{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T22:10:11Z","timestamp":1733523011570,"version":"3.30.1"},"reference-count":55,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T00:00:00Z","timestamp":1653350400000},"content-version":"vor","delay-in-days":143,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.32604\/csse.2022.018759","type":"journal-article","created":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T08:11:00Z","timestamp":1630051860000},"page":"357-374","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":6,"title":["Empirically Modeling Enterprise Architecture Using ArchiMate"],"prefix":"10.32604","volume":"40","author":[{"given":"Qiang","family":"Zhi","sequence":"first","affiliation":[]},{"given":"Zhengshu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"96404","DOI":"10.1109\/ACCESS.2020.2995850","article-title":"A systematic literature review on enterprise architecture visualization methodologies","volume":"8","author":"Zhou","year":"2020","journal-title":"IEEE ACCESS"},{"journal-title":"The ArchiMate 3.1 Specification","year":"2019","key":"ref2"},{"key":"ref3","series-title":"IEEE Int. Enterprise Distributed Object Computing Conf.","first-page":"3","article-title":"A goal-oriented requirements modelling language for enterprise architecture","author":"Quartel","year":"2009"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1080\/17517575.2011.625571","article-title":"Application and project portfolio valuation using enterprise architecture and business requirements modelling","volume":"6","author":"Quartel","year":"2012","journal-title":"Enterprise Information Systems"},{"key":"ref5","first-page":"261","article-title":"Tropos: A framework for requirements-driven software development","author":"Mylopoulos","year":"2000","journal-title":"Information Systems Engineering: State of the Art and Research Themes"},{"key":"ref6","series-title":"IEEE Int. Workshop on Model-Driven Requirements Engineering","first-page":"58","article-title":"Change impact analysis of indirect goal relations: Comparison of NFR and TROPOS approaches based on industrial case study","author":"Teka","year":"2012"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1016\/j.ijinfomgt.2017.04.005","article-title":"An enterprise architecture framework for electronic requirements information management","volume":"37","author":"Jallow","year":"2017","journal-title":"International Journal of Information Management"},{"key":"ref8","series-title":"IEEE Conf. on Business Informatics","first-page":"270","article-title":"Using ArchiMate to represent ITIL metamodel","author":"Vicente","year":"2013"},{"key":"ref9","series-title":"Proc. of the 30th Annual ACM Symp. on Applied Computing","first-page":"1189","article-title":"Using ArchiMate to model a process assessment framework","author":"Siva","year":"2015"},{"key":"ref10","series-title":"Int. Conf. on Science and Technology","first-page":"1","article-title":"The requirements analysis of Elisa business architecture with education enterprise architecture perspective","author":"Emmanuel","year":"2018"},{"key":"ref11","series-title":"Proceedings of Int. Conf. on Electronic Commerce","first-page":"471","article-title":"Governance enterprise architecture (GEA): Domain models for e-governance","author":"Peristeras","year":"2004"},{"key":"ref12","series-title":"Proc. of IEEE Int. Conf. on Computer Supported Cooperative Work in Design","first-page":"116","article-title":"Research on collaborative IT governance model oriented to business architecture","author":"Zhang","year":"2013"},{"key":"ref13","series-title":"IEEE Int. Enterprise Distributed Object Computing Conf.","first-page":"34","article-title":"Using enterprise architecture management patterns to complement TOGAF","author":"Buckl","year":"2009"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-24223-6","author":"AhlemannEric","year":"2012","journal-title":"Strategic enterprise architecture management"},{"key":"ref15","series-title":"Hawaii Int. Conf. on System Sciences","first-page":"4099","article-title":"Integrating agile software development and enterprise architecture management","author":"Hanschke","year":"2015"},{"key":"ref16","series-title":"IEEE Int. Enterprise Distributed Object Computing Conf.","first-page":"11","article-title":"Capturing business strategy and value in enterprise architecture to support portfolio valuation","author":"Iacob","year":"2012"},{"key":"ref17","series-title":"Int. Conf. on Progress in Informatics and Computing","first-page":"733","article-title":"An impact analysis method of business processes evolution in enterprise architecture","author":"Luo","year":"2016"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.compind.2015.07.009","article-title":"A new paradigm for the continuous alignment of business and IT: Combining