{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:07:39Z","timestamp":1742944059056,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819785971"},{"type":"electronic","value":"9789819785988"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8598-8_18","type":"book-chapter","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T08:07:38Z","timestamp":1737014858000},"page":"203-215","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CISO as the Driver of an ISMS Project in Public Administrations: Role, Tasks, and Localization of the CISO"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8117-7233","authenticated-orcid":false,"given":"Frank","family":"Moses","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7431-8412","authenticated-orcid":false,"given":"Kurt","family":"Sandkuhl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"fortiss GmbH, Forschungsinstitut des Freistaats Bayern f\u00fcr softwareintensive Systeme und Services, Deutschland, Kuhn, P., Balta, D., Krcmar, H., Technische Universit\u00e4t M\u00fcnchen, Lehrstuhl f\u00fcr Wirtschaftsinformatik, Deutschland: Was sind Herausforderungen proaktiver Verwaltungsleistungen in Deutschland? In: WI2020 Zentrale Tracks. pp. 554\u2013559. GITO Verlag (2020)","DOI":"10.30844\/wi_2020_e4-kuhn"},{"key":"18_CR2","doi-asserted-by":"publisher","unstructured":"Da Silva, J., Jensen, R.B.: Cyber security is a dark art: The CISO as Soothsayer. Proc. ACM Hum.-Comput. Interact. 6, 1\u201331 (2022). https:\/\/doi.org\/10.1145\/3555090","DOI":"10.1145\/3555090"},{"key":"18_CR3","unstructured":"Allen, J.H.: Structuring the Chief Information Security Officer Organization (2015)"},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Shayo, C., Lin, F.: An exploration of the evolving reporting organizational structure for the Chief Information Security Officer (CISO) function. J. Comput. Sci. Inf. Technol. 7 (2019). https:\/\/doi.org\/10.15640\/jcsit.v6n2a1","DOI":"10.15640\/jcsit.v6n2a1"},{"key":"18_CR5","unstructured":"Whitten, D.: The Chief Information Security Officer: an analysis of the skills required for success. J. Comput. Inf. Syst. (2008)"},{"key":"18_CR6","doi-asserted-by":"publisher","unstructured":"Maynard, S.B., Onibere, M., Ahmad, A.: Defining the strategic role of the Chief Information Security Officer. Pac. Asia J. Assoc. Inf. Syst. 61\u201386 (2018). https:\/\/doi.org\/10.17705\/1pais.10303","DOI":"10.17705\/1pais.10303"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Goodyear, M., Goerdel, H., Portillo, S., Williams, L.: Cybersecurity management in the states: the emerging role of Chief Information Security Officers (2010). https:\/\/papers.ssrn.com\/abstract=2187412","DOI":"10.2139\/ssrn.2187412"},{"volume-title":"IT-GRC-Management \u2013 Governance","year":"2017","key":"18_CR8","unstructured":"Knoll, M., Strahringer, S. (eds.): IT-GRC-Management \u2013 Governance. Risk und Compliance. Springer Fachmedien Wiesbaden, Wiesbaden (2017)"},{"key":"18_CR9","unstructured":"Bertschek, I., Jan\u00dfen, R.: Cybersicherheit und Innovationen: Ergebnisse einer repr\u00e4sentativen Umfrage"},{"key":"18_CR10","unstructured":"Engels, B.: Cybersicherheit: 52,5 Mrd. Euro Schaden durch Angriffe im Homeoffice"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Bostelmann, L.: Cybersicherheit bei der Umsetzung des Onlinezugangsgesetzes - Digitalisierung ja, aber (rechts)sicher! In: Seckelmann, M. and Brunzel, M. (eds.) Handbuch Onlinezugangsgesetz: Potenziale - Synergien - Herausforderungen. Springer, Berlin (2021)","DOI":"10.1007\/978-3-662-62395-4_8"},{"key":"18_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-63917-7","volume-title":"Informationssicherheit: M\u00f6glichkeiten und Grenzen","author":"T Liedtke","year":"2022","unstructured":"Liedtke, T.: Informationssicherheit: M\u00f6glichkeiten und Grenzen. Springer, Berlin (2022)"},{"key":"18_CR13","unstructured":"Wong, C.K., Maynard, S.B., Ahmad, A., Naseer, H.: Information security governance: a process model and pilot case study. Inf. Secur. Gov. (2020)"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.cose.2004.05.002","volume":"23","author":"B Von Solms","year":"2004","unstructured":"Von Solms, B., Von Solms, R.: The 10 deadly sins of information security management. Comput. Secur. 