{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:34:16Z","timestamp":1758267256416},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,1,18]],"date-time":"2013-01-18T00:00:00Z","timestamp":1358467200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s10270-012-0307-3","type":"journal-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T12:51:49Z","timestamp":1358427109000},"page":"1417-1445","source":"Crossref","is-referenced-by-count":21,"title":["An architecture framework for enterprise IT service availability analysis"],"prefix":"10.1007","volume":"13","author":[{"given":"Ulrik","family":"Franke","sequence":"first","affiliation":[]},{"given":"Pontus","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Johan","family":"K\u00f6nig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,18]]},"reference":[{"key":"307_CR1","unstructured":"Object constraint language, version 2.2. Technical report, Object Management Group, OMG, February 2010. http:\/\/www.omg.org\/spec\/OCL\/2.2 . OMG Document Number: formal\/2010-02-01"},{"key":"307_CR2","unstructured":"Aier, S., Buckl, S., Franke, U., Gleichauf, B., Johnson, P., N\u00e4rman, P., Schweda, C.M., Ullberg, J.: A survival analysis of application life spans based on enterprise architecture models. In: 3rd International Workshop on Enterprise Modelling and Information Systems Architectures, pp. 141\u2013154 (2009)"},{"key":"307_CR3","unstructured":"Ask\u00e5ker, J., Kulle, M.: Miljardaff\u00e4rer gick f\u00f6rlorade. Dagens Industri, 4 June 2008, pp. 6\u20137 (in Swedish)"},{"issue":"1","key":"307_CR4","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"307_CR5","doi-asserted-by":"crossref","unstructured":"Bernardi, S., Merseguer, J.: A UML profile for dependability analysis of real-time embedded systems. In: Proceedings of the 6th International Workshop on Software and performance, pp. 115\u2013124. ACM, New York (2007)","DOI":"10.1145\/1216993.1217012"},{"key":"307_CR6","doi-asserted-by":"crossref","unstructured":"Bocciarelli, P., D\u2019Ambrogio, A.: A model-driven method for describing and predicting the reliability of composite services. Softw. Syst. Model. 10:265\u2013280 (2011). ISSN: 1619\u20131366. doi: 10.1007\/s10270-010-0150-3","DOI":"10.1007\/s10270-010-0150-3"},{"key":"307_CR7","doi-asserted-by":"crossref","unstructured":"Buschle, M., Ullberg, J., Franke, U., Lagerstr\u00f6m, R., Sommestad, T.: A tool for enterprise architecture analysis using the PRM formalism. In: CAiSE2010 Forum PostProceedings, Oct 2010","DOI":"10.1007\/978-3-642-17722-4_8"},{"key":"307_CR8","unstructured":"Buschle, M., Holm, H., Sommestad, T., Ekstedt, M., Shahzad, K.: A tool for automatic enterprise architecture modeling. In: Proceedings of the CAiSE Forum 2011, 25\u201332 (2011)"},{"key":"307_CR9","unstructured":"Charette, R.: Bank of America Suffered Yet Another Online Banking Outage. http:\/\/spectrum.ieee.org\/riskfactor\/telecom\/internet\/bank-of-america-suffered-yet-another-online-banking-outage . Accessed Jan 2011. IEEE Spectrum \u201cRisk factor\u201d blog"},{"key":"307_CR10","doi-asserted-by":"crossref","unstructured":"Cortellessa, V., Pompei, A.: Towards a UML profile for qos: a contribution in the reliability domain. In: ACM SIGSOFT Software Engineering Notes, vol. 29, pp. 197\u2013206. ACM, New York (2004)","DOI":"10.1145\/974043.974076"},{"key":"307_CR11","unstructured":"Cortellessa, V., Singh, H., Cukic, B.: Early reliability assessment of UML based software models. In: Proceedings of the 3rd International Workshop on Software and Performance, WOSP \u201902, pp. 302\u2013309. ACM, New York (2002). ISBN: 1-58113-563-7. http:\/\/doi.acm.org\/10.1145\/584369.584415"},{"key":"307_CR12","doi-asserted-by":"crossref","unstructured":"Forbus, K.D.: Chapter 9 qualitative modeling. In: van Harmelen, V.L.F., Bruce P. (eds.) Handbook of Knowledge Representation. Foundations of Artificial Intelligence, vol. 3, pp. 361\u2013393. Elsevier, Amsterdam (2008). doi: 10.1016\/S1574-6526(07)03009-X . