann S, Griesbacher M (2017) Data report: Assurance and certification of privacy and security of ICT products and services as a\u00a0question of trust, acceptance and perceived risks across Europe (Deliverable 3.1). TRUESSEC.eu, EC H2020 Project Nr 731711. https:\/\/cordis.europa.eu\/project\/id\/731711\/results. Zugegriffen: 1. Dez. 2019"},{"key":"618_CR15","unstructured":"Reichmann S, Griesbacher M (2018) Current exemplary discourse dynamics in the field of privacy and security assurance (Deliverable 3.2). TRUESSEC.eu, EC H2020 Project nr 731711. https:\/\/cordis.europa.eu\/project\/id\/731711\/results. Zugegriffen: 1. Dez. 2019"},{"key":"618_CR16","volume-title":"Grundlagen und Anwendungen von Information Security Awareness. Mitarbeiter zielgerichtet f\u00fcr Informationssicherheit sensibilisieren","author":"K Weber","year":"2019","unstructured":"Weber\u00a0K, Sch\u00fctz\u00a0AE, Fertig\u00a0T (2019) Grundlagen und Anwendungen von Information Security Awareness. Mitarbeiter zielgerichtet f\u00fcr Informationssicherheit sensibilisieren. Springer, Wiesbaden"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-020-00618-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s40702-020-00618-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-020-00618-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T23:08:04Z","timestamp":1619564884000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s40702-020-00618-7"}},"subtitle":["Risikoeinsch\u00e4tzung als Herausforderung f\u00fcr Unternehmen","Risk Perception as a Challenge for Companies"],"short-title":[],"issued":{"date-parts":[[2020,4,28]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["618"],"URL":"https:\/\/doi.org\/10.1365\/s40702-020-00618-7","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"type":"print","value":"1436-3011"},{"type":"electronic","value":"2198-2775"}],"subject":[],"published":{"date-parts":[[2020,4,28]]},"assertion":[{"value":"30 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}