{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T16:20:55Z","timestamp":1648657255437},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s11623-020-1371-4","type":"journal-article","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T11:05:07Z","timestamp":1604574307000},"page":"806-809","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Das Corona-Virus \u2013 Ein Katalysator f\u00fcr Cyberkriminalit\u00e4t?"],"prefix":"10.1007","volume":"44","author":[{"given":"Mohamed Bou","family":"Sleiman","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,5]]},"reference":[{"key":"1371_CR1","unstructured":"Achenbach\/Ransiek\/R\u00f6nnau, Handbuch Wirtschaftsstrafrecht, 5. Auflage, 2019."},{"key":"1371_CR2","unstructured":"Angerer, Kampf gegen Cybercrime \u2013 Ph\u00e4nomene und Ermittlungsprobleme, DRiZ 2019, 428-431."},{"key":"1371_CR3","unstructured":"Brink\/Wolff, BeckOK Datenschutzrecht, 32. Edition, Stand: 01.05.2020."},{"key":"1371_CR4","doi-asserted-by":"crossref","unstructured":"Ceffinato, Verm\u00f6gensstraftaten im und \u00fcber das Internet, NZWiSt 2016, 464-467.","DOI":"10.1515\/zstw-2016-0028"},{"key":"1371_CR5","unstructured":"Fischer\/Schmidt, Social Engineering im Zeitalter von COVID-19 und Home-Office, CB 2020, 200-204."},{"key":"1371_CR6","unstructured":"Graf\/J\u00e4ger\/Wittig, Wirtschafts- und Steuerstrafrecht, 2. Auflage, 2017."},{"key":"1371_CR7","unstructured":"Hefendehl\/Hohmann, M\u00fcnchner Kommentar zum Strafgesetzbuch, Band 5, \u00a7\u00a7\u00a0263-358 StGB, 3. Auflage, 2019."},{"key":"1371_CR8","unstructured":"Henssler, M\u00fcnchener Kommentar zum B\u00fcrgerlichen Gesetzbuch, Band 6, \u00a7\u00a7\u00a0631-704 BGB, 8. Auflage, 2020."},{"key":"1371_CR9","unstructured":"Kochheim, Cybercrime und Strafrecht in der Informations- und Kommunikationstechnik, 2. Auflage, 2018."},{"key":"1371_CR10","unstructured":"Manske, Crime-as-a-Service, Die Neun S\u00e4ulen \u2013 Eine Ph\u00e4nomenbeschreibung, Kriminalistik 2020, 235-239."},{"key":"1371_CR11","unstructured":"Meier, \u201eDigitale Erpressung\u201c, Kriminalistik 2016, 361-365."},{"key":"1371_CR12","unstructured":"Rau\/Bou Sleiman, Subventionsbetrug im Zusammenhang mit Corona-Soforthilfen f\u00fcr Kleinstunternehmen und Soloselbstst\u00e4ndige, NZWiSt 2020, 373-377."},{"key":"1371_CR13","unstructured":"Sander, M\u00fcnchner Kommentar zum Strafgesetzbuch, Band 4, \u00a7\u00a7\u00a0185-262 StGB, 3. Auflage, 2017."},{"key":"1371_CR14","unstructured":"Sanli, Die Strafbarkeit des Phishings unter Ber\u00fccksichtigung neuer Phishing-Formen, ZWH 2018, 205-213."},{"key":"1371_CR15","unstructured":"Schmidt, COVID-19, Rechtsfragen zur Corona-Krise, 2. Auflage, 2020."},{"key":"1371_CR16","unstructured":"Spindler\/Schuster, Recht der elektronischen Medien, 4. Auflage, 2019."},{"key":"1371_CR17","unstructured":"Vogelgesang\/M\u00f6llers, Ransomware als moderne Piraterie \u2013 Erpressung in Zeiten digitaler Kriminalit\u00e4t, jM 2016, 381-387."},{"key":"1371_CR18","unstructured":"Wabnitz\/Janovsky\/Schmitt, Handbuch des Wirtschafts- und Steuerstrafrechts, 5. Auflage, 2020."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1371-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-020-1371-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1371-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T13:13:31Z","timestamp":1604582011000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-020-1371-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,5]]},"references-count":18,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1371"],"URL":"https:\/\/doi.org\/10.1007\/s11623-020-1371-4","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,5]]},"assertion":[{"value":"5 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}