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S157465260703009X","DOI":"10.1016\/S1574-6526(07)03009-X"},{"key":"307_CR13","doi-asserted-by":"crossref","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, pp. 319\u2013340 (1989)","DOI":"10.2307\/249008"},{"issue":"4","key":"307_CR14","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1755884.1772130","volume":"8","author":"D Durkee","year":"2010","unstructured":"Durkee, D.: Why cloud computing will never be free. Queue 8(4), 20 (2010)","journal-title":"Queue"},{"key":"307_CR15","doi-asserted-by":"crossref","unstructured":"Ekstedt, M., Franke, U., Johnson, P., Lagerstr\u00f6m, R., Sommes- tad, T., Ullberg, J., Buschle, M.: A tool for enterprise architecture analysis of maintainability. In: Proceedings of the 13th European Conference on Software Maintenance and Reengineering (2009)","DOI":"10.1109\/CSMR.2009.44"},{"key":"307_CR16","unstructured":"Ericson, C.: Fault tree analysis\u2014a history. In: 17th International System Safety Conference (1999)"},{"key":"307_CR17","doi-asserted-by":"crossref","unstructured":"Franke, U., Johnson, P., K\u00f6nig, J., von W\u00fcrtemberg, L.V.: Availability of enterprise IT systems: an expert-based Bayesian framework. Softw. Qual. J. 20, 369\u2013394 (2011). ISSN: 0963\u20139314. doi: 10.1007\/s11219-011-9141-z","DOI":"10.1007\/s11219-011-9141-z"},{"key":"307_CR18","unstructured":"Gray, J.: Why Do Computers Stop and What Can Be Done About It? Technical report. Tandem Computers Inc., Cupertino (1985)"},{"key":"307_CR19","unstructured":"Henrion, M.: Some practical issues in constructing belief networks. In: Kanal, L.N., Levitt, T.S., Lemmer, J.F. (eds.) Uncertainty in Artificial Intelligence 3, pp. 161\u2013173. Elsevier Science Publishers B.V, North Holland (1989)"},{"key":"307_CR20","unstructured":"Hillier, F.S., Lieberman, G.J.: Introduction to Operations Resea- rch, 8th edn. McGraw-Hill, New York (2005)"},{"key":"307_CR21","unstructured":"Hochstein, A., Tamm, G., Brenner, W.: Service-oriented it management: benefit, cost and success factors. In: Proceedings of the 13th European Conference on Information Systems (ECIS), Regensburg (2005)"},{"key":"307_CR22","unstructured":"Holub, E.: Embracing ITSM to Build a Customer Service Provider Culture in IT I &O. Inc, Technical Report, Gartner (2009)"},{"key":"307_CR23","unstructured":"IBM Global Services: Improving systems availability. Technical Report, IBM Global Services (1998)"},{"key":"307_CR24","doi-asserted-by":"crossref","unstructured":"Immonen, A.: A method for predicting reliability and availability at the architecture level. In: K\u00e4k\u00f6la, T., Duenas, J.C. (eds.) Software Product Lines, pp. 373\u2013422. Springer, Berlin (2006). ISBN: 978-3-540-33253-4. doi: 10.1007\/978-3-540-33253-4_10","DOI":"10.1007\/978-3-540-33253-4_10"},{"key":"307_CR25","doi-asserted-by":"crossref","unstructured":"Irani, Z., Marinos T., Love, P.E.D.: The impact of enterprise application integration on information system lifecycles. Inf. Manag. 