{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T09:32:46Z","timestamp":1649064766374},"reference-count":8,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"5","license":[{"start":{"date-parts":[[2016,8,18]],"date-time":"2016-08-18T00:00:00Z","timestamp":1471478400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1365\/s40702-016-0252-7","type":"journal-article","created":{"date-parts":[[2016,8,18]],"date-time":"2016-08-18T13:55:24Z","timestamp":1471528524000},"page":"674-687","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Analyse von Risikomanagementstrategien in Cloudnetzwerken \u2013 Was tun bei verkn\u00fcpften, voneinander abh\u00e4ngigen Cloud Services?"],"prefix":"10.1365","volume":"53","author":[{"given":"Robert","family":"Keller","sequence":"first","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2016,8,18]]},"reference":[{"issue":"3","key":"252_CR1","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/BF03372878","volume":"65","author":"G Fridgen","year":"2013","unstructured":"Fridgen G, K\u00f6nig C, Mette P, Rathgeber A (2013) Die Absicherung von Rohstoffrisiken \u2013 Eine Disziplinen \u00fcbergreifende Herausforderung f\u00fcr Unternehmen. Schmalenbachs Z Betriebswirtsch Forsch 65(3):167\u2013190","journal-title":"Schmalenbachs Z Betriebswirtsch Forsch"},{"issue":"5","key":"252_CR2","doi-asserted-by":"crossref","first-page":"1629","DOI":"10.1111\/j.1540-6261.1993.tb05123.x","volume":"48","author":"K Froot","year":"1993","unstructured":"Froot K, Scharfstein D, Stein J (1993) Risk management: coordinating cooperate investment and financing policies. J\u00a0Finance 48(5):1629\u20131658","journal-title":"J Finance"},{"issue":"1","key":"252_CR3","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/S0925-5273(01)00098-6","volume":"78","author":"J Hallikas","year":"2002","unstructured":"Hallikas J, Virolainen V, Tuominen M (2002) Risk analysis and assessment in network environments: a dyadic case study. Int J Prod Econ 78(1):45\u201355","journal-title":"Int J Prod Econ"},{"key":"252_CR4","volume-title":"A reference model to support risk identification in cloud networks, proceedings","author":"R Keller","year":"2014","unstructured":"Keller R, K\u00f6nig C (2014) A reference model to support risk identification in cloud networks, proceedings. 35th International Conference on Information Systems, Auckland"},{"key":"252_CR5","volume-title":"Multivendor portfolio strategies in cloud computing","author":"C K\u00f6nig","year":"2013","unstructured":"K\u00f6nig C, Mette P, M\u00fcller H (2013) Multivendor portfolio strategies in cloud computing. 21th European Conference on Information Systems, Utrecht"},{"issue":"5","key":"252_CR6","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1108\/02635570510599940","volume":"105","author":"M Tafti","year":"2005","unstructured":"Tafti M (2005) Risks factors associated with offshore IT outsourcing. Ind Manage Data Syst 105(5):549\u2013560","journal-title":"Ind Manage Data Syst"},{"key":"252_CR7","doi-asserted-by":"crossref","DOI":"10.1109\/CIT.2010.501","volume-title":"Information security risk management framework for the cloud computing environments, proceedings","author":"X Zhang","year":"2010","unstructured":"Zhang X, Wuwong N, Li H, Zhang X (2010) Information security risk management framework for the cloud computing environments, proceedings. 10th International Conference on Computer and Information Technology, Bradford"},{"issue":"3","key":"252_CR8","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583\u2013592","journal-title":"Future Gener Comput Syst"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-016-0252-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s40702-016-0252-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-016-0252-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:57:10Z","timestamp":1498337830000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s40702-016-0252-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,18]]},"references-count":8,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["252"],"URL":"https:\/\/doi.org\/10.1365\/s40702-016-0252-7","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,18]]}}}