Sie sind auf Seite 1von 503

Advances in Government

Enterprise Architecture
Pallab Saha
National University of Singapore, Singapore

Information science reference


Hershey New York
Director of Editorial Content: Kristin Klinger
Director of Production: Jennifer Neidig
Managing Editor: Jamie Snavely
Assistant Managing Editor: Carole Coulson
Typesetter: Chris Hrobak
Cover Design: Lisa Tosheff
Printed at: Yurchak Printing Inc.

Published in the United States of America by


Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue, Suite 200
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@igi-global.com
Web site: http://www.igi-global.com

and in the United Kingdom by


Information Science Reference (an imprint of IGI Global)
3 Henrietta Street
Covent Garden
London WC2E 8LU
Tel: 44 20 7240 0856
Fax: 44 20 7379 0609
Web site: http://www.eurospanbookstore.com

Copyright 2009 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by
any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does
not indicate a claim of ownership by IGI Global of the trademark or registered trademark.

Library of Congress Cataloging-in-Publication Data

Advances in government enterprise architecture / Pallab Saha, editor.

p. cm.

Includes bibliographical references and index.

Summary: "This book is a compilation of chapters on government Enterprise architecture with the intention of informing professionals
with different levels of enterprise architecture knowledge"--Provided by publisher.

ISBN 978-1-60566-068-4 (hardcover) -- ISBN 978-1-60566-069-1 (ebook)

1. Internet in public administration. 2. Public administration. 3. Management. 4. Information technology. I. Saha, Pallab, 1970-

JF1525.A8A383 2008

351--dc22

2008013117

British Cataloguing in Publication Data


A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this book set is original material. The views expressed in this book are those of the authors, but not necessarily of
the publisher.

If a library purchased a print copy of this publication, please go to http://www.igi-global.com/agreement for information on activating
the library's complimentary electronic access to this publication.
List of Reviewers

Santonu Sarkar William S. Boddie


Accenture Technology Labs, India National Defense University, USA

Haiping Luo Scott A. Bernard


Government Printing Office, USA Carnegie Mellon University, USA

Jorge Marx Gomez Klaus D. Niemann


University of Oldenburg, Germany ACT! Consulting, Germany

Stephen H. Kaisler Leonidas G. Anthopoulos


George Washington University, USA Hellenic Ministry of Foreign Affairs, Greece

Frank J. Armour Nigel Martin


George Mason University, USA Australian National University, Australia

Steven Ring Vassilios Peristeras


The MITRE Corporation, USA National University of Ireland, Ireland

John Mo Marijn Janssen


RMIT University, Australia Delft University of Technology,
The Netherlands
Chris Aitken
Queensland Health, Australia Jay Ramanathan
Ohio State University, USA
Marc M. Lankhorst
Telematica Instituut, The Netherlands Pallab Saha
National University of Singapore, Singapore
Dwight V. Toavs
National Defense University, USA
Table of Contents

Foreword . ............................................................................................................................................ xv

Preface . .............................................................................................................................................xviii

Acknowledgment . ............................................................................................................................. xxv

Section I
Frameworks and Methodologies

Chapter I
A Methodology for Government Transformation with Enterprise Architecture...................................... 1
Pallab Saha, National University of Singapore, Singapore

Chapter II
A Service-Oriented Reference Architecture for EGovernment............................................................ 30
Marc M. Lankhorst, Telematica Instituut, The Netherlands
Guido I.H.M. Bayens, Novius, The Netherlands

Chapter III
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public
Sector..................................................................................................................................................... 56
Amit Bhagwat, Independent Consultant, UK

Chapter IV
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA).................. 82
Hong Sik Kim, Korea Polytechnique University, Korea
Sungwook Moon, ComponentBasis, Co., Ltd., Korea

Chapter V
Measuring the Benefits of Enterprise Architecture: Knowledge Management Maturity.................... 106
Alan Dyer, EWA, Australia
Section II
Leadership, Governance, and Management

Chapter VI
The Criticality of Transformational Leadership to Advancing United States Government
Enterprise Architecture Adoption........................................................................................................ 130
William S. Boddie, National Defense University, USA

Chapter VII
Adaptive IT Architecture as a Catalyst for Network Capability in Government................................. 149
Jay Ramanathan, The Ohio State University, USA
Rajiv Ramnath, The Ohio State University, USA
Anand Desai, The Ohio State University, USA

Chapter VIII
Design Integrity and Enterprise Architecture Governance.................................................................. 173
Chris Aitken, Queensland Health, Australia

Chapter IX
Policy Mapping: Relating Enterprise Architecture to Policy Goals.................................................... 191
Dwight V. Toavs, National Defense University, USA

Chapter X
Enterprise Architecture Management and its Role in IT Governance and IT Investment
Planning............................................................................................................................................... 208
Klaus D. Niemann, act! Consulting GmbH, Germany

Chapter XI
The GEA: Governance Enterprise Architecture-Framework and Models........................................... 229
Vassilios Peristeras, National University of Ireland, Ireland
Konstantinos Tarabanis, University of Macedonia, Greece

Chapter XII
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private
Cooperation.......................................................................................................................................... 263
Bram Klievink, Delft University of Technology, The Netherlands
Wijnand Derks, Telematica Instituut, The Netherlands
Marijn Janssen, Delft University of Technology, The Netherlands
Section III
Realization and Deployment

Chapter XIII
People-Led Enterprise Architecture..................................................................................................... 285
Neil Fairhead, Fujitsu Services, UK
John Good, Serco Consulting, UK

Chapter XIV
Using Enterprise Architecture to Transform Service Delivery: The U.S. Federal Governments
Human Resources Line of Business.................................................................................................... 307
Timothy Biggert, IBM Global Business Services, USA
Kunal Suryavanshi, IBM Global Business Services, USA
Ryan Kobb, IBM Global Business Services, USA

Chapter XV
Enterprise Architecture as Context and Method for Designing and Implementing
Information Security and Data Privacy Controls in Government Agencies........................................ 340
Scott Bernard, Carnegie Mellon University, USA
Shuyuan Mary Ho, Syracuse University, USA

Chapter XVI
Architecture Based Engineering of Enterprises with Government Involvement................................. 371
John Mo, RMIT University, Australia
Laszlo Nemes, Nemes Consulting, Australia

Chapter XVII
Collaborative Enterprise Architecture for Municipal Environments................................................... 392
Leonidas G. Anthopoulos, Hellenic Ministry of Foreign Affairs, Greece

Chapter XVIII
Government Enterprise Architectures: Enabling the Alignment of Business Processes
and Information Systems .................................................................................................................... 409
Nigel Martin, The Australian National University, Australia
Shirley Gregor, The Australian National University, Australia
Dennis Hart, The Australian National University, Australia

Compilation of References ............................................................................................................... 438

About the Contributors .................................................................................................................... 463

Index.................................................................................................................................................... 472
Detailed Table of Contents

Foreword . ............................................................................................................................................ xv

Preface . .............................................................................................................................................xviii

Acknowledgment . ............................................................................................................................. xxv

Section I
Frameworks and Methodologies

Chapter I
A Methodology for Government Transformation with Enterprise Architecture...................................... 1
Pallab Saha, National University of Singapore, Singapore

Countries across the world are pushing their frontiers in Governance in the move to information econ-
omy, and governments play a pivotal role in this transformation. These governments employ modern
information and communication technologies to serve the citizens and businesses better. Raising the
effectiveness and quality of government services is not only a matter of leading edge technologies; it
also involves visionary leadership, clear objectives and sound execution mechanism. The role of Enter-
prise Architecture in shaping E-Government programmes cannot be overstated. Within the context of
Singapores e-government initiative, this chapter describes the Methodology for AGency ENTerprise
Architecture (MAGENTA), a rigorous, disciplined and structured methodology for development of
agency enterprise architectures that enables agencies to align to and fully support the governments
transformation objectives and outcomes. Mechanisms for agencies to align to the overall Government
Enterprise Architecture are detailed. The chapter concludes with a set of recommendations for future
enhancements and research.

Chapter II
A Service-Oriented Reference Architecture for EGovernment............................................................ 30
Marc M. Lankhorst, Telematica Instituut, The Netherlands
Guido I.H.M. Bayens, Novius, The Netherlands
This chapter describes the development and future directions of service-oriented reference architecture
for the Dutch government. The Dutch government has focussed on improving the service level of public
agencies for several years. Electronic services play an important part in this, which requires a concerted
effort across many organizations. A reference architecture has been created in order to guide the many
different programmes and projects. This chapter describes the role of service orientation in e-government,
and the creation, structure, and first results of this reference architecture for e-government. Furthermore,
the chapter looks ahead at future developments in integrated, demand-driven service provisioning in
e-government.

Chapter III
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public
Sector..................................................................................................................................................... 56
Amit Bhagwat, Independent Consultant, UK

This chapter introduces the concept of Beacon Architecture as a formalized and ordered grouping of
architectural elements, describing the constituents, their order, correlation and likely evolution of the
grouping; and illustrating its specific value to the public sector. The first half of the chapter builds up to
the concept, the reasons behind its specific nature, and its value to enterprises, especially in the public
sector. For this, the chapter is split into a number of sections that may be studied separately and that also
build up to introduce Beacon Architecture. The sections may be broadly divided as concepts, historical
overview, illustrative case studies in public sector transformations along with a summary of peculiar
architectural challenges they face, and a cyclical pattern to Architecture Development. After introducing
and elucidating on concept and constituents of Beacon Architecture, the chapter delves into its correla-
tion with architecture concepts in currency and its role in mitigating enterprise architecture challenges
illustrated earlier in the chapter, before concluding on an assessment of future trends.

Chapter IV
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA).................. 82
Hong Sik Kim, Korea Polytechnique University, Korea
Sungwook Moon, ComponentBasis, Co., Ltd., Korea

Quite a good amount of time has been spent seeking appropriate solutions to handle the giant informa-
tion technology expenditure not only in government sectors but also in private sectors all over the world.
Beginning with OMB, which substantially leads the U.S. governmental efforts in ITA/EA area, seems
to be on the right path using process improvement concept in its ITA/EA maturity model (OMB, 2007-
2). EA community still finds it difficult to introduce quality management concept into its business and
practices. This chapter therefore suggests a practical ITA/EA maturity model based on the quality concept
of enterprise information architecture (EIA), which is ROIdriven, practical and based on four-phased
process improvement approach for the EA community. This approach could bring a substantial reduction
in the costs and efforts in the entire ITA/EA area and provide sustainable development environment for
the ITA/EA like the argument of the environmentalists.
Chapter V
Measuring the Benefits of Enterprise Architecture: Knowledge Management Maturity.................... 106
Alan Dyer, EWA, Australia

Enterprise Architecture is the organising logic for business processes and Information Technology infra-
structure, the purpose of which is to create a more effective organisation in the context of the businesss
strategy and goals. However, the ability to measure the effectiveness of any activities initiated under
the guise of Enterprise Architecture is limited, even more so in those organisations, such as government
agencies, that do not recognise financial return on investment. This chapter introduces the concept of
Knowledge Management, linked to the strategic outcomes of Enterprise Architecture and proposes a
maturity model framework for the measurement of Enterprise Architecture implementation. The chapter
aims to provide a basis for discussion of a wider Capability Maturity Profile with architectural frameworks
to help develop and measure the benefits of implementing frameworks and architectures.

Section II
Leadership, Governance, and Management

Chapter VI
The Criticality of Transformational Leadership to Advancing United States Government
Enterprise Architecture Adoption........................................................................................................ 130
William S. Boddie, National Defense University, USA

An effective enterprise architecture capability enables an organization to develop sound enterprise plans,
make informed human, material, and technology resource investment and management decisions, and
optimize key business processes. Despite U.S. Congressional legislation, U.S. Office of Management
and Budget guidance, and U.S. Government Accountability Office reports and recommendations, many
U.S. government leaders struggle in advancing EA adoption in their organizations. U.S. Government
leaders must embrace transformational leadership to advance EA adoption. This chapter presents the
Vision, Integrity, Communication, Inspiration, and Empowerment Transformational Leadership Model
that describes competencies U.S. Government leaders need to advance EA adoption. The chapter also
presents the Transformational Leadership and Enterprise Management Integration Framework that de-
scribes the relationship between transformational leadership and enterprise management functions.

Chapter VII
Adaptive IT Architecture as a Catalyst for Network Capability in Government................................. 149
Jay Ramanathan, The Ohio State University, USA
Rajiv Ramnath, The Ohio State University, USA
Anand Desai, The Ohio State University, USA

Public institutions that are organized in hierarchies find it difficult to address crisis or other unique
requirements that demand networked solutions. This chapter first provides a prescriptive transaction-
based method for achieving such networking organizations with information technologies (IT) and then
discusses how the organization becomes more effective in non-routine responses to citizen requests.
The chapter illustrates how the prescriptive transaction-based enterprise architecture framework was
used for decision-making in a multi-year interdisciplinary industry-university collaboration resulting in
a successful 311 system.

Chapter VIII
Design Integrity and Enterprise Architecture Governance.................................................................. 173
Chris Aitken, Queensland Health, Australia

This chapter describes a design integrity framework for developing models of any entity of interest at
various levels of abstraction. The design integrity framework presented describes and defines contextual,
conceptual, logical and physical model types. The framework also defines a set of alignment attributes
for each model type and explains how these are to be used to demonstrate alignment from initial con-
cept and requirements through to actual physical implementation. These concepts are then applied in
an organisational context to identify the roles necessary to support an EA governance framework and
strong alignment from idea to implementation.

Chapter IX
Policy Mapping: Relating Enterprise Architecture to Policy Goals.................................................... 191
Dwight V. Toavs, National Defense University, USA

Few government executives can explain the enterprise architecture of his or her agency, and it is rare to
find a political executive who is able to explain how their political objectives are furthered by govern-
ment-wide enterprise architecture. This low level of awareness translates to enterprise architecture efforts
that are often undervalued and under funded because the budget priorities of political and functional
executives rarely include enterprise architecture. Not surprisingly, many points of tension exist as the
CIOs and architects work to translate political goals into resources and architectural plans supporting the
agencys programs. This tension, between the rational orientation of enterprise architecture advocated
by the CIO and the political nature of policy goals sought by executives, often puts a CIO at odds with
his or her organizations political and functional executives. This chapter discusses that tension, and
advocates that CIOs and enterprise architects develop a Policy Map to bridge the gap between the
political and the rational perspectives.

Chapter X
Enterprise Architecture Management and its Role in IT Governance and IT Investment
Planning............................................................................................................................................... 208
Klaus D. Niemann, act! Consulting GmbH, Germany

A comprehensive enterprise architecture management has strategic and operative aspects. Strategic tasks
cover the identification of appropriate fields of activity for information technology (IT) investments in
accordance with business strategy and portfolio management. Enterprise architecture management is
cross-linked with other IT management processes and delivers the necessary information for sustainable
governance. The continuous analysis of the IT landscape, the deduction of measures for optimization
and its controlling also belong to the tasks of architecture management. Standards for development and
infrastructures are made, e.g. reference architectures and a book of standards, whose implementation
is overseen by solution architects throughout the operative architecture management.
Chapter XI
The GEA: Governance Enterprise Architecture-Framework and Models........................................... 229
Vassilios Peristeras, National University of Ireland, Ireland
Konstantinos Tarabanis, University of Macedonia, Greece

Departing from the lack of coherent and ready-to-use models and domain descriptions for public admin-
istration, the chapter presents a set of generic models that serves as a top-level, generic and thus reus-
able Enterprise Architecture for the overall public administration domain. This set of models is called
Governance Enterprise Architecture (GEA). GEA has deliberately remained technology independent
and following the Model Driven Architecture approach, GEA constitutes a computationally independent
model for the domain. GEA has been derived from multi-disciplinary influences and insights and identifies
two broad modeling areas, called governance mega-processes: Public Policy Formulation and Service
Provision. These two, together with the object versus process perspective, form a four-cell matrix that
defines four modeling areas for the GEA models. Until now, a large number of services have been mod-
eled using GEA and more recently; an extended modeling effort has started with GEA being chosen for
use by a national EU-country project. GEA can be also used as a knowledge infrastructure for applying
semantic technologies. In this line, it has been used for creating a public administration specialization
of a formal Semantic Web Service ontology, namely WSMO.

Chapter XII
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private
Cooperation.......................................................................................................................................... 263
Bram Klievink, Delft University of Technology, The Netherlands
Wijnand Derks, Telematica Instituut, The Netherlands
Marijn Janssen, Delft University of Technology, The Netherlands

This chapter presents an architecture aimed at supporting the coordination of public and private parties
for creating a one stop shop and the main challenges therein. Public-private service network poses higher
requirements on the architecture of a service network, whereas the variety in systems of the various
organizations and different aims make it more difficult to develop such an architecture. Furthermore, it
is difficult to isolate architectural challenges from governance aspects, as many architectural issues need
to be complemented by governance mechanisms. Architecture and governance cannot be considered in
isolation. Within this setting, a new architecture is created and presented for managing and orchestrating
the interactions among governmental and private organizations.

Section III
Realization and Deployment

Chapter XIII
People-Led Enterprise Architecture..................................................................................................... 285
Neil Fairhead, Fujitsu Services, UK
John Good, Serco Consulting, UK
This chapter provides an approach to Enterprise Architecture that is people-led, as a contrast to being
led by technology or modelling methodology. The chapter identifies the major stakeholders in Enterprise
Architecture and suggests where in the organisation they may be found and how they may be connected
with the Enterprise Architecture. It highlights the roles of stakeholders throughout the process of defin-
ing and implementing an Enterprise Architecture. The view of stakeholders managing the EA effort is
described through the complete lifecycle, from setting the EA mission to sustaining the benefits after
implementation. In proposing the adoption of such an approach, we aim to encourage a more direct link
between Enterprise Architecture, the needs of the stakeholders it serves, and the pubic policy outcomes
it enables.

Chapter XIV
Using Enterprise Architecture to Transform Service Delivery: The U.S. Federal Governments
Human Resources Line of Business.................................................................................................... 307
Timothy Biggert, IBM Global Business Services, USA
Kunal Suryavanshi, IBM Global Business Services, USA
Ryan Kobb, IBM Global Business Services, USA

This chapter provides a case study on how the U.S. Office of Personnel Management has led the establish-
ment of the Human Resources Line of Business (HR LOB). It explains how the HR LOB program has
used enterprise architecture to drive transformation to a new Human Resources service delivery model
across the United States Federal government. The authors propose that the common view and vocabulary
that EA artifacts provide, along with the collaborative governance that took place to create the artifacts,
has produced a solid business foundation for this extensive business transformation effort.

Chapter XV
Enterprise Architecture as Context and Method for Designing and Implementing
Information Security and Data Privacy Controls in Government Agencies........................................ 340
Scott Bernard, Carnegie Mellon University, USA
Shuyuan Mary Ho, Syracuse University, USA

Government agencies are committing an increasing amount of resources to information security and
data privacy solutions in order to meet legal and mission requirements for protecting agency informa-
tion in the face of increasingly sophisticated global threats. Enterprise Architecture (EA) provides an
agency-wide context and method that includes a security sub-architecture which can be used to design
and implement effective controls. EA is scalable, which promotes consistency and alignment in controls
at the enterprise, program, and system levels. EA also can help government agencies improve existing
security and data privacy programs by enabling them to move beyond a system-level perspective and
begin to promote an enterprise-wide view of security and privacy, as well as improve the agility and ef-
fectiveness of lifecycle activities for the development, implementation, and operation of related security
and privacy controls that will assure the confidentiality, integrity, and availability of the agencys data
and information. This chapter presents the EA3 Cube EA methodology and framework, including an
integrated security architecture, that is suitable for use by government agencies for the development of
risk-adjusted security and privacy controls that are designed into the agencys work processes, informa-
tion flows, systems, applications, and network infrastructure.
Chapter XVI
Architecture Based Engineering of Enterprises with Government Involvement................................. 371
John Mo, RMIT University, Australia
Laszlo Nemes, Nemes Consulting, Australia

With a plethora of architectures, modeling techniques and methodologies on offer, it is difficult to decide
how to begin building an enterprise and achieve seamless integration. This difficulty is most noticeable
in consortia that need to deal with government participation. Various government projects have differ-
ent objectives and agenda. In addition, changes in business environment as well as government policies
impose extra conditions onto the project. Failure to comply with the project requirement can lead to loss
of business and sometimes unexpected penalty. The chapter uses three case studies to show various ways
of government involvements in projects. Based on the experiences of these cases, the chapter discusses
how enterprise engineering can help creating and managing the enterprise that can engage government
services successfully.

Chapter XVII
Collaborative Enterprise Architecture for Municipal Environments................................................... 392
Leonidas G. Anthopoulos, Hellenic Ministry of Foreign Affairs, Greece

E-Government evolves according to strategic plans with the coordination of central Governments. This
top-down procedure succeeds in slow but sufficient transformation of public services into e-Government
ones. However, public agencies adapt to e-Government with difficulty, requiring holistic guidance and a
detailed legal framework provided by the Government. The setting up of common Enterprise Architecture
for all public agencies requires careful analysis. Moreover, common Enterprise Architecture could fail
to cover the special needs of small or municipal agencies. This chapter uses data from various major e-
Government strategies, together with their enterprise architectures, in order to introduce a development
model of municipal Enterprise Architecture. The model is based on the experience collected from the
Digital City of Trikala, Greece, and results in Collaborative Enterprise Architecture.

Chapter XVIII
Government Enterprise Architectures: Enabling the Alignment of Business Processes
and Information Systems .................................................................................................................... 409
Nigel Martin, The Australian National University, Australia
Shirley Gregor, The Australian National University, Australia
Dennis Hart, The Australian National University, Australia

This chapter describes the development and use of government enterprise architectures for the framing
and alignment of the core business processes and enabling information systems at the Australian Bureau
of Statistics (ABS) and the Centrelink Social Services agency. The chapter focuses on the construction
and ongoing maintenance of public enterprise architectures that enable the alignment condition. An es-
tablished research model has been used to guide the analysis and explication of the government business
processes, enabling systems and architectures, and the resulting agency alignment. While the discussion
acknowledges the existence of other formal and informal enablers of alignment, this chapter concentrates
on the enterprise architecture enabler. The functionally integrated government business processes and
information systems that are established within the instantiated enterprise architecture are examined.

Compilation of References ............................................................................................................... 438

About the Contributors .................................................................................................................... 463

Index.................................................................................................................................................... 472
xv

Foreword

The reasons one would do architecture for anything are two: a) complexity and b) change.
If the object you are trying to create is simple that is, if, at a glance, you can see it in its entirety,
at the level of definition that is required to create it and if it is not likely to change appreciably over
the period of its existence then, you dont need architecture. You need a tool (a machete) some
material (some grass) some time and then chop down grass build a grass shack.
If, on the other hand, the object you are trying to create so complex that you cannot see it in its entirety
at the level of definition required to create it like an Airbus 380 then forget the machete and grass
and it doesnt make any difference what tools you have, what material you have and how much time
you have, you are not going to be able to create an Airbus 380. In this case, you NEED Architecture
that is, you have to be able to describe the object in order to create it.
If you cant describe the object you are trying to create at the level of definition required to create
it, you cant create it I dont really care how big or small, how simple or complex, what its made
of or what it is a hundred story building, a locomotive, a super computer, an Airbus 380 or an
enterprise.
After you get the Airbus created and the price of oil goes up out of sight and the mobility of the
population increases, and you want to change it to carry more passengers with greater fuel efficiency,
how would you do that? You have to go back to the architectural descriptions that were produced in
order to create it to begin with and that constitutes the baseline for changing it that is, they are the
baseline for changing the object IF they have been maintained to reflect any changes that have been
made to the object instances.
If you want to change the object you have created and no architectural representations exist, then you
have only three options: a) you can just make the changes required like, change the jet turbines to
nuclear engines, add a hundred seats, replace the aluminum surfaces with composites, etc. and then
try it and see if it will still work; or b) you can reverse engineer the architectural representations from the
operating instance like, disassemble the Airbus into its parts, with your micrometers measure every
part to operating clearances, understand how the parts fit together, write it all down and then make the
needed changes; or, c) scrap the existing instantiation and build a new one from scratch. These are the
three possibilities for changing an object once it is created when the architectural representations have
not been retained or maintained or if they were never produced in the first place.
xvi

In short, the reasons you do architecture have to do with complexity and change. Nothing magic is
happening and nothing is happening by accident. The laws of nature are constant and there is no way
to circumvent them.
I would submit that the modern Enterprise is the most complex object yet conceived of by human-
kind. Enterprises are far more complex than Airbus 380s! And an enterprise doesnt have to be all
that big to be extremely complex.
I would observe that very many enterprises, and many of them very large enterprises, already exist.
Where is all the enterprise architecture? I submit, the enterprises that are in existence today typically
were never engineered. There is no enterprise architecture. The enterprises actually were never designed
they simply happened, one grass shack at a time. It is little wonder that enterprises, in general, dont
work very well, are not very efficient and are very difficult to change. The problem comes after you
have several square miles of grass shacks and the external environment changes to require a hundred
story building. One more grass shack is not going to fix the problem.
I have been mixing the metaphor between enterprises and buildings but I hope the point is clear
the two reasons you need architecture for anything are complexity and change and there is not going to
be a substitute for architecture.
I would also observe that public sector enterprises tend to be of the extreme complex variety. In the
public sector, there is a wide variety of products and services. There also potentially is some common
infrastructure to manage like finances, employment, land, administration. The public sector Enterprise
typically decentralizes the products and services and centralizes the infrastructure management. The
political issue tends to be who controls what which adds another dimension to the complexity.
When the environment becomes more demanding, that is the consumers demand more and bet-
ter products and services and the suppliers have less available resources; and in the public sector, the
consumers and the suppliers are basically, one in the same; it creates a very tenuous situation where
something has to change. My opinion is, the issues of enterprise architecture are fundamental to ongo-
ing stability of operation. How else are you going to dramatically improve the delivery of products
and services and accomplish this with only the resources that are presently available? You only have
to read the daily newspapers to find the public sector enterprises that are failing in this regard and not
performing effectively.
In the private sector, the worst possible thing that can happen to an enterprise if it becomes dysfunc-
tional, that is, if it can no longer produce marketable products or services with the available resources,
is that it just goes out of business. In the public sector, when enterprises go dysfunctional, there are all
kinds of problems: political problems, environmental problems, economic problems, emotional problems,
sociological problems, in addition to going out of business!
Advances in Government Enterprise Architecture could not appear at a better time. We need the most
advanced thinking humanly possible at this juncture in history. I have devoted nearly 40 years of my
professional life to the subject of Enterprise Architecture. Tragically, the great preponderance of people
in the world seem to still be searching for the holy grail, the quick fix, the silver bullet, a technologi-
cal panacea. My observation is, actual work is going to have to take place, engineering style of work,
enterprise engineering work. Writing more code is NOT going to fix the problem and I dont care how
much more code is written. The enterprise is going to have to be engineered and the raw material for
doing engineering work is the set of descriptive representations that constitute the architecture for the
object being engineered, in this case, the enterprise, in fact the public sector, government enterprise.
Enterprise architecture may well be the issue of the century. In fact, in 1999, I wrote an article by
that name, Enterprise Architecture: The Issue of the Century in which I argued this case. In this short
foreword, I hope I have convincingly established that enterprise architecture for public sector enterprises
is especially critical.
xvii

It is comforting to know that there are some number of people giving the subject of enterprise archi-
tecture, particularly in its manifestation in the public sector, serious thought. As I mentioned above, we
need all of the good thoughts and energy possible focused on this critical subject.
I appreciate Pallab Sahas effort to pull together this collection of material. I know the time and
effort he has spent will benefit all of us immensely. I have encouraged Pallab before never to give up
to continue his good work. I hope this is only the beginning of a lot more advances in government
enterprise architecture. And, in this simple foreword, I hope I have encouraged concentrated focus on the
enterprise, not simply the systems or the technologies of the enterprise but on THE ENTERPRISE,
the government enterprise in particular.

John A. Zachman
Glendale, California
2008

John A. Zachman is the originator of the Framework for Enterprise Architecture which has received broad accep-
tance around the world as an integrative framework, or periodic table of descriptive representations for enterprises.
John is not only known for this work on enterprise architecture, but is also known for his early contributions to IBMs
Information Strategy methodology (Business Systems Planning) as well as to their executive team planning techniques
(Intensive Planning). He retired from IBM in 1990, having served them for 26 years. He presently is chairman of the
board of Zachman Framework Associates, a worldwide consortium managing conformance to the Zachman Framework
principles. He is chief executive officer of the Zachman Institute for Framework Advancement (ZIFA), an organization
dedicated to advancing the conceptual and implementation states of the art in EA. He also operates his own education
and consulting business, Zachman International (www.ZachmanInternational.com). John serves on the Executive Council
for Information Management and Technology (ECIMT) of the United States Government Accountability Office (GAO).
He is a fellow for the College of Business Administration of the University of North Texas. He serves on the advisory
board for the Data Resource Management Program at the University of Washington and on the advisory board of the
Data Administration Management Association International (DAMA-I) from whom he was awarded the 2002 Lifetime
Achievement Award. He was awarded the 2004 Oakland University, Applied Technology in Business (ATIB), Award for
IS Excellence and Innovation. John has been focusing on EA since 1970 and has written extensively on the subject. He is
the author of the book, The Zachman Framework for Enterprise Architecture: A Primer on Enterprise Engineering and
Manufacturing. He has facilitated innumerable executive team planning sessions. He travels nationally and internation-
ally, teaching and consulting, and is a popular conference speaker, known for his motivating messages on Enterprise
Architecture issues. He has spoken to many thousands of enterprise managers and information professionals on every
continent. In addition to his professional activities, John Zachman serves on the Elder Council of the Church on the Way
(First Foursquare Church of Van Nuys, California), the board of directors of Living Way Ministries, a radio and televi-
sion ministry of the Church on the Way, the presidents cabinet of the Kings College and Seminary, the board of directors
of the Los Angeles Citywide Childrens Christian Choir and on the board of directors of Native Hope International, a
Los Angeles-based ministry to the Native American people. Prior to joining IBM, John served as a line officer in the
U.S. Navy and is a retired commander in the U.S. Naval Reserve. He chaired a panel on Planning, Development and
Maintenance Tools and Methods Integration for the U.S. National Institute of Standards and Technology. He holds a
degree in chemistry from Northwestern University, has taught at Tufts University, has served on the board of councilors
for the School of Library and Information Management at the University of Southern California, as a special advisor
to the School of Library and Information Management at Emporia State University, and on the advisory council to the
School of Library and Information Management at Dominican University.
xviii

Preface

The foundation of anything enduring is its architecture and design, enterprises included. Enterprise archi-
tecture (EA) is an important and evolving discipline that is becoming more discussed and talked about with
every passing day. Nevertheless, to my knowledge, there exists very little guidance that rank high both
on practical relevance and academic rigor. This book, along with my first book Handbook of Enterprise
Systems Architecture in Practice has emerged out of my strong belief that well architected enterprises
consistently perform better. However this aspect has not been well explored and documented.
This is not a general book on EA. There are several books already covering the subject. But the caveat
with current EA literature is that most available materials tend to overly focus on a specific framework
or methodology thus limiting their utility. I have attempted to address some of these issues through my
first book. That one, released in March 2007, has received several accolades and excellent feedback.
Over the past two decades, the largest implementations of EA have occurred in the government sec-
tor. This is natural as typically governments are the largest organizations in almost every country. It is
further characterized by complex federated structures where individual government organizations work
in their respective silos. Often this leads to and amplifies the fragmentation of business processes and
duplication of systems and technologies, creating obstacles in cross agency interoperability. Govern-
ment-wide architecture allows end-to-end business processes, standard technologies, rationalized data
structure and modular e-services that can be assembled as required to deliver e-services. EA is a critical
success factor for all types, scale and intensities of e-government programmes. The key goal of EA in
government organizations is to make them citizen-centered, results-oriented and market-based. However
at this point there are no books addressing this area. There is a very big gap in the current literature,
and this book expects to address the current gap. This is a seminal book that will popularize the term
GOVERNMENT ENTERPRISE ARCHITECTURE and trigger several other publications in the same
subject area. This book, unlike any other available today, aims:

To present and bring forth the current and future developments, issues and trends in EA for Gov-
ernment organizations.
To integrate EA theory and concepts to field-tested methods, practical strategic issues and imple-
mentation challenges in the context of e-government.
To illustrate development methods and the process cycle through case studies and detailed ex-
amples.
To demonstrate the criticality of EA for e-government programmes.
To provide insights into the impact of effective EA on IT governance, IT portfolio management,
IT risks, IT outsourcing and service oriented architecture.
xix

This book is a compilation of 18 chapters on government enterprise architecture written by prac-


titioners and practicing academics from countries including Australia, Germany, Greece, Ireland, The
Netherlands, Singapore, South Korea, United Kingdom, and United States of America. The chapters in
the book have been selected with the intention to address professionals with a wide variety of interests
and with different levels of EA knowledge. The book has a very strong practical orientation and is pri-
marily targeted at:

Government CIOs, IT/IS managers, architects, analysts and designers seeking better, quicker and
easier approaches to respond to needs of their internal and external customers.
Line-of-business managers concerned with maximizing business value of IT and business com-
petitiveness.
CTOs of business software companies interested in incorporating EA to differentiate their products
and services and increasing the value proposition to their customers in the government sector.
Consultants and practitioners desirous of new solutions and technologies to improve the productiv-
ity of their government clients.
MIS and IT educators interested in imparting knowledge about this vital discipline.
Researchers looking to uncover and characterize new research problems and programmes.
IT professionals involved with organizational technology strategic planning, technology procure-
ment, management of technology projects, consulting and advising on technology issues and
management of total cost of IT ownership.

The book is structured logically into three sections.

Section I: Frameworks and Methodologies focuses on approaches and mechanisms that organiza-
tions in the government use to develop their architecture blueprints. In the past two decades a lot
of effort has been expended by several countries in developing their own frameworks, guidebooks,
toolkits and methodologies. Section I intends to provide a glimpse of these activities.
Section II: Leadership, Governance and Management shows how government agencies and
organizations initiate and sustain their EA practices. Beyond frameworks, methodologies and
artifacts, it takes good leadership, innovative governance and flexible management to sustain EA
programme. Section II shows how these play a role and impact of these on the overall programme
success.
Section III: Realization and Deployment provides insights into how organizations employ EA
to drive their transformation programmes, gain tighter business-IT alignment and realize business
value out of their IT investments. This section consists of descriptions of the adoption of EA in
large and small organizations with insights on key practical challenges they face and how the whole
EA programmes are sustained.

Section I: Frameworks and Methodologies

Section I is a collection of chapters describing approaches and methods used by organizations to plan
and develop their EA blueprints.

Chapter I: Countries across the world are pushing their frontiers in governance in the move to infor-
mation economy, and governments play a pivotal role in this transformation. These governments employ
xx

modern information and communication technologies to serve the citizens and businesses better. Raising
the effectiveness and quality of government services is not only a matter of leading edge technologies;
it also involves visionary leadership, clear objectives and sound execution mechanism. The role of
Enterprise Architecture in shaping e-government programmes cannot be overstated. Within the context
of Singapores e-government initiative, this chapter, A Methodology for Government Transformation
with Enterprise Architecture by Pallab Saha of the National University of Singapore describes the
Methodology for AGency ENTerprise Architecture (MAGENTA), a rigorous, disciplined and structured
methodology for development of agency enterprise architectures that enables agencies to align to and
fully support the governments transformation objectives and outcomes. Mechanisms for agencies to
align to the overall government enterprise architecture are detailed. The chapter concludes with a set of
recommendations for future enhancements and research.
Chapter II: A Service-Oriented Reference Architecture for E-Government by Marc Lankhorst
of the Telematica Instituut, Netherlands and Guido Bayens of Novius Business and Information
Management, The Netherlands describes the development and future directions of service-oriented
reference architecture for the Dutch government. The Dutch government has focused on improving
the service level of public agencies for several years. Electronic services play an important part in this,
which requires a concerted effort across many organizations. A reference architecture has been created
in order to guide the many different programmes and projects. This chapter describes the role of service
orientation in e-government, and the creation, structure, and first results of this reference architecture
for e-government. Furthermore, the chapter looks ahead at future developments in integrated, demand-
driven service provisioning in e-government.
Chapter III: Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the
Public Sector by Amit Bhagwat introduces the concept of Beacon Architecture as a formalized and
ordered grouping of architectural elements, describing the constituents, their order, correlation and
likely evolution of the grouping; and illustrating its specific value to the public sector. The first half of
the chapter builds up to the concept, the reasons behind its specific nature, and its value to enterprises,
especially in the public sector. For this, the chapter is split into a number of sections that may be studied
separately and that also build up to introduce Beacon Architecture. The sections may be broadly divided
as concepts, historical overview, illustrative case studies in public sector transformations along with a
summary of peculiar architectural challenges they face, and a cyclical pattern to architecture develop-
ment. After introducing and elucidating on concept and constituents of Beacon Architecture, the chapter
delves into its correlation with architecture concepts in currency and its role in mitigating enterprise
architecture challenges with examples and illustrations from the British Government, before concluding
on an assessment of future trends.
Chapter IV: Quite a good amount of time has been spent seeking appropriate solutions to handle
the giant information technology expenditure not only in government sectors but also in private sectors
all over the world. Beginning with OMB, which substantially leads the U.S. governmental efforts in
ITA/EA area, seems to be on the right path using process improvement concept in its ITA/EA maturity
model (OMB, 2007-2). EA community still finds it difficult to introduce quality management concept
into its business and practices. This chapter, Maturity Model Based on Quality Concept of Enterprise
Information Architecture, by Hong Sik Kim of the Korea Polytechnique University and Sungwook
Moon of Component Basis Inc., South Korea therefore suggests a practical ITA/EA maturity model
based on the quality concept of enterprise information architecture (EIA), which is ROIdriven, practical
and based on four-phased process improvement approach for the EA community. This approach could
bring a substantial reduction in the costs and efforts in the entire ITA/EA area and provide sustainable
development environment for the ITA/EA like the argument of the environmentalists.
xxi

Chapter V: Enterprise architecture is the organising logic for business processes and Information
Technology infrastructure, the purpose of which is to create a more effective organisation in the context
of the businesss strategy and goals. However, the ability to measure the effectiveness of any activities
initiated under the guise of enterprise architecture is limited, even more so in those organisations, such
as government agencies, that do not recognise financial return on investment. This chapter, Measuring
the Benefits of Enterprise Architecture: Knowledge Management Maturity by Alan Dyer of the Aus-
tralian Defence Force Academy, University of New South Wales, Australia introduces the concept
of Knowledge Management, linked to the strategic outcomes of Enterprise Architecture and proposes a
maturity model framework for the measurement of enterprise architecture implementation. The chapter
aims to provide a basis for discussion of a wider capability maturity profile with architectural frameworks
to help develop and measure the benefits of implementing frameworks and architectures.

Section II: Leadership, Governance, and Management

Section II of the book comprises of chapters that are useful in instituting and sustaining the EA practice
within the government organizations.

Chapter VI: An effective enterprise architecture capability enables an organization to develop sound
enterprise plans, make informed human, material, and technology resource investment and management
decisions, and optimize key business processes. Despite U.S. Congressional legislation, U.S. Office of
Management and Budget guidance, and U.S. Government Accountability Office reports and recommen-
dations, many U.S. government leaders struggle in advancing EA adoption in their organizations. U.S.
Government leaders must embrace transformational leadership to advance EA adoption. This chapter,
The Criticality of Transformational Leadership to Advancing the United States Government Enterprise
Architecture Adoption by William Boddie of the National Defense University, United States of America
presents the Vision, Integrity, Communication, Inspiration, and Empowerment Transformational Leadership
Model that describes competencies U.S. Government leaders need to advance EA adoption. The chapter
also presents the Transformational Leadership and Enterprise Management Integration Framework that
describes the relationship between transformational leadership and enterprise management functions.
Chapter VII: Public institutions that are organized in hierarchies find it difficult to address crisis or
other unique requirements that demand networked solutions. This chapter, Adaptive IT Architecture as
a Catalyst for Network Capability in Government by Jay Ramanathan, Rajiv Ramnath and Anand
Desai of the Ohio State University, United States of America first provides a prescriptive transaction-
based method for achieving such networking organizations with information technologies (IT) and then
discusses how the organization becomes more effective in non-routine responses to citizen requests.
The chapter illustrates how the prescriptive transaction-based enterprise architecture framework was
used for decision-making in a multi-year interdisciplinary industry-university collaboration resulting in
a successful 311 system.
Chapter VIII: Design Integrity and Enterprise Architecture Governance by Chris Aitken describes
a design integrity framework for developing models of any entity of interest at various levels of abstrac-
tion. The design integrity framework presented describes and defines contextual, conceptual, logical
and physical model types. The framework also defines a set of alignment attributes for each model type
and explains how these are to be used to demonstrate alignment from initial concept and requirements
through to actual physical implementation. These concepts are then applied in an organisational context
to identify the roles necessary to support an EA governance framework and strong alignment from idea
to implementation.
xxii

Chapter IX: Few government executives can explain the enterprise architecture of his or her agency,
and it is rare to find a political executive who is able to explain how their political objectives are fur-
thered by government-wide enterprise architecture. This low level of awareness translates to enterprise
architecture efforts that are often undervalued and under funded because the budget priorities of political
and functional executives rarely include enterprise architecture. Not surprisingly, many points of tension
exist as the CIOs and architects work to translate political goals into resources and architectural plans
supporting the agencys programs. This tension, between the rational orientation of enterprise architecture
advocated by the CIO and the political nature of policy goals sought by executives, often puts a CIO at
odds with his or her organizations political and functional executives. This chapter, Policy Mapping:
Relating Enterprise Architecture to Policy Goals by Dwight Toavs of the National Defense University,
United States of America discusses that tension, and advocates that CIOs and enterprise architects
develop a policy map to bridge the gap between the political and the rational perspectives.
Chapter X: A comprehensive enterprise architecture management has strategic and operative aspects.
Strategic tasks cover the identification of appropriate fields of activity for information technology (IT)
investments in accordance with business strategy and portfolio management. This chapter, Enterprise
Architecture Management and its Role in IT Governance and IT Investment Planning by Klaus Niemann
of ACT! Consulting, Germany shows how enterprise architecture management is cross-linked with
other IT management processes and delivers the necessary information for sustainable governance. The
continuous analysis of the IT landscape, the deduction of measures for optimization and its controlling
also belong to the tasks of architecture management. Standards for development and infrastructures
are made, e.g. reference architectures and a book of standards, whose implementation is overseen by
solution architects throughout the operative architecture management.
Chapter XI: Departing from the lack of coherent and ready-to-use models and domain descriptions
for public administration, this chapter, The GEA: Governance Enterprise Architecture-Framework and
Models by Vassilios Peristeras of the National University of Ireland, Ireland and Konstantinos Tara-
banis of the University of Macedonia, Greece presents a set of generic models that serves as a top-level,
generic and thus reusable Enterprise Architecture for the overall public administration domain. This set of
models is called Governance Enterprise Architecture (GEA). GEA has deliberately remained technology
independent and following the model driven architecture approach, GEA constitutes a computationally
independent model for the domain. GEA has been derived from multi-disciplinary influences and insights
and identifies two broad modeling areas, called governance mega-processes: Public Policy Formulation
and Service Provision. These two, together with the object versus process perspective, form a four-cell
matrix that defines four modeling areas for the GEA models. Until now, a large number of services have
been modeled using GEA and more recently; an extended modeling effort has started with GEA being
chosen for use by a national EU-country project. GEA can be also used as a knowledge infrastructure
for applying semantic technologies. In this line, it has been used for creating a public administration
specialization of a formal Semantic Web Service ontology, namely WSMO.
Chapter XII: Enterprise Architecture and Governance Challenges for Orchestrating Public-Pri-
vate Cooperation by Bram Klievink, Wijnand Derks and Marijn Janssen of the Delft University of
Technology, Netherlands presents an architecture aimed at supporting the coordination of public and
private parties for creating a one stop shop and the main challenges therein. Public-private service net-
work poses higher requirements on the architecture of a service network, whereas the variety in systems
of the various organizations and different aims make it more difficult to develop such an architecture.
Furthermore, it is difficult to isolate architectural challenges from governance aspects, as many architec-
tural issues need to be complemented by governance mechanisms. Architecture and governance cannot
xxiii

be considered in isolation. Within this setting, a new architecture is created and presented for managing
and orchestrating the interactions among governmental and private organizations.

Section III: Realization and Deployment

Section III provides insights into how organizations employ EA to drive their transformation programmes,
gain tighter business-IT alignment and realize business value out of their IT investments.

