2359887
YLB2M7DD
items
1
0
default
asc
34
https://krisenkom.ch/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3A%22zotpress-e3d04239da19145a7107901fc9697d4a%22%2C%22meta%22%3A%7B%22request_last%22%3A0%2C%22request_next%22%3A0%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%22WWU5PX8D%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kaschner%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EKaschner%2C%20H.%20%282020%29.%20%3Ci%3ECyber%20Crisis%20Management%3A%20Das%20Praxishandbuch%20zu%20Krisenmanagement%20und%20Krisenkommunikation%3C%5C%2Fi%3E.%20Springer%20Fachmedien%20Wiesbaden.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2F978‑3–658-27914–1%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Cyber%20Crisis%20Management%3A%20Das%20Praxishandbuch%20zu%20Krisenmanagement%20und%20Krisenkommunikation%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Holger%22%2C%22lastName%22%3A%22Kaschner%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22de%22%2C%22ISBN%22%3A%22978–3‑658–27913‑4%20978–3‑658–27914‑1%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2F978‑3–658-27914–1%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–07-21T15%3A55%3A49Z%22%7D%7D%2C%7B%22key%22%3A%22LZSQBZUX%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rosenberger%20et%20al.%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A3%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ERosenberger%2C%20N.%2C%20Niederh%26%23xE4%3Buser%2C%20M.%2C%20%26amp%3B%20Kr%26%23xE4%3Bmer%2C%20K.%20%282023%29.%20%3Ci%3EKommunikation%20in%20der%20digitalen%20Transformation%26%23x202F%3B%3A%20Trendstudie%20Schweiz%202022%3C%5C%2Fi%3E.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.21256%5C%2FZHAW-2808%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.21256%5C%2FZHAW-2808%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Kommunikation%20in%20der%20digitalen%20Transformation%20%3A%20Trendstudie%20Schweiz%202022%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nicole%22%2C%22lastName%22%3A%22Rosenberger%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Markus%22%2C%22lastName%22%3A%22Niederh%5Cu00e4user%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Katharina%22%2C%22lastName%22%3A%22Kr%5Cu00e4mer%22%7D%5D%2C%22abstractNote%22%3A%22Das%20Forschungsprojekt%20%5Cu00abKommunikation%20in%20der%20digitalen%20Transformation%5Cu00bb%20ist%20als%20Trendstudie%20angelegt%20und%20untersucht%20seit%202018%20alle%20zwei%20Jahre%20den%20Zustand%20und%20den%20Entwicklungsbedarf%20der%20Unternehmenskommunikation%20in%20der%20digitalen%20Transformation.%20Leitend%20ist%20dabei%20ein%20in%20der%20Erststudie%202018%20entwickeltes%20Framework%2C%20welches%20die%20Rolle%20von%20Corporate%20Communications%20in%20der%20digitalen%20Transformation%20auf%20drei%20Ebenen%20beschreibt%20%28Niederh%5Cu00e4user%20%26%20Rosenberger%2C%202018%29.%20Auf%20der%20Mikroebene%20fokussiert%20die%20Untersuchung%20auf%20die%20digitale%20Transformation%20der%20Kommunikationsabteilung%2C%20auf%20der%20Mesoebene%20auf%20die%20Funktion%20der%20Unternehmenskommunikation%20im%20Transformationsprozess%20der%20gesamten%20Organisation%20und%20auf%20der%20Makroebene%20auf%20das%20Schaffen%20von%20Akzeptanz%20f%5Cu00fcr%20den%20Transformationsprozess%20in%20Markt%20und%20Gesellschaft.%20Die%20vorliegende%20dritte%20Studie%202022%20basiert%20auf%20einer%20Online-Befragung%20von%20133%20Kommunikationsverantwortlichen%20%28CCOs%29%20in%20der%20Deutschschweiz%20und%20auf%2012%20vertiefenden%20Interviews%20mit%20Expert%3Ainnen.%20Zur%20Einordnung%20wurde%20ein%20%5Cu00dcberblick%20zum%20aktuellen%20Forschungsstand%20erarbeitet.%20Die%20Studie%20zeigt%20auf%2C%20dass%20einschneidende%20Ereignisse%20wie%20die%20Pandemie%20oder%20der%20Ukraine-Krieg%20weniger%20die%20Richtung%20als%20die%20Geschwindigkeit%20der%20digitalen%20Transformation%20ver%5Cu00e4ndert%20haben.%20Die%20%5Cu00abAgenda%20f%5Cu00fcr%20die%20Kommunikation%20in%20der%20digitalen%20Transformation%5Cu00bb%20aus%20der%20Erststudie%20wurde%20mit%20den%20Ergebnissen%20der%20beiden%20Folgestudien%20abgeglichen%2C%20angepasst%20und%20erweitert.%20Sie%20zeigt%20Kommunikationsverantwortlichen%20auf%2C%20in%20welche%20Richtung%20sie%20die%20Unternehmenskommunikation%20entwickeln%20sollten.%22%2C%22date%22%3A%222023%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%2210.21256%5C%2FZHAW-2808%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdigitalcollection.zhaw.ch%5C%2Fhandle%5C%2F11475%5C%2F26695%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%2C%22PF4P4483%22%5D%2C%22dateModified%22%3A%222023–07-20T18%3A08%3A02Z%22%7D%7D%2C%7B%22key%22%3A%229L3ABNUY%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Lerch%20and%20Tanner%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ELerch%2C%20K.%20M.%2C%20%26amp%3B%20Tanner%2C%20M.%20%282022%29.%20%3Ci%3ESchweizerische%20Mobiliar%20Versicherungsgesellschaft%20AG%20Digitalswitzerland%20Allianz%20Digitale%20Sicherheit%20Schweiz%20Fachhochschule%20Nordwestschweiz%20FHNW%2C%20Kompetenzzentrum%20Digitale%20Transformation%20Schweizerische%20Akademie%20der%20Technischen%20Wissenschaften%20SATW%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Schweizerische%20Mobiliar%20Versicherungsgesellschaft%20AG%20Digitalswitzerland%20Allianz%20Digitale%20Sicherheit%20Schweiz%20Fachhochschule%20Nordwestschweiz%20FHNW%2C%20Kompetenzzentrum%20Digitale%20Transformation%20Schweizerische%20Akademie%20der%20Technischen%20Wissenschaften%20SATW%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Karin%20M%5Cu00e4ndli%22%2C%22lastName%22%3A%22Lerch%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mara%22%2C%22lastName%22%3A%22Tanner%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–04-27T06%3A15%3A46Z%22%7D%7D%2C%7B%22key%22%3A%222PK2VF9U%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Frick%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EFrick%2C%20J.-C.%20%282022%29.