23, 371\u2013376 (2004). https:\/\/doi.org\/10.1016\/j.cose.2004.05.002","journal-title":"Comput. Secur."},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.bushor.2016.07.004","volume":"59","author":"V Hooper","year":"2016","unstructured":"Hooper, V., McKissack, J.: The emerging role of the CISO. Bus. Horiz. 59, 585\u2013591 (2016). https:\/\/doi.org\/10.1016\/j.bushor.2016.07.004","journal-title":"Bus. Horiz."},{"key":"18_CR16","unstructured":"Onibere, M., Ahmad, A., Maynard, S.: The Chief Information Security Officer and the five dimensions of a strategist."},{"key":"18_CR17","unstructured":"Monzelo, P., Nunes, S.: The role of the Chief Information Security Officer (CISO) in Organizations (2019)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Moses, F., Sandkuhl, K., Kemmerich, T.: Empirical study on the state of practice of information security management in local government. In: Zimmermann, A., Howlett, R.J., and Jain, L.C. (eds.) Human Centred Intelligent Systems, pp. 13\u201325. Springer Nature, Singapore (2022)","DOI":"10.1007\/978-981-19-3455-1_2"},{"key":"18_CR19","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1108\/ICS-02-2016-0013","volume":"25","author":"E Karanja","year":"2017","unstructured":"Karanja, E.: The role of the chief information security officer in the management of IT security. Inf. Comput. Secur. 25, 300\u2013329 (2017). https:\/\/doi.org\/10.1108\/ICS-02-2016-0013","journal-title":"Inf. Comput. Secur."},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1016\/j.cose.2013.09.004","volume":"39","author":"D Ashenden","year":"2013","unstructured":"Ashenden, D., Sasse, A.: CISOs and organisational culture: Their own worst enemy? Comput. Secur. 39, 396\u2013405 (2013). https:\/\/doi.org\/10.1016\/j.cose.2013.09.004","journal-title":"Comput. Secur."},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s10845-012-0683-0","volume":"25","author":"A Ahmad","year":"2014","unstructured":"Ahmad, A., Maynard, S.B., Park, S.: Information security strategies: towards an organizational multi-strategy perspective. J. Intell. Manuf. 25, 357\u2013370 (2014). https:\/\/doi.org\/10.1007\/s10845-012-0683-0","journal-title":"J. Intell. Manuf."},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.3390\/su14031311","volume":"14","author":"M Zwilling","year":"2022","unstructured":"Zwilling, M.: Trends and challenges regarding cyber risk mitigation by CISOs\u2014a systematic literature and experts\u2019 opinion review based on text analytics. Sustainability 14, 1311 (2022). https:\/\/doi.org\/10.3390\/su14031311","journal-title":"Sustainability"},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1365\/s40702-022-00873-w","volume":"59","author":"A Paech","year":"2022","unstructured":"Paech, A., Vogel, D.: IT-F\u00fchrungsrollen des Top-Management-Teams im \u00f6ffentlichen Sektor. HMD Prax. Wirtsch. 59, 854\u2013866 (2022). https:\/\/doi.org\/10.1365\/s40702-022-00873-w","journal-title":"HMD Prax. Wirtsch."},{"key":"18_CR24","unstructured":"Kappers, W.M., Harrell, M.N.: From degree to Chief Information Security Officer (CISO): a framework for consideration"},{"key":"18_CR25","doi-asserted-by":"publisher","unstructured":"Meuche, T.: Dilemmata und Wege zur Digitalisierung der \u00f6ffentlichen Verwaltung. Gr. Interakt. Organ. Z. F\u00fcr Angew. Organ. GIO. 53, 99\u2013108 (2022). https:\/\/doi.org\/10.1007\/s11612-021-00612-7","DOI":"10.1007\/s11612-021-00612-7"},{"key":"18_CR26","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1080\/10658980701746577","volume":"16","author":"T Fitzgerald","year":"2007","unstructured":"Fitzgerald, T.: Clarifying the roles of information security: 13 questions the CEO, CIO, and CISO must ask each other. Inf. Syst. Secur. 16, 257\u2013263 (2007). https:\/\/doi.org\/10.1080\/10658980701746577","journal-title":"Inf. Syst. Secur."