{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:43:38Z","timestamp":1743036218010,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319483924"},{"type":"electronic","value":"9783319483931"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48393-1_27","type":"book-chapter","created":{"date-parts":[[2016,10,27]],"date-time":"2016-10-27T04:11:37Z","timestamp":1477541497000},"page":"353-361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF"],"prefix":"10.1007","author":[{"given":"Nicolas","family":"Mayer","sequence":"first","affiliation":[]},{"given":"Jocelyn","family":"Aubert","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Grandry","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Feltus","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,28]]},"reference":[{"key":"27_CR1","unstructured":"Mayer, N.: Model-based Management of Information System Security Risk (2009)"},{"key":"27_CR2","unstructured":"ISO\/IEC 27005:2011: Information technology \u2013 Security techniques \u2013 Information security risk management. International Organization for Standardization, Geneva (2011)"},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1147\/sj.263.0276","volume":"26","author":"JA Zachman","year":"1987","unstructured":"Zachman, J.A.: A framework for information systems architecture. IBM Syst. J. 26, 276\u2013292 (1987)","journal-title":"IBM Syst. J."},{"volume-title":"A Systemic Perspective to Managing Complexity with Enterprise Architecture","year":"2013","key":"27_CR4","unstructured":"Saha, P. (ed.): A Systemic Perspective to Managing Complexity with Enterprise Architecture. IGI Global, Hershey (2013)"},{"key":"27_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29651-2","volume-title":"Enterprise Architecture at Work \u2013 Modelling Communication and Analysis","author":"M Lankhorst","year":"2013","unstructured":"Lankhorst, M.: Enterprise Architecture at Work \u2013 Modelling Communication and Analysis. Springer, Heidelberg (2013)"},{"key":"27_CR6","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-12544-7_16","volume-title":"Intentional Perspectives on Information Systems Engineering","author":"E Dubois","year":"2010","unstructured":"Dubois, E., Heymans, P., Mayer, N., Matulevi\u010dius, R.: A systematic approach to define the domain of information system security risk management. In: Nurcan, S., Salinesi, C., Souveyet, C., Ralyt\u00e9, J. (eds.) Intentional Perspectives on Information Systems Engineering, pp. 289\u2013306. Springer, Heidelberg (2010)"},{"key":"27_CR7","series-title":"LNBIP","first-page":"459","volume-title":"CAiSE 2015","author":"N Mayer","year":"2015","unstructured":"Mayer, N., Grandry, E., Feltus, C., Goettelmann, E.: Towards the ENTRI framework: security risk management enhanced by the use of enterprise architectures. In: Persson, A., Stirna, J. (eds.) CAiSE 2015. LNBIP, vol. 215, pp. 459\u2013469. Springer International Publishing, Heidelberg (2015)"},{"key":"27_CR8","unstructured":"The Open Group: TOGAF Version 9.1. Van Haren Publishing, The Netherlands (2011)"},{"key":"27_CR9","unstructured":"Zivkovic, S., Kuhn, H., Karagiannis, D.: Facilitate modelling using method integration: an approach using mappings and integration rules. In: Proceedings of the 15th European Conference on Information Systems (ECIS 2007) (2007)"},{"key":"27_CR10","unstructured":"Mayer, N., Aubert, J., Grandry, E., Feltus, C., Goettelmann, E.: An integrated conceptual model for information system security risk management and enterprise architecture management based on TOGAF, ArchiMate, IAF and DoDAF. Technical report. Available on demand (2016)"},{"key":"27_CR11","volume-title":"Modeling Enterprise Risk Management and Security with the ArchiMate\u00ae Language","author":"I Band","year":"2015","unstructured":"Band, I., Engelsman, W., Feltus, C., Gonz\u00e1lez Paredes, S., Hietala, J., Jonkers, H., Massart, S.: Modeling Enterprise Risk Management and Security with the ArchiMate\u00ae Language. The Open Group, Midrind (2015)"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Barateiro, J., Antunes, G., Borbinha, J.: Manage risks through the enterprise architecture. In: 45th Hawaii International Conference on System Science (HICSS), pp. 3297\u20133306 (2012)","DOI":"10.1109\/HICSS.2012.419"},{"key":"27_CR13","unstructured":"Innerhofer-Oberperfler, F., Breu, R.: Using an enterprise architecture for IT risk management. In: Presented at the Information Security South Africa 6th Annual Conference (2006)"},{"key":"27_CR14","unstructured":"Sherwood, J., Clark, A., Lynas, D.: SABSA \u00ae Enterprise Security Architecture (2010)"},{"key":"27_CR15","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1007\/978-3-642-36285-9_64","volume-title":"Business Process Management Workshops","author":"A Goldstein","year":"2013","unstructured":"Goldstein, A., Frank, U.: A language for multi-perspective modelling of IT security: objectives and analysis of requirements. In: La Rosa, M., Soffer, P. (eds.) Business Process Management Workshops, pp. 636\u2013648. Springer, Berlin Heidelberg (2013)"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Solhaug, B., St\u00f8len, K.: The CORAS language - why it is designed the way it is. In: Safety, Reliability, Risk and Life-Cycle Performance of Structures and Infrastructures, pp. 3155\u20133162. CRC Press (2014)","DOI":"10.1201\/b16387-456"},{"key":"27_CR17","volume-title":"Usability Engineering","author":"J Nielsen","year":"1994","unstructured":"Nielsen, J.: Usability Engineering. Morgan Kaufmann, Burlington (1994)"}],"container-title":["Lecture Notes in Business Information Processing","The Practice of Enterprise Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48393-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T11:19:46Z","timestamp":1710242386000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-48393-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319483924","9783319483931"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48393-1_27","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"28 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PoEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Working Conference on The Practice of Enterprise Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sk\u00f6vde","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"poem2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}