{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:55:07Z","timestamp":1760586907624,"version":"3.44.0"},"reference-count":80,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1016\/j.jss.2018.08.025","type":"journal-article","created":{"date-parts":[[2018,8,6]],"date-time":"2018-08-06T21:00:19Z","timestamp":1533589219000},"page":"79-97","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Architecture enforcement concerns and activities - An expert study"],"prefix":"10.1016","volume":"145","author":[{"given":"Sandra","family":"Schr\u00f6der","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Soliman","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Riebisch","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.jss.2018.08.025_bib0001","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MS.2010.36","article-title":"Agility and architecture: can they coexist?","volume":"27","author":"Abrahamsson","year":"2010","journal-title":"IEEE Softw."},{"key":"10.1016\/j.jss.2018.08.025_bib0002","series-title":"Proceedings of the 24th International Conference on Software Engineering","first-page":"187","article-title":"Archjava: Connecting software architecture to implementation","author":"Aldrich","year":"2002"},{"issue":"6","key":"10.1016\/j.jss.2018.08.025_bib0003","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MS.2016.142","article-title":"Embedded-software architects: It\u2019s not only about the software","volume":"33","author":"Antonino","year":"2016","journal-title":"IEEE Softw."},{"key":"10.1016\/j.jss.2018.08.025_bib0004","series-title":"Technical report, Ver. 2.3 EBSE Technical Report. EBSE","article-title":"Guidelines for Performing Systematic Literature Reviews in Software Engineering","author":"B. Kitchenham","year":"2007"},{"key":"10.1016\/j.jss.2018.08.025_bib0005","series-title":"2009 Joint Working IEEE\/IFIP Conference on Software Architecture European Conference on Software Architecture","first-page":"81","article-title":"An exploratory study of architectural practices and challenges in using agile software development approaches","author":"Babar","year":"2009"},{"key":"10.1016\/j.jss.2018.08.025_bib0006","series-title":"Proceedings of the 2013 International Conference on Software Engineering","article-title":"Expectations, outcomes, and challenges of modern code review","author":"Bacchelli","year":"2013"},{"key":"10.1016\/j.jss.2018.08.025_sbref0007","series-title":"Proceedings of the 19th International Conference on Software Engineering","first-page":"570","article-title":"Code reviews enhance software quality","author":"Baker","year":"1997"},{"year":"2012","series-title":"Software architecture in practice","author":"Bass","key":"10.1016\/j.jss.2018.08.025_bib0008"},{"year":"2000","series-title":"Extreme programming explained: Embrace change","author":"Beck","key":"10.1016\/j.jss.2018.08.025_bib0009"},{"key":"10.1016\/j.jss.2018.08.025_bib0010","series-title":"Proceedings of the First International Workshop on Leadership and Management in Software Architecture","first-page":"7","article-title":"The other skills of the software architect","author":"Berenbach","year":"2008"},{"issue":"6","key":"10.1016\/j.jss.2018.08.025_bib0011","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MS.2016.146","article-title":"Software architects in large-scale distributed projects: an ericsson case study","volume":"33","author":"Britto","year":"2016","journal-title":"IEEE Softw."},{"key":"10.1016\/j.jss.2018.08.025_bib0012","series-title":"Proceedings of the Ninth Working IEEE\/IFIP Conference on Software Architecture","first-page":"46","article-title":"Automatic tracing of decisions to architecture and implementation","author":"Buchgeher","year":"2011"},{"issue":"5","key":"10.1016\/j.jss.2018.08.025_bib0013","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MS.2009.130","article-title":"Introducing the pragmatic architect","volume":"26","author":"Buschmann","year":"2009","journal-title":"IEEE Softw."},{"issue":"2","key":"10.1016\/j.jss.2018.08.025_bib0014","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MS.2010.47","article-title":"Learning from failure, part iii: on hammers and nails, and falling in love with technology and design","volume":"27","author":"Buschmann","year":"2010","journal-title":"IEEE Softw."