{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:49:23Z","timestamp":1725594563257},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642310683"},{"type":"electronic","value":"9783642310690"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31069-0_29","type":"book-chapter","created":{"date-parts":[[2012,7,3]],"date-time":"2012-07-03T10:01:27Z","timestamp":1341309687000},"page":"351-365","source":"Crossref","is-referenced-by-count":7,"title":["Integrity of Supply Chain Visibility: Linking Information to the Physical World"],"prefix":"10.1007","author":[{"given":"Joris","family":"Hulstijn","sequence":"first","affiliation":[]},{"given":"Sietse","family":"Overbeek","sequence":"additional","affiliation":[]},{"given":"Huib","family":"Aldewereld","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Christiaanse","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Aldewereld, H.: Autonomy vs. Conformity - An Institutional Perspective on Norms and Protocols. Ph.D. thesis. Universiteit Utrecht (2007)"},{"key":"29_CR2","unstructured":"Blokdijk, J., Drie\u00ebnhuizen, F., Wallage, P.: Reflections on Auditing Theory, A contribution from the Netherlands. Limperg Institute Amsterdam (1995)"},{"issue":"4","key":"29_CR3","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1016\/j.accinf.2005.07.001","volume":"6","author":"J. Boritz","year":"2005","unstructured":"Boritz, J.: Is practitioners\u2019 views on core concepts of information integrity. International Journal of Accounting Information Systems\u00a06(4), 260\u2013279 (2005)","journal-title":"International Journal of Accounting Information Systems"},{"issue":"3","key":"29_CR4","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/0950-5849(93)90052-5","volume":"35","author":"S. Chen","year":"1993","unstructured":"Chen, S., Drake, J., Tsai, W.: Database requirements for a software engineering environment: criteria and empirical evaluation. Information and Software Technology\u00a035(3), 149\u2013161 (1993)","journal-title":"Information and Software Technology"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Clark, D., Wilson, D.: A comparison of commercial and military computer security policies. In: IEEE Symposium on Security and Privacy, pp. 184\u2013194 (1987)","DOI":"10.1109\/SP.1987.10001"},{"key":"29_CR6","unstructured":"European Commission: AEO guidelines. Tech. Rep. TAXUD\/2006\/1450, Directorate-General Taxation and Customs Union (2007)"},{"issue":"5","key":"29_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1125944.1125976","volume":"49","author":"J.L. Dietz","year":"2006","unstructured":"Dietz, J.L.: The deep structure of business processes. Communications of the ACM\u00a049(5), 59\u201364 (2006)","journal-title":"Communications of the ACM"},{"key":"29_CR8","unstructured":"FIPS: Minimum security requirements for federal information and information systems. Tech. rep., U.S. National Institute of Standards in Technology, NIST (2006)"},{"issue":"1-2","key":"29_CR9","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.cose.2008.10.003","volume":"28","author":"J. Ghaeb","year":"2009","unstructured":"Ghaeb, J., Chebil, J.: An oblique-matrix technique for data integrity assurance. Computers & Security\u00a028(1-2), 94\u201399 (2009)","journal-title":"Computers & Security"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Governatori, G., Sadiq, S.: The journey to business process compliance, pp. 426\u2013445. IGI Global (2009)","DOI":"10.4018\/978-1-60566-288-6.ch020"},{"issue":"2","key":"29_CR11","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/0169-023X(93)90008-D","volume":"10","author":"P. Grefen","year":"1993","unstructured":"Grefen, P., Apers, P.: Integrity control in relational database systems - an overview. Data and Knowledge Engineering\u00a010(2), 187\u2013223 (1993)","journal-title":"Data and Knowledge Engineering"},{"key":"29_CR12","unstructured":"Grossi, D.: Designing Invisible Handcuffs: Formal Investigations in Institutions and Organizations for Multi-agent Systems. Ph.D. thesis. Universiteit Utrecht (2007)"},{"issue":"2","key":"29_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.55596\/001c.92008","volume":"4","author":"D. Hesketh","year":"2010","unstructured":"Hesketh, D.: Weaknesses in the supply chain: who packed the box? World Customs Journal\u00a04(2), 3\u201320 (2010)","journal-title":"World Customs Journal"},{"key":"29_CR14","first-page":"77","volume-title":"FOMI 2011","author":"W. Hofman","year":"2011","unstructured":"Hofman, W.: Supply chain risk analysis with linked open data. In: Vermaas, P.E., Dignum, V. (eds.) FOMI 2011, pp. 77\u201387. IOS Press, Amsterdam (2011)"},{"key":"29_CR15","unstructured":"INTEGRITY, SMART-CM: Global container supply chain compendium (2008)"},{"issue":"4","key":"29_CR16","doi-asserted-by":"crossref","first-page":"735","DOI":"10.2307\/20650325","volume":"33","author":"R. Klein","year":"2009","unstructured":"Klein, R., Rai, A.: Interfirm strategic information flows in logistics supply chain relationships. MIS Quarterly\u00a033(4), 735\u2013762 (2009)","journal-title":"MIS Quarterly"},{"key":"29_CR17","unstructured":"M\u00fcller, A.: Re-engineering Security: A risk based approach for information security focused business process re-design. Master\u2019s thesis. Erasmus Universiteit (2012)"},{"issue":"3","key":"29_CR18","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.jnca.2010.04.006","volume":"34","author":"F. Rizzo","year":"2011","unstructured":"Rizzo, F., Barboni, M., Faggion, L., Azzalin, G., Sironi, M.: Improved security for commercial container transports using an innovative active RFID system. Journal of Network and Computer Applications\u00a034(3), 846\u2013852 (2011)","journal-title":"Journal of Network and Computer Applications"},{"key":"29_CR19","unstructured":"Searle, J.R.: The Construction of Social Reality. The Free Press (1995)"},{"key":"29_CR20","unstructured":"Starreveld, R.W., de Mare, B., Joels, E.: Bestuurlijke Informatieverzorging, vol.\u00a01. Samsom, Alphen aan den Rijn (1994) (in Dutch)"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Tan, Y., Bj\u00f8rn-Andersen, N., Klein, S., Rukanova, B. (eds.): Accelerating Global Supply Chains with IT-Innovation. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-15669-4"},{"issue":"1","key":"29_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2308\/jeta.2004.1.1.1","volume":"1","author":"M.A. Vasarhelyi","year":"2004","unstructured":"Vasarhelyi, M.A., Alles, M., Kogan, A.: Principles of analytic monitoring for continuous assurance. J. of Emerging Technologies in Accounting\u00a01(1), 1\u201321 (2004)","journal-title":"J. of Emerging Technologies in Accounting"},{"key":"29_CR23","unstructured":"WCO: SAFE framework of standards to secure and facilitate global trade (2011)"},{"issue":"3","key":"29_CR24","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/S0169-023X(03)00064-8","volume":"47","author":"H. Weigand","year":"2003","unstructured":"Weigand, H., de Moor, A.: Workflow analysis with communication norms. Data and Knowledge Engineering\u00a047(3), 349\u2013369 (2003)","journal-title":"Data and Knowledge Engineering"},{"key":"29_CR25","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-642-15970-1_11","volume-title":"A Developer\u2019s Guide to the Semantic Web","author":"L. Yu","year":"2011","unstructured":"Yu, L.: Linked open data. In: A Developer\u2019s Guide to the Semantic Web, pp. 409\u2013466. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Business Information Processing","Advanced Information Systems Engineering Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31069-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T10:00:25Z","timestamp":1714125625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31069-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642310683","9783642310690"],"references-count":25,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-642-31069-0_29","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2012]]}}}