{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T23:32:23Z","timestamp":1648942343147},"reference-count":37,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"5","license":[{"start":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T00:00:00Z","timestamp":1536192000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1365\/s40702-018-00460-y","type":"journal-article","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T14:34:00Z","timestamp":1536244440000},"page":"964-983","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unternehmensarchitekturen aus Sicht von IT-Risikomanagement und IT-Revision"],"prefix":"10.1365","volume":"55","author":[{"given":"Matthias","family":"Knoll","sequence":"first","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2018,9,6]]},"reference":[{"key":"460_CR1","volume-title":"Predictive Maintenance \u2013 Service der Zukunft \u2013 und wo er wirklich steht","year":"2017","unstructured":"Berger R (Hrsg) (2017) Predictive Maintenance \u2013 Service der Zukunft \u2013 und wo er wirklich steht. \n                    https:\/\/www.rolandberger.com\/de\/Publications\/pub_predictive_maintenance_2017.html\n                    \n                  . Zugegriffen: 24.\u00a0Aug. 2018"},{"key":"460_CR2","volume-title":"Architekturen, Standards und Methoden","author":"CIO des Bundes","year":"2017","unstructured":"CIO des Bundes (2017) Architekturen, Standards und Methoden. \n                    https:\/\/www.cio.bund.de\/Web\/DE\/Architekturen-und-Standards\/architekturen_standards_node.html;jsessionid=9F7F669BB20E27BDAD0AF1A55944ADED.2_cid332\n                    \n                  . Zugegriffen: 22. Juni 2018"},{"key":"460_CR3","volume-title":"RestAssured","author":"CORDIS","year":"2018","unstructured":"CORDIS (2018) RestAssured. \n                    https:\/\/cordis.europa.eu\/project\/rcn\/206344_en.html\n                    \n                  . Zugegriffen: 22. Juni 2018"},{"key":"460_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-9614-8","volume-title":"Management von IT-Architekturen \u2013 Leitlinien f\u00fcr die Ausrichtung, Planung und Gestaltung von Informationssystemen","author":"G Dern","year":"2009","unstructured":"Dern G (2009) Management von IT-Architekturen \u2013 Leitlinien f\u00fcr die Ausrichtung, Planung und Gestaltung von Informationssystemen, 3.\u00a0Aufl. Springer Vieweg, Wiesbaden \n                    https:\/\/doi.org\/10.1007\/978-3-8348-9614-8","edition":"3"},{"key":"460_CR5","unstructured":"DIIR (o.J.) \n                    www.diir.de\/fileadmin\/fachwissen\/revisionshandbuch-marisk.pdf\n                    \n                  . Zugegriffen: 22.\u00a0Juni 2018"},{"key":"460_CR6","volume-title":"DIIR Standards","author":"DIIR","year":"2018","unstructured":"DIIR (2018) DIIR Standards. \n                    https:\/\/www.diir.de\/fachwissen\/standards\n                    \n                  . Zugegriffen: 29. Juni 2018"},{"key":"460_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-02808-4_2","volume-title":"Audit, continuous audit, monitoring und revision. In: IT-revision, IT-audit und IT-compliance","author":"P Duscha","year":"2015","unstructured":"Duscha P (2015) Audit, continuous audit, monitoring und revision. In: IT-revision, IT-audit und IT-compliance. Springer Vieweg, Wiesbaden \n                    https:\/\/doi.org\/10.1007\/978-3-658-02808-4_2"},{"key":"460_CR9","volume-title":"An Introduction to Information System Risk Management","author":"S Elky","year":"2007","unstructured":"Elky S (2007) An Introduction to Information System Risk Management. SANS Institute, Swansea"},{"key":"460_CR8","volume-title":"Risiko-Kultur \u2013 Risikomanagement \u2013 nur eine Alibifunktion? RiskNews 2005","author":"RF Erben","year":"2005","unstructured":"Erben RF, Romeike F (2005) Risiko-Kultur \u2013 Risikomanagement \u2013 nur eine Alibifunktion? RiskNews 2005. \n                    https:\/\/www.risknet.de\/uploads\/tx_bxelibrary\/Risikokultur-Erben-Romeike-RISKNEWS-2005.pdf\n                    \n                  . Zugegriffen: 22. Juni 2018"},{"key":"460_CR10","first-page":"55","volume":"2\/2012","author":"M