{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:24:49Z","timestamp":1740173089298,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"3","license":[{"start":{"date-parts":[[2020,5,21]],"date-time":"2020-05-21T00:00:00Z","timestamp":1590019200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,21]],"date-time":"2020-05-21T00:00:00Z","timestamp":1590019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1365\/s40702-020-00623-w","type":"journal-article","created":{"date-parts":[[2020,5,21]],"date-time":"2020-05-21T11:03:34Z","timestamp":1590059014000},"page":"558-570","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Das Internet of Things \u2013 zwischen Usability und Verlust der Datensouver\u00e4nit\u00e4t","The Internet of Things \u2013 Between Usability and Loss of Data Sovereignty"],"prefix":"10.1365","volume":"57","author":[{"given":"Silvia","family":"Knittl","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6212-0492","authenticated-orcid":false,"given":"Valentina","family":"Neuberger","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Dieterle","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2020,5,21]]},"reference":[{"key":"623_CR1","unstructured":"Allianz f\u00fcr Cybersicherheit (2016) Security of IP-based surveillance cameras. https:\/\/www.allianz-fuer-cybersicherheit.de\/ACS\/DE\/_\/downloads\/BSI-CS\/BSI-CS_128E.pdf?__blob=publicationFile&v=2. Zugegriffen: 14. Dez. 2019"},{"key":"623_CR2","unstructured":"Ballin A (2019) Gesichtserkennung trotz Motorradhelm: Russische Firma liefert den Algorithmus f\u00fcr den \u00dcberwachungsstaat. https:\/\/www.handelsblatt.com\/technik\/digitale-revolution\/digitale-revolution-gesichtserkennung-trotz-motorradhelm-russische-firma-liefert-den-algorithmus-fuer-den-ueberwachungsstaat\/25217288.html. Zugegriffen: 26. Febr. 2020"},{"key":"623_CR3","unstructured":"BBC (2018) Fitness app Strava lights up staff at military bases, Bericht vom 29.01.2018. https:\/\/www.bbc.com\/news\/technology-42853072. Zugegriffen: 16. Dez. 2019"},{"key":"623_CR4","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (2019a) Die Lage der IT-Sicherheit in Deutschland 2019. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Lageberichte\/Lagebericht2019.pdf?__blob=publicationFile&v=6. Zugegriffen: 7. Dez. 2019"},{"key":"623_CR5","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (2019b) DIN-Spezifikation: Mehr Sicherheit im Smart Home. https:\/\/www.bsi.bund.de\/DE\/Presse\/Pressemitteilungen\/Presse2019\/Basissicherheit-Smart-Home-060519.html;jsessionid=974DD09B58105A730A98C2CFCB39B733.2_cid341. Zugegriffen: 16. Dez. 2019"},{"key":"623_CR6","unstructured":"Europ\u00e4ische Union (2019) Regulation (EU) 2019\/881 of the European Parliament and of the Council of 17 April 2019on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526\/2013 (Cybersecurity Act) (Text with EEA relevance). Official Journal of the European Union, L 151\/15. https:\/\/eur-lex.europa.eu\/eli\/reg\/2019\/881\/oj Gesehen 7. Dez. 2019"},{"key":"623_CR3333","unstructured":"Initiative D21 \u2013 Arbeitsgruppe Innovativer Staat (2019) DENKIMPULS INNOVATIVER STAAT: Datensouver\u00e4nit\u00e4t \u2013 Datenschutz neu verstehen.