{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:34:59Z","timestamp":1725597299313},"reference-count":16,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[1991,11,1]],"date-time":"1991-11-01T00:00:00Z","timestamp":688953600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1991,11]]},"DOI":"10.1016\/0167-4048(91)90117-v","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T12:25:29Z","timestamp":1034339129000},"page":"601-610","source":"Crossref","is-referenced-by-count":1,"title":["European unification '92 impacts on information security"],"prefix":"10.1016","volume":"10","author":[{"given":"Sanford","family":"Sherizen","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"90","key":"10.1016\/0167-4048(91)90117-V_BIB1","article-title":"Proposal for a Decision of the Council in the field of Information security (INFOSEC)","author":"Commission of the European Communities","year":"1990","journal-title":"Communication of the Commission to the Council and the European Parliament"},{"key":"10.1016\/0167-4048(91)90117-V_BIB2","unstructured":"Adapted from the U.S. Department of Commerce, List of European Community 1992 Directives and Proposals, and various other publications from the Single Internal Market Information Service, International Trade Administration, U.S. Department of Commerce, various dates."},{"key":"10.1016\/0167-4048(91)90117-V_BIB3_1","first-page":"1","article-title":"European banking integration in 1992: the competitive challenges facing U.S. multinational banks","author":"Hanley","year":"1989"},{"key":"10.1016\/0167-4048(91)90117-V_BIB12_1","first-page":"11","year":"1989","journal-title":"European Banker"},{"key":"10.1016\/0167-4048(91)90117-V_BIB12_2","year":"1989","journal-title":"The European Financial Common Market"},{"key":"10.1016\/0167-4048(91)90117-V_BIB4_1","series-title":"Critical connections: communications for the future","author":"U.S. Congress, Office of Technology Assessment","year":"1990"},{"key":"10.1016\/0167-4048(91)90117-V_BIB5","article-title":"Companies must wait until end of '92 to cash in on EC telecommunications","author":"Greiff","year":"1990","journal-title":"Wall Street J."},{"key":"10.1016\/0167-4048(91)90117-V_BIB6","first-page":"519","article-title":"Accounting and financial reporting in the European Community: quo vadis?","author":"van Hulle","year":"1989","journal-title":"Der Schwiezer Truehander"},{"key":"10.1016\/0167-4048(91)90117-V_BIB7_1","first-page":"A1","year":"1990","journal-title":"New York Times"},{"key":"10.1016\/0167-4048(91)90117-V_BIB7_2","first-page":"D24","year":"1990","journal-title":"New York Times"},{"key":"10.1016\/0167-4048(91)90117-V_BIB7_3","first-page":"44","article-title":"Are you ready for a new game plan?","author":"Sherizen","year":"1990","journal-title":"Bank Systems Technol."},{"key":"10.1016\/0167-4048(91)90117-V_BIB7_4","first-page":"45","article-title":"Are you ready for a new game plan?","author":"Sherizen","year":"1990","journal-title":"Bank Systems Technol."},{"issue":"90","key":"10.1016\/0167-4048(91)90117-V_BIB8","year":"1990","journal-title":"Proposal for a Council Directive on prevention of the financial system for the purpose of money laundering"},{"key":"10.1016\/0167-4048(91)90117-V_BIB9","first-page":"2","article-title":"EDI and banks: the old couple?","author":"Ledford","year":"1990","journal-title":"Electronic Payments Internat."},{"key":"10.1016\/0167-4048(91)90117-V_BIB10","article-title":"Telecommunicatons, Information Industries and Innovation","volume":"DG XIII","author":"Commission of the European Community","year":"1989","journal-title":"TEDIS Factsheet"},{"key":"10.1016\/0167-4048(91)90117-V_BIB11","first-page":"A9","year":"1990","journal-title":"Wall Street J."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489190117V?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489190117V?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T18:53:59Z","timestamp":1554922439000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016740489190117V"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,11]]},"references-count":16,"journal-issue":{"issue":"7","published-print":{"date-parts":[[1991,11]]}},"alternative-id":["016740489190117V"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(91)90117-v","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1991,11]]}}}