{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:51:52Z","timestamp":1725475912637},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540482697"},{"type":"electronic","value":"9783540482727"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11915034_78","type":"book-chapter","created":{"date-parts":[[2006,11,29]],"date-time":"2006-11-29T18:40:30Z","timestamp":1164825630000},"page":"546-553","source":"Crossref","is-referenced-by-count":0,"title":["A Corporate Capital Protection and Assurance Model"],"prefix":"10.1007","author":[{"given":"Colette","family":"Reekie","sequence":"first","affiliation":[]},{"given":"Basie","family":"von Solms","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"78_CR1","unstructured":"Cadbury, A.: The Cadbury Report. Institute of Internal Auditors (1992), available online: http:\/\/www.iia.org.uk\/cms\/IIA\/uploads\/2c9103-ea9f7e9fbe-7e3a\/Cadbury.pdf"},{"key":"78_CR2","unstructured":"Organisation for Economic Co-operation and Development. OECD Principles of Corporate Governance: 2004. OECD (2004), available online: http:\/\/www.oecd.org\/document\/49\/0,2340,en_2649_34813_31530865_1_1_1_1,00.html"},{"key":"78_CR3","unstructured":"Answers.Com. Project Governance, available online: http:\/\/www.answers.com\/topic\/governance"},{"key":"78_CR4","unstructured":"Alex, B.: Make IT Governance an integral part of the enterprise. IT Governance Institute (2003), available online: http:\/\/www.itgi.org"},{"key":"78_CR5","unstructured":"Project Management Informed Solutions. Project Governance. (Accessed on July 7, 2006), http:\/\/www.pmis.co.uk\/project_governance.htm"},{"key":"78_CR6","unstructured":"Dallas, S., Bell, M.: The Need for IT Governance: Now More Than Ever (AV-21-4823). Gartner (January 20, 2004)"},{"key":"78_CR7","doi-asserted-by":"crossref","unstructured":"Von Solms, S.H., Louwrens, C.P.: Digital Crime and Forensic Science in Cyberspace \u2013 the relationship between Digital Forensics, Corporate Governance, Information Technology Governance and Information Security Governance. In: Kanellis, P., Kolokotronis, N., Kiountouzis, E., Martakos, D. (eds.), Idea Group (2005)","DOI":"10.4018\/978-1-59140-872-7.ch011"},{"key":"78_CR8","unstructured":"Sussman, M.: Why HR Governance Matters (July 2006), available online: http:\/\/www.ceoforum.com.au\/200406_remuneration.cfm"},{"key":"78_CR9","unstructured":"Calpoly. Disaster scope, available online: http:\/\/ccs.calpoly.edu\/printable\/disaster_scope.html"},{"key":"78_CR10","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-59140-140-7","volume-title":"Strategies for information technology governance","author":"W. Grembergen Van","year":"2004","unstructured":"Van Grembergen, W.: Strategies for information technology governance. Idea group publishing, United Kingdom (2004)"},{"key":"78_CR11","doi-asserted-by":"crossref","unstructured":"Petersen, R.: Integration Strategies and Tactics for information technology governance. Idea Group Inc. (2004)","DOI":"10.4018\/978-1-59140-140-7.ch002"},{"key":"78_CR12","unstructured":"Smith, R., Gordon, L.: 2005 CSI\/FBI computer crime and security survey. Computer Security Institute (2005)"},{"key":"78_CR13","unstructured":"Charette, R.N.: Risk Governance Understood. CIO.com (2005), available online: http:\/\/www2.cio.com\/analyst\/report3298.html"},{"key":"78_CR14","unstructured":"Carver, J.: The Carver model of Policy Governance. Policy governance model (2006), available online: http:\/\/www.carvergovernance.com"},{"key":"78_CR15","unstructured":"Sommer, Intrusion Detection Systems as Evidence (1998), available online http:\/\/www.raid.symposium.org\/raid98\/ProgRAID98\/Full_Papers\/Sommertext.pdf"},{"key":"78_CR16","doi-asserted-by":"crossref","unstructured":"Stephenson: End-to-End Digital Forensics. Computer Fraud and Security\u00a02002(9) (2002)","DOI":"10.1016\/S1361-3723(02)00914-4"},{"key":"78_CR17","doi-asserted-by":"crossref","unstructured":"Stephenson: Using evidence effectively. Computer Fraud and Security 2003(3) (2003)","DOI":"10.1016\/S1361-3723(03)03012-4"},{"key":"78_CR18","unstructured":"State Records Authority. Business Continuity Planning based on AS\/NZS 17799 Clause 11.1. New South Wales (2003), available online: http:\/\/www.records.nsw.gov.au\/publicsector\/rk\/glossary\/singleversion.htm"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11915034_78","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T17:25:00Z","timestamp":1683653100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11915034_78"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540482697","9783540482727"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11915034_78","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}