Chapter XIII: People-Led Enterprise Architecture by Neil Fairhead of Fujitsu Services and John
Good of SERCO Consulting, United Kingdom provides an approach to enterprise architecture that is
people-led, as a contrast to being led by technology or modelling methodology. The chapter identifies the
major stakeholders in enterprise architecture and suggests where in the organisation they may be found
and how they may be connected with the enterprise architecture. It highlights the roles of stakeholders
throughout the process of defining and implementing an enterprise architecture. The view of stakehold-
ers managing the EA effort is described through the complete lifecycle, from setting the EA mission to
sustaining the benefits after implementation. In proposing the adoption of such an approach, we aim to
encourage a more direct link between enterprise architecture, the needs of the stakeholders it serves,
and the pubic policy outcomes it enables.
Chapter XIV: Using Enterprise Architecture to Transform Service Delivery: The U.S. Federal
Governments Human Resource Line of Business by Timothy Biggert, Kunal Suryavanshi and Ryan
Kobb of IBM Global Business Services, United States of America provides a case study on how the
U.S. Office of Personnel Management has led the establishment of the Human Resources Line of Business
(HR LOB). It explains how the HR LOB program has used enterprise architecture to drive transforma-
tion to a new Human Resources service delivery model across the United States Federal government.
The authors propose that the common view and vocabulary that EA artifacts provide, along with the
collaborative governance that took place to create the artifacts, has produced a solid business foundation
for this extensive business transformation effort.
Chapter XV: Government agencies are committing an increasing amount of resources to informa-
tion security and data privacy solutions in order to meet legal and mission requirements for protecting
agency information in the face of increasingly sophisticated global threats. Enterprise architecture (EA)
provides an agency-wide context and method that includes a security sub-architecture which can be
used to design and implement effective controls. EA is scalable, which promotes consistency and align-
ment in controls at the enterprise, program, and system levels. EA also can help government agencies
improve existing security and data privacy programs by enabling them to move beyond a system-level
perspective and begin to promote an enterprise-wide view of security and privacy, as well as improve
the agility and effectiveness of lifecycle activities for the development, implementation, and operation
of related security and privacy controls that will assure the confidentiality, integrity, and availability
of the agencys data and information. This chapter, Enterprise Architecture as Context and Method for
Designing and Implementing Information Security and Data Privacy Controls in Government Agencies
by Scott Bernard of the Carnegie Mellon University and Shuyuan Mary Ho of Syracuse Univer-
sity, United States of America presents the EA3 Cube EA methodology and framework, including an
integrated security architecture, that is suitable for use by government agencies for the development of
risk-adjusted security and privacy controls that are designed into the agencys work processes, informa-
tion flows, systems, applications, and network infrastructure.
xxiv

Chapter XVI: With a plethora of architectures, modeling techniques and methodologies on offer, it is
difficult to decide how to begin building an enterprise and achieve seamless integration. This difficulty
is most noticeable in consortia that need to deal with government participation. Various government
projects have different objectives and agenda. In addition, changes in business environment as well
as government policies impose extra conditions onto the project. Failure to comply with the project
requirement can lead to loss of business and sometimes unexpected penalty. The chapter, Architecture
Based Engineering of Enterprises with Government Involvement by Laszlo Nemes and John Mo of the
RMIT University, Australia uses three case studies to show various ways of government involvements
in projects. Based on the experiences of these cases, the chapter discusses how enterprise engineering
can help creating and managing the enterprise that can engage government services successfully.
Chapter XVII: E-government evolves according to strategic plans with the coordination of central
governments. This top-down procedure succeeds in slow but sufficient transformation of public services
into e-government ones. However, public agencies adapt to e-government with difficulty, requiring ho-
listic guidance and a detailed legal framework provided by the government. The setting up of common
enterprise architecture for all public agencies requires careful analysis. Moreover, common enterprise
architecture could fail to cover the special needs of small or municipal agencies. This chapter, Collab-
orative Enterprise Architecture for Municipal Environments by Leonidas Anthopoulos of the Hellenic
Ministry of Foreign Affairs, Greece uses data from various major e-Government strategies, together
with their enterprise architectures, in order to introduce a development model of municipal Enterprise
Architecture. The model is based on the experience collected from the Digital City of Trikala, Greece,
and results in Collaborative Enterprise Architecture.
Chapter XVIII: Government Enterprise Architectures: Enabling the Alignment of Business Pro-
cesses and Information Systems by Nigel Martin, Shirley Gregor and Dennis Hart of the Australian
National University, Australia describes the development and use of government enterprise architec-
tures for the framing and alignment of the core business processes and enabling information systems
at the Australian Bureau of Statistics (ABS) and the Centrelink Social Services agency. The chapter
focuses on the construction and ongoing maintenance of public enterprise architectures that enable the
alignment condition. An established research model has been used to guide the analysis and explication
of the government business processes, enabling systems and architectures, and the resulting agency
alignment. While the discussion acknowledges the existence of other formal and informal enablers of
alignment, this chapter concentrates on the enterprise architecture enabler. The functionally integrated
government business processes and information systems that are established within the instantiated
enterprise architecture are examined.
In conclusion, I hope that this book makes its contribution to the evolving discipline of EA, which
is only going to gain importance in organizations. I would like to invite readers to share their comments
about the book in addition to their success stories that may well spawn of future editions of this book.

Dr. Pallab Saha


National University of Singapore
2008
xxv

Acknowledgment

In 2006-07, as a result of a consultancy project for Infocomm Development Authority of Singapore, I


was fortunate to lead the development of an Enterprise Architecture Methodology. The development of
the methodology is complete and has now been designated as a best practice for Singapore Government
agencies to adopt. After the publication of my first book HANDBOOK OF ENTERPRISE SYSTEMS
ARCHITECTURE IN PRACTICE, I received several accolades and feedback that made me think about
the great gap in literature that exists in the discipline of Enterprise Architecture.
The trigger for this book came as a result of my involvement in the development of the Enterprise
Architecture Methodology for the Government of Singapore and the feedback I received after my first
book. This book is a result of efforts and support of a lot of people. Without their advice, assistance
and deep involvement, the book would not have achieved its current form. I would like to express my
gratitude and thank all involved in the collation and review process of this reference book on Enterprise
Architecture.
I would like to start with IGI Global who (again) gave me the opportunity to continue living my
cherished dream. This book allowed me to make significant contributions to an emerging and timely
discipline. A special word of thanks to Julia Mosemann of IGI Global who guided me with numerous
e-mails and to Dr. Mehdi Khosrow-Pour who initially motivated me to think about writing a book.
I would like to specially acknowledge the contribution of the independent reviewers of the chapters,
who readily agreed to review despite their own busy schedules, often working on very tight deadlines
given by me. Herein goes my sincere thanks to:

Frank Armour, George Mason University, USA


Steven Ring, The MITRE Corporation, USA
Dr. Santonu Sarkar, Accenture Technology Labs, India
Dr. Haiping Luo, Government Printing Office, USA
Prof. Jorge Marx Gomez, University of Oldenburg, Germany
Dr. Stephen Kaisler, George Washington University, USA

Representing both industry and academia points of view, they provided excellent review comments
that improved the overall submission quality. An important part of this book are the chapter authors. I
appreciate their excellent contributions and want to thank them for assisting me in the review process.
xxvi

This book would not have become a reality without the support of my mother Shrimati Anima Saha.
I thank Neeta, my wife for her support, patience and love while this book was written. A special word of
love goes to our adorable daughter Anushka (now a toddler and ready to go to the kindergarten). Above
all, I would like to dedicate this book to my father Late Shri Jagatbandhu Saha.

Dr. Pallab Saha


National University of Singapore
2008
Section I
Frameworks and
Methodologies


Chapter I
A Methodology for Government
Transformation with Enterprise
Architecture
Pallab Saha
National University of Singapore, Singapore

Abstract

Countries across the world are pushing their frontiers in governance in the move to information econ-
omy, and governments play a pivotal role in this transformation. These governments employ modern
information and communication technologies to serve the citizens and businesses better. Raising the
effectiveness and quality of government services is not only a matter of leading edge technologies; it
also involves visionary leadership, clear objectives and sound execution mechanism. The role of Enter-
prise Architecture in shaping E-Government programmes cannot be overstated. Within the context of
Singapores e-government initiative, this chapter describes the Methodology for AGency ENTerprise
Architecture (MAGENTA), a rigorous, disciplined and structured methodology for development of
agency enterprise architectures that enables agencies to align to and fully support the governments
transformation objectives and outcomes. Mechanisms for agencies to align to the overall Government
Enterprise Architecture are detailed. The chapter concludes with a set of recommendations for future
enhancements and research.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Methodology for Government Transformation with Enterprise Architecture

INTRODUCTION The chapter then examines the current e-


government maturity models (stage models). The
Since early 1990s, governments across the world purpose of this section is to provide a common
have initiated movements to exploit and utilize frame of reference in assessing e-government
information and communication technologies programmes. This is important as the extent of
(ICT) to improve public sector service delivery. benefits derived through e-government driven
This is widely known as electronic government modernization programmes is directly correlated
(e-government). According to the World Bank to their maturity levels (Government of Western
e-government refers to the use by government Australia, 2004; Baum and Di Maio, 2000).
agencies of information technologies (IT) that The chapter then identifies and elaborates
have the ability to transform relations with the the role of Enterprise Architecture (EA) in ad-
citizens, businesses and other arms of the gov- dressing e-government challenges. The manner
ernment. These technologies can facilitate bet- in which EA supports the modernization pro-
ter delivery of government services to citizens, grammes by facilitating the governments to move
improved interactions with business and industry, towards higher levels of e-government maturity
citizen empowerment through access to informa- is discussed (United States Federal Enterprise
tion and more efficient government management. Architecture Programme Management Office,
The resulting benefits can be less corruption, 2006; Government of British Columbia, 2004). A
increased transparency, greater convenience, general mapping of e-government stage models
revenue growth and cost reduction (The World and EA maturity is also presented to demonstrate
Bank, 2003). the high degree of dependency between the two
The adoption of e-government is usually (Kreizman, Baum and Fraga, 2003).
anchored around government modernization Following the general discussion, the chapter
programmes. The objectives of such modern- continues to elaborate the aforementioned areas
ization programmes are primarily to improve within the context of Singapore. This starts with
the way government services to citizens and a brief description of Singapores e-government
businesses are delivered coupled with enhanced programmes and its evolution over the years
public sector efficiency. These can be summa- (Tan and Gan, 2007). The evolution is mapped to
rized in three words effectiveness, efficiency earlier described e-government maturity models.
and agility (responsiveness). These are achieved The next section elaborates the EA methodology,
through a combination of organizational and IT called the Methodology for AGency ENTerprise
transformation mechanisms in which governance, Architecture (MAGENTA) that has been devel-
management, division of labour, work processes oped for the Singapore Government jointly by the
and competencies are all impacted. National University of Singapore (NUS) and the
This chapter describes the development and Infocomm Development Authority of Singapore
implementation of government transformation (IDA). The contribution of the EA methodology to
programmes pertaining specifically to the role support government transformation is discussed
of Government Enterprise Architecture (GEA) in detail. This is a first-hand description as the
and its role in e-government activities. The author led the development of MAGENTA (Saha,
chapter starts with a discussion of benefits and 2007a). However, any analysis presented in this
challenges that countries around the world face chapter represents the authors own opinion.
in embracing e-government. The role of good Finally the chapter concludes with the iden-
e-government strategies in addressing key chal- tification of some plausible areas for future en-
lenges and deriving maximum benefits are also hancements and research in line with emerging
briefly described. trends.


A Methodology for Government Transformation with Enterprise Architecture

BACKGROUND (Siau and Long, 2005). This approach in categoriz-


ing interactions challenges the traditional notion
Overview of E-Government that e-government is simply more ICT projects /
programmes in government agencies. E-Govern-
E-Government involves use of ICT to facilitate ment, as we will see later, goes far beyond plain
the transformation of government services and automation.
operations aimed at providing an integrated gov- Every e-government programme starts with
ernment. The focus is to provide the right services the development of e-government strategy, pri-
(effectiveness) in an efficient and transparent marily a game-plan of how the government plans
manner that is agile and responsive to citizen and to achieve its e-government goals and objectives.
business needs. The importance and application Having an e-government strategy is fundamental
of e-government can be summarized as: to creating an execution plan. Typical components
of e-government strategy include:
Citizen centric, not bureaucracy centric,
Results oriented, and The scope of e-government programme
Market centric, actively promoting the incorporating key areas to be addressed and
knowledge economy. identification of all stakeholders,
A vision that is easily understood and suc-
According to the Organization for Economic cinctly expresses the governments concepts
Cooperation and Development (OECD) (2003), of and plans for e-government,
e-government enables the dual goals of efficiency Specific goals and objectives that can be
and democracy to be met more cheaply and easily monitored and measured to assess the pro-
than previously envisaged but the new technolo- gramme,
gies go much further that this. They are starting Identification of governance structures and
to redefine the landscape of government by chang- mechanisms to support the programme,
ing the relationships (power and responsibility) A methodology to determine organizational
between players between service providers and readiness,
industry, between the public and private sectors A process for identifying and prioritizing
and between government and citizens by forg- e-government initiatives, and
ing new organizational and economic structures, A business model to sustain the e-govern-
by introducing new processes at work and in the ment programme.
community and above all by opening new op-
portunities as well as posing new challenges, not While the actual benefits of e-government
least the threat of new digital divide. programmes vary based on specific programme
The four major areas of e-government span and objectives, there are several underlying com-
scope include government-to-customer (G2C), monalities. The fundamental benefits of typical
government-to-business (G2B), government-to- e-government programmes include:
government (G2G) and government-to-employee
(G2E) interactions. Among the four areas, G2C Integration and collaboration within and
and G2E involve interactions between government between agencies,
agencies and individuals, while G2G and G2B Participation in government decision mak-
deal with government to organization interac- ing,
tions. In all four categories there is increasing Access to government information and
tendency towards cross enterprise interactions services,


A Methodology for Government Transformation with Enterprise Architecture

Delivery of government services in an ef- Reallocate resources, including organisation


fective and efficient manner, and restructuring,
Responsiveness (agility) in adapting to Modernise legacy ICT systems and infra-
rapidly changing needs. structure,
Protect critical ICT infrastructure from a
Overview of EA business continuity point of view,
Manage declining vendor support for ICT
Enterprise architecture is the organizing logic for systems,
an organizations core business processes and IT Assess proposed technology solutions,
capabilities captured in a set of policies and tech- and
nical choices, to achieve business standardization Manage and prioritise ICT system invest-
and integration requirements of the firms oper- ments.
ating model (Ross, Weill and Robertson, 2006).
Metaphorically, an EA is to an organizations
operations and systems as a set of blueprints is to a STAGES OF AND PROGRESS
building. An organizations EA specifies business TOWARDS E-GOVERNMENT
and technical governance platform on which the
enterprise designs and builds its IT systems for Countries moving towards e-government tend
business competitiveness. Typically, Government to share a number of characteristics. The most
is the largest organization in almost every country visible commonality being their gradual progress
and with size comes complexity. towards increasing e-government maturity. Coun-
EA effectively supports the business, enables tries move through successive maturity levels by
information sharing across departments, divi- first building and then leveraging the execution
sions, agencies, enhances managements ability to foundation. Each stage typically involves learning
deliver effective and timely services, and improves about the application of IT and government process
operational efficiencies in a disciplined manner discipline as strategic capabilities. With the intent
through effective use of ICT. Committing to an of incorporating the transition towards better e-
on-going EA practice within an enterprise enables government several e-government stage models
a business-aligned and technology-adaptive enter- have been proposed (Moon, 2002; Layne and Lee,
prise that is effective, efficient and agile. Business 2001; Hiller and Belanger, 2001; United Nations
planners and IT planners can utilise EA to (Saha, and American Society for Public Administration,
2007b; Ross, Weill and Robertson, 2006): 2001; Deloitte and Touch, 2001; & Baum and Di
Maio, 2000). A full discussion and analysis of each
Provide critical inputs to long term strategic of these e-government stage models in beyond the
planning processes, scope of this chapter, nonetheless Table 1 shows a
Define organizations business operating brief comparison of the currently available models
model and build a foundation for execu- (Siau and Yong, 2005).
tion, For the purposes of this chapter Siau and
Drive and justify business process improve- Yongs five stage model (2005) will be used as
ment programmes, this model represents a synthesis of all the other
Coordinate and consolidate operations in stage models. This synthesis makes it by far the
the organisation, most representative and comprehensive e-govern-
Take advantage of new enabling technolo- ment stage model.
gies,


A Methodology for Government Transformation with Enterprise Architecture

Table 1. Summary of e-government stage models


Model Stages
Web presence
Interaction
Gartners Four Stage Model (2000)
Transaction
Transformation
Emerging
Enhanced
UNs Five Stage Model (2001) Interactive
Transactional
Integrated
Information publishing / dissemination
Official two-way transaction
Multi-purpose portals
Deloitte and Touchs Six Stage
Portal personalization
Model (2001)
Clustering of common services
Full integration and enterprise
transaction
Catalogue
Layne and Lees Four Stage Model Transaction
(2001) Vertical integration
Horizontal integration
Simple information dissemination
(one-way communication)
Request and response (two-way
Hiller and Belangers (2001) and
communication)
Moons (2002) Five Stage Model
Service and financial transaction
Vertical and horizontal integration
Political participation
Web presence
Interaction
Siau and Yongs Five Stage
Transaction
Synthesised Model (2005)
Transformation
E-democracy

All stage models represent e-government moved or are in the process of moving into the
capability and maturity. Though not mandatory, higher echelons of capability and maturity. None-
countries usually traverse the stages in a gradual theless, a survey of e-government literature reveals
and phased manner leveraging on the points several challenges e-government programmes
learned at each stage as they navigate. Stage mod- face. The primary challenges are grouped into:
els are an excellent way to design, implement and (1) information and data, (2) information tech-
evaluate e-government programmes. For instance nology, (3) organizational and managerial, (4)
the Office of E-Government, Department of the legal and regulatory, and (5) institutional and
Premier and Cabinet, Government of Western environmental challenges (Gil-Garcia and Pardo,
Australia uses the Gartners four stage model and 2005). While a full discussion on strategies needed
has linked its e-government goals to the stage to address these challenges is outside the scope
model (Government of Western Australia, 2004). of this chapter, the strong linkages between the
This is depicted in Figure 1. challenges and key imperatives (discussed later)
There are several instances of successful e- are clearly evident.
government programmes where the countries have


A Methodology for Government Transformation with Enterprise Architecture

Figure 1. Achieving goals of e-government (Government of Western Australia, 2004) (reproduced with
permission)

ROLE OF EA IN E-GOVERNMENT benefits of e-government significant investments


CAPABILITY AND MATURITY are necessary but not sufficient. To ensure great-
est value the delivery of information and services
As is evident from Figure 1, the time needed, via the Internet requires a planned, coordinated
system complexity and integration capabilities and unified approach from all stakeholders. It re-
increase with the advancement of e-government quires a collaborated effort between agencies and
stages (Siau and Yong, 2005, Kreizman, Baum, and ministries in order to be successful and advance
Fraga, 2003). Concurrently, the benefits that coun- e-government capability and maturity (Govern-
tries derive out of their e-government programmes ment of British Columbia, 2004). Some of the key
and the commensurate investments needed also imperatives to make this happen include:
increase. As a result there is always an element
of trade-off and balance between e-government Leadership,
investments (time, money, human resources and Enterprise architecture and common stan-
technology) and benefits and achievements (ef- dards,
fectiveness, efficiency and agility). In reality, Improved accessibility and security,
countries face several significant challenges in Protection of privacy and identity (authen-
advancing e-government capabilities and deriv- tication and authorization),
ing its full benefits. In order to achieve the full Cultural change and business transforma-
tion,


A Methodology for Government Transformation with Enterprise Architecture

Table 2. Summary of the role of EA in e-government programmes


Country Brief Description of EA in E-Government Programme
The Australian Government Information Management Office (AGIMO) in the Department of Finance
and Administration owns the e-government programme. It has developed the Australian Government
Architecture (AGA), adapted from the Federal Enterprise Architecture (FEA). The AGA consists of
five reference models (performance, business, data, application and technology), principles, patterns,
standards, Service Oriented Architecture (SOA) repository and service catalogue. According to AGIMO
Australia
the AGA aims to assist in the delivery of more consistent and cohesive service to citizens and support
the more cost-effective delivery of ICT services by government. Aimed at increasing cross-agency
collaboration a set of eleven Cross-Agency Services Architecture Principles have also been defined.
These principles, part of AGA, have been mapped to the e-government Strategy and Service Delivery
Principles.
Canadas e-government programme has been rated as one of the most advanced in the world. It is
characterized by broad-based services, high complexity and very high user acceptance. EA plays a
critical role in its e-government programme. Owned by the Treasury Board of Canada (TBC) and driven
by the Chief Information Office Branch (CIOB), Canada has a Federated Architecture Programme
that started in 2000. The EA consists of a set of guidelines, common reference architectures, standards
and policies. The strong business orientation of the e-government and EA initiatives is made explicit
by having an integrated Business Transformation Enablement Programme (BTEP). Under the BTEP
Canada
individual agencies are provided strategic design and planning methodology, handbook, templates, tools
and service reference patterns. According to TBC BTEPs vision is to facilitate sustainable whole-
of-government client or citizen-centred transformation and to provide the design and alignment tools
that will enable rapid change. The Government of Canada Strategic Reference Model (GSRM) is the
BTEP tool that enables the development of business architecture by providing a common language for
generating models that map how a government enterprise, or programme or process actually works or
could work better.
The relevant programmes here are the Integrated Government (iGOV 2010) and Singapore Government
Enterprise Architecture (SGEA). This chapter does not describe in details the SGEA as this has been very
Singapore
well covered and described in Chapter VII: Enterprise Architecture in the Singapore Government
by Tan Eng Pheng and Gan Wei Boon in the Handbook of Enterprise Systems Architecture in Practice.
Under the Executive Yuan, the Research, Development and Evaluation Commission (RDEC) is a
ministerial agency responsible for e-Government development. The Department of Information
Management under the RDEC is the administrative body for e-government related affairs, including
overall planning, programme and budget review, and coordination among government agencies. The
Taiwan
National Information and Communication Initiative Committee (NICI) plays the role of CIO in the
e-government programme. Architecture initiatives here have focussed on planning, development
of common platforms, systems integration and outsourcing. The key objectives include delivery of
integrated services and cross-government collaboration.
Under the management of the Office of the e-Envoy, UK has established its e-government programme
UK Online. The Government Gateway is a centrally financed infrastructure solution connecting existing
UK systems with different data structures. UK government has also developed and adopted an e-Government
Interoperability Framework (e-GIF) that facilitates collaboration and cooperation amongst various
agencies.
The development of a Federal Enterprise Architecture (FEA) commenced the EA journey within the
Federal Government. Led by the Office of Management and Budget (OMB), the purpose of this effort
is to identify opportunities to simplify processes and unify work across the agencies and within the
lines of business of the Federal government. As part of the FEA, the OMB has developed several
reference models, practice guidance, transition framework, standards, maturity models and policies. The
governance of the whole EA programme is guided by the Clinger-Cohen Act (1996). Additionally the
USA
E-Government Act (2002), Government Paperwork Elimination Act (1996) and Information Technology
Management Reform Act (1996) also provide support to the programme. The FEA has been integrated
to other management practices like IT Portfolio and Investment Management and Capital Planning
developed by the US General Accountability Office (GAO). At the state level, the development of EA is
spearheaded by National Association of State CIOs (NASCIO). NASCIO has developed a EA Toolkit for
the benefit of all state level agencies.


A Methodology for Government Transformation with Enterprise Architecture

Governance, policy and legislative frame- each.Table 3 shows how countries are using EA
work, as a strategy to deal with and address e-govern-
Collation and collaboration. ment challenges. Several other e-government
programmes and the role of EA are presented in
A review of current literature reveals the the remaining chapters of this book.
criticality and centrality of EA to e-government It is amply evident from Table 2 and 3 that
programmes. Several countries across the world EA is critical to e-government and countries
have anchored a significant portion of their e- have recognised this. As discussed in the earlier
government programme around a strong EA section, countries usually traverse the stages
programme. Table 2 presents a summarised and of e-government capability and maturity in a
representative list of countries and their e-govern- gradual and phased manner leveraging on the
ment programmes along with the role EA plays in points learned at each stage as they navigate. In

Table 3. Role of EA in addressing e-government challenges (Adapted and extended from Gil-Garcia &
Pardo, 2005)
Category Challenge Role of EA in Addressing Challenge(s)
Information Architecture (IA) within EA mandates
development and compliance to common data standards.
Usually such standards are captured as data principles /
Information and data quality policies and data definition and usage requirements. Mapping
Information and Data
Dynamic information needs to applications and business processes allows for complete
visibility and control through the data lifecycle. Such practices
take care of issues pertaining to inaccuracies, inconsistencies
and incompleteness of data and derived information.
Usability Technology Architecture (TA) and Application Architecture
Security (AA) require common technical and application standards.
Technological incompatibility Architectural qualities are addressed through non-functional
Technology Technology complexity requirements. Issues pertaining to incompatibility, complexity
Technical skills and and newness are addressed by a set of relevant principles and
experience common standards. Agencies can use TA and AA to steer their
Technology newness technology acquisition initiatives.
Most governments are known to have established a separate
Programme Management Office (PMO) to manage the EA
Project size and scope initiative (e.g. FEA PMO in the United States, AGIMO in
Managers attitude and Australia, IDA in Singapore). Challenges in this category
behaviour are addressed by the PMO. Transition management is a core
Organizational and Stakeholder diversity activity in EA Management and directly addresses some of
Managerial Lack of alignment the challenges. Some of the challenges are also addressed
Multiple and conflicting goals by governance practices. These include standard project
Resistance to change management methodology, senior executive oversight, formal
Turf and conflicts compliance process, business leadership in project teams,
enterprise levels process owners among others (Ross, Weill
and Robertson, 2006).
Restrictive laws and Challenges pertaining to these categories are best addressed
regulations by good architecture governance and management. Every
Legal and Regulatory Annual budget cycles architecture framework (e.g. FEAF, DODAF, and TOGAF)
Intergovernmental places high importance to architecture governance. Designing
relationships architecture governance is a core activity in the development
Privacy concerns of EA. Useful governance practices include infrastructure
Institutional and Autonomy of agencies renewal funding, IT steering committee, structures, centralized
Environmental Policy and political pressures funding for enterprise applications and portfolio management
Environmental context (Ross, Weill and Robertson, 2006).


A Methodology for Government Transformation with Enterprise Architecture

much the same way organizations also graduate 2. Standardized technology architecture: In
through the various stages of EA maturity (Ross, this stage organizations convert some local
Weill and Robertson, 2006). applications into shared infrastructure. The
key driving factor in this stage is technol-
Architecture Maturity Model ogy standardization leading to reduction
of technology diversity. It is typical in this
In 2006, Ross, Weill and Robertson developed a stage for organizations to consolidate and
four stage EA maturity model. These four stages standardize hardware. Organizations also
are briefly described as follows and Table 4 dis- initiate the reduction of software applications
cusses the meaning of the four stages within the and systems performing similar functions.
context of government. This stage is usually characterised by quick
cost savings and ease of adoption.
1. Business silos architecture: A stage where 3. Optimized core architecture: Organiza-
business units and functions within the tions move from local view of data, applica-
organization operate to maximize their in- tions and technology to an enterprise view
dividual business unit and functional needs. in this stage. It involves elimination of data
IT systems and applications developed and redundancies and more disciplined reduc-
deployed in this stage tend to be one-off tion of application and technology overlaps.
localised solutions that cannot integrate By the end of this stage organizations tend
with one another, thus creating fragmented to cleanly differentiate between enterprise
business processes and all associated dif- level data, applications and technology that
ficulties. are shared versus localised data, applications

Table 4. Architecture maturity stages in the context of government


Architecture Maturity Stages Relevance / Application in Government
In this stage the government agencies operate in their own respective silos. Almost all IT
applications and systems are specific to the agency and have rarely any interoperability needs.
There may be standards but only within the agencies, and complete lack of standards between
1. Business Silos them. Most IT investments are justified on the basis of efficiency (cost reductions). As a result
government processes and services tend to be fragmented with no semblance of government
process management. The key point to note here is that usually business functions or departments
within such agencies also tend to operate in silo based models.
In this stage the government agencies are able to define and comply to certain technology
standards pertaining to IT infrastructure. This allows them to reduce technology diversity and
standardize on a few common platforms. Agencies in this stage usually increase access to
2. Standardized Technology shared data by introducing data warehouses, but transaction data is still embedded in individual
applications. From the point of view of deriving direct economic benefits, this stage is by far
the easiest to achieve and positions government entities to eventually move to standard data and
business processes.
Building on the foundations provided by common technology standards in the previous stage,
agencies are now able to transition from a local view of data and applications to an enterprise
3. Optimised Core view. This is made possible by having common data standards to support cross-agency business
processes. Further, common data, applications and business processes allow government agencies
to eliminate data and functional overlaps and redundancies.
This stage takes benefit of the earlier two stages. By this time government agencies adhere to
standardised technology, data, applications and business processes. The underlying common
4. Business Modularity elements of the architecture are well-entrenched allowing the identification and packaging of
reusable modules. The focus here is for agencies to be more flexible and adaptable to changing
business needs by composing new solutions using available services or modules.


A Methodology for Government Transformation with Enterprise Architecture

and technology that are suited to the needs Evolution of E-Government


of specific business units and functions. Programme
4. Business modularity architecture: The
last and final stage of architecture maturity E-government in Singapore is positioned and
is when organizations are adept at identi- perceived as a means to reinvent the Government.
fying their business processes (including Its core vision includes delighting customers and
their operating models). The core business connecting citizens through the use of ICT. Over
processes are then used to identify reus- its 25 years of e-government journey, Singapore
able modules. The idea of reusability isnt has put in place several plans (Tan and Gan, 2007).
limited to business processes alone, but These successive plans have allowed Singapore
extends into reusable data, application and to gradually build and enhance its e-government
technology capabilities. Often organizations programme. As seen later, a series of consecutive
in this stage offer such reusable elements plans is a key enabler for it to progressively move
as services that can be leveraged to build towards higher levels of e-government capability
newer and customised solutions in tune with and maturity. Now it is widely acknowledged as
changing business needs. The key objective having an advanced e-government (Infocomm
of this stage is to provide organizations with Development Authority of Singapore, 2005). Table
agility and flexibility. 6 describes the various e-government plans that
have been in existence since 1980, their respec-
Other notable EA maturity model has been tive goals and objectives (Tan and Gan, 2007) and
defined and applied as part of the Federal En- mapping to e-government stage model.
terprise Architecture Framework (United States Besides the plans, another key factor contrib-
Federal Enterprise Architecture Programme uting to the success of Singapores e-government
Management Office, 2006). Table 5 maps the programme is its leadership. Called the iGOV
e-government maturity stages to EA maturity Council, it represents the highest approving and
stages. The mapping identifies the most relevant decision making committee. The iGOV Council
architectural maturity needed in order to reach a is chaired by the Permanent Secretary of Finance.
specific e-government maturity level as a causal Under the governance structure, the Ministry of
relationship. Finance (MOF) is the custodian of nearly all ICT
infrastructure, services and policies within the
public sector (Infocomm Development Authority
SINGAPORE E-GOVERNMENT of Singapore, 2005).
PROGRAMME

Introduction OVERVIEW OF SINGAPORE


GOVERNMENT ENTERPRISE
Singapore is an island republic measuring about ARCHITECTURE
700 sq. km. in area. It has a population of 4.7
million, resulting in a population density of 6700 EA has always been a core enabler in Singapores
persons per sq. km. About 75% of the households e-government programme. The CSCP provided
own personal computers and 65% of the house- the government with the basic infrastructure
holds have access to the Internet. The household needed for e-government in addition to some
broadband penetration is more than 50% and government systems. There was the realization of
mobile phone penetration close to 100%.

10
A Methodology for Government Transformation with Enterprise Architecture

Table 5. Mapping architecture maturity to e-government maturity stages


Architecture Maturity
Stages

Standardised Technology

Business Modularity
E-Government
Explanation of the Mapping*

Optimized Core
Maturity Stages

Business Silos

In this stage agencies typically post simple, limited and static in-
formation through their websites. With information dissemination
1. Web presence + as the key focus area, the communication is primarily one-way.
This is the point where almost all agencies still operate in their
silos and the characteristics described in Figure 5 are evident.
This stage provides for simple interaction between agencies and
their users. The communication here is two-way and there are
2. Interaction + +
a few common technology standards and applications, though
within the agency rather than at a cross-agency level.
This phase allows users to conduct complete online transactions
(including e-commerce and e-business transactions). This neces-
sitates some level of data standardization to support cross-agency
3. Transaction ++ +
transactions. Nonetheless, the primary objective being common
technology standards across the agencies, supported by some
degree of common data and applications.
Here the focus is to shift from mere process automation to
integration across government agencies. Integration involves
both vertical (governments in different levels) and horizontal
4. Transformation + ++ (different departments and locations). Here citizens, businesses
and governments are presented a single unified and harmonized
face. This calls for high degree of collaboration and cooperation
amongst the agencies.
This stage requires more of a political transformation and does
5. E-democracy Not Applicable
not directly map to any architecture maturity stage.

1. Mapping means the architectural maturity needed as enabler to achieve a specific e-government maturity level.
2. ++ represents strong mapping and + represents weak mapping.
3. Only the relevant stages are mapped. It is assumed that the earlier stages are already achieved.

the need for well designed, reliable and scalable ture (SWTA). With individual agencies already
IT infrastructure. To take full benefit of eGAP having in place the basic IT infrastructure, SWTA
I the Singapore public sector needed a coherent was aimed to control technical diversity through
collection of policies, standards and guidelines to the use of common systems and platforms for the
steer government agencies in the design, acquisi- deployment of e-services (Tan and Gan, 2007).
tion, deployment and management of ICT (Tan The underlying premise was that common technol-
and Gan, 2007). ogy could propel interoperability among agencies
The first government-wide architecture pro- and encourage collaboration. SWTA consists of
gramme was the service-wide technical architec- nine technical domains for which policies, stan-

11
A Methodology for Government Transformation with Enterprise Architecture

Table 6. Progression of Singapores e-government journey


E-Government Plan Brief Description
This represents the first formal plan in the e-government journey. It marked the
initiation of computerization in the Singapore public sector. The focus was to build
the basic IT infrastructure, improve internal operational efficiencies primarily
through automation and elimination of paperwork. Over the two decades of its
1. Civil Service Computerization
existence, the government evolved from using IT as a tool to improve productivity
Programme (CSCP) (1980
to leveraging the Internet to provide 24x7 services. Additionally, the government
1999)
systems were also extended to the private sector for better synergies (e.g. TradeNet,
MediNet and LawNet) (Infocomm Development Authority of Singapore, 2005).
CSCP maps to Web Presence and some degree of Interaction stages in the e-
government maturity stage model.
In early 1990s, the need was felt to consolidate the computing resources in the form
of shared data centre and a civil services network. This required a paradigm shift
in the way government services were delivered and thus eGAP I was launched in
June 2000. The vision to be a leading e-government to better serve Singapore
2. E-Government Action Plan I
and Singaporeans in the new knowledge based economy (Infocomm Development
(eGAP I) (1999 2003)
Authority of Singapore, 2005). Aimed at moving citizens, businesses, public
officers and the government towards the e-government vision, five strategic thrusts
were defined (Tan and Gan, 2007).
eGAP I maps to Interaction stage in the e-government maturity stage model.
The focus of eGAP II was to achieve three distinct outcomes of delighted
customers, connected citizens and a networked government by building on the
efforts and outcomes of eGAP I. eGAP II was focussed to deliver accessible,
3. E-Government Action Plan II integrated and value adding public services to customers (Infocomm Development
(eGAP II) (2003 2006) Authority of Singapore, 2005). eGAP II delivered a networked government through
common infrastructure, information management and technical standards, fostering
inter-agency collaborations (Tan and Gan, 2007).
eGAP II maps to Transaction stage in the e-government maturity stage model.
iGOV 2010 is the currently active plan and is designed to guide agencies in reaping
synergies and exploring new opportunities as an integrated government. This
plan has four strategic thrusts increasing the reach and richness of e-services,
4. Integrated Government 2010 increasing citizens mindshare in e-engagement, enhancing capacity and synergy
(iGOV 2010) (2006 2010) in the government and enhancing national competitive advantage (Infocomm
Development Authority of Singapore, 2005).
iGOV 2010 aims to target Transformation stage in the e-government maturity stage
model.

dards and guidelines have been defined (Tan and move beyond technology and to incorporate
Gan, 2007). data, applications and most importantly business
Widespread adoption of SWTA allowed agen- processes (Tan and Gan, 2007). This is when
cies transition to Standardised Technology level the development of the SGEA was initiated by
in the EA maturity stages (see Table 4). This the Government. Developed by the Ministry of
was in line with the expectation as at that point Finance (MOF) and IDA, SGEA consists of four
eGAP I was the active plan and the key goal was domain architectures, which are manifested in the
to realize Interaction level in the e-government form of structured reference models. These are the
stages (see Tables 5 and 6). Business Reference Model (BRM), Data Refer-
The next obvious move was to realize the ence Model (DRM), Technical Reference Model
Transaction and Transformation levels. There (TRM) and Solutions Reference Model (SRM).
was a recognition that such a move needed an A detailed description of the SGEA is provided
expansion in the scope of the architecture to in Chapter VII: Enterprise Architecture in the

12
A Methodology for Government Transformation with Enterprise Architecture

Singapore Government by Tan Eng Pheng and models there was a realization of the need to have
Gan Wei Boon in the Handbook of Enterprise a structured and well defined methodology for
Systems Architecture in Practice. development of EA. MAGENTA is a multi-phase,
Within the current e-government plan, iGOV iterative and non-linear EA methodology. It is in-
2010, the SGEA is designed to directly support tended to provide all agencies a holistic approach
the enhancing capacity and synergy in the to EA development. It establishes a common
government strategic thrust. This kind of linkage mechanism to manifest an integrated architecture.
between SGEA and iGOV 2010 clearly demon- The need for the development of MAGENTA
strates the criticality of EA for the success of the stemmed from the following reasons:
ensuing e-government programme in Singapore.
Figure 2 shows the chronological evolution and Integration to SGEA and iGOV 2010,
progress of Singapores e-government and EA EA as a discipline is an evolving field,
programmes. resulting in the current body of knowledge
being inconsistent (lack of consensus on EA
definition, terminologies, goals, approaches,
METHODOLOGY FOR AGENCY outputs, outcomes etc.) and incomplete,
ENTERPRISE ARCHITECTURE and
Development in other countries, as briefly
Effective EA programmes are methodology based described in Table 2.
and process-driven. A methodology prescribes
what must be done, when and how the steps link MAGENTA provides a rigorous, disciplined
to one another (Bittler & Kreizman, 2005). EA is and structured approach that is tool and vendor
a process discipline. When institutionalised, EA agnostic. This methodology is intended to guide
leads to execution of an organisations operating agencies develop their own EA. MAGENTA al-
model and tighter alignment to business strategy. lows agencies to effectively transform the business,
With the development of the SGEA reference enable information sharing across departments,

Figure 2. Progress of Singapores e-government and EA programmes

13
A Methodology for Government Transformation with Enterprise Architecture

divisions and agencies, enhances managements Steps: Activities performed in the phase
ability to deliver effective and timely services and shown both in graphical and detailed tabular
improve operational efficiencies in a disciplined form. Each step is numbered for easy refer-
manner through the effective use of Information ence. Each step makes reference to a Phase
and Communication Technologies (ICT). The Tool and Phase Example as appropriate.
methodology has the following objectives: Every step also identifies the role responsible
for performing the step.
To provide step-by-step guidance to develop Phase tools: Templates, guidelines and
and implement an agency-level EA. pointers that are useful in executing a specific
To focus agency efforts on the development step of the phase.
and management of their EA, rather than on Phase examples: Illustrations of outputs
framework related issues. that are produced as a result of executing
To create a common reference point for all a specific step in the phase. The examples
architectural deliverables in terms of scope, are intended to illustrate the outcome of
and level of detail. executing specific step(s).
A common unified approach to EA develop-
ment and improve organisation EA maturity At the core of MAGENTA is government
and capability transformation and it is designed to address the
key questions agencies typically face. These
MAGENTA is a multi-phase methodology questions pertain to and include:
containing extensive figures, charts, tools, tem-
plates, examples, practitioner guidance and FAQs. Business Performance
The graphical view of MAGENTA is depicted in What are our core business processes
Figure 3. MAGENTA takes a practical approach that are critical to the success of the
by directing focus on core business processes of strategy?
an agency. Business processes that are critical to Where can we achieve dramatic im-
the success of the agency by enabling strategic provements?
initiatives are identified as core business pro- What are the key areas where we need
cesses. Each phase of MAGENTA is structured to collaborate with other agencies in
in the following manner: the Government?
What are the key information require-
MAGENTA map: Graphical view of MA- ments to support the core business
GENTA identifying the phase that is being processes?
described. Investment Performance
Objective: The key intent of executing the Which of the core business processes
phase. must receive our IT investments?
Inputs: Items that are required to execute How do we categorise our IT invest-
the phase. Each input contains a reference ments into IT-enabled transforma-
to the step(s) where it is utilised. tion?
Outputs: Items that are produced as a result IT Performance
of executing the phase. Each output contains Which business processes have no IT
reference to the step(s) that are utilised to support and where are we overspend-
produce the specific output. ing?

