{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:07:22Z","timestamp":1725566842673},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642163173"},{"type":"electronic","value":"9783642163180"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16318-0_42","type":"book-chapter","created":{"date-parts":[[2010,9,27]],"date-time":"2010-09-27T05:06:23Z","timestamp":1285563983000},"page":"363-368","source":"Crossref","is-referenced-by-count":2,"title":["The Enterprise 2.0 Concept: Challenges on Data and Information Security"],"prefix":"10.1007","author":[{"given":"Ana","family":"Silva","sequence":"first","affiliation":[]},{"given":"Fernando","family":"Moreira","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Varaj\u00e3o","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/MC.2007.383","volume":"11","author":"M.A. Davidson","year":"2007","unstructured":"Davidson, M.A., Yoran, E.: Enterprise Security for Web 2.0. Computer\u00a011, 117\u2013119 (2007)","journal-title":"Computer"},{"unstructured":"Cunningham, P., Wilkins, J.: A Walk in the Cloud. Information Management Journal, 22\u201330 (2009)","key":"42_CR2"},{"unstructured":"Taft, D.K.: IBM \u2018Smashes\u2019 Web 2.0 security risks. eweek 36(40) (2008)","key":"42_CR3"},{"unstructured":"Brandel, M.: Keeping Secrets in a WikiBlogTubeSpace World. Computerworld, 26\u201330 (2007)","key":"42_CR4"},{"unstructured":"McClure, M.: Web 2.0 Security: Getting Collaborative Peace of Mind. Econtent, 36\u201341 (2008)","key":"42_CR5"},{"key":"42_CR6","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MC.2007.367","volume":"10","author":"G. Lawton","year":"2007","unstructured":"Lawton, G.: Web 2.0 Creates Security Challenges. Computer\u00a010, 13\u201316 (2007)","journal-title":"Computer"},{"doi-asserted-by":"crossref","unstructured":"Cluley, G.: New internet brings security challenges. Infosecurity\u00a02(41) (2007)","key":"42_CR7","DOI":"10.1016\/S1754-4548(07)70046-3"},{"unstructured":"Till, J.: Using Web 2.0 safely in the enterprise. NetworkWorld\u00a013(26) (2008)","key":"42_CR8"},{"unstructured":"Nene, B., Swanson, T.: Information Rights Management Application Patterns. Microsoft White Paper. In: Michael, W. (ed.) Enterprise 2.0: What, Why and How. Enterprise 2.0 Conference (2009)","key":"42_CR9"},{"unstructured":"McAfee, A.: Enterprise 2.0, version 2.0. Andrew McAfee blog (2006)","key":"42_CR10"},{"unstructured":"Dawson, R.: Implementing Enterprise 2.0. Advanced Human Technologies, Sidney (2009)","key":"42_CR11"},{"unstructured":"IDC, \n \n http:\/\/www.idc.com\/","key":"42_CR12"},{"unstructured":"Websense: State of Internet Security, Q1 - Q2. Websense White Paper (2009)","key":"42_CR13"},{"unstructured":"Gartner, \n \n http:\/\/www.gartner.com","key":"42_CR14"}],"container-title":["Communications in Computer and Information Science","Knowledge Management, Information Systems, E-Learning, and Sustainability Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16318-0_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T01:33:29Z","timestamp":1553132009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16318-0_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642163173","9783642163180"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16318-0_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}