{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T02:14:23Z","timestamp":1767665663893},"reference-count":18,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1987,8,1]],"date-time":"1987-08-01T00:00:00Z","timestamp":554774400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information &amp; Management"],"published-print":{"date-parts":[[1987,8]]},"DOI":"10.1016\/0378-7206(87)90028-0","type":"journal-article","created":{"date-parts":[[2002,10,7]],"date-time":"2002-10-07T15:38:56Z","timestamp":1034005136000},"page":"33-41","source":"Crossref","is-referenced-by-count":7,"title":["Security and integrity controls for microcomputers: A summary analysis"],"prefix":"10.1016","volume":"13","author":[{"given":"J.L.","family":"Boockholdt","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0378-7206(87)90028-0_BIB1","first-page":"48","article-title":"Microcomputers: Successful Management and Control","author":"Backes","year":"1983","journal-title":"Management Accounting"},{"key":"10.1016\/0378-7206(87)90028-0_BIB2","first-page":"16","article-title":"Microcomputer Software: Who Uses What?","author":"Conners","year":"1984","journal-title":"Management Accounting"},{"key":"10.1016\/0378-7206(87)90028-0_BIB3","first-page":"23","article-title":"Auditing a PC \u2014 It's Not So Difficult","volume":"Volume I","author":"DiPerna","year":"1985","journal-title":"EDP Auditor"},{"key":"10.1016\/0378-7206(87)90028-0_BIB4","first-page":"39","article-title":"Conversion Technology, an Assessment","author":"Fry","year":"1981","journal-title":"Database"},{"key":"10.1016\/0378-7206(87)90028-0_BIB5","first-page":"18","article-title":"Microcomputer Use of Mainframe Databases","author":"Lehman","year":"1986","journal-title":"Journal of Systems Management"},{"key":"10.1016\/0378-7206(87)90028-0_BIB6","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/07399018608965222","article-title":"Approaches to End-User Computing: Service May Spell Success","author":"Leitheiser","year":"1986","journal-title":"Journal of Information System Management"},{"key":"10.1016\/0378-7206(87)90028-0_BIB7","first-page":"39","article-title":"Do you Have to be a Whiz Kid to Audit Data Security?","volume":"Volume II","author":"Mille","year":"1986","journal-title":"EDP Auditor"},{"key":"10.1016\/0378-7206(87)90028-0_BIB8","first-page":"43","article-title":"Identifying Microcomputer Concerns","volume":"Volume I","author":"Opliger","year":"1985","journal-title":"EDP Auditor"},{"key":"10.1016\/0378-7206(87)90028-0_BIB9","first-page":"36","article-title":"The Value of Information and Its Relationship to Microcomputers and Data Base","volume":"Volume II","author":"Reimel","year":"1985","journal-title":"EDP Auditor"},{"key":"10.1016\/0378-7206(87)90028-0_BIB10","first-page":"5","article-title":"Microcomputer Control Strategy: An Empirical Study of its Development","volume":"Volume II","author":"Schultz","year":"1985","journal-title":"EDP Auditor"},{"key":"10.1016\/0378-7206(87)90028-0_BIB11","first-page":"49","article-title":"Microcomputer Spreadsheets: A Case for Controls","author":"Schultz","year":"1986","journal-title":"Internal Auditor"},{"key":"10.1016\/0378-7206(87)90028-0_BIB12","first-page":"5","article-title":"A Survey of Microcomputer Control and Support Policies","volume":"Volume I","author":"Schultz","year":"1985","journal-title":"EDP Auditor"},{"key":"10.1016\/0378-7206(87)90028-0_BIB13","first-page":"31","article-title":"The Impact of Microcomputers on the Internal Audit Function","volume":"Volume II","author":"Shue","year":"1986","journal-title":"EDP Auditor"},{"key":"10.1016\/0378-7206(87)90028-0_BIB14","first-page":"23","article-title":"Technology: How Is It Changing the CFO's Job?","author":"Skinner","year":"1986","journal-title":"FE Magazine"},{"key":"10.1016\/0378-7206(87)90028-0_BIB15","first-page":"27","article-title":"Auditing Microcomputer-Based Application Systems","volume":"Volume I","author":"Snow","year":"1985","journal-title":"EDP Auditor"},{"key":"10.1016\/0378-7206(87)90028-0_BIB16","first-page":"1","article-title":"Taming the Micro Revolution: The Need for Policy","volume":"Volume II","author":"Snow","year":"1985","journal-title":"EDP Auditor"},{"key":"10.1016\/0378-7206(87)90028-0_BIB17","first-page":"37","article-title":"Microcomputers & Auditing \u2014 Don't Make the Same Mistake Four Times","volume":"Volume I","author":"Sobol","year":"1985","journal-title":"EDP Auditor"},{"key":"10.1016\/0378-7206(87)90028-0_BIB18","first-page":"20","article-title":"Internal Controls for Small Business Computer Systems","volume":"Volume II","author":"Stivers","year":"1985","journal-title":"EDP Auditor"}],"container-title":["Information &amp; Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0378720687900280?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0378720687900280?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T21:58:07Z","timestamp":1554933487000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0378720687900280"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987,8]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1987,8]]}},"alternative-id":["0378720687900280"],"URL":"https:\/\/doi.org\/10.1016\/0378-7206(87)90028-0","relation":{},"ISSN":["0378-7206"],"issn-type":[{"value":"0378-7206","type":"print"}],"subject":[],"published":{"date-parts":[[1987,8]]}}}