{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:42:11Z","timestamp":1759992131384,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/hicss.2012.419","type":"proceedings-article","created":{"date-parts":[[2012,2,9]],"date-time":"2012-02-09T17:21:52Z","timestamp":1328808112000},"page":"3297-3306","source":"Crossref","is-referenced-by-count":15,"title":["Manage Risks through the Enterprise Architecture"],"prefix":"10.1109","author":[{"given":"Jose","family":"Barateiro","sequence":"first","affiliation":[]},{"given":"Goncalo","family":"Antunes","sequence":"additional","affiliation":[]},{"given":"Jose","family":"Borbinha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"(MIL-STD-1692A)","article-title":"DoD: Military Standard, Procedures for Performing a Failure Mode, Effects, and Critical Analysis","year":"1980","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(93)90021-G"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1996.491438"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11962977_5"},{"key":"ref14","article-title":"Risk Management: Protect and Maximize Stakeholder Value","author":"maziol","year":"2009","journal-title":"Oracle Governance Risk and Compliance"},{"key":"ref15","first-page":"42","article-title":"Process mapping techniques and organisational analysis: Lessons from sociotechnical system theory","volume":"1","author":"lambert","year":"2002","journal-title":"Business Process Management Journal"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1002\/sys.20054","article-title":"Integration of Risk Identification with Business Process Models","volume":"9","author":"biazzo","year":"2006","journal-title":"Systems Engineering"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref18","first-page":"11","article-title":"Managing Risk from the Mailroom to the Boardroom","year":"2003","journal-title":"Tone at the Top"},{"year":"2004","key":"ref19","article-title":"Enterprise Risk Management Integrated Framework"},{"journal-title":"(ISO 31000 2009)","article-title":"Risk Management &#x2013; Principles and guidelines","year":"2009","key":"ref4"},{"year":"2007","key":"ref27","article-title":"OBIT 4.1. Framework"},{"journal-title":"(ISO Guide 73 2009)","article-title":"Risk Management &#x2013; Vocabulary","year":"2009","key":"ref3"},{"journal-title":"(ISO\/IEC 15504&#x2013;1 2004)","article-title":"Information technology - Process assessment - Part 1: Concepts and vocabulary","year":"2004","key":"ref6"},{"journal-title":"(ISO\/IEC 31010 2009)","article-title":"Risk Management - Risk assessment techniques","year":"2009","key":"ref5"},{"year":"1990","key":"ref8","article-title":"IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries"},{"journal-title":"(IEEE 1471 2000)","article-title":"IEEE Recommended Practice for Architectural Description for Software-Intensive Systems","year":"2004","key":"ref7"},{"journal-title":"Software Engineering","year":"2004","author":"sommerville","key":"ref2"},{"key":"ref9","article-title":"Fault Tree Handbook with Aerospace Applications","author":"stamatelatos","year":"2002","journal-title":"NASA"},{"year":"2010","key":"ref1","article-title":"Software Engineering Institute. Capability Maturity Model Integration for Development"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.136"},{"key":"ref22","first-page":"276","article-title":"A Framework for Information Systems Architecture","volume":"6","author":"zachman","year":"1997","journal-title":"IBM Systems Journal"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-174-2.ch004"},{"journal-title":"DoD Architecture Framework version 1 0","year":"2009","key":"ref24"},{"journal-title":"TOGAF Version 9","year":"2009","key":"ref23"},{"journal-title":"(ISO\/IEC 11179)","article-title":"Information technology - Metadata Registries (MDR)","year":"2005","key":"ref26"},{"key":"ref25","article-title":"A Strategic Framework for Governance, Risk, and Compliance","volume":"8","author":"frigo","year":"2009","journal-title":"Strategic Finance"}],"event":{"name":"2012 45th Hawaii International Conference on System Sciences (HICSS)","start":{"date-parts":[[2012,1,4]]},"location":"Maui, HI, USA","end":{"date-parts":[[2012,1,7]]}},"container-title":["2012 45th Hawaii International Conference on System Sciences"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6148328\/6148595\/06149223.pdf?arnumber=6149223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T10:01:20Z","timestamp":1497952880000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6149223\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/hicss.2012.419","relation":{},"subject":[],"published":{"date-parts":[[2012,1]]}}}