{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T17:39:11Z","timestamp":1648834751916},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,11,29]],"date-time":"2011-11-29T00:00:00Z","timestamp":1322524800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatik Spektrum"],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1007\/s00287-011-0584-1","type":"journal-article","created":{"date-parts":[[2011,11,28]],"date-time":"2011-11-28T18:03:12Z","timestamp":1322503392000},"page":"39-44","source":"Crossref","is-referenced-by-count":2,"title":["IT-Compliance"],"prefix":"10.1007","volume":"35","author":[{"given":"Artur","family":"Strasser","sequence":"first","affiliation":[]},{"given":"Michael","family":"Wittek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,11,29]]},"reference":[{"key":"584_CR1","volume-title":"IT-Compliance: Erfolgreiches Management regulatorischer Anforderungen","author":"M Rath","year":"2009","unstructured":"Rath M, Sponholz R (2009) IT-Compliance: Erfolgreiches Management regulatorischer Anforderungen. Erich Schmidt Verlag, Berlin"},{"key":"584_CR2","unstructured":"Spiegel Online (2011) Millionen Bankdaten gestohlen \u2013 Sony meldet Hackerangriff auf weiteres Netzwerk. http:\/\/www.spiegel.de\/netzwelt\/gadgets\/0,1518,760256,00.html, letzter Zugriff 12.9.2011"},{"key":"584_CR3","unstructured":"S\u00fcddeutsche.de (2009) Datenschutz am Arbeitsplatz \u2013 Vertrauen per Gesetz. http:\/\/www.sueddeutsche.de\/wirtschaft\/datenschutz-am-arbeitsplatz-vertrauen-per-gesetz-1.490727, letzter Zugriff 12.9.2011"},{"key":"584_CR4","unstructured":"Kronschnabl S (2010) Vorstellung der Studienergebnisse: IT-Sicherheitsstandards und IT-Compliance 2010. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Veranstaltungen\/Grundschutz\/3GS_Tag2010\/IBI_Kronschnabel.pdf?__blob=publicationFile, letzter Zugriff 12.9.2011"},{"issue":"9","key":"584_CR5","first-page":"5","volume":"4","author":"M Klotz","year":"2009","unstructured":"Klotz M (2009) Facetten der IT-Compliance. IT-Serv Manag 4(9):5\u20138","journal-title":"IT-Serv Manag"},{"issue":"5","key":"584_CR6","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/s11576-008-0081-6","volume":"51","author":"RA Teubner","year":"2008","unstructured":"Teubner RA, Feller T (2008) Informationstechnologie, Governance und Compliance. Wirtschaftsinform 51(5):400\u2013407","journal-title":"Wirtschaftsinform"},{"key":"584_CR7","unstructured":"Amberg M, Mossanen K, Walser M (2007) Vorteile und Herausforderungen IT-gest\u00fctzter Compliance-Erf\u00fcllung. http:\/\/www.wi3.uni-erlangen.de\/fileadmin\/Dateien\/Forschung\/Studie_Compliance_Print_Version.pdf, letzter Zugriff 12.9.2011"},{"key":"584_CR8","unstructured":"Klotz M (2011) Regelwerke der IT-Compliance \u2013 Klassifikation und \u00dcbersicht Teil 1: Rechtliche Regelwerke. In: SIMAT Arbeitspapiere 03\/2011, Stralsund"},{"key":"584_CR9","unstructured":"IT Governance Institute (2005) COBIT 4.0 \u2013 Deutsche Ausgabe"}],"container-title":["Informatik-Spektrum"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-011-0584-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00287-011-0584-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-011-0584-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T10:42:37Z","timestamp":1559040157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00287-011-0584-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,29]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["584"],"URL":"https:\/\/doi.org\/10.1007\/s00287-011-0584-1","relation":{},"ISSN":["0170-6012","1432-122X"],"issn-type":[{"value":"0170-6012","type":"print"},{"value":"1432-122X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11,29]]}}}