{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:24:38Z","timestamp":1740173078130,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"4","license":[{"start":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T00:00:00Z","timestamp":1699574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T00:00:00Z","timestamp":1699574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012688","name":"Universit\u00e4t Rostock","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012688","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2024,8]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title><jats:p>Cybersicherheitsarchitekturen sind im F\u00f6deralsystem Deutschlands elementarer Bestandteil der digitalen Daseinsvorsorge f\u00fcr Gesellschaft, Wirtschaft und Verwaltung. In Deutschland stehen neben dem Bund alle L\u00e4nder vor vergleichbaren Herausforderungen, die Akteure ihrer Region dergestalt in eine Architektur einzubinden, dass eine gegen\u00fcber Cybersicherheitsbedrohungen resiliente IKT-Infrastruktur entsteht. Sofern die L\u00e4nder eine harmonisierte Architektur implementiert haben, kann die Gesamtarchitektur im Binnenverh\u00e4ltnis der L\u00e4nder in kooperativer und komplement\u00e4rer Zusammenarbeit mit dem Bund und f\u00fcr Europa aufwachsen. Das Ziel der hier vorgestellten Forschungsarbeit ist es, die Verzahnung der systemrelevanten Akteure der regionalen und f\u00f6deralen Cybersicherheit zu unterst\u00fctzen und zu vereinfachen. Konkret werden dazu sowohl die inter-organisationalen Prozesse und davon betroffenen Rollen und Organisationseinheiten bei Land, Kommune und Unternehmen der Privatwirtschaft als auch gemeinsam nutzbare Komponenten einer Cybersicherheitsorganisation betrachtet und in Form einer Unternehmensarchitektur dokumentiert, die zu einer Referenzarchitektur weiterentwickelt werden soll. Die Modellierung der Referenzarchitektur in der Modellierungssprache ArchiMate wird in Ausz\u00fcgen vorgestellt.<\/jats:p>","DOI":"10.1365\/s40702-023-01014-7","type":"journal-article","created":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T16:02:57Z","timestamp":1699632177000},"page":"1042-1058","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Referenzarchitektur Cybersicherheit im F\u00f6deralsystem Deutschlands","Reference Architecture Cybersecurity in the Federal System of Germany"],"prefix":"10.1365","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7967-2624","authenticated-orcid":false,"given":"Thomas","family":"Rehbohm","sequence":"first","affiliation":[]},{"given":"Kurt","family":"Sandkuhl","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2023,11,10]]},"reference":[{"key":"1014_CR1","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-658-14499-9_9","volume-title":"Das politische System der Bundesrepublik Deutschland: Eine Einf\u00fchrung","author":"K von Beyme","year":"2017","unstructured":"von Beyme\u00a0K (2017) Der F\u00f6deralismus. In: von Beyme\u00a0K (Hrsg) Das politische System der Bundesrepublik Deutschland: Eine Einf\u00fchrung. Springer, Wiesbaden, S\u00a0377\u2013417 https:\/\/doi.org\/10.1007\/978-3-658-14499-9_9"},{"key":"1014_CR2","first-page":"142","volume-title":"Cybersicherheitsstrategie f\u00fcr Deutschland 2021","author":"Bundesministerium des Innern, f\u00fcr Bau und Heimat","year":"2021","unstructured":"Bundesministerium des Innern, f\u00fcr Bau und Heimat (2021) Cybersicherheitsstrategie f\u00fcr Deutschland 2021, S\u00a0142"},{"key":"1014_CR3","unstructured":"European Union (2022) EUR-Lex\u201432022L2555\u2014EN\u2014EUR-Lex. https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555\/oj. Zugegriffen: 4. Mai 2023"},{"key":"1014_CR4","volume-title":"Enzyklop\u00e4die der Wirtschaftsinformatik : Online-Lexikon","author":"U Frank","year":"2008","unstructured":"Frank\u00a0U (2008) Konstruktionsorientierter Forschungsansatz. In: Kurbel\u00a0K, Becker\u00a0J, Gronau\u00a0N, Sinz\u00a0E, Suhl\u00a0L (Hrsg) Enzyklop\u00e4die der Wirtschaftsinformatik : Online-Lexikon. Oldenbourg, M\u00fcnchen (http:\/\/www.oldenbourg.de:8080\/wi-enzyklopaedie\/lexikon\/uebergreifendes\/Forschung-in-WI\/Konstruktionsorientierter-Forschungsansatz.)"},{"key":"1014_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-7908-2336-3_8","volume-title":"Wissenschaftstheorie und gestaltungsorientierte Wirtschaftsinformatik","author":"U Frank","year":"2009","unstructured":"Frank\u00a0U (2009) Die Konstruktion m\u00f6glicher Welten als Chance und Herausforderung der Wirtschaftsinformatik. In: Becker\u00a0J, Krcmar\u00a0H, Niehaves\u00a0B (Hrsg) Wissenschaftstheorie und gestaltungsorientierte Wirtschaftsinformatik. Physica, Heidelberg, S\u00a0167\u2013180 https:\/\/doi.org\/10.1007\/978-3-7908-2336-3_8"},{"key":"1014_CR7","series-title":"Passau. Neue Presse","volume-title":"Immer mehr Cyberangriffe: IT-Sicherheitsbeh\u00f6rde BSI schl\u00e4gt Alarm \u2013 Professionalit\u00e4t steigt","author":"G Heller","year":"2021","unstructured":"Heller\u00a0G (2021) Immer mehr Cyberangriffe: IT-Sicherheitsbeh\u00f6rde BSI schl\u00e4gt Alarm \u2013 Professionalit\u00e4t steigt. Passau. Neue Presse"},{"key":"1014_CR8","first-page":"221","volume-title":"Deutschlands staatliche Cybersicherheits-architektur","author":"S Herpig Dr","year":"2022","unstructured":"Herpig\u00a0S, Rupp\u00a0C (2022) Deutschlands staatliche Cybersicherheits-architektur, S 221"},{"issue":"1","key":"1014_CR9","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"Hevner","year":"2004","unstructured":"Hevner, March, Park, Ram (2004) Design science in information systems research. MIS\u00a0Q 28(1):75. https:\/\/doi.org\/10.2307\/25148625","journal-title":"MIS Q"},{"key":"1014_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/2994539.2994544","volume-title":"Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security","author":"T van de Kamp","year":"2016","unstructured":"van de Kamp\u00a0T, Peter\u00a0A, Everts\u00a0MH, Jonker\u00a0W (2016) Private sharing of IOCs and sightings. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, Vienna, S\u00a035\u201338 https:\/\/doi.org\/10.1145\/2994539.2994544"},{"key":"1014_CR11","series-title":"The enterprise engineering series","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53933-0","volume-title":"Enterprise architecture at work: modelling, communication and analysis","author":"M Lankhorst","year":"2017","unstructured":"Lankhorst\u00a0M (2017) Enterprise architecture at work: modelling, communication and analysis, 4.\u00a0Aufl. The enterprise engineering series. Springer, Berlin, Heidelberg https:\/\/doi.org\/10.1007\/978-3-662-53933-0","edition":"4"},{"key":"1014_CR12","volume-title":"Qualitative Inhaltsanalyse: Grundlagen und Techniken","author":"P Mayring","year":"2008","unstructured":"Mayring\u00a0P (2008) Qualitative Inhaltsanalyse: Grundlagen und Techniken, 10.\u00a0Aufl. Beltz, Weinheim, Basel (Dr. nach Typoskr)","edition":"10"},{"key":"1014_CR13","first-page":"1902","volume":"03914","author":"S Mokaddem","year":"2019","unstructured":"Mokaddem\u00a0S, Wagener\u00a0G, Dulaunoy\u00a0A, Iklody\u00a0A (2019) Taxonomy driven indicator scoring in MISP threat intelligence platforms. ArXiv 03914:1902","journal-title":"ArXiv"},{"key":"1014_CR14","series-title":"CISIS12, Nr.