{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:00:42Z","timestamp":1743004842419,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319494531"},{"type":"electronic","value":"9783319494548"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49454-8_3","type":"book-chapter","created":{"date-parts":[[2016,11,12]],"date-time":"2016-11-12T02:26:20Z","timestamp":1478917580000},"page":"37-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of Enterprise Architecture Evolution Using Markov Decision Processes"],"prefix":"10.1007","author":[{"given":"S\u00e9rgio","family":"Guerreiro","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Gaaloul","sequence":"additional","affiliation":[]},{"given":"Ulrik","family":"Franke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,13]]},"reference":[{"key":"3_CR1","series-title":"The Enterprise Engineering Series","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29651-2","volume-title":"Enterprise Architecture at Work \u2013 Modelling, Communication and Analysis","author":"MM Lankhorst","year":"2013","unstructured":"Lankhorst, M.M.: Enterprise Architecture at Work \u2013 Modelling, Communication and Analysis. The Enterprise Engineering Series, 4th edn. Springer, Berlin (2013)","edition":"4"},{"key":"3_CR2","series-title":"Enterprise Engineering Series","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-20279-7","volume-title":"Architecture Principles \u2013 The Cornerstones of Enterprise Architecture","author":"D Greefhorst","year":"2011","unstructured":"Greefhorst, D., Proper, H.A.: Architecture Principles \u2013 The Cornerstones of Enterprise Architecture. Enterprise Engineering Series. Springer, Heidelberg (2011)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Gaaloul, K., Guerreiro, S.: A decision-oriented approach supporting enterprise architecture evolution. In: 2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 116\u2013121. IEEE (2015a)","DOI":"10.1109\/WETICE.2015.33"},{"issue":"1","key":"3_CR4","first-page":"58","volume":"5","author":"S Aier","year":"2010","unstructured":"Aier, S., Gleichauf, B.: Application of enterprise models for engineering enterprise transformation. Enterp. Model. Inf. Syst. Architect. 5(1), 58\u201375 (2010)","journal-title":"Enterp. Model. Inf. Syst. Architect."},{"key":"3_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-33149-2","volume-title":"Enterprise Ontology: Theory and Methodology","author":"JL Dietz","year":"2006","unstructured":"Dietz, J.L.: Enterprise Ontology: Theory and Methodology. Springer, Berlin (2006)"},{"key":"3_CR6","unstructured":"Roth, S., Hauder, M., Matthes, F.: A tool for collaborative evolution of enterprise architecture models at runtime. In: 8th International Workshop on Models at Runtime, Miami, USA. IEEE Computer Society (2013)"},{"key":"3_CR7","unstructured":"Bernard, S.A.: An Introduction to Enterprise Architecture: 3rd edn. Published by AuthorHouse (2012)"},{"key":"3_CR8","unstructured":"TOGAF: The Open Group \u2013 TOGAF Version 9. Van Haren Publishing, Zaltbommel (2009)"},{"issue":"1","key":"3_CR9","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75\u2013105 (2004)","journal-title":"MIS Q."},{"issue":"5","key":"3_CR10","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1057\/ejis.2008.44","volume":"17","author":"R Winter","year":"2008","unstructured":"Winter, R.: Design science research in Europe. Eur. J. Inf. Syst. 17(5), 470\u2013475 (2008)","journal-title":"Eur. J. Inf. Syst."},{"issue":"2\u20133","key":"3_CR11","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10796-007-9030-y","volume":"9","author":"P Johnson","year":"2007","unstructured":"Johnson, P., Lagerstr\u00f6m, R., N\u00e4rman, P., Simonsson, M.: Enterprise architecture analysis with extended influence diagrams. Inf. Syst. Front. 9(2\u20133), 163\u2013180 (2007)","journal-title":"Inf. Syst. Front."},{"issue":"6","key":"3_CR12","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.cose.2010.02.002","volume":"29","author":"T Sommestad","year":"2010","unstructured":"Sommestad, T., Ekstedt, M., Johnson, P.: A probabilistic relational model for security risk analysis. Comput. Secur. 29(6), 659\u2013679 (2010)","journal-title":"Comput. Secur."