{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:22Z","timestamp":1750307062364,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T00:00:00Z","timestamp":1350864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,22]]},"DOI":"10.1145\/2463728.2463789","type":"proceedings-article","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T13:51:28Z","timestamp":1366120288000},"page":"320-323","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["A literature review"],"prefix":"10.1145","author":[{"given":"Ruben","family":"Pereira","sequence":"first","affiliation":[{"name":"Instituto Superior Tecnico, Lisboa"}]},{"given":"Miguel Mira","family":"da Silva","sequence":"additional","affiliation":[{"name":"Instituto Superior Tecnico, Lisboa"}]}],"member":"320","published-online":{"date-parts":[[2012,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"MISRC","author":"Adams C. R.","year":"2008","unstructured":"Adams , C. R. , Larson , E. C. and Xia , W . IS\/IT Governance Structure and Alignment: An Apparent Paradox . MISRC , ( 2008 ). Adams, C. R., Larson, E. C. and Xia, W. IS\/IT Governance Structure and Alignment: An Apparent Paradox. MISRC, (2008)."},{"key":"e_1_3_2_1_2_1","unstructured":"Agarwal R. and Sambamurthy V. Principles and Models for Organizing the IT Function. MISQ 1(1) (2002).  Agarwal R. and Sambamurthy V. Principles and Models for Organizing the IT Function. MISQ 1(1) (2002)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.1009.I9P0321"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/838238.839197"},{"key":"e_1_3_2_1_5_1","volume-title":"White Paper. IDC","author":"Broussard F. W.","year":"2007","unstructured":"Broussard , F. W. and Tero , V . Configuration and Change Management for IT Compliance and Risk Management: The Tripwire Approach . White Paper. IDC , 2007 . Broussard, F. W. and Tero, V. Configuration and Change Management for IT Compliance and Risk Management: The Tripwire Approach. White Paper. IDC, 2007."},{"key":"e_1_3_2_1_6_1","first-page":"696","volume":"15","author":"Brown A. E.","year":"2005","unstructured":"Brown , A. E. and Grant , G. G. Framing the Frameworks: A Review of IT Governance Research. CAIS 15 , ( 2005 ), 696 -- 712 . Brown, A. E. and Grant, G. G. Framing the Frameworks: A Review of IT Governance Research. CAIS 15, (2005), 696--712.","journal-title":"Framing the Frameworks: A Review of IT Governance Research. CAIS"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2007.4444260"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.306"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.66"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.80"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2008.251"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.113"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-007-0027-5"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/FITME.2009.72"},{"key":"e_1_3_2_1_15_1","volume-title":"Defining IT Governance: The Gartner IT Governance Demand\/Supply Model. Gartner ID:G00140091","author":"Gerrard M.","year":"2010","unstructured":"Gerrard , M. Defining IT Governance: The Gartner IT Governance Demand\/Supply Model. Gartner ID:G00140091 , 2010 . Gerrard, M. Defining IT Governance: The Gartner IT Governance Demand\/Supply Model. Gartner ID:G00140091, 2010."},{"key":"e_1_3_2_1_16_1","volume-title":"a Flawed Concept: It's Time for Business Change Governance","author":"Gerrard M. IT","year":"2009","unstructured":"Gerrard , M. IT Governance , a Flawed Concept: It's Time for Business Change Governance . Gartner ID :G00171658 ( 2009 ) Gerrard, M. IT Governance, a Flawed Concept: It's Time for Business Change Governance. GartnerID:G00171658 (2009)"},{"key":"e_1_3_2_1_17_1","volume-title":"EEE'08","author":"Goeken M.","year":"2008","unstructured":"Goeken , M. and Alter , S . Representing IT Governance Frameworks as Metamodels . In: EEE'08 , ( 2008 ), 48--54. Goeken, M. and Alter, S. Representing IT Governance Frameworks as Metamodels. In: EEE'08, (2008), 48--54."},{"key":"e_1_3_2_1_18_1","first-page":"32","volume":"6","author":"Guldentops E.","year":"2002","unstructured":"Guldentops , E. , Grembergen V. W. & De Haes , S. : Control and Governance Maturity Survey: Establishing a Reference Benchmark and Assessment Tool. ISCJ , 6 , ( 2002 ), 32 -- 35 . Guldentops, E., Grembergen V. W. & De Haes, S.: Control and Governance Maturity Survey: Establishing a Reference Benchmark and Assessment Tool. ISCJ, 6, (2002), 32--35.","journal-title":"Reference Benchmark and Assessment Tool. ISCJ"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.244"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2008.22"},{"key":"e_1_3_2_1_21_1","first-page":"1","volume":"2","author":"Hevner A. R.","year":"2004","unstructured":"Hevner , A. R. , March , S. T. , Park , J. and Ram , S. Design Science in Information Systems Research. MISQ , 2 , 1 ( 2004 ), 75--105. Hevner, A. R., March, S. T., Park, J. and Ram, S. Design Science in Information Systems Research. MISQ, 2, 1 (2004), 75--105.","journal-title":"Design Science in Information Systems Research. MISQ"},{"key":"e_1_3_2_1_22_1","volume-title":"4th ICIS","author":"Hosseinbeig S.","year":"2011","unstructured":"Hosseinbeig , S. , Karimzadgan-Moghadam , D. , Vahdat and D. , Moghadam , R. A. IT strategic alignment maturity and IT governance . In: 4th ICIS , ( 2011 ), 67--72. Hosseinbeig, S., Karimzadgan-Moghadam, D., Vahdat and D., Moghadam, R. A. IT strategic alignment maturity and IT governance. In: 4th ICIS, (2011), 67--72."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTD.2007.4937414"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.374"},{"key":"e_1_3_2_1_25_1","volume-title":"ICCASM","author":"Jun L.","year":"2010","unstructured":"Jun , L. , Xiao , Li, L. and Jun , W . A problem classification approach in business service management . In: ICCASM , ( 2010 ), 354--356. Jun, L., Xiao, Li, L. and Jun, W. A problem classification approach in business service management. In: ICCASM, (2010), 354--356."