{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:25:28Z","timestamp":1742912728444,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031393853"},{"type":"electronic","value":"9783031393860"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-39386-0_18","type":"book-chapter","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T15:03:00Z","timestamp":1690470180000},"page":"379-390","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Factors of Enterprise Business Architecture Readiness in Organisations"],"prefix":"10.1007","author":[{"given":"Tiko","family":"Iyamu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4896-2738","authenticated-orcid":false,"given":"Irja","family":"Shaanika","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,28]]},"reference":[{"issue":"7","key":"18_CR1","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1080\/0951192X.2012.749529","volume":"26","author":"C Kim","year":"2013","unstructured":"Kim, C., et al.: Ontology-based process model for business architecture of a virtual enterprise. Int. J. Comput. Integr. Manuf. 26(7), 583\u2013595 (2013)","journal-title":"Int. J. Comput. Integr. Manuf."},{"issue":"3\u20134","key":"18_CR2","first-page":"143","volume":"8","author":"T Iyamu","year":"2019","unstructured":"Iyamu, T.: What are the implications of theorizing the enterprise architecture? J. Enterp. Transf. 8(3\u20134), 143\u2013164 (2019)","journal-title":"J. Enterp. Transf."},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"AL-Ghamdi, A.A.-M., Saleem, F.: The impact of ICT applications in the development of business architecture of enterprises. Int. J. Manag. Stud. Res. 4(4), 22\u201328 (2016)","DOI":"10.20431\/2349-0349.0404005"},{"issue":"4","key":"18_CR4","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1108\/BPMJ-05-2017-0122","volume":"25","author":"F Kitsios","year":"2018","unstructured":"Kitsios, F., Kamariotou, M.: Business strategy modelling based on enterprise architecture: a state of the art review. Bus. Process. Manag. J. 25(4), 606\u2013624 (2018)","journal-title":"Bus. Process. Manag. J."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"AL-Ghamdi, A.A.-M.S., Liu, S.: A proposed model to measure the impact of business architecture. Cogent Bus. Manag. 4(1), 1405493 (2017)","DOI":"10.1080\/23311975.2017.1405493"},{"issue":"2","key":"18_CR6","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1080\/10429247.2018.1522565","volume":"31","author":"F Gonzalez-Lopez","year":"2019","unstructured":"Gonzalez-Lopez, F., Bustos, G.: Integration of business process architectures within enterprise architecture approaches: a literature review. Eng. Manag. J. 31(2), 127\u2013140 (2019)","journal-title":"Eng. Manag. J."},{"key":"18_CR7","volume-title":"Enterprise Business Architecture: The Formal Link Between Strategy and Results","author":"R Whittle","year":"2004","unstructured":"Whittle, R., Myrick, C.B.: Enterprise Business Architecture: The Formal Link Between Strategy and Results, 1st edn. CRC Press, Boca Raton (2004)","edition":"1"},{"key":"18_CR8","volume-title":"Business Architecture: The Missing Link in Strategy Formulation","author":"P Hadaya","year":"2017","unstructured":"Hadaya, P., et al.: Business Architecture: The Missing Link in Strategy Formulation. Implementation and Execution. ASATE Publishing, Cape Town (2017)"},{"issue":"1","key":"18_CR9","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s40171-016-0150-4","volume":"18","author":"A Gromoff","year":"2017","unstructured":"Gromoff, A., Bilinkis, Y., Kazantsev, N.: Business architecture flexibility as a result of knowledge-intensive process management. Glob. J. Flex. Syst. Manag. 18(1), 73\u201386 (2017). https:\/\/doi.org\/10.1007\/s40171-016-0150-4","journal-title":"Glob. J. Flex. Syst. Manag."