<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards the Identification of Process Anti-Patterns in Enterprise Architecture Models</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Barry-Detlef Lehmann</string-name>
          <email>barry.lehmann@rwth-aachen.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Peter Alexander</string-name>
          <email>alexander@swc.rwth-aachen.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Horst Lichter</string-name>
          <email>lichter@swc.rwth-aachen.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Simon Hacks</string-name>
          <email>shacks@kth.se</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>KTH Royal Institute of Technology, Network and Systems Engineering</institution>
          ,
          <addr-line>Stockholm</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>RWTH Aachen University, Research Group Software Construction</institution>
          ,
          <addr-line>Aachen</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <fpage>47</fpage>
      <lpage>54</lpage>
      <abstract>
        <p>IT processes constitute the backbone of an integrated enterprise architecture (EA). The model thereof sustains the development and management of the EA. Nevertheless, the quality of such models tends to degrade over time due to, e.g. improper modeling practices or inefective evaluation. In this regard, the knowledge of relevant modeling anti-patterns can help identify, mitigate, and prevent the occurrence of sub-optimal or adverse constructs in the model. In the field of business process modeling (BPM), a plethora of BPM anti-patterns has been defined and compiled in various taxonomies. However, these BPM anti-patterns mostly focus on technical issues, which thus are applicable for evaluating workflows but not EA-level processes. We strongly argue that the concept of process anti-pattern in EA domain can facilitate EA analyses on process-related issues. To address this gap, this paper presents a catalogue of 18 EA process modeling anti-patterns, which we derived from the existing BPM anti-patterns. Our result should serve as food for thought and motivation for future research in this context.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;enterprise architecture</kwd>
        <kwd>process anti-pattern</kwd>
        <kwd>model quality</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>text of EA modeling, specifically the application thereof
in the evaluation of EA models.</p>
      <p>
        IT processes transform fragmented capabilities within an In the field of business process modeling (BPM)
reenterprise architecture (EA) into consolidated business search, a plethora of BPM anti-pattern taxonomies have
assets. The models thereof often need to be consulted or been proposed [
        <xref ref-type="bibr" rid="ref1 ref3 ref4">1, 3, 4</xref>
        ]. However, these BPM
antieven adapted in the eforts of managing and evolving the patterns mostly address rather technical aspects like the
EA. Nevertheless, these process models are often devel- use of syntax or layout in the process model, which are
oped with less consideration of quality due to, e.g. time very specific to the modeling notations in use. Moreover,
pressure, little awareness of good modeling practices, or discussions of BPM anti-patterns have mostly been
preinadequate evaluation of the models. The uncontrolled sented in workflow modeling notations [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] (e.g. BPMN).
development in this manner will eventually render the These situations hinder the application of BPM
antiprocess models useless or even misleading [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This sit- pattern to EA practices, in which processes are viewed
uation may hamper the sustainability of EA practices from rather strategic perspectives and modeled in EA
within the organization. modeling notations. We strongly argue that transferring
      </p>
      <p>
        To avoid this, the development and evaluation of pro- the existing BPM anti-patterns into process anti-patterns
cess models must be guided by the knowledge of relevant in the domain of EA can help improve the development
patterns and anti-patterns. In general, the modeling pat- of processes and their quality that underlie the EA.
tern is defined as a proven solution to a recurring model- The efort of transferring an existing concept into the
ing problem whereas the modeling anti-pattern is defined domain of EA is not new. Salentin and Hacks introduced
as a modeling solution that is known to pose risks [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. the concept of EA smell, which is defined as a hint to
The understanding of these concepts can help identify, a bad habit that impairs the quality of the EA [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In
mitigate, and prevent the occurrence of sub-optimal or their work, they transferred the concept of code smell
adverse constructs within the models [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In this study, into the context of EA through conceptual derivation and
we focus on the concept of process anti-pattern in the con- transformation methodology. Inspired by their work, the
same methodology is applied in this study to answer the
following research question (RQ):
RQ
      </p>
      <sec id="sec-1-1">
        <title>What process anti-patterns can be defined to support EA modeling activities through the analysis of published process anti-patterns?</title>
      </sec>
      <sec id="sec-1-2">
        <title>The remainder of this paper is structured as follows: Section 2 gives an overview of previous studies on antipattern or other related concepts (e.g. smell) in the fields</title>
        <p>
          of BPM and EA modeling research; section 3 describes our the authors provide a catalog of 45 EA smells that
origimethodology for obtaining process anti-patterns for EA nated from code smells. In their approach, they transform
modeling problems; section 4 elaborates our findings and a catalog of well-known code smells into EA smells and
the analysis thereof; section 6 demonstrates our results categorize the EA smells based on the three concerns of
and discusses the implications as well as threats to the EA: business, application, and technology. Furthermore,
validity thereof; and section 7 motivates future research they present a tool that can detect 14 EA smells. As an
directions and concludes this paper. extension to their work, this study explores the current
knowledge about process anti-pattern to obtain a new
understanding thereof in the EA domain.
