{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:25:36Z","timestamp":1726410336812},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642271885"},{"type":"electronic","value":"9783642271892"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27189-2_8","type":"book-chapter","created":{"date-parts":[[2011,12,2]],"date-time":"2011-12-02T14:52:18Z","timestamp":1322837538000},"page":"75-84","source":"Crossref","is-referenced-by-count":0,"title":["Information Technology Security Governance Approach Comparison in E-banking"],"prefix":"10.1007","author":[{"given":"Theodosios","family":"Tsiakis","sequence":"first","affiliation":[]},{"given":"Aristeidis","family":"Chatzipoulidis","sequence":"additional","affiliation":[]},{"given":"Theodoros","family":"Kargidis","sequence":"additional","affiliation":[]},{"given":"Athanasios","family":"Belidis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","volume-title":"The bible of e-banking","author":"V.G. Aggelis","year":"2005","unstructured":"Aggelis, V.G.: The bible of e-banking. New Technologies Publications, Athens (2005) (in Greek)"},{"issue":"3","key":"8_CR2","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1108\/02652320410530322","volume":"22","author":"S. Akinci","year":"2004","unstructured":"Akinci, S., Aksoy, S., Atilgan, E.: Adoption of Internet banking among sophisticated consumer segments in an advanced developing country. The International Journal of Bank Marketing\u00a022(3), 212\u2013232 (2004)","journal-title":"The International Journal of Bank Marketing"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/S0268-4012(01)00011-1","volume":"21","author":"A.M. Aladwani","year":"2001","unstructured":"Aladwani, A.M.: Online banking: a field study of drivers, development challenges, and expectations. International Journal of Information Management\u00a021, 213\u2013225 (2001)","journal-title":"International Journal of Information Management"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Angelakopoulos, G., Mihiotis, A.: E-banking: challenges and opportunities in the Greek banking sector. Electronic Commerce Research, 1\u201323 (2011)","DOI":"10.1007\/s10660-011-9076-2"},{"issue":"3","key":"8_CR5","first-page":"273","volume":"1","author":"S.J. Barnes","year":"2003","unstructured":"Barnes, S.J., Corbitt, B.: Mobile banking: concept and potential. Author: International Journal of Mobile Communications\u00a01(3), 273\u2013288 (2003)","journal-title":"Author: International Journal of Mobile Communications"},{"key":"8_CR6","unstructured":"Basel Committee on Banking Supervision: Risk Management Principles for Electronic banking (2003), \n                  \n                    http:\/\/www.bis.org\/publ\/bcbs98.pdf\n                  \n                  \n                 (retrieved July 20, 2011)"},{"key":"8_CR7","unstructured":"Baten, M.A., Kamil, A.A.: E-Banking of Economical Prospects in Bangladesh. Journal of Internet Banking and Commerce\u00a015(2) (2010)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Brotby, K.: Information Security Governance, A Practical Development and Implementation Approach. Wiley (2009)","DOI":"10.1002\/9780470476017"},{"issue":"4","key":"8_CR9","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1080\/10580530701586136","volume":"24","author":"A. Veiga Da","year":"2007","unstructured":"Da Veiga, A., Eloff, J.H.P.: An Information Security Governance Framework. Information Systems Management\u00a024(4), 361\u2013372 (2007)","journal-title":"Information Systems Management"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"1835","DOI":"10.1016\/j.cor.2008.05.008","volume":"36","author":"C.T. Ho Bruce","year":"2009","unstructured":"Ho Bruce, C.T., Wu, D.D.: Online banking performance evaluation using data evelopment analysis and principal component analysis. Computers & Operations Research\u00a036, 1835\u20131842 (2009)","journal-title":"Computers & Operations Research"},{"key":"8_CR11","unstructured":"IFAC: Enterprise governance: getting the balance right, International Federation of Accountants, Professional Accountants in Business Committee (2004), \n                  \n                    http:\/\/www.ifac.org\/Members\/DownLoads\/EnterpriseGovernance.pdf\n                  \n                  \n                 (retrieved July 20, 2011)"},{"key":"8_CR12","unstructured":"IT Governance Institute: Information Security Governance, Guidance for Boards of Directors and Executive Management, 2nd edn. Rolling Meadows, IL (2006)"},{"key":"8_CR13","unstructured":"IT Governance Institute: COBIT 4.1 Excerpt: Executive Summary \u2013 Framework (2007), \n                  \n                    http:\/\/www.isaca.org\/KnowledgeCenter\/cobit\/Documents\/COBIT4.pdf\n                  \n                  \n                 (retrieved July 20, 