{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:45:53Z","timestamp":1730202353231,"version":"3.28.0"},"reference-count":64,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1109\/cbi52690.2021.00025","type":"proceedings-article","created":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T20:40:33Z","timestamp":1637354433000},"page":"141-150","source":"Crossref","is-referenced-by-count":12,"title":["How DevOps capabilities leverage firm competitive advantage: A systematic review of empirical evidence"],"prefix":"10.1109","author":[{"given":"Olivia H.","family":"Plant","sequence":"first","affiliation":[]},{"given":"Jos","family":"van Hillegersberg","sequence":"additional","affiliation":[]},{"given":"Adina","family":"Aldea","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3035880"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2019.8884935"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2288-11-29"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1186\/1741-7015-9-39"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.51"},{"journal-title":"Guidance on choosing qualitative evidence synthesis methods for use in health technology assessments of complex interventions","year":"2016","author":"booth","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2019.00020"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2014.6957687"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.209"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICTER.2016.7829932"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA51224.2020.00046"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2896941.2896946"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.07.010"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35333-9_23"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pmed.1000097","article-title":"Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement","volume":"6","author":"moher","year":"2009","journal-title":"PLoS Med"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2370.2007.00201.x"},{"key":"ref27","article-title":"Reconstructing the giant: On the importance of rigour in documenting the literature search process","author":"vom brocke","year":"2009","journal-title":"17th European Conference on Information Systems 2009"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3322385.3322400"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2019.2958900"},{"key":"ref20","first-page":"6","article-title":"Why enterprises must adopt devops to enable continuous delivery","volume":"24","author":"humble","year":"2011","journal-title":"Cutter IT J"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/1097-0266(200010\/11)21:10\/11<1105::AID-SMJ133>3.0.CO;2-E"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.617"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2307\/3641622"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CBI49978.2020.00017"},{"article-title":"Procedures for performing systematic reviews","year":"2004","author":"kitchenham","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.01.012"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91704-7_16"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-06019-0_7"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2898375.2898383"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2018.00011"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3234152.3234199"},{"key":"ref56","article-title":"A new form of collaboration in IT teams – Exploring the DevOps phenomenon","author":"wiedemann","year":"2017","journal-title":"Proceedings ot the 21st Pacific Asia Conference on Information Systems PACIS 2017"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.06.010"},{"key":"ref54","first-page":"134","article-title":"DevSecOps practices for an agile and secure IT service management","volume":"23","author":"zaydi","year":"2020","journal-title":"J Manage Inf Decis Sci"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22689-7_30"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1017\/dsi.2019.318"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2017.07.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199708)18:7<509::AID-SMJ882>3.0.CO;2-Z"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05150-w"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/smj.640"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1525\/cmr.2016.58.4.13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000600"},{"key":"ref15","first-page":"xiii","article-title":"Analyzing the past to prepare for the future: Writing a literature review","volume":"26","author":"webster","year":"2002","journal-title":"MIS Q"},{"key":"ref16","article-title":"A qualitative study of DevOps usage in practice","volume":"29","author":"erich","year":"2017","journal-title":"Journal of Software: Evolution and Process"},{"key":"ref17","first-page":"91","article-title":"An exploratory study of DevOps: Extending the dimensions of DevOps with practices","author":"lwakatare","year":"2016","journal-title":"ICSEA 2016 The Eleventh International Conference on Software Engineering Advances"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18612-2_19"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18612-2_14"},{"key":"ref4","first-page":"197","article-title":"How big old companies navigate digital transformation","volume":"16","author":"sebastian","year":"2017","journal-title":"MIS Q Exec"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.06.063"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3383219.3383280"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00623-5_1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2681909"},{"key":"ref7","first-page":"1","article-title":"A systematic literature review on DevOps capabilities and areas","volume":"11","author":"teixeira","year":"2020","journal-title":"Int J Hum Cap Inf Technol Prof"},{"key":"ref49","article-title":"Multicriteria decision-making taxonomy for DevOps challenging factors using analytical hierarchy process","volume":"32","author":"khan","year":"2020","journal-title":"Journal of Software: Evolution and Process"},{"key":"ref9","article-title":"Key capabilities of devops teams and their influence on software process innovation: A resource-based view","author":"wiedeman","year":"2017","journal-title":"Proceedings of the 23rd Americas Conference on Information Systems AMCIS 2017"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2020\/46932020"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3210459.3210465"},{"key":"ref48","first-page":"29","article-title":"Understanding DevOps: Exploring the origins, composition, merits, and perils of a DevOps Capability","author":"crowley","year":"2018","journal-title":"Proceedings of the 4th International Conference on Production Economics and Project Evaluation ICOPEV 2018"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2017.16"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02610-3_10"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49094-6_44"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3240299"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.07.083"}],"event":{"name":"2021 IEEE 23rd Conference on Business Informatics (CBI)","start":{"date-parts":[[2021,9,1]]},"location":"Bolzano, Italy","end":{"date-parts":[[2021,9,3]]}},"container-title":["2021 IEEE 23rd Conference on Business Informatics (CBI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9610156\/9610638\/09610667.pdf?arnumber=9610667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:51:59Z","timestamp":1652201519000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9610667\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/cbi52690.2021.00025","relation":{},"subject":[],"published":{"date-parts":[[2021,9]]}}}