},{"issue":"4","key":"10.1016\/j.jss.2018.08.025_bib0015","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MS.2011.76","article-title":"Gardening your architecture, part 1: refactoring","volume":"28","author":"Buschmann","year":"2011","journal-title":"IEEE Softw."},{"issue":"3","key":"10.1016\/j.jss.2018.08.025_bib0016","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/MS.2011.65","article-title":"Tests: the architect\u2019s best friend","volume":"28","author":"Buschmann","year":"2011","journal-title":"IEEE Softw."},{"issue":"2","key":"10.1016\/j.jss.2018.08.025_bib0017","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MS.2011.48","article-title":"Unusable software is useless, part 2","volume":"28","author":"Buschmann","year":"2011","journal-title":"IEEE Softw."},{"issue":"2","key":"10.1016\/j.jss.2018.08.025_bib0018","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MS.2011.48","article-title":"Unusable software is useless, part 2","volume":"28","author":"Buschmann","year":"2011","journal-title":"IEEE Softw."},{"issue":"1","key":"10.1016\/j.jss.2018.08.025_bib0019","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/MS.2012.18","article-title":"To boldly go where no one has gone before","volume":"29","author":"Buschmann","year":"2012","journal-title":"IEEE Softw."},{"issue":"3","key":"10.1016\/j.jss.2018.08.025_bib0020","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MS.2010.72","article-title":"Five considerations for software architecture, part 1","volume":"27","author":"Buschmann","year":"2010","journal-title":"IEEE Softw."},{"key":"10.1016\/j.jss.2018.08.025_bib0021","series-title":"Proceedings of the 8th European Conference of Software Architecture","first-page":"374","article-title":"How Do Software Architects Specify and Validate Quality Requirements?","author":"Caracciolo","year":"2014"},{"year":"2014","series-title":"Constructing grounded theory","author":"Charmaz","key":"10.1016\/j.jss.2018.08.025_bib0022"},{"issue":"1","key":"10.1016\/j.jss.2018.08.025_sbref0023","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.jss.2009.07.049","article-title":"An empirical investigation of architectural prototyping","volume":"83","author":"Christensen","year":"2010","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2018.08.025_bib0024","series-title":"Proceedings of the 16th Asia-Pacific Software Engineering Conference","first-page":"111","article-title":"An empirical study of software architects\u2019 concerns","author":"Christensen","year":"2009"},{"key":"10.1016\/j.jss.2018.08.025_bib0025","series-title":"The Architect\u2019s Mindset","first-page":"231","author":"Clerc","year":"2007"},{"issue":"4","key":"10.1016\/j.jss.2018.08.025_bib0026","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1109\/TSE.2009.19","article-title":"Software architecture reconstruction: a process-oriented taxonomy","volume":"35","author":"Ducasse","year":"2009","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"5","key":"10.1016\/j.jss.2018.08.025_bib0027","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MS.2016.119","article-title":"What\u2019s the architect\u2019s role in an agile, cloud-centric world?","volume":"33","author":"Erder","year":"2016","journal-title":"IEEE Software"},{"issue":"2","key":"10.1016\/j.jss.2018.08.025_bib0028","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MS.2010.37","article-title":"Architects as service providers","volume":"27","author":"Faber","year":"2010","journal-title":"IEEE Softw."},{"issue":"2\u20133","key":"10.1016\/j.jss.2018.08.025_bib0029","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1147\/sj.382.0258","article-title":"Design and code inspections to reduce errors in program development","volume":"38","author":"Fagan","year":"1999","journal-title":"IBM Syst. J."},{"year":"2010","series-title":"Just enough software architecture: A risk-driven approach","author":"Fairbanks","key":"10.1016\/j.jss.2018.08.025_bib0030"},{"year":"2017","series-title":"Building evolutionary architectures: Support constant change","author":"Ford","key":"10.1016\/j.jss.2018.08.025_bib0031"},{"year":"2002","series-title":"Patterns of enterprise application architecture","author":"Fowler","key":"10.1016\/j.jss.2018.08.025_bib0032"},{"issue":"5","key":"10.1016\/j.jss.2018.08.025_bib0033","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MS.2003.1231144","article-title":"Who needs an architect?","volume":"20","author":"Fowler","year":"2003","journal-title":"IEEE Softw."