<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Enhancing the Assessment of Digital Archive Maturity using Enterprise Architecture</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Miguel</forename><surname>Cruz</surname></persName>
							<email>migueldcostacruz@tecnico.ulisboa.pt</email>
							<affiliation key="aff0">
								<orgName type="department">INESC-ID</orgName>
								<address>
									<addrLine>Rua Alves Redol 9</addrLine>
									<postCode>1000-029</postCode>
									<settlement>Lisbon</settlement>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sérgio</forename><surname>Guerreiro</surname></persName>
							<email>sergio.guerreiro@tecnico.ulisboa.pt</email>
							<affiliation key="aff0">
								<orgName type="department">INESC-ID</orgName>
								<address>
									<addrLine>Rua Alves Redol 9</addrLine>
									<postCode>1000-029</postCode>
									<settlement>Lisbon</settlement>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Instituto Superior Técnico</orgName>
								<orgName type="institution">Universidade de Lisboa</orgName>
								<address>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">José</forename><surname>Borbinha</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">INESC-ID</orgName>
								<address>
									<addrLine>Rua Alves Redol 9</addrLine>
									<postCode>1000-029</postCode>
									<settlement>Lisbon</settlement>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Instituto Superior Técnico</orgName>
								<orgName type="institution">Universidade de Lisboa</orgName>
								<address>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Diogo</forename><surname>Proença</surname></persName>
							<email>diogo.proenca@tecnico.ulisboa.pt</email>
							<affiliation key="aff0">
								<orgName type="department">INESC-ID</orgName>
								<address>
									<addrLine>Rua Alves Redol 9</addrLine>
									<postCode>1000-029</postCode>
									<settlement>Lisbon</settlement>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Instituto Superior Técnico</orgName>
								<orgName type="institution">Universidade de Lisboa</orgName>
								<address>
									<country key="PT">Portugal</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Enhancing the Assessment of Digital Archive Maturity using Enterprise Architecture</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">58FA4EB73E61FC5565D5CCDDA70DB4CF</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:24+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Blueprint, Digital Archiving, Maturity Model, Reference Architecture, Viewpoint (D. Proença) 0009-0005-2869-9129 (M. Cruz)</term>
					<term>0000-0002-8627-3338 (S. Guerreiro)</term>
					<term>0000-0001-5463-8438 (J. Borbinha)</term>
					<term>0000-0002-3671-9637 (D. Proença)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper addresses the problem of evaluating the maturity of a digital archive in terms of its digital preservation capabilities. The European eArchiving initiative supports this assessment by providing the key tools of: a maturity model (eACMM), a reference architecture (eRA), and a collection of real-world cases based on the eRA framework. To our knowledge, this is the first paper to integrate these artifacts for a comprehensive evaluation. The eACMM is represented by a set of detailed requirements classified by importance. The eRA is represented by an ArchiMate model, and the real-world cases are represented as ArchiMate eRA viewpoints. This paper details the process of how to assess the real-world cases against the eACMM and demonstrates the value of such viewpoints. One significant challenge addressed in the literature is the lack of effective view models for identifying gaps in reference architectures. Despite the systematic prescription offered by maturity models, they often lack the support of mechanisms that are necessary to fully realize the potential of diagnosing the current stage and identifying the next steps to increase maturity. This paper contributes with a solution implemented in a Enterprise Architecture management tool where the output is the automatic creation of Enterprise Architecture blueprints. Obtained results corroborate that our solution easily identifies the level of eACMM maturity in respect to eRA concepts, and also an immediate identification of actions that should be done to improve the eACMM level.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>This paper addresses on how to assess the maturity of a digital archive using the resources of the eArchiving Capability Maturity Model (eACMM) and the eArchiving Reference Architecture (eRA), both initially developed by the E-ARK project 1 and later adopted by the European Union eArchiving Initiative 2 .</p><p>Existing maturity models are beneficial, but often miss the supporting mechanisms to realize their full potential. This paper seeks to bridge this gap by demonstrating how Enterprise Architecture (EA) <ref type="bibr" target="#b1">[1,</ref><ref type="bibr" target="#b2">2]</ref> management can enhance the usability and effectiveness of maturity models, fostering better decision-making and targeted improvements in organizational structures. The goal is to produce visual aids that can facilitate the maintenance and enhancement of digital archive implementation maturity by providing blueprints that encapsulate pertinent information about the maturity model. Furthermore, the paper aims to enable stakeholders to identify and rectify gaps through automatically generated visual representations, as already attempted by <ref type="bibr" target="#b3">[3]</ref>. These blueprints provide a complete overview, facilitating a more intuitive grasp of the maturity model's current status and areas for growth.</p><p>One limitation identified in the literature is the lack of tools currently available for representing the maturity gaps. Usually, this is done manually, but automatic approaches are already being pointed as a future solution to obtain better assessments <ref type="bibr" target="#b4">[4]</ref>. While maturity models provide valuable insights, their full potential remains unrealized without adequate support mechanisms.</p><p>Central to this process is the usage of the tool ATLAS <ref type="foot" target="#foot_0">3</ref> that supports various features of EA management. Specially relevant to our focus was its capability to generate views providing a visual synthesis of complex data, making it easier to analyze and identify discrepancies within the models. By leveraging ATLAS, the paper demonstrates how a systematic approach can be used to visualize and thereby enhance the maturity models under consideration. A dataset containing real digital archives implementations that used the eRA validates our maturity assessment proposal. It is important to emphasize that this paper is closely aligned with the eArchiving initiative, the eRA and the eACMM. eACMM is composed by a set of requirements represented as structured information, while eRA and the cases were represented in an ArchiMate model as a structured collection of elements, relationships and viewpoints.