2. Related Work Finally, the idea of looking at diferent abstraction
levels in processes to address diferent stakeholders is not
new. Several studies have been conducted to
decompose processes into diferent abstraction levels. Giachetti
proposes to divide the process hierarchy into functions,
processes, sub-processes, activities, and tasks [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. This
study argues that the natural hierarchical attribute of
the process should be used. Viljoen, on the other hand,
decomposes it into enterprise model, macro, business
process, sub-process, activity, and task [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. Koschmider
and Blanchard propose a semiautomatic detection for
different process abstraction levels with processes modeled
with Petri Nets [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Their goal is to detect a process
hierarchy in a process model. All these studies
commonly advocate that the levels of abstraction applied to
processes should meet the goals of relevant stakeholders.
        </p>
        <p>
          The concept of anti-pattern was coined in 1995 by Koenig
[
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] to describe a common solution to a recurring problem
which poses risks of being counterproductive. Although
an anti-pattern may serve as a practical short-term
solution, the use of it sets a context in which certain changes
may become more expensive or impossible. The
(unintentional) use of anti-pattern is highly influenced by, e.g.
time pressure, inadequate knowledge of best practices,
or unforeseen changes.
        </p>
        <p>
          The spectrum of studies about anti-patterns covers a
wide-range of software engineering topics, such as
software development and modeling. In the domain of BPM,
a number of taxonomies of process anti-patterns have
been proposed, each of the taxonomies addresses a
specific area of concern. In 2019, a bibliography of all these
taxonomies was published based on a literature review
study [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Therein, the collected taxonomies are divided 3. Methodology
into seven categories based on the addressed modeling
problems. Furthermore, this study suggests several rules To transfer the existing knowledge about process
antiof thumb in documenting process anti-patterns. The au- pattern into the EA domain, this study follows the
thors of this study advocate the use of this bibliography methodologies proposed by Pefers et al. and Hevner
in the eforts to increase the quality of BP models. et al. for the Design Science Research (DSR) [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]:
        </p>
        <p>
          Analogous with the concept of process anti-pattern, a type of research which aims to devise an artifact that
the concept of process anomaly is also known in BPM addresses a "heretofore unsolved and important business
research. Vidacic and Strahonja present a literature problem" by drawing on the existing knowledge. The
review of this concept in which the collected process resulting artifact must be rigorously evaluated in terms
anomalies are divided into three categories: structural, of its "utility, quality, and eficacy" and efectively
comsemantical, and syntactical anomalies [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. They also sug- municated to the relevant audience.
gest approaches to the mitigation or prevention thereof. This study is performed as follows: At first, we
colSuchenia et al. provide a brief overview of BPM anti- lected knowledge about the 336 already-published BPM
patterns, present these in BPMN models, and categorize anti-patterns in scientific literature, which have been
these into three categories: syntactic, structural, and compiled in [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] and are publicly accessible on [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. Based
control flow anti-patterns [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Trcka et al. present data- on a mapping of modeling notations between BPMN and
lfow anti-patterns and an approach to identifying these ArchiMate, we processed these BPM anti-patterns and
[
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Further in this topic, Sadiq et al. identify seven finally derived 18 process anti-patterns of EA relevance,
common data-flow anti-patterns and provide the basic which are then documented in a structured template and
algorithm to address these [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. Finally, Döhring and exemplified in ArchiMate models. A closer look into this
Heublein present a taxonomy of control-flow, rule-based, procedure is provided in the following subsections.
and data-flow anti-patterns; demonstrate examples of
such anti-patterns in BPMN; and suggest detection as 3.1. Notation Mapping
well as prevention mechanisms thereof [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>In the domain of EA modeling, the concept of anti- Most BPM anti-patterns have been analyzed and
visupattern remained unknown until the recent suggestion alized in BPMN. While BPMN provides a full-fledged
of an EA smell taxonomy by Salentin and Hacks. Therein, framework to create graphical business processes
mod</p>
        <sec id="sec-1-2-1">
          <title>BPMN</title>
          <p>Business Process Diagram, Pool, Lanes
Activities, Task, Sub-Process
Collaboration Diagram
Event
Data Object
Lane
Sequence flow
Data association
Inclusive and parallel gateways</p>
          <p>Exclusive and event-based gateways
els, BPMN is intended for rather detailed business process the various situations of deadlock are addressed by
difermodeling, such as the modeling of conversation, chore- ent BPM anti-patterns. While such specialized modeling
ography, and collaboration models. However, such busi- problems are indeed identifiable within BPMN models,
ness process models constitute only a small area within such detailed problems are not visible through the
highthe broad view of EA. Therein, processes are analyzed level notations of ArchiMate. Therefore, we pruned such
from rather strategic perspectives, e.g. the connection detailed branches of classification within the selected
of all high-level processes to the surrounding organiza- taxonomies, thereby reducing the size of our analysis to
tion units to achieve strategic targets. The modeling of 200 BPM anti-patterns.
