{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:05:10Z","timestamp":1725714310499},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642366109"},{"type":"electronic","value":"9783642366116"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36611-6_2","type":"book-chapter","created":{"date-parts":[[2013,1,29]],"date-time":"2013-01-29T20:00:56Z","timestamp":1359489656000},"page":"18-34","source":"Crossref","is-referenced-by-count":4,"title":["IT Landscape Management Using Network Analysis"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Simon","sequence":"first","affiliation":[]},{"given":"Kai","family":"Fischbach","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"The Open Group: TOGAF Version 9. Van Haren Publishing, Netherlands (2009)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Gharajedaghi, J.: Systems Thinking: Managing Chaos and Complexity, A Platform for Designing Business Architecture. Morgan Kaufmann, USA (2011)","DOI":"10.1016\/B978-0-12-385915-0.00009-X"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Bernus, P., Schmidt, G.: Architectures of information systems. In: Bernus, P., Mertins, K., Schmidt, G. (eds.) Handbook on Architectures of Information Systems. Springer (2006)","DOI":"10.1007\/b137905"},{"key":"2_CR4","unstructured":"International Organization for Standardization, ISO\/IEC\/IEEE 42010:2011, Systems and software engineering \u2013 Architecture description, http:\/\/www.iso-architecture.org\/42010\/"},{"key":"2_CR5","volume-title":"From enterprise architecture to IT governance","author":"K.D. Niemann","year":"2006","unstructured":"Niemann, K.D.: From enterprise architecture to IT governance. Vieweg, Wiesbaden (2006)"},{"issue":"4","key":"2_CR6","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1365\/s11576-008-0062-9","volume":"50","author":"S. Aier","year":"2008","unstructured":"Aier, S., Riege, C., Winter, R.: Unternehmensarchitektur \u2013 Literatur\u00fcberblick und Stand der Praxis. Wirtschaftsinformatik\u00a050(4), 292\u2013304 (2008)","journal-title":"Wirtschaftsinformatik"},{"issue":"6","key":"2_CR7","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1177\/016555150202800601","volume":"28","author":"E. Otte","year":"2002","unstructured":"Otte, E., Rousseau, R.: Social network analysis: a powerful strategy, also for the information sciences. J. Inf. Sci.\u00a028(6), 441\u2013453 (2002)","journal-title":"J. Inf. Sci."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Dreyfus, D., Iyer, B.: Architectural control and emergent architecture: a network perspective. Boston University Working Paper (2005)","DOI":"10.1109\/HICSS.2006.155"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Dreyfus, D., Iyer, B.: Enterprise Architecture: A Social Network Perspective. In: 39th HICSS (2006)","DOI":"10.1109\/HICSS.2006.155"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Iyer, B., Dreyfus, D., Gyllstrom, P.: A Network-based View of Enterprise Architecture. In: Saha, P. (ed.) Handbook of Enterprise Systems Architecture in Practice. IGI Global (2007)","DOI":"10.4018\/978-1-59904-189-6.ch018"},{"key":"2_CR11","unstructured":"Dreyfus, D., Wyner, G.M.: Digital Cement: Software Portfolio Architecture, Complexity, and Flexibility. In: 17th AMCIS (2011)"},{"key":"2_CR12","unstructured":"Aier, S., Sch\u00f6nherr, M.: Integrating an enterprise architecture using domain clustering. In: Trends in Enterprise Architecture Research 2007, pp. 23\u201330 (2007)"},{"key":"2_CR13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.17705\/1CAIS.02603","volume":"26","author":"D. Simon","year":"2010","unstructured":"Simon, D., Fischbach, K., Schoder, D.: Application Portfolio Management \u2013 An Integrated Framework and a Software Tool Evaluation Approach. CAIS\u00a026, 35\u201356 (2010)","journal-title":"CAIS"},{"key":"2_CR14","unstructured":"Mocker, M.: What is complex about 273 applications? Untangling application architecture complexity in a case of European Investment Banking. In: 42nd HICSS (2009)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods & Applications. CUP (1994)","DOI":"10.1017\/CBO9780511815478"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Freeman, L.C.: Centrality in Social Networks. Soc. Netw.\u00a01, 215\u2013239 (1978\/1979)","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/j.socnet.2007.04.002","volume":"29","author":"P. Bonacich","year":"2007","unstructured":"Bonacich, P.: Some unique properties of eigenvector centrality. Soc. Netw.\u00a029, 555\u2013564 (2007)","journal-title":"Soc. Netw."},{"issue":"23","key":"2_CR18","doi-asserted-by":"publisher","first-page":"8577","DOI":"10.1073\/pnas.0601602103","volume":"103","author":"M.E.J. Newman","year":"2006","unstructured":"Newman, M.E.J.: Modularity and community structure in networks. Natl. Academy Sci.\u00a0103(23), 8577\u20138582 (2006)","journal-title":"Natl. Academy Sci."},{"issue":"2","key":"2_CR19","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1086\/432782","volume":"111","author":"B. Uzzi","year":"2005","unstructured":"Uzzi, B., Spiro, J.: Collaboration and Creativity: The Small World Problem. American J. Sociology\u00a0111(2), 447\u2013504 (2005)","journal-title":"American J. Sociology"},{"key":"2_CR20","unstructured":"Webster, J., Watson, R.T.: Analyzing the Past to Prepare for the Future. MIS Q 26 (2002)"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1177\/2345678906292430","volume":"1","author":"C. Teddlie","year":"2007","unstructured":"Teddlie, C., Yu, F.: Mixed Methods Sampling: A Typology with Examples. J. Mixed Methods Res.