<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>J. Ohme, T. Araujo, L. Boeschoten, D. Freelon, N. Ram, B. B. Reeves, T. N. Robinson, Digital
Trace Data Collection for Social Media Efects Research: APIs, Data Donation, and (Screen)
Tracking, Communication Methods and Measures</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1080/19312458</article-id>
      <title-group>
        <article-title>Enterprise Architecture Traces on the Web⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>An Ontology-driven Integrative Review</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nico Gießmann</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Multimedia and Interactive Systems, University of Lübeck</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2006</year>
      </pub-date>
      <volume>18</volume>
      <issue>2023</issue>
      <fpage>124</fpage>
      <lpage>141</lpage>
      <abstract>
        <p>This paper introduces enterprise architecture (EA) traces, a new theoretical lens for collecting EA artifacts from web sources to accelerate enterprise modeling. EA traces are defined as data publicly accessible on the web, providing insights into an enterprise's architecture, often without the originator's awareness, ofering a rich, yet complex interpretive device for understanding the peculiarities and evolution of EA. This paper first conceptualizes EA traces, then performs an integrative review encompassing 119 eligible records. The objective of this review was to identify which enterprise-related insights have been previously derived from web data, and whether they can be mapped to EA artifacts. The results reveal promising coverage across architecture layers and substantial potential for extension. Despite this, the approach lacks methodological guidance and remains highly subjective. Therefore, a three-step method is proposed drawing on ontology mapping. Utilizing selected studies from the review, the feasibility of this method is demonstrated by deriving employees' competencies from LinkedIn profiles. The paper concludes with a research agenda to guide future work on EA traces.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Enterprise architecture</kwd>
        <kwd>Enterprise modeling</kwd>
        <kwd>Digital trace data</kwd>
        <kwd>Corporate disclosure</kwd>
        <kwd>Web-based data collection</kwd>
        <kwd>Ontology mapping</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>To build such a conceptualization, it is essential to consider how enterprise-related data becomes
available on the web. The data-generating process (DGP) refers to the set of social, technical, and
methodological mechanisms through which observed data about social phenomena are produced [9].
Looking at the DGP that bring forth the sought-after data, two distinct concepts emerge in research:
1. Digital trace data, also referred to as digital footprints [10] or digital exhaust [11], is defined as
“records of activity (trace data) undertaken through an online information system (thus, digital)”
[12, p. 769]. One research stream considers them to be stored in private IT systems, such as
log files [ 13]. Others suggest that at least some traces are public [14]. In essence, users are
unaware of the digital traces they leave behind [15]. Researchers have pointed out that when an
individual becomes aware of their digital traces being utilized, this can lead to manipulation of
traces, thereby raising concerns about the validity of the results [12].
2. For the second DGP, “firms have incentives to communicate information to their various
stakeholders, including investors, suppliers, customers, and employees” [16, p. 1]. This deliberate, and
often event-based form of communication can be classified under the overarching concept of
corporate disclosure. It encompasses two categories of information. The first includes mandatory
information that is nowadays provided via the web (e.g., earnings announcements). The second
category includes information that serve a purposeful communicative function to the firm (e.g.,
marketing or job advertisements). Corporate disclosure is indicative of the manner in which
enterprises want to be perceived. These perceptions are subject to manipulation.</p>
      <p>
        Digital traces and corporate disclosure are both crucial to capturing a holistic perspective of the
enterprise. Corporate disclosure tells an intentional narrative of how the enterprise (and its stakeholders)
want to be perceived (e.g., product claims on corporate websites). In contrast, the low awareness of
digital trace data can reveal the actual behavior, or how the enterprise operates in practice (e.g., users
report long wait times in reviews). The example shows that, in our context, awareness of digital
traces must be re-framed in such a way that although individuals knowingly publish enterprise-related
data online, they are not aware that this data can be used to draw conclusions about the enterprise’s
internal practices. Previous studies on enterprise-related web data [
        <xref ref-type="bibr" rid="ref5">5, 17</xref>
        ][32] have largely assumed
intentionality, thereby overlooking the critical insights trace data can ofer.
