{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:17:22Z","timestamp":1743153442892,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031042157"},{"type":"electronic","value":"9783031042164"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-04216-4_26","type":"book-chapter","created":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T17:03:43Z","timestamp":1649178223000},"page":"291-303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Integrated Security Management of Public and Private Sector for Critical Infrastructures \u2013 Problem Investigation"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Rehbohm","sequence":"first","affiliation":[]},{"given":"Kurt","family":"Sandkuhl","sequence":"additional","affiliation":[]},{"given":"Clemens H.","family":"Cap","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Kemmerich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,6]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24223-6","volume-title":"Strategic Enterprise Architecture Management","year":"2012","unstructured":"Ahlemann, F., Stettiner, E., Messerschmidt, M., Legner, C. (eds.): Strategic Enterprise Architecture Management. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-24223-6"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Buckl, S., Dierl, T., Matthes, F., Schweda, C.M.: Building blocks for enterprise architecture management solutions. In: Practice-Driven Research on Enterprise Transformation, Lecture Notes in Business Information Processing, vol. 69, pp. 17\u201346 (2011)","DOI":"10.1007\/978-3-642-16770-6_2"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Glissmann, S., Sanz, J.: An approach to building effective enterprise architectures. In: HICSS 2011, IEEE Computer Society 2011, Washington, D.C., pp. 1\u201310 (2011)","DOI":"10.1109\/HICSS.2011.48"},{"issue":"2\u20133","key":"26_CR4","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10796-007-9030-y","volume":"9","author":"P Johnson","year":"2007","unstructured":"Johnson, P., Lagerstr\u00f6m, R., N\u00e4rman, P., Simonsson, M.: Enterprise architecture analysis with extended influence diagrams. Inf. Syst. Front. 9(2\u20133), 163\u2013180 (2007)","journal-title":"Inf. Syst. Front."},{"key":"26_CR5","unstructured":"Johnson, P., Ekstedt, M., Silva, E., Plazaola, L.: Using enterprise architecture for CIO decision-making. In: Second Annual Conference on Systems Engineering Research (2004)"},{"issue":"1","key":"26_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1080\/10580530903455106","volume":"27","author":"M Simonsson","year":"2010","unstructured":"Simonsson, M., Johnson, P., Ekstedt, M.: The effect of IT governance maturity on IT governance performance. Inf. Syst. Manag. 27(1), 10\u201324 (2010)","journal-title":"Inf. Syst. Manag."},{"key":"26_CR7","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-21915-8_6","volume-title":"Perspectives in Business Informatics Research","author":"M Wi\u00dfotzki","year":"2015","unstructured":"Wi\u00dfotzki, M., Sandkuhl, K.: Elements and characteristics of enterprise architecture capabilities. In: Matulevi\u010dius, R., Dumas, M. (eds.) BIR 2015. LNBIP, vol. 229, pp. 82\u201396. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21915-8_6"},{"key":"26_CR8","volume-title":"Enterprise Architecture Management and Digitization in the German Public Sector. Literature Analysis","author":"T Szilagyi","year":"2018","unstructured":"Szilagyi, T.: Enterprise Architecture Management and Digitization in the German Public Sector. Literature Analysis. Universit\u00e4t Rostock, Rostock (2018)"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.dss.2013.12.006","volume":"59","author":"MS Pang","year":"2014","unstructured":"Pang, M.S.: IT governance and business value in the public sector organizations - the role of elected representatives in IT governance and its impact on IT value in US state governments. Dec. Supp. Syst. 59, 274\u2013285 (2014)","journal-title":"Dec. Supp. Syst."