{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:25:17Z","timestamp":1740173117906,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"1","license":[{"start":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:00:00Z","timestamp":1703030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:00:00Z","timestamp":1703030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004871","name":"Technische Universit\u00e4t Braunschweig","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004871","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title><jats:p>In einer st\u00e4ndig pr\u00e4senten digitalen Umgebung, die Technologie als zentrales Angebot nutzt, gewinnt Online-Dating immer mehr an Popularit\u00e4t. Ein Gro\u00dfteil der j\u00fcngeren Bev\u00f6lkerung hat Erfahrung damit. Doch diese Entwicklung bringt neue Herausforderungen in Bezug auf Datenschutz und Informationssicherheit mit sich. Online-Dating-Plattformen (z.\u202fB. <jats:italic>OkCupid<\/jats:italic>) und -Apps (z.\u202fB. <jats:italic>Tinder<\/jats:italic>) f\u00fchren zur Entstehung von Cyberintimit\u00e4t und er\u00f6ffnen Risiken, wie Social Engineering, bei denen Menschen beeinflusst werden, um vertrauliche Informationen preiszugeben. Diese Bedrohungen k\u00f6nnten nicht nur pers\u00f6nliche Leben beeintr\u00e4chtigen, sondern auch die Sicherheit von Unternehmen gef\u00e4hrden. Opfer von Social Engineering k\u00f6nnten in der vermeintlich privaten Online-Dating-Umgebung unbeabsichtigt sensible Informationen enth\u00fcllen und dadurch Unternehmensnetzwerke gef\u00e4hrden. Daher ist es von gro\u00dfer Bedeutung, digitale F\u00e4higkeiten in Kompetenzbereichen wie Information Security Awareness und Kommunikation zu st\u00e4rken und eine kritische Herangehensweise an online geteilte Informationen zu entwickeln. Diese Untersuchung analysiert die Verbindung zwischen Informationssicherheit und Online-Dating durch eine interdisziplin\u00e4re hermeneutische Analyse. Dabei liegt der Fokus auf der Rolle von Kommunikation und anderen digitalen Kompetenzen im Kontext von Informationssicherheit und Social Engineering und verdeutlicht die Wichtigkeit von Informationssicherheit \u00fcber das Berufsleben hinaus.<\/jats:p>","DOI":"10.1365\/s40702-023-01032-5","type":"journal-article","created":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T18:01:58Z","timestamp":1703095318000},"page":"27-42","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ok, gegen Cupids Pfeil hilft keine Firewall\u00a0\u2013 Sichere(s) Daten durch ganzheitlichen Kompetenzaufbau","Ok, a firewall is no match for Cupid\u2018s arrow- Secure dat(a\/ing) through holistic competence development"],"prefix":"10.1365","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1686-9566","authenticated-orcid":false,"given":"Rebecca","family":"Finster","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2593-4366","authenticated-orcid":false,"given":"Thomas","family":"Kronschl\u00e4ger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0270-2666","authenticated-orcid":false,"given":"Linda","family":"Grogorick","sequence":"additional","affiliation":[]},{"given":"Susanne","family":"Robra-Bissantz","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2023,12,20]]},"reference":[{"key":"1032_CR33","unstructured":"\/r\/dating (2023) Reddit [Reddit Post]. https:\/\/www.reddit.com\/r\/dating\/. Zugegriffen: 30. Aug. 2023"},{"key":"1032_CR35","unstructured":"\/r\/scams (2023) Reddit [Reddit Post]. https:\/\/www.reddit.com\/r\/scams\/. Zugegriffen: 30. Aug. 2023"},{"key":"1032_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1055\/s-0043-101465","volume":"30","author":"W Aretz","year":"2017","unstructured":"Aretz\u00a0W, Gansen-Ammann\u00a0D\u2011N, Ehrenberg\u00a0K, Musiol\u00a0A (2017) Date me if you can: Ein systematischer \u00dcberblick \u00fcber den aktuellen Forschungsstand von Online-Dating. Z\u00a0Sex-Forsch 30:7\u201334. https:\/\/doi.org\/10.1055\/s-0043-101465","journal-title":"Z Sex-Forsch"},{"key":"1032_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-94-007-2324-5_2","volume-title":"Assessment and teaching of 21st\u00a0century skills","author":"M Binkley","year":"2012","unstructured":"Binkley\u00a0M, Erstad\u00a0O, Herman\u00a0J, Raizen\u00a0S, Ripley\u00a0M, Miller-Ricci\u00a0M, Rumble\u00a0M (2012) Defining twenty-first century skills. In: Griffin\u00a0P, McGaw\u00a0B, Care\u00a0E (Hrsg) Assessment and teaching of 21st\u00a0century skills. Springer Netherlands, Dordrecht, S\u00a017\u201366 https:\/\/doi.org\/10.1007\/978-94-007-2324-5_2"},{"key":"1032_CR2","unstructured":"Bitkom (2022) Zuk\u00fcnftige Bedrohungen f\u00fcr die IT-Sicherheit in der deutschen Industrie 2022. https:\/\/de.statista.com\/statistik\/daten\/studie\/1014570\/umfrage\/umfrage-zu-den-zukuenftigen-bedrohungen-fuer-die-it-sicherheit-in-deutschland\/. Zugegriffen: 25. Aug. 2023"},{"key":"1032_CR4","unstructured":"B\u00ceZG\u0102 A (2020) 5 Dating Apps Leak More than 1 Million User Profiles and Sensitive Information. https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/5-dating-apps-leak-more-than-1-million-user-profiles-and-sensitive-information\/. Zugegriffen: 10. Aug. 2023 (Bitdefender Website)"},{"key":"1032_CR5","unstructured":"B\u00ceZG\u0102 A (2023) Unprotected dating database exposes data of 2.3\u00a0million users. https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/unprotected-dating-database-exposes-data-of-2-3-million-users\/. Zugegriffen: 25. Aug. 2023 (Bitdefender Website)"},{"key":"1032_CR6","doi-asserted-by":"publisher","first-page":"1444","DOI":"10.1109\/CSCI54926.2021.00287","volume-title":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","author":"P Buthelezi","year":"2021","unstructured":"Buthelezi\u00a0P (2021) Living, loving and learning online: raising awareness of the new normal and its security considerations. In: 2021 International Conference on Computational Science and Computational Intelligence (CSCI), S\u00a01444\u20131448 https:\/\/doi.org\/10.1109\/CSCI54926.2021.00287"},{"issue":"1","key":"1032_CR7","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s00146-009-0255-9","volume":"25","author":"R Capurro","year":"2010","unstructured":"Capurro\u00a0R (2010) Digital hermeneutics: an outline. Ai Soc 25(1):35\u201342. https:\/\/doi.org\/10.1007\/s00146-009-0255-9","journal-title":"Ai Soc"},{"key":"1032_CR8","unstructured":"Cimpanu C (2021) Hacker leaks data of 2.28 million dating site users. https:\/\/www.zdnet.com\/article\/hacker-leaks-data-of-2-28-million-dating-site-users\/. Zugegriffen: 10. Aug. 2023 (ZDNET Website)"},{"key":"1032_CR9","unstructured":"Czopek M (2023) Grindr didn\u2019t threaten to identify Republican politicians who use its app. https:\/\/www.politifact.com\/factchecks\/2023\/mar\/28\/instagram-posts\/grindr-didnt-threaten-to-identify-republican-polit\/. Zugegriffen: 31. Aug. 