{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T05:28:40Z","timestamp":1686029320415},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,4,1]],"date-time":"2010-04-01T00:00:00Z","timestamp":1270080000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2010,4,1]],"date-time":"2010-04-01T00:00:00Z","timestamp":1270080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wirtsch Inform Manag"],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1007\/bf03248241","type":"journal-article","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T17:43:09Z","timestamp":1644514989000},"page":"23-32","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Chancen und Risiken des Einsatzes von SaaS \u2014 die Sicht der Anwender"],"prefix":"10.1007","volume":"2","author":[{"given":"Alexander","family":"Benlian","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Hess","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Buxmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,20]]},"reference":[{"key":"BF03248241_CR1","volume-title":"Netsourcing: Renting business applications and services over a network","author":"T. Kern","year":"2002","unstructured":"Kern, T.; Lacity, M. C.; Willcocks, L. (2002): Netsourcing: Renting business applications and services over a network, Prentice-Hall, New York."},{"issue":"3","key":"BF03248241_CR2","first-page":"26","volume":"37","author":"M. J. Earl","year":"1996","unstructured":"Earl, M. J. (1996): The Risks of Outsourcing IT. Sloan Management Review, 37, 3, 26\u201332.","journal-title":"Wirtschaftsinformatik und Management"},{"issue":"2","key":"BF03248241_CR3","first-page":"113","volume":"1","author":"T. Kern","year":"2002","unstructured":"Kern, T.; Willcocks, L. P.; Lacity, M. C. (2002): Application Service Provision: Risk assessment and mitigation. MIS Quarterly Executive, 1, 2, 113\u2013126.","journal-title":"Wirtschaftsinformatik und Management"},{"key":"BF03248241_CR4","volume-title":"Proceedings of the 18th European Conference on Information Systems","author":"A. Benlian","year":"2010","unstructured":"Benlian, A.; Hess, T. (2010): \u201eThe Risks of Sourcing Software as a Service \u2014 An Empirical Analysis of Adopters and Non-Adopters,\u201d in Proceedings of the 18th European Conference on Information Systems, Pretoria, South Africa."},{"key":"BF03248241_CR5","volume-title":"Worldwide, 2008\u20132013. Gartner","author":"S. A. Mertz","year":"2009","unstructured":"Mertz, S. A.; Eschinger, C.; Eid, T.; Huang, H. H.; Pang, C.; Pring, B. (2009): Market Trends: Software as a Service, Worldwide, 2008\u20132013. Gartner."}],"container-title":["Wirtschaftsinformatik und Management"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03248241.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03248241\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03248241.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T17:43:10Z","timestamp":1644514990000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03248241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4]]},"references-count":5,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,4]]}},"alternative-id":["BF03248241"],"URL":"https:\/\/doi.org\/10.1007\/bf03248241","relation":{},"ISSN":["1867-5905","1867-5913"],"issn-type":[{"value":"1867-5905","type":"print"},{"value":"1867-5913","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,4]]},"assertion":[{"value":"20 July 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}