      </p>
      <p>I therefore propose a new concept, EA traces, for this novel interpretation of enterprise-related
web data. I posit that both EA artifacts and enterprise-related web data stem from distinct domains,
ontologically speaking, which cannot be mapped without interpretation. From the difering DGP, it
becomes evident that a method to map enterprise-related web data to EA artifacts needs to account for
biases when interpreted, i.e., platform constraints and algorithmic confounding for digital trace data
and signaling for corporate disclosure. Therefore, it is inherent that EA traces cannot be understood as
either EA artifacts or enterprise-related web data, but instead as an interpretive device between the
two. Following this, I have derived a definition of EA traces: EA traces are data publicly accessible on the
web, providing insights into an enterprise’s architecture, often without the originator’s awareness, ofering
a rich, yet complex interpretation device for understanding the peculiarities and evolution of EA.</p>
      <p>This paper is organized into four sections. Section 2 performs an integrative review of
enterpriserelated web data investigated by previous research. Section 3 then proposes a method to map
enterpriserelated web data to EA artifacts, thereby conceptualizing the interpretive device. This is followed by a
demonstration of the three-step method using LinkedIn profiles and competency artifacts in section 4.
Last, section 5 concludes with a research agenda to encourage further investigation into EA traces.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Integrative Review</title>
      <sec id="sec-2-1">
        <title>2.1. Method</title>
        <p>An integrative review was conducted to identify and synthesize research across multiple domains that
provides direct or latent evidence for EA traces [18]. The scope of this review can be defined along
the taxonomy proposed by [19] (see Table 1). The literature search was conducted through a targeted
selection of keywords. The databases yielded no results for narrow keywords (“enterprise architecture
AND (traces OR disclosure)”). Therefore, the keywords comprise a part of the 5W1H format covering
the originators of enterprise-related insights (Who), the way of distribution (as verbs) or the types of
web data available (as nouns) (How), and the sources (Where). The online appendix presents a full
table of the keywords’ logic. The keywords were transformed into a search string consisting of the four
groups connected by “AND” and within-terms connected by “OR.” Wildcards were added to the terms.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Literature Search</title>
        <p>The records were collected and screened according to [20]. To cover a diverse range of outlets, I used
four databases: Web of Science, Scopus, Springer Link, and the ACM Digital Library.1 The filters applied
directly when sourcing included title search and the exclusion of abstracts, preprints, retractions, and
grey literature. The language was set to English and German. Moreover, the year was set to exceed 2000,
as this marked the apex of the dot-com bubble and the subsequent establishment of the web economy.
The subsequent processing steps are illustrated using the PRISMA flowchart (see Figure 1).</p>
        <p>The records were consolidated and processed automatically. This step involved removing duplicates,
retracted records (if still present), and predatory or vanity publishers, as per Beall’s list. I focused
on including high-quality research (SJR Q1-Q2). Outlets not included in the ranking were manually
examined to ensure that only sources that underwent peer review were included.</p>
        <p>The full text was assessed for eligibility, with the criteria depicted in the online appendix. Records that
did not provide enterprise-related insights, such as studies about online discourse or marketing, were
excluded. Studies without empirical investigation (e.g., method papers, reviews) were also excluded
since they do not provide unique data sources for enterprise-related insights. Private or artificial
data, including data behind a paywall, server logs, and mock-ups for experiments, were also excluded.
Records that solely investigated enterprise-related web data descriptively without providing insights
or based on statistical inference are not in the scope of this review. The public and nonprofit sectors
were excluded due to the significant discrepancy to firm data, primarily because of higher disclosure
obligations (e.g., the Freedom of Information Act).</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Results</title>
        <sec id="sec-2-3-1">
          <title>2.3.1. Synthesis</title>
          <p>The SLR identified 119 records from various academic disciplines during the years 2001-2025 that
gathered enterprise-related insights from web sources. The results are organized according to the 5W1H
format previously employed: originator (Who), content type (How [does this insight become public?]),
web source (Where), and enterprise-related insight (What). This organization is illustrated in table 3.