2023"},{"key":"1032_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/9781118663219.wbegss159","volume-title":"The Wiley-Blackwell encyclopedia of gender and sexuality studies","author":"P Farvid","year":"2015","unstructured":"Farvid\u00a0P (2015) Cyber intimacies. In: The Wiley-Blackwell encyclopedia of gender and sexuality studies https:\/\/doi.org\/10.1002\/9781118663219.wbegss159"},{"key":"1032_CR11","unstructured":"Federal Bureau of Investigation (2016) Elicitation techniques. U.S. Department of justice. https:\/\/www.fbi.gov\/file-repository\/elicitation-brochure.pdf\/view"},{"key":"1032_CR12","volume-title":"Information Security Awareness: Die kompetente Essenz f\u00fcr eine gesicherte digitale Zukunft","author":"R Finster","year":"2023","unstructured":"Finster\u00a0R, Grogorick\u00a0L, Kronschl\u00e4ger\u00a0T, Robra-Bissantz\u00a0S (2023) Information Security Awareness: Die kompetente Essenz f\u00fcr eine gesicherte digitale Zukunft. GeNeMe 2023."},{"key":"1032_CR13","doi-asserted-by":"publisher","DOI":"10.1177\/0093650210377091","author":"J Gibbs","year":"2011","unstructured":"Gibbs\u00a0J, Ellison\u00a0N, Lai\u00a0C\u2011H (2011) First comes love, then comes Google: an investigation of uncertainty reduction strategies and self-disclosure in online dating. Communic Res. https:\/\/doi.org\/10.1177\/0093650210377091","journal-title":"Communic Res"},{"key":"1032_CR14","first-page":"282","volume-title":"Digitales Lernen fesselnd gestalten: Motivation beim L\u00f6sen verschiedener Aufgabentypen","author":"L Grogorick","year":"2019","unstructured":"Grogorick\u00a0L, Finster\u00a0R, Robra-Bissantz\u00a0S (2019) Digitales Lernen fesselnd gestalten: Motivation beim L\u00f6sen verschiedener Aufgabentypen, S\u00a0282\u2013291"},{"key":"1032_CR15","volume-title":"Social engineering: the art of human hacking","author":"C Hadnagy","year":"2011","unstructured":"Hadnagy\u00a0C (2011) Social engineering: the art of human hacking. Wiley, Indianapolis"},{"key":"1032_CR16","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/DEXA.2014.71","volume-title":"2014 25th\u00a0International workshop on database and expert systems applications","author":"N H\u00e4nsch","year":"2014","unstructured":"H\u00e4nsch\u00a0N, Benenson\u00a0Z (2014) Specifying IT security awareness. In: 2014 25th\u00a0International workshop on database and expert systems applications. IEEE, S\u00a0326\u2013330 https:\/\/doi.org\/10.1109\/DEXA.2014.71"},{"key":"1032_CR17","first-page":"20","volume":"01","author":"A Haucke","year":"2018","unstructured":"Haucke\u00a0A, Pokoyski\u00a0D (2018) \u201eIch bin der Fehler\u201c\u2014Schuld, Scham, Viktimisierung bei Social Engineering. Take Aware 01:20\u201324","journal-title":"Take Aware"},{"key":"1032_CR18","first-page":"20","volume":"01","author":"S Hessler","year":"2018","unstructured":"Hessler\u00a0S (2018) \u201eBei IT-Security Themen h\u00f6re ich immer weg.\u201c\u2014Sensibilisierung durch Linguistic Awareness. Take Aware 01:20\u201324","journal-title":"Take Aware"},{"key":"1032_CR19","unstructured":"Hopkins T (2016) Online dating: a\u00a0social engineer\u2019s playground. https:\/\/www.linkedin.com\/pulse\/online-dating-social-engineers-playground-hopkins-cissp-ceh-ccna-\/. Zugegriffen: 10. Aug. 2023"},{"key":"1032_CR20","unstructured":"Imam S Grindr scams that you should be aware of. https:\/\/www.purevpn.com\/blog\/grindr-scams\/ (Erstellt: 22. Mai 2023). Zugegriffen: 10. Aug. 2023"},{"key":"1032_CR21","unstructured":"Kaspersky