</p><p>For short, the solution encompasses the following stages done in the EAM tool: a) importing data, b) classifying the eACMM in the eRA model, c) computing the eACMM capability level for each element of the real-world case represented by the eRA model, and d) visualizing the eACMM capability levels organized by capability.</p><p>The Design Science Research (DSR) method, as outlined by Peffers et al. <ref type="bibr" target="#b5">[5]</ref>, is employed, in this paper, due to its alignment with the expected enterprise architecture (EA) deliverables of our work, which are conceptually similar to DSR artifacts. These artifacts represent an organization's structure, components, and interactions, providing a holistic perspective of its processes, information systems, technology, and more. Moreover, DSR is chosen for its suitability in understanding and advancing existing EA models. Its cyclical nature allows for iterative refinement of artifacts based on feedback from experts and practitioners, ensuring that the resulting viewpoints to be both theoretically rigorous and practically effective.</p><p>The paper is organized as follows. Section 2 presents the background concepts. Then, Section 3 describes and compares the EA tools that are of potential use in our paper. Afterwards, Section 4 details our solution. Section 5 validates the solution using the available datasets from E-ARK project. Finally, Section 6 concludes the paper and identifies future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background</head><p>The E-ARK project (European Archival Records and Knowledge Preservation) was a multinational initiative aimed at standardizing digital archiving methods across Europe. Running from 2014 and cofunded by the European Commission, it developed guidelines, open technical products, and integrated archiving infrastructure to enhance the availability, access, and use of archival data. Its results were adopted by the present eArchiving Initiative, which is influencing the European landscape in relation to the concern of digital preservation in the domain of digital archives.</p><p>This paper uses the dataset of the "eArchiving Referece Architecture v2.0", which is publicly available at: https://kc.dlmforum.eu/earchiving-ra20/ and the maturity model eACMM, both developed by E-ARK. These components already exist and are confirmed in the domain of digital archives and digital preservation. The focus is on enhancing their usability and effectiveness through the development of visual features.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Maturity Models</head><p>Maturity models are widely used and recognized in both business and academics due to their simplicity and effectiveness. They can assist stakeholders grasp the present degree of maturity of a certain element in a meaningful way, allowing them to clearly identify strengths and weaknesses that need to be improved, and so prioritize what has to be done to achieve the next level. This may be used to demonstrate the outcomes of that endeavor, allowing stakeholders to determine whether the results justify the work or expenditure.</p><p>According to Proença and Borbinha <ref type="bibr" target="#b6">[6]</ref>, a maturity model outlines a progression toward a more structured and systematic approach to business operations. It is a commonly employed method for evaluating specific facets of organizations and businesses, such as business processes. A maturity model represents commonly accepted and validated knowledge, thus conducting a maturity assessment against and established maturity model helps stakeholders pinpoint strengths but also areas needing improvement, allowing them to prioritize actions to reach higher maturity levels. These assessments can vary from straightforward self-assessment questionnaires to comprehensive evaluation methods.</p><p>Proença and Borbinha <ref type="bibr" target="#b7">[7]</ref> discuss how a maturity model can be a useful tool for assessing various domains of concerns and charting organized routes to better business practices. Typically, maturity models have various "maturity levels," usually five (but this might vary): Initial, Managed, Defined, Quantitatively Managed, and Optimizing. Maturity models give businesses with: (1) auditing and benchmarking metrics; (2) progress evaluation versus objectives; and (3) insights into strengths, shortcomings, and opportunities, which help in strategic decision-making and project management. Maturity is described as the process of managing and directing an entity's growth, meeting organizational goals, and transitioning from an initial to a more mature condition. Mature companies use different indications than less mature ones. Maturity models guide the progression from a starting condition to a targeted maturity state, offering a framework for evaluation, benchmarking, and continuous improvement.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">eACMM</head><p>The eACMM, that is a e-ARK's product, considers five maturity levels, which are, from the lowest to the highest: (1) Initial, (2) Basic, (3) Intermediate, (4) Advanced and (5) Optimizing, as depicted in Figure <ref type="figure" target="#fig_0">1</ref>. It also focuses that on six fundamental capabilities for digital preservation: Pre-Ingest, Ingest, Access, Preservation and accessibility planning, Data Management, and Archival Storage. This method allows businesses to analyze their information governance practices around digital preservation. The eACMM focuses on the most significant references for digital archiving, particularly those that are being enhanced as part of the old eArchiving Building Block and the present eArchiving Initiative.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Maturity models and reference architectures</head><p>Reference architectures and maturity models are two key ideas in EA <ref type="bibr" target="#b2">[2]</ref> that strive to improve organizational efficiency and effectiveness. Reference architectures provide a standardized framework for designing and implementing business processes and IT infrastructure, whereas maturity models examine an organization's processes and structures for sophistication and competence. Understanding the relationship between these two ideas is critical for achieving an organization's strategic objectives and operational excellence.</p><p>Pereira and Sousa <ref type="bibr" target="#b8">[8]</ref>, discuss how reference architectures, such as the Zachman Framework <ref type="bibr" target="#b9">[9]</ref>, TOGAF (The Open Group Architecture Framework) <ref type="foot" target="#foot_1">4</ref> , and others offer blueprints for the structure and operation of the IT and business processes in an organization <ref type="bibr" target="#b10">[10]</ref>. These references define the important components and their linkages, ensuring that the organization's procedures are in accordance with its strategic goals. Reference architectures thus provide uniform languages and sets of standards to simplify the understanding of complicated realities, promote consistency, and ensure interoperability across domains.