{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T21:47:50Z","timestamp":1649195270290},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2007,11,1]],"date-time":"2007-11-01T00:00:00Z","timestamp":1193875200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1007\/s11623-007-0268-9","type":"journal-article","created":{"date-parts":[[2007,11,20]],"date-time":"2007-11-20T02:40:39Z","timestamp":1195526439000},"page":"835-839","source":"Crossref","is-referenced-by-count":0,"title":["Pr\u00fcfung des IT-Sicherheitsmanagements (ISMS) bei Kreditinstituten"],"prefix":"10.1007","volume":"31","author":[{"given":"Aleksandra","family":"Sowa","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"268_CR1","unstructured":"BaFin: Mindestanforderungen an das Risikomanagement (MaRisk). Bundesanstalt f\u00fcr Finanzdienstleistungsaufischt (BaFin), Bonn, Rundschreiben 18\/2005 vom 20.12.2005."},{"key":"268_CR2","unstructured":"Bretz, J.: Gesetzliche und bankenaufsichtliche Anforderungen an die IT-Sicherheit, in: Finanz Colloquium Heidelberg, 2007, IT-Sicherheitsmanagement in Banken und Sparkassen, S. 3\u201353."},{"key":"268_CR3","unstructured":"BSI: IT-Grundschutzhandbuch. Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Bonn 2004."},{"key":"268_CR4","unstructured":"BSI: BSI-Standard 100-1. Management-systeme f\u00fcr Informationssicherheit (ISMS). Version 1.0. Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Bonn 2005."},{"key":"268_CR5","unstructured":"BSI: BSI-Standard 100-2. IT-Grundschutz-Vorgehensweise. Version 1.0. Bundesamt f\u00fcr Sicherit in der Informationstechnik (BSI), Bonn 2005."},{"key":"268_CR6","unstructured":"BSI: BSI Standart 100-3. Risikoanalyse auf der Basis von IT-Grundschutz. Version 2.0. Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Bonn 2005"},{"key":"268_CR7","unstructured":"BSI: Integration und IT-Revision von Netz\u00fcberg\u00e4ngen. Bonn 2006."},{"key":"268_CR8","volume-title":"IT-Auditing \u2014 Using Controls to Protect Information Assets","author":"C. Davis","year":"2007","unstructured":"Davis, C, Schiller, M, Wheeler, K.: IT-Auditing \u2014 Using Controls to Protect Information Assets. McGraw-Hill, New York 2007."},{"key":"268_CR9","unstructured":"European co-operation for Accreditation: Guidelines for the Accreditation of Bodies Operating Certification \/ Registration of Information Security Systems, EA-7\/03, February 2000."},{"key":"268_CR10","unstructured":"ENISA: A Users\u2019 Guide: How to Raise Information Security Awarenes. Deutsche Version: Leitfaden f\u00fcr die Praxis: Wege zu mehr Bewusstsein f\u00fcr Informationssicherheit. 2006. http:\/\/enisa.europa.eu\/doc\/pdf\/deliverable\/s\/WGAR\/guide_de.pdf"},{"key":"268_CR11","unstructured":"IDW: Pr\u00fcfungsstandard \u2014 Abschlusspr\u00fcfung bei Einsatz von Informationstechnologie. IDW PS 330, vom 24.9.2002."},{"key":"268_CR12","unstructured":"IDW: Stellungnahme zur Rechnungslegung \u2014 Grunds\u00e4tze ordnungsm\u00e4\u00dfiger Buchf\u00fchrung bei Einsatz von Informationstechnologie. IDW RS FAIT 1, vom 24.09.2002."},{"key":"268_CR13","unstructured":"IDW: Pr\u00fcfungsstandard \u2014 Pr\u00fcfungsnachweise im Rahmen der Abschlusspr\u00fcfung. IDW PS 300, vom 6.9.2006."},{"key":"268_CR14","unstructured":"Mohr, S.: Outsourcing nach Bankenart. In \u2329kes\u232a 2005\/6, S. 85\u201387."},{"key":"268_CR15","unstructured":"Peltier G: Risikoorientierte Pr\u00fcfung des IT-Sicherheitsmanagements. In Finanz Colloquium Heidelberg 2007, IT-Sicherheitsmanagement in Banken und Sparkassen, S. 249\u201390."},{"key":"268_CR16","first-page":"361","volume-title":"Managementhandbuch IT-Sicherheit","author":"E. Szivek","year":"2007","unstructured":"Szivek, E.: IT-Sicherheit und Basel II \u2014 Aufsichtsrechtliche Entwicklungen und Implikationen f\u00fcr das Unternehmensrating. In Gr\u00fcnder, T.; Schrey, J. (Hrsg.): Managementhandbuch IT-Sicherheit. Erich Schmidt Verlag, Berlin 2007, S. 361\u2013380."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0268-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-007-0268-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0268-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:26Z","timestamp":1559412506000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-007-0268-9"}},"subtitle":["Anforderungen an die IT-Compliance"],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":16,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2007,11]]}},"alternative-id":["268"],"URL":"https:\/\/doi.org\/10.1007\/s11623-007-0268-9","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,11]]}}}