1The database extraction was performed on May 21, 2025.</p>
          <p>n
o
i
t
a
c
i
f
i
t
n
e
d
I
g
n
i
n
e
e
r
c
S
y
t
i
l
i
b
i
g
i
l
E
n
o
i
s
u
l
c
n
I</p>
          <p>The review yielded a total of eight unique originators. These largely align with the diferentiation between
ifrm-generated and user-generated content within the marketing domain. User-generated content
is further diferentiated into (retail) investor, customer, and employee categories. The government,
press, and third-party data aggregators constituted the other originators. Platforms can also originate
enterprise-related insights, such as Wish.com providing sales statistics of products [33].</p>
          <p>The most frequently utilized content type are social media posts. A further diferentiation was
made between technical app reviews on the Apple App Store or Google Play Store and reviews on
forums (e.g., TripAdvisor, Yelp, Glassdoor). A variety of firm-generated content exists, including social
media posts, press releases, patents, and job advertisements. The government plays a dual role in
creating and disseminating content. For instance, it conducts national surveys, e.g., the Mexican Social
Security Institute [34]. Additionally, it functions as a provider of public registries, e.g., the German
Commercial Registry [35]. The press disseminates enterprise-related content via two channels: news
articles published on their websites, as seen in The Economic Times [36], and via news aggregators,
such as the Factiva service by Dow Jones [37] or investing.com [38].</p>
          <p>The most frequently utilized web sources are social media platforms. These platforms ofer researchers
a streamlined approach to data collection, facilitating the integration and processing of large volumes
of data in a consistent manner, as opposed to the more labor-intensive process of scraping data from
individual company websites. Endeavors have been undertaken to utilize the Wayback Machine to
facilitate this process [28]. A similar platform dynamic can be observed for the Apple App Store and
Google Play Store in the sourcing of customer app reviews.</p>
          <p>This content was used to gain insights into the enterprise. I refrain from naming these EA artifacts
at this point, as except [32], no research has situated their work in the EA domain. From an outside
perspective, strategic insights were gathered from a market platform [39] and recalls from a government
database [40]. Social media posts were used to derive (retail) investor sentiment [41] and a business’s
downtime during crisis [42]. In addition to financial data, the review identified studies into sustainability
[28], circular economy actions [43], and corporate social responsibility [44]. Further, the stakeholder
perspective was investigated, encompassing business ecosystems [35, 45, 46] and supply chain risks
[47]. An additional category encompasses products of a company and how customers perceive them.
The product’s features were deduced from the company website [48, 49]. Its similarity to competing
products was determined through user forum posts [50, 51]. The subsequent investigation of customer
satisfaction and service/feature requests was conducted through various channels, including social
media posts [52], app reviews [53], and national survey data (e.g., from healthcare providers [34]). This
external perspective is further investigated by inferring the marketing tactics via firms’ press releases
[37], their brand personality [54, 55], and content virality [56]. From an internal perspective, business
processes were identified from the company website [ 32], and its business model innovations were
investigated via social media [57, 58]. [59] investigated the organizational culture, with a specific focus
on HR practices [60], including employees’ competencies [61] and job-related challenges [62].</p>
        </sec>
        <sec id="sec-2-3-2">
          <title>2.3.2. Coverage of EA Artifacts</title>
          <p>To demonstrate how these enterprise-related insights can be understood as EA artifacts, a mapping to
the layers of EA was conducted. [21] proposes a five-layer model of EA, which will be employed using
the ArchiMate 3.2 framework. In this paper, the framework solely serves the purpose of providing a
visual representation. Figure 2 illustrates the ArchiMate 3.2 framework, with enterprise-related insights
from the review mapped to their corresponding EA artifact. The assignment was done following the
oficial specification and was guided by the examples of practitioners, particularly those found in the
ArchiMate Community2 and The ArchiMate Cookbook3.</p>
          <p>On the active structure, previous research encompasses employees, customers, and competitors as
business actors, as well as the business ecosystem as a business collaboration on the business layer.
Software systems were modeled as application components on the application layer. On the physical
layer, the firm location is modeled as a facility.</p>
          <p>In the behavior aspect, the strategy layer comprises competencies of the employees as capabilities
[22], as well as marketing tactics and circular economy actions as courses of action. On the business
layer, human resources practices and product development are depicted as business functions, as well as
service requests as business interaction. In the application layer, there are two application interactions:
feature requests and app issue reporting. On the implementation and migration layer are business
model innovations, which are traces of architectural change over time.</p>
          <p>In the passive structure, two resources can be modeled on the strategy layer, namely patents and brand
personality. Further on the business layer, the product features of the enterprise and its competitive
advantages can be modeled as products.</p>
          <p>Most elements can be assigned to the motivation layer. Here, customers can be modeled as
stakeholders, driven by their satisfaction, assessable through continuance intention and recalls. A similar logic
can be applied to (retail) investors, driven by their sentiment and assessable via funding data. Corporate
values can be modeled as principles that shape the organizational culture, serving as a driving force for
the enterprise. Simple goal-outcome relationships can be observed in the context of supply chain risks
and downtime during crises, as well as in sustainability and corporate environmental performance.</p>
          <p>It can be seen that a considerable amount of EA artifacts can be modeled from web sources. Notably,
the motivation layer is suficiently covered by existing research. There is a research gap in gaining
insights into the technology layer from web sources. I argue that this is likely because of study designs
that favor internal data. Here, job advertisements, especially those for IT-related roles, can provide
insights into the applications and technologies used by an enterprise. Additionally, the potential of
2https://community.opengroup.org/archimate-community
3https://www.hosiaisluoma.fi/blog/archimate</p>
          <p>Strategy
Business
Application
Technology
Physical
Implementation
&amp; Migration
corporate social media (e.g., LinkedIn, Glassdoor) is not yet fully utilized. Here, business actors, roles,
and processes could be derived.</p>
        </sec>
        <sec id="sec-2-3-3">
          <title>2.3.3. Ontological Perspective</title>
          <p>The review found that, to date, there is no method for integrating enterprise-related web data into EA.
