{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T17:08:49Z","timestamp":1747156129315,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031105388"},{"type":"electronic","value":"9783031105395"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10539-5_7","type":"book-chapter","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T13:05:22Z","timestamp":1657890322000},"page":"93-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Digital Transformation and the Role of the CIO in Decision Making: A Comparison of Two Modelling Approaches"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4457-3703","authenticated-orcid":false,"given":"Daniela","family":"Borissova","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2688-9840","authenticated-orcid":false,"given":"Zornitsa","family":"Dimitrova","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5197-2411","authenticated-orcid":false,"given":"Vasil","family":"Dimitrov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9314-1520","authenticated-orcid":false,"given":"Radoslav","family":"Yoshinov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5840-5893","authenticated-orcid":false,"given":"Naiden","family":"Naidenov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,16]]},"reference":[{"issue":"5","key":"7_CR1","doi-asserted-by":"publisher","first-page":"2523","DOI":"10.1002\/bse.2761","volume":"30","author":"RYK Chan","year":"2021","unstructured":"Chan, R.Y.K.: Do chief information officers matter for sustainable development? Impact of their regulatory focus on green information technology strategies and corporate performance. Bus. Strateg. Environ. 30(5), 2523\u20132534 (2021). https:\/\/doi.org\/10.1002\/bse.2761","journal-title":"Bus. Strateg. Environ."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Jarvelainen, J.: Understanding the stakeholder roles in business continuity management practices \u2013 a study in public sector. In: 53rd Hawaii International Conference on System Sciences, pp. 1966\u20131975, Maui, Hawaii (2020)","DOI":"10.24251\/HICSS.2020.241"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Gogan, J.L., Conboy, K., Weiss, J.W.: Dangerous champions of IT innovation. In: 53rd Hawaii International Conference on System Sciences, pp. 6144\u20136153, Hawaii (2020)","DOI":"10.24251\/HICSS.2020.752"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.bushor.2015.09.001","volume":"59","author":"AB Gerth","year":"2016","unstructured":"Gerth, A.B., Peppard, J.: The dynamics of CIO derailment: how CIOs come undone and how to avoid. Bus. Horiz. 59, 61\u201370 (2016)","journal-title":"Bus. Horiz."},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.dss.2015.03.005","volume":"74","author":"GS Dawson","year":"2015","unstructured":"Dawson, G.S., Ho, M.-W., Kauffman, R.J.: How are c-suite executives different? A comparative empirical study of the survival of American chief information officers. Decis. Support Syst. 74, 88\u2013101 (2015)","journal-title":"Decis. Support Syst."},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Trifonov, R., Tsochev, G., Manolov, S., Yoshinov, R., Pavlova, G.: Increasing the level of network and information security using artificial intelligence. In: Fifth International Conference on Advances in Computing, Communication and Information Technology (2017). https:\/\/doi.org\/10.15224\/978-1-63248-131-3-25","DOI":"10.15224\/978-1-63248-131-3-25"},{"issue":"6","key":"7_CR7","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.15622\/sp.2019.18.6.1333-1356","volume":"18","author":"G Tsochev","year":"2019","unstructured":"Tsochev, G., Yoshinov, R., Iliev, O.: Key problems of the critical information infrastructure through SCADA systems research. SPIIRAS Proc. 18(6), 1333\u20131356 (2019)","journal-title":"SPIIRAS Proc."