</p><p>Luftman <ref type="bibr" target="#b11">[11]</ref> used the Capability Maturity Model Integration (CMMI) and the Business IT Alignment Maturity model to assess the current state of the processes of an organization, and provides a road map for continuous improvement. Models like that make possible to evaluate the effectiveness, efficiency, and agility of business and IT processes, identifying strengths and areas for improvement. They can guide organizations in progressing through various maturity levels, from initial and ad hoc practices to optimized and continuously improving processes.</p><p>The symbiotic relationship between reference architecture and maturity models is addressed Pereira and Sousa <ref type="bibr" target="#b12">[12]</ref>. Reference architectures can serve as a foundation upon which maturity models can be applied, as they can provide the structured environment necessary for the effective maturity assessment. For instance, the use of a comprehensive reference architecture ensures that all components of the organization that are modeled can be considered during the maturity assessment, thereby providing a holistic view of the capabilities of the business.</p><p>Van Steenbergen et al. <ref type="bibr" target="#b13">[13]</ref> discuss on how maturity models leverage reference architectures to identify gaps and weaknesses in the current system is presented. By mapping maturity model assessments to the reference architecture, organizations can pinpoint specific areas that require improvement and develop targeted strategies to enhance those areas. This alignment ensures that improvements are implemented in a systematic and cohesive way, consistent with the organization's overarching strategic direction. For example, the Business IT Alignment Maturity model may be linked to the architectural domains of TOGAF (business, data, application, and technology), indicating a clear route to greater levels of alignment and maturity.</p><p>Gonzalez-Perez et al. <ref type="bibr" target="#b14">[14]</ref> emphasize that reference models facilitate the implementation of maturity models by providing predefined templates and best practices. These characteristics are critical for businesses with lower maturity levels, where procedures may be unclear or poorly defined. Reference models provide a starting point and a set of standards that may be customized to meet the organization's particular needs. This organized strategy reduces the risks associated with ad hoc deployments and guarantees that gains last in the long run.</p><p>According to Proença and Borbinha <ref type="bibr" target="#b15">[15]</ref>, the EA domain exists to address the challenge of ensuring alignment between IT and business. EA offers advice on harmonizing business and IT, but adopting its approaches might be difficult. This study seeks to provide a maturity model for EA in companies as a governance tool for analyzing and improving their existing status. Maturity models enable reengineering linked to the EA life cycle through benchmarking and road map planning. This model is built on design science research and current literature, and it identifies essential success elements while also reviewing previous maturity models. The suggested model, which was tested in a multistep procedure, fills gaps in existing models by including best practices and key success criteria. EA entails developing models that represent an enterprise's organizational structure, business processes, information systems, and infrastructure in order to manage and maintain alignment across time. Despite existing approaches, companies lack tools for assessing their present EA practices and identifying changes, making it difficult to improve their EA management practices.</p><p>In conclusion, the relationship between reference architectures and maturity models in the EA context is integral to achieving organizational excellence. Reference architectures provide the structural framework and common language necessary for effective maturity assessments, while maturity models offer a road map for continuous improvement. Together, they enable organizations to systematically enhance their processes and capabilities, ensuring alignment with strategic objectives and fostering long-term success <ref type="bibr" target="#b16">[16,</ref><ref type="bibr" target="#b17">17]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Enterprise Architecture tools evaluation</head><p>This section reports to EA tools that are available to capture, transform and generate related data. EA is defined by TOGAF <ref type="bibr" target="#b18">[18]</ref> as "the structure of components, their inter-relationships, and the principles and guidelines governing their design and evolution over time". Also, Greefhorst and Proper <ref type="bibr" target="#b19">[19]</ref> consider three perspectives for architecture: "regulation-oriented, design-oriented, and knowledge-oriented, where the first corresponds to the prescriptive perspective, the second corresponds to the descriptive perspective, and the third corresponding to the high-level design decisions of the system". The EA way of working are proposed by many standards that are widely used in industry, e.g. TOGAF, DODAF, MODAF, etc., and are recognized as a lingua franca between clients, suppliers, consultants and/or researchers. The usage of tools aids the creation of EA artifacts, such as catalogs, matrices and diagrams, avoiding expending large amounts of time and effort to create them.</p><p>From the data summarized in Table <ref type="table" target="#tab_0">1</ref>, it is observable that ATLAS in comparison to other tools such as ADOIT <ref type="foot" target="#foot_2">5</ref> , Archi<ref type="foot" target="#foot_3">6</ref> , ARIS <ref type="foot" target="#foot_4">7</ref> , Enterprise Architect<ref type="foot" target="#foot_5">8</ref> , LeanIX<ref type="foot" target="#foot_6">9</ref> , MEGA <ref type="foot" target="#foot_7">10</ref> , and BizzDesign<ref type="foot" target="#foot_8">11</ref> , offers features particularly suited to the maintenance of EA models and the creation of on-the-fly views of the model. ATLAS was used with a specific focus on digital preservation efforts, such as the E-ARK project, and is primarily used to generate graphical representations that aid in the analysis and decision-making processes in complex architectural environments.</p><p>ATLAS was chosen for the E-ARK project because of its capabilities to model and manage digital preservation procedures, and pragmatically, because it was a known tool for the research team. It assisted with critical activities such as blueprint design and effect analysis, both of which were required to assess digital archive maturity. However, it is crucial to highlight that the applicability of ATLAS varies based on the project objectives, and this comparison reflects its specific application within the context of the E-ARK project.