\nMai 2019. https:\/\/initiatived21.de\/app\/uploads\/2019\/05\/denkimpuls_datenschutz-neu-verstehen_20190528.pdf. Zugegriffen: 11.12.2019"},{"key":"623_CR7","series-title":"Technical Report 01-2017","volume-title":"Security mechanisms of wireless building automation systems","author":"K Jonas","year":"2017","unstructured":"Jonas\u00a0K, Vogl\u00a0B, Rademacher\u00a0M (2017) Security mechanisms of wireless building automation systems. Technical Report 01-2017. Prof. Dr. Wolfgang Heiden, Hochschule Bonn-Rhein-Sieg, Sankt Augustin"},{"key":"623_CR8","unstructured":"Kaspersky (2019) IoT under fire: Kaspersky detects more than 100 million attacks on smart devices in H1 2019. https:\/\/www.kaspersky.com\/about\/press-releases\/2019_iot-under-fire-kaspersky-detects-more-than-100-million-attacks-on-smart-devices-in-h1-2019. Zugegriffen: 7. Dez. 2019"},{"key":"623_CR10","unstructured":"Krause T, Strau\u00df O, Scheffler G, Kett H, Schaefer K, Renner T (2017) IT-Plattformen f\u00fcr das Internet der Dinge (IOT). Fraunhofer IAO. https:\/\/www.digital.iao.fraunhofer.de\/de\/publikationen\/MarktstudieIT-PlattformenfuerdasInternetderDingeIoT.html. Zugegriffen: 7. Dez. 2019"},{"key":"623_CR9","doi-asserted-by":"crossref","unstructured":"Kushner D (2013) The Real Story of Stuxnet. https:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet. Zugegriffen: 14. Dez. 2019","DOI":"10.1109\/MSPEC.2013.6471059"},{"issue":"2","key":"623_CR11","doi-asserted-by":"publisher","first-page":"2103","DOI":"10.1109\/JIOT.2018.2869847","volume":"6","author":"Y Lu","year":"2019","unstructured":"Lu\u00a0Y, Xu\u00a0L (2019) Internet of things (IoT) Cybersecurity research: a review of current research topics. IEEE Internet Things\u00a0J 6(2):2103\u20132115. https:\/\/doi.org\/10.1109\/JIOT.2018.2869847 (https:\/\/ieeexplore.ieee.org\/document\/8462745 Gesehen 07.12.2019)","journal-title":"IEEE Internet Things J"},{"key":"623_CR12","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/984622.984660","volume-title":"The sybil attack in sensor networks: analysis & defenses","author":"J Newsome","year":"2004","unstructured":"Newsome\u00a0J, Shi\u00a0E, Song\u00a0D, Perrig\u00a0A (2004) The sybil attack in sensor networks: analysis & defenses. IPSN \u201904: Proceedings of the 3rd international symposium on Information processing in sensor networks, S\u00a0259\u2013268 https:\/\/doi.org\/10.1145\/984622.984660"},{"key":"623_CR13","volume-title":"The spy in the coffee machine: the end of privacy as we know it","author":"K O\u2019Hara","year":"2008","unstructured":"O\u2019Hara\u00a0K, Shadbolt\u00a0N (2008) The spy in the coffee machine: the end of privacy as we know it. Oneworld, Oxford"},{"key":"623_CR14","unstructured":"Sugawara T, Cyr B, Rampazzi S, Genkin D, Fu K (2019) Light commands: laser-based audio injection on voice-controllable systems. https:\/\/lightcommands.com\/20191104-Light-Commands.pdf. Zugegriffen: 18. Dez. 2019"},{"key":"623_CR15","unstructured":"World Economic Forum (2019) Shaping the Future of Technology Governance: IoT, Robotics and Smart Cities. https:\/\/www.weforum.org\/platforms\/shaping-the-future-of-technology-governance-iot-robotics-and-smart-cities. Zugegriffen: 11. Dez. 2019"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-020-00623-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s40702-020-00623-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-020-00623-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T23:06:49Z","timestamp":1621552009000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s40702-020-00623-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,21]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["623"],"URL":"https:\/\/doi.org\/10.1365\/s40702-020-00623-w","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"type":"print","value":"1436-3011"},{"type":"electronic","value":"2198-2775"}],"subject":[],"published":{"date-parts":[[2020,5,21]]},"assertion":[{"value":"18 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}