{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T10:51:23Z","timestamp":1768474283360,"version":"3.49.0"},"reference-count":33,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Systems Management"],"published-print":{"date-parts":[[2021,4,3]]},"DOI":"10.1080\/10580530.2020.1738601","type":"journal-article","created":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T14:24:38Z","timestamp":1584541478000},"page":"94-115","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":6,"title":["Assessing Identity and Access Management Process Maturity: First Insights from the German Financial Sector"],"prefix":"10.1080","volume":"38","author":[{"given":"Andre","family":"Schrimpf","sequence":"first","affiliation":[{"name":"PricewaterhouseCoopers WPG GmbH, D\u00fcsseldorf, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7026-0241","authenticated-orcid":false,"given":"Andreas","family":"Drechsler","sequence":"additional","affiliation":[{"name":"School of Information Management, Victoria University of Wellington, Wellington, New Zealand"},{"name":"Institute of Computer Science and Business Information Systems, University Duisburg-Essen, Essen, Germany"}]},{"given":"Konstantinos","family":"Dagianis","sequence":"additional","affiliation":[{"name":"PricewaterhouseCoopers WPG GmbH, D\u00fcsseldorf, Germany"}]}],"member":"301","published-online":{"date-parts":[[2020,3,18]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.3.02"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-009-0044-5"},{"key":"cit0003","volume-title":"Identity management. concepts, technologies, and systems","author":"Bertino E.","year":"2011","edition":"1"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2014.01.003"},{"key":"cit0005","unstructured":"Bundesverband deutscher Banken e.V. (2014). Zahlen, Daten, Fakten der Kreditwirtschaft. Retrieved April 28, 2015, from https:\/\/bankenverband.de\/media\/publikationen\/zahlen-daten.pdf"},{"key":"cit0006","volume-title":"CMMI guidlines for process integration and product improvement","author":"Chrissis M. B.","year":"2003"},{"key":"cit0007","volume-title":"Proceedings of the 16th Australasian Conference on Information Systems","author":"De Bruin T.","year":"2005"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91800-6_6"},{"key":"cit0009","volume-title":"Identity and access management. Beyond compliance","author":"Ernst &amp; Young","year":"2013"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19050-6_7"},{"key":"cit0011","first-page":"244","volume-title":"2002 IEEE International Engineering Management Conference. Proceedings","volume":"1","author":"Fraser P.","year":"2002"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-531-91538-8"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.2.01"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.2307\/25148625"},{"key":"cit0015","volume-title":"IDW auditing standard: The audit of financial statements in an information technology environment (IDW AuS 330)","author":"IDW","year":"2013"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.35"},{"key":"cit0017","volume-title":"ISO\/IEC 27002:2013 Information technology\u2014Security techniques\u2014Code of practice for information security controls","author":"ISO\/IEC","year":"2013"},{"key":"cit0018","unstructured":"Kerschberg, B. (2011, July 12). Data security and identity access management. Forbes Media LLC. Retrieved April 15, 2014, from http:\/\/www.forbes.com\/sites\/benkerschberg\/2011\/12\/07\/data-security-and-identity-access-management\/"},{"key":"cit0019","unstructured":"Kuppinger, M. (2007). Identity management roadmap and maturity levels. Retrieved February 26, 2015, from https:\/\/www.id-conf.com\/files\/kuppingerroadmap.pdf"},{"key":"cit0020","volume-title":"The forrester identity management and governance maturity model","author":"Maxim M.","year":"2016"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSS.2011.038934"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1002\/9781118269138"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04420"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-016-0025-y"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"issue":"27","key":"cit0026","first-page":"505","volume":"29","author":"P\u00f6ppelbu\u00df J.","year":"2011","journal-title":"Communications of the Association for Information Systems"},{"key":"cit0027","volume-title":"Proceedings of the Nineteenth European Conference on Information Systems. Presented at the European Conference on Information Systems","author":"P\u00f6ppelbu\u00df J.","year":"2011"},{"key":"cit0028","unstructured":"PWC. (2018). The global state of information security survey 2018. PwC website. Retrieved January 11, 2019, from https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity\/library\/information-security-survey.html"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-012-0244-2"},{"key":"cit0030","unstructured":"Sayer, P. & Wailgum, T. (2008, April 17). What you can learn about risk management from Societe Generale. CIO website Retrieved July 7, 2017, from http:\/\/www.cio.com\/article\/2436790\/security0\/what-you-can-learn-about-risk-management-from-societe-generale.html"},{"key":"cit0031","first-page":"12","volume":"6","author":"Singleton T. W.","year":"2012","journal-title":"ISACA Journal"},{"key":"cit0032","volume-title":"ITIL service operation. 2011 edition","author":"Steinberg R. A.","year":"2011","edition":"2"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.36"}],"container-title":["Information Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10580530.2020.1738601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T07:54:46Z","timestamp":1640678086000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10580530.2020.1738601"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,18]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4,3]]}},"alternative-id":["10.1080\/10580530.2020.1738601"],"URL":"https:\/\/doi.org\/10.1080\/10580530.2020.1738601","relation":{},"ISSN":["1058-0530","1934-8703"],"issn-type":[{"value":"1058-0530","type":"print"},{"value":"1934-8703","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,18]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uism20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uism20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-03-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}