“…Studies on the enactment BPM lifecycle phase referred mainly to models, methods and instantiations. The following works focused on BPA operation: methods (Dwivedi and Kulkarni, 2008; Yousef et al , 2009) and criteria (Yi et al , 2009) for identifying services implementing a given BPA, ontology-based methods for aligning (Castellanos and Correal, 2013) and deriving (Ahmad and Odeh, 2012) the information architecture, a method for evaluating ICT investment decisions (Becker et al , 2008), a BPA-based method for structuring a project (Davis et al , 2010), risk (Martinez et al , 2014) and security (Bichou, 2004) assessment models and methods derived from domain-specific process maps, an instance of the derivation of a domain-specific IT map from a process map (Aouad et al , 1998) and use of reference models for diagnosing IT change needed in the telecommunication industry (Potter and Brady, 2005). Regarding BPA monitoring, a study discussed the role of process measures for ERP success (Beretta, 2002).…”