1. Linda, B.B., Richard, C., Kristin, L., Ric, T., Mark, E.:The evolving role of IT managers and CIOs–findings from the 2010 IBM global IT risk study. Technical report, IBM (2010)
2. Su, Z., Biennier, F.: An architecture for implementing ’collaborative usage control’ policy -toward end-to-end security management in collaborative computing. In: ICEIS 2012 (submitted, 2012)
3. Hug, C., Front, A., Rieu, D., Henderson-Sellers, B.: A method to build information systems engineering process metamodels. J. Syst. Software. 82(10), 1730–1742 (2009)
4. Ducq, Y., Chen, D., Vallespir, B.: Interoperability in enterprise modelling: requirements and roadmap. Adv. Eng. Inf. 18(4), 193–203 (2004)
5. Su, Z., Biennier, F.: Toward comprehensive security policy governance in collaborative enterprise. In: APMS 2011, IFIP WG5.7 (2011)