{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T05:39:05Z","timestamp":1648877945076},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T00:00:00Z","timestamp":1177977600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1007\/s11623-007-0156-3","type":"journal-article","created":{"date-parts":[[2007,6,21]],"date-time":"2007-06-21T06:34:35Z","timestamp":1182407675000},"page":"441-445","source":"Crossref","is-referenced-by-count":0,"title":["IT-Sicherheitspr\u00fcfungen durch die Interne Revision"],"prefix":"10.1007","volume":"31","author":[{"given":"Aleksandra","family":"Sowa","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"156_CR1","unstructured":"<kes>: Lagebericht zur Informationssicherheit, 2006 (5), S. 40 ff."},{"key":"156_CR2","unstructured":"BaFin: Mindestanforderungen an das Risikomanagement (MaRisk). 2005. Bundesanstalt f\u00fcr Finanzdienstleistungsaufsicht (BaFin), Bonn, Rundschreiben 18\/2005."},{"key":"156_CR3","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): IT-Grundschutzhandbuch, Bonn 2004."},{"key":"156_CR4","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): Leitfaden IT-Sicherheit. Bundesamt f\u00fcr Informationssicherheit, Bonn, 2006."},{"key":"156_CR5","unstructured":"Bundesministerium der Finanzen (BMF): Grunds\u00e4tze ordnungsm\u00e4\u00dfiger DV-gest\u00fctzter Buchf\u00fchrungssysteme (GoBS). Anlage zum BMFSchreiben vom 07.11.1995, IV A 8-S 0316-52\/95-BStBl 1995."},{"key":"156_CR6","unstructured":"European co-operation for Accreditation EA-7\/03: Guidelines for the Accreditation of Bodies Operating Certification \/ Registration of Information Security Systems, February 2000."},{"key":"156_CR7","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/s11623-006-0092-7","volume":"30","author":"D. Fox","year":"2006","unstructured":"Fox, D: Interne Revision. In DuD 30 (2006), S. 308.","journal-title":"DuD"},{"key":"156_CR8","doi-asserted-by":"crossref","unstructured":"Gordon, L. A. und Loeb, M.P.: The economics of information security investment. In: ACM Transactions on Information and System Security (5), November 2002, S. 438\u2013457.","DOI":"10.1145\/581271.581274"},{"key":"156_CR9","unstructured":"IDW Pr\u00fcfungsstandard \u2014 Abschlu\u00dfpr\u00fcfung bei Einsatz von Informationstechnologie (IDW PS 330) vom 24.9.2002."},{"key":"156_CR10","unstructured":"IDW Pr\u00fcfungsstandard: Das interne Kontroll-system im Rahmen der Abschlu\u00dfpr\u00fcfung (IDW PS 260) vom 2.7.2001."},{"key":"156_CR11","unstructured":"IDW Stellungnahme zur Rechnungslegung \u2014 Grunds\u00e4tze ordnungsm\u00e4\u00dfiger Buchf\u00fchrung bei Einsatz von Informationstechnologie (IDW RS FAIT 1) vom 24.09.2002."},{"key":"156_CR12","first-page":"2461","volume":"47","author":"S. Krey","year":"2001","unstructured":"Krey, S.: Qualit\u00e4tssicherung in der Internen Revision. In Der Betrieb, 47 (23.11.2001), 2001, S. 2461\u20132464.","journal-title":"Der Betrieb"},{"key":"156_CR13","volume-title":"Handbuch f\u00fcr die Unternehmenspraxis","author":"G. W\u00e4hner","year":"2002","unstructured":"W\u00e4hner, G.: DV-Revision. Handbuch f\u00fcr die Unternehmenspraxis. Kiehl Verlag, Ludwigshafen 2002."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0156-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-007-0156-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0156-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:08:24Z","timestamp":1559398104000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-007-0156-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,5]]},"references-count":13,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2007,5]]}},"alternative-id":["156"],"URL":"https:\/\/doi.org\/10.1007\/s11623-007-0156-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,5]]}}}