{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T12:47:02Z","timestamp":1772801222458,"version":"3.50.1"},"reference-count":8,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2005,7]]},"DOI":"10.1108\/09685220510602031","type":"journal-article","created":{"date-parts":[[2005,6,22]],"date-time":"2005-06-22T02:12:51Z","timestamp":1119406371000},"page":"212-234","source":"Crossref","is-referenced-by-count":35,"title":["Dynamic risk management system for the modeling, optimal adaptation and implementation of an ERP system"],"prefix":"10.1108","volume":"13","author":[{"given":"Ioannis","family":"Zafeiropoulos","sequence":"first","affiliation":[]},{"given":"Kostas","family":"Metaxiotis","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Askounis","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"p_1","volume-title":"Goal-directed Project Management: Effective Techniques and Strategies","author":"Anderson E.S.","year":"1995","edition":"2"},{"key":"p_2","volume-title":"The Project Manager's Portable Handbook","author":"Cleland D.I.","year":"2000"},{"key":"p_3","volume-title":"Universal Risk Project: Final Report","author":"Hall D.","year":"2002"},{"key":"p_4","volume-title":"Essentials of Management Information Systems","author":"Laudon K.","year":"1999","edition":"3"},{"key":"p_5","volume-title":"PMBOK Guide","author":"Project Management Institute","year":"2000"},{"key":"p_6","volume-title":"Active Server Pages 3: Developer's Guide","author":"Ricard A.","year":"2000"},{"key":"p_7","volume-title":"Business Risk Management","author":"Ritchie R.","year":"1993"},{"key":"p_8","volume-title":"SAP White Paper, available at: www. digitalglobalsoft.com\/services\/whitepapers\/asap-change-management-whitepaper.htm","author":"White Paper","year":"2003"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510602031","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220510602031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:54Z","timestamp":1753402134000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/13\/3\/212-234\/183414"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,7]]},"references-count":8,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["10.1108\/09685220510602031"],"URL":"https:\/\/doi.org\/10.1108\/09685220510602031","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[2005,7]]}}}