such perspectives has been facilitated by a number of EA Next, this study follows a defined procedure to derive
modeling languages; the most popular one is ArchiMate. process anti-patterns of EA relevance, which is as follows:
We strongly argue that method supports for analyzing Firstly, BPMN elements found in the names and
descripEA processes must be built on top of an EA modeling tions of the BPM anti-patterns are translated into
Archilanguage. Therefore, to transfer the existing BPM anti- Mate elements based on the notation mapping shown in
patterns into the EA domain, we first need to create a table 1. Secondly, each translated description is
evalumapping between BPMN and ArchiMate to figure out ated to determine whether it is comprehensible within
the possibilities of deriving something of EA relevance. the context of EA. Through this step, we derived 18
pro</p>
          <p>
            Previous studies have suggested several mappings be- cess anti-patterns of EA relevance, while excluding the
tween BPMN and ArchiMate [
            <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21">18, 19, 20, 21</xref>
            ]. They show rest because the translated descriptions thereof do not
dethat both modeling languages share some conceptual scribe relevant EA modeling problems (e.g. anti-patterns
similarities. Firstly, both provide similar notations for related to syntax errors such as the sequence flow crosses
connecting process elements (e.g. the sequence, default, process boundary [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ]). Among the derived process
antiand conditional flows) and regulating these with gate- patterns, some are directly applicable in the EA domain
ways or junctions. Secondly, both support the modeling only after applying the notation mapping (e.g. the Layout
of similar relationships between processes and the related Deficit [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ]), while some other require broad modification
elements [
            <xref ref-type="bibr" rid="ref19">19</xref>
            ]. For example, BPMN’s support for creating in the description thereof to depict valid EA modeling
relationships between e.g. activities and data objects is problems (e.g. Useless Test).
similar to ArchiMate’s support for creating relationships
between e.g. business processes and business objects. In
table 1, we list the mappings of notations which we use
as a basis to conduct the next steps.
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>4. An initial catalogue of process anti-patterns in EA</title>
      <p>
        3.2. Transformation Design To support the usability of our contribution, we have
organized the resulting 18 process anti-patterns in a
cataFrom our analysis of related studies in BPM research, logue, which is publicly accessible on our [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Since this
we found several taxonomies which collect in total of catalogue is still in its initial stages, we encourage further
336 BPM anti-patterns and classify these based on the extensions and improvements to it. A detailed discussion
characteristics thereof [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. From the perspective of on future research directions is given in section 7.
our study, we argue that the depth of these taxonomies In this section, we first introduce the categorization
stretches beyond the context of EA analysis. For example, used in the catalogue. Next, we provide a deeper look
into one process anti-pattern under each category. Lastly, Table 2
we describe the template used to document some general Categories of EA anti-pattern
attributes of the process anti-patterns.
4.1. Categorizing process anti-patterns
      </p>
      <sec id="sec-2-1">
        <title>Category</title>
        <p>Semantic Error</p>
        <sec id="sec-2-1-1">
          <title>To present the proposed catalogue in an organized and systematic manner, we divide the contained process antipatterns into the following five categories that we derived from some selected categories in [1].</title>
          <p>
            The category of semantic error includes process anti-
Understandpatterns that address the semantically error or inconsis- ability Problem
tent parts of the model under analysis. These problems
are commonly caused by the improper or deficient use of
modeling notations, which may distort the understanding
of the model. It is worth to mention that such semantic
errors should not be confused with syntax errors as the Rule-related
latter addresses the violation against the rules of assem- Defect
bling the notations, whereas the earlier addresses the Data-flow Inconsistent data
false or ambiguous impression conveyed by the model related Defect Mismatched data
[
            <xref ref-type="bibr" rid="ref3">3</xref>
            ]. Due to the gap between the syntactic rules of BPMN Missing data
and ArchiMate, we derived no process anti-patterns of
EA relevance under the syntax error category.
          </p>
          <p>
            The category of control-flow problem includes pro- Furthermore, to give a closer look into the catalogue, we
cess anti-patterns that address the flawed concurrency of elaborate one process anti-pattern under each category
process flows which raises unpredictability in the final and provide an example thereof.
outcome. Such issue occurs when the modeled processes Under the category of semantic error, the end event
are split or joined without properly considering the in- missing occurs when the modeled process does not
lfuence thereof to the final outcome. clearly specify the end events [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ] [23], which then causes
          </p>
          <p>The category of understandability problem in- confusion or misinterpretation about the valid conditions
cludes process anti-patterns that address the excessive or to finalize or abort the process execution. An example
lack of complexity within the model, thereby requiring of this problem is when multiple high-level processes of
excessive eforts to understand the process under analy- diferent organization bodies are integrated within the
sis in its full context. Such an issue is commonly caused EA model without specifying the points when the
collabby the improper/inconsistent level of information gran- orative outcomes have been achieved or any disruptions
ularity or inadequate/imprecise coverage of the actual have to be handled. A solution to this anti-pattern would
process in reality. be to simply introduce end event elements that clearly</p>
          <p>The category of rule-related defect includes process signal all possible ways to end the process.
anti-patterns that address the contradictions among the Under the category of control-flow problem , the lack
rules specified within the model. Such an issue may of synchronization refers to the situation when the
occur when e.g. the actual process is not well-defined, modeled process does not specify a proper
synchronizawell-communicated, or well-understood among some tion among concurrent process flows, thereby showing
contributors to the rules specification in the model. no predictable outcome. An example of such a situation</p>
          <p>The category of data-flow related defect includes is when the modeled process is split by an AND junction
process anti-patterns that address the proneness to con- and later joined by an OR junction [24, 25]. A solution to
lficts when the same data object is concurrently used this anti-pattern is to ensure the highest test coverage of
for diferent kinds of transactions. These issues are com- all points of synchronization specified in the model.