14
A Methodology for Government Transformation with Enterprise Architecture

Where can we take benefit of common the to-be architecture. A brief overview of the
data, applications and technology? nine phases is provided as follows. The phases
Where do we have redundancies and are numbered for identification purposes and do
overlaps? not represent strict adoption sequence.
What metrics do we need to assess the
programme effectiveness? Phase 1 Establish Enterprise Archi-
tecture Programme: This phase covers
As is evident from Figure 3, MAGENTA takes the activities that agencies must perform to
a two-dimensional approach to EA development. prepare for an impending EA programme.
The vertical dimension captures the various groups Agencies that have just started out on their
of stakeholders separated as tracks. The focus of EA programmes may also find this phase
this dimension is to differentiate the concerns of useful as a checklist of items to be done and
different stakeholders and associate them to the evaluate their progress.
relevant EA development activities. On the other Phase 2 Scan and Analyze Current
hand the horizontal dimension depicts the devel- Business State: This phase is targeted at
opmental progress of EA, supporting both as-is the agencys core business processes from
architectures and their analyses as well as to-be an end-to-end perspective. This phase un-
architectures and their analyses to derive future derstands the current business goals and
architectural initiatives enabling the transition to initiatives with intent to clarify if the core

Figure 3. MAGENTA graphical view

15
A Methodology for Government Transformation with Enterprise Architecture

business processes are areas of focus for the to support the target business architecture.
agencies. The development of the target IT architecture
Phase 3 Understand Current IT also looks to address the gaps identified in
Architecture: This phase envelops the Analyse Gaps and Derive Opportunities
agencys data, application and technol- phase. While in structure this is similar to
ogy infrastructure. By understanding the Understand Current IT Architecture
overall business processes and governing phase, the focus here is the target point of
business rules adopted by the agencies, the view.
information architecture (IA) captures the Phase 7 Design Architecture Gover-
information of the enterprise including data nance and Management: This is to ensure
sharing and exchange. It also describes the that the architecture programme is success-
specification, development and adoption of fully sustained within the agencies and meets
technologies to support the business require- overall IT governance expectations. As part
ments and agency goals. Finally, the phase of this phase, EA development is seamlessly
also describes approaches and mechanisms integrated to investment management and
for designing solution requirements, speci- system development lifecycle (Armour et.
fying architectural views and viewpoints, al., 2007).
ascertaining system qualities and guiding Phase 8 Document Enterprise Archi-
the assembly of the solution elements that tecture Blueprint & Transition Plan: This
will meet end user needs. phase provides an outline of the documen-
Phase 4 Analyze Gaps and Derive Op- tation needed to capture the agencys EA
portunities: This phase is a compilation of with the intent of describing it thoroughly
the gaps and findings pertaining to business, and clearly. Essential topics in this phase
information, application and technology include guidance for good documentation,
domains and the interdependencies between uses of the agency EA blueprint, structuring
them. The objective of this phase is to ar- and organising the documentation.
ticulate the target EA to address the gaps. Phase 9 Maintain Enterprise Archi-
Phase 5 Develop Target Business Ar- tecture: This provides the activities that
chitecture: This is intended at the agencys are needed to continue and complete the
core business processes and goals from an logical lifecycle of the EA through a series
end-to-end perspective (which may include of feedback mechanisms to keep the agency
cross agency integration). This phase is also EA pertinent.
useful for the purpose of maintaining overall
business-IT alignment of the EA. While In traversing through the various steps in phas-
Scan and Analyse Current Business State es, several artifacts are developed that constitute
phase broadly sets the agencys current busi- the agencys EA. Creation of the EA Blueprint
ness state, this prioritises the core business is done concurrently along with other phases as
processes from a target architecture point the individual artifacts (i.e. the phase outputs) get
of view to address the identified gaps in developed. The complete blueprint based on the
Analyse Gaps and Derive Opportunities principles of IEEE 1471-2000, is a compilation
phase. of artifacts (typically the phase outputs) that are
Phase 6 Develop Target IT Architec- combined together as a single coherent blueprint
ture: This phase aims to develop the data, ap- providing the following distinct advantages:
plication and technical architecture required

16
A Methodology for Government Transformation with Enterprise Architecture

In the absence of a single unified blueprint, and supports the federated governance structure
individual phase outputs may be viewed as at the whole-of-government level, thereby enhanc-
isolated artifacts, ing the overall effectiveness of EA programmes.
The single unified blueprint provides a In adopting MAGENTA, agencies are encour-
central anchor to appropriately reference aged to select the appropriate EA design model.
the relevant phase outputs, Each design model represents the intersection
It is easier to distribute and communicate the of an agencys EA Value Proposition and EA
EA across the agency, fostering collabora- Emphasis.
tion, and These two dimensions define four quad-
It is simpler to maintain the EA throughout rants, each representing an EA design model:
its lifecycle. Technology Standardisation Model, Business
Standardisation Model, Technology Differ-
MAGENTA does not assume a one-size-fits- entiation Model and Business Differentiation
all approach to EA development. Though the Model. The design models, influenced by design
methodology in itself is holistic and generic to priorities of the IT department (Ross, 2006), that
encourage widespread adoption, agencies have typically apply to agencies (equally applicable to
the discretion to design and tailor their EA pro- organisations at large) are shown in Figure 4. The
grammes to suit their business and technology typical distinguishing characteristics of each of
objectives. This kind of flexibility to programme the quadrants are shown in the figure. The choice
design encourages autonomy at the agency-level of an EA design model is a critical decision for an

Figure 4. Enterprise architecture design models in MAGENTA

17
A Methodology for Government Transformation with Enterprise Architecture

agency (organisation). The design model decision respective strategies that set the overall direction.
(or the lack of it) has a profound impact on the These strategies are then executed using formal
rest of the EA programme. Each model places annual and multi-year plans linked to the budget
different demands on the agencys EA programme cycle. This often leads to silo or stovepipe
with respect to its objectives, metrics, scope, functions within and between the agencies. It
intensity, resources, senior management involve- characterises the lowest level of architecture
ment, outcomes and benefits just to name a few. maturity. It is clearly evident that this approach
There have been instances, where agencies have is not suitable to take full benefit of common
included transitioning to a new design model as standards and seek collaboration opportunities
part of their overall EA programme migration with other government agencies (see Table 4).
plan. Such transitions are transformational as it This is an important factor, as collaboration and
entails new way of thinking and behaving, and sharing is a critical success factor in furthering
are disruptive in nature. Government transformation.
A plethora of practices and programmes often
Integrated Enterprise Lifecycle leads to confusion and resentment to anything
Approach with MAGENTA new, EA included. Typical response in such sce-
narios includes furious efforts to measure and
EA in general provides significant business ben- demonstrate the value of EA programmes. It is
efits to all organisations. As a result of years of sus- also typical for EA programmes not to be tightly
tained efforts in adopting IT, government agencies coupled to other relevant management practices.
in developed countries demonstrate high degree The positioning of and linkages to and from EA
of maturity in practices like strategic planning, vis--vis other relevant upstream and downstream
IT strategic planning, technology standardization management practices were finalized following
and data consolidation, enterprise integration, IT careful analyses of current and future practices.
programme management, IT service management, MAGENTA is inherently designed as a strate-
IT portfolio management and system develop- gic alignment tool that allows agencies to realize
ment lifecycle (SDLC) with various degrees of the Integrated Enterprise Lifecycle. Figure 6 shows
scope and intensity. Figure 5 depicts the current the approach taken by MAGENTA for positioning
approach adopted in most agencies where key EA within existing management practices. This
business functions and departments have their approach allows agencies to maintain linkages

Figure 5. Current IT / IS planning based approach

18
A Methodology for Government Transformation with Enterprise Architecture

Figure 6. EA based approach with MAGENTA

between their respective functional strategies and Integration leads to higher degree of manage-
plans (depicted as dotted line arrows in Figure 6). ment attention and as a consequence greater
However as an enhancement, the EA layer between sustainability of the EA programme, and
corporate strategy and implementation facilitates Facilitation of participation by individual
common standards, requirements, principles and agencies and contribution to overall GEA
effective governance and control. It is intended to is critical to the success of Government
allow agencies to move towards shallower silos transformation.
and seek greater collaboration opportunities both
within and between agencies. This is further Adopting MAGENTA: A Generic EA
described later and portrayed in Figure 7. Methodology
Internally within an agency, linking EA to
other management practices not only ensures Moving forward MAGENTA continues to be
its continuity and sustainability, but also tighter referred by government agencies and adopted as
vertical and horizontal alignment (Armour et. al, needed. MAGENTA has been piloted in one of
2007). Figure 7 is an expanded view of Figure 6, the government agencies. To provide a summa-
and shows the Integrated Enterprise Lifecycle rized view of the agencys EA, Figure 8 shows
approach realizable with MAGENTA. For the the template of a one-page schematic.
Government agencies it is critical to clarify the The template is meant for agencies use to
positioning of EA vis--vis other management derive their respective agency EA schematic.
practices like IT Planning, IT Portfolio Manage- The EA schematic is intended to portray the
ment because: eventual target EA for an agency developing its
EA using MAGENTA and is an effective man-
Almost all EA programmes are primarily agement practice in high maturity organizations
driven by the IT / IS department, (Ross, Weill and Robertson, 2006). The template
EA is often equated to IT Architecture and is organized to provide an easy-to-use tool that
hence relegated as yet another technology can be populated and usage scenarios built by
initiative, answering a few simple questions. Table 7 pro-

19
A Methodology for Government Transformation with Enterprise Architecture

Figure 7. Integrated enterprise lifecycle with MAGENTA

vides the explanation of the layers in the generic This is accomplished through building a
EA schematic (shown in Figure 8). Table 7 is also few critical business scenarios, where such
used to craft the usage scenarios. scenarios do not represent all potential paths
The objectives of the agency specific EA and branches through the generic EA sche-
schematic derived from the generic EA schematic matic, but simply a subset of LOBs, business
(Figure 8) and the scenarios (Table 7) include: functions, data entities, service components
and enterprise systems and applications that
Portrayal of EA core view that can be linked get utilized to realize the scenario(s). The
to subsequent levels, scenarios allow various stakeholders with
Support for agencys target operating model varied responsibilities and organizational
and modular architecture maturity level, roles in the agency to find themselves
Depiction of relationships between domain within the EA. This leads to better under-
architectures (business, information, solu- standing of the influence and impact these
tion and technology architectures) and dif- stakeholders have on the EA and their role
ferent views as shown in Figure 9, in it.
Provision of clear line of sight for various Portrayal of architectural elements (business
usage scenarios as shown in Figure 10. processes, data entities, application services,

20
A Methodology for Government Transformation with Enterprise Architecture

Figure 8. Generic agency EA Schematic for developing target enterprise architecture

Table 7. Layers of the generic EA schematic / scenario summary template


Brief Description
Customer Identifies the requesting party desiring the agency service(s).
Access Channel Identifies the access channel that the requesting party uses to request the service(s).
Identifies which LOB the requested service belongs to or which LOB provides the
Line of Business (LOB)
service.
Identifies the business function(s) that support the agency LOB which delivers the
Business Function
business service being requested.
Identifies the data entities that the business functions (and the underlying business
Common Data
processes) utilize to support the fulfillment of the requested service.
Identifies the service components required to provide the necessary functionalities and
Common Services / Applications
capabilities needed to deliver the requested business service.
Identifies the systems / applications required to provide the necessary functionalities
Enterprise Systems
and capabilities needed to deliver the requested business service.

technical services) that can contribute to the A detailed discussion of the agency case study
Government Reference Models as shown in where MAGENTA was piloted is outside the
Figure 11. This aspect is further elaborated scope of this chapter. However the agencys EA
and depicted in Figure 12. addressed several strategic questions like how

21
A Methodology for Government Transformation with Enterprise Architecture

do core business processes impact the agencys GOVERNMENT TRANSFORMATION


strategic initiatives, are there common activities WITH EA (AND MAGENTA)
in this process that can be shared, which parts
of the business should receive IT investments, Governments at all levels are being challenged
what is the current level of application support, to reposition, reinvent and realign themselves in
what could be some reengineering opportunities, the light of an increasing demand for a more cost-
what are the associated conceptual data and effective, citizen centric and networked govern-
application models, what are the information ment. It has been discussed earlier in this chapter,
needs for the processes, what are the potential the criticality of EA in furthering e-government
integration needs, what governance mechanisms programmes. Examples of EA methodologies
must be adopted, and how should the agency make specifically used in the Government sector in-
architecture governance work. As a result of a clude: MITRES Activity Based Methodology,
forward looking senior management in adopting FEA Practice Guidance, NASCIOs EA Toolkit
MAGENTA and taking concrete decisions in and MAGENTA. Though individual government
furthering EA development, the specific agency agencies are encouraged to develop their respec-
in question is now viewed as a showcase agency tive EA, it is imperative that such agencies link
for other agencies to learn from and emulate. their EA to their overall GEA. This ensures:

Continued alignment between overall gov-


ernment goals and objectives and individual

Figure 9. Multiple views with the EA schematic

22
A Methodology for Government Transformation with Enterprise Architecture

Figure 10. Line of sight with the EA schematic

Figure 11. Linkage to government-wide reference models with the EA schematic

23
A Methodology for Government Transformation with Enterprise Architecture

Figure 12. Linking agency EA to GEA for government-wide services

Table 8. Support for government transformation trends by EA


Government Transformation Trend Support Provided by EA (examples of specific mechanisms and tools)
Viewing the government in a holistic manner and as a single federated entity
instead of piecemeal agency or departmental view.
Focussing on delivering core government services in an efficient manner
1 Changing the rules
with an outcome oriented approach.
Establishing government-wide policies and standards, but also allowing
autonomy to individual agencies and departments.
Identifying and constantly assessing the performance of Government
services in terms of lines of businesses, functions and business processes and
constantly renewing them as needed.
2 Using performance management
Evaluating the performance of the EA programme through a set of
assessment criteria and linking it to the budgetary process.
Linking EA up to organizational goals, strategies and measures.
Establishing shared services center to cater to common administrative
Providing competition, choice and
3 procedures to take benefit of economies of scale and efficiency returns.
incentives
Instituting mechanisms to support public-private partnerships.

Measuring and improving government responsiveness by having clarity on


4 Performing on demand underlying business processes, data, applications, and technologies.
Focussing on core government functions and business processes.

Providing updated government information and services in a seamless


5 Engaging citizens manner.
Viewing citizens and businesses as customers of government services.
Furthering collaboration and cooperation between agencies and departments
through common and shared processes, data, applications and technologies.
6 Using networks and partnerships Reorganizing government services in terms of lines of businesses and
business functions (irrespective of agency performing the function) to build
a new service delivery system.

24
A Methodology for Government Transformation with Enterprise Architecture

agency goals and objectives (some degree The essence of these imperatives is to drive
of vertical integration) home the point that for successful and effective e-
Continued alignment and ongoing collabora- government, Government leaders must be deeply
tion among the various agencies (horizontal engaged in ICT and related issues. In an era where
integration) countries are focussing on transformation to
Agency participation and contribution to the information and knowledge society this is a criti-
GEA (enabling the federated governance cal success factor. A review of current literature
structure) clearly reveals that EA plays a very critical role in
fulfilling the imperatives. Research conducted at
In 2006, the IBM Center for The Business the John. F. Kennedy School of Government and
of Government published a report discussing the MIT Sloan Centre for Information Systems
the six trends of transforming government Research further corroborate this point.
(Abramson, Breul and Kamensky, 2006). Table MAGENTA is now available to agencies for
8 delineates how EA (and MAGENTA) supports reference and adoption through the government
these trends. intranet. Development and availability of MA-
GENTA for agencies to build their own EA to
drive the e-government programme is the first
FUTURE ENHANCEMENTS AND step. Plausible areas for future enhancements and
RESEARCH research could include:

The full potential of e-government can only be Governance and regulation: In the United
achieved by complete integration of government States, the Clinger-Cohen Act of 1996 was
services across different government agencies cited as one of the reasons for Government
and different levels of government. In 2000, the agencies to develop their EA. While laws
Harvard Policy Group at the John. F. Kennedy and regulations can be useful to initiate the
School of Government published the eight impera- development, it remains to be seen if they
tives in ICT for Government leaders, which are: are really useful in sustaining the interest.
It has been observed that agencies at times
1. Focus on how IT can reshape work and develop their EA just to meet regulatory
public sector strategies, requirements. This defeats the very purpose
2. Use IT for strategic innovation, not just for of developing EA. Thus research on effec-
tactical automation, tiveness of regulation driven EA adoption
3. Use best practices in implementing IT initia- is clearly an area to be worked on.
tives, IT engagement: Leadership is an essential
4. Improve budgeting and financing for promis- ingredient for success in EA and e-govern-
ing IT initiatives, ment (Ross, Weill and Robertson, 2006)
5. Protect privacy and security, and this is amply evident from the eight
6. Form IT related partnerships to stimulate imperatives discussed earlier. Leadership
economic development, includes Legislators, Governors, Budget
7. Use IT to promote equal opportunities and Directors, Agency Heads and CIOs. For
healthy communities, and this to happen agencies need a formal IT
8. Prepare for digital democracy. engagement model, more so because tra-
ditionally e-government is viewed as an IT
initiative that is delegated to the CIO and

25
A Methodology for Government Transformation with Enterprise Architecture

the IT Department. The engagement model pecially business modularity) positively


ensures continuous involvement of the top influences the movement to higher levels
management leaders in EA, thus guaran- of e-government. SOA facilitates realizing
teeing management attention and interest. business modularity and deriving its full
Development of IT engagement framework benefits (Ross, Weill and Robertson, 2006).
specific to e-government is an area for future Enhancing MAGENTA to incorporate ele-
enhancement. ments of SOA, including development of a
Maturity model: This would allow agencies Service Oriented Reference Architecture
to be assessed and benchmarked. Properly and Methodology would allow individual
used, such models have the potential to agencies to adopt and take benefit of SOA.
identify shortcomings in agency EA devel- A rising interest in SOA has already been
opment and actually spur the development observed among Singapore agencies.
and effectiveness of EA. The suggestion is
to have a more holistic perspective where
EA is viewed not just as an engineering CONCLUSION
activity but also as an investment activity
in which case real options approach can Leading countries in e-government tend to share
be adopted (Saha, 2006). A related area of a number of underlying characteristics. As with
research is to explore and understand the other leading countries, e-government in Singa-
interplay between EA Maturity and EA pore is about good governance. Good governance
Design Models. practices include: legitimacy, rule of law, transpar-
Outsourcing: Agencies in the Government ency, integrity, efficiency, coherence, adaptability
outsource IT and IT enabled services for rea- to new challenges, participation and engagement.
sons including lower costs, variable capacity, As agencies realise the need to move beyond mere
risk mitigation, process improvement and operational efficiencies through automation to
opportunity to focus on core capabilities. transformation of the business of government,
The consolidation of common finance and EA comes to the forefront as an enabling mecha-
human resource services to public agen- nism. Over the years Singapores e-government
cies under VITAL.org (Centre for Shared has matured and won several accolades from
Services) is an example of outsourcing in United Nations, Accenture, Harvard University,
the Singapore Government. Of the three Brown University, and World Economic Forum
mutually exclusive outsourcing models, among others. iGOV 2010, its current five-year
i.e. strategic partnership, co-sourcing and e-government plan, is poised to take it to the next
transaction outsourcing (Ross, Weill and level. Through an analysis of current literature
Robertson, 2006), VITAL.org falls into the on e-government stage models and EA maturity
transaction outsourcing category vis--vis models, the chapter demonstrated close linkages
other public agencies. Further research fol- between the two. Acknowledging the role played
lowed by enhancement of MAGENTA to by EA to the success of e-government programme
incorporate architectural implications of the Singapore government commissioned the de-
outsourcing (specifically transaction out- velopment of an EA methodology, MAGENTA,
sourcing model) would be very critical. for adoption by individual agencies in building
Service oriented architecture: As seen their respective EA. Nonetheless, with minor
in Tables 5 and 6, higher levels of EA (es- adaptations MAGENTA is generic enough to

26
A Methodology for Government Transformation with Enterprise Architecture

be adopted by agencies in other governments P. (Ed.). Handbook of Enterprise Systems Ar-


and also organizations outside of the govern- chitecture in Practice. Hershey, PA: IGI Global
ment sector. Information Science Reference.
MAGENTA has been designed to facilitate
Baum, C., & Di Maio, A. (2000). Gartners Four
IT-enabled business transformation and is struc-
Phases of E-Government Model. Gartner Group
tured to amalgamate with IT Governance to sup-
Research Note. Retrieved June 15, 2007, from
port investment planning. Tool, technology and
http://aln.hha.dk/IFI/Hdi/2001/ITstrat/Down-
framework independent, MAGENTA provides
load/Gartner_eGovernment.pdf.
agencies complete line of sight. However this is not
the end. It marks the achievement of a significant Bittler, R.S., & Kreizman, G. (2005). Gartner
milestone, but as is well known EA is a verb, Enterprise Architecture Process: Evolution 2005.
not a noun, hence evolution and enhancement Gartner Group Research Note, G00130849. Re-
of MAGENTA must continue as more agencies trieved July 27, 2007, from http://www.gartner.
start their EA journey. com/research/spotlight/asset_50080.jsp.
Deloitte and Touch (2001). The Citizen as Cus-
tomer. CMA Management, 74(10), 58.
ACKNOWLEDGMENT
Gil-Garcia, J.R., & Pardo, T.A. (2005). E-Govern-
The author would like to acknowledge the ment success factors: mapping practical tools to
MOF and IDA who funded the development of theoretical foundations. Government Information
MAGENTA and Intellectual Property Office of Quarterly, 22(2), 187-216.
Singapore (IPOS) for guidance, assistance and
Government of British Columbia (2004). e-Gov-
contributions during the development.
ernment Plan. Office of the Chief Information
The author gratefully acknowledges the
Officer, Ministry of Management Services.
significant contributions by Chung Mui Ken
Retrieved June 18, 2007, from www.cio.gov.
[IDA], Seleana Ng [IDA], Gan Wei Boon [IDA],
bc.ca/ebc/egovplan20041215.pdf.
Alvin Kuah [IDA], Grace Tin [IDA], David Lam
[IDA] and Tan Eng Tsze [NUS] that made the Government of Western Australia (2004). e-Gov-
MAGENTA possible. ernment Strategy for the Western Australian Pub-
lic Sector. Office of e-Government, Department
of the Premier and Cabinet. Retrieved June 18,
REFERENCES 2007, from http://www.egov.dpc.wa.gov.au/docu-
ments/e-government_strategy.doc.
Abramson, M.A., Breul, J.D., & Kamensky, J.M.
Harvard Policy Group on Network Enabled Ser-
(2006). Six Trends Transforming Government.
vices and Government (2000). Eight Imperatives
IBM Center for The Business of Government
for Leaders in a Networked World: Guidelines
Report. Retrieved September 7, 2007, from
for the 2000 Election and Beyond, John F. Ken-
http://www.businessofgovernment.org/pdfs/Six-
nedy School of Government, Cambridge, MA.
Trends.pdf.
Retrieved June 18, 2007, from www.ksg.harvard.
Armour, F. J., Emery, C., Houk, J., Kaisler, S. H., edu/stratcom/hpg/index.htm.
& Kirk, J.S. (2007). The Integrated Enterprise
Hiller, J. & Belanger, F. (2001). Privacy Strate-
Lifecycle: Enterprise Architecture, Investment
gies for Electronic Government. E-Government
Management and System Development. In Saha,
Series. Arlington, VA: PricewaterhouseCoopers
Endowment for the Business of Government.

27
A Methodology for Government Transformation with Enterprise Architecture

Infocomm Development Authority of Sin- Saha, P. (Ed.). (2007b). Handbook of Enterprise


gapore (2005). Singapore E-Government Systems Architecture in Practice. Hershey, PA:
2005. 2005 Report on Singapore E-Govern- IGI Global Information Science Reference.
ment. Retrieved November 13, 2007, from
Tan, E.P., & Gan, W.B. (2007). Enterprise Archi-
www.igov.gov.sg/NR/rdonlyres/C586E52F-
tecture in Singapore Government. In Saha, P. (Ed.).
176A- 44B6-B21E-2DB7E4FA45D1/11228/
Handbook of Enterprise Systems Architecture in
2005ReportonSporeeGov.pdf.
Practice. Hershey, PA: IGI Global Information
12. Keng, S., & Long, Y. (2005). Synthesizing Science Reference.
e-government stage models a meta-synthesis
The World Bank (2003). Retrieved June 18, 2007,
based on meta-ethnography approach. Industrial
from http://Web.worldbank.org/WBSITE/EX-
Management & Data Systems, 105(4), 443-458.
TERNAL/TOPICS/EXTINFORMATIONAND-
Kreizman, G., Baum, C., & Fraga, E. (2003). COMMUNICATIONANDTECHNOLOGIES/
Gartner Enterprise Architecture: A Home for EXTEGOVERNMENT/contentMDK:2050715
E-Government. Gartner Group Research Note, 3~menuPK:702592~pagePK:148956~piPK:2166
TU-20-1831. Retrieved June 15, 2007, from 18~theSitePK:702586,00.html.
http://www.gartner.com/research/spotlight/as-
United Nations and American Society for Pub-
set_50080.jsp.
lic Administration (2001). Global Survey of
Layne, K., & Lee, J. (2001). Developing fully E-Government, Retrieved June 15, 2007, from
functional e-government: a four stage model. Gov- http://www.unpan.org/egovernment2.asp.
ernment Information Quarterly, 18(2), 122-136.
United States Federal Enterprise Architecture
Moon, M.J. (2002). The evolution of e-government Programme Management Office (2006). FEA
among municipalities: rhetoric or reality?. Public Consolidated Reference Model, Version 2.0.
Administration Review, 62(4), 424-433. Retrieved June 18, 2007, from http://www.white-
house.gov/omb/egov/a-1-fea.html.
Ross, J.W. (2006). Design Priorities for the IT Unit
of the Future. MIT Sloan CISR Research Brief-
ings, 4(3D). Retrieved September 7, 2007, from
http://mitsloan.mit.edu/cisr/papers.php. Additional Readings
Ross, J.W., Weill, P., & Robertson, D.C. (2006).
Australian Government Information Management
Enterprise Architecture as Strategy. Boston, MA:
Office. (2006). Australian Government Architec-
Harvard Business School Press.
ture. Department of Finance and Administration.
Saha, P. (2006). A Real Options Perspective to Retrieved June 18, 2007, from http://www.agimo.
Enterprise Architecture as an Investment Activity. gov.au/government/australian_government_ar-
Journal of Enterprise Architecture, 2(3), 32-52. chitecture.
Saha, P. (2007a). A Synergistic Assessment of Australian Government Information Management
the Federal Enterprise Architecture Framework Office. (2006). Responsive Government: A New
against GERAM (ISO 15704:2000). In Saha, P. Service Agenda. Department of Finance and Ad-
(Ed.). Handbook of Enterprise Systems Archi- ministration. Retrieved June 18, 2007, from http://
tecture in Practice. Hershey, PA: IGI Global www.agimo.gov.au/publications/2006/march/in-
Information Science Reference. troduction_to_responsive_government.

28
A Methodology for Government Transformation with Enterprise Architecture

National Association of State CIOs. (2004). Enter- Treasury Board of Canada. (2004). Business
prise Architecture Development Toolkit Version Transformation Enablement Program. Retrieved
3.0. Retrieved June 18, 2007, from http://www. June 18, 2007, from http://www.tbs-sct.gc.ca/btep-
nascio.org/resources/EAresources.cfm. pto/index_e.asp.
Weill, P., & Aral, S. (2006). Generating Premium
Returns on Your IT Investments. MIT Sloan
Management Review, 47(2), 39-48.

29
30

Chapter II
A Service-Oriented Reference
Architecture for EGovernment
Marc M. Lankhorst
Telematica Instituut, The Netherlands

Guido I.H.M. Bayens


Novius, The Netherlands

Abstract

This chapter describes the development and future directions of a service-oriented reference architecture
for the Dutch government. For several years now, the Dutch government has put a focus on improving
the service level of public agencies. Electronic services play an important part in this, which requires
a concerted effort across many organizations. A reference architecture has been created in order to
guide the many different programmes and projects. In this chapter, we will describe the role of service
orientation in e-government, and the creation, structure, and first results of this reference architecture
for e-government. Furthermore, we will look ahead at future developments in integrated, demand-driven
service provisioning in e-government.

Introduction part in this. At the same time, the agencies involved


had to be readied for electronic cooperation, to
For several years now, the Dutch government has facilitate the cross-agency service delivery that
put a focus on improving the service level of public is needed to provide seamless, demand-driven
agencies. Electronic services play an important services to citizens. Sharing information between

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Service-Oriented Reference Architecture for EGovernment

agencies is needed to avoid asking citizens the manner that, for example, insurance companies
same information over and over again, and to offer theirs. People do not want to stand in line
create greater efficiency and less duplication in in front of a service desk of public agencies, like
back-office processes and systems. municipalities, customs or social security agen-
This requires a concerted effort across many cies. They want to interact quickly, via modern
organizations. Service orientation is an impor- communication channels, and obtain a high and
tant new paradigm that can help to structure and transparent service level. And enterprises would
coordinate this effort both at the level of busi- like to develop a more sophisticated way of co-
ness processes and at the level of the supporting operation and interaction with public institutions
technologies. A service-oriented reference archi- than the traditional paper-based bureaucracy.
tecture for Dutch governmental institutions has These demands and expectations did have a
been created in order to guide the many different modest effect on Dutch governmental institu-
programmes and projects. This reference architec- tions. During the second half of the nineties,
ture comprises the overall structure of the Dutch public bodies were challenged to create their
e-government landscape, and provides a series of own Websites. Less visible was an initiative of
construction principles for e-government. several big agencies in the public domain to set
A reference architecture comprises a set of up a shared network for data exchange. In spite
general construction principles and explanatory of these developments, generally speaking, real
models to help architects in various positions to electronic services from public institutions did
create dedicated architectures for specific business not appear yet.
solutions. Thus, it provides a common ground for Based on an enquiry among 1500 people,
the many architects that are working on the devel- the Dutch citizen panel Citizen@Government
opment of the e-government targets. It is used in (Burger@Overheid in Dutch) has drawn up a
auditing project progress and in setting standards code of conduct for service to citizens (Burger@
for the results that have to be gained. Overheid, 2005) to which public institutions
In this chapter, we will describe the role of should adhere in providing e-government ser-
service orientation in e-government, and the cre- vices. This charter consists of quality standards
ation, structure, and first results of this reference that define the digital relation between citizen
architecture for e-government. Furthermore, we and government (in the fields of information
will look ahead at future developments in inte- exchange, service delivery, and political partici-
grated, demand-driven service provisioning in pation). These standards are formulated as rights
e-government. As such, the Dutch situation may citizens are entitled to, and matching obligations
serve as an example for others of applying the by government bodies. They are in the interest
principles of service-orientation in an e-govern- of both citizen and government and they allow
ment context, and of the benefits and impact of citizens to call their government to account for
service thinking in this situation. the quality of online contacts. Conversely, public
institutions can use the charter to examine the
external quality of their e-government services.
Background Thus, the charter is an instrument to stimulate
the further development of e-government from
Over the last decade, the pressure on public the citizens perspective.
agencies to improve their services has increased This code of conduct lists ten basic principles
sharply. Citizens and enterprises nowadays expect for Dutch public services:
governmental services to be delivered in the same

31
A Service-Oriented Reference Architecture for EGovernment

1. As a citizen, I have the right to choose the These demands from both citizens as com-
channel for doing business with the govern- panies gave birth to a new governmental action
ment. programme, called Different Government
2. As a citizen, I can easily find government (Andere Overheid in Dutch). The goal of this
products and services. programme was to stimulate the transition to a
3. As a citizen, I can easily understand govern- modern, transparent and highly effective way of
ment services, and my rights and obligations governing the Dutch state, provinces and mu-
as a citizen are clear. nicipalities. The main goals of this programme
4. As a citizen, I have a right to accurate, (which has now been subsumed by the Centre
complete, and actual information, and the for Good Governance of the Dutch Ministry of
government provides this proactively, tai- the Interior) are:
lored to my situation.
5. As a citizen, I only have to provide informa- Higher quality of service
tion once. The government tells me what Less red tape and regulations
it knows about me and does not use my A more comprehensive government policy
personal data without my permission. More cross-agency cooperation
6. As a citizen, I can easily find out how the
government operates, and it keeps me in- Several sub-programmes of this action plan
formed about the status of procedures in were developed. One of them was called elec-
which I am involved. tronic government or e-government, which
7. As a citizen, I can trust the reliability of aims for a more comprehensive approach in the
e-government. The government guarantees use of modern information technology support-
digital privacy, secure digital interaction, ing the goals of the Different Government
and careful digital archiving. programme. Some concrete goals of the e-govern-
8. As a citizen, I can easily give feedback to ment programme are:
the government. The government corrects
mistakes, compensates shortcomings, and To have 65% of the most important public
uses complaints to learn from. services available via the Internet by the end
9. As a citizen, I can compare, check and as- of 2007;
sess the performance of public bodies. The To register data that is used by many public
government actively provides the necessary bodies, like data from citizens, companies,
information. buildings, addresses and incomes in a cen-
10. As a citizen, I am empowered to actively tralized manner and provide it to official
look after my interests. The government agencies when necessary and allowed, to
promotes participation and provides the promote reuse and data quality and to prevent
necessary means. asking citizens the same questions over and
over again;
Next to citizens, industry also expects an To provide every citizen and every company
improved service level from government institu- with a unique, electronic identity which will
tions. They would like to have a public service be used for identification and authentication
that produces less red tape, less regulations, less purposes in public, electronic communica-
procedural complexity, and consequently, lower tion.
administrative costs.

32
A Service-Oriented Reference Architecture for EGovernment

A knowledge centre was put in place for the Reference Architecture


dissemination of information about the progress
of e-government initiatives, good practices, and In 2002, the Dutch Ministry of the Interior had
information about ongoing projects. Programmes a meta-architectural framework developed that
were set up for municipalities and provinces to would serve as the basis for further architectural
stimulate the adoption of the e-government goals, initiatives. A further developed version of this
and so-called implementation teams offer as- meta-framework, which is based on various ex-
sistance to public bodies by developing project isting frameworks and methods, such as those of
plans and the transfer of specific knowledge. In Zachman (1987), Maes (1999), TOGAF (The Open
addition to these national programmes, sectoral Group, 2006) and others, is shown in Figure 1.
and regional projects were also initialized. In total, This meta-architectural framework formed
many hundreds of projects, with a total budget the basis for the development of the Dutch
of several hundred million euros, are aiming to Government Reference Architecture (in Dutch:
improve Dutch e-government across the board. Nederlandse Overheid Referentie Architectuur,
Because of this growing number of national, NORA) (Bayens et al., 2007). The goal of this ref-
sectoral and regional projects, some stakeholders erence architecture is to create a common ground
became aware of the necessity of architectural for the many architects that are working on the
guidance. The need for an interoperability frame- development of the e-government targets.
work and standards became more evident. This The initial reference architecture rested on
thought resulted in a new programme, to set up an two pillars: The first was formed by the architec-
e-government reference architecture to coordinate tural choices that had been made by the various
and guide all these developments. national programmes that were going to have a

Figure 1. Meta-architectural framework (Bayens et al., 2007)


Security & privacy

Service management

who? what? how?

business
architecture
Services
organisation processes
products

information
architecture
employees messages information
applications data exchange

technical
architecture
technical data
network
components storage

33
A Service-Oriented Reference Architecture for EGovernment

serious impact on the final architecture of the Position and Role of the Reference
Dutch e-government, such as programmes for Architecture
the development of national registrations, for e-
security, and for the development and use of open As we stated before, the goal of developing this
standards. The second pillar was formed by the reference architecture was to create a common
influence from several large government agencies, ground for the many, many architects that are
like the national social security agencies and the working on the development of the various ele-
tax and customs administration. Architects from ments of Dutch e-government. The idea is that
these programmes and agencies have had a great architects should have a sound influence on
influence on the emergence of the initial draft of the construction principles of e-government.
the Dutch Government Reference Architecture. From their respective positions in projects and
Creating this reference architecture was a institutions, they could take care of the neces-
non-trivial effort. During the development of sary coherence between the many aspects of the
the architecture, more and more architects from e-government: Websites, data storage, process
different programmes and governmental orga- flow, semantics, data communication, messages,
nizations took part in the discussions about the preferred technology, and so on. Architects assist
mainPosition andprinciples
architectural Role ofand themodels.
Reference
In this Architecture
in setting up e-government projects and business
way,Asa more robust before,
we stated version of
thethegoal
framework was
of developing this reference
solutions, architecture
they was to create
advise programme a
and project
developed, and the first version of the architecture
common ground for the many, many architectsmanagers that are working on the development
about construction principles,ofand
was the
published
variousinelements
May 2006. of Several rounds of
Dutch e-government. The
they idea
play is
a that architects
role in should havetoabusi-
giving instructions
consultation and review
sound influence onhave lead to the current
the construction principlesness
of e-government.
process analysts From
and their respective
software developers.
version 2.0, which
positions was published
in projects in April 2007.
and institutions, they could take care of
Furthermore, thethe necessary
reference coherence
architecture is used in
between the many aspects of the e-government:
At the moment, the architecture is broadly sup- websites,
auditing data
project storage,
progress andprocess flow,
in setting standards
semantics,
ported data communication,
by both architects messages,
and decision makers in preferred technology,
for the results andtoso
that have beon. Architects
gained.
assist e-government
the Dutch in setting up e-government
context. projects and business solutions, they advise programme
and project managers about construction principles, and they play a role in giving
instructions to business process analysts and software developers. Furthermore, the
reference
Figure architecture
2. Reference is used
architecture: in for
Tool auditing project
architects progress
in their andwith
dialogue in setting standards for the
stakeholders
results that have to be gained.
NORA

dia ue
log log
Official, manager
ue dia Developer, engineer

e dialo
ogu gue
dial Architect
Governmental
organisation
EDP-auditor Informationmanager

Figure 2. Reference architecture: tool for architects in their dialogue with stakeholders.
As Figure 2 shows, the idea of a reference architecture is that this set of construction
34
principles and explanatory models helps architects in various positions to create
dedicated architectures for specific business solutions. In this way, one can see a
hierarchical set of architectural frameworks, ranging from international frameworks such
Figure 1. Reference architecture: tool for architects in their dialogue with stakeholders.
As Figure 1 shows, the idea of a reference architecture is that this set of construction principles and
explanatoryReference
A Service-Oriented models helpsArchitecture
architects in various positions to create dedicated architectures for specific
for EGovernment
business solutions. In this way, one can see a hierarchical set of architectural frameworks, ranging from
international frameworks such as the European Interoperability Framework (EIF) (European
Commission, 2004), via national and sectoral reference architectures, down to enterprise architectures
and finally the architectures of individual projects. Just like the Russian matrushka dolls, the smaller
Figure 3.fitting inside the
Hierarchy of larger (Figure 2).
architectures

INTERNATIONAL STANDARDS

EUROPEAN INTEROPERABILITY FRAMEWORK

DUTCH GOVERNMENT REFERENCE ARCHITECTURE

SECTORAL REFERENCE ARCHITECTURE


(municipalities; healthcare; social security; provinces; etc)
ENTERPRISE ARCHITECTURE

PROJECT ARCHITECTURE

Figure 2. Hierarchy of architectures.


As we saw before, demands from citizens and companies played a dominant role in the idea of what e-
As Figure 2 shows,
government shouldthe
be. idea of atheir
Therefore reference
demands had toThis architecture
be translated has a broader
into architectural scope
principles. A than the
architecture is that
second this came
influence set offrom
construction prin-
the already mentioned Dutch reference
programmes architecture,
and agencys working onsince
e- it also includes
ciples andgovernment,
explanatory andmodels
developments in other countries,
helps architects in suche.g. as Austria
aspects(2006), Denmark
of budget (2006), Germany
allocation and performance
(2007), the
various positions toUK (2005),
create the
dedicated architectures measurement, but in the core its goals are similar:
for specific business solutions. In this way, one can to provide government architects with guidance
see a hierarchical set of architectural frameworks, in the form of reference models. It comprises a
ranging from international frameworks such as number of different reference models at different
the European Interoperability Framework (EIF) architectural layers. Especially interesting to the
(European Commission, 2004), via national and Dutch initiative is the Service Component Ref-
sectoral reference architectures, down to enter- erence Model part of the FEA, which classifies
prise architectures and finally the architectures services in a number of domains, such as customer,
of individual projects. Just like the Russian ma- process automation, business management, back
trushka dolls, the smaller fitting inside the larger office, digital asset, and support. The idea is that
(Figure 3). these represent categories of services that are re-
As we saw before, demands from citizens and usable across multiple government organizations,
companies played a dominant role in the idea of similar to the e-government building blocks of
what e-government should be. Therefore their the Dutch reference architecture.
demands had to be translated into architectural Another interesting example is the German
principles. A second influence came from the SAGA architecture (Germany, 2007), which is
already mentioned programmes and agencys based on the RM-ODP viewpoints (ITU, 1995).
working on e-government, and developments in SAGAs enterprise viewpoint has a role similar to
other countries, such as Austria (2006), Denmark the high-level architecture principles advocated
(2006), Germany (2007), the UK (2005), the US in the Dutch reference architecture, and defines
(2007), and Hong Kong (2007). a service as the complete performance of a
For example, the eGov initiative in the USA process for the citizen or business in question.
comprises the development of a Federal Enterprise A service includes processes, obligations and
Architecture (FEA) (US, 2007), a business-based burdens, such as recognition as a conscientious
framework for government-wide improvement. objector, applications for unemployment ben-

35
A Service-Oriented Reference Architecture for EGovernment

efits or the granting of an import permit. For the In the context of cooperating but relatively
purposes of the following discourse, the term autonomous government organizations, service
service will hence cover any contacts between orientation seems particularly attractive. It facili-
citizens or businesses on the one hand and the tates the creation of a federated architecture, in
administration on the other (p. 35). A service which each organization retains a high degree of
concept is also used at a more technical level. autonomy regarding its internal processing, and
SAGAs computational viewpoint introduces a supplies a set of services that can be integrated
multi-layer reference software architecture, which to form a high-level service that is meaning-
permits both the use of software services and the ful to end-users (citizens, companies, and civil
direct use of components. servants).
In the Dutch e-government architecture,
Service Orientation in E-Government service orientation was adopted as the funda-
mental design principle, underlying the entire
The emergence of service-oriented computing architecture. Services are not only used in the
(SOC) and Web services technology, in particular, narrow sense, i.e., the service as a self contained
has aroused enormous interest in the service- software module that performs a certain function,
oriented architecture paradigm (SOA). At first, but in a broad sense: Not only services between
service orientation was seen as a strictly IT-related a governmental body and a citizen or a company
issue. However, a purely technological focus would are regarded from this perspective, but also the
be too limited and would fail to appreciate the way two or more governmental bodies are work-
value of the much more general service concept. ing together, and the cooperation between two or
This essentially simple concept can and should more departments of one institution.
be used not just in software engineering, but also Until recently, SOA was often understood as
at all other levels of an architecture, to achieve a technical issue and focused only on software
ultimate flexibility in both business processes architecture. However, the service concept is much
and their IT support. more broadly applicable than that, which stands to
What makes the service concept so appealing? reason given its original background as a business
First, there is the fact that the service concept is concept. Service orientation is also a very useful
used and understood in the different domains concept to structure the business architecture of an
making up an enterprise. In using the service organization, especially in the networked institu-
concept, the business and IT people have a mutu- tions of e-government. It provides a conceptual
ally understandable language, which facilitates basis for the entire enterprise architecture of an
their communication. Second, service orientation organization (Steen et al., 2005).
has a positive effect on a number of key issues: Service orientation is a concept with wide-
interoperability, agility, cost effectiveness, and ranging implications on more than just a techni-
innovation power. Finally, service orientation cal level. From an organizational perspective,
stimulates new ways of thinking. Traditionally, the fundamental change is that the basic unit for
applications are considered to support a specific management and control is no longer a depart-
business process, which in turn realizes a specific ment with its own IT systems, but rather a much
business service. Service orientation allows us also smaller entity, a business service. Monolithic,
to adopt a bottom-up strategy, where the business department-bound systems will disappear, and
processes are just a mechanism of instantiating former business owners will lose control over
and exploiting the lower-level services to the what they thought was their operation. This
outside world (Steen et al., 2005). decomposition opens up many opportunities for

36
A Service-Oriented Reference Architecture for EGovernment

combining basic services into new, demand- or The various principles are organized in the
event-driven ensembles that really address citi- architectural meta-framework presented previ-
zens needs. However, new management issues ously. Each cell of the architectural framework
arise, such as control responsibility within such is filled with 10 to 20 architectural principles.
multi-party networks of e-government service Every principle is written down as a short state-
providers. ment, which is followed by a more elaborated
An important consequence of service orienta- explanation. Finally every principle has a status
tion for the Dutch reference architecture discussed identification. Some principles could be derived
in this chapter, was that the chosen meta-frame- immediately from legislation; these principles
work had to be adjusted, which lead the final are called de jure principles. The next type is
version as shown in Figure 1. This adjusted meta- called e-government principles. These should
framework was used to develop a coherent set of be adopted by as many governmental bodies as
construction principles for e-government. possible, because they are the basis for coopera-
tion and interoperability. Some people plead for
Principles and Building Blocks putting these principles in a formal statute to
make them more compelling. A final type of
The Dutch Government Reference Architecture principles is called recommendations. These
consists of two main types of content: architectural are principles that only affect the internal ar-
principles and high-level designs of e-government chitecture of a governmental body. This type of
building blocks. The principles and models of principles is seen as advisory, and the reference
this reference architecture have been drawn up in architecture in this respect serves as a body of
consultation with many architects from different knowledge for architects. In the appendix to this
Thestructureoftheoverallarchitecture,withacitizenfacinglefthandside,thevariousgovernment
programmes and governmental organizations.
institutionsandagenciesinthemiddle,andsharedinformationregistriesontheright,isreflectedinthe
designoftheindividualorganizationsinthemiddle.Thisisofcoursederivedfromthecommonthree
tierarchitecturalpatternofpresentation,businesslogic,anddata.
Figure 4. Overview of Dutch e-government reference architecture (Bayens et al., 2007)
integrated dutch
governmental
website

persons
ministry
companies
www.overheid.nl
province
buildings

municipality
domains

civilian National Contact Center water board topography

tax adresses

cars
company social security
Data exchange
pensions
healthcare
Incomes
additional: 00
etc.
Hierarchy of service buses

Figure 1. Overview of Dutch e-government reference architecture (Bayens et al., 2007).
Inthesameway,additionaloverviewmapsweredevelopedformorespecificareasofthemostgeneral
overviewmapinordertogivesomemoredetailofunderlayingstructures.Error!Referencesourcenot
37
found.showsanexample:ThispictureshowsthedesignofahierarchicalcompositionofEuropean,
Dutch,andsectoralservicebuses,partiallybasedonalreadyexistingbuses,butbroughttogetherand
A Service-Oriented Reference Architecture for EGovernment

chapter, some of the main principles are listed from the common three-tier architectural pattern
Thestructureoftheoverallarchitecture,withacitizenfacinglefthandside,thevariousgovernment
according to the cells within the meta-framework of presentation, business logic, and data.
institutionsandagenciesinthemiddle,andsharedinformationregistriesontheright,isreflectedinthe
in which they fit. In the same way, additional overview maps
designoftheindividualorganizationsinthemiddle.Thisisofcoursederivedfromthecommonthree
But principles alone are not enough to make an were developed for more specific areas of the most
tierarchitecturalpatternofpresentation,businesslogic,anddata.
architecture usable. Guidance in applying these general overview map in order to give some more
principles and concrete high-level designs of archi- detail of under laying structures. Figure 5 shows
integrated dutch
tectural components, the so-calledgovernmental
e-government an example: This picture shows the design of a
website
building blocks, are also indispensable. hierarchical composition of European, Dutch, and
One of the first steps in the development of sectoral service buses, partially based on already
the architecture was, therefore, to develop high- existing buses, but brought together and persons com-
ministry
level models of the most important e-govern- pleted in an overall infrastructure architecture. companies
www.overheid.nl
ment components. In these so-called overview Today, several partiesprovince are developing networks
buildings
maps, relevant items like national information and service buses, based on this relatively simple
registries, a network infrastructure, the various architectural design.municipality domains

institutions and the common front-office


civilian channels
National Contact Center The goal of these overview
water board maps is to facili-
topography
were visualized. Figure 4 shows one result of this tate the discussion about the main architectural
tax adresses
approach. Quite important are the symbols of both issues. Not only the discussions amongst archi-
the citizen and the company as a focus point and tects, but also the social
discussion
security
between govern-cars
company
ment officials, programme managers on the one
Data exchange
reminder of the fact that every step and every pensions
action is devoted to these two actors. hand and architects on the other. Overview maps
healthcare
Incomes
The structure of the overall architecture, with bridge the alignment gap between business and
additional: 00
a citizen-facing left-hand side, the various gov- builders. etc.

ernment institutions and agencies in the middle, Hierarchy of service buses


A second important line of action is the 
and shared information registries on the right, is development of common building blocks of the
Figure 1. Overview of Dutch e-government reference architecture (Bayens et al., 2007).
reflected in the design of the individual organi- e-government architecture. To mention some of
Inthesameway,additionaloverviewmapsweredevelopedformorespecificareasofthemostgeneral
zations in the middle. This is of course derived the most important:
overviewmapinordertogivesomemoredetailofunderlayingstructures.Error!Referencesourcenot
found.showsanexample:ThispictureshowsthedesignofahierarchicalcompositionofEuropean,
Dutch,andsectoralservicebuses,partiallybasedonalreadyexistingbuses,butbroughttogetherand
completedinanoverallinfrastructurearchitecture.Today,severalpartiesaredevelopingnetworksand
servicebuses,basedonthisrelativelysimplearchitecturaldesign.
Figure 5. The infrastructure: A hierarchy of networks and service buses

EU countries Legend
International
Logic function / Bus
networks and
service busses Transport function / Network
EU
TESTA

Webservices
-Routing
-Translation NATIONAL
Messages
-Security SERVICE
BUS Files
-.....