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Solution</head><p>This section demonstrates the solution, systematically increasing the level of information provided to ensure a thorough understanding of the concepts presented. This step-by-step approach enhances clarity and guides the reader through the intricacies of our method, facilitating a detailed exploration of how our solution addresses the research problem. As an overview of the solution, Figure <ref type="figure" target="#fig_2">2</ref> depicts how the three steps are executed to generate the EA artifacts.</p><p>Prior to commencing the analysis of the solution, it is crucial to provide a comprehensive description of the dataset. The dataset is fundamentally derived from the project's reference architecture, which encompasses 616 elements across various classes. The Table <ref type="table" target="#tab_1">2</ref> provides a detailed breakdown and analysis of these dataset elements.</p><p>The initial step is to import the dataset into our ATLAS tool, and then create our metamodel based on the classes in the dataset. However, it is possible to add properties to these classes within the dataset. In addition to the convenience of using a Business Actor like Joe, the tool allows you to add properties to an object, such as Joe's age. In ATLAS, the information about Joe object is stored, which is the Business Actor type and that he is, e.g., 40 years old. This method manipulates and adds properties to metamodel classes using this analogy, allowing us to create blueprints. In this scenario, the Boolean property "isAssessed" is added to all metamodel classes to indicate which objects in the dataset were or were not covered by the maturity model. The paper also included a property named "environment" to distinguish which features are included in each case study and even the reference architecture. In addition to the classes found in the dataset, the Assessment class is generated, which has attributes like maturity level, capability level, and capability function. Objects in this class can be associated with objects in any other class in the metamodel, thus providing information on the relationship between the assessment made and the element covered by that assessment.</p><p>Our solution is based on the construction of blueprints and can be categorized into two distinct branches. One branch focuses on conducting a compliance analysis between real cases and the eRA, while the other branch centers on providing an overview of the eACMM. In the demonstration of the first branch, a comparison between RODA case with eRA is done. Although the solution have the capability to analyse five real cases: RODA, ARS, ESSArch, NAE and NAF. The solution covers all these cases by inserting initial parameters when the blueprint is started. In this case, when blueprints are opened, for the first part of the solution, a pop-up window will appear, allowing us to choose an option from the list of real cases mentioned above. For example, for the following demonstrations below, the   RODA parameter has been chosen. This means that the elements to be compared with the reference architecture will be those present in the RODA architecture.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Case Studies and Application of the eACMM Model</head><p>In this study, various case studies were used to demonstrate the actual implementation of the eACMM maturity model in conjunction with EA models. The case studies chosen include RODA, ARS, ESSArch, NAE, and NAF. These are the identical cases used in the reports that will help us validate. RODA (Repository of Authentic Digital Objects) is a digital preservation platform that ensures long-term access to digital content. It covers the entire digital archiving process, including ingest, archival storage, and access to digital objects.</p><p>The ARS (Archival Repository System) focuses on the management of archival records, ensuring that ingest, archival storage, and preservation processes are compliant with digital preservation standards.</p><p>ESSArch is a digital preservation system designed to maintain the integrity and accessibility of digital archives over time.</p><p>The NAE (National Archives of Estonia) focuses on ingesting and preserving large volumes of government records.</p><p>NAF (National Archives of Finland) handles both the preservation and dissemination of government records and historical data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Clarifying the Link between eACMM and the Solution</head><p>The purpose of the eACMM is to evaluate the maturity of digital preservation processes. It focuses on three major aspects of an archive: ingest, archival preservation, and dissemination. These processes are crucial in ensuring the long-term preservation and accessibility of digital records. The eACMM evaluates an organization's capabilities in managing these processes using a set of capability levels, ranging from basic to optimizing. Each level assesses an organization's ability to implement and maintain effective digital preservation workflows.</p><p>Our suggested approach makes use of EA models, specifically ArchiMate, to improve these procedures by offering clear, pictorial depictions of the systems in question. These models aid in detecting weaknesses and potential areas for enhancement in the adoption of digital preservation best practices. Through mapping digital preservation systems' capabilities to the eACMM, it is guaranteed that organizations can systematically advance their maturity in all important areas. For instance, depicting the data flow through the ingest process, from submission to archival storage, using ArchiMate models, emphasizes decision-making points and roles. Inefficiencies or potential issues in the preservation workflow can be then identified and changes that are consistent with greater capability levels can be suggested, by evaluating the implemented flow against the eACMM maturity criteria.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Compliance analysis</head><p>As previously mentioned, our solution includes a branch dedicated to conducting a compliance analysis between a given real case and the E-ARK reference architecture. This analysis involves assessing both sides to determine their alignment and compatibility. Starting with the most basic subset of this solution view. The figure <ref type="figure" target="#fig_3">3</ref> illustrates the business functions present in both the reference architecture and the scenario. The left box displays all business functions within the reference architecture, while the right box shows those present in the scenario. This visual comparison allows for a quick assessment of compliance, identifying which elements align and which do not between the two sets.  In the next stage, a box is located in the middle to indicate which elements have been reviewed, and therefore, are included in the maturity model. At this point, merely adding a box increases the amount of information provided by the plan. In the middle box, it is revealed the parts that are examined by the maturity model, which are the model's major components. Figure <ref type="figure" target="#fig_4">4</ref> illustrates the process.