{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T19:58:21Z","timestamp":1774987101811,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642416866","type":"print"},{"value":"9783642416873","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41687-3_2","type":"book-chapter","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T10:46:37Z","timestamp":1382006797000},"page":"3-14","source":"Crossref","is-referenced-by-count":26,"title":["Resilience - A New Research Field in Business Information Systems?"],"prefix":"10.1007","author":[{"given":"G\u00fcnter","family":"M\u00fcller","sequence":"first","affiliation":[]},{"given":"Thomas G.","family":"Koslowski","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Accorsi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Accorsi, R., Stocker, T.: On the exploitation of process mining for security audits: the conformance checking case. In: ACM Symposium on Applied Computing, pp. 1709\u20131716. ACM (2012)","DOI":"10.1145\/2245276.2232051"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Accorsi, R., Stocker, T., M\u00fcller, G.: On the exploitation of process mining for security audits: the process discovery case. In: ACM Symposium on Applied Computing, pp. 1462\u20131468. ACM (2013)","DOI":"10.1145\/2480362.2480634"},{"issue":"5","key":"2_CR3","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/s00287-012-0641-4","volume":"35","author":"R. Accorsi","year":"2012","unstructured":"Accorsi, R., Ullrich, M., van der Aalst, W.M.P.: Process mining. Informatik Spektrum\u00a035(5), 354\u2013359 (2012)","journal-title":"Informatik Spektrum"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Allen, J.H., Curtis, P.D., Gates, L.P.: Using defined processes as a context for resilience measures (2011)","DOI":"10.21236\/ADA610464"},{"issue":"2","key":"2_CR5","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1016\/j.eswa.2010.05.017","volume":"38","author":"P. Antunes","year":"2011","unstructured":"Antunes, P., Mour\u00e3o, H.: Resilient business process management: Framework and services. Expert Syst. Appl.\u00a038(2), 1241\u20131254 (2011)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"2_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secur. Comput.\u00a01(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"6","key":"2_CR7","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1108\/14637150510630855","volume":"11","author":"S. Balasubramanian","year":"2005","unstructured":"Balasubramanian, S., Gupta, M.: Structural metrics for goal based business process design and evaluation. Business Process Mgmt. J.\u00a011(6), 680\u2013694 (2005)","journal-title":"Business Process Mgmt. J."},{"issue":"18","key":"2_CR8","doi-asserted-by":"publisher","first-page":"5375","DOI":"10.1080\/00207543.2011.563826","volume":"49","author":"R. Bhamra","year":"2011","unstructured":"Bhamra, R., Dani, S., Burnard, K.: The concept, a literature review and future directions: International Journal of Production Research. Int. J.\u00a0of Production Research\u00a049(18), 5375\u20135393 (2011)","journal-title":"Int. J.\u00a0of Production Research"},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1111\/j.1468-5973.2007.00504.x","volume":"15","author":"A. Boin","year":"2007","unstructured":"Boin, A., McConnell, A.: Preparing for critical infrastructure breakdowns: The limits of crisis management and the need for resilience. J.\u00a0Contingencies & Crisis Management\u00a015(1), 50\u201359 (2007)","journal-title":"J.\u00a0Contingencies & Crisis Management"},{"issue":"2","key":"2_CR10","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1177\/1056492610385564","volume":"20","author":"M. Boisot","year":"2011","unstructured":"Boisot, M., McKelvey, B.: Connectivity, extremes, and adaptation: A power-law perspective of organizational effectiveness. J. Management Inquiry\u00a020(2), 119\u2013133 (2011)","journal-title":"J. Management Inquiry"},{"issue":"2","key":"2_CR11","doi-asserted-by":"crossref","first-page":"211","DOI":"10.2307\/25148728","volume":"30","author":"B.S. Butler","year":"2006","unstructured":"Butler, B.S., Gray, P.H.: Reliability, mindfulness, and information systems. MIS Quarterly\u00a030(2), 211\u2013224 (2006)","journal-title":"MIS Quarterly"},{"key":"2_CR12","unstructured":"Caralli, R.A., Allen, J.H., Curtis, P.D., Young, L.R.: CERT Resilience Management Model, version 1.0 (2010)"},{"issue":"3","key":"2_CR13","doi-asserted-by":"crossref","first-page":"341","DOI":"10.5465\/amr.2004.13670987","volume":"29","author":"B.A. Colbert","year":"2004","unstructured":"Colbert, B.A.: The complex resource-based view: Implications for theory and practice in strategic human resource management. Academy of Management Review\u00a029(3), 341\u2013358 (2004)","journal-title":"Academy of Management Review"},{"issue":"2","key":"2_CR14","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1080\/17517570903474304","volume":"4","author":"O. Erol","year":"2010","unstructured":"Erol, O., Sauser, B.J., Mansouri, M.: A framework for investigation into extended enterprise resilience. Enterprise Information Systems\u00a04(2), 111\u2013136 (2010)","journal-title":"Enterprise Information Systems"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Fenz, S., Neubauer, T., Accorsi, R., Koslowski, T.: FORISK: Formalizing information security risk and compliance management. In: Annual IEEE\/IFIP Conference on Dependable Systems and Networks (2013)","DOI":"10.1109\/DSNW.2013.6615533"},{"key":"2_CR16","unstructured":"Harrington, H.J.: Business process improvement: The breakthrough strategy for total quality, productivity, and competitiveness. McGraw-Hill (1991)"},{"key":"2_CR17","unstructured":"Hollnagel, E., Woods, D.D., Leveson, N. (eds.): Resilience engineering: Concepts and precepts, Ashgate, Aldershot, England, Burlington, VT (2006)"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Jakoubi, S., Tjoa, S., Goluch, G., Quirchmayr, G.: A survey of scientific approaches considering the