},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"N\u00e4rman, P., Buschle, M., K\u00f6nig, J., Johnson, P.: Hybrid probabilistic relational models for system quality analysis. In: 2010 14th IEEE International Enterprise Distributed Object Computing Conference (EDOC), pp. 57\u201366. IEEE, October 2010","DOI":"10.1109\/EDOC.2010.29"},{"issue":"4","key":"3_CR14","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s10257-014-0241-8","volume":"12","author":"P Johnson","year":"2014","unstructured":"Johnson, P., Ullberg, J., Buschle, M., Franke, U., Shahzad, K.: An architecture modeling framework for probabilistic prediction. Inf. Syst. e-Bus. Manag. 12(4), 595\u2013622 (2014)","journal-title":"Inf. Syst. e-Bus. Manag."},{"issue":"3","key":"3_CR15","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TEM.2010.2093146","volume":"58","author":"T Mikaelian","year":"2011","unstructured":"Mikaelian, T., Nightingale, D.J., Rhodes, D.H., Hastings, D.E.: Real options in enterprise architecture: a holistic mapping of mechanisms and types for uncertainty management. IEEE Trans. Eng. Manag. 58(3), 457\u2013470 (2011)","journal-title":"IEEE Trans. Eng. Manag."},{"key":"3_CR16","unstructured":"Quartel, D., Engelsman, W., Jonkers, H., Van Sinderen, M.: A goal-oriented requirements modelling language for enterprise architecture. In: IEEE International Enterprise Distributed Object Computing Conference, 2009, EDOC 2009, pp. 3\u201313. IEEE, September 2009"},{"key":"3_CR17","unstructured":"Stuart Rance: ITIL Service Transition. The Stationery Office (2011). ISBN 978-0113313068"},{"key":"3_CR18","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-25897-3_4","volume-title":"The Practice of Enterprise Modeling","author":"K Gaaloul","year":"2015","unstructured":"Gaaloul, K., Guerreiro, S.: A risk-based approach supporting enterprise architecture evolution. In: Ralyt\u00e9, J., Espa\u00f1a, S., Pastor, \u00d3. (eds.) PoEM 2015. LNBIP, vol. 235, pp. 43\u201356. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-25897-3_4"},{"key":"3_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-319-25897-3_20","volume-title":"The Practice of Enterprise Modeling","author":"A Bock","year":"2015","unstructured":"Bock, A.: The concepts of decision making: an analysis of classical approaches and avenues for the field of enterprise modeling. In: Ralyt\u00e9, J., Espa\u00f1a, S., Pastor, \u00d3. (eds.) PoEM 2015. LNBIP, vol. 235, pp. 306\u2013321. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-25897-3_20"},{"issue":"4","key":"3_CR20","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1007\/s10270-012-0307-3","volume":"13","author":"U Franke","year":"2014","unstructured":"Franke, U., Johnson, P., K\u00f6nig, J.: An architecture framework for enterprise IT service availability analysis. Softw. Syst. Model. 13(4), 1417\u20131445 (2014)","journal-title":"Softw. Syst. Model."},{"key":"3_CR21","unstructured":"Aier, S., Buckl, S., Franke, U., Gleichauf, B., Johnson, P., N\u00e4rman, P., Schweda C.M., Ullberg, J.: A survival analysis of application life spans based on enterprise architecture models. In: EMISA, pp. 141\u2013154 (2009)"},{"issue":"4","key":"3_CR22","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.aei.2005.01.005","volume":"18","author":"MM Lankhorst","year":"2004","unstructured":"Lankhorst, M.M., et al.: Enterprise architecture modelling\u2014the issue of integration. Adv. Eng. Inform. 18(4), 205\u2013216 (2004)","journal-title":"Adv. Eng. Inform."},{"issue":"3","key":"3_CR23","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"3","key":"3_CR24","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1147\/sj.403.0666","volume":"40","author":"RA Botha","year":"2001","unstructured":"Botha, R.A., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Syst. J. 40(3), 666\u2013682 (2001)","journal-title":"IBM Syst. J."