{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T21:14:59Z","timestamp":1648502099117},"reference-count":18,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"3","license":[{"start":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T00:00:00Z","timestamp":1400544000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1365\/s40702-014-0046-8","type":"journal-article","created":{"date-parts":[[2014,5,19]],"date-time":"2014-05-19T06:08:01Z","timestamp":1400479681000},"page":"252-266","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Effizienz Compliance-konformer Kontrollprozesse in internen Kontrollsystemen (IKS)"],"prefix":"10.1365","volume":"51","author":[{"given":"Stephan","family":"K\u00fchnel","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Sackmann","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2014,5,20]]},"reference":[{"key":"46_CR1","unstructured":"Baetge J (1990) \u00dcberwachung. In: Bitz M (Hrsg) Vahlens Kompendium der Betriebswirtschaftslehre, 2.\u00a0Aufl. Verlag Franz Vahlen GmbH, M\u00fcnchen, S\u00a0167\u2013208"},{"key":"46_CR2","unstructured":"Birukou A, D\u2019Andrea V, Leymann F, Serafinski J, Silveira P, Strauch S, Tluczek M (2010) An integrated solution for runtime compliance governance in SOA. In: Maglio PP, Weske M, Yang J, Fantinato M (Hrsg) ICSOC 2010, Lecture notes in computer science, Bd\u00a06470. Springer Verlag, Berlin, S\u00a0122\u2013136"},{"key":"46_CR3","unstructured":"DIIR \u2013 Deutsches Institut f\u00fcr Interne Revision (2005) Sicherheit in Kreditinstituten \u2013 Handbuch der Arbeits- und Betriebssicherheit. In: IIR Schriftenreihe, 2.\u00a0Aufl, Bd\u00a032. Erich Schmidt Verlag, Berlin"},{"issue":"5","key":"46_CR4","first-page":"109","volume":"2002","author":"MD Herke","year":"2002","unstructured":"Herke MD (2002) Kreditunterlagen nach \u00a7\u00a018 KWG. Betriebswirtschaftliche Mandatenbetreuung, Unternehmensberatung \u2013 Verm\u00f6gensplanung \u2013 Bilanzierung 2002(5):109","journal-title":"Betriebswirtschaftliche Mandatenbetreuung, Unternehmensberatung \u2013 Verm\u00f6gensplanung \u2013 Bilanzierung"},{"issue":"3","key":"46_CR5","first-page":"119","volume":"44","author":"A Hiendlmeier","year":"2009","unstructured":"Hiendlmeier A, Maier B (2009) Das IKS. Pflicht\u00fcbung oder Steuerungsinstrument? ZIR \u2013 Zeitschrift Interne Revision 44(3):119\u2013123","journal-title":"ZIR \u2013 Zeitschrift Interne Revision"},{"key":"46_CR6","unstructured":"Kittel K (2013) Agilit\u00e4t von Gesch\u00e4ftsprozessen trotz Compliance. In: Alt R, Franczyk B (Hrsg) Proceedings of the 11th international conference on Wirtschaftsinformatik (WI2013), Bd\u00a02, Leipzig, S\u00a0967\u2013981"},{"key":"46_CR7","unstructured":"Kittel K, Sackmann S, G\u00f6ser K (2013) Flexibility and compliance in workflow-systems \u2013 The KitCom Prototype. In: Deneck\u00e8re R, Proper HA (Hrsg) Tagungsband CAiSE Forum \u2013 25th international conference on advanced information systems engineering, Valencia, S\u00a0154\u2013160"},{"key":"46_CR8","unstructured":"KPMG AG Wirtschaftspr\u00fcfungsgesellschaft (2013) Analyse des aktuellen Stands der Ausgestaltung von Compliance Management-Systemen in deutschen Unternehmen. Executive Summary. https:\/\/www.kpmg.com\/DE\/de\/Documents\/studie-compliance-2013-KPMG.pdf . Zugegriffen: 15. April 2014"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Nowey T (2011) Konzeption eines Systems zur \u00fcberbetrieblichen Sammlung und Nutzung von quantitativen Daten \u00fcber Informationssicherheitsvorf\u00e4lle, Diss. Univ. Regensburg 2010, Wiesbaden","DOI":"10.1007\/978-3-8348-9873-9"},{"key":"46_CR10","unstructured":"Prokein O (2008) IT-Risikomanagement, Diss. Univ. Freiburg i.