[{"citation":{"mla":"Schryen, Guido, and Eva Weishäupl. “IT-Sicherheit: Ökonomisch Planen Und Bewerten.” <i>Managementkompass</i>, no. 2, Frankfurt Business Media, Der F.A.Z.-Fachverlag, 2015, pp. 17–18.","bibtex":"@article{Schryen_Weishäupl_2015, title={IT-Sicherheit: Ökonomisch Planen und Bewerten}, number={2}, journal={Managementkompass}, publisher={Frankfurt Business Media, Der F.A.Z.-Fachverlag}, author={Schryen, Guido and Weishäupl, Eva}, year={2015}, pages={17–18} }","short":"G. Schryen, E. Weishäupl, Managementkompass (2015) 17–18.","apa":"Schryen, G., &#38; Weishäupl, E. (2015). IT-Sicherheit: Ökonomisch Planen und Bewerten. <i>Managementkompass</i>, (2), 17–18.","chicago":"Schryen, Guido, and Eva Weishäupl. “IT-Sicherheit: Ökonomisch Planen Und Bewerten.” <i>Managementkompass</i>, no. 2 (2015): 17–18.","ieee":"G. Schryen and E. Weishäupl, “IT-Sicherheit: Ökonomisch Planen und Bewerten,” <i>Managementkompass</i>, no. 2, pp. 17–18, 2015.","ama":"Schryen G, Weishäupl E. IT-Sicherheit: Ökonomisch Planen und Bewerten. <i>Managementkompass</i>. 2015;(2):17-18."},"page":"17-18","year":"2015","issue":"2","has_accepted_license":"1","title":"IT-Sicherheit: Ökonomisch Planen und Bewerten","date_created":"2018-11-14T13:59:53Z","author":[{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"},{"first_name":"Eva","last_name":"Weishäupl","full_name":"Weishäupl, Eva"}],"date_updated":"2022-01-06T07:02:09Z","publisher":"Frankfurt Business Media, Der F.A.Z.-Fachverlag","oa":"1","file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2018-12-07T11:46:04Z","creator":"hsiemes","date_updated":"2018-12-13T15:09:42Z","file_id":"6039","access_level":"open_access","file_name":"MK-DigitalSecurity-2015_Schryen.pdf","file_size":101976}],"status":"public","type":"journal_article","publication":"Managementkompass","language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:09:42Z","extern":"1","ddc":["000"],"user_id":"61579","department":[{"_id":"277"}],"_id":"5616"}]