Municipality-net Education-net The Hague Etc.

Sectoral networks and


service busses Social-net Health-net Police-net

38
A Service-Oriented Reference Architecture for EGovernment

National e-government portal for citizens, To unify these descriptions and facilitate the
where each citizen can have his/her person- exchange of architectural knowledge and the
alized my government page integration of the various building block designs,
National e-government portal for compa- we propose to use a standardized language for
nies enterprise architecture modelling called Archi-
National call centre for the Dutch public Mate (Lankhorst et al., 2005). This language
sector focuses specifically on high-level modelling and
Unique personal number to facilitate the inter-domain relations. With this language, we
exchange of information and the integration are able to model both the global structure within
of services across government agencies each domain, showing the main elements and
Unique number for companies and institu- their dependencies, and the relations between
tions the domains, in a way that is easy to understand
National authentication service, with dif- for non-experts. The language is rapidly gain-
ferent levels of security and corresponding ing acceptance in the Netherlands and abroad,
means for authentication and architects from several Dutch governmental
New smartcard-based national identity card, institutions already use it as their standard mod-
which contains biometrical data elling technique.
National repository for all public services ArchiMate distinguishes itself from many
and products other languages by its well defined metamodel,
Mechanism providing and handling Web set of concepts and, most importantly, its rela-
forms tions. Furthermore, the enterprise-level scope
National infrastructure for the exchange of of ArchiMate is wider than that of languages
messages and services like UML and BPMN, which focus on a more
detailed description of specific domains such as
This type of standard components of e-govern- software and business processes. ArchiMates
ment will play a more and more dominant role in level of abstraction simplifies the construction
the development of comprehensive e-government of integrated models, where most languages ap-
solutions, especially across agencies. They will pear to persuade architects to detailed modelling.
help to overcome interoperability problems and Although detailed modelling of most aspects also
increase transparency and efficiency in the Dutch can be performed in ArchiMate, using ArchiMate
public sector. as an umbrella language, from which links can
be made to detailed models in languages such as
Modelling the Architecture UML or BPMN, is most useful.
ArchiMate is strongly service-oriented, not
The high-level descriptions of e-government just for describing software architectures but
building blocks presented in the previous sections across the entire enterprise architecture domain.
need to be formalized and detailed before they This makes it very well suited for modelling the
can become the basis for any real implementa- service-oriented government reference archi-
tion. These more detailed models are currently tecture at hand. Service orientation leads to a
not part of the reference architecture itself, but layered view of enterprise architecture models,
such descriptions are made within individual where the service concept is one of the main
projects that focus on the realization of these linking pins between the different layers. In this
building blocks. context, the ArchiMate language distinguishes
three main layers:

39
A Service-Oriented Reference Architecture for EGovernment

1. The business layer offers products and as follows. For a more detailed description please
services to external customers, which are refer to (Lankhorst et al., 2005).
realized in the organization by business The main structural concept at the business
processes (performed by business actors or layer is the business actor, an entity that performs
roles). behaviour such as business processes or func-
2. The application layer supports the business tions. Business actors may be individual persons
layer with application services, which are (e.g. customers or employees), but also groups of
realized by (software) application compo- people and resources that have a permanent (or at
nents. least long-term) status within the organizations.
3. The technology layer offers infrastruc- To each actor business roles can be assigned,
tural services (e.g., processing, storage, which in turn signify responsibility for one or
and communication services) needed to more business processes, which may manipulate
run applications, realized by computation business objects. The externally visible behaviour
and communication
modelling devices, and
the service-oriented system reference
government of a business process is
architecture at modelled by the concept
hand. Service
software. business service,
orientation leads to a layered view of enterprise architecture models, where the service which represents a unit of
concept is one of the main linking pins between functionality
the different thatlayers.
is meaningful
In this from the point
context, the of
A common abstract metamodel lies behind
ArchiMate language distinguishes three main layers: the view of the environment. Not shown in the figure
modelling
1. The concepts
business at all threeoffers
layer layers,products
comprising is thatto
and services services
external cancustomers,
be grouped which
to formare(financial
(abstract) concepts for structure, behaviour, or information)
realized in the organization by business processes (performed by business actors products, together with a contract
or
and information,
roles). and a separation is made that specifies the associated characteristics, rights
between internal and external concepts. In and requirements.
2. The application layer supports the business layer with application services, which are
Figure 6, we see this
realized structure ofapplication
by (software) the metamodel components. The main structural concept for the application
reflected in the set of application layer concepts
3. The technology layer offers infrastructural services layer (Figure(e.g.,6)processing,
is the application
storage, component.
and
and the relevant relations between
communication services)them, whichtowerun applications,
needed This conceptrealized
can be used to model any structural
by computation and
have used in the example models in the remainder
communication devices, and system software. entity in the application layer: not just (reusable)
of this chapter. The
A common structure
abstract of this part
metamodel liesofbehind
the thesoftware
modelling components
concepts that can
at all be part
three of one or
layers,
metamodel is representative for the entire lan-
comprising (abstract) concepts for structure, behaviour, and information, andsoftware
more applications, but also complete a
guage and is largely
separation repeated
is made in theinternal
between business and applications
and external or information
concepts. In Figuresystems.
6, we see Behaviour
this
structure
technology of the
layers. The metamodel
most importantreflected in the set in
modelling ofthe
application
applicationlayerlayerconcepts and thein a way
can be described
relevant
concepts relations
at each between
of the three layersthem, which we have
are explained thatused in the
is very example
similar modelslayer
to business in thebehaviour.
remainder of this chapter. The structure of this part of the metamodel is representative for
the entire language and is largely repeated in the business and technology layers. The
most important modelling concepts at each of the three layers are explained below. For a
Figure 6. Application layer concepts in ArchiMate
more detailed description please refer to (Lankhorst et al., 2005).
Information Behaviour Structure

Application assignment Application


service interface External

Realisation Composition
Usage

Data object Application assignment Application


Access function component Internal

flow

triggering

Figure 6. Application layer concepts in ArchiMate.


The main structural concept at the business layer is the business actor, an entity that
40 performs behaviour such as business processes or functions. Business actors may be
individual persons (e.g. customers or employees), but also groups of people and resources
that have a permanent (or at least long-term) status within the organizations. To each
A Service-Oriented Reference Architecture for EGovernment

We make a distinction between the externally or the use of interfaces by roles, components or
visible behaviour of application components in collaborations. The composition relation indicates
terms of application services, and the internal that an element consists of a number of other ele-
behaviour, application functions, that realize ments, i.e., the lifecycles of the contained objects
these services. Services are offered through the are tied to that of their container. The aggregation
application interfaces of an application compo- relation is used to group a number of elements
nent. Data objects are used in the same way as within another element, but the grouped elements
data objects (or object types) in well-known data continue to have an independent lifecycle. The
modelling approaches, most notably the class assignment relation links behaviour elements
concept from UML. with structure elements (e.g. roles, components)
The main structural concept for the technology that perform this behaviour, roles with actors
layer is the node. This concept is used to model that fulfil them, or artefacts that are deployed
structural entities in the technology layer. Nodes on nodes. The realization relation links a logical
come in two flavours: device and system soft- entity with a more concrete entity that realizes
ware. A device models a physical computational it, e.g. a service that is realized by an application
resource, on which artefacts may be deployed function. The specialization relation indicates
for execution. System software represents the that an object is a specialization of another object.
software environment for specific types of compo- Temporal or causal relations between processes,
nents and data objects. An infrastructure interface function, interactions and events are modelled
is the (logical) location where the infrastructural with the triggering relation. The flow relation
services offered by a node can be accessed by describes the flow of information between ele-
other nodes or by application components from ments. Finally, an association models a relation
the application layer. An artefact is a physical between objects that is not covered by another,
piece of information that is used or produced in a more specific relation.
software development process, or by deployment Many of these concepts and relations have been
and operation of a system. A network models a inspired by existing standards. For instance, the
physical communication medium between two or application component, node and device concepts
more devices. In the technology layer, the central and relations such as composition, association,
behavioural concept is the infrastructure service. and specialization originate from UML, while
We do not model the internal behaviour of infra- the process and event concepts and the trigger-
structure components such as routers or database ing relation are used in most business process
servers; that would add a level of detail that is not modelling languages.
useful at the enterprise level of abstraction.
Next to the concepts to model the business, Example: Personal Internet Page
application, and technology layers of an enterprise,
we also need to model the different relations The Dutch government has decided that each
between these concepts. To this end, ArchiMate citizen should become a personal Internet
provides several types of relations. The access page (PIP) called MijnOverheid.nl (translated:
of information elements, e.g. business or data MyGovernment.nl). Citizens and businesses
objects, by behaviour elements, e.g. processes, can use this portal to view their personal data,
functions or interactions, is modelled with the submit corrections or changes, receive personal-
access relation. The usage relation models the use ized information, and manage their affairs with
of structure or behaviour elements, e.g. the use of government in one place. Similar initiatives can
services by processes, functions or interactions, be seen in other countries, such as Denmarks
Borger.dk and Singapores My.eCitizen.

41
A Service-Oriented Reference Architecture for EGovernment

The PIP will serve both citizens and govern- agencies, this personal page makes it easier to
ment. For citizens, it will be easier to find relevant reach more citizens with e-government services
services, availability is 7x24, information can be and it will provide economies of scale (build once
tailored to personal preferences, information is & implement for all agencies).
reused across agencies, and they can get insight The PIP thus serves as an intelligent integra-
in their personal files and dossiers at these various tor:
agencies from one point of entry. For government

Figure 7. Services and data sources of the personal Internet page


User interfaces of the Personal Internet Page

Citizen Service provider Web service Management


home page home page home page home page

Basic services of the Personal Internet Page

Authentication Personalisation Communication Current affairs Info & services


& authorisation

Registration & Messages & Information


Personalisation Affairs
authentication notification services

Authorisation & Navigation &


Calendar Dossiers Other services
delegation search

Internal data of the Personal Internet Page

Roles Users Service Affairs Services


providers

External reference data

Authorisations Life events Themes Product Government


catalogues organisations

Shared infrastructural services

Federated Shared Service Search


authentication authorisation registry engine e-Forms

Governmental services

Municipal Social security Provincial Tax


service services services services ...
E.g. getting a passport, E.g. receiving E.g. obtaining a E.g. submitting tax returns,
birth certificate unemployment benefits building permit requesting tax exemption

National data registries

Citizens Addresses Cars Income ...

Figure 7. Services and data sources of the Personal Internet Page.

First Results
42Firstresults in applying the Dutch Government Reference Architecture are encouraging.
Many institutions have adopted the architecture as an important guideline in their own
architectural practice and are aligning their developments with it. Sector-specific
A Service-Oriented Reference Architecture for EGovernment

It finds and displays e-government ser- common infrastructural facilities, such as service
vices buses, shared Internet portals, authentication
Government agencies retain autonomy and services, and basic information registries. To
responsibility for their services this end, the reference architecture also provides
Services retain the identity of the govern- a set of over 200 relevant technology standards,
ment agency which are put into context by the set of the 130
architectural principles. This combination of
Importantly, the PIP will not provide integra- standards and principles for applying them puts
tion between (the services of) different agencies; it a step beyond comparable initiatives like SAGA
this is left as a responsibility to these organiza- (Germany, 2007) and others. In this way the
tions themselves. On the other hand, if two or architectural guidelines and the interoperability
more agencies combine their services, the PIP framework are intelligently combined.
will support the dissemination of this combined Several important elements of this are already
service to citizens and companies. operational. A central authentication facility,
A first-level decomposition of the core services DigiD, has been developed and is currently
and data sources of the PIP is shown in Figure 7, used by many governmental institutions and
which is based on (Ghosh, 2006, p. 20). Each of more than 5 million citizens, for example to file
the services specified in this model can of course their electronic tax returns. Basic information
be described in much more detail, providing in- registries are being formed and the first of these
formation about the functions that realize these are already operational.
services, the components that implement these
functions, the way data is used by these functions,
etc. Space limitations prevent us from showing Future Developments
the full detail of these designs.
As we can already see in this figure, the PIP Notwithstanding the important developments in
provides a collection of services that may also Dutch e-government outlined in the previous sec-
be relevant outside the context of the PIP itself. tions, recent research has unveiled that only some
Providing these services as building blocks to 16% of Dutch citizens perceive an improvement
various government agencies for inclusion in their in the quality of service provisioning by Dutch
own e-government solutions could be a next step public bodies over the last few years, despite
after deployment of the PIP itself to citizens. the fact that about 76% of the population has
visited governmental Websites (Burger@Over-
First Results heid, 2006). Apparently, there is still a large gap
between governmental service offerings and the
First results in applying the Dutch Government actual demand of citizens and enterprises.
Reference Architecture are encouraging. Many A main cause of this gap appears to be that
institutions have adopted the architecture as an most e-government services have been designed
important guideline in their own architectural inside-out, based on the current structure,
practice and are aligning their developments with organization, and products of the various gov-
it. Sector-specific architectures, in e.g. education, ernmental institutions, resulting in a fragmented
social security, and healthcare, are being aligned and ill-coordinated patchwork of services. For a
with and based on the reference architecture. single event, a citizen has to deal with many par-
Even more importantly, the reference architecture tial solutions by several organizations that hardly
serves to coordinate the development of a set of communicate with each other. This problem also

43
A Service-Oriented Reference Architecture for EGovernment

holds for civil servants, who need to cooperate Policy: The mission on political subjects,
with their colleagues in different institutions, but such as environment, health-care, taxes
are seldom provided with adequate means to do so. etc., which forms the basis for legislation
To really serve the needs of citizens, government and regulation
e-services should be centred on the actual citizen Legislation: National and local laws and
demand. Such a demand driven e-government regulations that are implemented in accor-
requires an integrated approach of both technical dance with policies
and organizational issues. Service: The (governmental) services that
Although the reference architecture outlined enable citizens to comply to legislation,
before is an important step towards better inte- exercise their rights, or obtain government
grated e-government, much more needs to be done products and benefits
to achieve truly citizen-centred services. This Process: The activities and transactions
longer-term development of demand-driven e- performed by the provisioning organizations
government is the focus of a major Dutch research to realize these services
project B-dossier (B-dossier, 2007), comprising Information: Personal and public infor-
9 partners from government, private sector, and mation that is involved in or required for
science. In this project, we have identified require- transactions, such as the personal name and
ments and designed a service architecture to make address of the requestor, or general informa-
the next step towards this demand-driven perspec- tion about a new law
tive, in which both citizens and civil servants
needs for better integration are addressed. Furthermore, two core issues appeared in every
one of the studies we have consulted: a need for
Requirements Analysis more transparency in how the government oper-
ates, and a need for more control. Both of these
To identify the requirements, we have studied issues hold for citizens as well as for the civil
multiple visions of different stakeholders on servants involved. A further analysis revealed that
future egovernment. These included the Dutch these issues of transparency and control applied
citizen panel Citizen@Government (Burger@ to four main problem categories: fragmentation
Overheid, 2005), the local government of the city of services across many different organizations,
of The Hague (Bos, 2005), a consultancy firm compatibility of service demand and supply, qual-
HEC (Mettau, 2005), and various intra-govern- ity of these services, and their accessibility.
mental projects and studies. Furthermore, visions In our view, the development of a modern,
such as one-stop government (Wimmer, 2002) service oriented e-government transcends the
and virtual agencies (Fountain, 2001) have traditional way of organizing governmental
influenced this analysis. Several user studies are processes. In the paper age, it was accepted
carried out within the project itself, to evaluate that one had to go from one to the other agency
and refine these ideas. to collect different services or products. In the
The requirements analysis unveiled the domi- electronic service society, citizens and companies
nant problems that citizens and civil servants are expect a one-stop shopping way of doing business
facing. To capture these problems and the associ- with governmental institutions. So new technol-
ated requirements on e-government services, we ogy enables new forms of service provision, and
have defined a multi-dimensional framework. The people simply want to have this. In the years to
first dimension of this framework is what we call come, governmental institutions have to rearrange
the governmental service provisioning chain: their basic functions. This is a tough assignment

44
A Service-Oriented Reference Architecture for EGovernment

for senior management and politicians. Most of within the context of the reference architecture
them have to give up a certain independent role described before, and existing and emerging
in the public marketplace. They have to innovate, technological solutions have been mapped onto
cooperate, merge, harmonize, reallocate functions that architecture (Lankhorst & Derks, 2007). In
and sometimes even discontinue their services. the next sections, we will describe in more detail
In many instances, legislation has to be adapted which services we need to fulfil the requirements
to make these changes possible. All this can be we have identified.
a painful process, with some managers gaining
power and others losing. This is not just a matter of Fragmentation
optimizing IT or business process redesign. This
is giving birth to a new type of public service. First of all, we identified the fragmentation prob-
lem, where citizens and civil servants perceive
From Requirements to Services scattered service provisioning. There is no single
counter where all information or services are
Service orientation can be part of the solution. available. Instead, information and services are
Since the citizens needs and demands are seldom scattered around multiple governmental depart-
served by a single government agency, combining ments and sometimes private parties as well.
and integrating services across organizational This requires a substantial effort from citizen and
boundaries and sharing the necessary informa- civil servant to gather all required information
tion to deliver these services are key ingredients and services. A particular problem for citizens
of demand-driven e-government. is that personal data such as address, marital
At a high level, these requirements can (at least status, income, and social security number, are
partially) be met by an architecture that provides administrated by each department separately. This
at least the following elements: fragmented administration results in repeated
questions to citizens to fill out forms with informa-
Integrated, demand-driven e-government tion that is already known to other governmental
services, created from sub-services deliv- departments. This is perceived as highly frus-
ered by the various government organiza- trating. Another problem with the ever growing
tions involved complexity of legislation and regulation is that
Cross-organizational choreography of citizens loose track of relevant developments,
sub-services and -processes, to realize these which causes them to miss opportunities, e.g.
integrated end-user services with respect to social security benefits.
A virtual shared information space, an Of course, one step necessary to take is to
infrastructure for exchanging information present the various governmental services in an
between organizations and with citizens integrated way. An example of such a presentation
A federated identity management infrastruc- service is the Personal Internet Page described
ture for safely accessing this information previously. However, this does not solve the
End-user applications with which to access problem of integrating services across agencies.
all of the aforementioned To alleviate this problem of scattered service
provisioning and be able to deliver integrated
However, this is just a high-level layering of demand-driven services, we introduce process
generic elements that provides no clues to its integration services that are capable of orchestrat-
realization. To this end, a detailed functional ing fragmented processes. To resolve the lack of an
architecture has been developed, which fits integrated view, we introduce directory services,

45
A Service-Oriented Reference Architecture for EGovernment

that include references to relevant information and Quality


services of different organizations. To guarantee
that no opportunities or events are missed by Quality of information and services is hard to
citizens and civil servants, we introduce subscrip- judge and control for both citizens and civil
tion services with which users and/or services servants. Citizens may get different interpreta-
are notified of relevant events. Another problem tions of the same legislation from different civil
with fragmentation is the need for repeated au- servants. Also, citizens are sometimes unaware
thentication and authorization. To this end, we that certain information or services are outdated.
propose a federated infrastructure of authentica- From the perspective of civil servants, the quality
tion services and authorization services that can of information may be uncertain. Citizens may not
provide single sign-on. always act truthfully, or civil servants work with
To provide the citizen with an integrated outdated information. Furthermore, the complex-
view on the information stored by various or- ity of forms and regulations frequently results
ganizations, information services are needed. in errors and mistakes. From the perspective of
The problems of fragmentation also plague the control, citizens often have no choice in what
various organizations involved. Because they services to take. In many cases, the government
have limited or no access to the information their acts as a monopolist, such that citizens have no
colleagues store, citizens are often requested to control over quality of service.
provide information that is already known to the To facilitate citizens and civil servants in better
government. These information exchange services judging quality, we introduce certification ser-
should also help to solve this problem, by creating vices, such that the source of information can be
a transparent infrastructure where organizations determined accurately. Time-stamped certificates
and citizens can share and exchange information are used to denote the validity of information.
on an equal basis, of course respecting the appli- Certification may encourage citizens to provide
cable laws, regulations, and wishes of the owners their information more accurately, because their
of that information. information supply cannot be denied afterwards
(non-repudiation). We introduce archive services
Compatibility to log the actual service provisioning and store
previous versions of information. This way a
The compatibility problem involves the mismatch user can verify whether newer versions of the
between demand and supply of information and same information are available. With the archive
services. At a business level, the compatibility service, the service provisioning history can be
problem involves the lack of an appropriate service determined objectively such that the evolution of
that meets the demand. The earlier introduced quality over time can be tracked. Quality of service
process service can be used to compose and can then be controlled by selecting those services
enact the required customized services. Another that meet quality demands. To be able to improve
compatibility problem involves a mismatch with quality of information, information services are
respect to compliance with standards. We consider equipped with facilities so that the user of the
this a language problem and introduce adaptation information can report possible errors. A specific
services to align messages and services between type of these services could be recommendation
parties that use different formats and concepts. services, with which citizens can inform each
other about the quality of e-government services,
in much the same vein as e.g. the rating system
of companies like Amazon.

46
A Service-Oriented Reference Architecture for EGovernment

Accessibility store and reference objects in its own way. Next


to the obvious practical reasons for allowing each
The demand for access can be divided into avail- organization to use its own practices instead of
ability of access and access privileges. With enforcing some centralized scheme, a second
respect to availability, citizens demand access advantage is an improved level of security and
to information and services on a 24/7 basis and privacy, because it becomes more difficult to
through multiple channels, such as a physical combine information from different sources
counter, phone, and email. Important here, is without having the proper authorization. In this,
that they should receive the same information we deviate from the current Dutch policy, where
and service through all channels. a standardized citizen number is used to iden-
With respect to access privileges, there is an tify citizens across all government services (a
increasing demand for transparency about who has practice that is e.g. forbidden by constitutional
access to their personal information. In addition law in a country such as Portugal). In future, we
to this, citizens require more control over who has foresee an increased pressure from private par-
access to what (personal) information. Not only do ties to connect and combine their services with
they want to restrict access to certain governmen- governmental services. To avoid privacy and data
tal departments to protect their privacy, they also security problems, such a federated, non-global
demand openness to other (semi-governmental) identity infrastructure will be needed.
organizations (e.g. hospitals) to reduce adminis- To be able to resolve which objects are the same
trative overhead for citizens and civil servants. and which are not, we adopt identity services that
In the context of the latter, the general principle are able to understand this difference. The great
of granting privileges based on understanding advantage here is that new organizations can be
and accepting consequences is often referred to easily integrated in the architecture without the
as informed consent (Hoven et al., 2005). need to adapt their internal administration. In ad-
To maximize transparency and control, dition to identity services, we use authentication
citizens demand access to the same information services to authenticate users and authorization
and services as civil services. We refer to this services to manage authorizations. Authoriza-
requirement as symmetric service provisioning, tion services include functionality to handle the
which gives citizens a high degree of self-service concept of informed consent described earlier.
and the government a means to reduce cost of Finally, standardized information services should
operations. be offered by all those that administer informa-
The accessibility problem is addressed by our tion about the citizen, to provide access to that
approach of a service-oriented architecture where information. For preserving confidentiality, we
services can be replicated in order to provide the use encryption services in a conventional way
necessary 24/7 availability. Much more could be and will not further elaborate on encryption.
said about this, but availability problems have
well-known solutions and we will therefore not Future E-Government Service
address these in the remainder of this chapter. Architecture
The access problem related to access privi-
leges is addressed in several ways. First of all, The main services identified previously can be
we need to be able to identify users, information grouped into three main layers, as shown in Figure
and service objects. We make an important de- 8. On top, we see the citizen-facing services that
cision not to choose for global identification of present a unified, integrated view of the various
objects. Instead, we allow each organization to e-government services as follows. In the middle,

47
A Service-Oriented Reference Architecture for EGovernment

Figure 8. Service layers in future e-government architecture


Citizen-facing services

Process
Presentation
integration

Shared infrastructural services

Directory Authentication Authorization Certification Payment

Individual service providers

Information Subscription Adaptation Transaction Archive

Figure 8. Service layers in future e-government architecture.


An overview of the envisaged architecture that shows some more detail is given in Figure
we8.have
The afunctionality needed to services
layer of infrastructural realize all these services,
that thecreate
services to relations betweenwhole
an integrated them,that
andrepre-
the components that implement these functions
are shared across different agencies. At the bot- have
sents all
the been worked
end-user out
service. Wein more detail
envisage in
step-by-
architectural designs. As an example of this,
tom, we see the services for which these agencies we show the services and functions for
step plans as a tool to compose services in a very
process orchestration
themselves are responsible.in more detail. basic, end-user friendly way. These plans, present
An overview of the envisaged architecture the various sub-services as steps in an overall
Process
that Orchestration
shows some more detail is given in Figure scheme for delivering the integrated services.
8.AThe
core element toneeded
functionality realizetotherealize
visionallofthese
integrated, demand-driven
Service enactment e-government
is responsibleservicesfor execut-
is process orchestration. End-user
services, the relations between them, and the services to the citizen
ing the often
individualspan across
behaviours, multiple
i.e., sub-services
organizations,
components and their these
that implement behaviour must
functions be coordinated
have to deliver
of different servicethese services.
providers that realize these
Importantly, processes are non-atomic
all been worked out in more detail in architec- groups or chains
constituent of activity
services. that
Besidespresent
the interactive
generic composi-
behaviour
tural designs.toAsthe service consumer.
an example of this, we show the tion and enactment primitives, process services
We distinguish between service composition
services and functions for process orchestration and service
also supportenactment.
secondaryService
functions, composition
e.g. to log the
is concerned
in more detail. with the choreography of constituent services to create an integrated
service execution, and to perform transaction whole
that represents the end-user service. We envisagemanagement step-by-step andplans as a handling.
exception tool to Further-
compose services
Process Orchestration in a very basic, end-user friendly way. These plans, present
more, additional services may be needed the various
to adapt
sub-services as steps in an overall scheme for delivering the integrated
these constituent servicesservices.
to the context in which
AService enactment
core element is the
to realize responsible for executing the
vision of integrated, theyindividual behaviours,
are integrated, i.e., sub-
and likewise, to integrate
services of different service providers
demand-driven e-government services is process that realize these
information constituent
from services.
different sourcesBesides
to the this
present
generic composition and enactment
orchestration. End-user services to the citizen primitives, process services also support
in an integrated manner to the end-user. secondary
functions, e.g. to log the service execution,
often span across multiple organizations, and their and to perform
The maintransaction
functions and management
services within and our
exception handling. Furthermore,
behaviour must be coordinated to deliver these additional services may be needed to adapt these
architecture are illustrated in Figure 9. At the
constituent services to the context
services. Importantly, processes are non-atomicin which they are we
top, integrated, and likewise,for
see the functionality to service
integratecom-
information from different sources to
groups or chains of activity that present interac-
present this in an integrated manner to the
position. The bottom part shows the services of end-user.
The main functions and services
tive behaviour to the service consumer.
within our architecture
different are illustrated
service providersin Figure
that are 9. integrated
At the
top, we see the functionality for service composition. The bottom
into a high-level part shows
end-user service.theThis services
part, the
We distinguish between service composition
of different service providers that are integrated service into a high-level
enactment, end-user
is presentedservice.
in Thisdetail
more
and service enactment. Service composition is
part, the service enactment, is presented in moreindetail Figurein10.
Figure 10.
concerned with the choreography of constituent

48

21
A Service-Oriented Reference Architecture for EGovernment

Integrated
demand-driven service

Figure 9. Process orchestration


Integrated
Process coordination
demand-driven service
Interpreting Composing services Logging
service request process execution

Process coordination

Interpreting Step-by-step
Composing services Process status
Logging
service request plans processand history
execution

Directory Adaptation Step-by-step Information Process status


service service plans integration service and history
Authentication
service
Adapting
Directory Adaptation
sub-services Integrating information
Information
service service integration service Authorisation
Authentication
service
service
Repeated per service provider Adapting
sub-services Integrating information
Sub-service of Authorisation
service provider service
Notification Transaction Status information
Repeated per serviceservice
provider service service

Sub-service of
service provider
Notification Transaction Status information
service
Figure 9. Process orchestration.
service service
If we look in more detail at the sub-service delivered by an individual service provider,
we see that this sub-service may consist of at least three other services: a transaction
service for information access, Figure 9. Process
a service orchestration.
that provides status information, and a service
If we look in more detail at the sub-service delivered
that notifies the user of changes. These services are realized by an individual
using several service provider,
internal
we see that this sub-service may consist of at least three other
functions for internal process orchestration, authentication & authorization, access to services: a transaction
service
Figure 10.for
information, information
Realization access, a service
of sub-services
notification, etc., but of thatproviders
service
also using providesservices
external status information,
for authenticating and a service
and
that
authorizing users, and possibly services of other service providers as well.internal
notifies the user of changes. These services are realized using several
functions for internal process orchestration, authentication Sub-service of
& authorization, access to
service provider
information, notification, etc., but alsoTransaction
using external services for authenticating
Status information Notification and
service service service
authorizing users, and possibly services of other service providers as well.
Sub-service of
service provider
Transaction Status information Notification
serviceProviding service service
sub-service

Authorisation with Process Notification


service provider orchestration of changes

Providing
sub-service

Authentication with Authorisation with Information access Process Maintain NotificationParties to


service provider service provider with service providerorchestration status information of changesbe notified

Users at
Authentication Authorisation rules
with Authentic
Information access Dossiers
Maintain Process status
service provider Parties to
service providerservice provider information
with service provider status information and history
be notified

Users at Authorisation rules Authentic Dossiers Process status


service provider service provider Other service providers
information and history

Authentication Authorisation Sub-service of


service service service provider

Other service providers


Figure 10. Realization of sub-services of service providers.
Authentication Authorisation Sub-service of
service service service provider

Figure 10. Realization of sub-services of service providers.

22
49

22
A Service-Oriented Reference Architecture for EGovernment

If we look in more detail at the sub-service Commercial service providers such as financial
delivered by an individual service provider, we intermediaries might also be interested in provid-
see that this sub-service may consist of at least ing such an integration solution to their clients to
three other services: a transaction service for help them deal with government services.
information access, a service that provides status
information, and a service that notifies the user
of changes. These services are realized using Future Research Directions
several internal functions for internal process
orchestration, authentication & authorization, The Dutch Government Reference Architecture
access to information, notification, etc., but also that we have described on the previous pages is an
using external services for authenticating and important and growing influence on e-government
authorizing users, and possibly services of other developments in the Netherlands. Creating such
service providers as well. an overarching document has served not only to
This shows just a small part of the overall structure and organize the various developments
service architecture. Different elements of this are in this field, but also to bring together the archi-
worked out in much more detail in (Lankhorst & tects and developers of e-government solutions
Derks, 2006; Lankhorst & Derks, 2007). across many different institutions. As such, it
To realize the services identified here, we need is a milestone in the creation of a unified vision
a broad complement of technologies. Although on e-government in the Netherlands and it may
in most areas, the necessary technologies are serve as an example for other countries of the
starting to become available, there are still some way in which both the architecture itself and its
important gaps to be covered. Especially in inter- development process may be organized.
organizational coordination of processes, a light- At the moment, many government institutions
weight, easily configurable orchestration solution are assessing their compliance with the reference
is needed that is able to cope with different types architecture by investigating what the status
of services being combined, possibly from legacy and usage of the various architecture principles
systems that do not provide a clean Web service is within their own organizations. Although no
interface. Although the technology now exists to quantitative data are available yet, the general
perform intra-organizational process orchestra- impression is that about one third of the principles
tion, the different implementations of standards are already used in most organizations, one third
like BPEL by different vendors show that the are in the process of being employed, and the rest
necessary level of maturity for inter-organiza- are still being considered. Many organizations
tional orchestration has not yet been reached. And have explicitly stated that it is their policy to strive
a process orchestration language alone will not for compliance, so these number are expected to
suffice. Mechanisms for automated service-level improve in the near future.
agreements and e-contracting are also needed, and In the next years, the development of e-govern-
on top of that, a governance structure is necessary ment will carry on and accelerate. The availability
that coordinates the organizational policies and of national registers on persons, addresses, com-
actions towards the common goal of integrated panies, buildings, wages, pensions and the like
service provision. will create a great opportunity for almost every
This type of integrative functionality could governmental body to drastically redesign their
become part of a future version of the Personal service processes. It will create opportunities
Internet Page that was outlined in Sect. 1.4.5, for pro-active services, quicker responses, less
although this is currently not being planned. mistakes and less fraud. Projects are carried out

50
A Service-Oriented Reference Architecture for EGovernment

to harmonize data definitions, to integrate net- just on their exchange format. This may require
works, to develop sectoral and national service harmonization of legislation, with all the lengthy
buses, to harmonize meta-data, to set up a national procedures this entails.
governmental call centre and to develop many, Finally, the needs of citizens are not contained
many more electronic services. And beyond this, within the sometimes artificial boundaries of what
the perspective of cross-border integration in a are considered public institutions, and private
European context beckons. organizations would of course like to benefit from
However, much work still needs to be done public infrastructural services such as the national
on the demand side. Truly citizen-centred egov- authentication service described previously. On
ernment requires close cooperation between the the other hand, citizens are fearful of misuse of
various agencies involved to keep up with citizens their personal data if the government opens up
permanently evolving expectations, questions and these services to private use, and rightly so, as
needs. The coordination of business processes many incidents with e.g. identity theft illustrate.
across organizations, including the governance This private use of public infrastructures is there-
of these processes, is a difficult issue. As we fore not just a technical or organizational issue, but
have outlined, a service-oriented view on process requires policy makers to come up with a balanced
orchestration can be an important step forward. solution, weighing privacy, ease-of-use, economic
However, especially in the case of autonomous advantages, and many other issues.
organizations, it is very hard to orchestrate a
cross-organizational business process that realizes
a unified service to the citizen. Redistribution of Acknowledgment
tasks and responsibilities among organizations
might become necessary, but this can be a painful Part of this chapter results from the B-dossier
process for the people involved. project (http://b-dossier.telin.nl) of the Telematica
A second important problem is the integration Instituut, a combined research initiative with part-
of information between organizations. Many dif- ners from government and academia, comprising
ferent organizations use the same or very similar the Dutch Tax and Customs Administration, the
data, in many cases because of slightly different Municipality of The Hague, SVB, UWV, ING,
definitions in the regulations that are the basis ICTU, the University of Twente, and Delft Uni-
of their service. Removal of these duplications versity of Technology. The project aims to bring
would result in a considerable improvement in about truly integrated, demand-driven electronic
both efficiency and data quality. However, each services from government institutions to citizens
of these organizations uses its own formats and and companies.
concepts, and the shared infrastructure for in-
formation exchange we have described has yet
to be created. The national registries outlined References
in previous sections are an important step in
this direction, but not all data can (or should) be Alting van Geusau-Ghosh, S., Zeef, P, Toorn, H.
standardized and centralized. Although interoper- van, & Visch, E. (2006). Globaal Ontwerp Per-
ability at a technical level is achievable, as has been soonlijke Internet Pagina, version 1.2. The Hague,
shown in numerous practical examples, semantic The Netherlands: Stichting ICTU. Retrieved July
interoperability is much harder to accomplish, 17, 2007, from http://www.e-overheid.nl/data/
because it requires organizations to agree on the files/PIP/Globaal_Ontwerp_versie_1[1].2.pdf.
meaning of the various concepts they use and not pdf

51
A Service-Oriented Reference Architecture for EGovernment

Austria (2006). Administration on the Net An Derks, W.L.A., & Lankhorst, M.M. (2006).
ABC Guide to E-Government in Austria. Vienna, Definitie en conceptualisatie van het Bdossier.
Austria: Oesterreichische Computer Gesellschaft. Technical Report TI/RS/2006/013. Enschede, The
Retrieved July 17, 2007, from http://www.cio. Netherlands: Telematica Instituut. Retrieved July
gv.at/egovernment/umbrella/Administration_ 17, 2007, from https://doc.telin.nl/dscgi/ds.py/
on_the_Net.zip. Get/File-61820
Bayens, G.I.H.M. (2006). E-Government in The Dool, F. van den, Keller, W.J., Wagenaar, R. &
Netherlands: An Architectural Approach, Via Hinfelaar, J.A.F. (2002) Architectuur elektroni-
Nova Architectura, October 9, 2006. Retrieved sche overheid. Samenhang en Samenwerking.
July 17, 2007, from http://www.via-nova-archi- Zoetermeer, The Netherlands: Verdonck Klooster
tectura.org. & Associates. Retrieved July 17, 2007, from http://
www.e-overheid.nl/data/files/architectuur/archi-
Bayens, G.I.H.M., et al. (2007). Nederlandse
tectuurelektronischeoverheid.pdf.
Overheid Referentie Architectuur (NORA) v. 2.0.
The Hague, The Netherlands: Stichting ICTU. European Commission (2004). European In-
Retrieved July 17, 2007, from http://www.e-over- teroperability Framework for Pan-European
heid.nl/atlas/referentiearchitectuur/ e-Government Services, version 1.0. Retrieved
July 17, 2007, from http://ec.europa.eu/idabc/serv-
B-dossier (2007). B-dossier project Website.
lets/Doc?id=19529.
Enschede, The Netherlands: Telematica Insti-
tuut. Retrieved July 17, 2007, from http://www. Fountain, J.E. (2001). Building the Virtual State
b-dossier.nl. Information Technology and Institutional
Change. Washington, DC: Brookings Institu-
Bos, H. (2005). De ICT-strategie van de Gemeente
tion Press.
The Hague (2001-2007). Utrecht, The Nether-
lands: Informatiehuis. Retrieved July 17, 2007, Germany (2007). Standards und Architekturen
from http://www.egem.nl/projecten/voorhoede- fr E-Government-Anwendungen (SAGA 3.0).
gemeenten/kennisconferentie2006/documenten/ Berlin: Koordinierungs- und Beratungsstelle der
Evaluatie%20Haagse%20aanpak%20door%20In Bundesregierung fr Informationstechnik in der
formatiehuis.pdf?searchterm=None Bundesverwaltung. Retrieved July 17, 2007, from
http://www.kbst.bund.de/saga.
Burger@Overheid (2005). BurgerServiceCode,
versie 2.1. The Hague, The Netherlands: Burger@ Ghosh, S. (2006). PIP Architectuur white paper,
Overheid.nl. Retrieved July 17, 2007, from http:// version 0.3. Stichting ICTU, The Hague, The Neth-
www.burger.overheid.nl/files/burgerservice- erlands. Retrieved July 17, 2007, from http://www.
code_nl.pdf e-overheid.nl/data/files/PIP/PIP%20architectuur
%20whitepaper%20v0.3%20concept.pdf
Burger@Overheid (2006). Evaluatieonderzoek
2006. The Hague, The Netherlands: Burger@ Hong Kong (2007). The HKSARG Interoperability
Overheid.nl. Retrieved July 17, 2007, from Framework. Version: 5.1. Hong Kong: Govern-
http://www.burger.overheid.nl/files/b@o_evalu- ment of the Hong Kong Special Administrative Re-
atieonderzoek_bop_2006.pdf gion, Office of the Government Chief Information
Officer. Retrieved July 17, 2007, from http://www.
Denmark (2006). Architecture for e-Govern-
ogcio.gov.hk/eng/infra/download/s18.pdf
ment in Denmark. Offentlig Information Online.
Retrieved July 17, 2007, from http://www.oio.
dk/arkitektur/eng.

52
A Service-Oriented Reference Architecture for EGovernment

Hoven, J. van den, Wagenaar, R., Daskapan, S., of Amsterdam, Department of Accountancy &
Manders, N. Kenny, S. & Eldin, A.A. (2005), Information Management.
Managing Identity, Privacy & Profiles. Technical
Mettau, P. (2005). mijnoverheid.nl Publieke
Report TI/RS/2005/101, Enschede, The Nether-
Dienstverlening in de toekomst. The Hague: Het
lands: Telematica Instituut. Retrieved July 17,
Expertise Centrum.
2007, from https://doc.telin.nl/dscgi/ds.py/Get/
File-52040/TUD_sotas.pdf Steen, M.W.A., Lankhorst, M.M., Doest, H. ter,
Strating, P., & Iacob, M.-E. (2005). Service-Ori-
ITU (1995), Open Distributed Processing - Refer-
ented Enterprise Architecture. In Z. Stojanovic
ence Model - Part 3: Architecture, ITU Recom-
and A. Dahanayake (Eds.), Service-Oriented
mendation X.903 | ISO/IEC 10746-3. Geneva,
Software System Engineering: Challenges and
Switzerland: International Telecommunication
Practices, Hershey, PA: IDEA Group.
Union.
The Open Group (2006). The Open Group Ar-
Janssen, M., Gortmaker, J., & Wagenaar, R.
chitectural Framework (TOGAF) Version 8.1.1
(2006). Web Service Orchestration in Public
Enterprise Edition. Reading, UK: The Open
Administration: Challenges, Roles, and Growth
Group. Retrieved July 17, 2007, from http://www.
Stages. Information Systems Management, Spring
opengroup.org/togaf/.
2006, pp. 4455.
UK (2005). e-Government Interoperability
Lankhorst, M.M. & Derks, W.L.A. (2006).
Framework Version 6.1. London: Cabinet Office.
B-dossier architectuur. Technical Report TI/
Retrieved July 17, 2007, from http://www.gov-
RS/2006/014, Enschede, The Netherlands: Tele-
talk.gov.uk/schemasstandards/egif_document.
matica Instituut. Retrieved July 17, 2007, from
asp?docnum=949
https://doc.telin.nl/dscgi/ds.py/Get/File-61826
US (2007). Federal Enterprise Architecture.
Lankhorst, M.M. & Derks, W.L.A. (2007).
Washington, DC: Office of Management and
Towards a Service-Oriented Architecture for
Budget. Retrieved July 17, 2007, from http://www.
Demand-Driven e-Government. 11th IEEE Inter-
whitehouse.gov/omb/egov/a-1-fea.html.
national EDOC Conference (EDOC 2007). Los
Alamitos, CA: IEEE Computer Society. Wimmer, M.A. (2002). Integrated Service Model-
ling for One-Stop Government. Electronic Mar-
Lankhorst, M.M., et al. (2005). Enterprise Archi-
kets, special issue on eGovernment, 12(3):18.
tecture at Work Modelling, Communication,
and Analysis. Berlin: Springer-Verlag. Zachman, J.A. (1987). A Framework for Informa-
tion Systems Architecture. IBM Systems Journal,
Maes, R. (1999). A Generic Framework for Infor-
26(3):276292.
mation Management, PrimaVera Working Paper
99-03, Amsterdam, The Netherlands: University

53
A Service-Oriented Reference Architecture for EGovernment

Appendix: Overview of Main Architectural Principles

This appendix gives an overview of main architectural principles of the Dutch Government Reference
Architecture, sorted by the cells of the architectural meta-framework (Figure 1).

Organization

Governmental organizations are autonomous (subsidiarity principle).


Governmental organizations formulate core functions.
Governmental organizations cooperate, both horizontally and vertically.
Service orientation is a leading principle for governmental organizations.
Organization design supports multi-channel front offices.
Organizations cooperate within a service-oriented architecture.

Business Services

Organizations deliver separate and combined services towards their clients.


No wrong door: every starting point for governmental contact is OK.
Multi-channel service delivery.
The customer chooses the channel; the organization entices customers to use the best channel.
Channel harmonization is essential.
Pro-active services: The customer is pointed to relevant business services.
Business services can be a combination of underlying internal services.
Electronic identification, authentication and authorization are essential.

Processes

Business processes produce services.


Business processes are coupled by services.
The customer is starting and delivery point for services and process design.
Chain processes are controlled by the organization that has the (initial) customer contact.
Work processes are accomplished by both employees and IT systems.
Processes are automated unless this is not possible.
The customer can see the work in progress (tracking and tracing).

Employees and Applications

Applications serve only one functional domain inside an organization.


Applications serve only one organization.
Organizations are coupled by services.
Applications (and employees) carry out work processes; process management (BPM) and data
stores are separated from these work processes.
Employees use computer assisted case handling software (WFM).

54
A Service-Oriented Reference Architecture for EGovernment

Both workflow software and (unattended) applications controlled by business process management
software.
Front office channels can be coupled at local, sectoral and national level.

Data and Messages

Data formats are standardized.


There is a single point of control for data management; National registries are leading.
The government asks data once and uses it in many situations.
For messaging, the ebMS and Web services standards are used.
Received data and documents are enriched with metadata and archived.
Content and process data are differentiated.
Every data item has an owner and an administrator.