monly caused by the overlapping data responsibilities Under the category of understandability problem, the
among diferent processes or the centralization of too useless test is identified when the modeled process
fulmany data in a single data object. iflls only some of all the possible cases in reality [ 26],
thereby making it impossible to identify and test the
4.2. Demonstrating process anti-patterns real extent of the supported problem domain. An
example thereof is when the handling of possible mistakes or
Next, we name the 18 process anti-patterns and map these disruption during the process execution is not specified
under the aforementioned categories, as listed in table 2. within the model. As a solution, the model should be</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>Attribute</title>
        <p>Name
Problem
Consequences
Solution
Graphical Definition</p>
      </sec>
      <sec id="sec-2-3">
        <title>Meaning</title>
        <p>Gives the anti-pattern a meaningful designator
Describes why the anti-pattern leads to problems
Describes what the consequences of the anti-pattern are
Describes a solution to the anti-pattern
Shows a graphical representation of the anti-pattern to
reduce misinterpretations
incrementally and iteratively developed along with the
continuous identification of relevant test cases until it
reaches a reasonable level of complexity and covers the
complete problem domain [27].</p>
        <p>
          Under the category of rule-related defect, the
contradiction in input occurs when some rules applied to the
modeled process may contradict with each other, thereby
hindering the process execution to continue as intended
[
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. An example thereof is when a certain data object
passes the input validations specified on a junction
despite being actually invalid for the supplied process. A
solution to this anti-pattern is to continuously perform a
rigorous combinatorial testing of all possible input types
and all the rules applied to the modeled process.
        </p>
        <p>
          Under the category of data-flow-related defect , the
inconsistent data describes the situation in which data
objects (e.g. customer records or insurance claim) are
accessed by concurrent process flows, thereby making it
prone to data handling mistakes. An example thereof is
when multiple processes work on duplicates of the same
data object, and a (manual) synchronization procedure
between the duplicates is required after every
modification on one side. To mitigate this, the strategy of handling
the data must be carefully defined and implemented.
4.3. Documenting process anti-patterns
In general, the documentation of modeling anti-patterns
includes many attributes of modeling patterns [28]
together with some other attributes like cause and detection
[29]. To document the process anti-patterns identified
in this study, we derive some attributes from the
templates for documenting BPM anti-patterns introduced in
[
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], as shown in table 3. Please note that, at the time
of this writing, not all attributes have been completed
for each process anti-pattern due to the need of further
information and analysis.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>5. Applying process anti-patterns in EA</title>
      <sec id="sec-3-1">
        <title>In order to illustrate the concept and the usage of process</title>
        <p>anti-pattern in the context of EA, we analyze a slightly
modified ArchiMate EA model and annotate it with
antipattern information. The model used, depicted in fig. 1,
is contained in a publicly accessible collection of
ArchiMate example EA models [30]. This model defines how
new orders are processed. After a new order is received,
planning the order and evaluating the customers’
credibility are done in parallel. After an approved proposal is
available, the customer signs the respective contract to
accept the proposal.</p>
        <p>When analysing the model, it can be observed that the
processes Evaluate customer credit and Plan order
do not wait for each completion before continuing to the
Develop approved proposal process, which may lead
to undesired results (e.g. the contract does not consider
the customer’s credibility). These are consequences of
the lack of synchronization anti-pattern.</p>
        <p>When analyzing the usage of the Order Data element,
we identify the inconsistent data anti-pattern because
this data can be changed without rerunning dependent
processes (e.g. Evaluate customer credit).</p>
        <p>Furthermore, the Evaluate customer credit process
exhibits the useless test anti-pattern, as only the positive
test result is modeled.</p>
        <p>Next, we can identify the anti-pattern end event
missing because no clear termination is defined for this EA
process model. The process could end in Refuse
proposal or in Accept proposal.</p>
        <p>Finally, we detect the contradiction in input
antipattern at the Or-Junction that splits the control flow
after Develop approved proposal. There, the incorrect
condition will never lead to the Refuse proposal process
and therefore makes it a dead process.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>6. Discussion</title>
      <sec id="sec-4-1">
        <title>Some of the main goals of applying the EA discipline within an enterprise is to ensure the business-IT align</title>
        <p>Contradiction in input</p>
        <p>Develop
approved proposal</p>
        <p>Contract
Customer
signature</p>
        <p>Refuse
proposal
Accept
proposal</p>
        <p>Process does
contain end event
New order
received</p>
        <p>Enter order</p>
        <p>Useless test</p>
        <p>Evaluate
customer credit</p>
        <p>Lack of
synchronization</p>
        <p>Plan order
Order Data</p>
        <p>Inconsistent data
CRM</p>
        <p>
          ERP
patterns in an EA model, as has been drafted in a program
that currently detects 14 EA smells [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
6.2. Threats to validity
ment [31] and to develop solid IT strategies that can help
achieve strategic targets [32]. For this reason, this section
seeks to answer the ultimate question of this study: "how
can enterprise architects benefit from the contribution
of this study?" In this section, we describe the use of the
proposed process anti-patterns to support both research
and practice of EA methods. Following to this, we discuss
the threats to the validity of our results.
