{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T20:04:45Z","timestamp":1648670685201},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1007\/s11623-011-0014-1","type":"journal-article","created":{"date-parts":[[2011,3,8]],"date-time":"2011-03-08T08:54:18Z","timestamp":1299574458000},"page":"50-55","source":"Crossref","is-referenced-by-count":0,"title":["Betriebswirtschaftliche Bewertung von Security Investments in der Praxis"],"prefix":"10.1007","volume":"35","author":[{"given":"Dirk","family":"Fox","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,3,8]]},"reference":[{"key":"14_CR1","unstructured":"Berinato, Scott: Finally, a Real Return on security Spending. CIO Magazine, 08.04.2002."},{"key":"14_CR2","unstructured":"Government Chief Information Office: A Guide for Government Agencies Calculation Return on Security Investment. New South Wales Government, Department of Commerce; Version 2.0, 13.06.2006. \n                    http:\/\/www.gcio.nsw.gov.au\/publications\/Lockstep_ROSI_Guideline_SGW_282_2_29.pdf"},{"key":"14_CR3","unstructured":"Hoo, Kevin J. Soo: How Much Is Enough? A Risk-Management Approach to Computer Security. Working Paper, CRISP, Stanford University, June 2000. \n                    http:\/\/iis-db.stanford.edu\/pubs\/11900\/soohoo.pdf"},{"key":"14_CR4","unstructured":"Mizzi, Adrian: Return on Information Security Investment \u2014 Are you spending enough? Are you spending too much? Januar 2005."},{"key":"14_CR5","unstructured":"M\u00f6ricke, Michael; Teufel, Stephanie (Hrsg.): Kosten & Nutzen von IT-Sicher-heit. Praxis der Wirtschaftsinformatik, HMD Heft 248, April 2006, dpunkt.verlag 2006."},{"key":"14_CR6","series-title":"Lecture Notes in Informatics","first-page":"15","volume-title":"Sicherheit 2005","author":"T. Nowey","year":"2005","unstructured":"Nowey, Thomas; Federrath, Hannes; Klein, Christian; Pl\u00f6\u00dfl, Klaus: Ans\u00e4tze zur Evaluierung von Sicherheitsinvestitionen. In: Sicherheit 2005. Lecture Notes in Informatics, P-62, K\u00f6llen-Verlag, Bonn 2005, S. 15\u201326. \n                    http:\/\/www-sec.uni-regensburg.de\/publ\/2005\/Si2005NFKP2005Sicherheitsinvestitionen.pdf"},{"key":"14_CR7","unstructured":"National Institute of Standards and Technology (NIST): Guideline for Automatic Data Processing Risk Analysis. FIPS PUB 65, 01.08.1979 (zur\u00fcckgezogen am 25.08.1995)."},{"issue":"1","key":"14_CR8","first-page":"55","volume":"38","author":"W. Sonnenreich","year":"2006","unstructured":"Sonnenreich, Wes; Albanese, Jason; Stout, Bruce: Return On Security Investment (ROSI) \u2014 A Practical Quantitative Model. Journal of Research and Practice in Information Technology, Vol. 38, No. 1, February 2006, S. 55\u201366.","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"14_CR9","unstructured":"Wei, Huaqiang; Frinke, Deborah et.al.: Cost-Benefit Analysis for Network Intrusion Detection Systems. In: Proceedings of the 28th Annaul Computer Security Conference October 2001."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0014-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0014-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0014-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0014-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:21:01Z","timestamp":1559413261000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0014-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["14"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0014-1","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1]]}}}