{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T23:29:38Z","timestamp":1648855778062},"reference-count":5,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"1","license":[{"start":{"date-parts":[[2014,2,1]],"date-time":"2014-02-01T00:00:00Z","timestamp":1391212800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1365\/s40702-014-0009-0","type":"journal-article","created":{"date-parts":[[2014,4,8]],"date-time":"2014-04-08T16:20:25Z","timestamp":1396974025000},"page":"56-63","source":"Crossref","is-referenced-by-count":0,"title":["Prozessorientierte Bedrohungsanalyse f\u00fcr IT-gest\u00fctzte mobile Aufgabenerf\u00fcllung"],"prefix":"10.1365","volume":"51","author":[{"given":"Sascha","family":"Alpers","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Huber","sequence":"additional","affiliation":[]},{"given":"Patrik","family":"Scheidecker","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Schuster","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2014,2,4]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/978-3-642-55550-3_4","volume-title":"Mobil, aber sicher!.Total vernetzt","author":"C Eckert","year":"2003","unstructured":"Eckert C (2003) Mobil, aber sicher!. Total vernetzt. Springer, Berlin, S.\u00a085\u2013121"},{"key":"9_CR2","unstructured":"Junginger M, Krcmar H (2001) IT Risk Management \u2013 Fit f\u00fcr E-Business? In: Buhl HU, Huther A, Wiesner B (Hrsg) Information Age Economy. Springer, S.\u00a0395\u2013408. http:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-57547-1_34"},{"key":"9_CR3","unstructured":"Maslennikov D (2013) Kaspersky Mobile Malware Evolution: Part 6. http:\/\/www.securelist.com\/en\/analysis\/204792283\/Mobile_Malware_Evolution_Part_6. Zugegriffen: 31. Jan. 2014"},{"issue":"2","key":"9_CR4","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1353-4858(12)70013-2","volume":"2012","author":"G Thomson","year":"2012","unstructured":"Thomson G (2012) BYOD: enabling the chaos. Network Security 2012(2):5\u20138","journal-title":"Network Security"},{"key":"9_CR5","volume-title":"Hybride Simulation von mobilen Gesch\u00e4ftsprozessen","author":"S Hellfeld","year":"2013","unstructured":"Hellfeld S (2013) Hybride Simulation von mobilen Gesch\u00e4ftsprozessen. KIT Scientific Publishing, Karlsruhe"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-014-0009-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s40702-014-0009-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-014-0009-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T05:07:26Z","timestamp":1559624846000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s40702-014-0009-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":5,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["9"],"URL":"https:\/\/doi.org\/10.1365\/s40702-014-0009-0","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2]]}}}