</p><p>In the third step of our process, the box housing the assessed elements based on their capability are considered, and created an alternative blueprint version categorized by capability levels. As part of enhancing clarity and usability, color coding is incorporated, specifically employing green and red hues within the scenario elements box. These colors serve a crucial role in swiftly identifying whether an element has undergone evaluation or not. A red indication adjacent to an element signifies its non-assessment status, whereas a green indication denotes that the element has been thoroughly evaluated. This strategic integration of color coding not only streamlines the assessment process but also enhances the overall accessibility and interpretation of the blueprint and its respective components. Algorithm 1 depicts the pseudo code for construction of this process to designing the final blueprints. The pseudo-code is adapted to the blueprint version that is organized by the capability levels, but it can be easily adapted to the maturity level version. On the one hand, our proposal have to check what capacity function an assessment that is associated with a dataset element has. The solution is checking what is written in the property "CapabilityFunction" from an assessment that is associated to an object from our dataset. To adapt it to the maturity level blueprint version a check about what are the number written on the "MaturityLevel" property from an assessment associated to an object is required. It will look like this: 𝑜𝑏𝑗𝑒𝑐𝑡.𝐴𝑠𝑠𝑒𝑠𝑠𝑚𝑒𝑛𝑡.𝑀 𝑎𝑡𝑢𝑟𝑖𝑡𝑦𝐿𝑒𝑣𝑒𝑙.</p><p>Figures <ref type="figure" target="#fig_5">5 and 6</ref> present the generated blueprints that include that third step, in the leftmost box all the elements belonging to the reference architecture. In the middle box, these same elements are evaluated, i.e., they are linked to the maturity model. In the right-hand box is depicted the elements that are part of the scenario, in this case the RODA scenario. It is shown that although there are only part of the elements present in the reference architecture, they correspond, and in the small colored boxes the elements evaluated in the scenario also conform to the reference model.</p><p>In this case, the scenario is in line with the reference architecture. Therefore, the organization would only recommend adding the elements that the reference architecture box contains and the real case does not. The elements that should be assessed are also in conformity. Figure <ref type="figure">7</ref> exemplifies the final solution blueprint covering all the layers that the scenario contains. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4.">Maturity model overview</head><p>This section introduces an alternative blueprint emphasizing the maturity context of eACMM's capabilities. Each capability is depicted as a series of nested boxes, illustrating its evolution across various capability levels. This hierarchical representation offers a detailed view of how each capability progresses in terms of maturity within the E-ARK framework. Algorithm 2 depicts the pseudo-code trying to demonstrate the logic of the implementation of this part. Due to the code becoming repetitive, only the case in which the object is populated in the Pre-Ingest sub-container will be exemplified, however it can be generalized to Pre-ingest, Ingest, Access, Preservation, Data Management and Archival Storage. Figure <ref type="figure" target="#fig_7">8</ref> shows not only one class but as many as the ones contained in our maturity model. One business process and two business functions are observed. It is also relevant how the elements are distributed by their capability level. Figure <ref type="figure" target="#fig_8">9</ref> depicts the global result of the blueprint, here intentionally shown only as a low detailed glimpse view.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Validation</head><p>This section details the validation process undertaken to assess the effectiveness and reliability of our proposed solution. Our validation criterion centers on a comparison with definitive reports 12 13  generated by the E-ARK project team, considered authoritative and universally accepted as correct. The core of our validation hinges on achieving identical results to those outlined in this benchmark document. Our approach systematically scrutinizes the outputs generated by our solution against the outcomes documented in the E-ARK report. This thorough analysis ensures not only technical accuracy  but also alignment with established standards and methods stipulated by E-ARK. By demonstrating that our solution consistently produces results congruent with those in the authoritative report, this paper underscore its reliability and applicability within the context of compliance analysis for reference architectures.</p><p>Moreover, this validation phase serves as a cornerstone in affirming the credibility of our solution. The convergence of our findings with those of the E-ARK report validates not only the technical robustness of our method but also its potential to contribute significantly to advancing the field's understanding and implementation of compliance analysis within reference architecture frameworks.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>This paper presents an advancement to the field of EA by addressing the critical need for effective tools/view models to enhance and maintain maturity models. By developing visual tools using the ATLAS platform, this research provides a novel approach to synthesizing complex data into comprehensible blueprints. These visual representations enable stakeholders to identify and rectify gaps, fostering a more intuitive understanding of the maturity model's current state and areas requiring improvement. The alignment with the E-ARK project underscores the practical applicability of this research, demonstrating its relevance and potential impact. By integrating these visual tools with the E-ARK reference architecture and maturity model, the paper addresses the existing gaps between them and enhances the overall usability and effectiveness of maturity models.</p><p>Ultimately, this work aims to empower stakeholders to make more informed decisions and implement targeted improvements within their organizational structures. The comprehensive approach outlined in this paper not only maximizes the utility and impact of maturity models but also contributes to the broader goal of advancing EA practices. This paper represents a pivotal step towards more effective management and enhancement of maturity models, ensuring they fulfill their potential as valuable tools for organizational development and success.</p><p>In the end, we realized that two tasks could have been done differently, which is now identified as future work: the assessments could have been imported by interpreting ATLAS Forms, creating a questionnaire that generates the same data as the manually importation that was done. Consequently, by filling in a questionnaire, the maturity assessment process would resemble the process that was used to generate the reports used to validate our solution. In addition, the second part of the solution, which had a different focus and did not allow the manipulation of colored flags, could have included a compliance analysis for the selected practical cases.