%20%3Ci%3EComparis-%20Datenvertrauens-%20studie%202022%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Comparis-%20Datenvertrauens-%20studie%202022%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jean-Claude%22%2C%22lastName%22%3A%22Frick%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–04-27T06%3A15%3A33Z%22%7D%7D%2C%7B%22key%22%3A%228ZYTZDCI%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Knoll%22%2C%22parsedDate%22%3A%222017%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EKnoll%2C%20M.%20%282017%29.%20IT-Risikomanagement%20im%20Zeitalter%20der%20Digitalisierung.%20%3Ci%3EHMD%20Praxis%20der%20Wirtschaftsinformatik%3C%5C%2Fi%3E%2C%20%3Ci%3E54%3C%5C%2Fi%3E%281%29%2C%204%26%23x2013%3B20.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1365%5C%2Fs40702-017‑0287‑4%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1365%5C%2Fs40702-017‑0287‑4%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22IT-Risikomanagement%20im%20Zeitalter%20der%20Digitalisierung%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Matthias%22%2C%22lastName%22%3A%22Knoll%22%7D%5D%2C%22abstractNote%22%3A%22In%20the%20age%20of%20digital%20transformation%20IT%20gains%20more%20and%20more%20importance%20in%20our%20life%20and%20work%2C%20and%20therefore%20requires%20increased%20interdisciplinary%20focus%20on%20new%20and%20upcoming%20risks.%20More%20than%20ever%20new%20products%20and%20business%20models%20are%20combined%20with%20a%20high%20potential%20to%20collect%20and%20process%20own%20and%20external%20data%2C%20to%20observe%20and%20to%20attack%20companies%20as%20well%20as%20households.%20This%20article%20introduces%20the%20basics%20of%20it%20risk%20management%2C%20addresses%20current%20topics%20and%20drafts%20ideas%20for%20further%20discussion.%22%2C%22date%22%3A%222%5C%2F2017%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%2210.1365%5C%2Fs40702-017‑0287‑4%22%2C%22ISSN%22%3A%221436–3011%2C%202198–2775%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1365%5C%2Fs40702-017‑0287‑4%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–10-12T11%3A12%3A20Z%22%7D%7D%2C%7B%22key%22%3A%229EWJ3LEX%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Horten%20and%20Gr%5Cu00e4ber%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EHorten%2C%20B.%2C%20%26amp%3B%20Gr%26%23xE4%3Bber%2C%20M.%20%282020%29.%20Cyberkriminalit%26%23xE4%3Bt%3A%20%26%23xDC%3Bbersicht%20zu%20aktuellen%20und%20k%26%23xFC%3Bnftigen%20Erscheinungsformen.%20%3Ci%3EForensische%20Psychiatrie%2C%20Psychologie%2C%20Kriminologie%3C%5C%2Fi%3E%2C%20%3Ci%3E14%3C%5C%2Fi%3E%283%29%2C%20233%26%23x2013%3B241.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs11757-020–00605‑0%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs11757-020–00605‑0%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyberkriminalit%5Cu00e4t%3A%20%5Cu00dcbersicht%20zu%20aktuellen%20und%20k%5Cu00fcnftigen%20Erscheinungsformen%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Barbara%22%2C%22lastName%22%3A%22Horten%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marleen%22%2C%22lastName%22%3A%22Gr%5Cu00e4ber%22%7D%5D%2C%22abstractNote%22%3A%22The%20possibilities%20for%20cybercriminals%20and%20the%20manifestations%20of%20cybercrime%20have%20signi%5Cufb01cantly%20increased%20in%20recent%20years%20due%20to%20the%20digitalization%20and%20spread%20of%20internet-enabled%20devices.%20The%20term%20cybercrime%20describes%20criminal%20acts%20committed%20via%20internet%2C%20but%20there%20are%20numerous%20manifestations%20which%20are%20classi%5Cufb01ed%20differently%20depending%20on%20the%20context%20of%20cybercrime.%20The%20prevalence%20of%20cybercrime%20is%20presented%20in%20the%20annual%20Federal%20Management%20Report%20of%20the%20German%20Federal%20Criminal%20Police%20Of%5Cufb01ce%20%28BKA%29.%20This%20report%20identi%5Cufb01es%20challenges%20by%2C%20among%20others%2C%20new%20methods%20of%20distributing%20malware%20and%20identity%20theft.%20Ransomware%2C%20an%20increased%20danger%20potential%20from%20the%20Internet%20of%20things%20and%20attacks%20on%20so-called%20critical%20infrastructures%20must%20also%20be%20perceived%20as%20cybercriminal%20threats.%20In%20addition%2C%20sexually%20motivated%20crimes%2C%20such%20as%20child%20pornography%2C%20also%20spread%20faster%20in%20the%20virtual%20space.%20The%20German%20Police%20Crime%20Statistics%20for%202019%20showed%20a%2015.4%25%20increase%20in%20cybercrime%20compared%20to%20the%20previous%20year.%20An%20increase%20in%20identity%20theft%20via%20platforms%2C%20such%20as%20darknet%20as%20well%20as%20a%20growing%20potential%20threat%20from%20developments%2C%20such%20as%20smart%20homes%2C%20cloud%20computing%20or%20big%20data%20is%20predicted.%20Empirical%20studies%20on%20the%20victimization%20experiences%20of%20cyberattacks%20are%20available%20for%20private%20individuals%20and%20industrial%20companies.%20The%20offenders%20were%20mostly%20young%20male%20adults.%22%2C%22date%22%3A%2208%5C%2F2020%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%2210.1007%5C%2Fs11757-020–00605‑0%22%2C%22ISSN%22%3A%221862–7072%2C%201862–7080%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2Fs11757-020–00605‑0%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–10-12T11%3A12%3A13Z%22%7D%7D%2C%7B%22key%22%3A%22SCF48LU2%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kasprowicz%20and%20Rieger%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EKasprowicz%2C%20D.%2C%20%26amp%3B%20Rieger%2C%20S.%20%28Eds.%29.%20%282020%29.%20%3Ci%3EHandbuch%20Virtualit%26%23xE4%3Bt%3C%5C%2Fi%3E.%20Springer%20Fachmedien%20Wiesbaden.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2F978‑3–658-16342–6%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Handbuch%20Virtualit%5Cu00e4t%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Dawid%22%2C%22lastName%22%3A%22Kasprowicz%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Stefan%22%2C%22lastName%22%3A%22Rieger%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22de%22%2C%22ISBN%22%3A%22978–3‑658–16341‑9%20978–3‑658–16342‑6%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2F978‑3–658-16342–6%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–10-12T11%3A12%3A03Z%22%7D%7D%2C%7B%22key%22%3A%227SZ2VVP2%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Bartsch%20and%20Frey%22%2C%22parsedDate%22%3A%222017%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EBartsch%2C%20M.