Online dating scams and how to avoid them. https:\/\/www.kaspersky.com\/resource-center\/threats\/beware-online-dating-scams (Erstellt: 24. Apr. 2023). Zugegriffen: 10. Aug. 2023"},{"key":"1032_CR22","unstructured":"Kelleher P Police using apps to lure, arrest and abuse LGBTQ+ people, report finds. https:\/\/www.thepinknews.com\/2023\/02\/22\/police-grindr-apps-middle-east-africa-lgbtq\/ (Erstellt: 22. Febr. 2023). Zugegriffen: 31. Aug. 2023 (von PinkNews | Latest lesbian, gay, bi and trans news | LGBTQ+ news website)"},{"key":"1032_CR23","first-page":"11","volume-title":"Future Skills: Welche Kompetenzen in Deutschland fehlen","author":"J Kirchherr","year":"2018","unstructured":"Kirchherr\u00a0J, Klier\u00a0J, Lehmann-Brauns\u00a0C, Winde\u00a0M (2018) Future Skills: Welche Kompetenzen in Deutschland fehlen, S\u00a011"},{"key":"1032_CR24","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-8349-9441-7_19","volume-title":"Qualitative Marktforschung: Konzepte \u2013 Methoden \u2013 Analysen","author":"M Knassm\u00fcller","year":"2009","unstructured":"Knassm\u00fcller\u00a0M, Vettori\u00a0O (2009) Hermeneutische Verfahren. In: Buber\u00a0R, Holzm\u00fcller\u00a0HH (Hrsg) Qualitative Marktforschung: Konzepte \u2013 Methoden \u2013 Analysen. Gabler, Wiesbaden, S\u00a0299\u2013317 https:\/\/doi.org\/10.1007\/978-3-8349-9441-7_19"},{"key":"1032_CR25","unstructured":"Koegler S Learn to love online dating security. https:\/\/securityintelligence.com\/learn-to-love-online-dating-security\/ (Erstellt: 14. Febr. 2017). Zugegriffen: 24. Aug. 2023 (Security Intelligence Website)"},{"key":"1032_CR26","unstructured":"Lange K (2019) These social media scams affect the military. https:\/\/www.defense.gov\/News\/News-Stories\/Article\/article\/1921988\/these-social-media-scams-affect-the-military\/. Zugegriffen: 1. Dez. 2023 (U.S. Department of Defense website)"},{"key":"1032_CR27","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-319-61542-4_32","volume-title":"Innovative mobile and Internet services in ubiquitous computing","author":"M Nandwani","year":"2018","unstructured":"Nandwani\u00a0M, Kaushal\u00a0R (2018) Evaluating user vulnerability to privacy disclosures over Online dating platforms. In: Barolli\u00a0L, Enokido\u00a0T (Hrsg) Innovative mobile and Internet services in ubiquitous computing. Springer, Cham, S\u00a0342\u2013353 https:\/\/doi.org\/10.1007\/978-3-319-61542-4_32"},{"key":"1032_CR28","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-642-41320-9_10","volume-title":"Financial cryptography and data security","author":"G Norcie","year":"2013","unstructured":"Norcie\u00a0G, De Cristofaro\u00a0E, Bellotti\u00a0V (2013) Bootstrapping trust in online dating: social verification of online dating profiles. In: Adams\u00a0AA, Brenner\u00a0M, Smith\u00a0M (Hrsg) Financial cryptography and data security. Springer, Berlin, Heidelberg, S\u00a0149\u2013163 https:\/\/doi.org\/10.1007\/978-3-642-41320-9_10"},{"key":"1032_CR29","volume-title":"Oxford Learner\u2019s Dictionaries","author":"Oxford University","year":"2023","unstructured":"Oxford University (2023a) scam_1 noun\u2014Definition, pictures, pronunciation and usage notes | Oxford Advanced Learner\u2019s Dictionary at OxfordLearnersDictionaries.com. In: Oxford Learner\u2019s Dictionaries. Oxford University Press, (https:\/\/www.oxfordlearnersdictionaries.com\/definition\/english\/scam_1)"},{"key":"1032_CR30","volume-title":"Oxford Learner\u2019s