{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:02:46Z","timestamp":1725483766297},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540441229"},{"type":"electronic","value":"9783540461401"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46140-x_8","type":"book-chapter","created":{"date-parts":[[2007,5,15]],"date-time":"2007-05-15T23:48:50Z","timestamp":1179272930000},"page":"91-104","source":"Crossref","is-referenced-by-count":1,"title":["Human Models and Data in the Ubiquitous Information Infrastructure"],"prefix":"10.1007","author":[{"given":"Frank","family":"Berkers","sequence":"first","affiliation":[]},{"given":"Jan","family":"Goossenaerts","sequence":"additional","affiliation":[]},{"given":"Dieter","family":"Hammer","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Wortmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,13]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Butler Von Welch, R., Engert, D., Foster, I., Tuecke, S. and Kesselman, C.: A National-Scale Authentication Infrastructure, Computer, December 2000, 60\u201366","DOI":"10.1109\/2.889094"},{"key":"8_CR2","volume-title":"Business Modelling with UML-Business Patterns at work","author":"H.-E. Erikson","year":"2000","unstructured":"Erikson, H.-E., and Penker, M.: Business Modelling with UML-Business Patterns at work. OMG Press, John Wiley & Sons, New York (2000)"},{"key":"8_CR3","unstructured":"Gamma, E., Helm, R., and Johnson, R.: Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley (1995)"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/S0166-3615(00)00067-1","volume":"43","author":"J.B.M. Goossenaerts","year":"2000","unstructured":"Goossenaerts, J.B.M.: Industrial semiosis-founding the deployment of the ubiquitous information infrastructure. Computers in Industry 43 (2000) 189\u2013201","journal-title":"Computers in Industry"},{"issue":"2\u20133","key":"8_CR5","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/S0166-3615(99)00034-2","volume":"40","author":"K. Kosanke","year":"1999","unstructured":"Kosanke, K., Nell, J.G.: Standardisation in ISO for enterprise engineering and integration. Computers in Industry 40(2\u20133) (1999) 311\u2013319","journal-title":"Computers in Industry"},{"issue":"2\u20133","key":"8_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/S0166-3615(99)00016-0","volume":"40","author":"K. Kosanke","year":"1999","unstructured":"Kosanke, K., Vernadat, F.B., Zelm, M.: CIMOSA: enterprise engineering and integration. Computers in Industry 40(2\u20133) (1999) 83\u201397","journal-title":"Computers in Industry"},{"key":"8_CR7","unstructured":"Mills, John J., Goossenaerts, J.B.M., Pels, H.J.: The Role of Context in the Product Realisation Process. Proc. CIRP Design Seminar, Stockholm, June (2001) 175\u2013180"},{"key":"8_CR8","volume-title":"Business Process Engineering\u2014 Reference Models for Industrial Enterprises","author":"A.-W. Scheer","year":"1994","unstructured":"Scheer, A.-W.: Business Process Engineering\u2014 Reference Models for Industrial Enterprises. Springer Verlag, Berlin (1994)"},{"issue":"1","key":"8_CR9","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1080\/13600834.1999.9965799","volume":"8","author":"D. Slee","year":"1999","unstructured":"Slee, D.: The Data Protection Bill 1998: a comparative examination. Information & Communications Technology Law 8(1) (1999) 71\u2013109","journal-title":"Information & Communications Technology Law"},{"key":"8_CR10","volume-title":"Proc. Third Australian Conf. on Information Systems","author":"R.K. Stamper","year":"1992","unstructured":"Stamper, R.K.: Signs, organisations, norms and information systems, Proc. Third Australian Conf. on Information Systems, Univ. of Wollongong, Australia (1992)"},{"key":"8_CR11","volume-title":"Principles and Applications","author":"F.B. Vernadat","year":"1996","unstructured":"Vernadat, F.B.: Enterprise Modelling and Integration, Principles and Applications, Chapman & Hall, London, England (1996)"},{"key":"8_CR12","unstructured":"Workflow Management Coalition Terminology & Glossary 3.0, WfMC, (1999)"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling for New Information Systems Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46140-X_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T20:56:50Z","timestamp":1556398610000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46140-X_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441229","9783540461401"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-46140-x_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2002]]}}}