%2C%20%26amp%3B%20Frey%2C%20S.%20%282017%29.%20%3Ci%3ECyberstrategien%20f%26%23xFC%3Br%20Unternehmen%20und%20Beh%26%23xF6%3Brden%3C%5C%2Fi%3E.%20Springer%20Fachmedien%20Wiesbaden.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2F978‑3–658-16139–2%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Cyberstrategien%20f%5Cu00fcr%20Unternehmen%20und%20Beh%5Cu00f6rden%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michael%22%2C%22lastName%22%3A%22Bartsch%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Stefanie%22%2C%22lastName%22%3A%22Frey%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222017%22%2C%22language%22%3A%22de%22%2C%22ISBN%22%3A%22978–3‑658–16138‑5%20978–3‑658–16139‑2%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2F978‑3–658-16139–2%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–10-12T11%3A11%3A54Z%22%7D%7D%2C%7B%22key%22%3A%224X9485DU%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Peter%20et%20al.%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EPeter%2C%20M.%20K.%2C%20H%26%23xF6%3Blzli%2C%20A.%2C%20Kaelin%2C%20A.%20W.%2C%20Lerch%2C%20K.%20M.%2C%20Vifian%2C%20P.%2C%20%26amp%3B%20Wettstein%2C%20N.%20%28n.d.%29.%20%3Ci%3EHomeoffice%20und%20Cybers%26%23xAD%3B%20icherheit%20in%20Schweizer%20KMU%3C%5C%2Fi%3E.%2030.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Homeoffice%20und%20Cybers%5Cu00ad%20icherheit%20in%20Schweizer%20KMU%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marc%20K%22%2C%22lastName%22%3A%22Peter%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andreas%22%2C%22lastName%22%3A%22H%5Cu00f6lzli%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andreas%20W%22%2C%22lastName%22%3A%22Kaelin%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Karin%20M%5Cu00e4ndli%22%2C%22lastName%22%3A%22Lerch%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Patric%22%2C%22lastName%22%3A%22Vifian%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nicole%22%2C%22lastName%22%3A%22Wettstein%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–07-01T08%3A16%3A34Z%22%7D%7D%2C%7B%22key%22%3A%22QNG9BN33%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Newman%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ENewman%2C%20N.%20%28n.d.%29.%20%3Ci%3EReuters%20Institute%20Digital%20News%20Report%202020%3C%5C%2Fi%3E%20%28p.%20112%29.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Reuters%20Institute%20Digital%20News%20Report%202020%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nic%22%2C%22lastName%22%3A%22Newman%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-23T09%3A10%3A21Z%22%7D%7D%2C%7B%22key%22%3A%222KDPJWAW%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Deloitte%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EDeloitte.%20%28n.d.%29.%20%3Ci%3ECyber%20survey%202020%3C%5C%2Fi%3E.%20Retrieved%20May%2023%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fdk%5C%2FDocuments%5C%2FCyber%5C%2Fcyberreport%5C%2FCyber_survey_.pdf%27%3Ehttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fdk%5C%2FDocuments%5C%2FCyber%5C%2Fcyberreport%5C%2FCyber_survey_.pdf%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Cyber%20survey%202020%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Deloitte%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fdk%5C%2FDocuments%5C%2FCyber%5C%2Fcyberreport%5C%2FCyber_survey_.pdf%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-23T09%3A04%3A58Z%22%7D%7D%2C%7B%22key%22%3A%22VL38YCCD%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Deloitte%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EDeloitte.%20%282019%29.%20%3Ci%3ECyber%20Security%20Report%202019.%20Teil%201%20Deutschland%3C%5C%2Fi%3E.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FCyber-Security-Report-2019-Teil‑1.pdf%27%3Ehttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FCyber-Security-Report-2019-Teil‑1.pdf%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Cyber%20Security%20Report%202019.%20Teil%201%20Deutschland%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Deloitte%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22language%22%3A%22d%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FCyber-Security-Report-2019-Teil‑1.pdf%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-23T09%3A02%3A04Z%22%7D%7D%2C%7B%22key%22%3A%22NIKLGACZ%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Deloitte%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EDeloitte.%20%28n.d.%29.%20%3Ci%3EDeloitte%20Cyber%20Security%20Report-2021%20Deutschland%3C%5C%2Fi%3E.%20Retrieved%20May%2023%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FDeloitte-Cyber-Security-Report-2021.pdf%27%3Ehttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FDeloitte-Cyber-Security-Report-2021.pdf%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Deloitte%20Cyber%20Security%20Report-2021%20Deutschland%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Deloitte%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FDeloitte-Cyber-Security-Report-2021.pdf%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-23T09%3A01%3A55Z%22%7D%7D%2C%7B%22key%22%3A%2253WX4CP4%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3ETechnology%20Solutions%20for%20Complying%20with%20the%20GDPR%20and%20Data%20Privacy%20Laws%3C%5C%2Fi%3E.%20%28n.d.%29.%20Retrieved%20May%2015%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.shrm.org%5C%2Fresourcesandtools%5C%2Fhr-topics%5C%2Ftechnology%5C%2Fpages%5C%2Ftechnology-solutions-gdpr-data-privacy-laws.aspx%27%3Ehttps%3A%5C%2F%5C%2Fwww.shrm.org%5C%2Fresourcesandtools%5C%2Fhr-topics%5C%2Ftechnology%5C%2Fpages%5C%2Ftechnology-solutions-gdpr-data-privacy-laws.aspx%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Technology%20Solutions%20for%20Complying%20with%20the%20GDPR%20and%20Data%20Privacy%20Laws%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.shrm.org%5C%2Fresourcesandtools%5C%2Fhr-topics%5C%2Ftechnology%5C%2Fpages%5C%2Ftechnology-solutions-gdpr-data-privacy-laws.aspx%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A30%3A46Z%22%7D%7D%2C%7B%22key%22%3A%22E4IKYQ2G%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3EExclusive%3A%20Senior%20EU%20officials%20were%20targeted%20with%20Israeli%20spyware%20%7C%20Reuters%3C%5C%2Fi%3E.