\u00a01, 77\u2013100 (2007)","journal-title":"J. Mixed Methods Res."},{"key":"2_CR22","volume-title":"Controlling software projects","author":"T. Marco De","year":"1982","unstructured":"De Marco, T.: Controlling software projects. Yourdon Press, New York (1982)"},{"key":"2_CR23","unstructured":"Buckl, S., Ernst, A.M., Lankes, J., Matthes, F., Schweda, C.M.: State of the Art in Enterprise Architecture Management. TU Munich, Chair for Informatics 19, Germany (2009)"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Buckl, S., Ernst, A.M., Lankes, J., Matthes, F.: Enterprise Architecture Management Pattern Catalog. TU Munich, Chair for Informatics 19, Germany (2008)","DOI":"10.1109\/EDOC.2008.75"},{"key":"2_CR25","first-page":"517","volume":"27","author":"W.A.G. Bruls","year":"2010","unstructured":"Bruls, W.A.G., van Steenbergen, M., Foorthuis, R.M., Bos, R., Brinkkemper, S.: Domain Architectures as an Instrument to Refine Enterprise Architecture. CAIS\u00a027, 517\u2013540 (2010)","journal-title":"CAIS"},{"key":"2_CR26","unstructured":"Vasconcelos, A., Sousa, P., Tribolet, J.: Information System Architecture Evaluation: From Software to Enterprise Level Approaches. In: 12th Eur. Conf. on IT Evaluation (2005)"},{"key":"2_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05034-3","volume-title":"Strategic IT Management","author":"I. Hanschke","year":"2010","unstructured":"Hanschke, I.: Strategic IT Management. Springer, Berlin (2010)"},{"issue":"1","key":"2_CR28","first-page":"91","volume":"10","author":"A. Vasconcelos","year":"2007","unstructured":"Vasconcelos, A., Sousa, P., Tribolet, J.: Information System Architecture Metrics: an Enterprise Engineering Evaluation approach. Electron J. Inf. Syst. Eval.\u00a010(1), 91\u2013122 (2007)","journal-title":"Electron J. Inf. Syst. Eval."},{"key":"2_CR29","unstructured":"OGC: Managing Successful Projects with PRINCE 2. The Stationery Office Ltd. (2009)"},{"key":"2_CR30","doi-asserted-by":"crossref","first-page":"29","DOI":"10.17705\/1CAIS.01402","volume":"14","author":"S.A. Sherer","year":"2004","unstructured":"Sherer, S.A., Alter, S.: Information Systems Risks and Risk Factors: Are They Mostly about Information Systems? CAIS\u00a014, 29\u201364 (2004)","journal-title":"CAIS"},{"key":"2_CR31","unstructured":"BSI, Bundesamt f\u00fcr Sicherheit in der Informationstechnik, https:\/\/www.bsi.bund.de"},{"key":"2_CR32","volume-title":"Beating IT Risks","author":"E. Jordan","year":"2005","unstructured":"Jordan, E., Silcock, L.: Beating IT Risks. Wiley, Hoboken (2005)"},{"key":"2_CR33","volume-title":"IT Portfolio Management Step-by-Step","author":"B. Maizlish","year":"2005","unstructured":"Maizlish, B., Handler, R.: IT Portfolio Management Step-by-Step. Wiley, Hoboken (2005)"},{"issue":"2","key":"2_CR34","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/17517575.2011.625571","volume":"6","author":"D. Quartel","year":"2012","unstructured":"Quartel, D., Steen, M.W.A., Lankhorst, M.: Application and project portfolio valuation using EA and business requirements modelling. Enterp. Inf. Syst.\u00a06(2), 189\u2013213 (2012)","journal-title":"Enterp. Inf. Syst."},{"key":"2_CR35","unstructured":"Saat, J.: Zeitbezogene Abh\u00e4ngigkeitsanalysen der Unternehmensarchitektur. In: MKWI 2010, pp. 119\u2013130 (2010)"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"J\u00f6nsson, P.: The Anatomy \u2013 An Instrument for Managing Software Evolution and Evolvability. In: 2nd Int. Workshop on Softw. Evolvability, pp. 31\u201337 (2006)","DOI":"10.1109\/SOFTWARE-EVOLVABILITY.2006.15"},{"key":"2_CR37","unstructured":"Buckl, S., Ernst, A.M., Matthes, F., Schulz, C., Schweda, C.M.: Constructing an Enterprise-specific Radar System for Assisted Project Surveillance. In: MSI 2009, pp. 33\u201347 (2009)"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Zimmermann, T., Nagappan, N.: Predicting defects using network analysis on dependency graphs. In: 30th Int. Conf. on Softw. Engineering, pp. 531\u2013540 (2008)","DOI":"10.1145\/1368088.1368161"},{"key":"2_CR39","unstructured":"Schelp, J., Stutz, M.: A Balanced Scorecard Approach to Measure the Value of Enterprise Architecture. In: Trends in Enterprise Architecture Research 2007, pp. 5\u201311 (2007)"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Bastian, M., Heymann, S., Jacomy, M.: Gephi: An Open Source Software for Exploring and Manipulating Networks. In: Int. Conf. on Weblogs & Social Media, pp. 361\u2013362 (2009)","DOI":"10.1609\/icwsm.v3i1.13937"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise Information Systems of the Future"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36611-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T21:28:52Z","timestamp":1687987732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36611-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642366109","9783642366116"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36611-6_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2013]]}}}