However, some studies have applied ontologies to understand the nature of web data better. As illustrated
in table 2, the majority of prominent social media platforms have been described ontologically. No study
utilized a foundational ontology, which would have enabled mapping to other domains, particularly
the EA domain. Given the abundance of ontology-based approaches, I will elaborate further on this
thinking in the subsequent chapter.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Method for EA Traces Collection</title>
      <p>Based on the results, I propose that EA traces consist of three components: Enterprise-related web data,
EA artifacts, and an ontologically grounded mapping function. The three-step method for EA traces
collection in figure 3 is proposed to map enterprise-related web data to EA artifacts. This aligns with
the formal resource-based technique, as described in [24, p. 77]:
1. Each domain comprises numerous, occasionally competing ontologies. These ontologies must be
integrated within a unified domain ontology to facilitate interconnections.
2. Given that ontologies often difer between domains, it is imperative to ensure that there is a
common understanding of the relevant terms to facilitate semantic interoperability. This objective
is facilitated by upper-level or foundational ontologies, such as the Unified Foundational Ontology
(UFO) [25]. Therefore, the second step involves aligning each domain ontology with the same
foundational ontology.
3. As a last step, entities and relationships from both the EA and web domain can be connected via
a mapping function. This function, besides a technical linkage, employs ontological reasoning and
interpretation. I argue that EA traces can be considered as ‘big data’ as described by [26]; therefore,
his ten big data characteristics (e.g., incomplete, nonrepresentative, drifting, algorithmically
confounded, dirty, sensitive) must be accounted for in the mapping function.</p>
      <p>2. Alignment
Unified Domain Ontology
for Enterprise Architecture
1. Integration</p>
      <p>Enterprise
Architecture Ontologies</p>
    </sec>
    <sec id="sec-4">
      <title>4. Demonstration</title>
      <p>Top-level Ontology
(e.g., UFO)</p>
      <p>2. Alignment
3. Mapping function</p>
      <p>Unified Domain Ontology for
Enterprise-related Web Data
1. Integration</p>
      <p>Web Sources Ontologies
The objective of this demonstration is to illustrate how ontological reasoning can facilitate the collection
of EA traces. I drew upon two pre-existing domain ontologies from the review.</p>
      <p>First, [22] developed an EA ontology to model employees’ competencies in ArchiMate, utilizing UFO
(Figure 4). UFO-A is employed to model endurants, defined as individual entities that exist in time. The
individual in question is depicted as a substantial physical agent, operating independently of other
constructs. In contrast, moments are predicated on the existence of diferent entities, i.e., the person.