enterprise architecture modelling and enterprise ontology","volume":"79","author":"Hinkelmann","year":"2016","journal-title":"Computers in Industry"},{"key":"ref19","series-title":"IEEE Conf. on Business Informatics","first-page":"70","article-title":"Using enterprise architecture to assist business continuity planning in large public organizations","author":"Gomes","year":"2017"},{"key":"ref20","series-title":"IEEE Int. Enterprise Distributed Object Computing Workshop","first-page":"145","article-title":"From business strategy to enterprise architecture and back","author":"Aldea","year":"2018"},{"key":"ref21","series-title":"Proc. of the 2007 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications","first-page":"13","article-title":"Towards highly reliable enterprise network services via inference of multi-level dependencies","author":"Bahl","year":"2007"},{"key":"ref22","series-title":"Int. IEEE Enterprise Distributed Object Computing Conf.","first-page":"349","article-title":"Combining defense graphs and enterprise architecture models for security analysis","author":"Sommestad","year":"2008"},{"key":"ref23","series-title":"Proc. of the 2009 Spring Simulation Multiconference","first-page":"1","article-title":"Enterprise architecture dependency analysis using fault trees and Bayesian networks","author":"Franke","year":"2009"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1007\/s10270-010-0166-8","article-title":"Model-based qualitative risk assessment for availability of IT infrastructures","volume":"10","author":"Zambon","year":"2011","journal-title":"Software & Systems Modeling"},{"key":"ref25","series-title":"IEEE Int. Enterprise Distributed Object Computing Conf.","first-page":"42","article-title":"Overview of enterprise information needs in information security risk assessment","author":"Korman","year":"2014"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s10270-014-0400-x","article-title":"A profile and tool for modelling safety information with design information in SysML","volume":"15","author":"Biggs","year":"2016","journal-title":"Software & Systems Modeling"},{"key":"ref27","series-title":"IEEE Int. Enterprise Distributed Object Computing Conf. Workshops","first-page":"114","article-title":"Conceptual integration of enterprise architecture management and security risk management","author":"Grandry","year":"2013"},{"key":"ref28","series-title":"Int. Conf. on Semantics, Knowledge and Grids","first-page":"37","article-title":"An access control model for organisational management in enterprise architecture","author":"Gaaloul","year":"2013"},{"key":"ref29","series-title":"IEEE Int. Colloquium on Information Science and Technology","first-page":"182","article-title":"Improvement of information system security risk management","author":"Abbass","year":"2016"},{"key":"ref30","series-title":"IEEE Int. Enterprise Distributed Object Computing Workshop","first-page":"106","article-title":"Evaluation of the risk and security overlay of Archimate to model information system security risks","author":"Mayer","year":"2017"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"2285","DOI":"10.1007\/s10270-018-0661-x","article-title":"An integrated conceptual model for information system security risk management supported by enterprise architecture management","volume":"18","author":"Mayer","year":"2019","journal-title":"Software & Systems Modeling"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1387","DOI":"10.1016\/j.jss.2010.02.019","article-title":"Architecture analysis of enterprise systems modifiability\u2014models, analysis, and validation","volume":"83","author":"Lagerstr\u00f6m","year":"2010","journal-title":"Journal of Systems and Software"},{"key":"ref33","series-title":"Annual Int. Digital Government Research Conf.: Digital Government Innovation in Challenging Times","article-title":"Modeling digital preservation capabilities in enterprise architecture","author":"Becker","year":"2011"},{"key":"ref34","series-title":"Int. Symp. ISKO-Maghreb","first-page":"1","article-title":"State of the art of the maturity models to an evaluation of the enterprise architecture","author":"Lakhrouit","year":"2013"},{"key":"ref35","series-title":"The Practice of Enterprise Modeling","first-page":"24","article-title":"An empirical evaluation of design decision concepts in enterprise architecture","author":"Plataniotis","year":"2013"},{"key":"ref36","series-title":"IEEE Int. Enterprise Distributed Object Computing Conf.","first-page":"32","article-title":"Extensible model-based approach for supporting automatic enterprise analysis","author":"Florez","year":"2014"},{"key":"ref37","series-title":"Advanced Information Systems Engineering","first-page":"563","article-title":"Using machine learning techniques for evaluating the similarity of enterprise architecture