},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"90","DOI":"10.4018\/978-1-5225-8229-8.ch004","volume-title":"Empowering Businesses With Collaborative Enterprise Architecture Frameworks","author":"T Zondani","year":"2021","unstructured":"Zondani, T., Iyamu, T.: Towards an enterprise business architecture readiness assessment model. In: Iyamu, T. (ed.) Empowering Businesses With Collaborative Enterprise Architecture Frameworks, pp. 90\u2013109. IGI Global, Hershey (2021)"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.procs.2016.09.141","volume":"100","author":"NAA Bakar","year":"2016","unstructured":"Bakar, N.A.A., Harihodin, S., Kama, N.: Assessment of enterprise architecture implementation capability and priority in public sector agency. Procedia Comput. Sci. 100, 198\u2013206 (2016)","journal-title":"Procedia Comput. Sci."},{"issue":"3","key":"18_CR12","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1108\/17515631011043840","volume":"11","author":"B Jahani","year":"2010","unstructured":"Jahani, B., Javadein, S.R.S., Jafari, H.A.: Measurement of enterprise architecture readiness within organizations. Bus. Strategy Ser. 11(3), 177\u2013191 (2010)","journal-title":"Bus. Strategy Ser."},{"issue":"3","key":"18_CR13","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1080\/17517575.2015.1048831","volume":"11","author":"E Niemi","year":"2017","unstructured":"Niemi, E., Pekkola, S.: Using enterprise architecture artefacts in an organisation. Enterp. Inf. Syst. 11(3), 313\u2013338 (2017)","journal-title":"Enterp. Inf. Syst."},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Costa, A.B., Brito, M.A.: Enterprise architecture management: constant maintenance and updating of the enterprise architecture. In: 2022 17th Iberian Conference on Information Systems and Technologies (CISTI) (2022)","DOI":"10.23919\/CISTI54924.2022.9820068"},{"key":"18_CR15","first-page":"1","volume":"2021","author":"J Chen","year":"2021","unstructured":"Chen, J., et al.: Complex network controllability analysis on business architecture optimization. Math. Probl. Eng. 2021, 1\u20137 (2021)","journal-title":"Math. Probl. Eng."},{"issue":"1","key":"18_CR16","doi-asserted-by":"publisher","first-page":"012007","DOI":"10.1088\/1742-6596\/1257\/1\/012007","volume":"1257","author":"GJL Caceres","year":"2019","unstructured":"Caceres, G.J.L., G\u00f3mez, R.A.A.: Business architecture: a differentiating element in the growth of organizations. J. Phys. Conf. Ser. 1257(1), 012007 (2019)","journal-title":"J. Phys. Conf. Ser."},{"issue":"1","key":"18_CR17","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/s10270-016-0574-5","volume":"18","author":"B Roelens","year":"2017","unstructured":"Roelens, B., Steenacker, W., Poels, G.: Realizing strategic fit within the business architecture: the design of a process-goal alignment modeling and analysis technique. Softw. Syst. Model. 18(1), 631\u2013662 (2017). https:\/\/doi.org\/10.1007\/s10270-016-0574-5","journal-title":"Softw. Syst. Model."},{"key":"18_CR18","doi-asserted-by":"publisher","DOI":"10.4324\/9781315570563","volume-title":"Business Architecture: A Practical Guide","author":"J Whelan","year":"2016","unstructured":"Whelan, J., Meaden, G.: Business Architecture: A Practical Guide, 2nd edn. Routledge, London (2016)","edition":"2"},{"issue":"5","key":"18_CR19","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1057\/ejis.2014.39","volume":"25","author":"M Lange","year":"2016","unstructured":"Lange, M., Mendling, J., Recker, J.: An empirical analysis of the factors and measures of enterprise architecture management success. Eur. J. Inf. Syst. 25(5), 411\u2013431 (2016)","journal-title":"Eur. J. Inf. Syst."},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijinfomgt.2018.11.006","volume":"46","author":"Y Gong","year":"2019","unstructured":"Gong, Y., Janssen, M.: The value of and myths about enterprise architecture. Int. J. Inf. Manage. 46, 1\u20139 (2019)","journal-title":"Int. J. Inf. Manage."