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: The eArchiving Capability Maturity Model (eACMM).</figDesc><graphic coords="3,138.45,425.36,315.89,151.94" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>STEP A :</head><label>:</label><figDesc>Import data from eRA Archi model, including the RODA, ARS, ESSArch, NAE and NAF implementation cases. STEP B: Using eACMM as a reference, classify the capability level of each architectural element as a data property. STEP C: Compute data, using Algorithm 1 and 2, to obtain the visualization of the EA Diagram Artifacts.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: An overview of the solution encompassing data ingestion, data classification and data computation and visualization.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Basic subset of the solution.</figDesc><graphic coords="8,72.00,432.38,221.12,214.21" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Subset of the solution when applied the second step.</figDesc><graphic coords="8,302.15,460.36,221.12,152.27" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Subset of the solution with the assessed box organized by capability and with color appointment.</figDesc><graphic coords="10,72.00,65.61,451.27,306.38" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 6 :Algorithm 2</head><label>62</label><figDesc>Figure 6: Subset of the solution with the assessed box organized by maturity level and with color appointment.</figDesc><graphic coords="11,72.00,65.61,451.27,307.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 8 :</head><label>8</label><figDesc>Figure 8: Subset of the solution centered in the maturity context and in the Pre-ingest OAIS ISO standard package.</figDesc><graphic coords="13,183.57,65.61,225.64,291.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 9 :</head><label>9</label><figDesc>Figure 9: A glimpse view of the complete solution blueprint showing the maturity model for the business process elements of the RODA implementation case organized by OAIS ISO standard packages. It is possible to identify the distribution of the business processes through the five capability levels.</figDesc><graphic coords="13,72.00,410.87,451.27,154.70" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>A comparison of EA tools considering the attributes of: cloud usage, architectural layers, standards, artifacts produced and meta-model usage.</figDesc><table><row><cell>Cloud/Non-Cloud</cell><cell>Layers Supported</cell><cell>Standards</cell><cell>Artifacts</cell><cell>Meta-model</cell></row><row><cell></cell><cell></cell><cell>ADOIT</cell><cell></cell><cell></cell></row><row><cell>Both</cell><cell>Business</cell><cell>ArchiMate</cell><cell>Process models</cell><cell>Variable</cell></row><row><cell></cell><cell>Information</cell><cell>TOGAF</cell><cell>ERDs</cell><cell></cell></row><row><cell></cell><cell>Application</cell><cell></cell><cell>UML diagrams</cell><cell></cell></row><row><cell></cell><cell>Technology</cell><cell></cell><cell>Data flow diagrams</cell><cell></cell></row><row><cell></cell><cell></cell><cell>Archi</cell><cell></cell><cell></cell></row><row><cell>Both</cell><cell>Business</cell><cell>ArchiMate</cell><cell>Process models</cell><cell>Fixed</cell></row><row><cell></cell><cell>Information</cell><cell></cell><cell>ERDs</cell><cell></cell></row><row><cell></cell><cell>Application</cell><cell></cell><cell>UML diagrams</cell><cell></cell></row><row><cell></cell><cell>Technology</cell><cell></cell><cell>Reports</cell><cell></cell></row><row><cell></cell><cell></cell><cell>ARIS</cell><cell></cell><cell></cell></row><row><cell>Both</cell><cell>Business</cell><cell>ArchiMate</cell><cell>Process maps</cell><cell>Variable</cell></row><row><cell></cell><cell>Information</cell><cell>TOGAF</cell><cell>Swimlanes</cell><cell></cell></row><row><cell></cell><cell>Application</cell><cell></cell><cell>Decision trees</cell><cell></cell></row><row><cell></cell><cell>Technology</cell><cell></cell><cell>Organizational charts</cell><cell></cell></row><row><cell></cell><cell></cell><cell>Enterprise Architect</cell><cell></cell><cell></cell></row><row><cell>Both</cell><cell>Business</cell><cell>ArchiMate</cell><cell>Process models</cell><cell>Fixed</cell></row><row><cell></cell><cell>Information</cell><cell>TOGAF</cell><cell>Data models</cell><cell></cell></row><row><cell></cell><cell>Application</cell><cell></cell><cell>UML diagrams</cell><cell></cell></row><row><cell></cell><cell>Technology</cell><cell></cell><cell>BPMN diagrams</cell><cell></cell></row><row><cell></cell><cell></cell><cell>LeanIX</cell><cell></cell><cell></cell></row><row><cell>Cloud</cell><cell>Technology</cell><cell>-</cell><cell>Resource maps</cell><cell>Variable</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Cost reports</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>Value stream maps</cell><cell></cell></row><row><cell></cell><cell></cell><cell>MEGA</cell><cell></cell><cell></cell></row><row><cell>Both</cell><cell>Business</cell><cell>ArchiMate</cell><cell>Process models</cell><cell>Variable</cell></row><row><cell></cell><cell>Information</cell><cell>TOGAF</cell><cell>Data models</cell><cell></cell></row><row><cell></cell><cell>Application</cell><cell></cell><cell>UML diagrams</cell><cell></cell></row><row><cell></cell><cell>Technology</cell><cell></cell><cell>Organizational charts</cell><cell></cell></row><row><cell></cell><cell></cell><cell>ATLAS</cell><cell></cell><cell></cell></row><row><cell>Both</cell><cell>Business</cell><cell>ArchiMate</cell><cell>Process maps</cell><cell>Fixed</cell></row><row><cell></cell><cell>Information</cell><cell>TOGAF</cell><cell>Swimlanes</cell><cell></cell></row><row><cell></cell><cell>Application</cell><cell></cell><cell>Decision trees</cell><cell></cell></row><row><cell></cell><cell>Technology</cell><cell></cell><cell>Organizational charts</cell><cell></cell></row><row><cell></cell><cell></cell><cell>BizzDesign</cell><cell></cell><cell></cell></row><row><cell>Both</cell><cell>Business</cell><cell>-</cell><cell>Process models</cell><cell>Variable</cell></row><row><cell></cell><cell>Information</cell><cell></cell><cell>Data models</cell><cell></cell></row><row><cell></cell><cell>Application</cell><cell></cell><cell>UML diagrams</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>BPMN diagrams</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Distribution of the number of instances organized by class.