\u00a01: 11","volume-title":"CISIS12","author":"F Moses","year":"2022","unstructured":"Moses\u00a0F, Rehbohm\u00a0T (2022) CISIS12. CISIS12, Nr.\u00a01: 11"},{"key":"1014_CR15","volume-title":"Daseinsvorsorge: eine gesellschaftswissenschaftliche Ann\u00e4herung","year":"2009","unstructured":"Neu\u00a0C (Hrsg) (2009) Daseinsvorsorge: eine gesellschaftswissenschaftliche Ann\u00e4herung, 1.\u00a0Aufl. VS, Wiesbaden","edition":"1"},{"issue":"3","key":"1014_CR16","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1080\/17517575.2015.1048831","volume":"11","author":"E Niemi","year":"2017","unstructured":"Niemi\u00a0E, Pekkola\u00a0S (2017) Using enterprise architecture artefacts in an organisation. Enterp Inf Syst 11(3):313\u2013338. https:\/\/doi.org\/10.1080\/17517575.2015.1048831","journal-title":"Enterp Inf Syst"},{"key":"1014_CR17","series-title":"Lecture notes in business information processing","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-030-06097-8_2","volume-title":"Advances in enterprise engineering XII","author":"J Nurmi","year":"2019","unstructured":"Nurmi\u00a0J, Pulkkinen\u00a0M, Sepp\u00e4nen\u00a0V, Penttinen\u00a0K (2019) Systems approaches in the enterprise architecture field of research: a\u00a0systematic literature review. In: Aveiro\u00a0D, Guizzardi\u00a0G, Guerreiro\u00a0S, Gu\u00e9dria\u00a0W (Hrsg) Advances in enterprise engineering XII. Lecture notes in business information processing, Bd. 334. Springer, Cham, S\u00a018\u201338 https:\/\/doi.org\/10.1007\/978-3-030-06097-8_2"},{"issue":"6","key":"1014_CR18","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1007\/BF03372838","volume":"62","author":"H \u00d6sterle","year":"2010","unstructured":"\u00d6sterle\u00a0H, Becker\u00a0J, Frank\u00a0U et\u00a0al (2010) Memorandum zur gestaltungsorientierten Wirtschaftsinformatik. Schmalenbach Z Betriebswirtsch Forsch 62(6):664\u2013669","journal-title":"Schmalenbach Z Betriebswirtsch Forsch"},{"issue":"3","key":"1014_CR19","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers\u00a0K, Tuunanen\u00a0T, Rothenberger\u00a0MA, Chatterjee\u00a0S (2007) A\u00a0design science research methodology for information systems research. J\u00a0Manag Inf Syst 24(3):45\u201377. https:\/\/doi.org\/10.2753\/MIS0742-1222240302","journal-title":"J Manag Inf Syst"},{"key":"1014_CR20","unstructured":"Rehbohm T, Kalmbach P (2021) MMR-Aktuell 2021, 438461 \u2013 beck-online, Grundforderungen von Informations- und Cybersicherheit in L\u00e4ndern. https:\/\/beck-online.beck.de\/?vpath=bibdata\/zeits\/MMRAktuell\/2021\/438461.htm. Zugegriffen: 8. September 2022"},{"key":"1014_CR23","first-page":"13","volume-title":"Federal structures\u2014The example of German public administration","author":"T Rehbohm","year":"2019","unstructured":"Rehbohm\u00a0T, Sandkuhl\u00a0K, Kemmerich\u00a0T (2019) On challenges of cyber and information security management. In: Federal structures\u2014The example of German public administration, S\u00a013"},{"key":"1014_CR22","series-title":"Lecture notes in business information processing","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-031-04216-4_26","volume-title":"Business information systems workshops","author":"T Rehbohm","year":"2021","unstructured":"Rehbohm\u00a0T, Sandkuhl\u00a0K, Cap\u00a0CH, Kemmerich\u00a0T (2021) Integrated security