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDS.2010.48"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCIE.2010.226"},{"key":"e_1_3_2_1_28_1","volume-title":"18th ECIS","author":"Losso S.","year":"2010","unstructured":"Losso , S. and Goeken , M . Application of Best-Practice Reference Models of IT Governance . In: 18th ECIS ( 2010 ). Losso, S. and Goeken, M. Application of Best-Practice Reference Models of IT Governance. In: 18th ECIS (2010)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.434"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIE.2010.5559690"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSDE.2010.54"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCST.2009.38"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSIM.2008.4631631"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIMCA.2006.210"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2011.30"},{"key":"e_1_3_2_1_36_1","volume-title":"Risk Based Compliance Monitoring & Compliance Function Effectiveness - A new approach to managing compliance in the financial services industry","author":"PrinceWaterHouseCoopers","year":"2008","unstructured":"PrinceWaterHouseCoopers . Risk Based Compliance Monitoring & Compliance Function Effectiveness - A new approach to managing compliance in the financial services industry , 2008 . PrinceWaterHouseCoopers. Risk Based Compliance Monitoring & Compliance Function Effectiveness - A new approach to managing compliance in the financial services industry, 2008."},{"key":"e_1_3_2_1_37_1","volume-title":"J. Becker","author":"Schermann M.","year":"2009","unstructured":"Schermann , M. , B\u00d6hmann , T. and Krcmar , H . Explicating Design Theories with Conceptual Models: Towards a Theoretical Role of Reference Models . In J. Becker , H. Krcmar & B. Niehaves , ( 2009 ). Schermann, M., B\u00d6hmann, T. and Krcmar, H. Explicating Design Theories with Conceptual Models: Towards a Theoretical Role of Reference Models. In J. Becker, H. Krcmar & B. Niehaves, (2009)."},{"key":"e_1_3_2_1_38_1","first-page":"51","volume":"49","author":"Shpilberg D.","unstructured":"Shpilberg , D. , Berez , S. , Puryear , R. and Shah , S. Avoiding the Alignment Trap in Information Technology. MIT Sloan Management Review 49 , 1(2007), 51 -- 58 . Shpilberg, D., Berez, S., Puryear, R. and Shah, S. Avoiding the Alignment Trap in Information Technology. MIT Sloan Management Review 49, 1(2007), 51--58.","journal-title":"Avoiding the Alignment Trap in Information Technology. MIT Sloan Management Review"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.83"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2010.34"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/PICMET.2006.296548"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.447"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/PICMET.2008.4599688"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409540.1409542"},{"key":"e_1_3_2_1_46_1","volume-title":"IT Governance Framework. Forrester","author":"Symons C.","year":"2005","unstructured":"Symons , C. : IT Governance Framework. Forrester ( 2005 ). Symons, C.: IT Governance Framework. Forrester (2005)."},{"key":"e_1_3_2_1_47_1","first-page":"57","volume":"30","author":"Tanriverdi","unstructured":"Tanriverdi , H. Performance Effects of Information Technology Synergies in Multibusiness Firms. MISQ 30 , 1(2006), 57 -- 77 . Tanriverdi, H. Performance Effects of Information Technology Synergies in Multibusiness Firms. MISQ 30, 1(2006), 57--77.","journal-title":"Performance Effects of Information Technology Synergies in Multibusiness Firms. MISQ"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.68"},{"key":"e_1_3_2_1_49_1","volume":"26","author":"Webster J.","unstructured":"Webster , J. and Watson , R. T. Analyzing the Past to Prepare for the Future: Writing a Literature Review. MISQ , 26 , 2(2002), xiii--xxiii. Webster, J. and Watson, R. T. Analyzing the Past to Prepare for the Future: Writing a Literature Review. MISQ, 26, 2(2002), xiii--xxiii.","journal-title":"Literature Review. MISQ"},{"key":"e_1_3_2_1_50_1","volume-title":"IT Governance: How Top Performers Manage IT Decision Rights for Superior Result","author":"Weil P.","year":"2004","unstructured":"Weil , P. , and Ross J. W . IT Governance: How Top Performers Manage IT Decision Rights for Superior Result . Harvard Business School Press , Boston, Massachusetts , 2004 Weil, P., and Ross J. W. IT Governance: How Top Performers Manage IT Decision Rights for Superior Result. Harvard Business School Press, Boston, Massachusetts, 2004"}],"event":{"name":"ICEGOV '12: 6th International Conference on Theory and Practice of Electronic Governance","sponsor":["Macao Foundation, Macao SAR Govt Macao Foundation, Macao SAR Government","University at Albany - State University of New York University at Albany - State University of New York"],"location":"Albany New York USA","acronym":"ICEGOV '12"},"container-title":["Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2463728.2463789","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2463728.2463789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:16Z","timestamp":1750238476000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2463728.2463789"}},"subtitle":["IT governance guidelines and areas"],"short-title":[],"issued":{"date-parts":[[2012,10,22]]},"references-count":49,"alternative-id":["10.1145\/2463728.2463789","10.1145\/2463728"],"URL":"https:\/\/doi.org\/10.1145\/2463728.2463789","relation":{},"subject":[],"published":{"date-parts":[[2012,10,22]]},"assertion":[{"value":"2012-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}