        </p>
        <p>
          The results of this study have to be seen in the light of
some limitations. The limitations that afect the results
of this paper are the lack of previous research and bias
during the anti-pattern transformation.
6.1. Implication for researchers &amp; Lack of previous research. There is little research
on transforming low-level process methods to be
applicapractitioners ble for high-level processes and even much less on
bringThe concept of EA debt has recently been introduced as ing together the modeling notations for such processes.
the deviation between the current state and the hypo- In addition, the already suggested mappings between the
thetical ideal state of the enterprise [33]. Factors to such modeling notations for low-level and high-level processes
deviation in EA (e.g. sub-optimal or adverse solution are rather described as informal and lack of theoretical
design) are likely to be identifiable within the EA models foundations, thereby leaving room for interpretation or
created or used during the planning, development, eval- diferent mapping solutions. This might reduce the
vauation, or communication of the EA [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. Therefore, the lidity of our results because our approach relies on the
ability to recognize the existence of such deviation in EA existing mapping between BPMN and ArchiMate.
models is needed, and the concept of process anti-pattern Bias during the anti-pattern transformation. To
proposed in this study is intended to support such ability reduce bias when selecting the relevant BPM
antiwith sharp focus on processes. In this case, practitioners patterns to be transformed, we first need to establish
obcan use the process anti-patterns catalogue to scan the jective selection criteria. Thus, we defined a mapping of
EA models for potential EA Debt. In any case, it is bene- notations and apply it on the collected BPM anti-patterns
ifcial that the practitioners are aware of the potentially to prune the ones that do not fit in the new domain.
vulnerable parts of the EA Model as further development Despite this, subjective assessment is still inevitably
incould be hindered if these remain ignored [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. volved during the process, thereby leaving room for
in
        </p>
        <p>Furthermore, we also intend to impart food for thought terpretation and may not produce unique results.
into the EA research community and provide a basis for
further research works in this topic. For example, the
process anti-patterns identified in this study might help
researchers to extend the automatic detection of EA
anti</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>7. Conclusion &amp; Future Works</title>
      <sec id="sec-5-1">
        <title>The concept of anti-pattern has been long known to help</title>
        <p>
          recognize common solutions that are not sustainable for
the future development. However, little emphasis has
been put on studying this concept in the context of EA.
The first step in this direction has recently been made to
transfer the existing code smells into the EA domain, out
of which an initial catalogue of 45 EA smells has been
developed and proposed [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. To pursue a meaningful
extension to this result, this study focuses on transferring the
existing BPM anti-patterns [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] into process anti-patterns
for EA modeling problems, with reference to a mapping
between the notations of BPMN and ArchiMate.
        </p>
        <p>
          The process anti-patterns identified in this study are
compiled in a catalogue that is publicly accessible on our
[
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. Therein, the process anti-patterns are categorized
and documented in a well-known template to ease the use
or extension thereof by EA practitioners and researchers.
The practical use of this catalogue covers a broad range
of topics, starting from the identification of flaws in EA
models to the identification of EA debt. Nevertheless,
this catalogue is still in its initial stages. Much more
information and analyses are needed before this catalogue
can be evaluated in real industrial contexts. Therefore,
to motivate further research in this topic, the rest of this
section outlines some ideas of future research directions.
        </p>
        <p>The future research directions in this topic can be
divided into three main topics: to pursue diferent methods
for defining new EA anti-patterns, to perform
empirical studies for improving both conceptual and practical
knowledge in this context, and to develop tool supports
for the automatic detection of the anti-patterns in EA
models. In terms of analyzing more methods to find EA
anti-patterns, we suggest to investigate new domains (e.g.
documentation, data, or requirement anti-patterns) to
extend the catalogue with adapted or new EA anti-patterns.
Also, the investigation of cause-and-efect relationships
among the identified EA anti-patterns may provide
insights on the possible propagation of impacts thereof. In
terms of empirical studies, evaluations using real EA
models from diferent business domains can help to verify and
improve the quality of the catalogue and the proposed
method supports. Finally, tool supports can be developed
to support the continuous detection of EA anti-patterns
or the (early) signs of their occurrences.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Koschmider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Laue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fellmann</surname>
          </string-name>
          ,
          <article-title>Business process model anti-patterns: a bibliography and taxonomy of published work</article-title>
          , in: J. vom Brocke,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gregor</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
          Müller (Eds.),
          <source>27th European Conference on Information Systems - Information Systems for a Sharing Society</source>
          ,
          <string-name>
            <surname>ECIS</surname>
          </string-name>
          <year>2019</year>
          , Stockholm and Uppsala, Sweden, June 8-14,
          <year>2019</year>
          ,
          <year>2019</year>
          . URL: https://aisel.aisnet.org/ecis2019_rp/157.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fellmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Koschmider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Laue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Schoknecht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vetter</surname>
          </string-name>
          ,
          <article-title>Business process model patterns: State-of-the-art, research classification and taxonomy</article-title>
          ,
          <source>Business Process Management Journal</source>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1108/BPMJ-01-2018-0021.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>T.</given-names>
            <surname>Rozman</surname>
          </string-name>
          , G. Polančič,
          <string-name>
            <given-names>R. V.</given-names>
            <surname>Horvat</surname>
          </string-name>
          ,
          <article-title>Analysis of most common process modelling mistakes in bpmn process models</article-title>
          ,
          <source>in: EuroSPI</source>
          <year>2007</year>
          ,
          <string-name>
            <given-names>Industrial</given-names>
            <surname>Proceedings</surname>
          </string-name>
          ,
          <year>2007</year>
          , pp.