},{"key":"3_CR25","volume-title":"Artificial Intelligence: A Modern Approach. Artificial Intelligence","author":"S Russell","year":"2010","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach. Artificial Intelligence, 3rd edn. Prentice Hall, Upper Saddle River (2010)","edition":"3"},{"key":"3_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316887","volume-title":"Markov Decision Processes: Discrete Stochastic Dynamic Programming","author":"ML Puterman","year":"1994","unstructured":"Puterman, M.L.: Markov Decision Processes: Discrete Stochastic Dynamic Programming. Wiley, New York (1994)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Guerreiro, S.: Decision-making in partially observable environments. In: 2014 IEEE 16th Conference on Business Informatics (CBI), vol. 1, pp. 159\u2013166 (2014)","DOI":"10.1109\/CBI.2014.15"},{"key":"3_CR28","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-19297-0_2","volume-title":"Advances in Enterprise Engineering IX","author":"S Guerreiro","year":"2015","unstructured":"Guerreiro, S.: Engineering the decision-making process using multiple Markov theories and DEMO. In: Aveiro, D., Pergl, R., Valenta, M. (eds.) EEWC 2015. LNBIP, vol. 211, pp. 19\u201333. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-19297-0_2"},{"issue":"2","key":"3_CR29","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s11219-011-9141-z","volume":"20","author":"U Franke","year":"2012","unstructured":"Franke, U., Johnson, P., K\u00f6nig, J., von W\u00fcrtemberg, L.M.: Availability of enterprise IT systems: an expert-based Bayesian framework. Softw. Qual. J. 20(2), 369\u2013394 (2012)","journal-title":"Softw. Qual. J."},{"issue":"1","key":"3_CR30","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1080\/17517575.2010.507878","volume":"5","author":"P N\u00e4rman","year":"2011","unstructured":"N\u00e4rman, P., Holm, H., Johnson, P., K\u00f6nig, J., Chenine, M., Ekstedt, M.: Data accuracy assessment using enterprise architecture. Enterp. Inf. Syst. 5(1), 37\u201358 (2011)","journal-title":"Enterp. Inf. Syst."},{"issue":"3","key":"3_CR31","doi-asserted-by":"crossref","first-page":"2","DOI":"10.19153\/cleiej.17.3.1","volume":"17","author":"D Ameller","year":"2014","unstructured":"Ameller, D., Franch, X.: Assisting software architects in architectural decision-making using quark. CLEI Electron. J. 17(3), 2 (2014)","journal-title":"CLEI Electron. J."},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"\u00d6sterlind, M., Johnson, P., Karnati, K., Lagerstr\u00f6m, R., V\u00e4lja, M.: Enterprise architecture evaluation using utility theory. In: 17th IEEE International Enterprise Distributed Object Computing Conference Workshops, Vancouver, BC, pp. 347\u2013351 (2013)","DOI":"10.1109\/EDOCW.2013.45"},{"key":"3_CR33","unstructured":"Guerreiro, S., Tribolet, J.: Conceptualizing enterprise dynamic systems control for run-time business transactions. In: European Conference on Information Systems (ECIS) 2013, paper 5 (2013)"},{"issue":"55","key":"3_CR34","first-page":"1041","volume":"34","author":"S Alter","year":"2014","unstructured":"Alter, S.: Theory of workarounds. Commun. Assoc. Inf. Syst. 34(55), 1041\u20131066 (2014)","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"1","key":"3_CR35","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1057\/ejis.2010.55","volume":"20","author":"H \u00d6sterle","year":"2011","unstructured":"\u00d6sterle, H., et al.: Memorandum on design-oriented information systems research. Eur. J. Inf. Syst. 20(1), 7\u201310 (2011)","journal-title":"Eur. J. Inf. Syst."}],"container-title":["Lecture Notes in Business Information Processing","Enterprise and Organizational Modeling and Simulation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49454-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T05:18:21Z","timestamp":1657689501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49454-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319494531","9783319494548"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49454-8_3","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"13 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EOMAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshop on Enterprise and Organizational Modeling and Simulation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ljubljana","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eomas2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.eomas-workshop.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}