2011)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Kondabagil, J.: Risk Management in electronic banking: concepts and best practices. Wiley Finance (2007)","DOI":"10.1002\/9781118390436"},{"key":"8_CR15","doi-asserted-by":"crossref","first-page":"319","DOI":"10.28945\/894","volume":"3","author":"E. Kritzinger","year":"2006","unstructured":"Kritzinger, E., von Solms, S.H.: E-learning: incorporating information security governance. Issues in Informing Science and Information Technology\u00a03, 319\u2013325 (2006)","journal-title":"Issues in Informing Science and Information Technology"},{"issue":"2","key":"8_CR16","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1108\/09685220810879627","volume":"16","author":"E. Moreira","year":"2008","unstructured":"Moreira, E., Martimiano, L.A.F., Brandao, A.J., Bernardes, M.C.: Ontologies for information security management and governance. Information Management & Computer Security\u00a016(2), 150\u2013165 (2008)","journal-title":"Information Management & Computer Security"},{"issue":"7","key":"8_CR17","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1016\/S0167-4048(03)00705-3","volume":"22","author":"R. Moulton","year":"2003","unstructured":"Moulton, R., Coles, R.S.: Applying Information Security Governance. Computers & Security\u00a022(7), 580\u2013584 (2003)","journal-title":"Computers & Security"},{"issue":"2","key":"8_CR18","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/S0166-4972(02)00039-1","volume":"24","author":"S. Mustaffa","year":"2004","unstructured":"Mustaffa, S., Beaumont, N.: The effect of electronic commerce on small Australian enterprises. Technovation\u00a024(2), 85\u201395 (2004)","journal-title":"Technovation"},{"key":"8_CR19","unstructured":"Nsouli, S.M., Schaechter, A.: Challenges of the E-banking revolution. International Monetary Fund: Finance & Development\u00a039(3) (2002), \n                  \n                    http:\/\/www.imf.org\/external\/pubs\/ft\/fandd\/2002\/09\/nsouli.htm\n                  \n                  \n                 (retrieved July 20, 2011)"},{"key":"8_CR20","unstructured":"OCTAVE - Operationally Critical Threat, Asset, and Vulnerability Evaluation (2003), \n                  \n                    http:\/\/www.cert.org\/octave\/approach_intro.pdf\n                  \n                  \n                 (retrieved July 20, 2011)"},{"issue":"5","key":"8_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1201\/1079.07366981\/45653.33.5.20051101\/91005.1","volume":"33","author":"R.S. Poore","year":"2005","unstructured":"Poore, R.S.: Information Security Governance. EDPACS\u00a033(5), 1\u20138 (2005)","journal-title":"EDPACS"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Rao, H.R., Gupta, M., Upadhyaya, S.J.: Managing Information Assurance in Financial Services. IGI Publishing (2007)","DOI":"10.4018\/978-1-59904-171-1"},{"key":"8_CR23","series-title":"IFIP","volume-title":"Information Security Governance a Re-definition","author":"R. Rastogi","year":"2006","unstructured":"Rastogi, R., Von Solms, R.: Information Security Governance a Re-definition. IFIP, vol.\u00a0193. Springer, Boston (2006)"},{"issue":"4","key":"8_CR24","first-page":"60","volume":"39","author":"R. Saint-Gemain","year":"2005","unstructured":"Saint-Gemain, R.: Information security management best practice based on ISO\/IEC 17799. Information Management Journal\u00a039(4), 60\u201365 (2005)","journal-title":"Information Management Journal"},{"key":"8_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-79984-1","volume-title":"Information Security Governance","author":"S.H. Solms","year":"2009","unstructured":"Solms, S.H., von Solms, R.: Information Security Governance. Springer, Heidelberg (2009)"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Southard, P.B., Siau, K.: A survey of online e-banking retail initiatives. Communications of The ACM\u00a047(10) (2004)","DOI":"10.1145\/1022594.1022601"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Tan, T.C.C., Ruighaver, A.B., Ahmad, A.: Information Security Governance: When Compliance Becomes More Important than Security. In: Proceedings of the 25th IFIP TC 11 International Information Security Conference, pp. 55\u201367 (2010)","DOI":"10.1007\/978-3-642-15257-3_6"},{"key":"8_CR28","unstructured":"Tanampasidis, G.: A Comprehensive Method for Assessment of Operational Risk in E-banking. Information Systems Control Journal\u00a04 (2008)"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27189-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T03:11:38Z","timestamp":1555729898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27189-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642271885","9783642271892"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27189-2_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}