%20%28n.d.%29.%20Retrieved%20May%2015%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.reuters.com%5C%2Ftechnology%5C%2Fexclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022–04-11%5C%2F%27%3Ehttps%3A%5C%2F%5C%2Fwww.reuters.com%5C%2Ftechnology%5C%2Fexclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022–04-11%5C%2F%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Exclusive%3A%20Senior%20EU%20officials%20were%20targeted%20with%20Israeli%20spyware%20%7C%20Reuters%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.reuters.com%5C%2Ftechnology%5C%2Fexclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022–04-11%5C%2F%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A30%3A20Z%22%7D%7D%2C%7B%22key%22%3A%22G2WKIWWE%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Raaflaub%29%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ERaaflaub%29%2C%20%26lt%3BKaty%20Romy%26gt%3B%2C%20%28%26%23xDC%3Bbertragung%20aus%20dem%20Franz%26%23xF6%3Bsischen%3A%20Christian.%20%28n.d.%29.%20%3Ci%3EHomeoffice%20%26%23x2013%3B%20Einfallstor%20f%26%23xFC%3Br%20Cyberkriminelle%3C%5C%2Fi%3E.%20SWI%20swissinfo.ch.%20Retrieved%20May%2015%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.swissinfo.ch%5C%2Fger%5C%2Fgesellschaft%5C%2Fhomeoffice—einfallstor-fuer-cyberkriminelle%5C%2F46155880%27%3Ehttps%3A%5C%2F%5C%2Fwww.swissinfo.ch%5C%2Fger%5C%2Fgesellschaft%5C%2Fhomeoffice—einfallstor-fuer-cyberkriminelle%5C%2F46155880%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Homeoffice%20%5Cu2013%20Einfallstor%20f%5Cu00fcr%20Cyberkriminelle%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%3CKaty%20Romy%3E%2C%20%28%5Cu00dcbertragung%20aus%20dem%20Franz%5Cu00f6sischen%3A%20Christian%22%2C%22lastName%22%3A%22Raaflaub%29%22%7D%5D%2C%22abstractNote%22%3A%22Viele%20Firmen%20sind%20immer%20noch%20schlecht%20ger%5Cu00fcstet.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.swissinfo.ch%5C%2Fger%5C%2Fgesellschaft%5C%2Fhomeoffice—einfallstor-fuer-cyberkriminelle%5C%2F46155880%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A28%3A18Z%22%7D%7D%2C%7B%22key%22%3A%22PYQ4NNZK%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3EWas%20ist%20Cyberkriminalit%26%23xE4%3Bt%20und%20wie%20l%26%23xE4%3Bsst%20sie%20sich%20verhindern%3F%3C%5C%2Fi%3E%20%28n.d.%29.%20Was%20ist%20Cyberkriminalit%26%23xE4%3Bt%20und%20wie%20l%26%23xE4%3Bsst%20sie%20sich%20verhindern%3F%20Retrieved%20May%2015%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.avast.com%5C%2Fde-de%5C%2Fc-cybercrime%27%3Ehttps%3A%5C%2F%5C%2Fwww.avast.com%5C%2Fde-de%5C%2Fc-cybercrime%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Was%20ist%20Cyberkriminalit%5Cu00e4t%20und%20wie%20l%5Cu00e4sst%20sie%20sich%20verhindern%3F%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Jedes%20Jahr%20kostet%20Cyberkriminalit%5Cu00e4t%20Einzelpersonen%20und%20Unternehmen%20Milliarden%20von%20Dollar%2C%20Tendenz%20steigend.%20Aber%20was%20genau%20hat%20man%20sich%20darunter%20vorzustellen%3F%20Hier%20herausfinden.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.avast.com%5C%2Fde-de%5C%2Fc-cybercrime%22%2C%22language%22%3A%22de-de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A27%3A52Z%22%7D%7D%2C%7B%22key%22%3A%22ASCKGCWR%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3ECyberkriminelle%20zur%20Bek%26%23xE4%3Bmpfung%20von%20Cyberkriminalit%26%23xE4%3Bt%20im%20Visier%3C%5C%2Fi%3E.%20%28n.d.%29.%20FireEye.%20Retrieved%20May%2015%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.fireeye.de%5C%2Fcurrent-threats%5C%2Fstopping-todays-cyber-attacks.html%27%3Ehttps%3A%5C%2F%5C%2Fwww.fireeye.de%5C%2Fcurrent-threats%5C%2Fstopping-todays-cyber-attacks.html%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Cyberkriminelle%20zur%20Bek%5Cu00e4mpfung%20von%20Cyberkriminalit%5Cu00e4t%20im%20Visier%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Cyberkriminalit%5Cu00e4t%20und%20Cyberangriffe%20nehmen%20weiter%20zu.%20Informieren%20Sie%20sich%2C%20wie%20Cyberkriminelle%20die%20Sicherheitsma%5Cu00dfnahmen%20von%20Unternehmen%20rasch%20%5Cu00fcberwinden%20und%20wie%20Sie%20sie%20stoppen%20k%5Cu00f6nnen.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.fireeye.de%5C%2Fcurrent-threats%5C%2Fstopping-todays-cyber-attacks.html%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A27%3A27Z%22%7D%7D%2C%7B%22key%22%3A%22N62QBC8V%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3ECyberkriminalit%26%23xE4%3Bt%20%26%23x2013%3B%20die%20Gefahr%20aus%20dem%20Home%20Office%3C%5C%2Fi%3E.%20%28n.d.%29.%20Deloitte%20Schweiz.%20Retrieved%20May%2015%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fch%5C%2Fde%5C%2Fpages%5C%2Frisk%5C%2Farticles%5C%2Fcovid-19-cyber-crime-working-from-home.html%27%3Ehttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fch%5C%2Fde%5C%2Fpages%5C%2Frisk%5C%2Farticles%5C%2Fcovid-19-cyber-crime-working-from-home.html%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Cyberkriminalit%5Cu00e4t%20%5Cu2013%20die%20Gefahr%20aus%20dem%20Home%20Office%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Die%20Arbeit%20aus%20dem%20Home%20Office%20stellt%20f%5Cu00fcr%20Unternehmen%20aufgrund%20der%20steigenden%20Anzahl%20von%20Cyberkriminellen%2C%20die%20COVID-19-bedingte%20%5Cu00c4ngste%20ausn%5Cu00fctzen%2C%20schlechter%20technologischer%20Infrastruktur%20und%20vor%20allem%20unzureichender%20Cyber-%20und%20Datensicherheit%20ein%20grosses%20Cyberrisiko%20dar.