},{"key":"18_CR27","unstructured":"Atanassov, V.: Implementation Hierarchy and CIO Organization in Bulgaria\u2019s Public Administration. (2019)"},{"key":"18_CR28","first-page":"867","volume":"59","author":"G Auth","year":"2022","unstructured":"Auth, G., Von Der Heyde, M.: Die Rolle des Chief Digital Officers f\u00fcr die digitale Transformation von Hochschulen. HMD Prax. Wirtsch. 59, 867\u2013880 (2022)","journal-title":"HMD Prax. Wirtsch."},{"key":"18_CR29","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/s11623-021-1429-y","volume":"45","author":"J Remy","year":"2021","unstructured":"Remy, J., Stettner, R.: Cybersicherheit als Aufgabe der L\u00e4nder. Datenschutz Datensicherheit - DuD. 45, 254\u2013258 (2021). https:\/\/doi.org\/10.1007\/s11623-021-1429-y","journal-title":"Datenschutz Datensicherheit - DuD."},{"key":"18_CR30","unstructured":"BSI ed: IT-Grundschutz-Kompendium. Bundesanzeiger-Verl, K\u00f6ln (2023)"},{"key":"18_CR31","unstructured":"Lanz, J.: The Chief Information Security Officer (2017)"},{"key":"18_CR32","unstructured":"Rundschreiben 10\/2017 (BA) - Bankaufsichtliche Anforderungen an die IT (BAIT), https:\/\/www.bafin.de\/SharedDocs\/Dowoads\/DE\/Rundschreiben\/dl_rs_1710_ba_BAIT.html"},{"key":"18_CR33","doi-asserted-by":"publisher","DOI":"10.3139\/9783446449350","volume-title":"Enterprise Architecture Management - einfach und effektiv: ein praktischer Leitfaden f\u00fcr die Einf\u00fchrung von EAM","author":"I Hanschke","year":"2016","unstructured":"Hanschke, I.: Enterprise Architecture Management - einfach und effektiv: ein praktischer Leitfaden f\u00fcr die Einf\u00fchrung von EAM. Hanser, M\u00fcnchen (2016)"},{"key":"18_CR34","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-658-28699-6_4","volume-title":"Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten: Eine kompakte Einf\u00fchrung in die Praxis","author":"I Hanschke","year":"2020","unstructured":"Hanschke, I.: EAM & CMDB als Erfolgsfaktor f\u00fcr ein wirksames ISMS. In: Hanschke, I. (ed.) Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten: Eine kompakte Einf\u00fchrung in die Praxis, pp. 77\u201381. Springer Fachmedien, Wiesbaden (2020)"},{"key":"18_CR35","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s11623-020-1344-7","volume":"44","author":"A Sowa","year":"2020","unstructured":"Sowa, A., Rost, M.: Die ISO 27701 und das SDM-V2 im Lichte der Umsetzung der DSGVO. Datenschutz Datensicherheit - DuD. 44, 659\u2013662 (2020). https:\/\/doi.org\/10.1007\/s11623-020-1344-7","journal-title":"Datenschutz Datensicherheit - DuD."},{"key":"18_CR36","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1007\/s11623-022-1637-0","volume":"46","author":"T Rehbohm","year":"2022","unstructured":"Rehbohm, T., Kemmerich, R., Cap, C.H., Sandkuhl, K.: Sicherheitsmanagement, Cybersicherheit und Daseinsvorsorge: Empirische Studie in deutschen Kommunen. Datenschutz Datensicherheit - DuD. 46, 448\u2013454 (2022). https:\/\/doi.org\/10.1007\/s11623-022-1637-0","journal-title":"Datenschutz Datensicherheit - DuD."},{"key":"18_CR37","unstructured":"Moses, F., Rehbohm, T.: Federal Cybersecurity Architecture and Information Security Management - Adoption and Diffusion of the NIS-2 Requirements. In: GI Edition Proceedings Band 341 6. Fachtagung Rechts- und Verwaltungsinformatik (RVI 2023). K\u00f6llen, Bonn (2023)"}],"container-title":["Smart Innovation, Systems and Technologies","Human Centred Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8598-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T08:07:50Z","timestamp":1737014870000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8598-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819785971","9789819785988"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8598-8_18","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KES-HCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International KES Conference on Human Centred Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madeira","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"keshcis12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/hcis-24.kesinternational.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}