Consequently, human capabilities, comprising skills and personal competencies, are conceptualized in
light of this understanding. These human capabilities subsequently manifest in the perdurant “task,”
which unfolds over time (UFO-B). The task itself is embedded in a capability context, which is modeled
as a situation.</p>
      <p>Second, LinkedIn emerged as a dominant source in the review, with an ontological representation
of employee profiles already established [ 23]. Unfortunately, the conceptual model is not constructed
with the guidance of a foundational ontology (such as UFO). Therefore, I needed to translate the
conceptual model into UFO constructs (Figure 5). A LinkedIn profile typically consists of the person
(employee) in question, their position within the organization, and their education, including relevant
skills. Ontological reasoning makes us question the way we perceive web data. In the ontology proposed
Disposition</p>
      <p>Type
Capability</p>
      <p>Type
Competence</p>
      <p>Type</p>
      <p>Intrinsic
Moment</p>
      <p>Thing</p>
      <p>Endurant
Moment</p>
      <p>Substantial</p>
      <p>Disposition</p>
      <p>Capability Knowledge Attitude
by [23] the position can be understood either as a contractual entity (“Head of Marketing”), which
would be modeled as a social relator in UFO, or as an temporal unfolding activity (“Leading a marketing
strategy”), which would be modeled as an action. LinkedIn profiles typically contain both concepts,
the position as a title and a description of the job. The latter fits better with the EA ontology and was
therefore chosen. This does not imply that a representation as a social relator is not suitable for mapping
EA artifacts. Instead, it highlights that the corresponding element is not present in the EA ontology by
[22], and other EA ontologies should be integrated. For the organization, a similar ontological question
arises. One would typically model the organization as a UFO institutional agent, as it comprises an
enduring organizational identity, even when its EA changes. But in the context of competency modeling,
[22] proposes the “competence context” to be a UFO situation, i.e., a snapshot of how EA holds together
at a moment in time. These implications are important, as organizations must be modeled based on
their configuration at a given moment in time.</p>
      <p>Type</p>
      <p>Moment
Intrinsic
Moment</p>
      <p>Relator
Role</p>
      <p>Social
Disposition Relator</p>
      <p>Agent</p>
      <p>Thing</p>
      <p>Social
Agent</p>
      <p>Individual
Endurant
Substantial</p>
      <p>Object
Physical Institutional
Agent Agent</p>
      <p>Social
Object</p>
      <p>Physical
Object</p>
      <p>Situation
Industry
0..*</p>
      <p>Skill
0..*</p>
      <p>Given the alignment of these two domain ontologies with UFO, a mapping can be established, as
illustrated in table 4. A mapping can be established between the person and their skills based on their
disposition and physical agent, respectively. The position within the LinkedIn ontology can be mapped
Perdurant
Complex
Event
Course
0..*
hasPosition</p>
      <p>Action
Position
0..* 0..*
to a task in the EA ontology via an action, and the organization can be mapped to a capability context
via a situation. Once the entities have been identified, their relationships can be mapped accordingly.
The relationships concerning the skill inheritance are modeled in reverse. According to the LinkedIn
ontology, a person possesses a skill, whereas, following the EA ontology, a skill is inherent to a person.
In the LinkedIn ontology, an organization is defined as having a position. Conversely, in the EA ontology,
a task is defined as bringing about a capability context. The relationship between a person and their
position/task is expressed similarly in both cases, with the diference being in the choice of wording:
“worksAs” for the LinkedIn and “participates in” for the EA ontology.
Once the domain ontologies have been mapped, the EA trace is established and can be visualized in
an EA framework. The translation proposed by [22] was employed to model the competency artifacts
into ArchiMate constructs, as illustrated in figure 6. At the core of this EA trace lies the person,
conceptualized as a business actor within the business layer. The person possesses skills, conceptualized
as capabilities on the strategy layer, and engages in a task, modeled as an action on the business layer.
The task results in the establishment of a capability context that is represented as a plateau on the
implementation and migration layer. This demonstration serves as a critical link between the EA traces
concept, the proposed method for collection, and the research agenda in the subsequent chapter.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>To date, only [32] and [17] have explicitly modeled EA from web sources. While those approaches
focused solely on mapping EA artifacts from company websites, this paper introduces the EA traces
concept for theoretical grounding and a method for their collection. Thereby, the paper builds upon
ontology-based artifact retrieval approaches with internal sources [27], aiming for a conceptualization
to integrate publicly available enterprise-related web data for faster modeling practices.</p>
      <p>I posit that ontology thinking, particularly when guided by a robust foundational ontology such as
UFO, can play a pivotal role in the development of EA models that are well aligned with web-sourced
data. It is important to acknowledge that there is room for interpretation when integrating
enterpriserelated web data and EA artifacts. A three-step method is therefore designed to define the scope
for interpretation. The approach was demonstrated by sourcing competency artifacts from LinkedIn
profiles, thereby showing its feasibility.</p>
      <p>The EA traces concept comes with some apparent challenges that future research needs to address:
1. Further development of an EA traces collection system is needed to capture a complete enterprise.</p>
      <p>Thereby, the mapping function needs to be extended to account not only for ontological reasoning
but also to include countermeasures for deliberate manipulation of web content. The mapping
function should be validated with the firms in question and be integrated with internal (private)
data to expand the EA systems currently in use.
2. Data accessibility (APIs, scraping feasibility) skews research coverage toward platforms (e.g.,
Twitter, App Stores). I therefore propose other web sources to be investigated with an ontological
perspective in mind.
