{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:42:43Z","timestamp":1725752563037},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642416866"},{"type":"electronic","value":"9783642416873"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41687-3_10","type":"book-chapter","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T06:46:37Z","timestamp":1381992397000},"page":"89-99","source":"Crossref","is-referenced-by-count":0,"title":["Policy Conflict Handling as a Monitoring Activity of Hospital Information Systems"],"prefix":"10.1007","author":[{"given":"Raik","family":"Kuhlisch","sequence":"first","affiliation":[]},{"given":"Kurt","family":"Sandkuhl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"10_CR1","first-page":"16","volume":"2","author":"U. Seigerroth","year":"2011","unstructured":"Seigerroth, U.: Enterprise Modeling and Enterprise Architecture: The Constituents of Transformation and Alignment of Business and IT. IJITBAG\u00a02(1), 16\u201334 (2011)","journal-title":"IJITBAG"},{"issue":"7\u20138","key":"10_CR2","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/s00502-009-0660-2","volume":"126","author":"R. Woitsch","year":"2009","unstructured":"Woitsch, R., Karagiannis, D., Plexousakis, D., Hinkelmann, K.: Business and IT alignment: the IT-Socket. e & i Elektrotechnik und Informationstechnik\u00a0126(7\u20138), 308\u2013321 (2009)","journal-title":"e & i Elektrotechnik und Informationstechnik"},{"key":"10_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2936-3","volume-title":"Model-Based Development and Evolution of Information Systems - A Quality Approach","author":"J. Krogstie","year":"2012","unstructured":"Krogstie, J.: Model-Based Development and Evolution of Information Systems - A Quality Approach. Springer, London (2012)"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1007\/978-3-540-74658-4_59","volume-title":"Springer Handbook of Medical Technology","author":"P. Haas","year":"2011","unstructured":"Haas, P., Kuhn, K.A.: Hospital Information Systems. In: Kramme, R., Hoffmann, K.-P., Pozos, R.S. (eds.) Springer Handbook of Medical Technology, pp. 1095\u20131118. Springer, Heidelberg (2011)"},{"issue":"3-4","key":"10_CR5","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.ijmedinf.2005.08.002","volume":"75","author":"R. Haux","year":"2006","unstructured":"Haux, R.: Health information systems\u2013past, present, future. International Journal of Medical Informatics\u00a075(3-4), 268\u2013281 (2006)","journal-title":"International Journal of Medical Informatics"},{"issue":"1","key":"10_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.ijmedinf.2004.09.002","volume":"74","author":"B. Brigl","year":"2005","unstructured":"Brigl, B., Ammenwerth, E., Dujat, C., Gr\u00e4ber, S., Gro\u00dfe, A., H\u00e4ber, A., Jostes, C., Winter, A.: Preparing strategic information management plans for hospitals: a practical guideline. SIM plans for hospitals: a guideline. International Journal of Medical Informatics\u00a074(1), 51\u201365 (2005)","journal-title":"International Journal of Medical Informatics"},{"issue":"1","key":"10_CR7","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/BF02141605","volume":"2","author":"R. Wies","year":"1994","unstructured":"Wies, R.: Policies in Network and Systems Management \u2013 Formal Definition and Architecture. Journal of Network and Systems Management\u00a02(1), 63\u201383 (1994)","journal-title":"Journal of Network and Systems Management"},{"key":"10_CR8","unstructured":"Caumanns, J., Kuhlisch, R., Pfaff, O., Rode, O.: IHE IT-Infrastructure White Paper: Access Control. IHE International (September 2009)"},{"key":"10_CR9","unstructured":"IHE IT Infrastructure Technical Framework: Volume 1 (ITI TF-1): Integration Profiles. IHE International, 9.0 (August 2012)"},{"issue":"3","key":"10_CR10","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K. Peffers","year":"2007","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A Design Science Research Methodology for Information Systems Research. Journal of Management Information Systems\u00a024(3), 45\u201378 (2007)","journal-title":"Journal of Management Information Systems"},{"key":"10_CR11","unstructured":"Flyvbjerg, B.: Case Study. In: Denzin, N.K., Lincoln, Y.S. (eds.) The Sage Handbook of Qualitative Research, 4th edn., pp. 301\u2013316. Sage Publications Ltd. (2011)"},{"issue":"5","key":"10_CR12","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1057\/ejis.2008.44","volume":"17","author":"R. Winter","year":"2008","unstructured":"Winter, R.: Design science research in Europe. European Journal of Information Systems\u00a017(5), 470\u2013475 (2008)","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"10_CR13","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"A.R. Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design Science in Information Systems Research. MIS Quarterly\u00a028(1), 75\u2013105 (2004)","journal-title":"MIS Quarterly"},{"issue":"3","key":"10_CR14","doi-asserted-by":"publisher","first-page":"369","DOI":"10.2307\/248684","volume":"11","author":"I. Benbasat","year":"1987","unstructured":"Benbasat, I., Goldstein, D.K., Mead, M.: The Case Research Strategy in Studies of Information Systems. MIS Quarterly\u00a011(3), 369\u2013386 (1987)","journal-title":"MIS Quarterly"},{"issue":"1","key":"10_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.2307\/249410","volume":"23","author":"H.K. Klein","year":"1999","unstructured":"Klein, H.K., Myers, M.D.: A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems. MIS Quarterly\u00a023(1), 67\u201388 (1999)","journal-title":"MIS Quarterly"},{"issue":"2","key":"10_CR16","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P. Runeson","year":"2009","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Empirical Software Engineering\u00a014(2), 131\u2013164 (2009)","journal-title":"Empirical Software Engineering"},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-1-84800-044-5_1","volume-title":"Guide to Advanced Empirical Software Engineering","author":"J. Singer","year":"2008","unstructured":"Singer, J., Sim, S.E., Lethbridge, T.C.: Software Engineering Data Collection for Field Studies. In: Shull, F., Singer, J., Sjberg, D.I.K. (eds.) Guide to Advanced Empirical Software Engineering, pp. 9\u201334. Springer London, London (2008)"},{"key":"10_CR18","unstructured":"Conference of the Data Protection Commissioners of the Federation and the Federal L\u00e4nder: Orientierungshilfe Krankenhausinformationssysteme, in Datenschutzkonforme Gestaltung und Nutzung von Krankenhausinformationssystemen, W\u00fcrzburg (2011)"},{"issue":"1","key":"10_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10919399409540214","volume":"4","author":"J.D. Moffett","year":"1994","unstructured":"Moffett, J.D., Sloman, M.S.: Policy Conflict Analysis in Distributed System Management. Journal of Organizational Computing\u00a04(1), 1\u201322 (1994)","journal-title":"Journal of Organizational Computing"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/11568285_8","volume-title":"Ambient Networks","author":"B. Kempter","year":"2005","unstructured":"Kempter, B., Danciu, V.: Generic Policy Conflict Handling Using a priori Models. In: Sch\u00f6nw\u00e4lder, J., Serrat, J. (eds.) DSOM 2005. LNCS, vol.\u00a03775, pp. 84\u201396. Springer, Heidelberg (2005)"},{"issue":"1","key":"10_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/504909.504910","volume":"5","author":"P.A. Bonatti","year":"2002","unstructured":"Bonatti, P.A., di Vimercati, S.D.C., Samarati, P.: An Algebra for Composing Access Control Policies. ACM Transactions on Information and System Security (TISSEC)\u00a05(1), 1\u201335 (2002)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"10_CR22","unstructured":"Cabinet Office, IT Infrastructure Library, Official ITIL\u00ae Website (May 11, 2012), \n                    \n                      http:\/\/www.itil-officialsite.com\/\n                    \n                    \n                   (accessed: March 26, 2013)"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41687-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T13:24:32Z","timestamp":1558617872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41687-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642416866","9783642416873"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41687-3_10","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2013]]}}}