</figDesc><table><row><cell>Class</cell><cell>Application Function</cell><cell>Business Process</cell><cell>Capability</cell><cell>Application Component</cell><cell>Value Stream</cell><cell>Business Event</cell><cell>Business Service</cell><cell>Business Function</cell><cell>Business Object</cell><cell>Application Service</cell><cell>Stakeholder</cell><cell>Goal</cell><cell>Driver</cell><cell>Business Role</cell><cell>Principle</cell><cell>Junction</cell><cell>Grouping</cell><cell>Course of Action</cell><cell>Application Interface</cell><cell>Application Process</cell><cell>ArchiMate Model</cell><cell>Contract</cell></row><row><cell cols="19">No. Elements 153 62 46 79 15 48 9 32 28 27 7 32 29 10 17 4 12 1</cell><cell>2</cell><cell>1</cell><cell cols="2">1 1</cell></row><row><cell>TOTAL</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>616</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Algorithm 1</head><label>1</label><figDesc>Pseudo-code explaining the blueprint organized by the assessments distributed by each capability.</figDesc><table><row><cell>𝑐𝑎𝑠𝑒 ← 𝑅𝑂𝐷𝐴; 𝐴𝑅𝑆; 𝐸𝑆𝑆𝐴𝑟𝑐ℎ; 𝑁 𝐴𝐸; 𝑁 𝐴𝐹</cell></row><row><cell>for each 𝑜𝑏𝑗𝑒𝑐𝑡 in the dataset do</cell></row><row><cell>if 𝑜𝑏𝑗𝑒𝑐𝑡.environment = RefArch then</cell></row><row><cell>𝑜𝑏𝑗𝑒𝑐𝑡 goes to RefArch container</cell></row><row><cell>end if</cell></row><row><cell>if 𝑜𝑏𝑗𝑒𝑐𝑡.environment = 𝑐𝑎𝑠𝑒 then</cell></row><row><cell>𝑜𝑏𝑗𝑒𝑐𝑡 goes to 𝑐𝑎𝑠𝑒 container</cell></row><row><cell>if 𝑜𝑏𝑗𝑒𝑐𝑡.isAssessed = true then</cell></row><row><cell>𝑜𝑏𝑗𝑒𝑐𝑡 shows green color</cell></row><row><cell>end if</cell></row><row><cell>end if</cell></row><row><cell>if 𝑜𝑏𝑗𝑒𝑐𝑡.isAssessed = true then</cell></row><row><cell>𝑜𝑏𝑗𝑒𝑐𝑡 goes to Assessed container</cell></row><row><cell>if 𝑜𝑏𝑗𝑒𝑐𝑡.Assessment.CapabilityFunction = Pre-Ingest then</cell></row><row><cell>𝑜𝑏𝑗𝑒𝑐𝑡 goes to sub-container Pre-Ingest</cell></row><row><cell>else if 𝑜𝑏𝑗𝑒𝑐𝑡.Assessment.CapabilityFunction = Ingest then</cell></row><row><cell>𝑜𝑏𝑗𝑒𝑐𝑡 goes to sub-container Ingest</cell></row><row><cell>else if 𝑜𝑏𝑗𝑒𝑐𝑡.Assessment.CapabilityFunction = Access then</cell></row><row><cell>𝑜𝑏𝑗𝑒𝑐𝑡 goes to sub-container Access</cell></row><row><cell>else if 𝑜𝑏𝑗𝑒𝑐𝑡.Assessment.CapabilityFunction = Preservation then</cell></row><row><cell>𝑜𝑏𝑗𝑒𝑐𝑡 goes to sub-container Preservation</cell></row><row><cell>else if 𝑜𝑏𝑗𝑒𝑐𝑡.Assessment.CapabilityFunction = Data Management then</cell></row><row><cell>𝑜𝑏𝑗𝑒𝑐𝑡 goes to sub-container Data Management</cell></row><row><cell>else if 𝑜𝑏𝑗𝑒𝑐𝑡.Assessment.CapabilityFunction = Archival Storage then</cell></row><row><cell>𝑜𝑏𝑗𝑒𝑐𝑡 goes to sub-container Archival Storage</cell></row><row><cell>end if</cell></row><row><cell>end if</cell></row><row><cell>end for</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>end if end if end if end for</head><label></label><figDesc></figDesc><table /><note>for each 𝑜𝑏𝑗𝑒𝑐𝑡 in the dataset do if 𝑜𝑏𝑗𝑒𝑐𝑡.isAssessed = true then 𝑜𝑏𝑗𝑒𝑐𝑡 is select to be part of the maturity model if 𝑜𝑏𝑗𝑒𝑐𝑡.Assessment.CapabilityFunction = Pre-Ingest then 𝑜𝑏𝑗𝑒𝑐𝑡 goes to sub-container Pre-Ingest if 𝑜𝑏𝑗𝑒𝑐𝑡.Assessment.CapabilityLevel = 1 then 𝑜𝑏𝑗𝑒𝑐𝑡 goes to sub-sub-container Capability Level 1 else if 𝑜𝑏𝑗𝑒𝑐𝑡.Assessment.CapabilityLevel = 2 then 𝑜𝑏𝑗𝑒𝑐𝑡 goes to sub-sub-container Capability Level 2 else if 𝑜𝑏𝑗𝑒𝑐𝑡.Assessment.CapabilityLevel = 3 then 𝑜𝑏𝑗𝑒𝑐𝑡 goes to sub-sub-container Capability Level 3 else if 𝑜𝑏𝑗𝑒𝑐𝑡.Assessment.CapabilityLevel = 4 then 𝑜𝑏𝑗𝑒𝑐𝑡 goes to sub-sub-container Capability Level 4 else if 𝑜𝑏𝑗𝑒𝑐𝑡.Assessment.CapabilityLevel = 5 then 𝑜𝑏𝑗𝑒𝑐𝑡 goes to sub-sub-container Capability Level 5</note></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_0">https://linkconsulting.com/what-we-do/products/atlas/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_1">https://www.opengroup.org/togaf</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_2">https://www.boc-group.com/en/adoit/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_3">https://www.archimatetool.com/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_4">https://aris.com/aris-enterprise/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_5">https://sparxsystems.com/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="9" xml:id="foot_6">https://www.leanix.net/en/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="10" xml:id="foot_7">https://www.mega.com/enterprise-architecture-ea-tool</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="11" xml:id="foot_8">https://bizzdesign.com/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="12" xml:id="foot_9">https://www.eark-project.com/resources/project-deliverables/46-d72initassess/eark_d7_2v2.pdf</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="13" xml:id="foot_10">https://www.eark-project.com/resources/project-deliverables/96-d76-1/620998%20E-ARK%20D7.6.pdf_%3b%20filename_ %3dUTF-8%27%27620998%2520E-ARK%2520D7.6.pdf</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgement</head><p>This work was funded by national funds through Fundação para a Ciência e a Tecnologia (FCT) (No: UIDB/50021/2020 (INESC-ID)), and the INESC-ID project E-ARK CSP (PR09033) and the eArchiving Common Services Platform -CNECT/LUX/2021/OP/0077 NUMBER -LC-01905904.</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>DA x RA compliance (w/ assessment) by maturity l  </p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">VAU] Provide Access Accessions Activity log Appraisal / Select data and metadata Appraisal and disposal Audio player Authentication References</title>
	</analytic>
	<monogr>
		<title level="m">scopeArchiv] Metadata management [scopeIngest] Create AIP [scopeIngest] Prepare archival information [scopeIngest] Preservation Action [scopeIngest] Preservation Planning [scopeIngest] Validate SIP [USIP] Capture data and metadata [USIP] Create SIP [USIP] SIP Structure definition [UVviewsoft] Universal Viewer [VAČ] Create/Adjust DIP [VAČ] Provide Access [VAČ] View DIP [VAČ] View unstructured data DIP content [VAU] Check availability and rights</title>
				<imprint/>
	</monogr>
	<note>Arrange content [AIS] Manage Descriptive Metadata [AIS] Provide Access</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Defining enterprise architecture: A systematic literature review</title>
		<author>
			<persName><forename type="first">P</forename><surname>Saint-Louis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Morency</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lapalme</surname></persName>
		</author>
		<idno type="DOI">10.1109/EDOCW.2017.16</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 21st International Enterprise Distributed Object Computing Workshop (EDOCW)</title>
				<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="41" to="49" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Introduction to Enterprise Architecture</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lankhorst</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-01310-2_1</idno>
		<ptr target="https://doi.org/10.1007/978-3-642-01310-2_1.doi:10.1007/978-3-642-01310-2_1" />
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Springer</publisher>
			<pubPlace>Berlin Heidelberg; Berlin, Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Enterprise Cartography: From Theory to Practice</title>
		<author>
			<persName><forename type="first">P</forename><surname>Sousa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Tribolet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Guerreiro</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-30214-5_19</idno>
		<idno>doi:</idno>
		<ptr target="10.1007/978-3-031-30214-5_19" />
