{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T18:41:58Z","timestamp":1725820918162},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319168852"},{"type":"electronic","value":"9783319168869"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16886-9_30","type":"book-chapter","created":{"date-parts":[[2015,4,20]],"date-time":"2015-04-20T11:51:57Z","timestamp":1429530717000},"page":"293-301","source":"Crossref","is-referenced-by-count":0,"title":["Understanding the Value of Evaluating ICT Models to Improve Medium and Small Enterprises"],"prefix":"10.1007","author":[{"given":"Anass","family":"Bayaga","sequence":"first","affiliation":[]},{"given":"Paul","family":"Tarwireyi","sequence":"additional","affiliation":[]},{"given":"Emmanual","family":"Adu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,21]]},"reference":[{"issue":"2","key":"30_CR1","first-page":"205","volume":"101","author":"A Balbas","year":"2007","unstructured":"Balbas, A.: Mathematical methods in modern risk measurement: a survey. Appl. Math. 101(2), 205\u2013219 (2007)","journal-title":"Appl. Math."},{"unstructured":"Basel Committee on Banking Supervision. New Basel Capital Accord Operational Risk. Basel (2004)","key":"30_CR2"},{"key":"30_CR3","first-page":"289","volume":"38","author":"C Burget","year":"2006","unstructured":"Burget, C., Ruschendorf, L.: Consistent risk measures for portfolio vectors. Insur.: Math. Econ. 38, 289\u2013297 (2006)","journal-title":"Insur.: Math. Econ."},{"key":"30_CR4","volume-title":"Information Security based on ISO 27001","author":"A Calder","year":"2006","unstructured":"Calder, A.: Information Security based on ISO 27001. Van Haren, Amersfoort - NL (2006)"},{"unstructured":"CAS \u2013 Casualty Actuarial Society, Overview of Enterprise Risk. NY (2003)","key":"30_CR5"},{"key":"30_CR6","volume-title":"Applied Statistics and the SAS Programming Language","author":"RP Cody","year":"2005","unstructured":"Cody, R.P., Smith, J.K.: Applied Statistics and the SAS Programming Language. Prentice, Upper Saddle River (2005)"},{"unstructured":"Conner, F.W., Coviello, A.W.: Information security governance: A call to action. The Corporate Governance Task Force (2004). http:\/\/www.cyberpartnership.org\/InfoSecGov4_04 Retrieved January 9, 2010","key":"30_CR7"},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/S0304-405X(97)00037-8","volume":"47","author":"KA Froot","year":"1998","unstructured":"Froot, K.A., Stein, J.C.: Risk management, capital budgeting, and capital structure policy for financial institutions: An integrated approach. J. Financ. Econ. 47, 55\u201382 (1998)","journal-title":"J. Financ. Econ."},{"key":"30_CR9","volume-title":"Emerging best practices in developing key risk indicators and ERM reporting","author":"J Lam","year":"2006","unstructured":"Lam, J.: Emerging best practices in developing key risk indicators and ERM reporting. James Lam and Associates, Wellesley (2006)"},{"issue":"1","key":"30_CR10","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1111\/1098-1616.00019","volume":"6","author":"A Liebenberg","year":"2003","unstructured":"Liebenberg, A., Hoyt, R.: The determinants of enterprise risk management: evidence from the appointment of chief risk officers. Risk Manage. Insur. Rev. 6(1), 37\u201352 (2003)","journal-title":"Risk Manage. Insur. Rev."},{"key":"30_CR11","volume-title":"Applied Multivariate Research","author":"LS Meyers","year":"2006","unstructured":"Meyers, L.S., Gamst, G., Guarino, A.J.: Applied Multivariate Research. Sage, Thousand Oaks (2006)"},{"key":"30_CR12","doi-asserted-by":"crossref","DOI":"10.4324\/9780203809532","volume-title":"An Introduction to Applied Multivariate Analysis","author":"T Raykov","year":"2008","unstructured":"Raykov, T., Marcoulides, G.A.: An Introduction to Applied Multivariate Analysis. Rutledge, New York (2008)"},{"unstructured":"South Africa. Department of Trade and Industry. Micro Finance Regulatory Council (MFRC) (2006). Retrieved February 21, 2009, from The DTI","key":"30_CR13"},{"unstructured":"Stoney, C.: Risk Management: a Guide to its Relevance and Application in Quality Management and Enhancement. Leeds Metropolitan University (2007)","key":"30_CR14"},{"unstructured":"Tabachnick, B.G.: Multivariate statistics: an introduction and some applications. Invited workshop presented to the American Psychology - Law Society, Jacksonville, FL (2008)","key":"30_CR15"},{"unstructured":"IT Governance Institute: ITGICobiT 4.., Executive Summary. IT Governance Institute (2007)","key":"30_CR16"},{"key":"30_CR17","volume-title":"Using Multivariate Statistics","author":"BG Tabachnick","year":"2007","unstructured":"Tabachnick, B.G., Fidell, L.S.: Using Multivariate Statistics, 5th edn. Allyn and Bacon, Boston (2007)","edition":"5"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16886-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T03:06:27Z","timestamp":1598929587000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16886-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319168852","9783319168869"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16886-9_30","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}