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fch%5C%2Fde%5C%2Fpages%5C%2Frisk%5C%2Farticles%5C%2Fcovid-19-cyber-crime-working-from-home.html%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A27%3A03Z%22%7D%7D%2C%7B%22key%22%3A%229J5KDV3R%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hillig%22%2C%22parsedDate%22%3A%222021–03-15%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EHillig%2C%20J.%20%282021%2C%20March%2015%29.%20%3Ci%3ESo%20leicht%20konnte%20Luzernerin%20%26%23xFC%3Bber%20150%26%23x2019%3B000%20Kameras%20hacken%3C%5C%2Fi%3E.%20Blick.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.blick.ch%5C%2Fschweiz%5C%2Fsicherheits-skandal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html%27%3Ehttps%3A%5C%2F%5C%2Fwww.blick.ch%5C%2Fschweiz%5C%2Fsicherheits-skandal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22So%20leicht%20konnte%20Luzernerin%20%5Cu00fcber%20150%27000%20Kameras%20hacken%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Johannes%22%2C%22lastName%22%3A%22Hillig%22%7D%5D%2C%22abstractNote%22%3A%22Ein%20Schweizer%20Hacker-Kollektiv%20knackte%20rund%20150%27000%20%5Cu00dcberwachungskameras%20einer%20US-Firma%2C%20die%20in%20Gef%5Cu00e4ngnissen%20und%20Spit%5Cu00e4lern%20genutzt%20werden.%20Daf%5Cu00fcr%20brauchte%20es%20kein%20Super-Genie%2C%20erkl%5Cu00e4rt%20Berufshacker%20Cyrill%20Brunschwiler.%22%2C%22date%22%3A%222021–03-15T17%3A51%3A57.5757%2B01%3A00%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.blick.ch%5C%2Fschweiz%5C%2Fsicherheits-skandal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html%22%2C%22language%22%3A%22de-CH%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T09%3A26%3A14Z%22%7D%7D%2C%7B%22key%22%3A%22Z6KQMW5S%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Bundesamt%20f%5Cu00fcr%20Statistik%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EBundesamt%20f%26%23xFC%3Br%20Statistik.%20%28n.d.%29.%20%3Ci%3EGemeldete%20Ffaelle%20von%20Cyberkriminalitaet%20in%20der%20Shweiz%202021%3C%5C%2Fi%3E.%20Statista.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22document%22%2C%22title%22%3A%22Gemeldete%20Ffaelle%20von%20Cyberkriminalitaet%20in%20der%20Shweiz%202021%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Bundesamt%20f%5Cu00fcr%20Statistik%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-12T13%3A55%3A19Z%22%7D%7D%2C%7B%22key%22%3A%22PBJH42T5%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22parsedDate%22%3A%222022–02-09%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3EESET%20Threat%20Report%20T3%202021%3C%5C%2Fi%3E.%20%282022%2C%20February%209%29.%20WeLiveSecurity.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.welivesecurity.com%5C%2Fdeutsch%5C%2F2022%5C%2F02%5C%2F09%5C%2Feset-threat-report-t3-2021%5C%2F%27%3Ehttps%3A%5C%2F%5C%2Fwww.welivesecurity.com%5C%2Fdeutsch%5C%2F2022%5C%2F02%5C%2F09%5C%2Feset-threat-report-t3-2021%5C%2F%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22ESET%20Threat%20Report%20T3%202021%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Wir%20betrachten%20die%20Bedrohungslandschaft%20im%20letzten%20Jahresdrittel%202021%20aus%20Perspektive%20der%20ESET%20Telemetrie%20und%20der%20ESET%20Sicherheitsforscher.%22%2C%22date%22%3A%222022–02-09T10%3A30%3A47%2B00%3A00%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.welivesecurity.com%5C%2Fdeutsch%5C%2F2022%5C%2F02%5C%2F09%5C%2Feset-threat-report-t3-2021%5C%2F%22%2C%22language%22%3A%22de-DE%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–02-26T19%3A52%3A05Z%22%7D%7D%2C%7B%22key%22%3A%22PNIYJPDF%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3EAllianz%20Risk%20Barometer%202020%3A%20Cyber%20steigt%20zum%20weltweiten%20Top-Risiko%20f%26%23xFC%3Br%20Unternehmen%20auf%20%7C%20AGCS%3C%5C%2Fi%3E.%20%28n.d.%29.%20Retrieved%20February%2017%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.agcs.allianz.com%5C%2Fnews-and-insights%5C%2Fnews%5C%2Fallianz-risk-barometer-2020-de.html%27%3Ehttps%3A%5C%2F%5C%2Fwww.agcs.allianz.com%5C%2Fnews-and-insights%5C%2Fnews%5C%2Fallianz-risk-barometer-2020-de.html%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Allianz%20Risk%20Barometer%202020%3A%20Cyber%20steigt%20zum%20weltweiten%20Top-Risiko%20f%5Cu00fcr%20Unternehmen%20auf%20%7C%20AGCS%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.agcs.allianz.com%5C%2Fnews-and-insights%5C%2Fnews%5C%2Fallianz-risk-barometer-2020-de.html%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–02-17T11%3A45%3A09Z%22%7D%7D%2C%7B%22key%22%3A%22EIJ8DCU8%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3ENews%20-%20Cyber%20Risks%3A%20Von%20der%20abstrakten%20Gefahr%20zur%20t%26%23xE4%3Bglichen%20Realit%26%23xE4%3Bt%3C%5C%2Fi%3E.%20%28n.d.%29.%20Retrieved%20December%2012%2C%202021%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.swico.ch%5C%2Fde%5C%2Fnews%5C%2Fdetail%5C%2Fcyber-risks-von-der-abstrakten-gefahr-zur-taglichen-realitat%27%3Ehttps%3A%5C%2F%5C%2Fwww.swico.ch%5C%2Fde%5C%2Fnews%5C%2Fdetail%5C%2Fcyber-risks-von-der-abstrakten-gefahr-zur-taglichen-realitat%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22News%20-%20Cyber%20Risks%3A%20Von%20der%20abstrakten%20Gefahr%20zur%20t%5Cu00e4glichen%20Realit%5Cu00e4t%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Verlust%20von%20Daten%20oder%20deren%20Missbrauch%20sind%20f%5Cu00fcr%20Unternehmen%20nicht%20mehr%20nur%20abstrakte%20Gefahr%2C%20sondern%20immer%20mehr%20harte%20Realit%5Cu00e4t%3A%20Finanzielle%20Verluste%20und%20Schaden%20an%20der%20Reputation%20sind%20direkte%20Folgen.%20Aber%20auch%20rechtliche%20Konsequenzen%20sind%20zu%20bedenken.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.swico.ch%5C%2Fde%5C%2Fnews%5C%2Fdetail%5C%2Fcyber-risks-von-der-abstrakten-gefahr-zur-taglichen-realitat%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222021–12-12T19%3A22%3A03Z%22%7D%7D%2C%7B%22key%22%3A%22FTINUYI6%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3EElsevier%20Enhanced%20Reader%3C%5C%2Fi%3E.%20%28n.d.%29.