integration of security and risk aspects into business process management. In: Workshop on Database and Expert Systems Application, pp. 127\u2013132.","DOI":"10.1109\/DEXA.2009.71"},{"issue":"6","key":"2_CR19","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s12599-011-0187-z","volume":"3","author":"T. Koslowski","year":"2011","unstructured":"Koslowski, T., Str\u00fcker, J.: ERP on demand platform - Complementary effects using the example of a sustainability benchmarking service. Business & Information Systems Engineering\u00a03(6), 359\u2013367 (2011)","journal-title":"Business & Information Systems Engineering"},{"key":"2_CR20","unstructured":"Koslowski, T.G., Geoghegan, W., Longstaff, P.H.: Organizational resilience: A review and reconceptualization. In: Conf. Strategic Management Society (2013)"},{"issue":"2","key":"2_CR21","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1080\/17517570903067751","volume":"4","author":"D. Liu","year":"2010","unstructured":"Liu, D., Deters, R., Zhang, W.J.: Architectural design for resilience. Enterprise Information Systems\u00a04(2), 137\u2013152 (2010)","journal-title":"Enterprise Information Systems"},{"key":"2_CR22","unstructured":"Longstaff, P.H., Koslowski, T.G., Geoghegan, W.: Translating resilience: A framework to enhance communication and implementation. In: Symposium on Resilience Engineering (2013)"},{"key":"2_CR23","unstructured":"McCann, J.E., Selsky, J.W.: Mastering turbulence: The essential capabilities of agile and resilient individuals, teams, and organizations. Jossey-Bass (2012)"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Meyer, J.F.: Model-based evaluation of system resilience. In: Annual IEEE\/IFIP Conference on Dependable Systems and Networks (2013)","DOI":"10.1109\/DSNW.2013.6615535"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Perrow, C.: Normal accidents: Living with high risk technologies. Princeton University Press (2011)","DOI":"10.2307\/j.ctt7srgf"},{"issue":"3","key":"2_CR26","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/S0305-0483(03)00023-9","volume":"31","author":"L. Riolli","year":"2003","unstructured":"Riolli, L., Savicki, V.: Information system organizational resilience. Omega\u00a031(3), 227 (2003)","journal-title":"Omega"},{"key":"2_CR27","unstructured":"Risk Response Network. Global risks 2012. World Economic Forum (2012)"},{"issue":"1","key":"2_CR28","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1111\/j.1468-5973.2009.00558.x","volume":"17","author":"S. Somers","year":"2009","unstructured":"Somers, S.: Measuring resilience potential: An adaptive strategy for organizational crisis planning. J. Contingencies & Crisis Management\u00a017(1), 12\u201323 (2009)","journal-title":"J. Contingencies & Crisis Management"},{"issue":"3","key":"2_CR29","doi-asserted-by":"publisher","first-page":"346","DOI":"10.5465\/AMR.2010.51141319","volume":"35","author":"R. Suddaby","year":"2010","unstructured":"Suddaby, R.: Editor\u2019s comments: Construct clarity in theories of management and organization. Academy of Management Review\u00a035(3), 346\u2013357 (2010)","journal-title":"Academy of Management Review"},{"key":"2_CR30","unstructured":"Suriadi, S., Weiss, B., Winkelmann, A., ter Hofstede, A., Wynn, M., Ouyang, C., Adams, M., Conforti, R., Fidge, C., La Rosa, M., et al.: Current research in risk-aware business process management-overview, comparison, and gap analysis. QUT ePrints, 50606 (2012)"},{"issue":"4","key":"2_CR31","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1287\/isre.1100.0317","volume":"21","author":"H. Tanriverdi","year":"2010","unstructured":"Tanriverdi, H., Rai, A., Venkatraman, N.: Research commentary - Reframing the dominant quests of information systems strategy research for complex adaptive business systems. Information Systems Research\u00a021(4), 822\u2013834 (2010)","journal-title":"Information Systems Research"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Vogus, T., Sutcliffe, K.: Organizational resilience: Towards a theory and research agenda. In: IEEE Int. Conf. Systems, Man and Cybernetics, pp. 3418\u20133422 (2007)","DOI":"10.1109\/ICSMC.2007.4414160"},{"issue":"2","key":"2_CR33","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1080\/17517571003754561","volume":"4","author":"J. Wang","year":"2010","unstructured":"Wang, J., Gao, F., Ip, W.: Measurement of resilience and its application to enterprise information systems. Enterp. Inform. Sys.\u00a04(2), 215\u2013223 (2010)","journal-title":"Enterp. Inform. Sys."},{"key":"2_CR34","unstructured":"Weick, K.E., Sutcliffe, K.M.: Managing the unexpected: Resilient performance in an age of uncertainty. Jossey-Bass (2007)"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Wolter, K.: Resilience assessment and evaluation of computing systems. Springer (2012)","DOI":"10.1007\/978-3-642-29032-9"},{"issue":"2","key":"2_CR36","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1080\/17517571003763380","volume":"4","author":"W. Zhang","year":"2010","unstructured":"Zhang, W., Lin, Y.: On the principle of design of resilient systems \u2013 Application to enterprise information systems. Enterp. Inform. Sys.\u00a04(2), 99\u2013110 (2010)","journal-title":"Enterp. Inform. Sys."},{"issue":"4","key":"2_CR37","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1111\/j.1540-5915.2012.00364.x","volume":"43","author":"C.W. Zobel","year":"2012","unstructured":"Zobel, C.W., Khansa, L.: Quantifying cyberinfrastructure resilience against multi-event attacks. Decision Sciences\u00a043(4), 687\u2013710 (2012)","journal-title":"Decision Sciences"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41687-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T17:23:18Z","timestamp":1746033798000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41687-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642416866","9783642416873"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41687-3_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}