Information Exchange

Services and data are exchanged by a hierarchy of service buses.


Organizations are coupled by (sectoral) buses.
Communication protocols are standardized (ebXML, Web services, messages, fil transfer).
The infrastructure is highly available.
Straight through processing is preferred.

Technical Components

The choice of technical components is left to individual organizations (subsidiarity), provided that
they support the relevant standards and requirements regarding security and availability.
Systems critical to the service delivery have to be highly reliable.

Data Storage

National registries are leading.


Data is reused wherever appropriate.
Technical data model is standardized as much as possible independently of work processes.
Data and documents are separated.
Structured data is preferred over electronic documents.

Network Architecture

G2G data transport uses closed, protected networks or VPNs.


Communication with citizens and companies uses (protected) Internet.
Organizations are coupled by one gateway (incl. firewalls, intrusion detection, virus-scanning,
etc.).
Standard exchange protocols are used, preferably TCP/IP.

55
56

Chapter III
Role of Beacon Architecture in
Mitigating Enterprise
Architecture Challenges of the
Public Sector
Amit Bhagwat
Independent Consultant, UK

Abstract

This chapter introduces the concept of Beacon Architecture as a formalized and ordered grouping of
architectural elements, describing the constituents, their order, correlation and likely evolution of the
grouping; and illustrating its specific value to the public sector. The first half of the chapter builds up to
the concept, the reasons behind its specific nature, and its value to enterprises, especially in the public
sector. For this, the chapter is split into a number of sections that may be studied separately and that also
build up to introduce Beacon Architecture. The sections may be broadly divided as concepts, historical
overview, illustrative case studies in public sector transformations along with a summary of peculiar
architectural challenges they face, and a cyclical pattern to Architecture Development. After introducing
and elucidating on concept and constituents of Beacon Architecture, the chapter delves into its correla-
tion with architecture concepts in currency and its role in mitigating enterprise architecture challenges
illustrated earlier in the chapter, before concluding on an assessment of future trends.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

Introduction provides a brief journey through how Enter-


prise Architecture concepts have developed
Whereas the concept of Beacon Architecture and how sectors/industries have contributed
discussed here is an invention in so far as the to this. This also sets background to what
term, its precise definition/usage and its organiza- is and is not covered in present day popular
tion into ordered constituents go, the underlying EA frameworks, giving context to concepts
idea in generic terms is far from novel. Refer- introduced under Beacon Architecture.
ence architectures have existed in practically The third section, under the heading Public
all successful architecture governance regimes Sector Transformations, cites three ex-
and transformations, and in a good many of amples from the UK, which illustrate the
unsuccessful ones too. The precise connotation, consequences of a lack of development of
well-defined & ordered constituents and specific concepts, grouped under Beacon Architec-
relationship with architectural concepts such as ture later on in the chapter, thus establishing
Vision, Roadmap, Baseline & Target Architec- a background as to why Beacon Architec-
tures that underpin Beacon Architecture, are how- ture is important and citing some of the oft
ever not a predictable hallmark of such reference occurring inconveniences, wastages and
architectures. In this chapter, we shall start with even outright failures that can be avoided
aspects that define Enterprise Architecture as a by establishing it. The next heading in this
living thing, deliberate on architecture transfor- section, Enterprise Architecture Challenges
mation and its journey through the architecture Peculiar to the Public Sector, expands, sum-
development cycle, meander through evolution marizes and generalizes on this
of EA frameworks (most of which have had a The fourth section, under the heading Pro-
public-sector pedigree), discuss in some depth gression of Architecture Development Cycle
Enterprise Architecture challenges peculiar to elaborates the generic treatment followed by
the public sector, before delving into the con- a number of methodologies and architecture
cept of Beacon Architecture, its correlation with frameworks in effecting architecturally-
various architecture transformation concepts, its significant enterprise transformation
value to significant architecture transformations
and, in particular, its significance to definition, These sections provide the right background
governance and transformation of Enterprise to understand why constituents grouped under
Architecture in the Public Sector. the concept of Beacon Architecture are important
The chapter is organized into a number of and are sequenced as they have been. The Author,
broad sections. The first four of these lead up to in his role as Architecture Authority / Strategist
the Beacon Architecture concept: has formalized and successfully introduced in the
industry these constituents. The chapter then puts
The first section defines and deliberates on these constituents together in a logical order and
prevailing Enterprise Architecture concepts highlights relevance of such effort to the Public
and relates them, under the three headings Sector. The chapter ends with a pragmatic as-
Enterprise Architecture, Aspects of Enter- sessment of the likely resistance to establishing
prise Architecture, Transforming Enterprise Beacon Architecture and the likely scenarios of
Architecture its institutionalization over the next few years.
The second section titled Evolution of Enter-
prise Architecture Concepts An Overview

57
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

Enterprise Architecture from some of the commonly cited definitions of


Architecture, as relevant in our context, includ-
Of the many and varied definitions of the word ing the IEEE (Maier, Emery and Hilliard, 2001)
Enterprise, I am inclined to cite here the definition and UML (Booch, Rumbaugh and Jacobson,
followed in TOGAF (The Open Group, 2006) FAQ 1999) explorations of the concept, the following
it being used in the same context as ours: definition may be arrived at:

Any collection of organizations that has a common Architecture of a thing, at a given point in time,
set of goals and/or a single bottom line is its structural and functional organization, itself
decomposable as organization of components
The immediate, implicit, and, to many of us interacting through defined interfaces, recursively
obvious, logical progression from this is that En- composed of smaller components.
terprise Architecture, which needs context of an
enterprise, can only be as defined, robust, coherent Thus combining the two definitions, of Ar-
and serviceable, as the enterprise itself is. Turning chitecture and Enterprise, Architecture of an
the statement on its head, an enterprise can be Enterprise is:
explored for its definition, robustness, coherence
and serviceability, while exploring/defining its The (usually recursive) structural and functional
Enterprise Architecture. composition of components of a collection of
Practically all enterprises are in a certain level organizations, where the organizations have a
of flux, which creates its coupled field in context common set of (essentially functional) goals
of their architecture. The private sector though,
usually has either a clear enough domain of op- This definition therefore puts structure as a
eration (e.g. specific sets of financial services, function-enabler and as such its subservient, while
goods manufactured, etc) or, in case of diversi- placing clear emphasis on functional objectives
fied/multi-domain groups of organizations, the of the enterprise and of its constituents that are
practical prudence, often imposed by the variety geared to meeting objectives (or a coherent related
of domain-specific regulatory regimes that differ- set of them) of the enterprise.
ent organizations within the group operate under,
makes the group to be treated as a collection of
enterprises, rather than a single enterprise. The Aspects of Enterprise
private sector, being self-sustained and usually Architecture
competitive, also tends to prefer individuals with
experience and proven ability in the domain. Enterprises are rarely static, either structurally
Whereas achievements through individual abil- or functionally. When an enterprise transforms/
ity may not be a safe strategy for success of an evolves, it can involve changes that may be su-
enterprise, it certainly serves better than where perficial or that may fundamentally change the
the leaders may lack domain expertise, vision and structural and functional composition/interrela-
proven ability, and may all too often owe their tion of components that make up the Enterprise.
position to caprice of a higher political master. The latter are referred to as Architecturally
It is here, that results through definition rather Significant Changes. Structured transformation
than heroics, and thus the concept of architecture, techniques analyze and mitigate such changes
assume additional significance in the public prior to changes that build on the changed archi-
sector, over and above that elsewhere. Deriving tecture. For example, in the software/systems

58
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

development/transformation world, methods such helps effective governance of Enterprise


as RUP and XP refer to the Elaboration Phase Architecture.
and the Architectural Spike respectively, as phases Enterprise Strategy, i.e., in the long term,
in the development/transformation lifecycle what broad objectives/vision, the enterprise
where architectural changes are dealt with on has and in what priority, helps setting up
priority (in other words, the new architecture is Architecture Strategy, i.e. long term vision
established/proven) before the rest of the develop- of functional (and, based on that, structural)
ment/transformation. Changing the architecture organization and interrelation within the
however assumes that there is a body in charge Enterprise, geared to meet its strategic
of the architecture, and to be in charge of it, they objectives/vision.
know and are able to articulate to others, what
architecture is. In fact, in enterprises that have a well-formed
The following description elaborates on this Business architecture, Enterprise Strategy may be
by introducing and interrelating various aspects stated and elaborated as the reason of (and thus
of Enterprise Architecture: at the beginnings of) the Enterprise Architecture
strategy.
Architecture Definition, i.e. understand-
ing of what the structural and functional Enterprise Architecture (EA) Governance,
composition of components making up the i.e. custodianship/oversight of Enterprise
enterprise (and further, recursively, com- Architecture, enables maintaining currency
ponents making up these components) is,

Figure 1. Relationships among EA concepts


E n te rp ris e B u s in e s s Arch itecture E ATra n s fo rm a tio n E AGo vern a n ce
leads to success of
co m p le ted

maintains
currency and
effectiveness of owns

assists effectiveness of

E n te rp ris e S tra te g y E n te rp ris e Arch ite ctu re E AD e fin itio n

influences

facilitates enab les

E AS tra te g y E AR o a d m a p
enab les

59
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

Figure 2. Dependency web of EA concepts

E ATra n s fo rm a tio n E AR o a d m a p

E AD e fin itio n

E AGo vern a n ce E AS tra te g y

E n te rp ris e S tra te g y

of EA and is a precursor to successful EA tering its functional, and thus often structural,
transformations. composition, including adding to or refactoring
EA Roadmap, i.e. a staged, temporal descrip- its capabilities. This can only be achieved if a
tion of how EA might transform to meet EA body, often within the enterprise, understands
strategy, is enabled by EA definition and EA its architecture, and is thus able to plan and
strategy, and owned by EA Governance. oversee the architecturally significant aspects of
EA transformation, i.e. a clearly defined transformation of the enterprise, around which
step in taking EA from an existing/initial the rest of the transformation might happen.
state (often referred to as baseline state) to a Transformation needs governance, and intelligent
desired state (often referred to as target state), active governance, in turn, implies efforts into
in line with the EA strategy, is enabled by the definition, strategy and roadmap.
EA strategy, roadmap and governance. In a vast majority of successfully governed
enterprise architectures, a distinct group of el-
These relationships are pictorially represented ders, called Enterprise Architects in EA-aware
in Figure 1. The concepts thus form a dependency organizations, owns and oversees the enterprise
Web as depicted in Figure 2. architecture, including its transformation. These
individuals, apart from well developed analyti-
cal, lateral and linear thinking skills, need to be
Transforming Enterprise experts in at least one of the relevant subjects, but
Architecture with sufficient knowledge of other subjects that
relate to their expertise subject, to be able to be
We have surmised so far that transforming an circumspective thinkers and effective generalists,
enterprise might (and usually does) involve al- holding the bigger picture together.

60
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

Ownership of enterprise architecture involves proactively engineer change, so as to minimize


responsibilities such as: threats of sudden untested maneuvers.

Own business architecture


Define existing business architecture Evolution and Organization
Identify gaps in business architecture of Enterprise Architecture
Evaluate opportunity for architectural Concepts: An Overview
improvement
Through robustly and effectively The words Architecture and Architect have
engineered business become common currency in the IT industry
Through automated and efficiently relatively recently, while their application outside
functioning business the IT section of an enterprise (except of course
Objectively evaluate business stake- to mean architect of buildings & ships, and some-
holder wants and translate them into times as metaphor implying creator/visionary) is
business needs still something of a novelty. In the UK for example,
Define (or at least contribute to and about a decade ago, the role Systems Analyst was
formalize) business vision, strategy far more fashionable than say Solutions Architect
and roadmap is today. Most other forms of architects, perhaps
Consider impact of business needs on excluding Technical Architect, but definitely in-
existing business architecture cluding Enterprise Architect as we have discussed
Envisage best business architecture to in this chapter, were also generally unknown.
meet business needs There are some who would sneer at the changed
Liaise with owners of other aspects of designations, pointing out that the underlying
Enterprise Architecture approach and ability of the role performer have
Own and similarly work on other aspects of not necessarily changed, much the same way as
EA (applications, information, technology), individuals designated administrators a decade
while interrelating them ago, though these days routinely called managers,
have not necessarily become managers. Whereas
Put the other way round, adaptive and respon- such criticism would be apt in some cases, in
sive as they are, successful enterprises do not general, change has occurred in the way organiza-
transform until they understand their mission and tions, and particularly IT organizations, approach
mechanism (this understanding makes them adap- their tasks. It has become far more routine for
tive and responsive in the first place, rather than organizations to at least accept in principle that
panic-struck), and have ability to govern these. a component-based organization of teams (and
Among other things, successful organizations, teams of teams, etc) providing specific services
whatever their brand identity and generic values and linked through defined interfaces and pro-
& goals (e.g. customer satisfaction, being among tocol, where the whole organizational structure
the top five of their kind, etc), know whether or and functional coordination can be easily and
not they are single enterprises, and if not, what clearly visualized at desired level of granularity,
independent or near-independent organizations is a better approach to running organizations. In
with clear goals and separate bottom-lines (i.e. short, architectured organizations are good. The
enterprises) are they made up of. concept has been led by the IT industry, or the
This can further mean that successful enter- IT function within organizations, and so whereas
prises, or groups thereof, tend to foresee, and often Solution Architects are not a replacement for ana-

61
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

lysts (including systems analysts, when systems frameworks that have broadened, yet made pre-
happen to be part of the problem space), they are cise, the definition of architecture concepts, with
an important and necessary addition, now widely Enterprise Architecture concepts following one
accepted in the IT industry/function. step behind (The Open Group, 2006) and eventu-
Over the last few decades, the increased scope, ally forming an integral part of the Architecture
complexity and increasing importance of infor- Framework.
mation and of reliable information processing in Whereas an exhaustive commentary on all EA
everyday life have also helped institutionalize frameworks created so far may prove a candidate
concepts such as object-oriented programming for a book-series, I think I may be pardoned
(and further, object-oriented analysis and design), delving briefly into some of the better and wider
component-based development, service-oriented known frameworks.
architecture, etc that, as far as the underlying logic The development of concepts of Enterprise
goes, may have been applies in history, but were not Architecture may be likened to that of a snow-
formalized as such; while importance of avoiding flake. While groups of water molecules/icicles
the divorce between business and IT, where the are formed (and at times broken down) and are
latter enables the former, has been highlighted by in motion through air continuing through chains
approaches such Convergent Engineering (and of molecular interactions, a flake is recognized
further, Convergent Architecture) only when it gather sufficient mass to begin to
The lessons, whether on architecting systems, precipitate and holds the critical mass until it
the business, the human organization, or the En- has precipitated. It is generally believed that
terprise as a whole with all that it is made of, have such phenomenon occurred through efforts of
been learnt the hard way, often without learning John Zachman in IBM in the 1980s. Whereas
from others mistakes and usually with the IT far from complete and with scope for differing
function an enabler taking the lead. Further, interpretation, his framework was a widely noted
they have been learnt best where challenges of and fairly comprehensive attempt at blueprinting
the environment have necessitated their learning an enterprise through a two-dimensional schema
for survival of the organization and discharge of around communication interrogatives (what, how,
critical responsibilities that it is tasked. where, who, when, why) and stakeholder groups
This explains why in institutions relying (visionary, owner, designer, builder, implementer,
on public money and operating in democratic worker). Whereas both the interrogatives and
societies, where, at least in theory, the budget stakeholder classification are open to interpreta-
managers can always be held accountable by tion, the classification scheme has provided useful
the population, greater effort has been spared in basis for further development of EA concepts e.g.
developing architecture concepts and organizing architecture views depending on viewpoints
them in frameworks. The best example is the followed, layers of abstraction, and building blocks
defense industry, where most solutions are novel an omnipresent term in modern day architecture
- meant to be one step ahead of the adversary, frameworks (CIO Council, 1999).
huge level of secrecy exists with far less scope for A number of development methods existed
fair competition across a large number of merited and were being minted, when standards such
suppliers, where solutions are not necessarily as ISO/IEC TR 14252:1996 began appearing to
routinely testable in their entirety, and yet where, assist a number of roles such as consumers,
in principle, failure is not an option. systems integrators, application developer, etc in
The lessons learnt have resulted in develop- construction of information processing systems.
ment of gradually sophisticated architecture The temporal path of context, then principles, then

62
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

definition of key architecture elements, then trans- it is conceivable that Beacon Architecture may
formational planning, was formalized in Spewaks be referred in future versions of TOGAF.
Enterprise Architecture Planning methodology, The Command, Control, Computers, Com-
among other places. EAP and Zachman were in munications (C4), Intelligence, Surveillance, and
turn useful sources for the Federal Enterprise Reconnaissance (ISR) framework (C4ISR) suc-
Architecture Framework by the Federal CIO ceeded TAFIM as DoD EA framework and was
council; while the Federal Enterprise Architecture in turn supplanted by the more comprehensive
Practice Guide endeavored to formalize architec- DoDAF in October 2003. C4ISR provided key
ture transformation approaches in a variety of IS abstractions and organization through its views,
lifecycle scenarios (CIO Council, 1999). and useful EA principles, while leaving the EA
In the meanwhile, Technical Architecture transformational approach to methodology of
Framework for Information Management individual organization and directing its focus
(TAFIM) was being developed under US DoD on going into great detail on work products. The
(Department of Defense, 2007). TAFIM was of- name C4ISR is also interesting in being one of
ficially withdrawn in January 2000, where its jour- the very few attempts at trying to be descriptive
ney into the Open community began through The and explicit, while in reality allowing initiatives
Open Group Architecture Framework (TOGAF) to opt-out of the framework and return to the wild
contributed extensively in its early stages by the on the pretext that scope of the initiative could not
US Defense Information Systems Agency (DISA). be completely covered by the four Cs, I, S & R.
In particular, the TOGAF Technical Reference DoDAF, while it retains the views concepts
Model (TRM) was largely derived from TAFIM, from C4ISR, is really a compendium for every-
and the TOGAF Architecture Development thing currently followed by various US defense
Method (ADM) was originally based on parts bodies with commentary on their rationale and
of TAFIM. The Reference Models aspect of the interrelation. Whereas it has many useful sec-
amorphous concept of Reference Architecture was tions around principles and transformational
thus first widely seen formalized in the defense approaches, its collection nature is a testimony
pedigree of Architecture Frameworks. to the fact that the US DoD is not an Enterprise,
The ADM and TOGAF reference models have and so when asked to provide a consistent and
grown in maturity version on version, though it reformed approach (CCA, 1996) to Informa-
has only been in major version 8 where TOGAF tion Technology Management, the best that the
has assumed the suffix of Enterprise Edition. It DoD can hope to come up with is a collection of
also has fairly well defined role-based responsi- everything, thus providing standards for most
bilities and governance description. It provides a scenarios and a fair amount of useful wisdom, but
continuum of Reference Models (skeletal models no consistency across organizations and different
that should be instantiated and detailed to be scenarios, other than that they shall all follow
valuable in a typical enterprise), supplemented pertinent standards set for them. The desperation
with Standards Information Base and Platform with which DoD has periodically moved on with
Taxonomy, with a wider and expanding Resource its architecture frameworks and has ended up
Base provided as additional support. By the very with DoDAF (Department of Defense, 2007) a
nature of its contents, the level of organization di- collection of approaches followed within different
minishes from the ADM section to the Continuum organizations, is an excellent illustration of the
section, with the Resource Base section serving need for the elements that have been defined and
simply as a receptacle. Given the evolutionary linked together in a logical order under Beacon
path followed by TOGAF and its open nature, Architecture, later in this chapter.

63
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

There too are initiatives within defense col- people and are not bound by the kind of secrecy
laborators of the US to produce aligned architec- inherent in defense and other security establish-
ture frameworks, including the UK MoDAF (with ments2.
6 rather than 4 views), and various international These are not full-fledged case studies, nor
synchronization efforts, including the IDEAS illustrative examples of Beacon Architecture in
group. Whereas such synchronization efforts practice; rather these serve as Illustrations by
allow sharing of vocabulary and proven useful Absence by citing situations common to the Public
concepts, they do not give rationale, nor coher- Sector that constituents of Beacon Architecture
ence and common purpose, to the organizations can address.
involved.
Transformation by Redistributing
Responsibilities
Public Sector
Transformations On 8th June 2001, the Department of Work and
Pensions (DWP) came into being by combining
Unfortunately, the public sector, that is so often the employment part of Department of Education
far closely bound to tactical interests of political and Employment (DfEE) with the Department
leadership, does not always have the liberty of of Social Security. The department has a grand,
presenting itself as a domain of matured successful albeit too amorphous to be enterprise-specific,
enterprises that know precisely their long term purpose of To promote opportunity and indepen-
objectives and are geared to following a fairly dence for all through modern, customer-focused
well-defined roadmap, while continually making services. The department has never been able to
themselves efficient. satisfactorily understand, let alone explain, how
In greater part of a decade that I have spent can it promote opportunity by divorcing itself
assisting a number of public sector institutions (or from Education, with the result that the Employ-
privatized near-monopolies that used to be public ment segment of the department, referred to as
sector institutions and still have a one-to-one Jobcentre Plus, has never quite aligned itself to
governance by the government through specific the rest of the department (which largely deals
regulatory mechanism) in the UK, examples of with Social Security) nor quite detached itself
these institutions being constantly defined, refined from the remainder of the old DfEE (later called
and then, as a retrograde move, redefined, have Department of Education and Skills).
abounded, despite the period having been under In short, the DWP is not an enterprise. Its
the stewardship of a single prime minister1 and constituents have tried to cope with the politically
a single ruling party with comfortable majority imposed tactical change by trying to consider
behind it. A longer review of public sector organi- each of the services (such as Jobcentre Plus, The
zations in the UK, or, for that matter, most places Pension Service, The Child Support Agency, etc)
in the world, will show a far uncertain picture as a separate enterprise, making them just about
in terms of existence, let alone clear objective workable, but unable to leverage on integrating
definition, strategy and roadmap, of a public common functions (such as payment processing,
sector institution. identity management, portfolio management, etc
Following are three examples cited from the - becomes plainly evident to its customers who
relatively stable British socio-political scene, subscribe to more than one of these services).
considering three among the highest resourced In fact, although clearly imprudent in terms of
departments that are quite accessible to ordinary effectiveness of the department, budgeting and

64
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

running transformational programs at individual years of their continuous residence in the UK,
constituent unit level has been about the only way with many other whimsical get-out caveats that
of dealing with the disparate scene and reacting can indefinitely prolong this period) are however
to future political whim. not entitled to such social security and are liable
In theory, it is possible to create cloned com- to be deported if they are unable to make posi-
ponents to design and build common services and tive economic contribution within a fairly rigid
then give ownership of such cloned components occupation regime. Whereas the UK has a right
to independent business units (e.g. architecting to decide its immigration pattern, it is against
and building an identity management framework basic principles of democratic taxation for the
that can then be independently deployed and man- people by the people to collect national insur-
aged within two business units, with the option ance from foreigners not yet granted permanent
of regular synchronization of data and a common residence who do not have social security and
intuitive experience to the end user). However, who are liable to be deported should they fail to
independent political leadership of various busi- be economically contributing in a specific way.
ness units makes allocation and accountability Further, a wider accountability of where money
for such common budget, or even desire to do goes from the individual pots (income tax and
so, difficult. national insurance) in necessary if two separate
pots are to be maintained.
Transformation by Grouping The UK Inland Revenue never managed either
Responsibilities Together to separately account for expenditure out of the
two pots or to explain the rationale behind its
On 18th April 2005, the Her Majestys Revenue and separate National Insurance regime. It is therefore
Customs (HMRC) came into being by merging the counterproductive to add to the chaos through
Inland Revenue (IR) and Her Majestys Customs further merger, when individual constituents of
and Excise (HMCE). The stated purpose of the the HMRC have not yet defined their own busi-
merger was straightforward and admirable to ness and when the merged business is actually
reduce administrative overhead and to leverage expected to be two businesses running side by
on mutual infrastructure/facilities. side collecting very different types of revenues
The UK though, like many other regions the perhaps using separate floors of the same build-
world over, lacks a simple logical revenue sys- ing with a single receptionist which really did
tem. To consider just the direct tax taken out of not need merger.
salary, there are at least two headings income
tax and national insurance. Each heading follows Transformation by Creating New
its own distinct mathematical rules. In theory, Capabilities
Income Tax represents contribution made by a
UK resident to overall governance, security and The National Health Service (NHS) in the UK
commonly used facilities, whereas the national established the National Program for IT (NPfIT)
insurance is meant to be just that a premium in October 2002 to move towards standardized
paid into a common insurance pot to serve should electronic care record for each patient, thus creat-
someone lose means of livelihood or meet with ing a unified patient identity accessible across ~
an incapacitating situation requiring livelihood 30000 general practitioners and 300 hospitals.
at least part-supported by the state. Non-Euro- The program however was never architecture-
pean foreign nationals not yet given permanent centric and far less emphasis was laid on defining
residence in the UK (i.e. for at least the first five and explaining to the end user the exact nature of

65
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

the care record or associated data-relevance and Lack of definition of the enterprise as a set
protection safeguards. The program introduced of organizations with a well-defined, specific
additional level of abstraction, unaccountability (as opposed to such generic objectives as
and confusion to the governance structure by in- To promote opportunity and independence
troducing the concept of Local Service Providers for all through modern, customer-focused
(LSPs) for regions of England, where each LSP services) durable set of common objec-
provided exactly the same services in potentially tives/purpose
very different ways, thus creating maintenance, Lack of well defined, coherent business
migration and enhancement issues from the very architecture
near future, in what is, at least notionally, a unified Lack of long-term business strategy
National Health Service. Systems Transformation Lack of a transformational roadmap
was planned without considering underlying Lack of enterprise patterning to leverage on
Architectural Transformation, establishing an commonalities among sister functions/en-
architectural pattern and considering possibility terprises
of a robust single or cloned solution to address Lack of clear BAU (business-as-usual) and
exactly identical needs across different regions. transformational governance
Governance structure lacked as its key facets
explicit architectural governance or end-user I conducted a simple non-exhaustive exercise
(clinicians and patients) requirements and expec- of how various responsibilities associated with the
tations management. erstwhile UK DfEE have moved across depart-
Contractual independence and use of multiple ments between 1988 and 2007, and how related
providers for providing exactly the same services departments have changed. The exercise is, as
in different regions failed to manage risk, as sec- stated, not exhaustive, but even to the extent that
ondary/indirect providers for separate regions hap- it has been completed, it shows a myriad of func-
pened to be the same organizations and thus risked tion-transfers, where the only palpable motives
multiple regions together, while a long chain of in most transformations appear to be political,
contractual obligations left organizations involved to give a Secretary of State (a politician in the
without a clear view of requirements (particu- upper echelons of the government typically in
larly non-functional requirements that are largely charge of a department) greater or lesser power
solved by the architecture) and architecture, and and a unified budget to go with it. The results are
without palpable accountability that could be used shown in Figure 3, which illustrate how functional
constructively to deliver the program. The pro- cohesion can be compromised and considering
gram cost has inflated many-folds with functional the smallest atomic function (e.g. Employment)
delivery still hard to predict and non-functional as a separate enterprise, though often imprudent,
robustness completely unproven. can end up being the most straightforward and
organizationally durable way of dealing with the
situation.
Enterprise Architecture
Challenges peculiar to the
Public Sector Progression through the
Architecture Development
Our exemplified discussion about the public Cycle
sector reveals many characteristic challenges
including: Now lets step back to what a generic enterprise
might want to do having decided on an archi-

66
Amit Bhagwat: Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

Department of Education and Science Cabinet Office


Office of Public
Education Science Service

Spot the Enterprises

Reorgaization() Department of Trade and Industry


Department of Department of
Education Impartial to
Employment Education Office of Science and Technology
Science
ernment between 1988 and 2007

Department of Health and Social Security


Department of Education and Employment
Ministery of Health Education, Education, Dubbed 'Department of
Education: the rhetorical Deviants', 'Political
Merger() Jobcentre agenda used by a party that Graveyard', 'Unfit for
Ministery of Pensions and National Insurance WorkPermits
won three consecutive Purpose', etc, with ministers
UK
parliamentary elections regularly sacked/'reassigned'
-00-00

Split()

Reorganisation(00) Home Office (a.k.a. Department of Security, Crime, Narcotics, Counter-terrorism, Prisons )

Department of Department Of Transfer of Employment Transfer of Skills WorkPermits Homeland Sentensing, Probation, Prisons,
Health Social Security Function Import Function UK Security Reoffending

Deparment of Work and Pensions Department of Educaton


Department of Reorganisation
and Skills
Jobcentre Constitutional Affairs (00)
Plus

Split (00)

Deparment of
Justice
Department of Children Department of Innovation,
Schools and Families Universities and Skills

Separate from Child Separate from


welfare, protection and Employment
juvenile criminals under the DWP
management under DWP,
the Home Office and the
Department of Justice
respectively
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

Figure 3: Considering distribution of Education, Employment and related functions in the British Government between 1988 and 2007

67
Figure 3. Considering distribution of education, employment and related functions in the British gov-
Amit Bhagwat: Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

68
Target State (Envisioned) of
Envisioning Enterprise

Target State (Achieved) of Analyse Architecture Change


Enterprise

Analyse change to Business Architecture


enablers (IS architecture)

Analyse changes to enablers of enablers of Business


Architecture (i.e. Technology Architecture)

Analyse change to
Business Architecture
Execute change based on
architectural change ...

Compare among and Zero If multiple


on a target architecture architectural choices

Target State (Achieved) of


Architecture Target State (envisioned) of
Architecture
Figure 4. ADC in context of enterprise transformation

yes

Execute Architecture Change

Transition State (planned)


Plan Need transition state Yes
of Architecture
of architecture?

No No
Need further No
analysis?

Configuration
Control

Transition State (Achieved) Used transition state Verify Validate


Perform
of Architecture of architecture?
Yes

Oversee

Figure 4: ADC in context of Enterprise Transformation


Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

tectural transformation (presumably, having options involved in ADC in context of Enterprise


first known/understood prevalent architectural Transformation are illustrated in Figure 4.
state, desired changes and their implementation
orchestration and oversight).
The Enterprise undergoes a set of steps that Beacon Architecture
take the Enterprise Architecture from an as is to
a to be state. The steps form a cyclical pattern Beacon Architecture is intermediately detailed
whereby the set of steps, or at least considering long-distance architecture that an organization
all and taking some of the set of steps, in a given may define and aim to transform towards. The
sequence and with relevance to requirements driv- Beacon itself evolves; however, this is in order to
ing the transformation, would create a repeating fine-tune and accommodate needs of time, and not
cycle where the target architecture of a cycle to satisfy executive/political whims. The Beacon
would be the baseline architecture of the next is quite well defined in terms of Architectural
cycle. The cycle may be referred to as Architecture Principles, Objectives/roles of constituents, defini-
Development Cycle (ADC). tion and strategic objectives of the enterprise, and
rchitecture frameworks usually formalize this expands by citing patterns and mechanisms that
set of repeating steps into a method description. can build evolutionary architectural states.
For example, TOGAF refers to this by the term
Architecture Development Method (ADM) and Organizational Architecture
a cycle through these steps may be referred to as
an ADM cycle. The first input to long-distance view of enterprise
The set of steps, in generic terms, go through architecture is definition of the enterprise, to
the same treatment envisioning the target state, explore whether functionally the organization
analyzing changes to various aspects of the ar- represents a common set of goals and/or a single
chitecture (rationally going from the strategic to bottom line; if it does, what that is, if it does not,
the tactical, from the goals to their enablers, i.e. what enterprises or groups of enterprises (perhaps
business architecture to information systems ar- recursively) does the organization represent. In the
chitecture to technology architecture), comparing latter case (where the organization represents more
and zeroing down in case of options, and executing than one enterprises), the common set of goals
(planning, validating, overseeing, configuration- and/or a single bottom line should be understood
controlling, and verifying) change. in case of all enterprises involved, each taking
The amount of change that may be safely ex- into account its interrelation with the rest of the
ecuted in one cycle can however be limited and organization and defining/designing itself based
may not take the architecture to a target milestone on the principle of Design by Contract3.
state. In such situations, a transition architecture The result of this exercise is the Organizational
(or transitional architectural state) may be defined Architecture. We have commented earlier that
and used for the purpose of sanity check before architecture is function-driven and, in case of a
repeating the ADC sequence for a finite number good architecture, structure should be function-
of times (each intermediate cycle leading to a enabler. On the other hand, an enterprise having its
transitional state) ultimately leading to the target own defined visible goals and bottom-line, when
architecture. Here the transformation may con- also part of the organization, may need structural
clude or may be followed by changes building on elements to make it adequately self-sufficient,
the architectural changes, in both cases, leading to elements that may be dispensed with should that
next generation of the enterprise. Typical steps and enterprise no longer be an enterprise, but rather

69
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

an internal component of a bigger enterprise. 3. Redundant enterprise(s) within the


A number of scenarios are possible here: organization should be identified and
a. Either stakeholders operating at the
1. The organization is optimally architectured organizational level and thus able to
where there are no redundant structural ele- work beyond enterprise-level vested
ments in its compositions interests should be notified
2. The organization is a single enterprise and b. Or stakeholders directing individual
its function can be better delivered by im- enterprises should be brought together
proving its structure to reduce the number of redundant en-
3. The organization comprises of multiple terprises through consensus (here it is
enterprises, each with role complementary important to attain consensus whereby
to others and with a level of structural enterprise leader roles can be rede-
redundancy where disadvantages of such ployed to practical advantages rather
redundancy are lower than the advantages it than creating a mammoth third entity
offers in managing a body with well-defined adding bottom-lines of two separately
goal and optimal size. functioning entities and duplicating
4. The organization comprises of multiple managerial tasks while virtually retain-
enterprises, where each enterprise offers ing the two enterprises in disguise)
advantages in managing a body with well- c. Or a combination of the two options
defined goal and optimal size, but where
there is substantial structural (and internal Having taken these options to their logi-
functional) redundancy. cal conclusion and thus made the organization
5. The organization comprises of multiple structurally efficient and geared to deliver co-
enterprises, where there is no net functional herent set(s) of functionality, attention should
advantage in maintaining at least some of be focused on functional efficiency in terms of
these as independent enterprises. business process reengineering and automation,
thus leading to a further refinement in organiza-
This analysis should be followed by an exer- tional architecture
cise where
Business Beacon
1. Redundant structural elements within
individual enterprise, as opposed to those Having obtained a structurally and functionally ef-
redundant across a number of enterprises, ficient organization of enterprise(s), to effectively
are identified and scenarios unifying their meet present objectives of the organization, the
functions are considered next task is to detail a vision of what functional
2. Redundant structural elements across a objectives and environmental position does an
number of enterprises are identified and ways enterprise want to attain.
of making them efficient are considered, To illustrate, lets assume that the Jobcentre
including: Plus organ of the UK DWP discussed earlier, is
a. Unifying function of such elements identified as an enterprise, which can be made
across a number of enterprises efficient but can not be functionally subsumed
b. Designing such elements centrally and by other enterprises or become their internal
cloning them with operational owner- component. Its functional objective may then be
ship within individual enterprise stated as to create a framework that

70
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

1. Identifies, classifies, gives ability rating to, leading to another political entity coming to power
studies trends of and forecasts pattern of and reversing changes made by its predecessor.
a. Skills available in the society A clear and detailed Business Beacon drawn
b. Professional needs of the society by the highest executive body (the cabinet, in case
c. Members of the society in the role of of the UK) and attested by the highest legislative
single/multiple/versatile (doing one role body (the parliament, in case of the UK), among
but capable of another) /able (possibly other things, gives the enterprise in question a
doing one role but trainable on another) clear enough mandate and executive powers to
professionals subsume all such functions as are necessary to
2. Establishes a matrix of potential skill-role- discharge its role efficiently.
individual match based on An example of what can happen in the absence
a. Experience of such Business Beacon may be elaborated by
b. Ability citing the difficulties of timely role-skill match
c. Motivation in the medical profession, largely controlled by
3. Facilitates liaison across the government in the UK. In the UK, the NHS,
a. Professionals (including prospective under the Department of Health (DoH), is ulti-
professionals) mately an almost exclusive employer of all but a
b. Seekers of professional abilities (a.k.a. few senior clinicians / specialists. The jobs include
the marketplace) both relatively moderate-skilled jobs such as those
c. Providers of professional training (in- of junior/auxiliary nurses and high-ability jobs,
cluding senior professionals needing including those that are or are becoming highly-
apprentices) skilled (such as medical registrars on their way
4. Promotes value of equality of opportunities, to becoming recognized specialist consultants).
while preserving human dignity, whereby At the high-end, the specialties are a sophisti-
a. Individuals in the society achieve sta- cated set of skills. The compartmentalization of
tion in life based entirely on responsibilities and the notion of higher ability
i. Ability = more self-reliance, means that Jobcentre Plus
ii. Motivation attracts customers and employers focusing on
iii. Experience moderate skills, and, in turn, is unable to build
b. All humans living in the society, profile of high-end skills / high-ability skill-sets.
including foreigners resident in the The NHS itself is administration-centric with
society with due mandate, are treated managers, often of very average ability, manag-
with respect and courtesy due to every ing clinicians of greater ability. It therefore has
human even poorer capability in skills measurement.
The DfES that looks after education and skills,
If an enterprise is able to set its Business couples loosely with Jobcentre Plus and practically
Beacon with at least this clarity, there will be a not at all with the DoH. Since the UK clearly has
realistic possibility of moving in the right direction far fewer medical graduates than an inefficient-
and moving forward at all, rather than periodi- yet-effective NHS would need, a section of the
cally going in circles. The latter syndrome is of Home Office the department identified in public
particular significance in public sector institutions perception exclusively with Crime and that has a
in democratic societies, where a lack of Business suitably negative attitude towards its interlocutors
Beacons can make the institutions inherently in- steps in to grant visas to foreign medical gradu-
efficient, thus set in anti-incumbency sentiment, ates, to work and settle in the UK. Having done

71
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

that, none of the departments are responsible for Business Architecture Strategy
welfare of these foreigners legally immigrating
and even invited into the UK. Many of them (and The business architecture strategy, i.e. long-term
even British medical graduates) struggle to find vision of functional (and, based on that, structural)
jobs, not because their skills are not needed, but organization of the business, should ideally emerge
because no one is in charge of matching high-abil- out of the exercise of defining Organizational
ity clinical skill needs with available resources, Architecture and Business Beacon. Alternatively,
integrating unmet needs with foreign resourcing should a body of Business Architects be commis-
and ensuring welfare of those foreigners as equal sioned to come up with the BA Strategy, they would
members of the society, even in the case of errors need to ensure that Organizational Architecture
in resource matching. and Business Beacon exercises are satisfactorily
The situation is further complicated by the fact performed. It is also at this point that priority
that most departments, due to historical feudal (including that of interactions with environment
reasons and despite the moderate demographic of the enterprise) and dependency (including that
and geographic size of the UK, operate at at least on elements of environment of the enterprise)
three levels: should be palpable and formally laid out.
Architecture Infrastructure Capability En-
The union (called the nation elsewhere in gineering Practice Definition
the world) Before moving any further with architecture
The nations such as England, Scotland, etc artifacts and ideally even as the BA Strategy is
(called states/provinces elsewhere in the being formulated, the enterprise should test its Ar-
world, except that in the UK the legislative chitecture Infrastructure capability. Architecture
power of each Nation is vastly different, is requirement-driven, involves careful manage-
overlapping and inconsistent) ment of assets, is subject to controlled change
The counties and involves management of transformations
(projects). We therefore need capabilities for:
with the NHS adding a fourth concept, that of
region, between the nation (e.g. England) and 1. Requirement Management
county. a. Plan
Such inconsistencies can be minimized and b. Dependency Mapping
definition, reason of existence and achievements c. Compositional Mapping (a requirement
of a public-sector enterprise can be positively being subsidiary to another)
influenced by a clear-enough Business Beacon, d. Quantification and Parameterization
approved and committed to by the highest set of (including sizing and prioritization)
stakeholders. e. Traceability
The phrase Environmental Position has been f. Articulation (including through mod-
used in the first paragraph of this section to mean els, charts and multimedia)
positioning with respect to other agencies / busi- g. Project Management Integration
ness partners and peers (which may mean similar 2. Configuration Management
function in another country/state etc in case of the a. Plan
public sector, or a similar business in the market b. Asset Library
place in case of the corporate sector). c. Version Control
d. Configuration Inventory and Audit
e. Collaborative artifact development
support

72
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

f. Project Management Integration happen to meet the strategy. The roadmap there-
3. Change Management fore gives a sense of sequence, goes deeper into
a. Plan milestone states & transformational steps, and
b. Impact Metrics leads to resource planning and definition of trans-
c. Project Management Integration formations (projects/programs). It is preferable
to have the Roadmap nailed to specific calendar
These capabilities are collectively referred to dates, particularly given that external stimuli and
as Engineering/Support Capabilities and should collaborators expectations from the enterprise
be articulated through Engineering Practice may be associated with specific calendar dates.
definition. In recent times, many matured inter- It is however possible to leave the roadmap at a
connected tools are available to automate and sequence of initiatives stage, if the utilization
better control and audit these capabilities. Build- model of resourcing is practicable and followed
ing and successfully testing such infrastructure (i.e. where initiatives are slotted on the calendar to
would give additional assurance and stability to utilize available resources, rather than resources
progressing towards the Beacon. Only after the are made available for calendar-bound initiatives),
Engineering Practice is defined and preferably the provided that external stimuli are not expected to
associated infrastructure is established and tested, invalidate key transformational states when these
should development of the Beacon Architecture states are reached at a different calendar date.
continue through a detailed Roadmap. Business Architecture Contingency Plan
Regarding the establishment and testing of the This is really an integral part of a matured
Engineering Capability, it is often argued that tools Business Architecture Roadmap. The roadmap
are transformation enablers and organizations should take into account probable, possible and
should not be shackled to a particular choice of ideally, every plausible scenario along the roadmap
these when what is really important is managing and create a sequence Web, including contingency
the transformation. Whereas there is merit in this transformations and associated transitional mile-
argument and an organization need not be obses- stones that would not need to happen in a happy
sive about a particular set of tools they being day scenario, thus giving robustness to the BA
means towards an end organizations should Roadmap. This is a lot easier with Requirement
nonetheless invest in proving their Engineering Characterization Capabilities built as part of the
Capability, thus proving and beginning to insti- engineering capabilities, as that allows consider-
tutionalize the Engineering Practice Definition, ing which requirements are optional or might be
rather than keeping it in the form of an unproven de-prioritized with least business impact. Ad-
thesis. The organization should then be open to ditional contingency measures may exist in the
changing its infrastructure, including engineering form of contingency resources, either available,
practice enablers, in a structured, evaluated, risk- or acquirable from stakeholders.
mitigated and change-managed way, as defined in
its Change Management Practice Definition (part Operational and Developmental
of Engineering Practice Definition). Alternatives Analysis

Business Architecture Roadmap At this point, the Business Architecture trans-


formational path is sufficiently well understood
As explained while deliberating on aspects of to consider how its enablers, most notably In-
enterprise architecture, the Roadmap is a staged, formation Systems, evolve to meet the Business
temporal description of how transformation might Architecture Roadmap. The first step in this is to

73
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

evaluate, compare and contrast various alterna- inputs are pertinent in long-term progression of
tives, followed by setting out an enabler roadmap the Enterprise and can form part of the Beacon
(more specifically, an Information Systems Archi- Architecture.
tecture Roadmap interlinking Information with
Applications) tying in with the BA Roadmap. This Enterprise Governance, and
process also involves considering each business Correlation to Architectural
alternative and contingency point to evaluate Governance and Transformation
whether the Information Systems evolution path
will need to change to react to different business An aspect of Enterprise definition is Enterprise
situations. Arguably, the Information Systems Governance Definition. While those defining the
roadmap is less detailed and may give a set of Enterprise would inevitably define its Architecture
solutions applicable under a variety of BA road- (alternatively, enterprise may be defined while
map and contingency scenarios. defining its architecture), it is imperative that
Further enablers (such as technology enabling Architectural Governance is formally defined,
the Information Systems) follow similar treatment. with due influence on Enterprise Governance,
However, given the nature of changes in the tech- to keep the enterprise on its chosen path. Fur-
nology sector and role of technology as enabler of ther, whereas vision and strategic thinking are
enabler (enabler of Information Systems) rather important qualities of all leaders, Architectural
than goal, the deliberations on technology should governance should incorporate qualities of both
remain generic at continuously exploring and a good Enterprise Architect (a relevant special-
observing proven technologies and considering ist with sufficient generalist skills and aptitude
their deployments in emerging Information Sys- to collaborate with peers and hold the enterprise
tems scenarios. The Beacon Architecture should together) and a good leader. It is important to detail
therefore confine to the processes necessary for both the governance mechanisms, and qualities
evaluating and keeping abreast with changing & expertise expected of key governance roles, as
technologies so as to deploy a safe, efficient and part of the Beacon.
affordable solution that is available at modest tim- The Beacon should then elaborate on definition
escales, rather than predicting long-distance target and governance of transformations (projects/pro-
technologies (and further, associated brands). grams) to tie in with the Roadmap.
Figure 5 diagrammatically represents constitu-
Information Systems Patterns and ents of Beacon Architecture, also giving a sense
Frameworks of dependency and recommended sequence.