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.egyr.2021.08.126%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Elsevier%20Enhanced%20Reader%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Freader.elsevier.com%5C%2Freader%5C%2Fsd%5C%2Fpii%5C%2FS2352484721007289%3Ftoken%3D8F3095942FCB04D00890CEFAA466B1D47B1A963596BEE44CF02349922797C366375869320AA7CC86610BE986AAAD0650%26originRegion%3Deu-west‑1%26originCreation%3D20211129102740%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222021–11-29T10%3A27%3A55Z%22%7D%7D%2C%7B%22key%22%3A%224M4GQBNT%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22lastModifiedByUser%22%3A%7B%22id%22%3A5893267%2C%22username%22%3A%22Tabaeris%22%2C%22name%22%3A%22Dr.%20Baeriswyl%20Othmar%22%2C%22links%22%3A%7B%22alternate%22%3A%7B%22href%22%3A%22https%3A%5C%2F%5C%2Fwww.zotero.org%5C%2Ftabaeris%22%2C%22type%22%3A%22text%5C%2Fhtml%22%7D%7D%7D%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3EReputation%20Management%20in%20der%20IT-Security%20%7C%20Swisscom%3C%5C%2Fi%3E.%20%28n.d.%29.%20Retrieved%20November%2027%2C%202021%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.swisscom.ch%5C%2Fde%5C%2Fbusiness%5C%2Fenterprise%5C%2Fthemen%5C%2Fsecurity%5C%2Freputation-management-cyber-security.html%27%3Ehttps%3A%5C%2F%5C%2Fwww.swisscom.ch%5C%2Fde%5C%2Fbusiness%5C%2Fenterprise%5C%2Fthemen%5C%2Fsecurity%5C%2Freputation-management-cyber-security.html%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Reputation%20Management%20in%20der%20IT-Security%20%7C%20Swisscom%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Cyberkriminelle%20drohen%20mit%20ihren%20erpresserischen%20Angriffen%20vermehrt%2C%20das%20Vertrauen%20und%20damit%20den%20Ruf%20einer%20Firma%20zu%20besch%5Cu00e4digen.%20Doch%20es%20gibt%20Gegenmassnahmen.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.swisscom.ch%5C%2Fde%5C%2Fbusiness%5C%2Fenterprise%5C%2Fthemen%5C%2Fsecurity%5C%2Freputation-management-cyber-security.html%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22E2H4LURA%22%2C%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222021–11-27T22%3A22%3A22Z%22%7D%7D%2C%7B%22key%22%3A%22TZYNVU4E%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3ESignificant%20Cyber%20Incidents%20%7C%20Center%20for%20Strategic%20and%20International%20Studies%3C%5C%2Fi%3E.%20%28n.d.%29.%20Retrieved%20November%201%2C%202021%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.csis.org%5C%2Fprograms%5C%2Fstrategic-technologies-program%5C%2Fsignificant-cyber-incidents%27%3Ehttps%3A%5C%2F%5C%2Fwww.csis.org%5C%2Fprograms%5C%2Fstrategic-technologies-program%5C%2Fsignificant-cyber-incidents%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Significant%20Cyber%20Incidents%20%7C%20Center%20for%20Strategic%20and%20International%20Studies%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22This%20timeline%20records%20significant%20cyber%20incidents%20since%202006.%20We%20focus%20on%20cyber%20attacks%20on%20government%20agencies%2C%20defense%20and%20high%20tech%20companies%2C%20or%20economic%20crimes%20with%20losses%20of%20more%20than%20a%20million%20dollars.%20Download%20the%20Full%20Incidents%20List%20Below%20is%20a%20summary%20of%20incidents%20from%20over%20the%20last%20year.%20For%20the%20full%20list%2C%20click%20the%20download%20link%20above.%20September%202021.%20Chinese%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.csis.org%5C%2Fprograms%5C%2Fstrategic-technologies-program%5C%2Fsignificant-cyber-incidents%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222021–11-01T16%3A06%3A27Z%22%7D%7D%2C%7B%22key%22%3A%2262HHLD8B%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3ECyberangriffe%20im%20Corona-Jahr%20%26%23x2013%3B%20Schweizer%20Firmen%20sind%20ein%20beliebtes%20Ziel%20f%26%23xFC%3Br%20Hacker%20%7C%20Berner%20Zeitung%3C%5C%2Fi%3E.%20%28n.d.%29.%20Retrieved%20November%201%2C%202021%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.bernerzeitung.ch%5C%2Fschweizer-firmen-sind-ein-beliebtes-ziel-fuer-hacker-524951045025%27%3Ehttps%3A%5C%2F%5C%2Fwww.bernerzeitung.ch%5C%2Fschweizer-firmen-sind-ein-beliebtes-ziel-fuer-hacker-524951045025%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Cyberangriffe%20im%20Corona-Jahr%20%5Cu2013%20Schweizer%20Firmen%20sind%20ein%20beliebtes%20Ziel%20f%5Cu00fcr%20Hacker%20%7C%20Berner%20Zeitung%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.bernerzeitung.ch%5C%2Fschweizer-firmen-sind-ein-beliebtes-ziel-fuer-hacker-524951045025%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222021–11-01T16%3A05%3A28Z%22%7D%7D%2C%7B%22key%22%3A%22E8LCALFD%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22M%5Cu00e4der%22%2C%22numChildren%22%3A3%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EM%26%23xE4%3Bder%2C%20L.%20%28n.d.%29.%20%3Ci%3ECyber-Delegierter%20des%20Bundes%3A%20%26%23xAB%3BWir%20k%26%23xF6%3Bnnen%20nicht%20alle%20sch%26%23xFC%3Btzen%26%23xBB%3B%3C%5C%2Fi%3E.%20Neue%20Z%26%23xFC%3Brcher%20Zeitung.%20Retrieved%20January%205%2C%202020%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.nzz.ch%5C%2Fschweiz%5C%2Fwir-koennen-die-unternehmen-nicht-vor-cyberangriffen-schuetzen-ld.1529475%27%3Ehttps%3A%5C%2F%5C%2Fwww.nzz.ch%5C%2Fschweiz%5C%2Fwir-koennen-die-unternehmen-nicht-vor-cyberangriffen-schuetzen-ld.1529475%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Cyber-Delegierter%20des%20Bundes%3A%20%5Cu00abWir%20k%5Cu00f6nnen%20nicht%20alle%20sch%5Cu00fctzen%5Cu00bb%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lukas%22%2C%22lastName%22%3A%22M%5Cu00e4der%22%7D%5D%2C%22abstractNote%22%3A%22Seit%20August%20hat%20der%20Bund%20einen%20%5Cu00abMr.%20Cyber%5Cu00bb%2C%20der%20die%20Anstrengungen%20im%20Bereich%20Cybersicherheit%20koordinieren%20soll.%20Erstmals%20spricht%20der%2038‑j%5Cu00e4hrige%20Florian%20Sch%5Cu00fctz%20%5Cu00fcber%20die%20vielen%20Erwartungen%20an%20ihn%20und%20seine%20laufenden%20Projekte.%20Und%20er%20sagt%2C%20was%20er%20sich%20von%20der%20Wirtschaft%20w%5Cu00fcnscht.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.nzz.ch%5C%2Fschweiz%5C%2Fwir-koennen-die-unternehmen-nicht-vor-cyberangriffen-schuetzen-ld.1529475%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222021–11-01T16%3A01%3A07Z%22%7D%7D%2C%7B%22key%22%3A%22JH85NF5E%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Scherrer%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EScherrer%2C%20L.