management of public and private sector for critical infrastructures\u2014Problem investigation. In: Abramowicz\u00a0W, Auer\u00a0S, Str\u00f3\u017cyna\u00a0M (Hrsg) Business information systems workshops. Lecture notes in business information processing. Springer, Cham, S\u00a0291\u2013303 https:\/\/doi.org\/10.1007\/978-3-031-04216-4_26"},{"issue":"7","key":"1014_CR21","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1007\/s11623-022-1637-0","volume":"46","author":"T Rehbohm","year":"2022","unstructured":"Rehbohm\u00a0T, Kemmerich\u00a0R, Cap\u00a0CH, Sandkuhl\u00a0K (2022) Sicherheitsmanagement, Cybersicherheit und Daseinsvorsorge: Empirische Studie in deutschen Kommunen. Datenschutz Datensicherheit DuD 46(7):448\u2013454. https:\/\/doi.org\/10.1007\/s11623-022-1637-0","journal-title":"Datenschutz Datensicherheit DuD"},{"issue":"1","key":"1014_CR24","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10257-013-0213-4","volume":"12","author":"D Simon","year":"2014","unstructured":"Simon\u00a0D, Fischbach\u00a0K, Schoder\u00a0D (2014) Enterprise architecture management and its role in corporate strategic management. Inf Syst E\u2011Bus Manage 12(1):5\u201342. https:\/\/doi.org\/10.1007\/s10257-013-0213-4","journal-title":"Inf Syst E-Bus Manage"},{"key":"1014_CR6","volume-title":"ArchiMate\u00ae 3.0.1 specification","author":"The Open Group","year":"2017","unstructured":"The Open Group (2017) ArchiMate\u00ae 3.0.1 specification. Van Haren, Zaltbommel"},{"key":"1014_CR25","volume-title":"Version\u00a09.2","author":"The TOGAF Standard","year":"2018","unstructured":"The TOGAF Standard (2018) Version\u00a09.2. Van Haren, Zaltbommel"},{"key":"1014_CR26","series-title":"Management for professionals","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-319-96187-3_10","volume-title":"IT management in the digital age","author":"N Urbach","year":"2019","unstructured":"Urbach\u00a0N, Ahlemann\u00a0F (2019) Transformable IT landscapes: IT architectures are standardized, modular, flexible, ubiquitous, elastic, cost-effective, and secure. In: Urbach\u00a0N, Ahlemann\u00a0F (Hrsg) IT management in the digital age. Management for professionals. Springer, Cham, S 93\u201399 https:\/\/doi.org\/10.1007\/978-3-319-96187-3_10"},{"key":"1014_CR27","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/978-3-658-31237-4_22","volume-title":"Reformbaustelle Bundesstaat","author":"G Wenzelburger","year":"2020","unstructured":"Wenzelburger\u00a0G (2020) Einheit und Vielfalt im Sicherheitsf\u00f6deralismus. In: Kn\u00fcpling\u00a0F, K\u00f6lling\u00a0M, Kropp\u00a0S, Scheller\u00a0H (Hrsg) Reformbaustelle Bundesstaat. Springer, Wiesbaden, S\u00a0381\u2013405 https:\/\/doi.org\/10.1007\/978-3-658-31237-4_22"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-023-01014-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s40702-023-01014-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-023-01014-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T11:03:46Z","timestamp":1723115026000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s40702-023-01014-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,10]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["1014"],"URL":"https:\/\/doi.org\/10.1365\/s40702-023-01014-7","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"type":"print","value":"1436-3011"},{"type":"electronic","value":"2198-2775"}],"subject":[],"published":{"date-parts":[[2023,11,10]]},"assertion":[{"value":"11 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}