          <fpage>1</fpage>
          .
          <fpage>21</fpage>
          -
          <lpage>1</lpage>
          .31. URL: https://2020.eurospi.net/images/proceedings/ EuroSPI2007-ISBN-978-3-9809145-6-7.pdf .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Von Stackelberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Putze</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mülle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Böhm</surname>
          </string-name>
          ,
          <article-title>Detecting data-flow errors in bpmn 2.0</article-title>
          ,
          <string-name>
            <surname>Open</surname>
            <given-names>Journal</given-names>
          </string-name>
          <source>of Information Systems (OJIS) 1</source>
          (
          <issue>2014</issue>
          )
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R. E.</given-names>
            <surname>Giachetti</surname>
          </string-name>
          ,
          <source>Design of Enterprise Systems: Theory, Architecture, and Methods</source>
          , 1st ed., CRC Press, Inc., USA,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Salentin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hacks</surname>
          </string-name>
          ,
          <article-title>Towards a catalog of enterprise architecture smells</article-title>
          , in: N.
          <string-name>
            <surname>Gronau</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Heine</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Krasnova</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          Poustcchi (Eds.), Entwicklungen,
          <source>Chancen und Herausforderungen der Digitalisierung: Proceedings der 15. Internationalen Tagung Wirtschaftsinformatik, WI</source>
          <year>2020</year>
          , Potsdam, Germany, March 9-
          <issue>11</issue>
          ,
          <year>2020</year>
          . Community Tracks, GITO Verlag,
          <year>2020</year>
          , pp.
          <fpage>276</fpage>
          -
          <lpage>290</lpage>
          . doi:
          <volume>10</volume>
          .30844/ wi∖_
          <year>2020</year>
          ∖
          <article-title>_y1-salentin.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Koenig</surname>
          </string-name>
          , Patterns and antipatterns,
          <source>J. Object Oriented Program. 8</source>
          (
          <year>1995</year>
          )
          <fpage>46</fpage>
          -
          <lpage>48</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>T.</given-names>
            <surname>Vidacic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Strahonja</surname>
          </string-name>
          , Taxonomy of Anomalies in Business Process Models,
          <year>2014</year>
          , pp.
          <fpage>283</fpage>
          -
          <lpage>294</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -07215-9_
          <fpage>23</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Suchenia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Potempa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ligęza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Jobczyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kluza</surname>
          </string-name>
          ,
          <source>Selected Approaches Towards Taxonomy of Business Process Anomalies</source>
          , volume
          <volume>658</volume>
          ,
          <year>2017</year>
          , pp.
          <fpage>65</fpage>
          -
          <lpage>85</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          - 47208-
          <issue>9</issue>
          _
          <fpage>5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Trcka</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          , N. Sidorova,
          <article-title>Data-flow anti-patterns: Discovering data-flow errors in workflows</article-title>
          , in: P. van Eck,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gordijn</surname>
          </string-name>
          , R. J.
          <string-name>
            <surname>Wieringa</surname>
          </string-name>
          (Eds.),
          <source>Advanced Information Systems Engineering</source>
          , 21st International Conference, CAiSE
          <year>2009</year>
          , Amsterdam, The Netherlands, June 8- 12,
          <year>2009</year>
          . Proceedings, volume
          <volume>5565</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2009</year>
          , pp.
          <fpage>425</fpage>
          -
          <lpage>439</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -02144-2∖_
          <fpage>34</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S. W.</given-names>
            <surname>Sadiq</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Orlowska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Sadiq</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Foulger</surname>
          </string-name>
          ,
          <article-title>Data flow and validation in workflow modelling</article-title>
          , in: K. Schewe,
          <string-name>
            <given-names>H. E.</given-names>
            <surname>Williams</surname>
          </string-name>
          (Eds.),
          <source>Database Technologies</source>
          <year>2004</year>
          ,
          <source>Proceedings of the Fifteenth Australasian Database Conference, ADC</source>
          <year>2004</year>
          , Dunedin, New Zealand,
          <fpage>18</fpage>
          -
          <lpage>22</lpage>
          January
          <year>2004</year>
          , volume
          <volume>27</volume>
          <source>of CRPIT, Australian Computer Society</source>
          ,
          <year>2004</year>
          , pp.
          <fpage>207</fpage>
          -
          <lpage>214</lpage>
          . URL: http://crpit.scem.westernsydney.edu.au/ [23]
          <string-name>
            <given-names>C.</given-names>
            <surname>Dias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Stein Dani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          , L. Thom, abstracts/CRPITV27Sadiq.html.
