{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T18:52:17Z","timestamp":1658343137908},"reference-count":3,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11623-020-1263-7","type":"journal-article","created":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T12:04:59Z","timestamp":1584360299000},"page":"258-262","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["SDM 2.0 und ITIL 4 ,,verschr\u00e4nkt\u2018\u2018"],"prefix":"10.1007","volume":"44","author":[{"given":"Martin","family":"Rost","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Welke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"1263_CR1","unstructured":"Axelos 2020: ITIL\u00ae Foundation, ITIL 4 Edition (German Edition), https:\/\/www.axelos.com\/."},{"key":"1263_CR2","unstructured":"DSK 2019: Das Standard-Datenschutzmodell V2a \u2013 Eine Methode zur Datenschutzberatung und -pr\u00fcfung auf der Basis einheitlicher Gew\u00e4hrleistungsziele, https:\/\/www.datenschutzkonferenz-online.de\/media\/ah\/20191209_sdm-methode_v2.0a.pdf."},{"issue":"1","key":"1263_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11623-018-0883-7","volume":"42","author":"M Rost","year":"2018","unstructured":"Rost, Martin, 2018: Die Ordnung der Schutzziele, in: DuD \u2013 Datenschutz und Datensicherheit, 42. Jahrgang, Heft 1: 13-18.","journal-title":"Datenschutz und Datensicherheit"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1263-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-020-1263-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1263-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T01:09:05Z","timestamp":1615856945000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-020-1263-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":3,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["1263"],"URL":"https:\/\/doi.org\/10.1007\/s11623-020-1263-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"16 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}