},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-1-4842-8575-6_5","volume-title":"SAP Enterprise Architecture","author":"SC Musukutwa","year":"2022","unstructured":"Musukutwa, S.C.: Developing business architecture using SAP enterprise architecture designer. In: Musukutwa, S.C. (ed.) SAP Enterprise Architecture, pp. 119\u2013140. Apress, Berkeley (2022)"},{"issue":"4","key":"18_CR22","first-page":"498","volume":"9","author":"W Waheduzzaman","year":"2015","unstructured":"Waheduzzaman, W., Miah, S.J.: Readiness assessment of e-government: a developing country perspective. Transf. Gov. People Process Policy 9(4), 498\u2013516 (2015)","journal-title":"Transf. Gov. People Process Policy"},{"issue":"12","key":"18_CR23","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1080\/0951192X.2017.1307453","volume":"30","author":"O Gonz\u00e1lez-Rojas","year":"2017","unstructured":"Gonz\u00e1lez-Rojas, O., L\u00f3pez, A., Correal, D.: Multilevel complexity measurement in enterprise architecture models. Int. J. Comput. Integr. Manuf. 30(12), 1280\u20131300 (2017)","journal-title":"Int. J. Comput. Integr. Manuf."},{"key":"18_CR24","doi-asserted-by":"publisher","first-page":"120536","DOI":"10.1016\/j.techfore.2020.120536","volume":"165","author":"S Balasubramanian","year":"2021","unstructured":"Balasubramanian, S., et al.: A readiness assessment framework for Blockchain adoption: a healthcare case study. Technol. Forecast. Soc. Change 165, 120536 (2021)","journal-title":"Technol. Forecast. Soc. Change"},{"key":"18_CR25","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.ijmedinf.2017.08.006","volume":"107","author":"S Yusif","year":"2017","unstructured":"Yusif, S., Hafeez-Baig, A., Soar, J.: e-Health readiness assessment factors and measuring tools: a systematic review. Int. J. Med. Inform. 107, 56\u201364 (2017)","journal-title":"Int. J. Med. Inform."},{"issue":"2","key":"18_CR26","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1057\/ejis.2011.57","volume":"21","author":"K Conboy","year":"2012","unstructured":"Conboy, K., Fitzgerald, G., Mathiassen, L.: Qualitative methods research in information systems: motivations, themes, and contributions. Eur. J. Inf. Syst. 21(2), 113\u2013118 (2012). https:\/\/doi.org\/10.1057\/ejis.2011.57","journal-title":"Eur. J. Inf. Syst."},{"issue":"1","key":"18_CR27","first-page":"35","volume":"23","author":"ML Markus","year":"1999","unstructured":"Markus, M.L., Lee, A.S.: Special issue on intensive research in information systems: using qualitative, interpretive, and case methods to study information technology - Foreword. MIS Q. 23(1), 35\u201338 (1999)","journal-title":"MIS Q."},{"issue":"3","key":"18_CR28","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1177\/1056492617706029","volume":"27","author":"J Gehman","year":"2017","unstructured":"Gehman, J., et al.: Finding theory-method fit: a comparison of three qualitative approaches to theory building. J. Manag. Inq. 27(3), 284\u2013300 (2017)","journal-title":"J. Manag. Inq."},{"key":"18_CR29","volume-title":"Case Study Research and Applications: Design and Methods","author":"RK Yin","year":"2017","unstructured":"Yin, R.K.: Case Study Research and Applications: Design and Methods, 6th edn. SAGE Publications, Thousand Oaks (2017)","edition":"6"},{"issue":"4","key":"18_CR30","doi-asserted-by":"publisher","first-page":"532","DOI":"10.2307\/258557","volume":"14","author":"KM Eisenhardt","year":"1989","unstructured":"Eisenhardt, K.M.: Building theories from case study research. Acad. Manag. Rev. 14(4), 532\u2013550 (1989)","journal-title":"Acad. Manag. Rev."},{"issue":"1","key":"18_CR31","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1080\/21665095.2015.1026610","volume":"2","author":"R Heeks","year":"2015","unstructured":"Heeks, R., Stanforth, C.: Technological change in developing countries: opening the black box of process using actor\u2013network theory. Dev. Stud. Res. 2(1), 33\u201350 (2015)","journal-title":"Dev. Stud. Res."},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Hussein, S.S., et al.: Development and validation of Enterprise Architecture (EA) readiness assessment model. Int. J. Adv. Sci. Eng. Inf. Technol. 10(1) (2020)","DOI":"10.18517\/ijaseit.10.1.9007"},{"issue":"4","key":"18_CR33","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1002\/sej.1200","volume":"9","author":"R Amit","year":"2015","unstructured":"Amit, R., Zott, C.: Crafting business architecture: the antecedents of business model design. Strateg. Entrep. J. 9(4), 331\u2013350 (2015)","journal-title":"Strateg. Entrep. J."