{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:25:28Z","timestamp":1740173128313,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"5","license":[{"start":{"date-parts":[[2018,5,24]],"date-time":"2018-05-24T00:00:00Z","timestamp":1527120000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1365\/s40702-018-0428-4","type":"journal-article","created":{"date-parts":[[2018,5,24]],"date-time":"2018-05-24T10:24:44Z","timestamp":1527157484000},"page":"1110-1127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Synergien bei der Implementierung des Kreditkartensicherheitsstandards PCI-DSS durch ISO\u00a02700x, ISO\u00a020000 und ITIL","Evolving Synergies for the Implementation of the Credit Card Security Standard PCI-DSS by using ISO\u00a02700x, ISO\u00a020000 and ITIL"],"prefix":"10.1365","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7777-9062","authenticated-orcid":false,"given":"Henrich","family":"Brandes","sequence":"first","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2018,5,24]]},"reference":[{"key":"428_CR1","unstructured":"Axelos (2013a) ITIL Service Transition. Ausgabe 2011, Adobe Digital Editions 2.0, TSO, Norwich"},{"key":"428_CR2","unstructured":"Axelos (2013b) ITIL Service Design. Ausgabe 2011, Adobe Digital Editions 2.0, TSO, Norwich"},{"key":"428_CR3","unstructured":"Axelos (2013c) ITIL Service Operation. Ausgabe 2011, Adobe Digital Editions 2.0, TSO, Norwich"},{"key":"428_CR4","unstructured":"Donoghue (2016) Australian PCI DSS project observations, tips and insights. \n                    http:\/\/ipsi.com.au\/australian-pci-dss-project-observations-tips-and-insights\/\n                    \n                  . Zugegriffen: 03. Feb. 2018"},{"key":"428_CR5","unstructured":"ECB (2017) Payment statistics for 2016, Press release, 15th Sept. 2017. \n                    https:\/\/www.ecb.europa.eu\/press\/pdf\/pis\/pis2016.pdf?be9989f6bd72483ebe27d8dfae1f0362\n                    \n                  . Zugegriffen: 30. Jan. 2018"},{"key":"428_CR6","doi-asserted-by":"publisher","DOI":"10.1515\/9783486859164","volume-title":"IT-Sicherheit: Konzepte \u2013 Verfahren \u2013 Protokolle","author":"C Eckert","year":"2014","unstructured":"Eckert C (2014) IT-Sicherheit: Konzepte \u2013 Verfahren \u2013 Protokolle, 9.\u00a0Aufl. Oldenbourg, M\u00fcnchen","edition":"9"},{"key":"428_CR13","unstructured":"ISO (2016) The ISO Survey of Management System Standard Certifications 2016, Sept. 2017. \n                    https:\/\/isotc.iso.org\/livelink\/livelink\/fetch\/-8853493\/8853511\/8853520\/18808772\/00._Executive_summary_2016_Survey.pdf?nodeid=19208898&vernum=-2\n                    \n                  . Zugegriffen: 31. Jan. 2018."},{"key":"428_CR7","unstructured":"ISO\u00a020000 (2011) Information technology \u2013 Service management, Part 1: Service management system requirements, ISO\/IEC, Geneva"},{"key":"428_CR8","unstructured":"ISO\u00a020000 (2012) Information technology \u2013 Service management, Part 2: Guidance on the application of service management systems, ISO\/IEC, Geneva"},{"key":"428_CR9","unstructured":"ISO\u00a027000 (2018) Informationstechnik \u2013 IT-Sicherheitsverfahren \u2013 Informationssicherheits-Managementsysteme \u2013 \u00dcberblick und Terminologie, Beuth, Berlin"},{"key":"428_CR10","unstructured":"ISO\u00a027001 (2013) Information technology \u2013 Security techniques \u2013 Information security management systems \u2013 Requirements, British standards institute, London"},{"key":"428_CR11","unstructured":"ISO\u00a027002 (2013) Information technology \u2013 Security techniques \u2013 Code of practice for information security controls, British standards institute, London"},{"key":"428_CR12","unstructured":"ISO\u00a027013 (2015) Information technology \u2013 Security techniques \u2013 Guidance on the integrated implementation of ISO\/IEC 27001 and ISO\/IEC 20000-1, ISO\/IEC, Geneva"},{"key":"428_CR14","volume-title":"IT-Sicherheitsmanagement nach ISO\u00a027001 und Grundschutz: Der Weg zur Zertifizierung","author":"H Kersten","year":"2008","unstructured":"Kersten H et\u00a0al (2008) IT-Sicherheitsmanagement nach ISO\u00a027001 und Grundschutz: Der Weg zur Zertifizierung. Vieweg, Wiesbaden"},{"key":"428_CR15","volume-title":"Vendor Selection Matrix \u2013 IT und Enterprise Service Management SaaS und Software: Die Top 20 Anbieter in Deutschland, Propriet\u00e4re Version, gek\u00fcrzt, ohne Anbieter Scorecards","author":"T Mendel","year":"2017","unstructured":"Mendel T (2017) Vendor Selection Matrix \u2013 IT und Enterprise Service Management SaaS und Software: Die Top 20 Anbieter in Deutschland, Propriet\u00e4re Version, gek\u00fcrzt, ohne Anbieter Scorecards. \n                    http:\/\/research-in-action.wks-international.de\/index.php\/research\/20-research-2017-deutsch\/51-2017-1-vendor-selection-matrix-it-und-enterprise-service-management-saas-und-software-die-top-20-anbieter-in-deutschland-2017\n                    \n                  . Zugegriffen: 29. Okt. 2017"},{"key":"428_CR16","volume-title":"The Nilson Report","author":"Nilson Report","year":"2016","unstructured":"Nilson Report (2016) The Nilson Report. October 2016. Issue 1096. \n                    https:\/\/www.nilsonreport.com\/upload\/content_promo\/The_Nilson_Report_10-17-2016.pdf\n                    \n                  . Zugegriffen: 30. Jan. 2018"},{"key":"428_CR17","volume-title":"PCI DSS Quick Reference Guide \u2013 Understanding the Payment Card Industry Data Security Standard","author":"PCI Security Standards Council","year":"2016","unstructured":"PCI Security Standards Council (2016a) PCI DSS Quick Reference Guide \u2013 Understanding the Payment Card Industry Data Security Standard. Version 3.2. \n                    https:\/\/www.pcisecuritystandards.org\/document_library?category=saqs#results\n                    \n                  . Zugegriffen: 06. Aug. 2017"},{"key":"428_CR18","volume-title":"Anforderungen und Sicherheitsbeurteilungsverfahren","author":"PCI Security Standards Council","year":"2016","unstructured":"PCI Security Standards Council (2016b) Anforderungen und Sicherheitsbeurteilungsverfahren. Version 3.2, 2016. \n                    https:\/\/www.pcisecuritystandards.org\/document_library?category=saqs#results\n                    \n                  . Zugegriffen: 06. Aug. 2017"},{"key":"428_CR19","volume-title":"Potential Liabilities","author":"PCI Security Standards Council","year":"2017","unstructured":"PCI Security Standards Council (2017) Potential Liabilities. \n                    https:\/\/www.pcisecuritystandards.org\/pci_security\/why_security_matters\n                    \n                  . Zugegriffen: 30. Okt. 2017"},{"key":"428_CR20","volume-title":"The Risk of Insider Fraud \u2013 Second Annual Study","author":"Ponemon Institute","year":"2013","unstructured":"Ponemon Institute (2013) The Risk of Insider Fraud \u2013 Second Annual Study. \n                    http:\/\/www.attachmate.com\/Press\/ponemon2012-infographics.htm\n                    \n                  . Zugegriffen: 24. Jan. 2014"},{"key":"428_CR21","volume-title":"Payment Card Industry standards: Compliance burden or opportunity? Practical strategies to reduce risk and compliance costs","author":"PriceWaterhouseCoopers","year":"2008","unstructured":"PriceWaterhouseCoopers (2008) Payment Card Industry standards: Compliance burden or opportunity? Practical strategies to reduce risk and compliance costs. \n                    https:\/\/www.pwc.com.au\/consulting\/assets\/risk-controls\/complianceburdenoropportunity.pdf\n                    \n                  . Zugegriffen: 03. Febr. 2018"},{"key":"428_CR22","volume-title":"Home Depot to Pay Banks $25 Million in Data Breach Settlement. Fortune","author":"JJ Roberts","year":"2017","unstructured":"Roberts JJ (2017) Home Depot to Pay Banks $25 Million in Data Breach Settlement. Fortune. \n                    http:\/\/fortune.com\/2017\/03\/09\/home-depot-data-breach-banks\/\n                    \n                  . Zugegriffen: 01. Dez. 2017"},{"key":"428_CR24","volume-title":"Target in $39.4 million settlement with banks over data breach. Reuters","author":"J Stempel","year":"2015","unstructured":"Stempel J, Bose N (2015) Target in $39.4 million settlement with banks over data breach. Reuters. \n                    https:\/\/www.reuters.com\/article\/us-target-breach-settlement\/target-in-39-4-million-settlement-with-banks-over-data-breach-idUSKBN0TL20Y20151202\n                    \n                  . Zugegriffen: 01. Dez. 2017"},{"key":"428_CR23","volume-title":"ISO\u00a027002 vs. COBIT: Security Information Planning","author":"MM Toro Garc\u00eda","year":"2012","unstructured":"Toro Garc\u00eda MM (2012) ISO\u00a027002 vs. COBIT: Security Information Planning. \n                    http:\/\/www.isaca.org\/Groups\/Professional-English\/iso-iec-27000-series\/GroupDocuments\/Article%20ISO%2027002%20vs%20COBIT%20Info%20Sec%20Plan%20-%20ISACA.pdf\n                    \n                  . Zugegriffen: 24. Feb. 2018"},{"key":"428_CR25","volume-title":"2017 Payment Security Report \u2013 Revealing the challenges in sustaining payment card security","author":"Verizon","year":"2017","unstructured":"Verizon (2017) 2017 Payment Security Report \u2013 Revealing the challenges in sustaining payment card security. \n                    http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/payment-security\/2017\/reports\/2017_payment_security_report_en_xg.pdf\n                    \n                  . Zugegriffen: 24. Feb. 2018"},{"key":"428_CR26","series-title":"Wiesbaden","volume-title":"IT-Sicherheit: Kompakt und verst\u00e4ndlich, ein praxisorientierte Einf\u00fchrung","author":"BC Witt","year":"2006","unstructured":"Witt BC (2006) IT-Sicherheit: Kompakt und verst\u00e4ndlich: Eine praxisorientierte Einf\u00fchrung.\u00a0Vieweg, Wiesbaden"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s40702-018-0428-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-018-0428-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-018-0428-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T19:06:40Z","timestamp":1558638400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s40702-018-0428-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,24]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["428"],"URL":"https:\/\/doi.org\/10.1365\/s40702-018-0428-4","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"type":"print","value":"1436-3011"},{"type":"electronic","value":"2198-2775"}],"subject":[],"published":{"date-parts":[[2018,5,24]]},"assertion":[{"value":"5 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}