41(2), 177\u2013187 (2003). ISSN: 0378\u20137206. doi: 10.1016\/S0378-7206(03)00046-6 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0378720603000466","DOI":"10.1016\/S0378-7206(03)00046-6"},{"key":"307_CR26","unstructured":"Johnson, P.: Enterprise Software System Integration: An Architectural Perspective. PhD thesis, Royal Institute of Technology (KTH) (2002)"},{"key":"307_CR27","doi-asserted-by":"crossref","unstructured":"Johnson, P., Johansson, E., Sommestad, T., Ullberg, J.: A tool for enterprise architecture analysis. In: Proceedings of the 11th IEEE International Enterprise Computing Conference (EDOC 2007) (2007)","DOI":"10.1109\/EDOC.2007.25"},{"key":"307_CR28","doi-asserted-by":"crossref","unstructured":"Johnson, P., Lagerstr\u00f6m, R., N\u00e4rman, P., Simonsson, M.: Enterprise architecture analysis with extended influence diagrams. Inf. Syst. Frontiers 9(2), (2007)","DOI":"10.1007\/s10796-007-9030-y"},{"key":"307_CR29","doi-asserted-by":"crossref","unstructured":"Johnson, P., Ullberg, J., Buschle, M., Shahzad, K., Franke, U.: P $$^2$$ AMF: Predictive, Probabilistic Architecture Modeling Framework (2012, Submitted manuscript)","DOI":"10.1007\/978-3-642-36796-0_10"},{"key":"307_CR30","unstructured":"Jordan, D., Evdemon, J., Alves, A., Arkin, A., Askary, S., Barreto, C., Bloch, B., Curbera, F., Ford, M., Goland, Y. et al.: Web services business process execution language version 2.0. Technical Report, OASIS"},{"key":"307_CR31","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-01310-2","volume-title":"Enterprise Architecture at Work: Modelling, Communication and Analysis","author":"M Lankhorst","year":"2009","unstructured":"Lankhorst, M.: Enterprise Architecture at Work: Modelling, Communication and Analysis. Springer, New York (2009)"},{"key":"307_CR32","doi-asserted-by":"crossref","unstructured":"Lankhorst, M.M., Proper, H.A., Jonkers, H.: The architecture of the archimate language, pp. 367\u2013380. Enterprise, Business-Process and Information Systems Modeling (2009)","DOI":"10.1007\/978-3-642-01862-6_30"},{"key":"307_CR33","unstructured":"Leangsuksun, C., Song, H., Shen, L.: Reliability modeling using UML. In: Proceeding of the 2003 International Conference on Software Engineering Research and, Practice (2003)"},{"key":"307_CR34","unstructured":"Liang, Y.H.: Analyzing and forecasting the reliability for repairable systems using the time series decomposition method. Int. J. Qual. Reliabil. Manag. 28(3), 317\u2013327 (2011). ISSN: 0265\u2013671X"},{"key":"307_CR35","doi-asserted-by":"crossref","unstructured":"Majzik, I., Pataricza, A., Bondavalli, A.: Stochastic dependability analysis of system architecture based on UML models. In: de Lemos, R., Gacek, C., Romanovsky, A. (eds.) Architecting Dependable Systems. Lecture Notes in Computer Science, vol. 2677, pp. 219\u2013244. Springer, Berlin (2003). doi: 10.1007\/3-540-45177-3_10","DOI":"10.1007\/3-540-45177-3_10"},{"key":"307_CR36","unstructured":"Malik, B., Scott, D.: How to Calculate the Cost of Continuously Available IT Services. Inc. Technical Report, Gartner (2010)"},{"key":"307_CR37","unstructured":"Marcus, E., Stern, H.: Blueprints for High Availability, 2nd edn. Wiley, Indianapolis (2003)"},{"key":"307_CR38","doi-asserted-by":"crossref","unstructured":"Marrone, M., Kiessling, M., Kolbe, L.M.: Are we really innovating? An exploratory study on innovation management and service management. In: IEEE International Conference