{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:33:00Z","timestamp":1759991580423},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/eurocon.2011.5929270","type":"proceedings-article","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T20:57:43Z","timestamp":1309294663000},"page":"1-4","source":"Crossref","is-referenced-by-count":3,"title":["Long-term security of digital information: Assessment through risk management and Enterprise Architecture"],"prefix":"10.1109","author":[{"given":"J.","family":"Barateiro","sequence":"first","affiliation":[]},{"given":"G.","family":"Antunes","sequence":"additional","affiliation":[]},{"given":"J.","family":"Borbinha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Risk and Insurance Management Society Executive Report on Enterprise Risk Management Technology Solutions","year":"2009","author":"thoits","key":"ref10"},{"journal-title":"Risk Management - Vocabulary - Guidelines for Use in Standards","year":"0","key":"ref11"},{"journal-title":"TOGAF Version 9","year":"2009","key":"ref12"},{"journal-title":"(2007) The Digital Repository Audit Method Based on Risk Assessment (DRAMBORA)","year":"2007","author":"mchugh","key":"ref13"},{"key":"ref14","article-title":"A Reference Architecture for Digital Preservation","author":"antunes","year":"0","journal-title":"iPRES 2010&#x2013;7th International Conference on Preservation of Digital Objects"},{"journal-title":"Information Security Risk Management","year":"0","key":"ref15"},{"journal-title":"A Risk Management Standard","year":"2002","key":"ref4"},{"journal-title":"Code of Practice for Information Security Management","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-30"},{"journal-title":"Risk Management Principles and Guidelines","year":"0","key":"ref5"},{"journal-title":"The Ten Most Critical Web Application Security Risks","year":"2010","key":"ref8"},{"journal-title":"Information Security Management Systems - Requirements","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2218\/ijdc.v5i1.140"},{"journal-title":"Consultative Committee on Space Data Systems Reference model for an open archival information system (OAIS)","year":"0","key":"ref1"},{"journal-title":"Risk Assessment Techniques","year":"0","key":"ref9"}],"event":{"name":"IEEE EUROCON 2011 - International Conference on Computer as a Tool","start":{"date-parts":[[2011,4,27]]},"location":"Lisbon","end":{"date-parts":[[2011,4,29]]}},"container-title":["2011 IEEE EUROCON - International Conference on Computer as a Tool"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5876183\/5929030\/05929270.pdf?arnumber=5929270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:01:01Z","timestamp":1490090461000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5929270\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/eurocon.2011.5929270","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}