},{"key":"10.1016\/j.jss.2018.08.025_bib0034","series-title":"Proceedings. International Conference on Software Maintenance (Cat. No. 98CB36272)","first-page":"190","article-title":"Detection of logical coupling based on product release history","author":"Gall","year":"1998"},{"key":"10.1016\/j.jss.2018.08.025_bib0035","series-title":"Product-Focused Software Process Improvement","first-page":"432","article-title":"A multiple case study on the architect\u2019s role in scrum","author":"Galster","year":"2016"},{"key":"10.1016\/j.jss.2018.08.025_bib0036","doi-asserted-by":"crossref","first-page":"79","DOI":"10.4018\/978-1-59140-144-5.ch006","article-title":"Rigor in grounded theory research: an interpretive perspective on generating theory from qualitative field studies","author":"Gasson","year":"2004","journal-title":"The handbook of information systems research"},{"year":"1978","series-title":"Theoretical sensitivity: Advances in the methodology of grounded theory","author":"Glaser","key":"10.1016\/j.jss.2018.08.025_bib0037"},{"key":"10.1016\/j.jss.2018.08.025_bib0038","series-title":"2008 The Third International Conference on Software Engineering Advances","first-page":"400","article-title":"Non-functional requirements to architectural concerns: Ml and nlp at crossroads","author":"Gokyer","year":"2008"},{"key":"10.1016\/j.jss.2018.08.025_bib0039","series-title":"2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems","first-page":"201","article-title":"Educating architects in industry - the sap architecture curriculum","author":"Groene","year":"2010"},{"key":"10.1016\/j.jss.2018.08.025_bib0040","series-title":"2013 17th IEEE International Enterprise Distributed Object Computing Conference","first-page":"71","article-title":"Checking conformance with reference architectures: A case study","author":"Herold","year":"2013"},{"issue":"Supplement C","key":"10.1016\/j.jss.2018.08.025_bib0041","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.jss.2016.02.049","article-title":"Multi-level agile project management challenges: a self-organizing team perspective","volume":"117","author":"Hoda","year":"2016","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2018.08.025_bib0042","series-title":"Proceedings of the 11th IEEE International Software Metrics Symposium (METRICS\u201905)","first-page":"10","article-title":"Experiences from conducting semi-structured interviews in empirical software engineering research","author":"Hove","year":"2005"},{"key":"10.1016\/j.jss.2018.08.025_bib0043","unstructured":"ISO, 2011. Road vehicles \u2013 Functional safety."},{"key":"10.1016\/j.jss.2018.08.025_bib0044","series-title":"Proceedings of the 5th Working IEEE\/IFIP Conference on Software Architecture","first-page":"109","article-title":"Software architecture as a set of architectural design decisions","author":"Jansen","year":"2005"},{"key":"10.1016\/j.jss.2018.08.025_bib0045","series-title":"5th Working IEEE\/IFIP Conference on Software Architecture (WICSA\u201905)","first-page":"141","article-title":"How does the architect\u2019s role change as the software ages?","author":"Klein","year":"2005"},{"issue":"1","key":"10.1016\/j.jss.2018.08.025_bib0046","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MS.2016.9","article-title":"What makes an architect successful?","volume":"33","author":"Klein","year":"2016","journal-title":"IEEE Softw."},{"year":"2005","series-title":"Fundamental modeling concepts:effective communication of IT systems","author":"Kn\u00f6pfel","key":"10.1016\/j.jss.2018.08.025_bib0047"},{"issue":"1","key":"10.1016\/j.jss.2018.08.025_bib0048","doi-asserted-by":"crossref","first-page":"15","DOI":"10.2174\/1874107X00903010015","article-title":"Survey of software inspection research","volume":"3","author":"Kollanus","year":"2009","journal-title":"Open Softw. Eng. J."