3. Ethical and privacy concerns related to collecting employee or customer-generated content need
to be addressed. Although this content is deliberately put online by users, responsible handling is
a matter of course to avoid creating an ‘the EA never forgets’ scenario.
4. Once an EA traces collection system is built, further applications of EA traces can be investigated.</p>
      <p>This paper examined the concept of EA traces through a part of the 5W1H format (Who, How,
Where, What), demonstrating a solid foundation for the method proposed. Looking ahead, EA
traces can be expanded to incorporate temporal (When) and rationale (Why) facets. Integrating
these could further enable meaningful interpretation of the architecture obtained via EA traces,
ultimately paving the way for advanced EA mining systems. Since I propose EA can be (to a
degree) generated from public sources, this implies that companies cannot only build EA for
their own enterprise but also for competitors. This hints towards a new systematic approach for
building large competitive intelligence systems.</p>
      <p>In summary, the concept of EA traces introduced in this paper proposes a new perspective in the
enterprise modeling domain, sparking potential for future research.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The author(s) have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>H.</given-names>
            <surname>Holm</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Buschle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lagerström</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ekstedt</surname>
          </string-name>
          ,
          <article-title>Automatic data collection for enterprise architecture models</article-title>
          ,
          <source>Software &amp; Systems Modeling</source>
          <volume>13</volume>
          (
          <year>2012</year>
          )
          <fpage>825</fpage>
          -
          <lpage>841</lpage>
          . doi:
          <volume>10</volume>
          .1007/ s10270-012-0252-1.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Farwick</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. M.</given-names>
            <surname>Schweda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Breu</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Hanschke</surname>
          </string-name>
          ,
          <article-title>A situational method for semi-automated enterprise architecture documentation</article-title>
          ,
          <source>Software &amp; Systems Modeling</source>
          <volume>15</volume>
          (
          <year>2014</year>
          )
          <fpage>397</fpage>
          -
          <lpage>426</lpage>
          . doi:
          <volume>10</volume>
          . 1007/s10270-014-0407-3.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Johnson</surname>
          </string-name>
          , M. Ekstedt,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lagerstrom</surname>
          </string-name>
          ,
          <article-title>Automatic probabilistic enterprise it architecture modeling: A dynamic bayesian networks approach</article-title>
          ,
          <source>in: 2016 IEEE 20th International Enterprise Distributed Object Computing Workshop (EDOCW)</source>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . doi:
          <volume>10</volume>
          .1109/edocw.
          <year>2016</year>
          .
          <volume>7584351</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Osenberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Langermeier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Bauer</surname>
          </string-name>
          ,
          <article-title>Using Semantic Web Technologies for Enterprise Architecture Analysis</article-title>
          , Springer International Publishing, Cham,
          <year>2015</year>
          , pp.
          <fpage>668</fpage>
          -
          <lpage>682</lpage>
          . doi:
          <volume>10</volume>
          .1007/ 978-3-
          <fpage>319</fpage>
          -18818-8_
          <fpage>41</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Dahlke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lenz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kinne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Dehghan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Abbasiharofteh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schütz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kriesch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hottenrott</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U. N.</given-names>
            <surname>Kanilmaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Grashof</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hajikhani</surname>
          </string-name>
          , L. Liu,
          <string-name>
            <given-names>M.</given-names>
            <surname>Riccaboni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.-A.</given-names>
            <surname>Balland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wörter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Rammer</surname>
          </string-name>
          ,
          <article-title>The WebAI paradigm of innovation research: Extracting insight from organizational web data through AI</article-title>
          ,
          <source>ZEW Discussion Papers 25-019</source>
          , ZEW - Leibniz-Zentrum für Europäische Wirtschaftsforschung, Mannheim,
          <year>2025</year>
          . URL: https://hdl.handle.net/10419/319890.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Lazer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pentland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Adamic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Aral</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.-L.</given-names>
            <surname>Barabási</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Brewer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Christakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Contractor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fowler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gutmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Jebara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>King</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Macy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Roy</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. Van Alstyne</surname>
          </string-name>
          ,
          <article-title>Computational social science</article-title>
          ,
          <source>Science</source>
          <volume>323</volume>
          (
          <year>2009</year>
          )
          <fpage>721</fpage>
          -
          <lpage>723</lpage>
          . doi:
          <volume>10</volume>
          .1126/science.1167742.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>