Dictionaries","author":"Oxford University","year":"2023","unstructured":"Oxford University (2023b) scam_2 verb\u2014Definition, pictures, pronunciation and usage notes | Oxford Advanced Learner\u2019s Dictionary at OxfordLearnersDictionaries.com. In: Oxford Learner\u2019s Dictionaries. Oxford University Press, (https:\/\/www.oxfordlearnersdictionaries.com\/definition\/english\/scam_2)"},{"issue":"3\/4","key":"1032_CR31","first-page":"205","volume":"33","author":"R P\u0103duraru","year":"2022","unstructured":"P\u0103duraru\u00a0R, Moraru\u00a0A\u2011V, Barbu\u00a0V\u2011A (2022) Online dating dynamics during COVID-19. Rev Rom Sociol 33(3\/4):205\u2013223","journal-title":"Rev Rom Sociol"},{"key":"1032_CR32","doi-asserted-by":"publisher","first-page":"100055","DOI":"10.1016\/j.chbr.2021.100055","volume":"3","author":"A Phan","year":"2021","unstructured":"Phan\u00a0A, Seigfried-Spellar\u00a0K, Choo\u00a0K\u2011KR (2021) Threaten me softly: a\u00a0review of potential dating app risks. Comput Hum Behav Rep 3:100055. https:\/\/doi.org\/10.1016\/j.chbr.2021.100055","journal-title":"Comput Hum Behav Rep"},{"key":"1032_CR34","unstructured":"Reddit (2023) Reddit\u2014about. https:\/\/www.redditinc.com\/. Zugegriffen: 31. Aug. 2023"},{"key":"1032_CR36","volume-title":"Digital humanities and information systems: innovating two research traditions","author":"L Scheuermann","year":"2017","unstructured":"Scheuermann\u00a0L, Kroeze\u00a0JHH (2017) Digital humanities and information systems: innovating two research traditions. Twenty-third Americas Conference on Information Systems."},{"key":"1032_CR37","unstructured":"Statista (2023) Dating Services\u2014Anzahl der Online-Nutzer in Deutschland 2030. https:\/\/de.statista.com\/prognosen\/642366\/dating-services-anzahl-der-online-nutzer-in-deutschland. Zugegriffen: 25. Aug. 2023"},{"key":"1032_CR38","doi-asserted-by":"publisher","DOI":"10.2760\/115376","volume-title":"DigComp 2.2: the digital competence framework for citizens\u2014with new examples of knowledge, skills and attitudes","author":"R Vuorikari","year":"2022","unstructured":"Vuorikari\u00a0R, Kluzer\u00a0S, Punie\u00a0Y (2022) DigComp 2.2: the digital competence framework for citizens\u2014with new examples of knowledge, skills and attitudes https:\/\/doi.org\/10.2760\/115376"},{"issue":"20","key":"1032_CR39","first-page":"6233","volume":"100","author":"L Wijaya","year":"2022","unstructured":"Wijaya\u00a0L, Taiwanella\u00a0EU, Afrianto\u00a0RA, Kuncoro\u00a0A, Hidayat\u00a0Z (2022) Harmless cyberstalking, case of onlinedaters. J\u00a0Theor Appl Inf Technol 100(20):6233\u20136244","journal-title":"J Theor Appl Inf Technol"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-023-01032-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s40702-023-01032-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-023-01032-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T16:04:15Z","timestamp":1707321855000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s40702-023-01032-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,20]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1032"],"URL":"https:\/\/doi.org\/10.1365\/s40702-023-01032-5","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"type":"print","value":"1436-3011"},{"type":"electronic","value":"2198-2775"}],"subject":[],"published":{"date-parts":[[2023,12,20]]},"assertion":[{"value":"1 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}