},{"key":"26_CR10","doi-asserted-by":"publisher","first-page":"41","DOI":"10.4018\/jgim.2007100103","volume":"15","author":"S Ali","year":"2007","unstructured":"Ali, S., Green, P.: IT governance mechanisms in public sector organisations: an Australian context. J. Glob. Inf. Manag. 15, 41\u201363 (2007)","journal-title":"J. Glob. Inf. Manag."},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Janssen, M., Hjort-Madsen, K.: Analyzing enterprise architecture in national governments: the cases of Denmark and the Netherlands. In: HICSS 2007, IEEE Computer Society 2007, Washington, D.C. (2007)","DOI":"10.1109\/HICSS.2007.79"},{"key":"26_CR12","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-319-70241-4_18","volume-title":"The Practice of Enterprise Modeling","author":"MK Valtonen","year":"2017","unstructured":"Valtonen, M.K.: Management structure based government enterprise architecture framework adaption in situ. In: Poels, G., Gailly, F., Serral Asensio, E., Snoeck, M. (eds.) PoEM 2017. LNBIP, vol. 305, pp. 267\u2013282. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70241-4_18"},{"key":"26_CR13","doi-asserted-by":"publisher","unstructured":"Johannesson, P., Perjons, E.: An Introduction to Design Science. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10632-8","DOI":"10.1007\/978-3-319-10632-8"},{"issue":"1","key":"26_CR14","first-page":"16","volume":"2","author":"U Seigerroth","year":"2011","unstructured":"Seigerroth, U.: Enterprise modeling and enterprise architecture: constituents of transformation and alignment of business and IT. IJITBAG 2(1), 16\u201334 (2011)","journal-title":"IJITBAG"},{"key":"26_CR15","unstructured":"Bundesgesetzblatt. Gesetz zur Erh\u00f6hung der Sicherheit Informationstechnischer Systeme, 17 July 2015. Nordrhein Westfalen, Bonn, Deuschland (2015)"},{"key":"26_CR16","unstructured":"Katastrophenhilfe, B.F.: Handlungsempfehlungen f\u00fcr Unternehmen, insbesondere Betreiber kritischer Infrastrukturen (2021). https:\/\/www.kritis.bund.de\/SharedDocs\/Downloads\/Kritis\/DE\/200302_HinweisePandemie.pdf?__blob=publicationFile"},{"key":"26_CR17","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1007\/978-3-658-16342-6_36","volume-title":"Handbuch Virtualit\u00e4t","author":"R Wichum","year":"2020","unstructured":"Wichum, R.: Cybersecurity. In: Kasprowicz, D., Rieger, S. (eds.) Handbuch Virtualit\u00e4t, pp. 669\u2013680. Springer, Wiesbaden (2020). https:\/\/doi.org\/10.1007\/978-3-658-16342-6_36"},{"key":"26_CR18","volume-title":"Brauchen wir eine neue Staatskunst","author":"H L\u00fchr","year":"2019","unstructured":"L\u00fchr, H.: Brauchen wir eine neue Staatskunst. Kellner Verlag, Bremen (2019)"},{"key":"26_CR19","volume-title":"Qualitative Inhaltsanalyse, Grundlagen und Techniken","author":"P Mayring","year":"2008","unstructured":"Mayring, P.: Qualitative Inhaltsanalyse, Grundlagen und Techniken. Beltz Verlag, Weinheim und Basel (2008)"},{"key":"26_CR20","unstructured":"Rates, R.: Ma\u00dfnahmen zur Gew\u00e4hrleistung eines hohen gemeinsamen Sicherheitsniveaus von Netz- und Informationssystemen, 06 July 2021. Europ\u00e4ische Union, Stra\u00dfburg, Frankreich (2016)"},{"key":"26_CR21","unstructured":"Rehbohm, T., Sandkuhl, K., Kemmerich, T.: On challenges of cyber and information security management in federal structures-the example of German Public administration. In: BIR Workshops, pp. 1\u201313 (2019). http:\/\/ceur-ws.org\/Vol-2443\/paper01.pdf"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-04216-4_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T17:16:26Z","timestamp":1649178986000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-04216-4_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031042157","9783031042164"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-04216-4_26","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hannover","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bisconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"These numbers refer to the BIS 2021 workshops proceedings","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}