{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:59:52Z","timestamp":1743119992084,"version":"3.40.3"},"publisher-location":"Wiesbaden","reference-count":13,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658067076"},{"type":"electronic","value":"9783658067083"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-658-06708-3_5","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T06:50:27Z","timestamp":1413528627000},"page":"65-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["13+ Real Ways to Destroy Business by Breaking Company\u2019s SAP Applications"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Polyakov","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,18]]},"reference":[{"key":"5_CR1","unstructured":"Association of Certified Fraud Examiners \u2013 Key Findings and Highlights \u2013 http:\/\/www.acfe.com\/rttn-highlights.aspx"},{"key":"5_CR2","unstructured":"SAP \u2013 Analysis of 3000 vulnerabilities in SAP Systems \u2013 http:\/\/erpscan.com\/wp-content\/uploads\/2014\/06\/3000-SAP-notes-Analysis-by-ERPScan.pdf"},{"key":"5_CR3","unstructured":"Forbes \u2013 Companies are falling to detect financial fraud in SCM \u2013 http:\/\/www.forbes.com\/sites\/robertbowman\/2014\/04\/16\/companies-are-failing-to-detect-financial-fraud-in-supply-chainsdeloitte\/"},{"key":"5_CR4","unstructured":".NBC news \u2013 UK businessman charged with fraud over bomb detectors sold to Iraq \u2013 http:\/\/worldnews.nbcnews.com\/_news\/2012\/07\/12\/12696895-uk-businessman-charged-with-fraudover-bomb-detectors-sold-to-iraq?lite"},{"key":"5_CR5","unstructured":"SAP Product Lifecycle Management (PLM) \u2013 http:\/\/wiki.scn.sap.com\/wiki\/pages\/viewpage.action?pageId=26764"},{"key":"5_CR6","unstructured":"Trend Micro \u2013 AutoCAD Malware Leaves Victims Hackable http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/autocad-malware-leaves-victims-hackable\/"},{"key":"5_CR7","unstructured":"FDA Recalls Tracheostomy Tubes After 1,200 Complaints, 3 Deaths http:\/\/www.rightinginjustice.com\/news\/2010\/04\/26\/fda-recalls-tracheostomy-tubes-after-1200-complaints-3-deaths\/"},{"key":"5_CR8","unstructured":"IKEA \u2013 IKEA Product Recalls http:\/\/www.ikea.com\/ms\/en_US\/about_ikea\/press\/product_recalls\/"},{"key":"5_CR9","unstructured":"The Daily Mail \u2013 Toyota recalls 2.27million cars over defective airbag that could explode \u2013 and Honda and Nissan could be affected too http:\/\/www.dailymail.co.uk\/news\/article-2654899\/Toyota-recalls-ANOTHER-650-000-cars-defective-airbag-explode-Honda-Nissan-affected-too.html"},{"key":"5_CR10","unstructured":"U.S. Department of Health and Human Services \u2013 http:\/\/www.fda.gov\/"},{"key":"5_CR11","unstructured":"U.S. Consumer Product Safety Commission \u2013 http:\/\/www.cpsc.gov\/en\/Recalls\/"},{"key":"5_CR12","unstructured":"Product Safety Recalls Australia https:\/\/www.recalls.gov.au\/content\/index.phtml\/item-Id\/1056827"},{"key":"5_CR13","unstructured":"U.S. Department of Energy- Office of Inspector General, Office of Audits and Inspections Special Report \u2013 The Department of Energy\u2019s July 2013 Cyber Security Breach http:\/\/energy.gov\/sites\/prod\/files\/2013\/12\/f5\/IG-0900.pdf"}],"container-title":["ISSE 2014 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-06708-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T22:56:43Z","timestamp":1676415403000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-06708-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783658067076","9783658067083"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-06708-3_5","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}