Whereas Information systems are Business


Enablers and thus changeable with the business, Correlation of Beacon
many so called framework services e.g. identity Architecture with Target,
management, audit trail, etc, are fairly stable, can Transition and Reference
be predicted and robustly designed beforehand. Architecture
There can also be generic patterns of information
operations and specific patterns of information The term Reference Architecture has been used
operations attached to generic business opera- quite generically by Architects and with different
tions, which can be designed in efficient, safe and connotations, including meaning either present
reusable manner, so as to make the solution more architectural skeleton to be aware of in planning
predictable while also attaining economy. These transformation or a to-be broad-brushstroke state

74
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

Figure 5. Constituents of Beacon Architecture


B e a con
Arch ite ctu re

E n te rp ris e G o ve rna n ce , a nd co rre latio n to


Org an iza tio n a l Arch ite ctu re Arch ite ctu ra l Go ve rn a n ce a n d Tra n s fo rm a tio n

In fo rm a tio n S ys te m s
P a tte rn s a n d Fram e w o rks
B u s in e s s B e a con

B u s in e s s Arch ite ctu re B u s in e s s Arch ite ctu re


S tra te g y Roadm ap

Op e ra tio n a l a n d D eve lo p m en ta l
Arch ite ctu re In fras tru ctu re C a p a b ility
E n g in e e rin g P ra ctice D e finition Alte rn a tive s An a lys is

B u s in e s s Arch ite ctu re


C o n tin ge n cy P la n

of architecture coupled with a set of principles ate Transition Architectures may be defined to
governing the overall direction. In this latter sense, control the change and validate it at intermedi-
Beacon Architecture is an elaborated Reference ate states expected during the transformation
Architecture, with specific meaning and mandat- by spanning the transformation across multiple
ing an essential set of formalized information, to ADM cycles.
be considered adequate. Its principal merit is in The Roadmap in Beacon Architecture defines
clearly defining what the Enterprise(s) considered at least the Target states of Business Architecture
is (are) and how the Enterprise should transform Transformations and potentially also some of the
vis--vis its objectives and operational model; Transition states. It may provide similar treatment
while the usual deliverables of typical CIO/CTO on Information Systems Architecture, which en-
Reference Architectures in terms of Services ables the Business Architecture, but is less likely
Framework, Systems management principles, etc to be fully elaborated/constraining on transition
can be useful inclusions. states of IS Architecture further down the line;
Beacon, Target and Transition are all to be its function being that of a Beacon and not of an
Architectures. As explained in context of the administrative impediment. For this reason too,
Architecture Development Cycle, Target Archi- whereas it may present possible scenarios of
tecture is a to-be architecture state anticipated out technological evolution, it is unlikely to rigidly
of a transformation. If the architectural change state Technology Architecture states during and
is so significant as to consider it imprudent to be as a result of future transformations.
undertaken in a single ADM cycle, intermedi-

75
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

Role of Beacon Architecture enough generalist understanding of related areas


in Mitigating Enterprise to be able to liaise with other contributors to the
Architecture Challenges enterprise (which is essentially the role description
peculiar to the Public of an Enterprise Architect), is the only way that
Sector a long-term rational roadmap can be presented
to the executive (including the ordinary people).
Beacon Architecture, by its very nature, provides Further, such roadmap also deliberating on effec-
definition, including future recommended defini- tive mechanism for governance of the enterprise
tion, to the enterprise and helps it relate with its and its transformation is, if applied, likely to
environment, including collaborating enterprises. provide effective leadership to the enterprise. For
In this respect, enterprises in all sectors and this reason, Beacon Architecture is particularly
of all complexities benefit by defining Beacon pertinent to the public sector.
Architecture. In public sector though, Beacon
Architecture has additional significance.
To begin with, definition of an enterprise, with Future Trends and
definite specific set of goals, is harder to come by Conclusion
in the public sector. Many public sector institutions
are monopolies and escape sector-based regula- The one thing that has been clear throughout this
tory regimes as applicable to the private sector. chapter is that Enterprise Architecture is not the
Often the only directive, rather than regulatory, prerogative of the IT/IS function. Information
disciplining influence comes from international Technology supports Information Systems, which
protocols rather than binding, scrutinized and support Information Management, which has
tested legislation within a sovereign nation. The been key to smooth running, and even effective
legislative bodies are usually made of individuals survival, of any enterprise, however far back in
who lack specialist understanding to precisely time we might go. What we are looking for in an
define enterprises in the public sector and the Enterprise Architect is a set of well developed
executive bodies usually structure and lead in- analytical, lateral and linear thinking skills, ex-
stitutions with political motivation. In democra- pertise in at least one of the subject areas relevant
cies, whereas the additional level of scrutiny and to the enterprise and sufficient knowledge of other
balance of opinion help reduce fanatical extremes subjects that relate to this expertise subject area,
of ideas, the constant pressure on both the legis- to be able to be a circumspective thinker and
lative and the executive bodies to be seen to be effective generalist, able to see and contribute
serving and the need to win popular support for to holding the bigger picture together. It just so
the near future, discourages serving quietly and happens that when we look back through the last
confidently with investment in long-term strategy. three decades (which is minuscule time when
As none of the executives the chosen represen- looking at history of the concept of Enterprise),
tatives, the indirect rulers (ordinary people) or we observe that the IT industry/function has been
administrative civil servants, possess adequate a powerful magnet for such individuals, and, more
domain expertise, they are usually incapable of importantly, has organically grown and retained
defining, designing and leading an enterprise to these skills, through the type of work required
be of long-term effective service to them. of its practitioners.
Beacon Architecture created by an indepen- This means that on the one hand, the Enterprise
dent body of professionals with proven domain Architects need not be drawn exclusively, or even
knowledge and analytical skills, coupled with predominantly, out of the IT/IS function, and

76
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

should definitely not be looked at by the rest of The latter may also involve unified develop-
the organization as those brainbox technologists ment and separate operational deployment, where
who keep talking Latin. On the other hand, if we the IT/IS functions clearly see similarity and
are hoping to get a sizable collection of thinking emergence of patterns in what is expected of them,
minds, and more importantly, a team that can read- but are asked to manage their systems separately
ily structure, understand, appreciate and realize and often with changing business organization, by
its function, then there is a high likelihood that the business owners. In general, the public sector
the IT/IS function might take the lead. In fact, is likely to take lead in demonstrating these two
whereas I am not at liberty to divulge specifics aspects alongside a formalized and repeatable
the metrics leading to the conclusions being approach to Information Systems Patterns and
confidential I feel at liberty to point out that Frameworks (for which the public sector has both
there has been evidence in functions/enterprises the time and justification of budget constraints, be-
within UK government departments I have worked ing less keen to substitute money for time than the
with, to indicate that those functions/enterprises corporate sector). This may be considered the first
that have, high up in their ranks, people with the generation of Beacon Architecture Evolution.
Enterprise Architect qualities (who, given history The key role of Business Architect, with
of last three decades, predominantly come from the characteristics of an Enterprise Architect, is still
IT/IS function) the function/enterprise head in maturing. Many aspects of Beacon Architecture
one case, tend to be better performing enterprises that depend on this role will mature with this role.
with something of their Beacon Architecture (as Organizational Architecture and Governance
we have defined it here) already defined. aspects would be most volatile, while also be-
Taking this cue, whereas we may not be able ing resistant to structure and controlled-change.
to mandate appointment of individuals with Therefore the remaining aspects will be demon-
Enterprise Architect characteristics in visionary strably formalized first, the contingency plan
or function-leading roles nor revolutionize the developing as constituent of the Roadmap:
education system to identify and develop these
abilities in the very near future, we can definitely Business beacon
get those functions where such individuals tend to Business architecture strategy
exist in higher concentration to define themselves Business architecture roadmap
clearly and perform well, thus creating example Business architecture contingency plan
for other functions and the larger organization/
enterprise to follow. Here, the corporate sector, perhaps motivated
In this respect, although steps involved in by market pressures and competitor evaluation,
defining the Beacon Architecture have definite is likely to take the lead. This may be considered
temporal relevance/dependency, it is possible the second generation (or second phase of the first
that those steps that can be demonstrated within generation if you like, as these developments can
the IT/IS function may get demonstrated and happen independent of the first generation/phase)
institutionalized first. of Beacon Architecture evolution.
This means that in the near term we would Periodic synchronization of ideas across
see greater evidence of: the Corporate and Public sector may then help
establish all aspects from Business Beacon to
Architecture infrastructure capability en- Information Systems Patterns & Frameworks in
gineering practice definition proper order, and connect them. The dependent
Operational and developmental alternatives aspects will then fine tune with aspects that
analysis

77
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

they depend on, thus improving the Beacon and reorganizing administration to redistribute
Architecture. The synchronization between the patronage, continues. In fact, modern advent of
Corporate and Public sector is not the easiest to mass communication has put additional pressure
realize, given tendency of practitioners in respec- on top executives to be seen to be decisive and in
tive sectors and even domains therein (such as control, while really trying out hopeful permuta-
financial services domain) to stick together and tions. To take example of the very important and
do things their own way. Once again, consultants, conspicuously underperforming British Home
often branded IT-related consultants, who work Office, we observe that in its early days, in the first
independently and have sufficient recognition 10 years under the stable and effective premier-
(or at least curiosity to check others work) right ship of William Pitt the Younger (i.e. ~1783-1793),
across the business spectrum, will be key to the there were just four Home Secretaries, the first
synchronization process. resigning within a week of taking office and thus
The principal impediments to creation of really not to be counted as an enterprise leader,
effective and durable enterprises lack of vi- while the fourth continuing his service beyond
sionary ability, lack of consensus on means (and the 10 years. In the 10 years that the last British
sometimes also ends) and, often, also a lack of Prime Minister, Tony Blair, was in office, with
acceptable level of sincerity among enterprise comfortable majority behind him, once again,
leaders, will be the principal stumbling blocks in four Home Secretaries served. In this case though,
the process of defining optimized Organizational they all left office sincerely attempting to lead
Architecture. the organization and after being demonstrated
There is hope on this front though. Looking not to be in sound control, or fully following the
at those who set out public-sector objectives in definition and interfacing of the organization they
the UK over the last 100 years or so, we see pal- commanded; while each, in his turn, performed
pable improvement in the maturity level of the reorganizations within the department, without
enterprise leaders (the politicians), perhaps as a demonstrable success and often with visible fail-
result of increased maturity of those who appoint ures highlighted by the media. The last of these
them (the electorate). About 100 years ago, it was a Home Secretaries, John Reid, ended up leading
norm for people of the ruling classes, irrespective three separate key departments of the govern-
of their ability, to rule with strong prejudices set ment Heath, Defense and the Home Office, is
by the establishment they grew-up in. Later, as three years, with clearly no time to understand,
the labour movement took roots, the governments let alone contribute to rational definition of, the
alternated between regimes that were, by present organization that he was asked to lead.
day standards, extreme left or right winged. Like Apart from challenges to definition and gov-
a dampening pendulum however, the swings have ernance of enterprises, caused by politics (which
reduced in their span in successive elections, also exists, to a degree, in the corporate sector), a
where today it is realistic for all candidate leaders greater challenge is posed by governance by non-
to share objectives of progressive welfarism, thus professionals. This latter challenge too exists in
not necessarily setting about undoing everything the corporate sector, but manifests more vividly in
that previous government tried to do. the public sector, particularly where elevation to
The means to the end however are not yet leadership position is a direct outcome of admin-
agreed on and are definitely not effective, which- istrative seniority. Further, in such circumstances,
ever political faction is in power, while the practice senior administrators tend to address risk to their
of the higher executive dispensing privileges position caused by their lack of professional and
to their subordinates based on political loyalty, analytical expertise, by delegating responsibili-

78
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

ties usually in a supplier chain mode to other ary improvement in social maturity fostering
administrators, where no individual administrator organizational maturity. In both cases, being able
takes blame for failure. to observe and communicate with the rest of the
The example of the UK NHS National Program fast-shrinking world will be important.
for IT (NPfIT) cited earlier, illustrates this point. The evolutionary path that I foresee being
Whereas the program has been variously scoped taken for development and institutionalization
and re-scoped throughout, its basic objective has of Beacon Architecture is depicted in Figure 6.
involved a functionally simple, yet architecturally Attaching a timeline to this will need further
substantial problem - that of creating a unified observation of future developments.
patient care record mechanism that would cope
with typical non-functional requirements (volume,
performance, security, availability, etc) of medical References
service of a medium-sized nation. The fact that this
problem, relatively simple to solve for a group of Booch, G., Rumbaugh, J., and Jacobson I. (1999).
professionals who design systems robust enough The Unified Modeling Language User Guide.
to address non-functional requirements (various New York, NY: Addison-Wesley Object Technol-
IT architecture specialties) and who can rationally ogy Series.
decide needs of the patient care record (clinicians
CCA. (1996). Clinger-Cohen Act of 1996: In-
and business analysts), has snowballed into one
formation Technology Management Reform,
of the worlds most expensive, yet uncertain and
Public Law 104-106, Fiscal Year 1996 Defense
non-functionally unproven transformational pro-
Authorization Act.
gram, can directly trace its roots to the number of
senior roles of administrators and multiple levels CIO Council. (1999). Federal Enterprise Ar-
of delegation involved in running the program, chitecture Framework, Version 1.1. Retrieved
where few relevant professionals can be seen February 20, 2008 from http://www.whitehouse.
playing key visionary or executive roles. gov/omb/egov/a-1-fea.html
Of course, it is tantamount to fortune-telling
Department of Defense. (2007). The Department
gazing into a crystal ball, to try to guess how and
of Defense Architecture Framework Version 1.0.
when will the Organizational Architecture aspect
The Department of Defense. Retrieved February
of Beacon Architecture become the norm; though
20, 2008 from http://www.defenselink.mil/cio-
when that happens, it will help fine-tune other
nii/docs/DoDAF_Volume_I.pdf DoDAF 1.5
aspects of Beacon Architecture and define the last
aspect that of prudent Enterprise Governance, Maier, M.W. Emery, D. and Hilliard, R. (2001).
and correlation to Architectural Governance and Software Architecture: Introducing IEEE Stan-
Transformation, thus taking Beacon Architecture dard 1471, IEEE Computer. April 2001, Vol.
into its fourth generation. 34-4, 107-109.
The fastest scenario is one of a strong and
The Open Group. (2006). The Open Group Ar-
popular leader of a significant enterprise happen-
chitecture Framework Enterprise Edition Ver-
ing to possess the Enterprise Architect qualities, or
sion 8.1.1. The Open Group Architecture Forum.
at least recognize them and provide environment
Retrieved February 20, 2008 from http://www.
conducive to their application, thus providing
theopengroup.org/
demonstrable examples for others to follow. The
slowest scenario would be of ongoing evolution-

79
80
Amit Bhagwat: Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

First Generation: Public Sector G : Architecture Infrastructure Capability G : Operational and Developmental G : Information Systems Patterns
Driven: Cost-focussed Engineering Practice Definition Alternatives Analysis and Frameworks

Second Generation(?): G : Business G : Business Architecture G : Business Architecture G : Business Architecture


Corporate Sector Driven: Beacon Strategy Roadmap Contingency Plan
Competitive Survival Fucussed

Third Generation: Sector G : Business G : Business Architecture G : Business Architecture G : Business Architecture
Cross-bread and aspect Beacon Strategy Roadmap Contingency Plan
refinement, Information
Systems Patterns and G : Architecture Infrastructure Capability G : Operational and Developmental G : Information Systems Patterns
Frameworks realignment Engineering Practice Definition Alternatives Analysis and Frameworks

Fourth Generation: G : Business G : Business Architecture G : Business Architecture G : Business Architecture


Organizational Architecture, Beacon Strategy Roadmap Contingency Plan
Governance, Correlation and
Realignment G : Information Systems Patterns
G : Architecture Infrastructure Capability G : Operational and Developmental
Engineering Practice Definition and Frameworks
Alternatives Analysis

G : Organizational G : Enterprise Governance, and correlation to Architectural


Architecture Governance and T ransformation
Figure 6. The likely path of adoption and institutionalization of beacon architecture

Figure 6: The Likely Path of Adoption and Institutionalization of Beacon Architecture


Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector

Additional Reading Foundation for Business Execution. Boston, MA:


Harvard Business School Press.
Bass, L., Clements, P., and Kazman, R. (2003).
Saha, P (2007). Handbook of Enterprise Sys-
Software Architecture in Practice (2nd Edition).
tems Architecture in Practice. Hershey. PA: IGI
New York, NY: Addison Wesley.
Global.
Beck, K. & Andres, C. (2004). Extreme Program-
Spewak, S.H. (1993). Enterprise Architecture
ming Explained: Embrace Change (2nd Edition)
Planning: Developing a Blueprint for Data, Ap-
(The XP Series). New York, NY: Addison-Wesley
plications, and Technology. New York, NY: John
Professional.
Wiley & Sons.
Bernard, S.A. (2005). An Introduction to Enter-
Whittle, R. & Myrick, C.B. (2004). Enterprise
prise Architecture: Second Edition. Bloomington,
Business Architecture: The Formal Link between
IL: AuthorHouse.
Strategy and Results. Boca Raton, FL: CRC
Bhagwat, A. (2003). Estimating Use-Case driven Press.
Iterative Development for Fixed-cost Projects.
Zachman, J.A. (1996). Enterprise Architecture:
The Rational Edge. Retrieved February 20,
the Issue of the Century. Zachman International.
2008 from http://download.boulder.ibm.com/
Retrieved February 20, 2008 from http://mega.ist.
ibmdl/pub/software/dw/rationaledge/oct03/f_es-
utl.pt/~ic-atsi/TheIssueOfTheCentury.pdf
timate_b.pdf
Bhagwat, A. (2006). Enterprise Architecture in
Public Sector - Observations & Considerations.
Endnotes
The Open Group 10th Enterprise Architecture
Conference. Retrieved February 20, 2008 from
1
http://www.opengroup.org/london2006/program. Statement accurate as of mid-2007; when
htm the prime minister changed while the ruling
party remained the same
Fowler, M. (2002). Patterns of Enterprise Applica- 2
Given the volatile and inadequate nature of
tion Architecture. New York, NY: Addison-Wesley
respective official Websites, Wikipedia re-
Professional.
sources on these organizations, and reference
Kroll, P (2007). OpenUP In a Nutshell. The cited therein, provide better understanding
Rational Edge, September 2007 http://www. of historical events.
3
ibm.com/developerworks/rational/library/sep07/ The principle, on which Component-based
kroll/index.html development (CBD) is founded, suggests
that interrelating components should adhere
Kruchten, P. (2003). The Rational Unified Process:
to a contract established between them,
An Introduction. New York, NY: Addison-Wesley
whereby each component is able to perform
Professional.
its tasks competently and deliver result ex-
Ministry of Defence. (2007). The Ministry of De- pected by the contract when provided with
fence Architecture Framework (MoDAF) Version inputs expected in the contract, verifying
1.0. The Ministry of Defence. Retrieved February inputs provided to it for conformance with
20, 2008 from http://www.modaf.org.uk/ the contract and gracefully rejecting non-
confirming inputs without itself failing
Ross, J.W., Weill, P. & Robertson, D. (2006).
catastrophically.
Enterprise Architecture As Strategy: Creating a

81
82

Chapter IV
Maturity Model Based on
Quality Concept of Enterprise
Information Architecture (EIA)
Hong Sik Kim
Korea Polytechnique University, Korea

Sungwook Moon
ComponentBasis, Co., Ltd., Korea

Abstract

Quite a good amount of time has been spent seeking appropriate solutions to handle the giant informa-
tion technology expenditure not only in government sectors but also in private sectors all over the world.
Beginning with OMB, which substantially leads the U.S. governmental efforts in ITA/EA area, seems to
be on the right path using process improvement concept in its ITA/EA maturity model (OMB, 2007_2). EA
community still finds it difficult to introduce quality management concept into its business and practices.
Therefore in this chapter, we would like to suggest a more practical ITA/EA maturity model based on the
quality concept of enterprise information architecture (EIA), which is ROIdriven, practical and based
on four-phased process improvement approach for the EA community. We hope that this approach could
bring a substantial reduction in the costs and efforts in the entire ITA/EA area and provide sustainable
development environment for the ITA/EA like the argument of the environmentalists.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

INTRODUCTION evolution and evaluation of its effectiveness. So


the early ITA/EA Maturity Model contributors
We are faced with a number of enormous com- such as OMB, GAO (United States General
plexities in this era, which represent the so-called Accounting Office), and NASCIO (National As-
information society. A deluge of information sociation of State Chief Information Officers)
would be the most proper expression to the have introduced their ITA/EA maturity models
people living on this earth. This situation is as as milestones to guide the current chaotic IT
if everything is mixed in a great bowl under the situation to more manageable future complexity
name of information society. This kind of mixing (GAO, 2003; NASCIO, 2003; OMB, 2007_2). But
would often result in the various trials of integrat- it is also extremely difficult to evaluate the prog-
ing everything in that society, the appearances ress of the ITA/EA using these maturity models
of new paradigms for adaptation, and another because of its huge and complicated nature, the
chaos and the complexity arising from large-scale inappropriateness of the maturity models in some
transitions. Since Zachman (1987) addressed the architectural perspectives, and the lack of proper
management of the complexity of information metrics and experts for the models (EA Shared
systems using an architectural metaphor, there Interest Group, 2005). Furthermore, we cant even
have been a lot of efforts to address and resolve the see the clear and well-prepared definition of the
challenges of complexities. And these efforts have ITA/EA as its concept is continuously evolving
resulted in a number of architectural frameworks over time.
and methodologies. The information technology With these challenges and uncertain circum-
architecture (ITA) and enterprise architecture stances, the future of the ITA/EA seems to be not
(EA) is one of the various approaches in the so promising; therefore it needs to be reinforced
enterprise-wide architecture horizon to manage with more sustainable approaches and assess-
this modern complexity caused by a deluge of ment frameworks. Though there may not be a
information in government sectors as well as in silver bullet as a solution for the problems, there
private sectors (Figure 1). should be a more practical approach to assess the
ITA/EA, however, became another challenge maturity and effectiveness of ITA/EA in order for
to an organization because of the difficulties in an organization to get real benefits from its huge
the initial adaptation, utilization, continuous investment in it.

Figure 1. ITA/EA and knowledge information society

Analog
Convergence Digital Era
Era
Knowledge
Post Paradigm Shift
Information
Industrial Change Management Society
Society

Convergence: Capital Market Consolidation Act (2007),


Bancassurance, Digital convergence
Paradigm Shift: Plan for update law of 393 e-government
implementation (2007), Sarbanes-Oxley Act (2002)
Change Management: ITA/EA, TQM, Six Sigma, Process
Improvement, CMMI, ITIL, COBIT

83
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

In this chapter we suggest a practical ap- provide its clear definition and practical directions
proach based on quality concept for the maturity to obtain appropriate ROI in the reality. We un-
model of the ITA/EA with some exploration to derstand the meaning of enterprise, but when the
the unforeseen complexity of the future society. concept of architecture is added to it, we would
That is the EIAMM (Enterprise Information need more explanation to figure out the combined
Architecture Maturity Model). Furthermore, we meaning. Without proper interpretation, it would
strongly recommend that organizations should be difficult to understand that the architecture is
borrow experiences and knowledge of the infor- mostly related to information technology related
mation systems development, software engineer- things. Here we review some of EA definitions.
ing, enterprise-wide total quality management Furthermore the only guide of the huge ITA/EA
(TQM), and incremental process improvement program, the maturity model of ITA/EA, seems
techniques to get really practical results through to be in the early stages of development without
the implementation of the EIA. Especially, it is its clear definition. If we dont have a proper
obvious that organizations will need to adopt definition, we will not be able to produce the ap-
highly sophisticated quality control (QC) circle propriate quality and maturity model of ITA/EA.
or Kaizen (Japanese for improvement) concept Therefore we will suggest a desirable definition
to continuously improve the entire enterprise in- of ITA/EA, review its status within an enterprise,
formation systems like manufacturing industries. and provide a practical solution for the maturity
Here we also suggest the conceptual outlines of model of ITA/EA, actually EIA in this chapter.
EIA Maturity Model that is based on the practi-
cal cases of Boeings process improvement using Definitions of Enterprise
capability maturity model integration (CMMI) of Architecture
Software Engineering Institute (SEI).
At the following background section, we are Wikipedia (2007) defines enterprise architecture
going to review some enterprise architecture defi- is the description of the current and/or future struc-
nitions and compare the scopes of EA and EIA for ture and behavior of an organizations processes,
our proposed EIA maturity model. In addition, we information systems, personnel and organiza-
address some worldwide TQM models for better tional sub-units, aligned with the organizations
positioning of the ITA/EA within an enterprise. core goals and strategic direction. Although often
For the main thrust of this chapter, we will present associated strictly with information technology, it
a newly proposed EIA Maturity Model. After a relates more broadly to the practice of the business
brief description about future research, we will optimization in that it addresses business archi-
conclude this chapter. tecture, performance management, organizational
structure and as well.
Clinger-Cohen act (DoD, 2006) defines IT Ar-
BACKGROUND chitecture as The term `information technology
architecture, with respect to an executive agency,
The term of enterprise architecture (EA) is broadly means an integrated framework for evolving or
used in the IT architecture areas worldwide. But it maintaining existing information technology and
would be very hard for people to imagine that it is acquiring new information technology to achieve
related with information technology architecture the agencys strategic goals and information re-
(ITA). EA also seems to have very ambiguous sources management goals.
meaning for both IT and non IT people to un- In TOGAF, the Open Group (2003) defines
derstand, because the EA community could not that there are four types of architecture that are

84
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

commonly accepted as subsets of overall enter- Ross et al. (2006) describes it that The enter-
prise architecture: prise architecture is the organization logic for busi-
ness processes and IT infrastructure, reflecting
Business architecture: This defines the the integration and standardization requirements
business strategy, governance, organization, of the companys operating model (where the op-
and key business processes. erating model is defined as the necessary level of
Data/information architecture: This de- business process integration and standardization
scribes the structure of an organizations for delivering goods and services to customers).
logical and physical data assets and data The enterprise architecture provides a long-term
management resources. view of a companys processes, systems, and
Application (systems) architecture: This technologies so that individual projects can build
kind of architecture provides a blueprint capabilities not just fulfill immediate needs.
for the individual application systems to Finally, IFEADs Schekkerman (2005) states
be deployed, their interactions, and their that Enterprise architecture is about under-
relationships to the core business processes standing all of the different elements that go to
of the organization. make up the enterprise and how those elements
Information technology (IT) architecture: interrelate. An enterprise in this context is any
The software infrastructure intended to collection of organizations that has a common set
support the deployment of core, mission- of goals/principles and/or single bottom line. In
critical applications. This type of software that sense, an enterprise can be a whole corpora-
is sometimes referred to as middleware, tion, a division of a corporation, a government
and the architecture as a technical archi- organization, a single department, or a network
tecture. of geographically distant organizations linked
together by common objectives. Elements in this
OMB (2007_1) addresses the EA from the context are all the elements that enclose the areas
federal point of view. The Federal Enterprise of people, processes, business and technology. In
Architecture (FEA) consists of a set of inter- that sense, examples of elements are: strategies,
related reference models designed to facilitate business drivers, principles, stakeholders, units,
cross-agency analysis and the identification of locations, budget, domains, functions, processes,
duplicative investments, gaps and opportunities services, information, communications, applica-
for collaboration within and across agencies. tions, systems, infrastructure, etc.
Collectively, the reference models comprise a Though there are various definitions of
framework for describing important elements enterprise architecture as above, we still have
of the FEA in a common and consistent way. difficulties in understanding what the enterprise
Through the use of this common framework and architecture really is. In spite of the definitions as
vocabulary, IT portfolios can be better managed above, the EA community tends to think that EA
and leveraged across the federal government. is about the IT areas in the enterprise. But we will
Microsofts Platt (2007) states that Enterprise need to make clear that enterprise architecture is
architecture is a conceptual blueprint that defines actually a framework of an enterprise for the vari-
the structure and operation of an organization. The ous purposes. One of the EA communities, alEA
intent of enterprise architecture is to determine (Association of Enterprise Architects) has recently
how an organization can most effectively achieve announced that it is not recommendable for the EA
its current and future objectives. community to use EA term solely except using EA

85
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

with other modifiers because of its ambiguity. If for the IT area. From the view point of architec-
we do not have even consensus in the definition of tural quality, total quality management (TQM)
the EA and standard EA maturity model, then we models are suitable for the enterprise architecture.
may have to unnecessarily give great pains to the We will look over several TQM models here;
EA communities. When organizations practicing MBNQA (Malcolm Baldrige National Quality
EA cannot find a positive way to produce reason- Award of U.S.A), EFQM (European Foundation
able ROI, eventually the entire EA industry may for Quality Management) Excellence Award and
lose its momentum like previous giant programs JQA (Japan Quality Award). Table 1 shows the
that were doomed to fail. comparison of the major segments of the TQM
frameworks.
Enterprise Architecture and Total IT-related area in MBNQA (Table 1): Among
Quality Management Models the components of MBNQA model, IT area is
directly shown in the section 4.2 Management of
Enterprise architecture encompasses the whole Information, Information Technology, and Knowl-
architectural aspects of an enterprise. It is not just edge. But it is still a relatively small portion of the
entire organizations components. The contents of
each category in the MBNQA framework seem
Table 1. Comparison of major segments for the to be a lot different from IT perspective based
TQM frameworks on the EA concept we have used, that consists of
business architecture, data architecture, service
architecture, technical architecture, and security
MBNQA (U.S.A) EFQM/EQA (Europe) JQA (Japan)
architecture.
P: Preface: Organizational 1. Leadership 1.0 Management Vision
Profile and Leadership IT-related area in EFQM/EQA (Table 1): From
P1:Description/
P2:Challenges the components, we can also find IT related areas
1. Leadership 2. Policy and Strategy 2.0 Understanding of as in the sections 4d. Technology is managed and
1.1 Senior Leadership Customers and Market
1.2 Governance and and Action Taken 4e. Information and Knowledge are managed.
Social Responsibilities
2. Strategic Planning 3. People 3.0 Strategic Planning and
IT related area in JQA (Table 1): One of the
2.1 Strategy Development
2.2 Strategy Deployment
Development eight high-level categories, 6.0 Information
4. Measurement, Analysis, 4. Partnerships and 4.0 Human Resource Sharing and Utilization, is directly allocated to
and Knowledge Resources Development and
Management 4d. Technology is Learning Environment the IT-related area. JQA model gives a relatively
4.2 Management of managed.
Information, 4e. Information and larger portion to the IT area than MBNQA and
Information Knowledge are
Technology, and managed
EFQM. JQA also directly uses the word enterprise
Knowledge
in the section 7.0 Results of Enterprise Activi-
5. Workforce Focus 5. Processes 5.0 Process Management
5.1 Workforce engagement ties. In this context, the meaning of enterprise
5.2 Workforce environment
6. Process Management
seems to imply the entirety of a company or an
6. Customer Results 6.0 Information Sharing
6.1 Work Systems Design and Utilization organization.
6.2 Work Processes
Management and Among three TQM models, MBNQA was the
Improvement
7. Results 7. People Results 7.0 Results of Enterprise
first model pursuing the excellence initiated by
7.1 Products and Service
Outcomes
Activities
the NIST (National Institute of Standards and
8. Society Results 8.0 Customer Satisfaction
7.2 Customer-Focused
Outcomes
Technology, U.S.A). As MBNQA showed great
7.3 Financial and Market
Outcomes
9. Key Performance success for the economy of the U.S.A, EQA and
Results
7.4 Workforce-Focused JQA followed the way of MBNQA to learn the new
Outcomes
7.5 Process Effectiveness competitive scheme known as the management
Outcomes
7.6 Leadership Outcomes text book. All three models are very similar to

86
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

each other. We can see the relationship between Considering the above, if we still want to
the enterprise and the IT area through the detailed use the term EA, we, in the first place, need to
description of section 4.2 Management of Infor- define the scope of enterprise by utilizing the
mation, Information Technology, and Knowledge above well-known TQM national models and
in the MBNQA TQM model. then define the scope of the IT area and necessary
In the section 4.2, applicants are supposed components in order to correctly describe the
to answer the question how do you manage term EA. Otherwise, It would be recommendable
your information, information technology, and to find other appropriate terms rather than using
organizational knowledge? The companies ap- EA, like enterprise information architecture or
plying MBNQA also should describe how they enterprise information technology architecture,
ensures the quality and availability of needed etc, which will clearly convey to stakeholders a
data, information, software, and hardware for right scope of IT area framework that we are go-
their workforce, suppliers, partners, collabora- ing to handle out of enterprise framework. This
tors, and customers direction will lead us to the correct domain of the
The detail of this category directly says about work we are going to handle. In line therewith,
the information areas in the enterprise and we we here divide enterprise architecture into three
may write about the more specific information main areas which are IT related area, non - IT area
for ITA/EA as an answer to these questions. and interface area between those two areas. With
With this approach, we can avoid any confusion this basic concept of the EA, we discuss further
in positioning the ITA/EA within the enterprise developments towards the direction, maturity
concept. path - EIA maturity model from which we will
be able to get the practical benefits.

Figure 2. Proposed scope of the enterprise architecture

Architecture
(Essential Framework)

Segment
Function

Functional
Segment Architecture
Architecture
Segment

Function

87
Function
Figure 2. Proposed scope of the enterprise architecture.
Maturity
Figure 3 shows the proposed detail description of Model Based
the enterprise on Quality
architecture Concept
defined in this of Enterprise Information Architecture (EIA)
chapter. Each segment of the segment architecture is adopted from the first level categories
of the MBNQA. In OMB case, completion, use, and results are categorized as segment archi-
tecture. These segment architectures are supposed to be determined in accordance with the
need of the enterprise. And the other facets show the general functions of the enterprise like
the line of business and the hierarchy of the enterprise. The terminology Architecture used
Figurethe
in the figure represents 3. Proposed detail
current fashion, description
a kind of enterprise
of buzz word. Figure 2 shows the proposed scope of the
With this kind of proposal
for the enterprise architecture,
architecture we can clearly show a framework of the enterprise architecture
desirable enterprise architecture which has three
and its components from the three important perspectives.
aspects (segment architectures, functional archi-
Architecture
Segment Function
tectures, and segment functions). The concept of
(Essential Framework)

Line of Business C
this enterprise architecture shows the essential
Line of Business B framework of an enterprise and provides a mile-
Line of Business A
stone to the specific decision of the enterprise at
Customer and Market Focus SA

Information Management SA

Process Management SA

a glance.
Strategic Planning SA

Workforce Focus SA

Functional
Architecture
Leadership SA

Segment Figure 3 shows the proposed detail descrip-


Result SA

Architecture
Segment
tion of the enterprise architecture defined in this
chapter. Each segment of the segment architecture
is adopted from the first level categories of the
* Segment Architectures
from MBNQA MBNQA. In OMB case, completion, use, and
Function Architecture
results are categorized
(Essential Framework) SegmentasFunction
segment architecture.
Figure 3. Proposed detail description of enterprise architecture.
These segment architecturesLine of Business C are supposed to be
Line of Business B
determined inLineaccordance of Business A
with the need of the
enterprise. And the other facets show the general

EPA(Process Management SA)


EWA(Workforce Focus SA)
PROPSED SCOPE OF THE
ESA(Strategic Planning SA
ECA(Customer Focus SA)

EIA(Information SA)
8 functions of the enterprise like the line Functional of business ELA(Leadership SA)

ERA(Result SA)
ENTERPRISE ARCHITECTURE Architecture
and the hierarchy of the enterprise. The terminol-
Segment
Architecture
ogy Architecture used in the figure represents Segment
With the above relationship for the enterprise
the current fashion, a kind of buzz word. With
and its information management, we can further
this kind of proposal for the enterprise architec-
* Segment Architectures
develop the scope of the ITA/EA/EIA step by from MBNQA
ture, we can clearly show a framework of the
step through the four consecutive figures (from Function
enterprise architecture and its components from
Figure 4. Proposed scope of enterprise information architecture.
Figure 2 to Figure 5) as follows. This approach
Figure 4 showsthe three important
the proposed scope of theperspectives.
enterprise information architecture. We replace the
could help the ITA/EA community to overcome information management segment architecture
Figure 4 shows the with the EIA within
proposed scope the of
enterprise
the architecture.
the complexities of the information resources Here we can conclude that the enterprise architecture currently applied in the EA community
is equivalent toenterprise
the area of theinformation architecture.
EIA in this chapter. We replace
With this approach using TQM model, we
management. are going to show that there can be other segment architectures besides the EIA like enter-
prise results architecture, enterprise process management architecture, etc.
But existing enterprise architects may not be interested in other enterprise segment architec-
tures because they are not their domain areas for the job. Then it would be very important
that enterprise architects understand the status and position of ITA/EA or EIA within the en-
Figure 4. Proposed scope of enterprise informa- Figure
terprise. With this 5. Proposed
clear scope of the EIA, scope ofarchitects
enterprise segment andarchitec-
relevant stakeholders can
tion architecture better respond tures of EIA of the ITA/EA or EIA. Unclear scope of the ITA/EA or
to the requirements
EIA will only prevent the enterprise from utilizing the beneficial side of the ITA/EA or EIA.

Architecture Architecture
(Essential Framework) Segment Function (Essential Framework) Segment Function

Line of Business C Line of Business C


Line of Business B Line of Business B
Line of Business A Line of Business A
EPA(Process Management SA)

EPA(Process Management SA)

EIA
EWA(Workforce Focus SA)

EWA(Workforce Focus SA)


ESA(Strategic Planning SA

ESA(Strategic Planning SA
ECA(Customer Focus SA)

ECA(Customer Focus SA)


EIA(Information SA)

Functional PA
ELA(Leadership SA)

Functional
ELA(Leadership SA)
ERA(Result SA)

ERA(Result SA)

Architecture Architecture
BA
Segment Segment
Architecture Architecture DA
Segment Segment
AA

TA

* Segment Architectures SEA * Segment Architectures


from MBNQA from MBNQA
Function Function

Figure 4. Proposed scope of enterprise information architecture. Figure 5. Proposed scope of segment architectures of EIA.
Figure 4 shows the proposed scope of the enterprise information architecture. We replace the
information management segment architecture with the EIA within the enterprise architecture.
Here we can conclude that the enterprise architecture currently applied in the EA community 9
is equivalent to88
the area of the EIA in this chapter. With this approach using TQM model, we
are going to show that there can be other segment architectures besides the EIA like enter-
prise results architecture, enterprise process management architecture, etc.
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

the information management segment architecture to find a definition to cover an overall and basic
with the EIA within the enterprise architecture. framework of an enterprise so that we may see its
Here we can conclude that the enterprise archi- status at a glance including IT area. This should
tecture currently applied in the EA community is have broader concept than EA community has
equivalent to the area of the EIA in this chapter. thought it would have. For such purpose, we
With this approach using TQM model, we are would like to take the information area out of
going to show that there can be other segment the enterprise architecture, which is enterprise
architectures besides the EIA like enterprise information architecture, and this will lead us
results architecture, enterprise process manage- to clearly see the differences between the EIA
ment architecture, etc. (Enterprise Information Architecture-IT related
But existing enterprise architects may not be in- area) and the EA (Enterprise Architecture-total).
terested in other enterprise segment architectures In this sense, enterprise architecture should prob-
because they are not their domain areas for the job. ably provide overall management and evaluation
Then it would be very important that enterprise function to the enterprise like a TQM model and
architects understand the status and position of EIA does the similar function to the information
ITA/EA or EIA within the enterprise. With this technology area of the enterprise.
clear scope of the EIA, enterprise architects and
relevant stakeholders can better respond to the Definition of Enterprise Information
requirements of the ITA/EA or EIA. Unclear Architecture
scope of the ITA/EA or EIA will only prevent
the enterprise from utilizing the beneficial side Here, we would like to suggest a better term and
of the ITA/EA or EIA. definition of EA in this chapter, namely EIA
Figure 5 shows the proposed scope of the seg- rather than the ambiguous EA. Our definition of
ment architectures of the EIA. These general terms EA is An essential architectural framework for
in the existing EA are performance architecture an enterprise to make a better decision about the
(PA), business architecture (BA), data architecture future activities of its own. The definition of
(DA), application architecture (AA), technology EIA is the essential framework for an enterprise
architecture (TA), and security architecture (SEA) to effectively invest for and manage information
within the EIA. From this point of view, it is very technology resources to satisfy its goals and
clear to distinguish the scope of the EA and the objectives.
EIA with their segments architectures. Therefore, Previously, we defined the enterprise as what
for this reason, we propose that EIA be used as a has comprehensive domain areas not just for the
better terminology to handle the complexities of information technology areas. Therefore with
information management in the enterprise instead enterprise architecture, we will have to deal with
of the enterprise architecture. With this in mind, entire enterprise domain areas like factories, ma-
we are going to explore the main topic of this terials, machineries, and all kinds of technologies
chapter, the maturity model of EIA. directly. We usually, however, deal with things
only relevant to the information systems and
Enterprise Information Architecture: technologies within the so-called EA in reality.
Concept and Maturity Model So it will be a little bit more practical to use EIA
rather than EA in order to avoid any confusion
For a better and more practical definition of derived from the terminology EA.
enterprise architecture, it would be necessary

89
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

Enterprise Information Architecture quality reference model (QRM) of EIA in total as


Maturity Model Depending on the ITA/EA maturity model used
by an enterprise and QMS or quality model used
With the introduction of EIA, we will be able to by the enterprise, a systematic approach using
aim at a right target and focus on next process best EIA practices to meet the objectives and goals
for the practical maturity model to avoid the tre- of EIA and enterprise business and to satisfy the
mendous unnecessary trial and errors. The goal of final customers and stakeholders of EIA.
the EIA maturity model is to assess the maturity
level of information systems and technologies
within an enterprise. Here enterprises could be EIA MATURITY MODEL
companies, government agencies or non-profit APPROACHES
organizations including agencies which have geo-
graphically distributed branch offices connected This chapter tries to focus on the result-oriented
with networks. EIA implementation in the real world to practically
In order to make the EIA alive, we need to get direct benefits from the EIA programs. As the
link the EIA activities to the real world all the basic purpose of introducing EIA is to satisfy the
time. Unfortunately we could say that the cur- relevant stakeholders with expected results from
rent software engineering technologies still have the starting project, it is strongly recommended to
a long way to go because the relevant industry find practical solutions and implement them in the
is still immature. It is obvious that the core EIA enterprise using EIA project. Basically without
technologies depend upon software engineering, such a strong support of the people involved in the
continuously changing and evolving information EIA program, it will confront great difficulties in
technologies, and sophisticated project manage- proceeding. Therefore EIA maturity model puts
ment, which shows its success rate just limited to great emphasis on mitigating the aspects of the
around 30 % at most (Standish Group 2003). Under cultural conflicts at the same time. EIA maturity
such circumstances, it would be extremely dif- model also tries to provide generic approaches
ficult to create practical frameworks to effectively regardless of the countries, public or private
control the IT resources. Therefore, we would sectors, and size of the enterprises ranging from
need a better maturity model to support the cur- large, medium to small sized one, so that any
rent ITA/EA community and to guide any kinds organizations can adopt this EIA maturity model
of organizational entity to a foreseeable future. to enhance their performances in the knowledge-
Here our definition of EIAMM is A milestone oriented information society.
to assess the maturity level of the information
systems and technologies within an enterprise, Practical EIA Maturity Model
and guide its ITA/EA Progress to the practical
and sustainable direction with ROI driven results There are various maturity models for the ITA/
based on quality (P-D-C-A Cycle and process EA such as Enterprise Architecture Manage-
improvement techniques) of EIA regardless of ment Maturity Framework (EAMMF) of United
the countries, enterprise entity (Public or Private States General Accounting Office (GAO, 2003),
sector), and enterprise size. Enterprise Architecture Assessment Framework
We also need to define the quality concept of (EAAF) of United States Office of Management
ITA/EA or EIA here based on the above defini- and Budget (OMB, 2007_2), Enterprise Archi-
tion. In line therewith we suggest the definition of tecture Maturity Model (EAMM) of National
quality, quality management system (QMS), and Association of State Chief Information Officers

90
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

Table 2. Levels of proposed EIA maturity model that overlap and do not consistently measure the
goodness, the impact and the completeness of
Level Description Remark
enterprise architectures can be confusing and very
Level 5: EIA process improvement activities Creative and
Continuous should be continuously executed continuous
frustrating to the staffs of agencies and depart-
Improvement yearly through the formal improvement of ments that are trying to use them to improve EA
organization of the entire enterprise EIA over the whole maturity. (EA Shared Interest Group, 2005)
and include the incentive rewarding enterprise
system for the EIA program Here we introduce a practical EIA maturity
Level 4: Enterprise initiates standardization Effective and
model (EIAMM) as an experimental case from
Standardizing of EIA and official EIA process efficient the initial level to the continuous improvement
Enterprise-wide improvement activities should be standardization of
level. The key point of EIA maturity model is
applied to the entire enterprise EIA
trying to focus on the practical benefits based on
Level 3: Enterprise deploys formal EIA Introducing EIA
Deploying EIA improvement program based on the solutions to the the findings of actual solutions in real enterprise
Solutions EIA solutions elicited for the whole major parts of the environment through incremental process im-
enterprise incrementally enterprise
provement supported by highly sophisticated IT
Level 2: Enterprise needs EIA and finds out Finding practical
project management and process management.
Finding EIA practical solutions through EIA pilot IT
Solutions project using process improvement management
methods solution EIA Maturity Model Level 1
Level 1: No necessary of EIA and lack of IT No control of IT
Initial investment management investment
This level includes every enterprise without any
solution for the EIA.