          <article-title>Anti-patterns for Process Modeling Problems: An</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Döhring</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Heublein</surname>
          </string-name>
          , Anomalies in rule-adapted
          <source>Analysis of BPMN 2.0-Based Tools Behavior</source>
          ,
          <year>2019</year>
          , workflows
          <article-title>- a taxonomy and solutions for vbpmn</article-title>
          , pp.
          <fpage>745</fpage>
          -
          <lpage>757</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -37453- in
          <source>: 2012 16th European Conference on Software 2_59. Maintenance and Reengineering</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>117</fpage>
          -
          <lpage>126</lpage>
          . [24]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ling</surname>
          </string-name>
          , W. Huang, Defi-
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Viljoen</surname>
          </string-name>
          ,
          <article-title>Reflections on business process nition and detection of control-flow anti-patterns levelling</article-title>
          ,
          <source>white paper</source>
          ,
          <year>2012</year>
          .
          <article-title>URL: https: in process models</article-title>
          , in: 2013 IEEE 37th Interna//realirm.com/sites/default/files/whitepapers/ tional Computer Software and Applications Conreflections_
          <article-title>on_business_process_leveling_0.pdf . ference Workshops (COMPSACW)</article-title>
          , IEEE Computer
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Koschmider</surname>
          </string-name>
          , E. Blanchard,
          <source>User assistance for Society</source>
          , Los Alamitos, CA, USA,
          <year>2013</year>
          , pp.
          <fpage>433</fpage>
          -
          <lpage>438</lpage>
          .
          <article-title>business process model decomposition</article-title>
          , in: Proceed- doi:10.1109/COMPSACW.
          <year>2013</year>
          .
          <volume>111</volume>
          . ings of the 1st IEEE International Conference on [25]
          <string-name>
            <given-names>R.</given-names>
            <surname>Laue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Awad</surname>
          </string-name>
          ,
          <source>Visualization of business proResearch Challenges in Information Science</source>
          ,
          <year>2007</year>
          ,
          <article-title>cess modeling anti patterns</article-title>
          ,
          <source>ECEASST</source>
          <volume>25</volume>
          (
          <year>2010</year>
          ). pp.
          <fpage>445</fpage>
          -
          <lpage>454</lpage>
          . doi:
          <volume>10</volume>
          .14279/tuj.eceasst.
          <volume>25</volume>
          .344.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>K.</given-names>
            <surname>Pefers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Tuunanen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rothenberger</surname>
          </string-name>
          , S. Chat- [26]
          <string-name>
            <given-names>R.</given-names>
            <surname>Laue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Koop</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gruhn</surname>
          </string-name>
          ,
          <article-title>Indicators for open terjee, A design science research methodology issues in business process models</article-title>
          ,
          <source>in: International for information systems research</source>
          <volume>24</volume>
          (
          <year>2007</year>
          )
          <fpage>45</fpage>
          -
          <lpage>77</lpage>
          . Working Conference on Requirements Engineering: doi:10.2753/MIS0742-1222240302. Foundation for Software Quality, Springer,
          <year>2016</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Hevner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. T.</given-names>
            <surname>March</surname>
          </string-name>
          , J. Park, S. Ram,
          <source>Design 102-116. science in information systems research</source>
          , MIS Q.
          <volume>28</volume>
          [27]
          <string-name>
            <given-names>P.</given-names>
            <surname>Desfray</surname>
          </string-name>
          , G. Raymond, Chapter 5 - key mod(
          <year>2004</year>
          )
          <fpage>75</fpage>
          -
          <lpage>105</lpage>
          . URL: http://misq.org/design-science
          <article-title>- eling techniques</article-title>
          , in: P. Desfray,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Raymond in-information-systems-research</article-title>
          .html. (Eds.), Modeling Enterprise Architecture with TO-
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <article-title>Business process model patterns classification</article-title>
          , GAF,
          <string-name>
            <surname>The</surname>
            <given-names>MK</given-names>
          </string-name>
          /OMG Press, Morgan Kaufmann,
          <volume>15</volume>
          .
          <fpage>11</fpage>
          .
          <year>2020</year>
          . URL: http://www.bpmpatterns.org/. Boston,
          <year>2014</year>
          , pp.
          <fpage>67</fpage>
          -
          <lpage>91</lpage>
          . doi:https://doi.org/
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <source>[18] Archimate® 3.1 specification</source>
          ,
          <volume>27</volume>
          .
          <fpage>06</fpage>
          .
          <year>2020</year>
          .
          <volume>10</volume>
          .1016/B978-0
          <source>-12-419984-2</source>
          .
          <fpage>00005</fpage>
          -
          <lpage>7</lpage>
          . URL: https://pubs.opengroup.org/architecture/ [28]
          <string-name>
            <given-names>E.</given-names>
            <surname>Gamma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Helm</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Johnson</surname>
          </string-name>
          , J. Vlissides,
          <string-name>
            <surname>Design</surname>
          </string-name>
          archimate3-doc/. Patterns, volume
          <volume>47</volume>
          of Addison Wesley Professional
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>D.</given-names>
            <surname>Orlovskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kopp</surname>
          </string-name>
          ,
          <source>Enterprise architecture Computing Series</source>
          ,
          <year>1995</year>
          .