},{"key":"7_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2022.102493","volume":"116","author":"M Kianpour","year":"2022","unstructured":"Kianpour, M., Kowalski, S.J., Overby, H.: Advancing the concept of cybersecurity as a public good. Simul. Model. Pract. Theory 116, 102493 (2022). https:\/\/doi.org\/10.1016\/j.simpat.2022.102493","journal-title":"Simul. Model. Pract. Theory"},{"key":"7_CR9","unstructured":"Shen, S., Chen, O., Sun, J., Mok, L., Gao, A., Wan, D.D.K.: Coronavirus (COVID-19) outbreak: short- and long term actions for CIOs. Gartner report ID G00720647 (2020)"},{"key":"7_CR10","unstructured":"Cearley, D., Burke, B., Smith, D., Jones, N., Chandrasekaran, A., Lu, CK., Karamouzis, F.: Top 10 strategic technology trends for 2020: a Gartner trend insight report. ID: G00467123, pp. 1\u201321 (2020)"},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Borissova, D., Dimitrova, Z., Dimitrov, V.: How to support teams to be remote and productive: group decision-making for distance collaboration software tools. Inf. Secur.: Int. J. 46(1), 36\u201352 (2020). https:\/\/doi.org\/10.11610\/isij.4603","DOI":"10.11610\/isij.4603"},{"key":"7_CR12","doi-asserted-by":"publisher","unstructured":"Alhayani, B., Mohammed, H.J., Chaloob, I.Z., Ahmed, J.S.: Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Mater. Today: Proc. (2021). https:\/\/doi.org\/10.1016\/j.matpr.2021.02.531","DOI":"10.1016\/j.matpr.2021.02.531"},{"key":"7_CR13","doi-asserted-by":"publisher","unstructured":"Reuschke, D., Mason, C.: The engagement of home-based businesses in the digital economy. Futures (2020). https:\/\/doi.org\/10.1016\/j.futures.2020.102542","DOI":"10.1016\/j.futures.2020.102542"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.future.2016.08.012","volume":"67","author":"J Oyekana","year":"2017","unstructured":"Oyekana, J., Prabhua, V., Tiwari, A., Baskaran, V., Burgess, M., Mcnally, R.: Remote real-time collaboration through synchronous exchange of digitised human-workpiece interactions. Futur. Gener. Comput. Syst. 67, 83\u201393 (2017)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1016\/j.jtrangeo.2012.04.009","volume":"24","author":"TE Julsrud","year":"2012","unstructured":"Julsrud, T.E., Hjorthol, R., Denstadli, J.M.: Business meetings: do new videoconferencing technologies change communication patterns? J. Transp. Geogr. 24, 396\u2013403 (2012)","journal-title":"J. Transp. Geogr."},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.indmarman.2019.02.013","volume":"80","author":"J Hardwick","year":"2019","unstructured":"Hardwick, J., Anderson, A.R.: Supplier-customer engagement for collaborative innovation using video conferencing: a study of SMEs. Ind. Mark. Manag. 80, 43\u201357 (2019)","journal-title":"Ind. Mark. Manag."},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Ghosh, S., Hughes, M., Hodgkinson, I., Hughes, P.: Digital transformation of industrial businesses: a dynamic capability approach. Technovation, 102414 (2021). https:\/\/doi.org\/10.1016\/j.technovation.2021.102414","DOI":"10.1016\/j.technovation.2021.102414"},{"key":"7_CR18","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-030-30874-2_24","volume-title":"Digital Economy. Emerging Technologies and Business Innovation","author":"E Chtouka","year":"2019","unstructured":"Chtouka, E., Guezguez, W., Amor, N.B.: Reinforcement learning for new adaptive gamified LMS. In: Jallouli, R., Bach Tobji, M.A., B\u00e9lisle, D., Mellouli, S., Abdallah, F., Osman, I. (eds.) ICDEc 2019. LNBIP, vol. 358, pp. 305\u2013314. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30874-2_24"},{"key":"7_CR19","unstructured":"Yoshinov, R., Arapi, P., Christodoulakis, S., Kotseva, M.: Supporting personalized learning experiences on top of multimedia digital libraries. Int. J. Educ. Inf. Technol. 10, 152\u2013158, (2016)"},{"key":"7_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcom.2021.100430","volume":"39","author":"D De la Pena","year":"2021","unstructured":"De la Pena, D., Lizcano, D., Martinez-Alvarez, I.: Learning through play: gamification model in university-level distance learning. Entertain. Comput. 39, 100430 (2021). https:\/\/doi.org\/10.1016\/j.entcom.2021.100430","journal-title":"Entertain. Comput."},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-03426-8_11","volume-title":"Advances in Web Based Learning \u2013 ICWL 2009","author":"D Borissova","year":"2009","unstructured":"Borissova, D., Mustakerov, I.: A framework of multimedia e-learning design for engineering training. In: Spaniol, M., Li, Q., Klamma, R., Lau, R.W.H. (eds.) ICWL 2009. LNCS, vol. 5686, pp. 88\u201397. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03426-8_11"},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Petrova, P., Kostadinova, I.: An approach for embedding intelligence in a system for automatic test generation and a 3D result model. In: Proceedings of 10th International Conference on Intelligent Systems, pp. 358\u2013363. IEEE, Varna (2020). https:\/\/doi.org\/10.1109\/IS48319.2020.9199969","DOI":"10.1109\/IS48319.2020.9199969"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Kostadinova, I., Rasheva-Yordanova, K., Garvanova, M.: Analysis of algorithms for generating test questions in e-testing systems. In: 11th International Conference on Education and New Learning Technologies, EDULEARN 2019, pp. 1714\u20131719 (2019). https:\/\/doi.org\/10.21125\/edulearn.2019.0498","DOI":"10.21125\/edulearn.2019.0498"},{"issue":"6","key":"7_CR24","doi-asserted-by":"publisher","first-page":"3619","DOI":"10.1007\/s10639-019-09942-y","volume":"24","author":"R Beuran","year":"2019","unstructured":"Beuran, R., Tang, D., Tan, Z., Hasegawa, S., Tan, Y., Shinoda, Y.: Supporting cybersecurity education and training via LMS integration: CyLMS. Educ. Inf. Technol. 24(6), 3619\u20133643 (2019). https:\/\/doi.org\/10.1007\/s10639-019-09942-y","journal-title":"Educ. Inf. Technol."},{"key":"7_CR25","first-page":"49","volume":"42","author":"V Shalamanov","year":"2019","unstructured":"Shalamanov, V.: Organising for IT effectiveness, efficiency and cyber resilience in the academic sector: national and regional dimensions. Inf. Secur.: Int. J. 42, 49\u201366 (2019)","journal-title":"Inf. Secur.: Int. J."},{"issue":"4","key":"7_CR26","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3390\/fi12040062","volume":"12","author":"T Tagarev","year":"2020","unstructured":"Tagarev, T.: Towards the design of a collaborative cybersecurity networked organisation: identification and prioritisation of governance needs and objectives. Future Internet 12(4), 62 (2020). https:\/\/doi.org\/10.3390\/fi12040062","journal-title":"Future Internet"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Barbosa, A.P.F.P.L., et al.: Configurations of project management practices to enhance the performance of open innovation R&D projects. Int. J. Project Manag. (2020). https:\/\/doi.org\/10.1016\/j.ijproman.2020.06.005","DOI":"10.1016\/j.ijproman.2020.06.005"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Kreuzer, T., Roglinger. M., Rupprecht. L.: Customer-centric prioritization of process improvement projects. Decis. Support Syst. 133, 113286 (2020)","DOI":"10.1016\/j.dss.2020.113286"},{"issue":"1","key":"7_CR29","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.ejor.2019.06.050","volume":"280","author":"J Burgelman","year":"2020","unstructured":"Burgelman, J., Vanhoucke, M.: Project schedule performance under general mode implementation disruptions. Eur. J. Oper. Res. 280(1), 295\u2013311 (2020)","journal-title":"Eur. J. Oper. Res."},{"key":"7_CR30","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-030-24854-3_22","volume-title":"Business Modeling and Software Design","author":"M Garvanova","year":"2019","unstructured":"Garvanova, M., Shishkov, B.: Capturing human authority and responsibility by considering composite public values. In: Shishkov, B. (ed.) BMSD 2019. LNBIP, vol. 356, pp. 290\u2013298. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24854-3_22"},{"key":"7_CR31","doi-asserted-by":"publisher","unstructured":"Petrov, I.: Combined criteria weighting in MCDM: AHP in blocks with traditional Entropy and novel Hierarchy in TOPSIS evaluation of Cloud Services. In: Proceedings of Big Data, Knowledge and Control Systems Engineering (BdKCSE), pp. 1\u20139 (2021). https:\/\/doi.org\/10.1109\/BdKCSE53180.2021.9627221","DOI":"10.1109\/BdKCSE53180.2021.9627221"},{"issue":"1","key":"7_CR32","first-page":"101","volume":"20","author":"D Korsemov","year":"2018","unstructured":"Korsemov, D., Borissova, D.: Modifications of simple additive weighting and weighted product models for group decision making. Adv. Model. Optim. 20(1), 101\u2013112 (2018)","journal-title":"Adv. Model. Optim."}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10539-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T10:04:50Z","timestamp":1668506690000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10539-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031105388","9783031105395"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10539-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Information Systems and Industrial Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barranquilla","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisim2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cisim2022.wi.pb.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}