(NASCIO, 2003), Advancing Enterprise Architec- EIA Maturity Model Level 2


ture Maturity (AEAM) of US Industry Advisory
Councils Enterprise Architecture Shared Interest In CMMI Level 2, project management is sup-
Group (IAC EA SIG) and Government Informa- posed to be an infrastructure to be mastered. But
tion Technology Architecture-Maturity Model of in case of the EIA, there are many distinct differ-
National Information Society Agency of Korea ences between CMMI maturity model which first
(NIA, 2006). But multiple EA maturity models introduced the maturity concept into the informa-

Figure 6. Four phases of process improvement model (Vu, 2004)

Establish
Training &
Education
Perform EIA
Process
Assessment
Improvement Phases
Develop EIA Refine Institutionalize
Develop EIA EIA Solution EIA EIA
Action Plan Solution Pilot Project Solution Solution

Establish Verify improvement


Metrics Baseline against Metric Baseline

91
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

tion technology areas, and EIA maturity model why we focus on the satisfaction of stakeholders is
from the perspectives of maturity concept. One that it will secure their commitment and lead them
of the differences could be the ROI-oriented ap- to managing the complex IT investment including
proach to the EIA implementation. EIA maturity the reduction of total costs of the IT investments,
model level 2 pursues early stage benefits from enhancing the efficiency, effectiveness, and reus-
the initiatives of the EIA like finding problem ability of the IT assets, and the interoperability
solutions in the field. This level also tries to di- between the IT systems, and finally achieving the
vide the process of finding EIA solutions into 4 business goals of the enterprise using IT.
process improvement phases and seriously follow Figure 6 shows the four phased process im-
the process improvement (PI) guideline to get the provement models during the level 2 of EIAMM
EIA solutions. which is the core part of the entire EIAMM. With
At this level, without finding an appropriate this mechanism of process improvement, EIAMM
solution, it is very dangerous to go on further to can access to the practical ITA/EA/EIA and
level 3 because its direction of EIA introduction provide substantial benefits to the stakeholders
may not be verified and approved by the stake- in the real world.
holders at this stage. Finding proper practical
EIA solutions supported by stakeholders will be Phase 1: Develop EIA Solution
a premise to go up to the next level 3. If any EIA
solutions are not practical enough to implement, Within the major problem area, an organization
the enterprise will have to hold going on further assigns its personnel to develop a solution for
and spend more time and efforts until finding EIA 3 months and manage this process as a formal
solutions to be good enough for the real world. project. If the solution is satisfactory to the
Maturity in EIAMM means that an enterprise organization, then go to the next process Pilot
should follow a right direction which can lead to project to see whether the solution is good enough
building a good foundation of the EIA and which in reality or not.
will solve the problem of the enterprise through
the introduction of the EIA. In another perspec- Phase 2: Pilot Project for EIA Solution
tive, the maturity in EIA maturity model includes
a natural way for the enterprise to follow step by Assigned personnel to the pilot project run this
step with enough ROI. One more difference from process as a project for 3 months. And if the final
CMMI maturity concept will be the satisfaction of evaluation of this process is good enough for the
stakeholders with the EIA program. Performing organization, then it goes to the next process
the EIA program in a reasonable way, the visible Refine the solution. If not, it goes back to the
output of EIA will be provided to the stakeholders Phase 1 and Find solution process again.
so that they can be satisfied with the program.
Currently the problem of the so called EA is Phase 3: Refine Proven EIA Solution
that it doesnt secure enough commitments from
the people inside and outside the enterprise and A small team works together to refine the results
that it doesnt clearly explain EA program to its of the previous pilot solution for 3 months. If the
stakeholders. There even seems to be no clear outcome is practical enough in real environment,
definition of the EA, which has raised much then it goes to the next Institutionalize Solution
confusion in performing the EA activities. In this process. If not, the team needs one more refining
ambiguous situation of EA programs, the reason project to get the actual solution.

92
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

Figure 7. Development of EIA action plan (Vu, 2004)

EIA Assessment Team

Enterprise Enterprise
Business Goals EIA Management
Assessment
Assessment Process EIA
Recommendations Stakeholders

EIA Action Plan

EIA EIA EIA EIA


Strategic Tactical Operational Measurement
Plan Plan Plan Plan

Phase 4: Institutionalize EIA Solution Supporting Activities

This process is to deploy the proven solution Training and education should be supported
to the organization for 3 months. A team also by the organization and measurement scheme
prepares the deployment plan and incrementally should be established and applied to the entire
executes the plan to the organization. This phase 4 phases of process improvement. Verification
prepares the initial foundation of the standardizing process is needed to check the status of process
of the solution enterprise wide for the EIAMM improvement.
Level 4. Figure 7 shows the development of the EIA
action plan. The EIA action plan is a set of plans;

Figure 8. EIAMM implementation and standardization strategy


Collecting standardization
data and assets
Measurement data are used to verify improvement results

Enterprise Goals and Objectives

EIA MM Current EIA Process


EIA Governance, Capabilities
EIA Process Asset Plan is based on
Standardized Solution Asset, EIA Process
assessment of
EIA Asset Repository Improvement
EIA MM
Plan

EIA Training
Improvement
Implementation
Tasks EIA Quality
Review

EIA
Measurements Measurements /
Information
Repository

93
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

Figure 9. Level 3 deploying EIA solution overview

EIA MM Enterprise Goals and Objectives


EIA Governance,
EIA Process Asset Current EIA Process
Standardized Solution Asset, Capabilities
EIA Asset Repository
Preparing EIA
Solution
EIA Deployment
Standardization Plan

Improving Major Constructing formal EIA Implementing


Processes of EIA Infrastructure/Managing The EIA Solution
Life Cycle the EIA Life Cycle Deployment Plan

Assessment of
EIA Execution /
Enterprise EIA Project
Working EIA
Repository/
Process Asset Finding Gaps /
Library Improvement Recommendation

EIA strategic plan, EIA tactical plan for each pro- EIA Maturity Model Level 3
cesses, EIA operational plan for each action task,
and EIA measurement plan to measure progress. With the ROI-oriented maturity concepts and EIA
Consistent alignment of EIA enterprise goals and solutions obtained from the EIA maturity model
objectives (strategic plan) to implement tactical level 2 activities, the next step is the deploying
& operational plans is the key. of the EIA solutions to the entire enterprise. Our
maturity concept could be said to adopt a bot-

Figure 10. Level 4 deploying EIA solution overview

EIA MM
EIA Governance, Enterprise Goals and Objectives
EIA Process Asset
Standardized Solution Asset, Current EIA Process
EIA Asset Standardization Capabilities
Process Asset Repository
Preparing EIA
EIA Standardization
Standardization Plan

Improving Major Standardizing


Institutionalizing the EIA
Processes of EIA Practical
Standardization System
Standardization EIA Solution

Verifying the Effectiveness


/ Efficiency of EIA
Enterprise Solution Standardization
Working EIA
Repository/
Process Asset Finding Gaps / Tailoring the Standards
Library for Different EIA Solution

94
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

tom up approach. However, we also try to apply order to effectively and efficiently deploy the EIA
the top down approach together at the level 3 solutions to the enterprise.
(Figure 9). For example, enterprise headquarter At this level, the enterprise may need standard-
may continue to support good investment into izing mechanism (Figure 8), process improvement
the EIA with belief including enterprise-wide techniques, and tailoring guidelines with various
education, training and the planning of better IT resources like Web EIA repository, EIA tools
strategies with various supporting resources in and techniques. These must be supported from

Figure 11. Level 5 continuously improvement EIA


EIAMM/EIA Governance/
EIA process asset/
Standardized solution Asset/
Enterprise EIA Standardization
Process Asset Repository

Enterprise Goals and Objectives

Verify Recommending
Establish Continuous Operating the Continuous
Improvement Enterprise wide
Improvement EIA Improvement EIA
Against Improvements
Plan Management System
Metrics Baseline Areas

Figure 12. EIAMM overview

Online EIA Enterprise Goals and Objectives

Repository
5 Establish Continuous
Improvement EIA
Operating the Continuous
Improvement EIA
Verify
Improvement Against
Recommending
Enterprise wide
Plan Management System Metrics Baseline Improvements Areas
EIA MM Asset
Preparing EIA
EIA Standardization Plan

Governance Improving Major Standardizing


Institutionalizing the EIA
Processes of EIA Practical
Standardization System
Standardization EIA Solution

EIA
4 Verifying the Effectiveness / Efficiency
Standardization of EIA Solution Standardization
System
Finding Gaps / Tailoring the Standards for Different EIA Solution

EIA Process
Preparing EIA Solution
Assets Deployment Plan

Improving Major Constructing formal EIA Implementing


EIA Standardized Processes of EIA Life Infrastructure/Managing the EIA The EIA Solution
Cycle Life Cycle Deployment Plan
Solutions
3
Assessment of
EIA Execution / EIA Project

Enterprise EIA Finding Gaps / Improvement Recommendation

Standards &
Working Perform EIA Process Establish Training & Education
Assessment Improvement Phases
Repository
2 Develop EIA Action Plan Develop
EIA Solution
EIA Solution
Pilot Project
Refine EIA
Solution
Institutionalize
EIA Solution
EIA Working
Solutions Establish Verify improvement
Metrics Baseline against Metric Baseline

95
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

the top management. In this sense, these kinds of EIA Maturity Model Level 4
top down approach must be applied with bottom
up at the same time. At this level, the enterprise may achieve remark-
We may also need certain kinds of change able improvement of the EIA practice and figure
management as new technologies and concepts out transparent relationship between the practi-
always require some sort of innovation and cal EIA standardization and the business goal.
improvement in the organization. We need ever Therefore enterprise-wide EIA standardizing
evolving strategic planning, execution, evalua- systems are a very important identifier of this
tion, and feedback in order to get better results. level. Among those standardizing EIA systems,
We need to assess all the EIA activities during there are many practical EIA solutions in the
level 3, to find gaps and improve the areas until fields; tailoring the standards for different EIA
the business goal is met. solution needed (tailoring guideline), institu-
tionalizing PDCA (Plan-Do-Check-Act) cycle
Table 3. Major processes of proposed EIA ma- to improve the enterprise-wide EIA program,
turity model and establishing practical EIA measurements
processes (Figure 10).
Level Description Remark
Level 5: Establishing formal system of Continuous
Continuously EIA process improvement team improvements of
EIA Maturity Model Level 5
Improving EIA in local organization the EIA solutions
Measuring continuous improve to be made
ments effectiveness and
At this level 5, every organization in the enter-
efficiency prise may establish a formal EIA process im-
Providing incentive rewards to
the every organization in the provement team or one with other names of the
enterprise enterprise architecture in order to continuously
Level 4: Standardizing the practical EIA Establishing
Enterprise-wide solutions in the field practical EIA improve the EIA system through the measure-
standardization Tailoring the standards for standardization ments of the effectiveness and efficiency of the
different EIA solution needed System
(tailoring guideline) EIA program. Another key feature of this level
Institutionalizing P-D-C-A cycle 5 is to invest appropriate overhead and resources
to improve the standardization
enterprise-wide. for the continuous improvement activities of the
Establishing Practical EIA EIA program all the time like the QC circle, six-
measurements
Processes sigma and enterprise-wide TQM activities in the
Level 3: Preparing enterprise deployment Assessment of the manufacturing industries (Figure 11).
Deploying EIA planning EIA executions/Fi
Solutions Constructing formal EIA nding gaps/ The most important concepts behind of the
infrastructure Improving major EIAMM are natural, cycling, continuing, sustain-
Implementing the EIA processes of EIA
deployment plan life cycle able, and self survival idea in any enterprises.
Managing the EIA life cycle There is a brief overview of these concepts that
Assessment system
implemented to evaluate the all the 5 levels connect each other through the
EIA status or project EIA repository and standardization mechanism
Level 2: Verify the benefit of the solution Finding practical
Finding EIA Find EIA solution to solve EIA solution for (Figure 12). And these concepts also apply to an
Solutions business problems 1 year and with overview diagram for the role of the EIAMM
Execute EIA pilot project 4-phased process
Tuning the results of pilot improvement within an enterprise as the alternative solution
project mechanism for the business and IT alignment
Preparing the practical EIA
solutions problems (Figure 13 and 14).
Level 1: No necessary of EIA and lack of No control of IT
Initial IT investment management investment

96
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

Major Processes of the EIA Maturity guideline being different from other approaches,
Models EIA community may try a practical EIA approach
and verify whether it is good or not.
The Basic Characteristics of EIA Finally, EIA maturity model could provide a
Maturity Model basis to find out the ROI-oriented maturity criteria
to verify and validate the EIA program and proj-
This is one of the experimental drafts of the EIA ects in the real world. Further description of the
maturity model to find out a real practical approach quality of EIA will be mostly dependent on the
among various trials in the ITA and EA world. various concepts of this EIA maturity model.
At the same time, on account of the various
reasons, there is no practical standard definition The Comparison between EIAMM
existing in this community and furthermore it and CMMI
is too difficult to define the quality of the EIA
(or EA) in this situation. Even with huge invest- The basic differences between enterprise infor-
ments in the EIA, we may still have difficulties in mation architecture maturity model (EIAMM)
figuring out the ROI of the EIA projects without and CMMI show different perspectives for the
appropriate quality criteria. Therefore, based on maturity development. From the view of the
this EIA maturity model which is a more practical CMMI, it provides step by step approaches to
institutionalize from the low level key processes

Table 4. Comparison of the levels between EIAMM and CMMI


Maturity
EIAMM CMMI
Level

Level 5 Continuous Improvement Optimizing

Standardizing Enterprise-wide Quantitatively


Level 4
Solution Managed

Level 3 Deploying EIA Solutions Defined

Level 2 Finding EIA Solution Managed

Level 1 Initial Initial

Table 5. Comparison of the characteristics between EIAMM and CMMI .

Category EIAMM CMMI

ROI Strong ROI oriented approach Indirect ROI approach

Practical approaches to find Focusing on Institutionalization


Practicality solution at early improvement of the defined processes at each
level level rather than practicality
Without applicable solutions, Institutionalization of lower
Leveling up enterprise units cant go up to level allows going to next level.
level 3.
Strong mechanism l ike the Strong Standardization r equired
Standardization
Standardization of TQM model
Stakeholders Stakeholders satisfaction is Stakeholders satisfaction i s not
Satisfaction essential directly commented

97
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

to the higher level key processes. Although we At level 3, the enterprise will experience
need to verify the effectiveness and efficiency of more or less benefits through the distribution of
the activities which CMMI introduces to an enter- the EIA solutions and draw the proved solutions
prise, it seems to be difficult to prove the return with the best practices based on the realities of
on CMMI investment because there is not such enterprises. We focus on the standardization of
a function in this model. We may need to invest the enterprise-wide EIA solutions at level 4 and
in creating new verifiable processes for this. And construction of continuous improvement systems
this may be another burden to the modern CEOs for the EIA at level 5.
trying the CMMI. The scheme of the EIAMM is to try to provide
For the EIAMM, we put the self-verification real and practical solutions to the Enterprise-wide
processes into level 2 as Finding EIA Solution. stakeholders even at level 2 and to guide the en-
Here the solution means actionable and concrete terprise to the right way from the very beginning
solutions for specific problems in the real world of the EIA, which is so difficult and complex in
that could provide tangible and intangible benefits nature. Therefore, the core level of the EIAMM
to the customers of the EIA. It is also designed would be the level 2. This means that it could be
to aim at the practical support of the business a kind of waste to spend the limited resources
including complex IT environment. Once we find and efforts in the wrong direction without clear
out an appropriate solution through the 4-phased solution.
process improvement method, then we distribute
the EIA solution to the rest of the organization for EIA Maturity Model for Enterprise
the improvement of quality and the enhancement Business and Enterprise IT
of productivity during the level 3 Deploying EIA Alignment
Solutions. This could enable the enterprises to
avoid unnecessary trial-and-errors, and achieve Basically the modern management of an enterprise
the least beneficial results with positive expecta- always has the most difficult alignment problems
tion for the new changes. (Table 4) between its business and IT area. ITA/EA is sup-

Figure 13. EIAMM as enterprise business and enterprise IT alignment

EIA Governance
/slaoG dna ,sevitcejbO ,sdeeN ygolonhceT noitamrofnI esirpretnE
noitarepO niamoD ygolonhceT noitamrofnI esirpretnE
/ slaoGdna ,evitcejbO ,sdeeN ssenisuB esirpretnE

Level 1 EIA Maturity Model


Awareness of EIA
noitarepO niamoD ssenisu B esirpretnE

Level 2
EIA Solution
Development

Level 5 Level 3
EIAMM Life
Continuously Enterprise wide
Cycle
Improving Deployment of
Management
EIA EIA Solution

Level 4
Standardization of Proven
EIA Solutions

Enterprise EIA Repository/ EIA Process Asset Library

98
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

Figure 14. EIAMM for enterprise business and enterprise IT alignmentwithin enterprise architecture
Enterprise Architecture (EA) Governance

EIA Governance

/slaoG dna ,sevitcejbO ,sdeeN ygolonhceT noitamrofnI esirpretnE


noitarepO niamoD ygolonhceT noitamrofnI esirpretnE
/ slaoGdna ,evitcejbO ,sdeeN ssenisuB esirpretnE

Level 1 EIA Maturity Model


Awareness of EIA
noitarepO niamoD ssenisuB esirpretnE

Level 2
EIA Solution
Development

Level 5 Level 3
EIAMM Life
Continuously Enterprise wide
Cycle
Improving Deployment of
Management
EIA EIA Solution

Level 4
Standardization of Proven
EIA Solutions

Enterprise EIA Repository/ EIA Process Asset Library

EA Repository / EA Process Asset Library

posed to provide the alignment function to the areas) according to the continuous improvement
enterprise including online EA Web repository. In strategy, EIAMM by the Figure 14.
this chapter, we suggest a theoretical proposition
that the alignment between business and IT could Quality of EIA
be achieved if we appropriately use the EIAMM as
an intermediary interface tool. EIAMM actually Quality areas are basically well established in
should reflect the enterprise business needs and its various industries and coverage perspectives
related IT needs as well. Therefore if EIAMM is including quality control (QC), quality assurance
positioned in the middle of the two and provides (QA), quality management (QM), quality man-
its smooth communication to the enterprise like agement systems (QMS) (BSI DISC, 1998) and
Figure 13, we expect that aging alignment prob- total quality management (TQM). The definition
lems could be solved and that enterprise architect of the quality varies from industry to industry,
serves its role better to the enterprise. from scholar to scholar, and from perspective to
In this point of view, Figure 14 clearly shows perspective. The quality in new budding indus-
the differences between EA and EIA with the tries like software engineering often follows the
EIAMM for enterprise business and enterprise proven way of quality management from matured
IT alignment within EA. The biggest difference industries like manufacturing. The best practices
is that EA will govern the entire enterprise and in the EIA could be considered as one of the
EIA will coordinate the alignment problem be- quality concept.
tween business and IT (not other technology or

99
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

However, the concept ranging from EIA pro- In addition to the QRM concept, we may in-
grams to projects and products may extremely troduce a quality checking function to the major
vary depending on the definition of the quality mile stones of EIA program. The milestones are
and the definition of the EIA. Therefore the as- at the end of the major components and basically
sumption of the EIA quality largely depends on the common components of the EIA can be an
the EIA maturity model described above to deal appropriate EIA framework, as-is view of EIA,
with the quality area. And it seems that other to-be view of EIA, transformation from as-is view
important focus on the definition of the EIA to to-be view, management of the EIA information
quality should reflect the concept of the qual- which are standard management procedures for the
ity reference model (QRM) including CMMI, EIA information including the storing, changing
SPICE, ISO 9001, TickIT, and MBNQA (Malcolm and representing of the EIA information.
Baldrige National Quality Awards). Also JQA The initial steps toward the quality of the
(Japanese Quality Awards) and Deming Awards EIA are to establish the verification procedures
in Japan, EQA (European Quality Awards) of of the five reference models of the EIA and the
EFQM (European Organization for Quality)and consistency checking procedures between them.
EC (European Commission) in Europe and QMA And finally we can validate that the final results
(Quality Management Awards) in Korea are well of the EIA activities meet the goals of the objec-
known in the world. tives for the pertinent EIA program or project.
There should be some quality management Final validation should include finding a practi-
function within the EIA maturity model like cal solution to solve the problems of the current
QRM aligning with other 5 reference Models enterprise.
(PRM, BRM, DRM, SRM, and TRM of FEA) We can also apply process improvement tech-
initiated by the Federal Enterprise Architecture niques to the EIA program in order to early find
activities and other functions. Examples of QRM out the practical benefits from the EIA program.
might be CMMI, SPICE, ISO 9001/TickIT, or a Basically using EIA and process improvement
specific quality model for a target organization. together may be one of the ways of realizing
If the QRM is not proper enough to handle the substantial benefits from the EIA program. If
EIA quality, it may be improved to a more suit- we apply the process improvement concept of
able shape for the EIA QRM. the CMMI to the assessment of the as-is view of
Also, one of the direct customers of the QRM a target organization or system, we can find out
should be the CIO (Chief Information Officer) of more accurate information of the current status
the organization as CIO has lots of interests in in terms of maturity concept.
the quality status for the Information Systems There are big processes for transformation
managed by IT people. Qualified stakeholders from current EIA views to future EIA views. If
can also find out the quality status of the EIA we manage these processes with process improve-
program at anytime through the QRM. At the ment concepts of CMMI or some other quality
same time, management from IT people and cus- scheme, the quality status of the projects will
tomers may want to know the quality status and be consistently secured at the intended maturity
practical work forces too. So like other reference level at least. Later we can adjust and improve the
models, a column for the QRM may be provided outcome at reasonable time continuously. This
to accommodate the quality area from high level process should be dealt with like a project. Then
to detailed level besides the 5 reference models this process will secure minimum quality status
(PRM, BRM, DRM, SRM and TRM). according to the QRM specified.

100
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

Table 6. Annual assessment process of FEAP EAAF 2.2 (OMB, 2007_2)


Rating Content

Score equal to or greater that 4 in the Completion, Use, and


Green
Results capability areas

Score equal to or greater than 4 in the Completion capability


Yellow area and; A score equal to or greater than 4 in either the Use or
Results capability areas

Red All other score

Table 7. EIAMM 1.0 vs. EAAF 2.2 comparison


Category EIAMM EAAF 2.2 (OMB )
Common Process improvement a pproaches.
areas Practical r esults-oriented a pproaches.
Standardization scheme is put OMB itself is supposed to do
Standardization
into place in the model level 4 its standardization role as a
areas
. formal program.
Single maturity model Multiple maturity m odels of
Variety of
segment architectures for
maturity
reference model of an
model
architecture
Public or private s ector Public sectors
Large, medium or small s ized (usually government areas)
Target enterprise
Federated countries or a
country
PDCA cycling scheme No specific quality scheme
QRM (Quality Reference for EA other than maturity
Model) or QMS (Quality model
Quality
Management S ystem) aligned
System
with EIAMM
V&V for major work in
process of EIA
Mitigate cultural risks to Aligning the level of
Cultural introduce new improvement achievement for EA with
Conflicts program with 4-phased quarterly EA performance
process improvement review of FEAP EAAF2.2

And other things left for the quality will be the quality of the entire work. First, we revise the
how quality status for the jobs processed will be milestone for the quality; the usual processes are
verified or validated and fixed before going to next review, inspection, verification and validation
stage. The big jobs may be current EIA views, depending on the degree of requirement of the
future EIA views, and enterprise information quality and putting them into places with well
architecture repository (EIAR) and securing the known procedures for these activities. Then all
quality of the resulting artifacts from this model components appearing on the EIA seem to be
or small architecture may be very important for theoretically secured by the above descriptions.

101
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

Last thing we will check about the quality is architecture program. On the other hand, the five
the process improvement and integration. It can rating scale similar to the maturity phases of the
be managed by adding these elements into QRM. CMMI is applied to the assessment of the seg-
Therefore QRM should handle all the process ment architectures for the Completion, Use,
improvement matters like CMMI for the major and Results area.
processes including if necessary, the addition Here we can see much diversified approaches
of specific processes and while the other five to the application of the maturity models under an
reference models (PRM, CRM, DRM, SRM, enterprise. OMB uses an overall process improve-
and TRM) should be under quality control, the ment model-3 rating scale, 3 different general
quality related results should be reflected as a maturity model in the segment architectures of
part of the QRM. three scoring area for the quarterly EA assess-
ment, and 6 maturity models for Completion
capability scoring area including performance
FUTURE TRENDS AND RESEARCH architecture, business architecture, data archi-
tecture (or information architecture), application
More practical process improvement techniques, architecture, technology architecture, transition
methods, and tools with accurate maturity mod- strategy, four maturity models for Use capabil-
els are expected to be available through a lot of ity scoring area including EA governance and EA
experience with various maturity models. What program management, EA change management
is important will be that EIA industry finally and EA deployment, collaboration and reuse, and
has to ensure more practical ROI to successfully CPIC(Capital Planning and Investment Control)
perform the transition activities through the ma- integration, four maturity models for Results
turity models of the process improvement for the capability scoring area including cost savings
unforeseen future. and cost avoidance, performance improvement,
The process improvement strategic efforts measuring EA program value, Internet protocol
of FEA maturity model initiated actively by the version 6 (IPv6) OMB creates and applies total
OMBs Federal Enterprise Architecture Program 18 different kinds of maturity model of its own
EA Assessment Framework 2.2 (OMB, 2007_2) version to manage its EA activities.
provide representative examples of the new trends In case of OMB maturity model, we find
seeking practical EA maturity model to find out that there is a clear trend of diversified maturity
the substantial ROI in the EIA industry. In the models used in an enterprise (Federal Enterprise)
FEAP EAAF 2.2 (Federal Enterprise Assessment to handle complexities of its EA.
Program EA Assessment Framework 2.2), OMB Other trend in OMB case is that the concept
provides two different types of process assessment of segment architecture was introduced. The
and improvement framework. One of the process purpose of development of segment architectures
assessment types is three rating scale (Table 6) for is to promote and accelerate a substantial reduc-
the agencys overall performance for annual EA tion in IT project implementation cost, as legacy
assessment process. The other process assessment IT applications are redesigned and replaced. The
type is five rating scale for the agencys quarterly use of segment architectures will also eliminate
EA performance review. enterprise-wide data duplication and the neces-
The three scale rating of annual assessment sity of reconciling the differences that occur
process is based on the five rating scale self assess- when the same data is collected and stored by
ment by the agencies and provides a comprehen- multiple stove-piped processes. From the OMB
sive review of the state of an agencys enterprise case, segment architecture seems to be other

102
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

representation for the target architecture focused own ITA/EA. Coming over the 21st century, a
on obtaining the practical ROI and early benefits. lot of countries have made laws and regulations
Therefore this is other obvious trend for the EA that force every governmental organization to
maturity model of OMB towards the practical establish infrastructures and processes to man-
ROI focusing on the segment architectures of age its information resources effectively and
target architecture and various kinds of process efficiently. And a galactic amount of budgets is
improvements technique. invested in the ITA/EA programs all over the
For our research proposal, we have found world every year.
that common area between EIAMM and FEAP But from the past experiences of AD/Cycle
EAAF 2.2 is focusing on practical ROI from the Architecture program, we learned a valuable les-
EA investments. But the differences between son that only the products and thoughts making
them would be that EIAMM has a standardization a practical contribution in giant programs could
scheme, 4 phased process improvement processes, be served for future stage. And one of those
and general application guideline regardless of products having outlived the AD/Cycle Program
the enterprise properties. We would like to study is still playing a major role in the ITA/EA market
further research, apply our model in real enterprise as shown in the example of System Architect of
architecture programs, and analyze the results to Telelogic, but all the other major products and
see what the critical success factors (CSFs) for vendors did not outlive because they were not
the application of EIA maturity model are. practical enough for the business and technologi-
Table 7 shows some prospective trend and cal environment and hardly gave benefits to their
insights of ITA/EA maturity model through the clients. To avoid the precedent of the AD/Cycle,
comparison between EIAMM 1.0 and EAAF 2.2. ITA/EA programs should be executed in a way of
However EAAF of OMB represents the current effectiveness and efficiency from the start.
practice of Federal Enterprise Government area For that reason, many governmental organiza-
and EIAMM is a theoretical proposal for the tions and standard bodies have proposed several
improvement of the ITA/EA practice. Therefore maturity models to assess ITA/EA maturity dur-
we need to consider this as a research purpose ing the establishment and operation of the relevant
with certain degree of limitation. programs. The benefits, however, of the ITA/EA
and the effectiveness of the maturity models are
still questionable because the models have difficul-
CONCLUSION ties in application and they are still immature to
measure the economic indexes such as ROI except
Since the final decade of the last century, every a few cases. So we need a new approach to assess
organization, which has suffered from the han- the ITA/EA maturity model from a quality and
dling of a deluge of information generated from economical efficiency view.
business activities, has been interested in the In this chapter, firstly we reviewed a number
ITA/EA. Beginning with Zachmans enterprise ar- of definitions of enterprise architecture and sug-
chitecture framework (Zachman, 1987), a number gested a new definition of Enterprise Information
of enterprise architecture frameworks have been Architecture to stress that our maturity model
introduced. Especially in public sectors, United focused on the information technology area of an
States federal governmental organizations have enterprise. And we explored several worldwide
sought to obtain strategic advantages through the total quality management (TQM) models which
successful establishment and operation of their have relations in their framework with information

103
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

area, and discussed the possibilities of applying DoD. (2006). Department of Defense Chief In-
the techniques that those models can contribute formation Officer Desk Reference. Vol.1 Foun-
to the ITA/EA maturity model. dation Documents. United States Department of
In the proposal section of a new EIA maturity Defense,
model, we adopted two major schemes of process
EA Shared Interest Group. (2005). Advancing
improvement area. One was the maturity level
Enterprise Architecture Maturity, version 2.0.
scheme of SEIs CMMI. We classified the matu-
American Council for Technology/Industry Ad-
rity level of the model in five steps, and specified
visory Council.
characteristics and processes for each level. The
other was the four-phased process improvement EFQM. (2006). The EFQM Excellence Award,
scheme of Boeing. Its practical approach for the Information Brochure for 2006, Version 2. Euro-
process improvement gave us an inspiration to pean Foundation for Quality Management.
devise a mechanism to improve the ITA/EA
GAO. (2003). A Framework for Assessing and
processes and assess the progress and quality of
Improving Enterprise Architecture Management,
them. In order to find the future direction of the
version 1.1. United States General Accounting
ITA/EA maturity model, we definitely need to
Office.
take a process improvement way using four-phased
process improvement, accumulate the resultant so- Hall, M. (2005). Building and Enterprise Archi-
lutions and improvement experiences as enterprise tecture Website and Repository. Lecture notes
assets with the standardization mechanism in an for the enterprise architecture course sponsored
enterprise, and use those capabilities to achieve by Korea IT Industry Promotion Agency, Seoul,
operational, tactical and strategic business goals. Korea.
We hope the proposed EIA maturity model will
Japan Quality Award Committee. (2000). Japan
be an incremental and practical approach to as-
Quality Award Award Criteria: Innovation and
sess the accurate maturity level and make sure
Creation for Competitiveness 2000 Ed. Japan
the effectiveness of ITA/EA.
Quality Award Committee. Tokyo.
NASCIO. (2003). NASCIO Enterprise Architec-
REFERENCES ture Maturity Model, Version 1.3. National As-
sociation of State Chief Information Officers.
Bernard, S. A. (2004). Enterprise Architecture
NIA. (2006). Government Information Technol-
Management Maturity (EAMM) Enterprise
ogy Architecture-Maturity Model, Version 1.0
Architecture Development, Documentation and
(Draft). National Information Society Agency.
Measurement. Lecture notes for the enterprise
Korea.
architecture course sponsored by Korea IT In-
dustry Promotion Agency, Seoul, Korea. NIST. (2007). Baldrige National Quality Pro-
gram. NIST. Technology Administration. Depart-
BSI DISC. (1998). The TickIT Guide A Guide to
ment of Commerce.
Software Quality Management System, Consturc-
tion and Certification to ISO 9001. OMB. (2007_1). FEA Consolidated Reference
Model Document, Version 2.2. Office of Manage-
Chrissis, B. M., Konrad, M., & Shrum, S. (2007).
ment and Budget.
CMMI Guidelines for Process Integration
and Product Improvement. 2nd Ed. Addison-
Wesley.

104
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)

OMB. (2007_2). Federal Enterprise Architecture Schekkerman, J. (2005). Trends in Enterprise


Program EA Assessment Framework 2.2. Office Architecture 2005: How are Organizations
of Management and Budget. Progressing? 1st Ed. Institute for Enterprise
Architecture Developments (IFEAD).
Platt, M. (2007). CIO Definitions Enterprise
Architecture. Retrieved August 13, 2007, from The Open Group. (2003). TOGAF (The Open
http://searchcio.techtarget.com/sDefinition/ Group Architecture Framework) version 8.1.
0,,sid19_gci1081274,00.html
Vu, J. (2004). Process Improvement Journey.
Ross, J. W., Weill, P., & Robertson, D. C. (2006). Lecture notes for the CMMI course sponsored
Enterprise Architecture as Strategy: Creating by Korea IT Industry Promotion Agency, Seoul,
a Foundation for Business Execution. Harvard Korea.
Business School Press.
Zachman, J. A. (1987), A Framework for Informa-
tion Systems Architecture. IBM Systems Journal,
26(3), 276-292.

105
106

Chapter V
Measuring the Benefits of
Enterprise Architecture:
Knowledge Management Maturity

Alan Dyer
EWA, Australia

Abstract

Enterprise Architecture is the organising logic for business processes and Information Technology infra-
structure, the purpose of which is to create a more effective organisation in the context of the businesss
strategy and goals. However, the ability to measure the effectiveness of any activities initiated under
the guise of Enterprise Architecture is limited, even more so in those organisations, such as government
agencies, that do not recognise financial return on investment. In this chapter the author introduces the
concept of Knowledge Management, linked to the strategic outcomes of Enterprise Architecture and
proposes a maturity model framework for the measurement of Enterprise Architecture implementation.
The aim of this chapter is to provide a basis for discussion of a wider Capability Maturity Profile with
architectural frameworks to help develop and measure the benefits of implementing frameworks and
architectures.

Introduction of the enterprise as well as the initial design. In


the commercial environment, where success is
Enterprise Architecture is a business strategy easily measured in financial terms, enterprises
tool; one that should be used in the operation must grow and improve (remain competitive).

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Measuring the Benefits of Enterprise Architecture

But Enterprise Architecture is not just a tool for architecture as a business strategy tool and how
use in a financially competitive world; it is a tool the architecture extends beyond design to the
that can help improve the efficiency of organisa- operation of the enterprise.
tions that do not measure success by the financial
bottom line. Government agencies represent
just that environment and those who make the EA frameworks
critical, strategic, decisions within the enterprise
must understand the level of improvement; they What is Enterprise Architecture?
must be able to measure such changes in their
enterprise. The seed for enterprise architecture can be traced
During this chapter I will provide some as far back as 1987, when Zachman (1987) provided
background by briefly discussing the concept a framework for information systems architecture
of Enterprise Architecture and its link to deci- (ISA). The first shoots, however, didnt really
sion-making. One aspect of decision-making is appear until Sowa and Zachmans paper (1992)
Knowledge Management, a concept that I will which extended the 1987 framework.
then explore and briefly discuss the measurement The extended Zachman framework is based
of such. This discussion is not intended to be an on a matrix of entities which can be used to
authoritative tome on Knowledge Management, describe particular perspectives and relation-
the discipline is still too young for such a case to ships. The columns represent the what, how,
be presented; however, the introduction and link- where, who, when and why, and the rows
age of the concept will allow for future research represent models such as scope, enterprise
into the ideas presented. model, system model, technology model,
A previous concept for evaluating Knowledge components, and functioning systems. Even
Management Projects exists, and I will use this at that early stage, the ISA was not seen as the
to develop a Knowledge Management Maturity enterprise architecture, but as an information
Model such that it can be used as part of an systems architecture.
architectural view enhancing the design and The identification of such architectures with
operation of the enterprise. Finally, I will discuss enterprise was not seen until Barnett et al (1994)
how a maturity model can be used in the context used the term Enterprise Architectures in their
of an architecture. paper on architecture for the virtual enterprise. In
These discussions are intended to show how there, the authors described enterprise architecture
the strategic audience (Chief Information Officers, as a blueprint or picture which assists in the
Business Analysts, Managers, etc.) can use ma- design of an enterprise; a blueprint that considers
turity models to determine if new approaches are three issues: what activities are performed, how
achieving the desired aims. But, such discussions activities are performed and how the enterprise
are not the sole purview of the strategic decision- should be constructed. However, the authors
makers. Academics and professionals can use took a business modelling approach and did not
maturity models for insights into processes and appear to have the full range of perspectives that
knowledge transfer. Technologists will be more Zachman (with Sowa) had suggested.
interested in some of the maturity offshoots, but Study into this new field continued and Ber-
will still benefit from the strategic understanding nus and Nemes (1996) identified the emergence
of what their tools should support. of a number of enterprise reference frameworks,
Ultimately, this chapter is intended to engender including the Purdue enterprise reference archi-
further discussion on the evolution of enterprise tecture, the GRAI integrated methodology, Com-

107
Measuring the Benefits of Enterprise Architecture

puter Integrated Manufacturing Open Systems of individual frameworks is outside of the scope
Architecture (CIM-OSA) and Toronto Virtual of this chapter; the referenced papers provide
Enterprise (TOVE). These Australian research- descriptions in great detail.
ers produced the generic enterprise reference The proliferation and evolution of frameworks
architecture methodology (GERAM) to describe presupposes a large degree of research and work,
the different types of architecture that were ap- but, as the literature review reveals, most of this
pearing. GERAM was not a framework within work has only scratched the surface.
itself, although the authors described it as being Wikipedia3, to some extent, maps some of
applicable to potentially all types of enterprise. the evolving thinking about EA, with an earlier
Even by this stage, enterprise architecture definition of [a] comprehensive framework used
was not a common theme; Bernus et al (1996) to manage and align an organizations structure,
noted keywords such as enterprise integration, processes, information, operations and projects
reference architecture, enterprise engineering with the organizations overall strategy (No-
methodology, and enterprise modelling but vember 2005) and then a revised definition that
not enterprise architecture. encapsulates the current essence: [e]nterprise
During the mid-1990s, Zachman produced architecture is the practice of applying a com-
three relatively short papers (1996; 1997; 1997a) prehensive and rigorous method for describing a
which re-introduced the work done previously current and/or future structure and behaviour for
on ISA. It was at this point that Zachman (1996) an organizations processes, information systems,
introduced the concept of EA by remarking on personnel and organizational sub-units, so that
his original framework: it was clear that it they align with the organizations core goals and
should have been referred to as a Framework for strategic direction (October 2006).
Enterprise Architecture. Schekkerman (2006) provides an overview of
These latter papers did not change the original existing architectures and quotes some definitions
framework, but did clarify the context and pro- (notably from the Open Group, US Federal CIO
vided a stepping stone for further work. Council and the former Meta Group Inc.). He
Chen et al (1997) used enterprise architec- doesnt provide a succinct definition of his own,
ture (inter alia) as a key word for their paper on but does define various elements that make up
mapping the GRAI integrated methodology onto the phrase Enterprise Architecture (including
GERAM. This is not the only instance of map- architecture, elements and enterprise).
ping onto the GERAM, Noran also mapped the From here we can deduce that an Enterprise Ar-
Zachman and C4ISR frameworks (2003; 2005). chitecture is the structure of people, processes,
The theme of mapping these diverse frameworks business and technology, their interrelationships
shows the underlying commonality, at least in and the principles and guidelines governing their
purpose if not in method. design and evolution over time; in the context of
Since the inception of EA, the frameworks a collection of organisations with a common set
have proliferated. According to Gartner (Allega, of goals/principles or a single bottom line.
2005) and The Institute for Enterprise Architec- Finally, the most recent succinct definition has
ture Developments (IFEAD)1 there are at least come from Ross et al (2006), who state that En-
nine architectural frameworks (although not all terprise Architecture is the organizing logic for
of these have been blessed with the title of En- business processes and IT infrastructure reflecting
terprise, they can be linked to EA).2 Many of the integration and standardization requirements
these frameworks are not in competition, but are of the companys operating model.
evolutions or variations on a theme. A description

108
Measuring the Benefits of Enterprise Architecture

EA and the Enterprise man, 1997), and a means of describing the look
and feel (Lapkin, 2004). Lapkins pattern-based
Enterprise Architecture is less than a decade old approach is by no means unique; other authors
and the concepts and underlying knowledge ap- have expounded on mechanisms to ease the burden
pear to be maturing, including the generation of on enterprises, such as the language described
standards such as ISO15704:1998 (Requirements by Jonkers et al (2003), the Universal/Unified
for Enterprise Reference Architecture and Meth- Modelling Language (UML) approach taken by
odologies), preEN/ISO19440:2003 (Enterprise Armour et al (2002), and the viewpoint oriented
Integration - Constructs for Enterprise Modelling) approach taken by Steen et al (2004).
& 19439:2003 (Enterprise Integration - Frame- As such, EA is only an enabler to enterprise
work for Enterprise Modelling). efficiency and enterprises must consider which
Earlier papers (Chen et al, 1997; Allega, framework to adopt. The process of developing
2005; Bernus et al, 1996; Schekkerman, 2004) architecture (including the tools and training
concentrated on the mechanisms (the industrial required) is an investment by an enterprise; each
aspects) of EA but do not detail how much benefit enterprise, thus, must consider how much to invest
an organisation can gain from implementation. in building the architecture, how much to invest in
Part of this issue, and certainly outside the scope ensuring implementation or compliance and how
of those documents, is that each implementation much to invest in maintaining the architecture.
of a framework or architecture is highly depen-
dent on the enterprise context. While the authors Architectural Returns
could describe a general framework, they could
not describe how each element of the framework The return on any investment is an important
affects individual businesses, especially as each consideration for the enterprise. Gartner authors
business may operate in a different environment (Lopez, 2002; Allega, 2005a) have noted that
(e.g. some may be in a financial environment, some the traditional accounting method of Return on
may be political and others may be traditional Investment4 is not valid when measuring EA.
trade-based). This perspective was reinforced Lopez suggests that Return on Assets5 (ROA)
by Schulman (2004) who noted that frameworks should be used, while Allega notes that the ap-
should be matched to the organisation. plication of EA is where the benefits lie, not in
The number of available frameworks and the the architecture itself. Allegas paper, while not
need to match generic frameworks to the organisa- providing any real insights into how returns can
tion leads to the premise that no single framework be measured, notes that predicting the results of
is fully complete (Schulman, 2004). As such, any EA is not feasible unlike the predictability of
chosen Architecture will have to be developed a traditional investments in the enterprise. Unfortu-
process discussed by Lapkin (2004). In doing so, nately, Lopez links the ROA approach only to IT
the advice of Allega (2005) should be heeded in asset productivity, and not enterprise productivity
that proponents should not become entangled in as a whole.
taxonomical debates and should concentrate on Saha (2004) provided some insight into a
what is important, especially as taxonomical real options approach, which is not so much a
classifications appear to evolve or change about means of evaluating EA, but as a way of looking
every 15 months. at investments in the architecture. This approach
Enterprise Architecture is not an end unto looks at the options (defer, explore/pilot, scale,
itself, in that it is a tool for dealing with the com- compound, growth) and maps these to the condi-
plexities and dynamics of the Enterprise (Zach- tions for viability and risks. These elements may