Eulerich","year":"2012","unstructured":"Eulerich M (2012) Das three-lines-of-defence-modell. Z\u00a0Intern Rev 2\/2012:55\u201360","journal-title":"Z Intern Rev"},{"key":"460_CR11","volume-title":"Architekturen 2018 \u2013 Jahrestagung der GI-Fachgruppe Architekturen","author":"GI-FG Architektur","year":"2018","unstructured":"GI-FG Architektur (2018) Architekturen 2018 \u2013 Jahrestagung der GI-Fachgruppe Architekturen. \n                    https:\/\/architekturen2018.paluno.uni-due.de\n                    \n                  . Zugegriffen: 28. Juni 2018"},{"key":"460_CR12","doi-asserted-by":"publisher","DOI":"10.3139\/9783446449350","volume-title":"Enterprise architecture management","author":"I Hanschke","year":"2016","unstructured":"Hanschke I (2016) Enterprise architecture management, 2.\u00a0Aufl. Hanser, M\u00fcnchen \n                    https:\/\/doi.org\/10.3139\/9783446449350","edition":"2"},{"issue":"2","key":"460_CR13","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s35764-017-0027-0","volume":"2017","author":"I Hanschke","year":"2017","unstructured":"Hanschke I (2017) Wirtschaftsinform Manag 2017(2):8\u201319. \n                    https:\/\/doi.org\/10.1007\/s35764-017-0027-0","journal-title":"Wirtschaftsinform Manag"},{"key":"460_CR14","volume-title":"The definitive handbook of business continuity management","author":"AN Hiles","year":"2010","unstructured":"Hiles AN (2010) The definitive handbook of business continuity management, 3.\u00a0Aufl. John Wiley & Sons, Hoboken","edition":"3"},{"key":"460_CR15","volume-title":"IDW Verlautbarungen","author":"IDW","year":"2018","unstructured":"IDW (2018) IDW Verlautbarungen. \n                    https:\/\/www.idw.de\/idw\/verlautbarungen\n                    \n                  . Zugegriffen: 29. Juni 2018"},{"key":"460_CR37","unstructured":"ISACA (2012) COBIT 5, ISACA, Rolling Meadows"},{"key":"460_CR16","volume-title":"Information technology assurance framework","author":"ISACA","year":"2013","unstructured":"ISACA (2013) Information technology assurance framework, 2.\u00a0Aufl. ISACA, Rolling Meadows","edition":"2"},{"key":"460_CR20","volume-title":"ISACA-Standards","author":"ISACA","year":"2018","unstructured":"ISACA (2018) ISACA-Standards. \n                    http:\/\/www.isaca.org\/Knowledge-Center\/ITAF-IS-Assurance-Audit-\/IS-Audit-and-Assurance\/Pages\/ObjectivesScopeandAuthorityofITAudit.aspx\n                    \n                  . Zugegriffen: 29. Juni 2018"},{"key":"460_CR18","volume-title":"Grundlagen der IT-Revision f\u00fcr den Einstieg in die Praxis","author":"ISACA","year":"2016","unstructured":"ISACA, FG IT-Revision (2016) Grundlagen der IT-Revision f\u00fcr den Einstieg in die Praxis. ISACA Germany Chapter, Frankfurt, Berlin"},{"key":"460_CR17","volume-title":"ISO\/IEC\/IEEE 42010:2011 Systems and software engineering\u2014Architecture description","author":"ISO","year":"2011","unstructured":"ISO (2011) ISO\/IEC\/IEEE 42010:2011 Systems and software engineering\u2014Architecture description"},{"key":"460_CR21","unstructured":"ISO (2013) IEC 62264-1:2013 Enterprise-control system integration\u2014Part 1: Models and terminology"},{"key":"460_CR34","unstructured":"ISO (2018) ISO 31000:2018 Risk management \u2013 Guidelines"},{"key":"460_CR22","volume-title":"IT-Unternehmensarchitektur","author":"W Keller","year":"2017","unstructured":"Keller W (2017) IT-Unternehmensarchitektur, 3.\u00a0Aufl. dpunkt, Heidelberg","edition":"3"},{"key":"460_CR23","volume-title":"Praxisorientiertes IT-Risikomanagement","author":"M Knoll","year":"2014","unstructured":"Knoll M (2014) Praxisorientiertes IT-Risikomanagement. dpunkt, Heidelberg"},{"key":"460_CR35","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1365\/s40702-017-0287-4","volume":"313","author":"M Knoll","year":"2017","unstructured":"Knoll M (2017) IT-Risikomanagement im Zeitalter der Digitalisierung. HMD 313:4\u201320","journal-title":"HMD"},{"key":"460_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-12004-7","volume-title":"IT-Risikomanagement mit System","author":"H-P K\u00f6nigs","year":"2017","unstructured":"K\u00f6nigs H\u2011P (2017) IT-Risikomanagement mit System, 5.