models","author":"Borozanov","year":"2019"},{"key":"ref38","series-title":"Proc. of ACM Symp. on Applied Computing","first-page":"131","article-title":"A method for application evaluations in context of enterprise architecture","author":"Addicks","year":"2010"},{"key":"ref39","series-title":"Proc. of the Int. Conf. on Omni-Layer Intelligent Systems","first-page":"223","article-title":"Cross-layer enterprise architecture evaluation: An approach to improve the evaluation of TO-BE enterprise architecture","author":"Ahmadi","year":"2019"},{"key":"ref40","series-title":"Int. Conf. on Pervasive Computing and Applications","first-page":"116","article-title":"A novel architectural design model for enterprise systems: Evaluating enterprise resourceplanning system and enterprise application integration against service oriented architecture","author":"Majedi","year":"2008"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/TSC.2010.21","article-title":"From software architecture analysis to service engineering: An empirical study of methodology development for enterprise SOA implementation","volume":"3","author":"Chen","year":"2010","journal-title":"IEEE Transactions on Services Computing"},{"key":"ref42","series-title":"IEEE Int. Enterprise Distributed Object Computing Conf\/. Workshops","first-page":"3","article-title":"Modeling contextual concerns in enterprise architecture","author":"Antunes","year":"2011"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"1480","DOI":"10.1016\/j.jss.2011.02.043","article-title":"Enterprise architecture patterns for business process support analysis","volume":"84","author":"\u0160a\u0161a","year":"2011","journal-title":"Journal of Systems and Software"},{"key":"ref44","series-title":"Advanced Information Systems Engineering Workshops","first-page":"4","article-title":"Business IT alignment from business model to enterprise architecture","author":"Fritscher","year":"2011"},{"key":"ref45","series-title":"Int. Forum on Strategic Technology","first-page":"1","article-title":"A new approach for collaborative enterprise architecture development","author":"Agievich","year":"2012"},{"key":"ref46","first-page":"1059","article-title":"From enterprise architecture to business models and back","volume":"13","author":"Iacob","year":"2014","journal-title":"Software & Systems Modeling"},{"key":"ref47","series-title":"Int. Conf. on Enterprise Systems","first-page":"66","article-title":"Enterprise capability modeling: Concepts, method, and application","author":"Loucopoulos","year":"2015"},{"key":"ref48","series-title":"IEEE Int. Enterprise Distributed Object Computing Conf. Workshops","first-page":"28","article-title":"Analysis and application scenarios of enterprise architecture: An exploratory study","author":"Bucher","year":"2006"},{"journal-title":"Enterprise architecture planning: Developing a blueprint for data, applications, and technology","year":"1993","author":"Spewak","key":"ref49"},{"journal-title":"ISO\/IEC\/IEEE 15026-1:2019: Systems and software engineering\u2014systems and software assurance","year":"2019","key":"ref50"},{"key":"ref51","series-title":"Int. Conf. on IT Convergence and Security","first-page":"1","article-title":"Assuring security through attribute GSN","author":"Yamamoto","year":"2015"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"72395","DOI":"10.1109\/ACCESS.2020.2987964","article-title":"An evaluation of quantitative non-functional requirements assurance using archiMate","volume":"8","author":"Zhou","year":"2020","journal-title":"IEEE Access"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"78","DOI":"10.4018\/IJSSSP.2021010105","article-title":"A composite safety assurance method for developing system architecture using model checking","volume":"12","author":"Zhi","year":"2021","journal-title":"International Journal of Systems and Software Security and Protection"},{"key":"ref54","series-title":"IEEE Int. Conf. on Software Engineering and Service Science","first-page":"571","article-title":"An approach to transform enterprise architecture models from systemigrams","author":"Xia","year":"2019"},{"journal-title":"Software engineering","year":"2015","author":"Sommerville","key":"ref55"}],"container-title":["Computer Systems Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/csse\/TSP_CSSE-40-1\/TSP_CSSE_18759\/TSP_CSSE_18759.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:49:27Z","timestamp":1733521767000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/csse\/v40n1\/44236"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.32604\/csse.2022.018759","relation":{},"ISSN":["0267-6192"],"issn-type":[{"type":"print","value":"0267-6192"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"2021-03-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-02","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}