%20%28n.d.%29.%20%3Ci%3EAus%20den%20Akten%20eines%20Staatsfeindes%20%7C%20NZZ%3C%5C%2Fi%3E.%20Neue%20Z%26%23xFC%3Brcher%20Zeitung.%20Retrieved%20January%208%2C%202020%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.nzz.ch%5C%2Fschweiz%5C%2Faus-den-akten-eines-staatsfeindes-ld.1532375%27%3Ehttps%3A%5C%2F%5C%2Fwww.nzz.ch%5C%2Fschweiz%5C%2Faus-den-akten-eines-staatsfeindes-ld.1532375%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Aus%20den%20Akten%20eines%20Staatsfeindes%20%7C%20NZZ%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lucien%22%2C%22lastName%22%3A%22Scherrer%22%7D%5D%2C%22abstractNote%22%3A%22W%5Cu00e4hrend%20des%20Kalten%20Krieges%20%5Cu00fcberwachen%20und%20registrieren%20Staatssch%5Cu00fctzer%20Hunderttausende%20B%5Cu00fcrger.%20Zu%20ihnen%20geh%5Cu00f6rt%20der%20Basler%20Milit%5Cu00e4rgegner%20Richard%20Spillmann%2C%20der%20%5Cu00fcber%20Jahre%20wie%20ein%20Schwerverbrecher%20observiert%20wurde.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.nzz.ch%5C%2Fschweiz%5C%2Faus-den-akten-eines-staatsfeindes-ld.1532375%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222021–11-01T16%3A00%3A18Z%22%7D%7D%2C%7B%22key%22%3A%22L6UCCWIJ%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Thier%22%2C%22parsedDate%22%3A%222020–01-28%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EThier%2C%20J.%20%282020%2C%20January%2028%29.%20Cyber-Angriffe%3A%20Viele%20Spit%26%23xE4%3Bler%20untersch%26%23xE4%3Btzen%20Gefahr%20f%26%23xFC%3Br%20die%20IT.%20%3Ci%3ENeue%20Z%26%23xFC%3Brcher%20Zeitung%3C%5C%2Fi%3E.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.nzz.ch%5C%2Fdigital%5C%2Fwir-hatten-ein-riesenglueck-ld.1536678%27%3Ehttps%3A%5C%2F%5C%2Fwww.nzz.ch%5C%2Fdigital%5C%2Fwir-hatten-ein-riesenglueck-ld.1536678%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22newspaperArticle%22%2C%22title%22%3A%22Cyber-Angriffe%3A%20Viele%20Spit%5Cu00e4ler%20untersch%5Cu00e4tzen%20Gefahr%20f%5Cu00fcr%20die%20IT%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jenni%22%2C%22lastName%22%3A%22Thier%22%7D%5D%2C%22abstractNote%22%3A%22Viele%20Schweizer%20Spit%5Cu00e4ler%20untersch%5Cu00e4tzen%20das%20Risiko%20von%20Cyberangriffen.%20Verpflichtende%20Mindeststandards%20f%5Cu00fcr%20die%20interne%20IT-Sicherheit%20gibt%20es%20nicht.%20Doch%20das%20k%5Cu00f6nnte%20sich%20%5Cu00e4ndern.%22%2C%22date%22%3A%222020–01-28T04%3A30%3A00.000Z%22%2C%22section%22%3A%22%22%2C%22language%22%3A%22de-CH%22%2C%22ISSN%22%3A%220376–6829%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.nzz.ch%5C%2Fdigital%5C%2Fwir-hatten-ein-riesenglueck-ld.1536678%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222021–11-01T16%3A00%3A00Z%22%7D%7D%2C%7B%22key%22%3A%224GIM4LFJ%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22V.%5Cu2005M%5Cu00fcller%22%2C%22parsedDate%22%3A%222020–05-29%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EV.%26%23x2005%3BM%26%23xFC%3Bller%2C%20G.%20%282020%2C%20May%2029%29.%20Stadler%20Rail%3A%20Hacker%20stellen%20Ultimatum%2C%20Spuhler%20will%20hart%20bleiben.%20%3Ci%3ENeue%20Z%26%23xFC%3Brcher%20Zeitung%3C%5C%2Fi%3E.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.nzz.ch%5C%2Fwirtschaft%5C%2Fhacker-stellen-stadler-rail-ein-ultimatum-ld.1558845%27%3Ehttps%3A%5C%2F%5C%2Fwww.nzz.ch%5C%2Fwirtschaft%5C%2Fhacker-stellen-stadler-rail-ein-ultimatum-ld.1558845%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22newspaperArticle%22%2C%22title%22%3A%22Stadler%20Rail%3A%20Hacker%20stellen%20Ultimatum%2C%20Spuhler%20will%20hart%20bleiben%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Giorgio%22%2C%22lastName%22%3A%22V.%5Cu2005M%5Cu00fcller%22%7D%5D%2C%22abstractNote%22%3A%22Die%20ersten%20im%20Rahmen%20einer%20Cyberattacke%20bei%20Stadler%20Rail%20entwendeten%20Dokumente%20sind%20ver%5Cu00f6ffentlicht%20worden.%20Das%20Unternehmen%20weigert%20sich%20weiterhin%2C%20die%20verlangten%206%20Millionen%20Dollar%5Cu00a0L%5Cu00f6segeld%20zu%20bezahlen.%20Im%20In-%20und%20Ausland%20sind%20die%20Beh%5Cu00f6rden%20eingeschaltet%5Cu00a0worden.%22%2C%22date%22%3A%222020–05-29T11%3A29%3A21.555Z%22%2C%22section%22%3A%22%22%2C%22language%22%3A%22de-CH%22%2C%22ISSN%22%3A%220376–6829%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.nzz.ch%5C%2Fwirtschaft%5C%2Fhacker-stellen-stadler-rail-ein-ultimatum-ld.1558845%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222021–11-01T15%3A59%3A41Z%22%7D%7D%2C%7B%22key%22%3A%22XJUQTMKY%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Pugnetti%20and%20Casi%5Cu00e1n%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EPugnetti%2C%20C.%2C%20%26amp%3B%20Casi%26%23xE1%3Bn%2C%20C.%20%28n.d.%29.%20%3Ci%3ECyberrisiken%20und%20Schweizer%20KMU%26%23x202F%3B%3A%20Eine%20Untersuchung%20der%20Einstellungen%20von%20Mitarbeitenden%20und%20verhaltensbedingter%20Anf%26%23xE4%3Blligkeiten%3C%5C%2Fi%3E.%2032.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyberrisiken%20und%20Schweizer%20KMU%20%3A%20Eine%20Untersuchung%20der%20Einstellungen%20von%20Mitarbeitenden%20und%20verhaltensbedingter%20Anf%5Cu00e4lligkeiten%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Carlo%22%2C%22lastName%22%3A%22Pugnetti%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Carlos%22%2C%22lastName%22%3A%22Casi%5Cu00e1n%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222021–08-27T13%3A12%3A30Z%22%7D%7D%5D%7D
Kaschner, H. (2020). Cyber Crisis Management: Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation. Springer Fachmedien Wiesbaden. https://doi.org/10.1007/978–3‑658–27914‑1
Rosenberger, N., Niederhäuser, M., & Krämer, K. (2023). Kommunikation in der digitalen Transformation : Trendstudie Schweiz 2022. https://doi.org/10.21256/ZHAW-2808
Lerch, K. M., & Tanner, M. (2022). Schweizerische Mobiliar Versicherungsgesellschaft AG Digitalswitzerland Allianz Digitale Sicherheit Schweiz Fachhochschule Nordwestschweiz FHNW, Kompetenzzentrum Digitale Transformation Schweizerische Akademie der Technischen Wissenschaften SATW.
