{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T04:30:21Z","timestamp":1687926621962},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s11623-023-1785-x","type":"journal-article","created":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T15:18:36Z","timestamp":1687879116000},"page":"397-400","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ISMS und Digitale Nachhaltigkeit"],"prefix":"10.1007","volume":"47","author":[{"given":"Steffen","family":"Ullrich","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,27]]},"reference":[{"key":"1785_CR1","unstructured":"https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Cyber-Sicherheitslage\/Technische-Sicherheitshinweise-und-Warnungen\/Warnungen-nach-Par-7\/FAQ-Kaspersky\/faq_node.html"},{"key":"1785_CR2","unstructured":"https:\/\/www.spiegel.de\/wirtschaft\/usa-importverbot-fuer-zte-und-huawei-ausruestung-a-08bb91eb-72d6-40b8-be7f-73c0ecd4a1ff"},{"key":"1785_CR3","unstructured":"https:\/\/www.openbsd.org\/"},{"key":"1785_CR4","unstructured":"https:\/\/de.wikipedia.org\/wiki\/Heartbleed"},{"key":"1785_CR5","unstructured":"https:\/\/www.heise.de\/news\/ProxyShell-Massive-Angriffswelle-auf-ungepatchte-Exchange-Server-6171597.html"},{"key":"1785_CR6","unstructured":"https:\/\/www.heise.de\/hintergrund\/Log4Shell-Eine-Bestandsaufnahme-6342536.html"},{"key":"1785_CR7","unstructured":"https:\/\/de.wikipedia.org\/wiki\/Dual_EC_DRBG"},{"key":"1785_CR8","unstructured":"https:\/\/www.golem.de\/news\/bsafe-nsa-zahlte-rsa-security-um-krypto-backdoor-einzusetzen-1312-103540.html"},{"key":"1785_CR9","unstructured":"https:\/\/blog.cryptographyengineering.com\/2015\/12\/22\/on-juniper-backdoor\/"},{"key":"1785_CR10","unstructured":"https:\/\/www.washingtonpost.com\/graphics\/2020\/world\/national-security\/cia-crypto-encryption-machines-espionage\/"},{"key":"1785_CR11","unstructured":"https:\/\/heise.de\/-2074394"},{"key":"1785_CR12","unstructured":"https:\/\/thehackernews.com\/2014\/04\/router-manufacturers-secretly-added-tcp.html"},{"key":"1785_CR13","unstructured":"https:\/\/heise.de\/-4797250"},{"key":"1785_CR14","unstructured":"https:\/\/de.wikipedia.org\/wiki\/Solarwinds#Cyberattacke"},{"key":"1785_CR15","unstructured":"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/"},{"key":"1785_CR16","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Release_early,_release_often"},{"key":"1785_CR17","unstructured":"https:\/\/www.genua.de\/news-detail\/quantenresistente-virtual-private-networks-vpn"},{"key":"1785_CR18","unstructured":"https:\/\/www.genua.de\/knowledgebase\/experten-interview-rfc-8391-ein-meilenstein-zum-schutz-vor-quantencomputern"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1785-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-023-1785-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1785-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T15:27:19Z","timestamp":1687879639000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-023-1785-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,27]]},"references-count":18,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["1785"],"URL":"https:\/\/doi.org\/10.1007\/s11623-023-1785-x","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,27]]},"assertion":[{"value":"27 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}