},{"key":"10.1016\/j.jss.2018.08.025_bib0049","series-title":"The Software Architect","first-page":"565","author":"Kruchten","year":"1999"},{"year":"2000","series-title":"The rational unified process: An introduction, second edition","author":"Kruchten","key":"10.1016\/j.jss.2018.08.025_bib0050"},{"issue":"12","key":"10.1016\/j.jss.2018.08.025_bib0051","doi-asserted-by":"crossref","first-page":"2413","DOI":"10.1016\/j.jss.2008.08.025","article-title":"What do software architects really do?","volume":"81","author":"Kruchten","year":"2008","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2018.08.025_bib0052","series-title":"2014 IEEE 1st International Workshop on Requirements Engineering and Testing (RET)","first-page":"26","article-title":"Using automated tests for communicating and verifying non-functional requirements","author":"Lagerstedt","year":"2014"},{"key":"10.1016\/j.jss.2018.08.025_sbref0052","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.scico.2012.04.007","article-title":"Evolutionary and collaborative software architecture recovery with softwarenaut","volume":"79","author":"Lungu","year":"2014","journal-title":"Sci. Comput. Program"},{"key":"10.1016\/j.jss.2018.08.025_bib0054","series-title":"Role of Architects in Agile Organizations","first-page":"39","author":"Martini","year":"2014"},{"key":"10.1016\/j.jss.2018.08.025_bib0055","series-title":"Companion to the 19th Annual ACM SIGPLAN Conference on Object-oriented Programming Systems, Languages, and Applications","first-page":"230","article-title":"The software architect: Essence, intuition, and guiding principles","author":"McBride","year":"2004"},{"issue":"5","key":"10.1016\/j.jss.2018.08.025_bib0056","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/1230819.1241667","article-title":"The software architect","volume":"50","author":"McBride","year":"2007","journal-title":"Commun. ACM"},{"issue":"3","key":"10.1016\/j.jss.2018.08.025_bib0057","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TSE.2015.2479217","article-title":"Detecting, tracing, and monitoring architectural tactics in code","volume":"42","author":"Mirakhorli","year":"2016","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"8","key":"10.1016\/j.jss.2018.08.025_bib0058","first-page":"29","article-title":"Reengineering with reflexion models: a case study","volume":"30","author":"Murphy","year":"1997","journal-title":"Comp. (Long Beach Calif)"},{"issue":"3","key":"10.1016\/j.jss.2018.08.025_bib0059","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/s10270-010-0188-2","article-title":"Concern coverage in base station development: an empirical investigation","volume":"11","author":"Pareto","year":"2012","journal-title":"Softw. Syst. Model."},{"key":"10.1016\/j.jss.2018.08.025_bib0060","series-title":"2010 ACM\/IEEE 32nd International Conference on Software Engineering","first-page":"21","article-title":"A role-based qualification and certification program for software architects: an experience report from siemens","volume":"2","author":"Paulisch","year":"2010"},{"issue":"4","key":"10.1016\/j.jss.2018.08.025_bib0061","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/141874.141884","article-title":"Foundations for the study of software architecture","volume":"17","author":"Perry","year":"1992","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"10.1016\/j.jss.2018.08.025_bib0062","series-title":"Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering","first-page":"851","article-title":"Husacct: Architecture compliance checking with rich sets of module and rule types","author":"Pruijt","year":"2014"},{"year":"2004","series-title":"Unified modeling language reference manual, the (2Nd edition)","author":"Rumbaugh","key":"10.1016\/j.jss.2018.08.025_bib0063"},{"key":"10.1016\/j.jss.2018.08.025_bib0064","series-title":"Architecture-Centric Development in Globally Distributed Projects","first-page":"321","author":"Sauer","year":"2010"},{"key":"10.1016\/j.jss.2018.08.025_bib0065","series-title":"Proceedings of the 10th European Conference on Software Architecture (ECSA2016)","first-page":"247","article-title":"Architecture enforcement concerns and activities-an expert study","author":"Schr\u00f6der","year":"2016"},{"year":"2001","series-title":"Agile software development with scrum","author":"Schwaber","key":"10.1016\/j.jss.2018.08.025_bib0066"},{"key":"10.1016\/j.jss.2018.08.025_bib0067","series-title":"Proceedings of the Eighth International Workshop on Cooperative and