          <article-title>modeling support based on data extraction from</article-title>
          [29]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bogner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Boceck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Popp</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          <article-title>Tschechlov, business process models</article-title>
          , in: S. Subbotin (Ed.),
          <string-name>
            <given-names>S.</given-names>
            <surname>Wagner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zimmermann</surname>
          </string-name>
          ,
          <article-title>Towards a collaboProceedings of The Third International Workshop rative repository for the documentation of serviceon Computer Modeling and Intelligent Systems based antipatterns and bad smells, in: 2019 (CMIS-</article-title>
          <year>2020</year>
          ), Zaporizhzhia, Ukraine, April 27-May
          <source>IEEE International Conference on Software Ar1</source>
          ,
          <year>2020</year>
          , volume
          <volume>2608</volume>
          of CEUR Workshop Proceed- chitecture
          <string-name>
            <surname>Companion (ICSA-C)</surname>
          </string-name>
          ,
          <year>2019</year>
          , pp.
          <fpage>95</fpage>
          -
          <lpage>101</lpage>
          . ings, CEUR-WS.org,
          <year>2020</year>
          , pp.
          <fpage>499</fpage>
          -
          <lpage>513</lpage>
          . URL: http: doi:10.1109/ICSA-C.
          <year>2019</year>
          .
          <volume>00025</volume>
          . //ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2608</volume>
          /paper38.pdf . [30]
          <string-name>
            <given-names>P.</given-names>
            <surname>Beauvoir</surname>
          </string-name>
          ,
          <article-title>A collection of archimate® models</article-title>
          .,
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lankhorst</surname>
          </string-name>
          ,
          <source>Combining archimate® 3.0 27</source>
          .06.
          <year>2020</year>
          . URL: https://github.com/archimatetool/ with other standards
          <source>- bpmn, 6.9</source>
          .
          <year>2016</year>
          .
          <article-title>ArchiModels</article-title>
          . URL: https://bizzdesign.com/blog/combining- [31]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gøtze</surname>
          </string-name>
          ,
          <article-title>The changing role of the enterprise archiarchimate-3-0-with-other-standards-bpmn/</article-title>
          . tect, in: 2013 17th
          <string-name>
            <given-names>IEEE</given-names>
            <surname>International Enterprise</surname>
          </string-name>
          Dis-
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>L.</given-names>
            <surname>Penicina</surname>
          </string-name>
          ,
          <article-title>Linking bpmn, archimate, and BWW: tributed Object Computing Conference Workshops, perfect match for complete</article-title>
          and
          <source>lawful business</source>
          <year>2013</year>
          , pp.
          <fpage>319</fpage>
          -
          <lpage>326</lpage>
          . doi:
          <volume>10</volume>
          .1109/EDOCW.
          <year>2013</year>
          .
          <volume>42</volume>
          . process models?, in: J.
          <string-name>
            <surname>Grabis</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Kirikova</surname>
            , [32]
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Strano</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          <string-name>
            <surname>Rehmani</surname>
          </string-name>
          ,
          <article-title>The role of the enterprise J</article-title>
          .
          <string-name>
            <surname>Zdravkovic</surname>
          </string-name>
          , J. Stirna (Eds.), Short Paper Pro- architect, Inf. Syst.
          <string-name>
            <surname>E-Business</surname>
            <given-names>Management</given-names>
          </string-name>
          5
          <article-title>(2007) ceedings of the 6th IFIP WG 8</article-title>
          .1 Working Confer-
          <volume>379</volume>
          -
          <fpage>396</fpage>
          . doi:
          <volume>10</volume>
          .1007/s10257-007
          <source>-0053-1. ence on the Practice of Enterprise Modeling (PoEM</source>
          [33]
          <string-name>
            <given-names>S.</given-names>
            <surname>Hacks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Höfert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Salentin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. C.</given-names>
            <surname>Yeong</surname>
          </string-name>
          ,
          <year>2013</year>
          ), Riga, Latvia, November 6-
          <issue>7</issue>
          ,
          <year>2013</year>
          , volume
          <string-name>
            <given-names>H.</given-names>
            <surname>Lichter</surname>
          </string-name>
          ,
          <source>Towards the definition of enterprise 1023 of CEUR Workshop Proceedings</source>
          , CEUR-WS.
          <article-title>org, architecture debts</article-title>
          ,
          <source>in: 23rd IEEE International</source>
          <year>2013</year>
          , pp.
          <fpage>156</fpage>
          -
          <lpage>165</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol- Enterprise
          <source>Distributed Object Computing Work1023/paper15.pdf . shop, EDOC Workshops</source>
          <year>2019</year>
          , Paris, France, Oc-
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>B.-D. Lehmann</surname>
          </string-name>
          ,
          <source>Enterprise process anti- tober 28-31</source>
          ,
          <year>2019</year>
          ,
          <year>2019</year>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>16</lpage>
          . doi:
          <volume>10</volume>
          .1109/ pattern, 05.
          <fpage>10</fpage>
          .
          <year>2020</year>
          . URL: https://ea-anti
          <source>- EDOCW</source>
          .
          <year>2019</year>
          .
          <volume>00016</volume>
          . pattern.pages.
          <fpage>rwth</fpage>
          -aachen.de/process-antipatterns/.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>