		<imprint>
			<date type="published" when="2023">2023</date>
			<publisher>Springer Nature</publisher>
			<biblScope unit="page" from="237" to="264" />
			<pubPlace>Switzerland; Cham</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A survey on association rule mining for enterprise architecture model discovery</title>
		<author>
			<persName><forename type="first">C</forename><surname>Pinheiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Guerreiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">S</forename><surname>Mamede</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Business &amp; Information Systems Engineering</title>
		<imprint>
			<biblScope unit="page" from="1" to="22" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A design science research methodology for information systems research</title>
		<author>
			<persName><forename type="first">K</forename><surname>Peffers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Tuunanen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Rothenberger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chatterjee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of management information systems</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="45" to="77" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Maturity model architect: A tool for maturity assessment support</title>
		<author>
			<persName><forename type="first">D</forename><surname>Proença</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Borbinha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 20th Conference on Business Informatics (CBI)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="42" to="51" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Maturity models for information systems-a state of the art</title>
		<author>
			<persName><forename type="first">D</forename><surname>Proença</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Borbinha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="volume">100</biblScope>
			<biblScope unit="page" from="1042" to="1049" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A method to define an enterprise architecture using the zachman framework</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">M</forename><surname>Pereira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Sousa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2004 ACM symposium on Applied computing</title>
				<meeting>the 2004 ACM symposium on Applied computing</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="1366" to="1371" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Enterprise architecture: The issue of the century</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Zachman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Database programming and design</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="44" to="53" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A systematic approach to generate togaf artifacts founded on multiple data sources and ontology</title>
		<author>
			<persName><forename type="first">S</forename><surname>Guerreiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Sousa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Conceptual Modeling</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="95" to="106" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Assessing business-it allignment maturity</title>
		<author>
			<persName><forename type="first">J</forename><surname>Luftman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Strategies for information technology governance</title>
				<imprint>
			<publisher>Igi Global</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="99" to="128" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Enterprise architecture: business and it alignment</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">M</forename><surname>Pereira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Sousa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2005 ACM symposium on Applied computing</title>
				<meeting>the 2005 ACM symposium on Applied computing</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="1344" to="1345" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">The design of focus area maturity models</title>
		<author>
			<persName><forename type="first">M</forename><surname>Van Steenbergen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Brinkkemper</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Van De Weerd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Bekkers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Global Perspectives on Design Science Research: 5th International Conference, DESRIST 2010</title>
				<meeting><address><addrLine>St. Gallen, Switzerland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">June 4-5, 2010. 2010</date>
			<biblScope unit="page" from="317" to="332" />
		</imprint>
	</monogr>
	<note>Proceedings. 5</note>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A metamodel for assessable software development methodologies</title>
		<author>
			<persName><forename type="first">C</forename><surname>Gonzalez-Perez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Mcbride</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Henderson-Sellers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Software Quality Journal</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="195" to="214" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Enterprise architecture: A maturity model based on togaf adm</title>
		<author>
			<persName><forename type="first">D</forename><surname>Proença</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Borbinha</surname></persName>
		</author>
		<idno type="DOI">10.1109/CBI.2017.38</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 19th Conference on Business Informatics (CBI)</title>
				<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="volume">01</biblScope>
			<biblScope unit="page" from="257" to="266" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Ross</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Weill</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Robertson</surname></persName>
		</author>
		<title level="m">Architecture as a strategy-creating a foundation for business execution</title>
				<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">D</forename><surname>Niemann</surname></persName>
		</author>
		<title level="m">From enterprise architecture to IT governance</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><forename type="first">O</forename><surname>Group</surname></persName>
		</author>
		<title level="m">Togaf® standard</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">9</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">The role of enterprise architecture</title>
		<author>
			<persName><forename type="first">D</forename><surname>Greefhorst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Proper</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Greefhorst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Proper</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
