{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:06:56Z","timestamp":1725458816114},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/melcon.2012.6196521","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T18:27:29Z","timestamp":1337884049000},"page":"673-676","source":"Crossref","is-referenced-by-count":1,"title":["Managing risk data: From spreadsheets to information systems"],"prefix":"10.1109","author":[{"given":"Jose","family":"Barateiro","sequence":"first","affiliation":[]},{"given":"Jose","family":"Borbinha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Database Management Systems","year":"2000","author":"ramakrishnan","key":"17"},{"journal-title":"Information Technology - Metadata Registries (MDR) - Part 1 Framework","year":"2004","key":"18"},{"key":"15","article-title":"Analyze system safety using UML within IBM Rational Rhapsody environment. Safety Analysis using UML","author":"douglass","year":"2009","journal-title":"IBM Tech Rep"},{"key":"16","article-title":"Integrated management of risk information","author":"barateiro","year":"0","journal-title":"IEEE Federated Conference of Computer Science and Information Systems Szczecin Poland September 2011"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2010.2045777"},{"journal-title":"Business Process Modeling Notation","year":"2008","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/sys.20054"},{"journal-title":"Information Integration for Concurrent Engineering (IICE) IDEF3 process description capture method report","year":"1993","author":"mayer","key":"12"},{"journal-title":"DoD Military Standard Procedures for Performing A Failure Mode Effects and Critical Analysis (MIL-STD-1692A)","year":"1980","key":"3"},{"journal-title":"Fault Tree Handbook with Aerospace Applications","year":"2002","author":"stamatelatos","key":"2"},{"journal-title":"Capability Mautiry Model Integration for Development","year":"2010","key":"1"},{"journal-title":"How to Survive in the Jungle of Enterprise Architecture Frameworks Creating or Choosing an Enterprise Architecture Framework","year":"2006","author":"schekkerman","key":"10"},{"journal-title":"IEEE Standard Computer Dictionary A Compilation of IEEE Standard Computer Glossaries","year":"1990","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1108\/14637150210418629"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1996.491438"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(93)90021-G"},{"journal-title":"Executive Report on Enterprise Risk Management Technology Solutions","year":"2009","author":"thoits","key":"9"},{"key":"8","article-title":"Risk management: Protect and maximize stakeholder value","author":"maziol","year":"2009","journal-title":"Oracle Governance Risk and Compliance"}],"event":{"name":"MELECON 2012 - 2012 16th IEEE Mediterranean Electrotechnical Conference","start":{"date-parts":[[2012,3,25]]},"location":"Yasmine Hammamet, Tunisia","end":{"date-parts":[[2012,3,28]]}},"container-title":["2012 16th IEEE Mediterranean Electrotechnical Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6191396\/6196362\/06196521.pdf?arnumber=6196521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T13:58:27Z","timestamp":1490104707000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6196521\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/melcon.2012.6196521","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}