Human Aspects of Software Engineering","first-page":"71","article-title":"Toward defining the role of the software architect: An examination of the soft aspects of this role","author":"Sherman","year":"2015"},{"key":"10.1016\/j.jss.2018.08.025_bib0068","series-title":"Advanced Information Systems Engineering Workshops","first-page":"219","article-title":"What do software architects think they (should) do?","author":"Sherman","year":"2014"},{"key":"10.1016\/j.jss.2018.08.025_bib0069","series-title":"Software Quality. Complexity and Challenges of Software Engineering in Emerging Technologies","first-page":"57","article-title":"A portfolio of internal quality metrics for software architects","author":"Staron","year":"2017"},{"key":"10.1016\/j.jss.2018.08.025_bib0070","series-title":"Basics of qualitative research","volume":"15","author":"Strauss","year":"1990"},{"issue":"6","key":"10.1016\/j.jss.2018.08.025_bib0071","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MS.2016.144","article-title":"The architect\u2019s role in community shepherding","volume":"33","author":"Tamburri","year":"2016","journal-title":"IEEE Softw."},{"year":"2009","series-title":"Software architecture: Foundations, theory, and practice","author":"Taylor","key":"10.1016\/j.jss.2018.08.025_bib0072"},{"issue":"12","key":"10.1016\/j.jss.2018.08.025_bib0073","first-page":"1073","article-title":"A dependency constraint language to manage object-oriented software architectures","volume":"39","author":"Terra","year":"2009","journal-title":"Software: Practice and Experience"},{"key":"10.1016\/j.jss.2018.08.025_bib0074","series-title":"Evolving Software Systems","first-page":"139","article-title":"Mining Unstructured Software Repositories","author":"Thomas","year":"2014"},{"key":"10.1016\/j.jss.2018.08.025_bib0075","series-title":"2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER)","first-page":"141","article-title":"Who should review my code? a file location-based code-reviewer recommendation approach for modern code review","author":"Thongtanunam","year":"2015"},{"issue":"11","key":"10.1016\/j.jss.2018.08.025_sbref0075","doi-asserted-by":"crossref","first-page":"2211","DOI":"10.1016\/j.jss.2010.06.043","article-title":"Software architecture awareness in long-term software product evolution","volume":"83","author":"Unphon","year":"2010","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2018.08.025_bib0077","series-title":"Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering","first-page":"38:1","article-title":"Guidelines for snowballing in systematic literature studies and a replication in software engineering","author":"Wohlin","year":"2014"},{"issue":"5","key":"10.1016\/j.jss.2018.08.025_bib0078","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MS.2015.119","article-title":"Aligning architecture work with agile teams","volume":"32","author":"Woods","year":"2015","journal-title":"IEEE Softw."},{"year":"2009","series-title":"An architectural decision modeling framework for service oriented architecture design","author":"Zimmermann","key":"10.1016\/j.jss.2018.08.025_bib0079"},{"key":"10.1016\/j.jss.2018.08.025_bib0080","series-title":"Proceedings of the Quality of Software Architectures 3rd International Conference on Software Architectures, Components, and Applications","first-page":"15","article-title":"Reusable architectural decision models for enterprise application development","author":"Zimmermann","year":"2007"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121218301614?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121218301614?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T23:20:10Z","timestamp":1759015210000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121218301614"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":80,"alternative-id":["S0164121218301614"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2018.08.025","relation":{},"ISSN":["0164-1212"],"issn-type":[{"type":"print","value":"0164-1212"}],"subject":[],"published":{"date-parts":[[2018,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Architecture enforcement concerns and activities - An expert study","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2018.08.025","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}