Frick, J.-C. (2022). Comparis- Datenvertrauens- studie 2022.
Knoll, M. (2017). IT-Risikomanagement im Zeitalter der Digitalisierung. HMD Praxis der Wirtschaftsinformatik, 54(1), 4–20. https://doi.org/10.1365/s40702-017‑0287‑4
Horten, B., & Gräber, M. (2020). Cyberkriminalität: Übersicht zu aktuellen und künftigen Erscheinungsformen. Forensische Psychiatrie, Psychologie, Kriminologie, 14(3), 233–241. https://doi.org/10.1007/s11757-020–00605‑0
Kasprowicz, D., & Rieger, S. (Eds.). (2020). Handbuch Virtualität. Springer Fachmedien Wiesbaden. https://doi.org/10.1007/978–3‑658–16342‑6
Bartsch, M., & Frey, S. (2017). Cyberstrategien für Unternehmen und Behörden. Springer Fachmedien Wiesbaden. https://doi.org/10.1007/978–3‑658–16139‑2
Peter, M. K., Hölzli, A., Kaelin, A. W., Lerch, K. M., Vifian, P., & Wettstein, N. (n.d.). Homeoffice und Cybers icherheit in Schweizer KMU. 30.
Newman, N. (n.d.). Reuters Institute Digital News Report 2020 (p. 112).
Deloitte. (n.d.). Cyber survey 2020. Retrieved May 23, 2022, from https://www2.deloitte.com/content/dam/Deloitte/dk/Documents/Cyber/cyberreport/Cyber_survey_.pdf
Deloitte. (2019). Cyber Security Report 2019. Teil 1 Deutschland. https://www2.deloitte.com/content/dam/Deloitte/de/Documents/risk/Cyber-Security-Report-2019-Teil‑1.pdf
Deloitte. (n.d.). Deloitte Cyber Security Report-2021 Deutschland. Retrieved May 23, 2022, from https://www2.deloitte.com/content/dam/Deloitte/de/Documents/risk/Deloitte-Cyber-Security-Report-2021.pdf
Technology Solutions for Complying with the GDPR and Data Privacy Laws. (n.d.). Retrieved May 15, 2022, from https://www.shrm.org/resourcesandtools/hr-topics/technology/pages/technology-solutions-gdpr-data-privacy-laws.aspx
Exclusive: Senior EU officials were targeted with Israeli spyware | Reuters. (n.d.). Retrieved May 15, 2022, from https://www.reuters.com/technology/exclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022–04-11/
Raaflaub), <Katy Romy>, (Übertragung aus dem Französischen: Christian. (n.d.). Homeoffice – Einfallstor für Cyberkriminelle. SWI swissinfo.ch. Retrieved May 15, 2022, from https://www.swissinfo.ch/ger/gesellschaft/homeoffice—einfallstor-fuer-cyberkriminelle/46155880
Was ist Cyberkriminalität und wie lässt sie sich verhindern? (n.d.). Was ist Cyberkriminalität und wie lässt sie sich verhindern? Retrieved May 15, 2022, from https://www.avast.com/de-de/c‑cybercrime
Cyberkriminelle zur Bekämpfung von Cyberkriminalität im Visier. (n.d.). FireEye. Retrieved May 15, 2022, from https://www.fireeye.de/current-threats/stopping-todays-cyber-attacks.html
Cyberkriminalität – die Gefahr aus dem Home Office. (n.d.). Deloitte Schweiz. Retrieved May 15, 2022, from https://www2.deloitte.com/ch/de/pages/risk/articles/covid-19-cyber-crime-working-from-home.html
Hillig, J. (2021, March 15). So leicht konnte Luzernerin über 150’000 Kameras hacken. Blick. https://www.blick.ch/schweiz/sicherheits-skandal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html
Bundesamt für Statistik. (n.d.). Gemeldete Ffaelle von Cyberkriminalitaet in der Shweiz 2021. Statista.
ESET Threat Report T3 2021. (2022, February 9). WeLiveSecurity. https://www.welivesecurity.com/deutsch/2022/02/09/eset-threat-report-t3-2021/
Allianz Risk Barometer 2020: Cyber steigt zum weltweiten Top-Risiko für Unternehmen auf | AGCS. (n.d.). Retrieved February 17, 2022, from https://www.agcs.allianz.com/news-and-insights/news/allianz-risk-barometer-2020-de.html
News — Cyber Risks: Von der abstrakten Gefahr zur täglichen Realität. (n.d.). Retrieved December 12, 2021, from https://www.swico.ch/de/news/detail/cyber-risks-von-der-abstrakten-gefahr-zur-taglichen-realitat
Elsevier Enhanced Reader. (n.d.). https://doi.org/10.1016/j.egyr.2021.08.126
Reputation Management in der IT-Security | Swisscom. (n.d.). Retrieved November 27, 2021, from https://www.swisscom.ch/de/business/enterprise/themen/security/reputation-management-cyber-security.html
Significant Cyber Incidents | Center for Strategic and International Studies. (n.d.). Retrieved November 1, 2021, from https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents
Cyberangriffe im Corona-Jahr – Schweizer Firmen sind ein beliebtes Ziel für Hacker | Berner Zeitung. (n.d.). Retrieved November 1, 2021, from https://www.bernerzeitung.ch/schweizer-firmen-sind-ein-beliebtes-ziel-fuer-hacker-524951045025
Mäder, L. (n.d.). Cyber-Delegierter des Bundes: «Wir können nicht alle schützen». Neue Zürcher Zeitung. Retrieved January 5, 2020, from https://www.nzz.ch/schweiz/wir-koennen-die-unternehmen-nicht-vor-cyberangriffen-schuetzen-ld.1529475
Scherrer, L. (n.d.). Aus den Akten eines Staatsfeindes | NZZ. Neue Zürcher Zeitung. Retrieved January 8, 2020, from https://www.nzz.ch/schweiz/aus-den-akten-eines-staatsfeindes-ld.1532375
Thier, J. (2020, January 28). Cyber-Angriffe: Viele Spitäler unterschätzen Gefahr für die IT. Neue Zürcher Zeitung. https://www.nzz.ch/digital/wir-hatten-ein-riesenglueck-ld.1536678
V. Müller, G. (2020, May 29). Stadler Rail: Hacker stellen Ultimatum, Spuhler will hart bleiben. Neue Zürcher Zeitung. https://www.nzz.ch/wirtschaft/hacker-stellen-stadler-rail-ein-ultimatum-ld.1558845
Pugnetti, C., & Casián, C. (n.d.). Cyberrisiken und Schweizer KMU : Eine Untersuchung der Einstellungen von Mitarbeitenden und verhaltensbedingter Anfälligkeiten. 32.