{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:51:17Z","timestamp":1743151877045,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319258966"},{"type":"electronic","value":"9783319258973"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25897-3_4","type":"book-chapter","created":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T15:20:38Z","timestamp":1445959238000},"page":"43-56","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Risk-Based Approach Supporting Enterprise Architecture Evolution"],"prefix":"10.1007","author":[{"given":"Khaled","family":"Gaaloul","sequence":"first","affiliation":[]},{"given":"S\u00e9rgio","family":"Guerreiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,26]]},"reference":[{"unstructured":"The Open Group - TOGAF Version 9. Van Haren Publishing, Zaltbommel, The Netherlands (2009)","key":"4_CR1"},{"key":"4_CR2","series-title":"The Enterprise Engineering Series","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29651-2","volume-title":"Enterprise Architecture at Work - Modelling, Communication and Analysis","author":"MM Lankhorst","year":"2013","unstructured":"Lankhorst, M.M.: Enterprise Architecture at Work - Modelling, Communication and Analysis. The Enterprise Engineering Series, 4th edn. Springer, Heidelberg (2013)","edition":"4"},{"doi-asserted-by":"crossref","unstructured":"Gaaloul, K., El Kharbili, M., Proper, H.A.: Secure governance in enterprise architecture - access control perspective. In: IEEE, editor, The 3rd International Symposium ISKO-Maghreb, pp. 1\u20136, Marrakesh, Morocco (2013)","key":"4_CR3","DOI":"10.1109\/ISKO-Maghreb.2013.6728170"},{"unstructured":"ISO 31000. Risk management Principles and guidelines. International Organization for Standardization, Geneva (2009)","key":"4_CR4"},{"key":"4_CR5","volume-title":"Competences of IT Architects","author":"R Wieringa","year":"2008","unstructured":"Wieringa, R., van Eck, P., Steghuis, C., Proper, H.A.: Competences of IT Architects. Academic Service - SDU, The Hague (2008)"},{"unstructured":"Roth, S., Hauder, M., Matthes, F.: A tool for collaborative evolution of enterprise architecture models at runtime. In: 8th International Workshop on Models at Runtime, Miami, USA. IEEE Computer Society (2013)","key":"4_CR6"},{"doi-asserted-by":"crossref","unstructured":"Barateiro, J., Antunes, G., Borbinha, J.L.: Manage risks through the enterprise architecture. In: 45th Hawaii International Conference on System Science (HICSS), pp. 3297\u20133306. IEEE Computer Society (2012)","key":"4_CR7","DOI":"10.1109\/HICSS.2012.419"},{"doi-asserted-by":"crossref","unstructured":"Gaaloul, K., Guerreiro, S.: A decision-oriented approach supporting enterprise architecture evolution. In: The 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises WETICE, Larnaca, Cyprus, 15\u201317 June 2015. IEEE (2015)","key":"4_CR8","DOI":"10.1109\/WETICE.2015.33"},{"key":"4_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-33149-2","volume-title":"Enterprise Ontology: Theory and Methodology","author":"JLG Dietz","year":"2006","unstructured":"Dietz, J.L.G.: Enterprise Ontology: Theory and Methodology. Springer, Heidelberg (2006)"},{"unstructured":"ISO\/IEC Guide 73. Risk management Vocabulary Guidelines for use in standards, Geneva (2002)","key":"4_CR10"},{"unstructured":"ISO\/IEC 27005:2008. Information technology - Security techniques - Information security risk management (2008)","key":"4_CR11"},{"unstructured":"Mayer, N.: Model-based Management of Information System Security Risk. Ph.D. thesis, University of Namur (2009)","key":"4_CR12"},{"issue":"5","key":"4_CR13","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/1125944.1125976","volume":"49","author":"JLG Dietz","year":"2006","unstructured":"Dietz, J.L.G.: The deep structure of business processes. Commun. ACM 49(5), 58\u201364 (2006)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Guerreiro, S.: Decision-making