\u00a0Aufl. Springer, Wiesbaden","edition":"5"},{"key":"460_CR99","doi-asserted-by":"publisher","DOI":"10.1365\/s40702-018-00449-7","author":"H Ko\u00e7","year":"2018","unstructured":"Ko\u00e7 H, Eckert K, Flaig D (2018) Datenschutzgrundverordnung (DSGVO): Bew\u00e4ltigung der Herausforderungen mit Unternehmensarchitekturmanagement (EAM). HMD Praxis der Wirtschaftsinformatik. \n                    https:\/\/doi.org\/10.1365\/s40702-018-00449-7","journal-title":"HMD Praxis der Wirtschaftsinformatik"},{"key":"460_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79261-1","volume-title":"The making of information systems","author":"KE Kurbel","year":"2008","unstructured":"Kurbel KE (2008) Information systems architecture. In: The making of information systems. Springer, Berlin, Heidelberg"},{"key":"460_CR26","volume-title":"Complete guide to predictive and predictive maintenance","author":"J Levitt","year":"2011","unstructured":"Levitt J (2011) Complete guide to predictive and predictive maintenance, 2.\u00a0Aufl. Industrial Press, New York","edition":"2"},{"key":"460_CR27","volume-title":"Langlebige Software-Architekturen","author":"C Lilienthal","year":"2017","unstructured":"Lilienthal C (2017) Langlebige Software-Architekturen, 2.\u00a0Aufl. dpunkt, Heidelberg","edition":"2"},{"key":"460_CR28","volume-title":"Moderne Enterprise Architekturen","author":"D Masak","year":"2005","unstructured":"Masak D (2005) Systemarchitektur. In: Moderne Enterprise Architekturen. Xpert.press. Springer, Berlin, Heidelberg"},{"key":"460_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8274-2550-8","volume-title":"Service-orientierte Architektur. In: Service-orientierte Architekturen mit Web Services","author":"I Melzer","year":"2010","unstructured":"Melzer I (2010) Service-orientierte Architektur. In: Service-orientierte Architekturen mit Web Services. Spektrum Akademischer Verlag, Heidelberg \n                    https:\/\/doi.org\/10.1007\/978-3-8274-2550-8_2"},{"key":"460_CR36","volume-title":"SP 800-39 Managing Information Security Risk: Organization, Mission, and Information System View","author":"NIST","year":"2011","unstructured":"NIST (2011) SP 800-39 Managing Information Security Risk: Organization, Mission, and Information System View. NIST special publication, Gaithersburg"},{"key":"460_CR30","volume-title":"RestAssured","author":"K Pohl","year":"2018","unstructured":"Pohl K (2018) RestAssured. \n                    https:\/\/sse.uni-due.de\/forschung\/projekte\/restassured\n                    \n                  . Zugegriffen: 22. Juni 2018"},{"key":"460_CR31","unstructured":"TOGAF (2018) \n                    www.opengroup.org\/subjectareas\/enterprise\/togaf\n                    \n                  . Zugegriffen: 22. Juni 2018"},{"key":"460_CR32","volume-title":"Agile audit of agile projects","author":"C Wright","year":"2018","unstructured":"Wright C (2018) Agile audit of agile projects. \n                    http:\/\/www.accaglobal.com\/lk\/en\/member\/discover\/cpd-articles\/audit-assurance\/agile-audit-of-agile-projects.html\n                    \n                  . Zugegriffen: 28. Juni 2018"},{"issue":"3","key":"460_CR33","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1147\/sj.263.0276","volume":"26","author":"J Zachman","year":"1987","unstructured":"Zachman J (1987) A framework for information systems architecture. IBM Syst\u00a0J 26(3):277\u2013293","journal-title":"IBM Syst J"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s40702-018-00460-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-018-00460-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-018-00460-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T13:09:15Z","timestamp":1567775355000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s40702-018-00460-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,6]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["460"],"URL":"https:\/\/doi.org\/10.1365\/s40702-018-00460-y","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,6]]},"assertion":[{"value":"29 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}