{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T04:38:26Z","timestamp":1685075906409},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11623-023-1772-2","type":"journal-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:01:47Z","timestamp":1685034107000},"page":"338-342","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Herausforderungen der f\u00f6deralen Cybersicherheit vs. \u00c4nderung in der Bund-L\u00e4nder Gewaltenteilung"],"prefix":"10.1007","volume":"47","author":[{"given":"Thomas","family":"Rehbohm","sequence":"first","affiliation":[]},{"given":"Peter Lutz","family":"Kalmbach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,25]]},"reference":[{"key":"1772_CR1","doi-asserted-by":"crossref","unstructured":"Andreasson, Cybersecurity. Public Sector Threats and Responses, Boca Raton 2012.","DOI":"10.1201\/b11363"},{"key":"1772_CR2","doi-asserted-by":"crossref","unstructured":"D\u00fcrig\/Fischer, Cybersicherheit in Kritischen Infrastrukturen: Europ\u00e4ische und deutsche Regulierung \u2014 ein \u00dcberblick, Datenschutz und Datensicherheit, in: DuD 2018, 209-213.","DOI":"10.1007\/s11623-018-0909-1"},{"key":"1772_CR3","unstructured":"Hassemer\/Neumann, in: Kindh\u00e4user\/Neumann\/Paeffgen, Strafgesetzbuch. Band 1, Baden-Baden 2017, vor \u00a7 1."},{"key":"1772_CR4","unstructured":"Hopfauf, in: Schmidt-Bleibtreu\/Hofmann\/Hopfauf, Grundgesetz. Kommentar, 11. Aufl., K\u00f6ln 2008."},{"key":"1772_CR5","unstructured":"Hornung, Neue Pflichten f\u00fcr Betreiber kritischer Infrastrukturen: Das IT-Sicherheitsgesetz des Bundes, in: NJW 2015, S. 3334-3340."},{"key":"1772_CR6","unstructured":"Isensee, Idee und Gestalt des F\u00f6deralismus im Grundgesetz, in: Isensee\/Kirchhof, Handbuch des Staatsrechts der Bundesrepublik Deutschland. Band VI. Bundesstaat, 3. Aufl., Heidelberg 2008, S. 3-199."},{"key":"1772_CR7","doi-asserted-by":"crossref","unstructured":"Krajewski, Services of general interest beyond the single market, Berlin 2015.","DOI":"10.1007\/978-94-6265-063-3"},{"key":"1772_CR8","unstructured":"Moses\/Rehbohm, CISIS12 \u2013 Vorgehensmodell zur Einf\u00fchrung eines Informationssicherheitsmanagementsystems, kes Ausgabe 1\/2022, DATAKONTEXT GmbH."},{"key":"1772_CR9","unstructured":"Rehbohm\/Kalmbach, Grundforderungen von Informations- und Cybersicherheit in L\u00e4ndern, in: MMR-Aktuell 2021 (Multimedia und Recht), 438461."},{"key":"1772_CR10","doi-asserted-by":"crossref","unstructured":"Rehbohm\/Kemmerich\/Cap\/Sandkuhl, Sicherheitsmanagement, Cybersicherheit und Daseinsvorsorge: Empirische Studie in deutschen Kommunen, Datenschutz und Datensicherheit, in: DuD 2022, S. 448-454.","DOI":"10.1007\/s11623-022-1637-0"},{"key":"1772_CR11","doi-asserted-by":"crossref","unstructured":"Seckelmann\/Brunzel, Handbuch Onlinezugangsgesetz. Potenziale \u2013 Synergien \u2013 Herausforderungen, Berlin 2021.","DOI":"10.1007\/978-3-662-62395-4"},{"key":"1772_CR12","unstructured":"Sodan, Kontinuit\u00e4t und Wandel im Verfassungsrecht. Zum 60-j\u00e4hrigen Jubil\u00e4um des Grundgesetzes der Bundesrepublik Deutschland, in: NVwZ 2009, S. 545-551."},{"key":"1772_CR13","unstructured":"Vogel, Gewaltenvermischung statt Gewaltenteilung? Zu neueren Entwicklungen im Verh\u00e4ltnis der Verfassungsorgane zueinander, in: NJW 1996, S. 1505-1511."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1772-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-023-1772-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1772-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:38:25Z","timestamp":1685036305000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-023-1772-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":13,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["1772"],"URL":"https:\/\/doi.org\/10.1007\/s11623-023-1772-2","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5]]},"assertion":[{"value":"25 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}