in partially observable environments. In: 2014 IEEE 16th Conference on Business Informatics (CBI), vol. 1, pp. 159\u2013166, July 2014","key":"4_CR14","DOI":"10.1109\/CBI.2014.15"},{"key":"4_CR15","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-19297-0_2","volume-title":"Advances in Enterprise Engineering IX","author":"S Guerreiro","year":"2015","unstructured":"Guerreiro, S.: Engineering the decision-making process using multiple markov theories and DEMO. In: Aveiro, D., Pergl, R., Valenta, M. (eds.) EEWC 2015. LNBIP, vol. 211, pp. 19\u201333. Springer, Heidelberg (2015)"},{"key":"4_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316887","volume-title":"Markov Decision Processes: Discrete Stochastic Dynamic Programming","author":"ML Puterman","year":"1994","unstructured":"Puterman, M.L.: Markov Decision Processes: Discrete Stochastic Dynamic Programming. Wiley, New York (1994)"},{"doi-asserted-by":"crossref","unstructured":"Ameller, D., Franch, X.: Assisting software architects in architectural decision-making using quark. Clei Electron. J. 17(3) (2014)","key":"4_CR17","DOI":"10.19153\/cleiej.17.3.1"},{"doi-asserted-by":"crossref","unstructured":"Guerreiro, S., Tribolet, J.: Conceptualizing enterprise dynamic systems control for run-time business transactions. In: ECIS, p. 5 (2013)","key":"4_CR18","DOI":"10.1007\/978-3-642-29903-2_4"},{"issue":"55","key":"4_CR19","first-page":"1041","volume":"34","author":"S Alter","year":"2014","unstructured":"Alter, S.: Theory of workarounds. Commun. Assoc. Inf. Syst. 34(55), 1041\u20131066 (2014)","journal-title":"Commun. Assoc. Inf. Syst."},{"unstructured":"Washington State Department of Transportation. Project Risk Management Guidance for WSDOT Projects. Technical report, July 2010","key":"4_CR20"},{"doi-asserted-by":"crossref","unstructured":"Sousa, S., Marosin, D., Gaaloul, K., Mayer, N.: Assessing risks and opportunities in enterprise architecture using an extended ADT approach. In: Gasevic, D., Hatala, M., Nezhad, H.R.M., Reichert, M. (eds.) 17th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2013, Vancouver, BC, Canada, 9\u201313 September 2013, pp. 81\u201390. IEEE (2013)","key":"4_CR21","DOI":"10.1109\/EDOC.2013.18"},{"doi-asserted-by":"crossref","unstructured":"Matulevicius, R., Mayer, N., Heymans, P.: Alignment of misuse cases with security risk management. In: Proceedings of the 4th Symposium on Requirements Engineering for Information Security (SREIS 2008), in conjunction with the 3rd International Conference of Availability, Reliability and Security (ARES 2008), pp. 1397\u20131404. IEEE Computer Society (2008)","key":"4_CR22","DOI":"10.1109\/ARES.2008.88"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-540-69534-9_40","volume-title":"Advanced Information Systems Engineering","author":"R Matulevi\u010dius","year":"2008","unstructured":"Matulevi\u010dius, R., Mayer, N., Mouratidis, H., Martinez, F.H., Heymans, P., Genon, N.: Adapting secure tropos for security risk management in the early phases of information systems development. In: Bellahs\u00e8ne, Z., L\u00e9onard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 541\u2013555. Springer, Heidelberg (2008)"},{"unstructured":"Object Management Group. Business Motivation Model (BMM) Specification. Technical report dtc\/06-08-03, Needham, Massachusetts, August 2006","key":"4_CR24"}],"container-title":["Lecture Notes in Business Information Processing","The Practice of Enterprise Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25897-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T20:16:35Z","timestamp":1572120995000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25897-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319258966","9783319258973"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25897-3_4","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"26 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}