{"id":"https://openalex.org/W4388565473","doi":"https://doi.org/10.1365/s40702-023-01014-7","title":"Referenzarchitektur Cybersicherheit im F\u00f6deralsystem Deutschlands","display_name":"Referenzarchitektur Cybersicherheit im F\u00f6deralsystem Deutschlands","publication_year":2023,"publication_date":"2023-11-10","ids":{"openalex":"https://openalex.org/W4388565473","doi":"https://doi.org/10.1365/s40702-023-01014-7"},"language":"de","primary_location":{"id":"doi:10.1365/s40702-023-01014-7","is_oa":true,"landing_page_url":"https://doi.org/10.1365/s40702-023-01014-7","pdf_url":"https://link.springer.com/content/pdf/10.1365/s40702-023-01014-7.pdf","source":{"id":"https://openalex.org/S4210205328","display_name":"HMD Praxis der Wirtschaftsinformatik","issn_l":"1436-3011","issn":["1436-3011","2198-2775"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"HMD Praxis der Wirtschaftsinformatik","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1365/s40702-023-01014-7.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030836275","display_name":"Thomas Rehbohm","orcid":"https://orcid.org/0009-0000-7967-2624"},"institutions":[{"id":"https://openalex.org/I4665924","display_name":"University of Rostock","ror":"https://ror.org/03zdwsf69","country_code":"DE","type":"education","lineage":["https://openalex.org/I4665924"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Thomas Rehbohm","raw_affiliation_strings":["Institut f\u00fcr Informatik, Universit\u00e4t Rostock, A.-Einstein-Str.\u00a022, 18051, Rostock, Deutschland"],"affiliations":[{"raw_affiliation_string":"Institut f\u00fcr Informatik, Universit\u00e4t Rostock, A.-Einstein-Str.\u00a022, 18051, Rostock, Deutschland","institution_ids":["https://openalex.org/I4665924"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009192517","display_name":"Kurt Sandkuhl","orcid":"https://orcid.org/0000-0002-7431-8412"},"institutions":[{"id":"https://openalex.org/I4665924","display_name":"University of Rostock","ror":"https://ror.org/03zdwsf69","country_code":"DE","type":"education","lineage":["https://openalex.org/I4665924"]},{"id":"https://openalex.org/I94616838","display_name":"J\u00f6nk\u00f6ping University","ror":"https://ror.org/03t54am93","country_code":"SE","type":"education","lineage":["https://openalex.org/I94616838"]}],"countries":["DE","SE"],"is_corresponding":false,"raw_author_name":"Kurt Sandkuhl","raw_affiliation_strings":["Institut f\u00fcr Informatik, Universit\u00e4t Rostock, A.-Einstein-Str.\u00a022, 18051, Rostock, Deutschland","Universit\u00e4t J\u00f6nk\u00f6ping, Gjuterigatan\u00a05, 55111, J\u00f6nk\u00f6ping, Schweden"],"affiliations":[{"raw_affiliation_string":"Institut f\u00fcr Informatik, Universit\u00e4t Rostock, A.-Einstein-Str.\u00a022, 18051, Rostock, Deutschland","institution_ids":["https://openalex.org/I4665924"]},{"raw_affiliation_string":"Universit\u00e4t J\u00f6nk\u00f6ping, Gjuterigatan\u00a05, 55111, J\u00f6nk\u00f6ping, Schweden","institution_ids":["https://openalex.org/I94616838"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030836275"],"corresponding_institution_ids":["https://openalex.org/I4665924"],"apc_list":{"value":2490,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2490,"currency":"EUR","value_usd":2990},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2939633,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"61","issue":"4","first_page":"1042","last_page":"1058"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.12680000066757202,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.12680000066757202,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13603","display_name":"Corporate Social Responsibility and Sustainability","score":0.08579999953508377,"subfield":{"id":"https://openalex.org/subfields/1407","display_name":"Organizational Behavior and Human Resource Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13572","display_name":"German Security and Defense Policies","score":0.07320000231266022,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.7234964370727539},{"id":"https://openalex.org/keywords/humanities","display_name":"Humanities","score":0.6111995577812195},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.1989036202430725}],"concepts":[{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.7234964370727539},{"id":"https://openalex.org/C15708023","wikidata":"https://www.wikidata.org/wiki/Q80083","display_name":"Humanities","level":1,"score":0.6111995577812195},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.1989036202430725}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1365/s40702-023-01014-7","is_oa":true,"landing_page_url":"https://doi.org/10.1365/s40702-023-01014-7","pdf_url":"https://link.springer.com/content/pdf/10.1365/s40702-023-01014-7.pdf","source":{"id":"https://openalex.org/S4210205328","display_name":"HMD