on Management of Innovation and Technology (ICMIT), 2010, pp. 378\u2013383 (2010). doi: 10.1109\/ICMIT.2010.5492719","DOI":"10.1109\/ICMIT.2010.5492719"},{"key":"307_CR39","doi-asserted-by":"crossref","unstructured":"Marrone, M., Kolbe, L.: Uncovering ITIL claims: IT executives perception on benefits and business-IT alignment. In: Information Systems and E-Business Management, pp. 1\u201318 (2010). ISSN: 1617-9846. doi: 10.1007\/s10257-010-0131-7","DOI":"10.1007\/s10257-010-0131-7"},{"key":"307_CR40","unstructured":"Milanovic, N.: Models, Methods and Tools for Availability Assessment of IT-Services and Business Processes. Universit\u00e4tsbibliothek, Habilitationsschrift (2010)"},{"key":"307_CR41","doi-asserted-by":"crossref","unstructured":"N\u00e4rman, P., Franke, U., K\u00f6nig, J., Buschle, M., Ekstedt, M.: Enterprise architecture availability analysis using fault trees and stakeholder interviews. Enterp. Inf. Syst. (2011, to appear)","DOI":"10.1080\/17517575.2011.647092"},{"key":"307_CR42","doi-asserted-by":"crossref","unstructured":"Onisko, A., Druzdzel, M.J., Wasyluk, H.: Learning bayesian network parameters from small data sets: application of noisy-or gates. Int. J. Approx. Reason. 27(2), 165\u2013182 (2001). ISSN: 0888\u2013613X. doi: 10.1016\/S0888-613X(01)00039-1","DOI":"10.1016\/S0888-613X(01)00039-1"},{"key":"307_CR43","unstructured":"Oppenheimer, D.: Why do internet services fail, and what can be done about it? In: Proceedings of USITS 03: 4th USENIX Symposium on Internet Technologies and Systems (2003)"},{"key":"307_CR44","unstructured":"\u00d6sterlind, M.: Validering av verktyget \u201cEnterprise Architecture Analysis Tool\u201d. Master\u2019s thesis, Royal Institute of Technology (KTH) (2011)"},{"key":"307_CR45","unstructured":"Pertet, S., Narasimhan, P.: Causes of failure in web applications. Technical Report, Parallel Data Laboratory, Carnegie Mellon University, CMU-PDL-05-109 (2005)"},{"key":"307_CR46","unstructured":"Phelan, P., Prior, D.: Additional Tools for a World-Class ERP Infrastructure. Technical Report, Gartner, Inc. (2011)"},{"key":"307_CR47","unstructured":"Rausand, M., H\u00f8yland, A.: System Reliability Theory: Models, Statistical Methods, and Applications, 2nd edn. Wiley, Hoboken (2004). http:\/\/www.ntnu.no\/ross\/srt"},{"key":"307_CR48","unstructured":"Rodrigues, G.N.: A Model Driven Approach for Software Reliability Prediction. PhD thesis, University College London (2008)"},{"issue":"2","key":"307_CR49","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/TR.1987.5222336","volume":"36","author":"RA Sahner","year":"1987","unstructured":"Sahner, R.A., Trivedi, K.S.: Reliability modeling using sharpe. IEEE Trans. Reliabil. 36(2), 186\u2013193 (1987)","journal-title":"IEEE Trans. Reliabil."},{"key":"307_CR50","unstructured":"Scott, D.: Benchmarking Your IT Service Availability Levels. Technical Report, Gartner, Inc. (2011)"},{"key":"307_CR51","doi-asserted-by":"crossref","unstructured":"Singh, H., Cortellessa, V., Cukic, B., Gunel, E., Bharadwaj, V.: A bayesian approach to reliability prediction and assessment of component based systems. In: Software Reliability Engineering, 2001. ISSRE 2001. In: Proceedings of the 12th International Symposium, pp. 12\u201321 (2001). doi: 10.1109\/ISSRE.2001.989454","DOI":"10.1109\/ISSRE.2001.989454"},{"key":"307_CR52","unstructured":"Sundkvist, F.: Efter haveriet: Tieto granskas. Computer Sweden (2012, in Swedish)"},{"key":"307_CR53","unstructured":"Taylor, S., Cannon, D., Wheeldon, D.: Service Operation (ITIL). The Stationery Office, TSO (2007a). ISBN: 9780113310463"},{"key":"307_CR54","unstructured":"Taylor, S., Case, G., Spalding, G.: Continual Service Improvement (ITIL). The Stationery Office, TSO (2007b). ISBN: 9780113310494"},{"key":"307_CR55","unstructured":"Taylor, S., Iqbal, M., Nieves, M.: Service Strategy (ITIL). The Stationery Office, TSO (2007c). ISBN: 9780113310456"},{"key":"307_CR56","unstructured":"Taylor, S., Lacy, S., Macfarlane, I.: Service Transition (ITIL). The Stationery Office, TSO (2007d). ISBN: 9780113310487"},{"key":"307_CR57","unstructured":"Taylor, S., Lloyd, V., Rudd, C.: Service Design (ITIL). The Stationery Office, TSO (2007e). ISBN: 978011310470"},{"key":"307_CR58","unstructured":"The Open Group: Archimate 1.0 specification. http:\/\/www.opengroup.org\/archimate\/doc\/ts_archimate\/ (2009)"},{"key":"307_CR59","doi-asserted-by":"crossref","unstructured":"Ullberg, J., Franke, U., Buschle, M., Johnson, P.: A tool for interoperability analysis of enterprise architecture models using pi-OCL. In: Proceedings of the International Conference on Interoperability for Enterprise Software and Applications (I-ESA) (2010)","DOI":"10.1007\/978-1-84996-257-5_8"},{"key":"307_CR60","doi-asserted-by":"crossref","unstructured":"Van Buuren, R., Jonkers, H., Iacob, M.E., Strating, P.: Composition of relations in enterprise architecture models. Graph Transformations, pp. 183\u2013186 (2004)","DOI":"10.1007\/978-3-540-30203-2_5"},{"key":"307_CR61","doi-asserted-by":"crossref","unstructured":"Varian, H.: System reliability and free riding. In: Camp, L., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol. 12, pp. 1\u201315. Springer US, New York (2004). ISBN: 978-1-4020-8090-6. doi: 10.1007\/1-4020-8090-5_1","DOI":"10.1007\/1-4020-8090-5_1"},{"key":"307_CR62","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5537-7","volume-title":"Timed Petri nets: theory and application","author":"J Wang","year":"1998","unstructured":"Wang, J.: Timed Petri nets: theory and application, vol. 39. Kluwer Academic Publishers, Norwell (1998)"},{"key":"307_CR63","doi-asserted-by":"crossref","unstructured":"Zambon, E., Etalle, S., Wieringa, R., Hartel, P.: Model-based qualitative risk assessment for availability of it infrastructures. Softw. Syst. Model., pp. 1\u201328 (2010). ISSN: 1619-1366. doi: 10.1007\/s10270-010-0166-8","DOI":"10.1007\/s10270-010-0166-8"},{"key":"307_CR64","doi-asserted-by":"crossref","unstructured":"Zhang, X., Pham, H.: An analysis of factors affecting software reliability. J. Syst. Softw. 50(1), 43\u201356 (2000). ISSN: 0164-1212. doi: 10.1016\/S0164-1212(99)00075-8","DOI":"10.1016\/S0164-1212(99)00075-8"}],"container-title":["Software &amp; Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-012-0307-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10270-012-0307-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-012-0307-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,6]],"date-time":"2022-02-06T03:59:56Z","timestamp":1644119996000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10270-012-0307-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,18]]},"references-count":64,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["307"],"URL":"https:\/\/doi.org\/10.1007\/s10270-012-0307-3","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"value":"1619-1366","type":"print"},{"value":"1619-1374","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,18]]}}}