\u00a0Br. 2007, Wiesbaden"},{"issue":"30","key":"46_CR11","first-page":"716","volume":"73","author":"M Richter","year":"1978","unstructured":"Richter M (1978) Die Veranlassung von Pr\u00fcfungen als Entscheidungsproblem. Schmalenbachs Zeitschrift f\u00fcr betriebswirtschaftliche Forschung 73(30):716\u2013733","journal-title":"Schmalenbachs Zeitschrift f\u00fcr betriebswirtschaftliche Forschung"},{"issue":"5","key":"46_CR12","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/BF03341248","volume":"45","author":"S Sackmann","year":"2008","unstructured":"Sackmann S (2008) Automatisierung von Compliance. HMD\u2009\u2013\u2009Praxis der Wirtschaftsinformatik 45(5):39\u201346","journal-title":"HMD \u2013 Praxis der Wirtschaftsinformatik"},{"issue":"5","key":"46_CR13","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1007\/s11576-008-0078-1","volume":"50","author":"S Sackmann","year":"2008","unstructured":"Sackmann S, K\u00e4hmer M (2008) ExPDT: A policy-based approach for automating compliance. Wirtschaftsinformatik 50(5):366\u2013374","journal-title":"Wirtschaftsinformatik"},{"issue":"1","key":"46_CR14","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/BF03340774","volume":"50","author":"S Sackmann","year":"2013","unstructured":"Sackmann S, Hofmann M, K\u00fchnel S (2013) Return on controls invest. Ein Ansatz zur wirtschaftlichen Spezifizierung von internen Kontrollsystemen. HMD \u2013 Praxis der Wirtschaftsinformatik 50(1):31\u201340","journal-title":"HMD \u2013 Praxis der Wirtschaftsinformatik"},{"key":"46_CR15","doi-asserted-by":"crossref","unstructured":"Sch\u00e4l I (2011) Management von operationellen Risiken \u2013 Kategorisierung \u2013 Bewertung \u2013 Steuerung, Diss. Univ. Karlsruhe 2010, Wiesbaden","DOI":"10.1007\/978-3-8349-6548-6"},{"key":"46_CR16","volume-title":"Ein modellbasierter Ansatz zur verzahnten Entwicklung von Anforderungen und Architektur \u00fcber mehrere Abstraktionsstufen hinweg","author":"E Sikora","year":"2011","unstructured":"Sikora E (2011) Ein modellbasierter Ansatz zur verzahnten Entwicklung von Anforderungen und Architektur \u00fcber mehrere Abstraktionsstufen hinweg. Logos, Berlin"},{"key":"46_CR17","volume-title":"Mythos internes Kontrollsystem \u2013 B\u00f6rsennotierte Aktiengesellschaften auf dem Pr\u00fcfstand","author":"H Volkmann","year":"2011","unstructured":"Volkmann H (2011) Mythos internes Kontrollsystem \u2013 B\u00f6rsennotierte Aktiengesellschaften auf dem Pr\u00fcfstand. Diplomica, Hamburg"},{"key":"46_CR18","doi-asserted-by":"crossref","DOI":"10.1524\/9783486592542","volume-title":"Risikomanagement","author":"T Wolke","year":"2008","unstructured":"Wolke T (2008) Risikomanagement, 2.\u00a0Aufl. Oldenbourg Wissenschaftsverlag, M\u00fcnchen","edition":"2."}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-014-0046-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s40702-014-0046-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-014-0046-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T11:48:19Z","timestamp":1565437699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s40702-014-0046-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,20]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["46"],"URL":"https:\/\/doi.org\/10.1365\/s40702-014-0046-8","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,20]]}}}