Praxis der Wirtschaftsinformatik","issn_l":"1436-3011","issn":["1436-3011","2198-2775"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"HMD Praxis der Wirtschaftsinformatik","raw_type":"journal-article"},{"id":"pmh:oai:econstor.eu:10419/312280","is_oa":true,"landing_page_url":"https://hdl.handle.net/10419/312280","pdf_url":null,"source":{"id":"https://openalex.org/S4306401696","display_name":"Econstor (Econstor)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doc-type:article"},{"id":"pmh:oai:econstor.eu:10419/318423","is_oa":true,"landing_page_url":"https://hdl.handle.net/10419/318423","pdf_url":null,"source":{"id":"https://openalex.org/S4306401696","display_name":"Econstor (Econstor)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doc-type:article"}],"best_oa_location":{"id":"doi:10.1365/s40702-023-01014-7","is_oa":true,"landing_page_url":"https://doi.org/10.1365/s40702-023-01014-7","pdf_url":"https://link.springer.com/content/pdf/10.1365/s40702-023-01014-7.pdf","source":{"id":"https://openalex.org/S4210205328","display_name":"HMD Praxis der Wirtschaftsinformatik","issn_l":"1436-3011","issn":["1436-3011","2198-2775"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"HMD Praxis der Wirtschaftsinformatik","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320327736","display_name":"Universit\u00e4t Rostock","ror":"https://ror.org/03zdwsf69"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4388565473.pdf"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W263457633","https://openalex.org/W1574142971","https://openalex.org/W2079409310","https://openalex.org/W2136922540","https://openalex.org/W2194107503","https://openalex.org/W2509657183","https://openalex.org/W2536903920","https://openalex.org/W2890353470","https://openalex.org/W2908189920","https://openalex.org/W2917847170","https://openalex.org/W3151685851","https://openalex.org/W3194784507","https://openalex.org/W4210993145","https://openalex.org/W4226406180","https://openalex.org/W4283657600","https://openalex.org/W4296345985"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W93312527","https://openalex.org/W2603296253","https://openalex.org/W1589203209","https://openalex.org/W2557454913","https://openalex.org/W828925460","https://openalex.org/W11365241","https://openalex.org/W1013667899"],"abstract_inverted_index":{"Zusammenfassung":[0],"Cybersicherheitsarchitekturen":[1],"sind":[2],"im":[3,54],"F\u00f6deralsystem":[4],"Deutschlands":[5],"elementarer":[6],"Bestandteil":[7],"der":[8,56,72,80,83,111,136,139],"digitalen":[9],"Daseinsvorsorge":[10],"f\u00fcr":[11,67],"Gesellschaft,":[12],"Wirtschaft":[13],"und":[14,60,66,85,90,100,104,109,121],"Verwaltung.":[15],"In":[16],"Deutschland":[17],"stehen":[18],"neben":[19],"dem":[20,64],"Bund":[21,65],"alle":[22],"L\u00e4nder":[23,45,57],"vor":[24],"vergleichbaren":[25],"Herausforderungen,":[26],"die":[27,44,52,78,97,127],"Akteure":[28,82],"ihrer":[29],"Region":[30],"dergestalt":[31],"in":[32,58,122,138,143],"eine":[33,37,46],"Architektur":[34,48],"einzubinden,":[35],"dass":[36],"gegen\u00fcber":[38],"Cybersicherheitsbedrohungen":[39],"resiliente":[40],"IKT-Infrastruktur":[41],"entsteht.":[42],"Sofern":[43],"harmonisierte":[47],"implementiert":[49],"haben,":[50],"kann":[51],"Gesamtarchitektur":[53],"Binnenverh\u00e4ltnis":[55],"kooperativer":[59],"komplement\u00e4rer":[61],"Zusammenarbeit":[62],"mit":[63],"Europa":[68],"aufwachsen.":[69],"Das":[70],"Ziel":[71],"hier":[73],"vorgestellten":[74],"Forschungsarbeit":[75],"ist":[76],"es,":[77],"Verzahnung":[79],"systemrelevanten":[81],"regionalen":[84],"f\u00f6deralen":[86],"Cybersicherheit":[87],"zu":[88,91,128],"unterst\u00fctzen":[89],"vereinfachen.":[92],"Konkret":[93],"werden":[94,132],"dazu":[95],"sowohl":[96],"inter-organisationalen":[98],"Prozesse":[99],"davon":[101],"betroffenen":[102],"Rollen":[103],"Organisationseinheiten":[105],"bei":[106],"Land,":[107],"Kommune":[108],"Unternehmen":[110],"Privatwirtschaft":[112],"als":[113],"auch":[114],"gemeinsam":[115],"nutzbare":[116],"Komponenten":[117],"einer":[118,124,129],"Cybersicherheitsorganisation":[119],"betrachtet":[120],"Form":[123],"Unternehmensarchitektur":[125],"dokumentiert,":[126],"Referenzarchitektur":[130,137],"weiterentwickelt":[131],"soll.":[133],"Die":[134],"Modellierung":[135],"Modellierungssprache":[140],"ArchiMate":[141],"wird":[142],"Ausz\u00fcgen":[144],"vorgestellt.":[145]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