},{"issue":"2","key":"18_CR34","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.jsis.2004.02.002","volume":"13","author":"J Peppard","year":"2004","unstructured":"Peppard, J., Ward, J.: Beyond strategic information systems: towards an IS capability. J. Strateg. Inf. Syst. 13(2), 167\u2013194 (2004)","journal-title":"J. Strateg. Inf. Syst."},{"issue":"5","key":"18_CR35","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1108\/JMTM-09-2018-0305","volume":"31","author":"F Pirola","year":"2020","unstructured":"Pirola, F., Cimini, C., Pinto, R.: Digital readiness assessment of Italian SMEs: a case-study research. J. Manuf. Technol. Manag. 31(5), 1045\u20131083 (2020)","journal-title":"J. Manuf. Technol. Manag."},{"issue":"2","key":"18_CR36","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1177\/0268396218816273","volume":"34","author":"S Kotusev","year":"2019","unstructured":"Kotusev, S.: Enterprise architecture and enterprise architecture artifacts: questioning the old concept in light of new findings. J. Inf. Technol. 34(2), 102\u2013128 (2019)","journal-title":"J. Inf. Technol."},{"issue":"2","key":"18_CR37","first-page":"146","volume":"9","author":"D Ori","year":"2014","unstructured":"Ori, D.: Misalignment symptom analysis based on enterprise architecture model assessment. IADIS Int. J. Comput. Sci. Inf. Syst. 9(2), 146\u2013158 (2014)","journal-title":"IADIS Int. J. Comput. Sci. Inf. Syst."},{"key":"18_CR38","doi-asserted-by":"publisher","DOI":"10.5220\/0011030800003179","volume-title":"Assessing Business Architecture Readiness in Organisations","author":"T Iyamu","year":"2022","unstructured":"Iyamu, T., Shaanika, I.: Assessing Business Architecture Readiness in Organisations. SciTePress, Set\u00fabal (2022)"},{"issue":"2","key":"18_CR39","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.jsis.2018.03.001","volume":"27","author":"G Shanks","year":"2018","unstructured":"Shanks, G., et al.: Achieving benefits with enterprise architecture. J. Strateg. Inf. Syst. 27(2), 139\u2013156 (2018)","journal-title":"J. Strateg. Inf. Syst."},{"key":"18_CR40","doi-asserted-by":"crossref","unstructured":"Hendrickx, H.H.M., et al.: Defining the business architecture profession. In: 2011 IEEE 13th Conference on Commerce and Enterprise Computing (2011)","DOI":"10.1109\/CEC.2011.55"},{"key":"18_CR41","series-title":"Intelligent Systems Reference Library","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-030-49640-1_11","volume-title":"Architecting the Digital Transformation","author":"V \u0158epa","year":"2021","unstructured":"\u0158epa, V., Svato\u0161, O.: Adaptive and resilient business architecture for the digital age. In: Zimmermann, A., Schmidt, R., Jain, L.C. (eds.) Architecting the Digital Transformation. ISRL, vol. 188, pp. 199\u2013221. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-49640-1_11"},{"issue":"3","key":"18_CR42","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319\u2013340 (1989)","journal-title":"MIS Q."},{"key":"18_CR43","doi-asserted-by":"crossref","unstructured":"Rakgoale, M.A., Mentz, J.C.: Proposing a measurement model to determine enterprise architecture success as a feasible mechanism to align business and IT. In: 2015 International Conference on Enterprise Systems (ES) (2015)","DOI":"10.1109\/ES.2015.29"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-39386-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T15:17:14Z","timestamp":1690471034000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-39386-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031393853","9783031393860"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-39386-0_18","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"28 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Enterprise Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iceis.scitevents.org\/?y=2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"197","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}