109
Measuring the Benefits of Enterprise Architecture

give some insight in how to judge the value of the maturity models, forming a Capability Maturity
architecture in the context of the enterprise. Saha Profile (CMP), would enable the necessary level
acknowledges that [a]ssessing the value of EA of granularity.
initiatives is imprecise and still evolving. Under Thus, the CMP is an important mechanism to
current understanding, the benefits appear to be measure the progress of evolution of the imple-
intangible. mentations resulting from the architecture. The
The literature reviewed thus far suggests that CMP is not a measure of the architecture itself;
EA is still hard to describe, especially in enter- but of those elements that are described by the
prise-specific terms, and even harder to measure. architecture.
While frameworks exist to build architectures, A profile addressing maturity of capability is
these frameworks do little to describe the benefits not a common feature amongst the architectural
and costs, unless tailored by experts within the frameworks previously discussed and further
enterprise; even then the overall value may be study is required to validate any benefits, as well
indeterminate. That EA is being accepted is not as which facets are suitable for inclusion. However,
being contested, but EA is still evolving (Schek- the CMP has been considered in the past, albeit
kerman, 2004). in a very limited form.
Quantifying architectural benefits using finan- The C4ISR Architectural Framework initially
cial measures may be hard enough, but quantifying considered a CMP, but this artefact was not includ-
these benefits in organisations that do not rely on ed in the published version (C4ISR Architecture
the financial position as the ultimate measure of Framework, 1997). Reference to this consideration
success (such as Government agencies) is even can be found in the Department of Defence Archi-
more difficult. Moore (2005) highlights the dif- tectural Framework (DoDAF) Deskbook (2003),
ferent drivers for the government; the ability to which notes that the Capability Maturity
relieve budget pressures remains key. Whereas Profile can aid in the transition from an As-Is to
commercial organisations can find solace in the a To-Be architecture (p 2-106), measuring
cold hard bottom line, government departments the rate of progress of change and evolution. The
rely on public perception of the efficiency of DoDAF itself did not include a CMP.
service within the nominated budgets. The Australian incarnation of the DoDAF (the
A measure that highlights efficiency rather Defence Architecture Framework - DAF), how-
than one that depends on financial metrics is thus ever, did include the CMP as a Common View
necessary to ensure that the implementation of (DAF Resources CD, 2005). The DAF noted the
the architecture is providing benefit. Maturity Capability Maturity Profile aids in describing
models are one mechanism to provide this mea- the transition from the current state (as-is) to a
sure. Maturity models also have added benefit of mature state (to-be) of an architecture. The CV-3
identifying a progression from the current state supports other products by providing a roadmap or
to the desired state when the maturity model is profile of the areas that need to change to achieve
properly tailored to the enterprise. a mature capability. The DAF version of the
Enterprise Architectures, though, cover CMP was a direct replica of what was suggested
many facets of an organisation. Technology, for the C4ISR Architecture Framework (C4ISR
decision-making, information and capability are Architecture Framework, 1997).
four examples of such facets. A single maturity Unfortunately, the DAF description of the
model would not be able to cover all the facets CMP does not put the same emphasis on tailoring
effectively, and an aggregated view may hide op- and adapting the CMP to meet the needs of the
portunities for further improvement. A suite of architecture. Whereas the C4ISR AF product (as

110
Measuring the Benefits of Enterprise Architecture

described in the DoDAF) provides example cat- Paulzen & Perc, 2002). KM encompasses much
egories to demonstrate the view, the DAF provides more than the technological processes to support
the same categories as absolutes (termed informa- business outcomes; the people, organisation and
tion system components). While these components processes, and content are critical facets (Paulzen
are useful at the technology level, they add little & Perc, 2002). Some of these basic processes
to understanding the enterprise. To this end, the include creating, storing and retrieving, trans-
DAF CMP provides little benefit in measuring ferring and applying knowledge (Kankanhalli
the effects of the overall architecture. & Tan 2004).
A generic CMP could look at the many facets KM differs from Information Management
of an architectural particularly those that address (IM) in that KM aids the creation of innovative
business processes, behaviours, and operating knowledge, the application of knowledge to in-
models. An integral part of business execution crease value, and results in actions that reflect
is decision-making and the results of deci- changes in human behaviour. IM, however, is an
sion making can be seen in the behaviours and important enabler for KM and the links between
outputs of processes. Decision-making is built Data Information Knowledge are important
on a foundation of knowledge; knowledge is an aspects of KM; employees routinely transform
important base for processes and decisions. As knowledge into information and information into
such, the ability for the organisations knowledge knowledge (Furlong, 2001). Information Tech-
management to influence the business execution nology (IT) is a related enabler, IT can be used
is one of those facets that should be measured as to enforce rules or to empower knowledge and
the enterprise evolves. information processes; however, the emphasis on
IT should not be technology for technologys sake,
but a supporting mechanism for work practices
Knowledge Management and (Furlong, 2001).
current measurement of KM IT and IM are not the only enablers for KM;
others include business strategy, leadership is-
An Explanation of Knowledge sues, cultural concerns, content management,
Management organisational structure, technology and inno-
vation (Furlong, 2001). The knowledge workers
Formalised approaches to managing knowledge have specialised skills and intellect, albeit they
are recent phenomena, although these approaches may be recognised through different perspectives;
are influenced by several, more traditional, disci- these skills directly influence the organisations
plines. As such, definitions for Knowledge Man- growth and competitiveness. Competitiveness
agement (KM) are only now emerging and can in a government context goes beyond the fiscal
hardly be called mature. KM is about managing management and into the realm of being more
knowledge processes to support both business capable than the adversary (however so defined);
processes and organisational knowledge bases; the concept of business is different between the
connecting intellectual assets and business growth government and commercial worlds although the
(Furlong, 2001; Paulzen & Perc, 2002). underlying lessons and processes may have more
As well as emerging definitions, the character than just a passing similarity.
of KM is also developing. Knowledge is a ubiq- Managing knowledge, itself, is not new, but
uitous entity that is applicable in new environ- as a discipline KM is a young, growing, field that
ments and a catalyst (in that knowledge is not a can assist organisations to improve their business
direct agent or end result of itself) (Furlong, 2001; processes and increase competitiveness. However,

111
Measuring the Benefits of Enterprise Architecture

KM depends on expressing many underlying con- ability, maintainability and migrate-ability (shared
structs within the organisation and understand- across different environments through sharing,
ing the connectivity, not just from a technology interoperating and porting) (Duttaroy, 2005).
sense, but also from a social and value network The facets of KM that can be measured are
context. This level of understanding implies a numerous (Metainnovation, 2004; Kankanhalli &
fresh look at the business architectures, a better Tan, 2004; Furlong, 2001; Martin, 2006; Rober-
understanding of how the different perspectives ston, 2003; Standards Australia AS:5037, 2005);
and views are connected. Table 1 identifies broad areas; the headings have
been taken from the Australian Standard.
Measuring KM Knowledge audits should measure the role of
structure; technology experience, perceptions,
KM is a strategic initiative and that measurement requirements; the impact of culture; the nature
is necessary to understand success and failure of process management; sources of innovation;
(Metainnovation, 2004). Knowledge Management models of communication; strategy; and percep-
can be measured in a variety of ways; success indi- tions of the current KM initiative (Furlong, 2001).
cators can be artefact-, activity-, cultural- (behav- Many mechanisms exist to measure KM, or the
ioural-), and intellect-centred; another perspective impacts of KM initiatives. Some that have been
on these elements identifies the number of new discovered through the literature include (from
claims, rate of generation, quality of claims and (Kankanhalli & Tan, 2004; Roberston, 2003),
impact of the knowledge (Standards Australia, etc):
2005) (Metainnovation, 2004). Likewise, meta-
data (an enabler to knowledge management) House of Quality (development of a metrics
should be checked for meaning, maturity (in terms matrix to find correlations and focus priori-
of consistency and enduring integrity), manage-

Table 1. Measurable areas of KM as summarised from the literature review


Artefact Activity Behavioural Intellect
Rate of knowledge acquisition Staff efficiency Implementation of knowledge Quality of knowledge acquired
Predictive Accuracy of Knowledge Process efficiency initiatives Change in intellectual capital
Claims Staff learning Selected behaviour and Predictive power of knowledge
Explanatory power of knowledge Knowledge transfer or diffu- interactions (participating in claims
claims sion (requiring a knowledge KM-related activity) Information quality (including
Rate of knowledge production broadcaster and a knowledge Comparing future perfor- techniques such as user rankings,
(includes papers produced, lessons receiver) mance with benchmarks expert evaluation, useability
learned, databases created, etc) Community of Practice Effectiveness of knowledge testing)
Knowledge production quality contributions and accesses claims User feedback on the knowledge
Parsimony measure of knowledge Organisational Awareness Staff morale provided
claims (minimum number of sym- (knowing policy and pro- Anecdotal evidence
bols required to convey relevant cedures, standing operating Intellectual property
knowledge) procedures etc)
Technical aspects for Enterprise Outcomes (impact on the
Knowledge Repositories (EKR) organisation key performance
(system run-time metrics, number indicators)
of users, number of accesses etc) Consistency of advice
Originality of knowledge claims Organisations leverage of
knowledge claims
(Quality: accuracy, timeliness,
granularity, currency)

112
Measuring the Benefits of Enterprise Architecture

ties on those elements that will have the best Measuring Knowledge Management, like KM
effect) itself, is a maturing discipline and appears to cur-
Balanced Scorecard (a tool to translate high- rently be soft around the edges. Techniques exist
level strategies to real targets) to subjectively measure the effect that knowledge
American Productivity Center bench- has on an organisation; the ability to confidently
marking approach (a process classification objectively measure such effects (and hence, con-
framework that can be used to benchmark fidently enhance business processes) are yet to be
and assess impact on business processes) fully developed. Most of the techniques hinge on
Skandia Navigator (a series of metrics in five scorecards to quantify the activity levels of an
focus areas which could be considered as an organisation, a means to indicate an organisations
extension of the Balanced Scorecard) knowledge management maturity level.
Intellectual Capital index (an extension to
the Skandia metric) Maturity Models
Intangible Assets Monitor (largely focussed
on the financial perspective of intellectual A maturity model is a means of simplifying the
capital and reputation groups the indica- description of an organisations level of devel-
tors {e.g growth, renewal, efficiency and opment, and the stages of development that an
stability/risk} into three distinct categories organisation can be expected to pass through
{external structure, internal structure and as part of its continuous improvement strategy
individuals competence}) (Weerdmeester et al, 2003). Models are simple,
Knowledge Capital Valuation techniques with a limited number of maturity levels which
such as: have certain requirements. The levels themselves
Market value to book value, form a continuous progression (from an initial level
Tobins Q, to a perfect ideal), in that an organisation has
Calculated intangible value, to pass through them sequentially (Weerdmeester
Baruch Levs knowledge capital valu- et al, 2003). Essentially, maturity models are
ation, designed to be easy to understand and use, thus
Paul Strassmanns knowledge capital suitable for presentation to the higher-level deci-
valuation, sion-makers in an organisation (Marco, 2002).
Measuring intellectual assets, and A well known maturity model is the Software
Accounting methods for measuring Engineering Institutes Capability Maturity
intellectual capital. Model (CMM), which has 6 levels (not performed,
performed informally, planned and tracked, well-
These techniques are designed for use in the defined, quantitatively controlled, continuously
commercial world and are not easily tailored, if improving) and 5 orthogonal concepts (consistent,
at all, for use within the non-commercial (e.g. repeatable, transferable, quantitative and qualita-
Government) environment where costs and re- tive) (Marco, 2002). Some additional models, of
sources are measured in dimensions other than which many are extensions, or variations of the
the dollar. The use of techniques is somewhat CMM, are (Weerdmeester et al, 2003; Mohanty
hindered by a lack of consistency of vocabulary; & Chand, 2005; Paulzen & Perc, 2002):
although most of the techniques overlap in their
approach to measures and metrics (Kankanhalli The Knowledge Management Framework
& Tan, 2004). Assessment Exercise which uses a five level
knowledge journey covering key areas

113
Measuring the Benefits of Enterprise Architecture

of knowledge management (awareness and use, store, distribute and evaluate), manage-
commitment, strategy, culture, external ment areas and assessments; with the under-
focus, incentives, IT, maintenance and pro- standing that knowledge processes can be
tection, ongoing assessment, organisations, improved by enhancing the corresponding
and using and applying knowledge). The management structures. The KPQM assess-
key areas of KM can also be defined though ment structure places process attributes in a
people, process, content and technology. matrix of maturity stage versus organisation/
The Quality Management Maturity Grid people/technology; each process attribute
with 5 stages across six measurement can be described through activity-specific
categories (management understanding or activity-independent practices.
and attitude, information quality organisa-
tion status, information quality problem The maturity of Information Management
handling, cost of information quality as (as an enabler to KM) practices is also an im-
percent of revenue, information quality portant aspect of any KM System; management
improvement actions, and summation of of information is most effective when data and
company information quality posture). information is treated as assets (Ladley, 2002).
The Siemens Knowledge Management Again, a variety of models, the key principals of
Maturity Model which defines five levels which parallel those of any capability maturity
of maturity across key areas (strategy, model, are available, with corresponding levels
knowledge goals, environment, partner- (operate, consolidate, integrate, optimise, in-
ships, staff, competencies, cooperation, novate or reporting, analysing, predicting,
culture, leadership, support, knowledge operationalising, active warehousing) that may
structures, knowledge forms, technology, work across types of activity (primarily batch with
infrastructure, processes, roles, organisa- pre-defined queries, increase in ad hoc queries,
tion). However the model is applied across analytical model grows, continuous updates and
four perspectives (time horizon, knowledge, time sensitive queries gain importance, event
actor, rules) leading to eight key distinctions based triggering takes hold). Hybrids are also
(strategic, operative, external, internal, available such as those suggested by Ladley
people, technology, informal, formal). which aligns levels of maturity (transactions,
The KMM Model from Infosys Technologies reporting, analysing, predictive, operationalise,
which uses five levels of maturity. These collaborative, closed loop, foresight) with the
levels can be applied across people, process DIKX hierarchy (in this case data, information,
and technology and have defined key result knowledge, action) (Ladley, 2002).
areas.
TATA consultancy services provide another
five level maturity model addressing the Linking KM to Enterprise
three basic pillars of capability (people, Architecture
process, technology).
The Knowledge Process Quality Model Knowledge and knowledge management do not
(KPQM) is based around the dimensions of currently have an explicit link to Enterprise Ar-
maturity stages, knowledge activities (those chitecture or to any of the previously mentioned
business activities in which the handling architectural frameworks. The indirect linkages
of knowledge is of particular importance; can be found by examined the purposes of the
characterised by the types identify, generate, Enterprise Architecture and understanding the

114
Measuring the Benefits of Enterprise Architecture

nature of the enterprises. EA should document Nothing in the literature easily distinguishes
business processes and organisational knowledge the importance of decision-making, knowledge
bases, while KM should manage the knowledge management or enterprise architecture between
processes that support these. Certainly, an indi- commercial and government interests. However,
rect link was noted earlier in this chapter where government interests do not have financial share-
I stated that KM depends on expressing many holders to please; the implementation of policy
underlying constructs within the organisation and depends on the strength of their decision making.
understanding the connectivity, not just from a In this sense, there is little difference between
technology sense, but also from a social and value the non-profit and profit based organisations, as
network context. Additionally, the Australian these decisions affect the operating capital (public
Standard (Standards Australia AS:5037, 2005) ac- perception or operating budget). While the im-
knowledges two principal benefits of undertaking portance of decision making may be no less, the
knowledge management: to improve productivity outcomes of decisions in the government sector are
and organisational efficiency, and to promote more visible than that of the commercial sector.
innovation. Enterprise Architecture is the frame Knowledge Management is an integral sup-
within which those benefits can be elicited. port activity for decision-making, along with the
Snyman et al (2004) looked to Drucker in not- information held with in the intellectual capital and
ing that the knowledge and knowledge workers enterprise environment (Vandegriff, 2006). Cer-
are the most valuable assets for enterprises in tainly, KM helps connect the intellectual assets and
this modern day. An appropriate fit between the business growth (Furlong, 2001; Paulzen & Perc,
overall strategy and an organisations knowledge 2002). An Enterprise Knowledge Architecture
management is critical. From an architectural (as a form of Information Systems Architecture)
viewpoint, business processes are (or should be) permits integration of knowledge management
an extension of the flow of information through systems (including necessary processes) into a
the organisation; determining this flow of infor- knowledge network (Iyer et al, 2006).
mation will enable strategists to assess the flow Enterprise Architecture and Knowledge Man-
and exchange of knowledge. agement are very closely tied to the enterprises
The understanding and expression of the strategy. Ultimately, Zachman makes a direct link
enterprise vision and strategy remains a critical between EA and KM; Enterprise Knowledge
function of ensuring the enterprise can be suc- Management is very, very closely tied to, if not the
cessful. Enterprise content management, which same as, Enterprise Architecture Management
takes place in a collaborative environment and (Zachman, undated). The upshot of Zachmans
supported by enabling technology and tools, is thoughts is that the expression of the architecture
essential to create an organisation that is trans- is an expression of the underlying management
parent, extended and intelligent (Klein, 2005). knowledge of the organisation. The measurement
Although Klein takes a low-level perspective of the effectiveness of Knowledge Management is
on Enterprise Architecture (equating EA with an indirect measurement on the effectiveness of
data or information management), the linkages the use of knowledge within the organisation.
between the strategy and the need to manage
content remain valid. This is particularly so for
those organisations who measure their assets in A KM Maturity Model
the content and services they provide, rather than
the direct financial equation of the products of In the previous section, I noted that KM is a concept
commercial entities. that assists human decision-making; improve-

115
Measuring the Benefits of Enterprise Architecture

ments in KM maturity indicate an improvement expertise to exercise the Maturity Model for full
in the feedback from the system, and a greater effect would not persist within a department;
understanding of the overall business (including let alone across Government. For these reasons,
strategies). KM can be measured through arte- the previously listed Maturity Models would
facts, activity, intellect, behaviours or maturity; not be suitable for implementation in a living
although, techniques to extract useful metrics are Architecture.
still being evolved. To this end, I am proposing a framework for
The hard measures (such as those advocated a persistent maturity model to form one leg of
through the Australian Standard (Standards Aus- the CMP. Rather than commence this work from
tralia AS:5037, 2005), require careful selection scratch, I have decided to build on the work of
and presentation to ensure integrity of meaning. Iftikhar et al (2003) from their paper Develop-
A measure of the rate of production of artefacts ing an Instrument for Knowledge Management
(for instance) means nothing in isolation; causal Project Evaluation, in which the authors devel-
factors (such as changes in the environment and oped an instrument of evaluation for knowledge
rates of knowledge error) must also be consid- projects.
ered. In the context of EA, partial measures will
be open to interpretation and the flow-on effect The Knowledge Management
of creating the architecture may not be directly Maturity Model framework
visible or attributable to any improvements in the
measures until well after the fact. In addition, such Iftikhar et al (2003) noted that [e]valuation is
measures may need to be seasonally adjusted; important [] to determine whether the organisa-
a process that may not be possible if the informa- tions investment pays off in terms of demonstrable
tion is not available, especially through lack of performance improvements. In many domains,
historical collection. however, changes in performance are difficult
Maturity Models have the benefit of providing to measure because of uncontrollable factors that
a snapshot of the organisation at a particular exist within the larger organisational context.
point in time. Such models can be subjective, the (p57) The authors defined a series of questions
data provided depending on the interpretation of that can be applied to a knowledge project. The
the questions by the respondent. However, the questions are divided into four key categories,
design of a Maturity Model is intended to be static each with significant sub-categories:
throughout the life of the initiative (however that
may be described) and comparisons at various Organisational Environment. Sub-categories
points in time should be valid. include Social Aspects, Culture, Incentives
In the previous section I noted a number of and Trust Issues.
existing Maturity Models that could be used, Technical and Managerial Support. Sub-
but these either provide a limited overview (the categories include Organisational structure
categories are too aggregated to be useful), or are and Awareness and Commitment.
proprietary and require resources (both financially Strategy and Goals for KM Projects. Iftikhar
and time) to tailor and complete. Certainly, the et al did not list any particular sub-categories
CMM is extremely complex and requires a degree for this section.
of training to complete properly. However, (from Utilisation of Knowledge and Technology.
my own observations) the nature of Government Sub-categories include Information Tech-
staffing precludes the widespread employment of nology, Maintenance and Protection, and
highly specialised personnel, and the necessary Using and Applying Knowledge.

116
Measuring the Benefits of Enterprise Architecture

Iftikhar et al did not include a Quality section Culture


in their questions, but the quality of the outcomes
when dealing with knowledge and decision-mak- Iftikhar et al (2003) noted that [o]rganisational
ing is as important as the fact that an outcome culture reflects the behaviour within an organisa-
has been achieved. Likewise, an overall statement tion, which either enables or hinders effective KM
reflecting the organisations perception of their (p58). The enterprise architecture frameworks
own KM was not considered by Iftikhar et al. highlight organisational behaviours and important
Within the following sections I follow the in- processes. Development of the architecture should
tent of Iftikhar et al (2003) who posed a series of invoke discussion about these behaviours and the
questions (or made a series of statements) within desired outcomes.
each of the categories. After a brief discussion
on each of the categories I will develop a table Incentives
which will link the questions (or statements) posed
by the authors to a maturity marker. I have not The development of the architecture itself is un-
fully developed the maturity model within this likely to provide impetus to staff to give maximum
chapter validation of the framework within an output because the Architecture does not provide
active architecture is still a work in progress. In any direct recognition or appreciation. However,
addition, I do not intend to discuss the authors improved efficiency may manifest itself as a result
work in any detail; this can be sourced from their of programs introduced through the improved
original paper. awareness promoted by the architecture.

Organisational Environment Trust Issues

Iftikhar et al (2003) noted the importance of a Iftikhar et al (2003) note that [k]nowledge sharing
knowledge friendly atmosphere for business to and willingness to take the time to help others is
succeed. based on trust and confidence (p58). Trust and
confidence is often built on personal relationships,
Social Aspects but these factors can be enhanced by using the
architecture to formalise the interactions that are
Knowledge is not just a technical artefact but is necessary in the development of trust. Common
part of the social environment within which it knowledge of processes, outcomes and commu-
is used. In the knowledge realm organisational nication methods will help build the trust and
culture and interpersonal communications have confidence that is needed.
an important role to play in the non-technical
information system. (Iftikhar et al, 2003). Technical and Managerial Support
Internodal communication is an important
element within any enterprise architecture. At the KM initiatives can be started based strictly on
technical or information level, this communica- the availability of new technology. However, if the
tion may exist from system to system, technology managerial support is missing even a successful
to technology; however, within an enterprise project might fail when it comes to utilisation
architecture, the nodes are more likely to include of the system in the long run (Iftikhar et al,
personal communications. 2003, p59). Architectural frameworks may not
necessarily show the support (both technical and
managerial) needed to ensure success, but they can

117
Measuring the Benefits of Enterprise Architecture

formalise the mechanisms for support as shown the linkages between knowledge and technology.
in the next two paragraphs. The form will depend Importantly, any measurement of the architecture
on the architectural framework chosen. should show if the tools exist to properly support
decision making in the organisation. Iftikhar et
Organisational Structure al (2003) had noted the important relationship
between collecting and extracting information
The command and control (C2) structure is an and the need to turn that which is collected into
essential view in the frameworks evolved from knowledge.
the C4ISR AF. Sowa & Zachman (1992) had not
specifically identified a C2 hierarchy in his model, Information Technology
but such a wireframe would sit comfortably at the
intersection of System Model and People. When Technology provides the tools necessary to sup-
discussing the resultant organisational structure, port the KM processes. The Architecture should
the term maturity may be misleading as some of highlight the range of tools or technology needed,
the elements reflect business choices rather than and promote their effective use.
growth. As an example, an organisation may
decide to not have a full-time Chief Knowledge Maintenance and Protection
Officer, but instead to ensure the role is spread
across other staff. Like any physical asset, data, information and
knowledge (and the tools and processes that ma-
Awareness and Commitment nipulate them) must be maintained, otherwise the
resultant deterioration will render them worthless
Effective use of the workforce depends on the (Iftikhar et al, 2003). The development of the
awareness that can be built by the ability for architecture allows the important aspects of the
business functions to link and share information organisation to be documented along with the
(Iftikhar et al, 2003). The developed architecture needs of the organisation; facilitating processes
documents the linkages, through processes and to ensure protection and maintenance.
information, between the business functions.
Using and Applying Knowledge
Strategy and Goals for KM Projects
Collecting information and exploiting it to produce
The relationship between EA and strategy has knowledge is of no avail if these products are
been previously discussed and architecture should not used in an effective manner. Amongst other
clearly demonstrate linkages between strategies things, the role of the architecture is to document
and goals. In addition, the architecture will help processes to ensure that such knowledge is used
identify current gaps and act as an initiator for efficiently and effectively.
various projects (through the as-is and to-be
representations). Quality

Utilisation of Knowledge and Wikipedia6 notes that the Quality Management


Technology Maturity Grid is used by a business or organisation
as a benchmark of how mature their processes are,
The Information Sciences origin of enterprise and how well they are embedded in their culture,
architecture (c.f. Zachman, 1987, 1997) reinforces with respect to service or product quality manage-

118
Measuring the Benefits of Enterprise Architecture

ment. The architecture documents the processes will reduce the relevance and hence the accep-
within the backdrop of the organisation. As such, tance and utility.
any maturity model reflecting the organisation
should also include a section on quality. To
some extent, these elements are covered within Using the KM-MM in an EA
the previous elements; but explicit statement of the context
elements will help clarity and understanding.
Despite the level of work to reach an effective
Tailoring the Model maturity model, the model is not an end within
itself and is a tool to support the processes of the
The following table (Table 2) summarises the link enterprise as well as supporting the development
between the instrument of evaluation mooted by of the Architecture. Like all tools, it will only
Iftikhar et al (2003) and a KM Maturity Model be effective when used in the right manner and
Framework. Naturally, the associated maturity context. Four broad uses of this maturity model
levels or stages (not listed in this table) must be exist in the context of EA: identifying the baseline
tailored for each organisations; failure to do so (as-is), identifying the goal (to-be), identifying

Table 2. A KM maturity model framework


Sub Category

Iftikhar et al (2003) Question (sic) (pp58-61) Resultant Maturity Area Description

Social Aspects
All employees are ready and willing to give advice or help on This area identifies the extent that employees give advice or
request, from anyone else in the company. help, on request from anyone else in the company.
Informal networks across the organisation are encouraged. This area identifies the effect and support of informal net-
works within the organisation
Multi-disciplinary teams are formed and managed. This area identifies how multi-disciplinary team are recog-
nised within the organisation.
Staff is rotated to spread best practice and ideas, or the natural This area identifies how the organisation utilises staff move-
internal staff turnover is actively capitalised upon in this ments to spread best practice and ideas.
regard.
This area identifies the organisations approach to com-
Social Aspects

Training is available for those who want to improve their com-


munication skills. munications training.
Management uses different means to facilitate knowledge This area identifies the managements approach to different
dissemination and creation e.g. mentoring programs, project means to facilitate knowledge dissemination and creation.
debriefing, learning games, training programs, story telling etc. e.g. mentoring programs, project debriefing, learning games,
training programs, story telling etc.
There is a strategic program in place to collect and analyse This area identifies the organisations approach to the use
business intelligence information to assist with business of business intelligence to assist with business strategy
strategy development. development.
Technology is shared with suppliers/clients where appropriate This area identifies how technology is shared by the organi-
to enhance relationships. sation.
There is a program of active participation in business confer- This area identifies the organisations approach to participa-
ences and other discussion forums to share and learn ideas and tion in business conferences and other discussion forums.
experience.

continued on following page

119
Measuring the Benefits of Enterprise Architecture

Table 2. continued
Sub Category

Iftikhar et al (2003) Question (sic) (pp58-61) Resultant Maturity Area Description

Culture
Failure is not stigmatised, rather it is seen as an opportunity This area identifies the organisations approach to failure.
to learn.
Recording and sharing knowledge is routine and second nature This area identifies the organisations approach to recording
to promote continuous knowledge exchange. and sharing knowledge.
Looking for the best practice or work that can be re-used is a This area identifies the organisations approach to re-use of
natural, standard process. work and practices.
Knowledge sharing is seen as a strength, knowledge hoarding This area identifies the organisations approach to knowledge
as a weakness. hoarding and sharing.
Time is allowed for creative thinking. This area identifies the organisations approach to creative
Culture

thinking.
Employees are encouraged to learn more and develop them- This area identifies the organisations approach to employee
selves. development.
There are no restrictions on access to information unless it is This area identifies the organisations approach to access to
confidential or personal. information (allowing for privacy or confidentiality provi-
sions).
A common language exists for exchanging and clarifying The area identifies the ability of the organisation to use a
information to people with different backgrounds. common language for exchanging and clarifying informa-
tion to people with different backgrounds.
Efforts are made to combine the ideas of different cultures This area identifies the organisations efforts to combine the
within the organisation. idea of different cultures within the organisation.
Incentives
Good KM behaviour (e.g. sharing, reusing etc.) is actively This area identifies how the organisation promotes good KM
promoted on a day-to-day basis. behaviour.
Bad KM behaviour (e.g. hoarding, not using best practices This area identifies how the organisation deals with bad KM
etc.) is actively discouraged. behaviour (e.g. hoarding, not using best practices etc.).
Incentives

Good KM behaviour is monitored and built into the appraisal This area identifies how the organisation monitors the KM
system. behaviours of the organisations personnel.
Individuals are visibly rewarded for teamwork, knowledge This area identifies how the organisation rewards good KM
sharing and re-use, and re-use of knowledge. behaviour (e.g. teamwork, knowledge sharing and re-use,
and re-use of knowledge).
Training and development programs in KM behaviour and This area identifies the KM training and development pro-
procedure are encouraged from point of recruitment onwards grams within the organisation.
Trust Issues
People are engaged in decisions that directly affect them. This area identifies how the organisation engages personnel
in decision-making.
Explanation is given about why decisions are made the way This area identifies how the organisation explains decisions
they are. to personnel.
Trust Issues

Expectations from the employees after changes are stated This area identifies how well the organisation communicates
clearly. changes in expectations.
Work groups see themselves as interdependent with others Work groups see themselves as interdependent with others
outside their team. outside their team.
When it comes to problem solving, groups and/or individuals This area identifies how groups and/or individuals regard
regard themselves as part of a larger, integrated entity. themselves, in relation to a larger, integrated entity.
People are genuinely interested in helping one another to This area identifies how personnel are interested in helping
develop new capacities for decision making. develop new capacities for decision making.

continued on following page

120
Measuring the Benefits of Enterprise Architecture

Table 2. continued
Sub Category

Iftikhar et al (2003) Question (sic) (pp58-61) Resultant Maturity Area Description

There are different personality types within the organisation There are different personality types within the organisation
that allow people to cluster into groups of compatible types. that allow people to cluster into groups of compatible types.
Usage issues (e.g. experts willingness to use databases or This area identifies how well the management understands
share their knowledge) are understood by management. usage issues (e.g. experts willingness to use databases or
share their knowledge).

Organisational Structure
Formal networks exist to facilitate dissemination of knowledge This area identifies the use of networks to facilitate dissemi-
effectively. nation of knowledge.
A flexible, well-structured, up-to-date knowledge map exists to This area identifies the use of knowledge maps within the
Organisational Structure

point staff in the direction of the knowledge they seek. organisation.


Information useful for different units is available to a number This area identifies how information may be available in
of different users in different formats. different formats to improve usefulness.
A Chief Knowledge Officer (CKO) is in place, and effective This area identifies the role a CKO plays in the organisation.
with the appropriate degree of authority to facilitate knowl-
edge creation.
There are a number of dedicated knowledge workers in place This area identifies the role that knowledge workers play in
to support and assist the knowledge processes (i.e. creation, the organisation.
storage, dissemination etc.).
Awareness and Commitment
At all levels there is a general understanding of KM, with This area identifies the general level of understanding of
respect to how it is applied to the business. KM within the business.
Business functions e.g. Customer Service and Support, Human This area identifies how business functions e.g. Customer
Resource, Information Technology, Learning and Training, Service and Support, Human Resource, Information Tech-
Project Management etc. are related with KM. nology, Learning and Training, Project Management etc. are
Awareness and Commitment

related with KM.


KM is given representation at the board level by creating an This area identifies how KM is represented at the board
extra seat on the companys board of directors. level.
Senior management demonstrates commitment and action with This area identifies senior management commitment with
respect to KM policy, guidelines and activities. respect to KM policy, guidelines and activities.
Senior management supports knowledge sharing, learning and This area identifies how senior management supports knowl-
other desired KM behaviour. edge sharing, learning and other desired KM behaviour.
At the senior level there is an ongoing review of the effective- This area identifies the approach to reviews of KM ef-
ness of KM for the whole company. fectiveness.
Intellectual assets are recognised and valued. This area identifies how intellectual assets are recognised
and valued.
Senior management has a good understanding of the skills of This area identifies how senior management understand the
their staff. skills of their staff.

continued on following page

121
Measuring the Benefits of Enterprise Architecture

Table 2. continued
Sub Category

Iftikhar et al (2003) Question (sic) (pp58-61) Resultant Maturity Area Description

Strategy and Goals


KM projects have already been initiated. This area identifies if KM projects have already been initi-
ated.
There is a vision for how KM should integrate into the busi- This area identifies if there is a vision for how KM should
ness. integrate into the business.
It is clear how KM initiatives support the business plan. This area identifies how KM initiatives support the business
Strategy and Goals

plan.
There are defined responsibilities and a budget set for KM This area identifies how responsibilities are defined and bud-
initiatives. gets are set for KM initiatives.
KM principles are set (e.g., definitions of key knowledge and The area identifies if KM principles are set.
guidelines for knowledge creation and management).
There is clear ownership of KM initiatives, either by the busi- This area identifies the ownership of KM initiatives, either
ness unit or the whole business. by the business unit or the whole business.
There is a program of initiatives in progress to improve KM. This area identifies if a program of KM initiatives exist.
There is a close relationship between the strategic program and This area identifies the relationship between the strategic
the learning program within the organisation. program and the learning program.

Information Technology
People use existing IT effectively as normal working practice. This area identifies how staff use the existing IT.
IT is leading edge and is fully supported. This area identifies the currency of the IT.
Technology is a key enabler in ensuring that the right informa- This area identifies how the technology enables the passage
tion is available to the right people at the right time. of information throughout the organisation. This area does
not include technologys role in creating or storing informa-
Information Technology

tion.
IT makes the search for information easier. This area identifies how IT assists searching for information.
IT allows effective communication across boundaries and time This area identifies how IT eases communications across
zones. boundaries and time zones.
Process tools and technologies are related to KM. This area identifies how process tools and technologies are
related to KM.
There is investment in infrastructure development to support This area identifies how investment for groupware and col-
groupware and collaborative computing tools. laborative computing tools is managed.
Information is used to make sense of changes in the environ- This area identifies how information is used to make sense
ment, create new knowledge and/or make decision about a of the environment, create new knowledge and/or make
course of action. decisions.
Maintenance and Protection
There are regular reviews to delete out of date information and This area identifies the frequency of reviews of corporate
ensure regular updates from designated information owners. information.
Maintenance and Protection

Effective cataloguing and archiving procedures are in place for This area identifies the organisations approach to catalogu-
document management, whether held electronically or not. ing and document management.
Key information to be protected, such as customer informa- This area identifies how key information might be protected
tion, is identified and measures are in place to ensure it stays in if key employees leave.
the company should key employees leave.
Intellectual assets are legally protected. This area identifies how intellectual assets are protected.
There are complete IT security procedures in place (backup, This area identifies the organisations attitudes to security
recovery etc). practices.
Regulatory and compliance requirements are clearly published This area identifies the organisations approach to regulatory
and understood; they are monitored to ensure compliance. and compliance requirements.

continued on following page

122
Measuring the Benefits of Enterprise Architecture

Table 2. continued
Sub Category

Iftikhar et al (2003) Question (sic) (pp58-61) Resultant Maturity Area Description

Using and Applying Knowledge


To improve decision making, critical knowledge is elicited and This area identifies the organisations attitude to the use of
Using and Applying Knowledge

prioritised. critical knowledge in decision making.


Ideas to exploit pools of information are reviewed and acted This area identifies how the organisation acts upon ideas to
on for potential business benefit. exploit pools of information.
Best practice in internal methods are reviewed and propagated. This area identifies how the organisation manages best
practice in internal methods.
Knowledge provision is targeted towards major decision points This area identifies how knowledge provision is targeted.
in key business processes.
Use of knowledge and information is controlled in line with This area identifies how knowledge and information is
regulatory and compliance requirements. controlled.

Quality
This area identifies the organisations ability to use quality
measurements as a management tool
This area identifies the visibility of quality within the
organisation
This area identifies how the organisation deals with prob-
lems.
Quality

This area is an indication of investment in quality


This area identifies how proactive the organisation is
towards improvement. When tailoring this maturity model,
replace the 14-step program with whichever quality im-
provement program that is applicable for the organisation.
This area is a single statement that sums up the organisa-
tions approach to quality

Knowledge Management
This area is a single statement that sums up the organisa-
tions approach to KM
Knowledge

the road to reaching the goal, and measuring of the profile; further models should be developed
progress. to ensure a full Capability Maturity Profile.
Additionally, I had noted that KM is a strategic
Working out the As-Is initiative and that measurement is necessary to
understand success and failure. Measuring prog-
As previously discussed, the primary role of the ress is to understand the difference between the
CMP is to highlight those elements that need to origin and the current situation. To this end, the
change in order to achieve an appropriately mature maturity model can be used to form a snapshot of
capability. Knowledge Management is only one leg the current position. The appropriate levels should

123
Measuring the Benefits of Enterprise Architecture

be recorded to reflect the current environment Developing the Roadmap


within the enterprise.
However, using the maturity model to docu- Having identified the current situation and the
ment the baseline is not likely to be simple as goal, the maturity model can also be used as
completing a survey or filling in forms. The signposts on road to attaining the goal. A maturity
Observer and Hawthorne Effects7 note that the model is usually too coarse to definitively express
mere act of observation may cause changes to the steps through which an enterprise can reach
that which is being observed. a higher level of maturity, but the intervening
Completing the maturity model becomes a maturity levels can be used as markers.
journey of discovery, which (in part) links to the Importantly, the maturity model the KM-MM
other uses of the maturity model, to be discussed can be used a learning or elicitation tool; a tool to
shortly. The discovery of unnoticed initiatives, or ensure full coverage of the aspects the architec-
unrecognised benefits from current initiatives, ture is supposed to support. This could be seen
will affect the maturity model. This may not be as duplication of the purpose of the Framework;
a bad thing but their level of integration and but it should be better seen as a means of tailoring
understanding could be overstated. Individual and refining the requirements of the framework
perceptions will cloud the selected levels or will to suit the needs of the organisation.
ascribe a maturity level based on their under- Through this process, the maturity model will
standing of knowledge boundaries, rather than be further tailored so that the interim maturity
of the enterprise as a whole. Finally, the maturity levels can be used for measurement.
model may not necessarily be tailored properly
to the Enterprise, and the non-specific language Measuring Progress
may confuse the participants who may ascribe
unrealistic values. Finally, a fully tailored maturity model noting the
as-is, to-be and interim maturity levels can
Defining the To-Be be used to monitor progress along the roadmap.
A maturity model is not a substitute for proper
Far easier is to use the maturity model to describe project management, but provides a simplified
the future, especially when the detail has not yet mechanism for presenting the necessary informa-
been determined. Part of defining the to-be must tion to the higher-level decision-makers.
be the tailoring of the maturity model to describe
clearly the to-be maturity level. Such a descrip- Conclusion
tion allows recognition of when the Enterprise has
reached the goal. A perfect maturity across the Within this chapter I have provided descriptions
board may not be attainable, at least not in the for EA (the organizing logic for business processes
lifetime of the selected Architecture. and IT infrastructure reflecting the integration and
The tailoring of the maturity model may be standardization requirements of the companys
a cyclic process, where an understanding of the operating model) and KM (managing knowledge
as-is may change based on the new understand- processes to support both business processes
ing of the to-be. Generally, this understanding and organisational knowledge bases; connecting
may place the as-is at a lower maturity level intellectual assets and business growth). In both
as the understanding of current initiatives is cases, the definitions are not yet authoritative,
redefined. but provide a very clear context for the progress
of the disciplines.

124
Measuring the Benefits of Enterprise Architecture

EA and KM are important for all manner of Armour Dr. F., Kaisler Dr. S., Getter J., & Pippin
Enterprises; the imperative for governments is D. (2003); A UML-driven Enterprise Architec-
borne by the visibility of the results of decision- ture case study; Proceedings of the 36th Hawaii
making. International Conference on System Sciences
While neither EA nor KM provide explicit (HICSS) 2003.
references to each other, the indirect linkages
Barnett, W., Presley A., Johnson M., & Loles D.H.
can be seen through the commonality of purpose.
(1994); An Architecture for the Virtual Enterprise;
Both disciplines respond to the overall strategy of
1994 IEEE International Conference on Systems,
the organisation, and both rely on structure and
Man, and Cybernetics, 1 (pp. 506-511)
information flows.
But neither EA or KM are an end, each are a Bernus, P. & Nemes, L (1996); A framework to
means to ensure the goals and strategies of the define a generic enterprise reference architecture
enterprise are achieved. To ensure that investment and methodology; Computer Integrated Manufac-
in EA is warranted, the effect that the architecture turing Systems, Vol 9, No3 pp 179-191, 1996.
has on business outcomes must be measured. The
C4ISR Architecture Framework (Version 2.0)
management of knowledge is one such facet that
(1997); C4ISR Architectures Working Group
can be measured.
(USA) ; Department of Defense (USA)
But knowledge management maturity is a
versatile tool within any architecture. The KM Chen, D., Vallespir, B., & Doumeingts, G. (1997);
maturity level form part of the as-is baseline, GRAI integrated methodology and its mapping
and the desired levels of maturity form part of onto generic enterprise reference architecture
the to-be goal. As important is the role that the and methodology; Computers in Industry, Vol
determination of tailored maturity levels plays 33 (1997), pp 387-394.
in the discovery of important aspects of the ar-
Collison, C., & Parcell G. (2005); KM Self-As-
chitecture. Finally, a maturity model can act as
sessment; Retrieved 01/04/2007 from Learn-
a road map and monitoring tool.
ing to Fly Website (http://www.chriscollison.
Further study is required to validate the
com/l2f/whatiskm.html#assessment)
maturity model and to confirm the usefulness
as a means of measuring the effect creating the Defence Architecture Framework Resources
architecture has on enterprises. In addition, a full (CD) (Version 1.0) (2005); Australian Govern-
Capability Maturity Profile should be developed ment, Department of Defence (Chief Information
to be added as a useful perspective to architec- Officer Group)
tural frameworks. These studies will only serve
DoD Architecture Framework Deskbook (Final
to enhance the utility of EA.
Draft) (Version 1.0) (2003); DoD Architecture
Framework Working Group; Department of
Defense (USA)
References
Duttaroy, A. (2005); Five Ms of Meta Data;
Allega, P.J. (2005); Architecture framework de- DM Review (http://www.dmreview.com) April
bates are irrelevant; Gartner report G00127331, 2005.
07 Jun 2005.
Federal EA Framework (V 1.1) (1999); CIO
Allega, P.J. (2005a); Enterprise Architecture will Council (USA)
never realize a return on investment; Gartner
report G00128285, 24 Jun 2005.

125
Measuring the Benefits of Enterprise Architecture

Furlong, G. (2001); Knowledge management and Lopez, J. (2002); Return on Enterprise Architec-
the competitive edge; University of Greenwich ture: Measure it in Asset Productivity; Gartner
Business School; 2001, revised May 2003. Report: RPT-0702-0119, 19 July 2002
Iftikhar, Z., Eriksson, I.V., & Dickson, G.W. Marco, D. (2002); Meta Data & Knowledge
(2003); Developing an Instrument for Knowledge Management: Capability Maturity Model; DM
Management Project Evaluation; Electronic Review (http://www.dmreview.com) August/Sep-
Journal of Knowledge Management, Vol1, Issue tember/October/November 2002.
1, 2003, pp55-62
Martin, P. (2006); Measuring KM-Based improve-
Iyer, B., Shankaranarayanan G., & Wyner, G. ments in decision-making; personal communica-
(2006); Process Coordination Requirements: tion through the ACTKM forum (http://www.
Implications for the design of Knowledge Manage- actKM.org) March 2006.
ment Systems; The Journal of Computer Informa-
Metainnovation (2004); KM Concepts Module 8:
tion Systems; Volume 46, Issue 5; 2006
Metrics; Retrieved May 2006 from Metainnova-
Jonkers, H., van Buuren, R., Arbab, F., de Boer F., tion KM Concepts course (www.metainnovation.
Bonsangue M., Bosma, H., ter Doest, H., Groe- com)
newegen L., Scholten J.G., Hoppenbrouwers S.,
Mohanty, S., & Chand, M. (2005); 5iKM3
Iacob M., Janssen W., Lankhorst M., van Leeuwen
Knowledge Management Maturity Model; TATA
D., Proper E., Stam A., van der Torre L., & van
Consultancy Services 2005.
Zanten G.V. (2003); Towards an Language for
Coherent Enterprise Architecture Descriptions; Moore, A. (2005); What makes government dif-
Proceedings of the Seventh IEEE International ferent?; KM World Vol 14 Issue 6; Jun 2005
Enterprise Distributed Object Computing Confer-
Noran, O. (2003); A systematic evaluation of the
ence (EDOC) 2003.
C4ISR AF using ISO1504 Annex A (GERAM);
Kankanhalli, A., & Tan, B.C.Y. (2004); A review Computers in Industry vol 56 (2005) pp 407-
of Metrics for Knowledge Management Systems 427.
and Knowledge Management Initiatives; Proceed-
Noran, O. (2005); An analysis of the Zachman
ings of the 37th Hawaii International Conference
framework of enterprise architecture from the
on System Sciences 2004.
GERAM perspective; Annual Reviews in Control
Klein, J; ECM best practices for the Enlightened Vol 27 (2003) pp 163-183.
Enterprise, KM World; Vol 14, Issue5, May
Paulzen ,O., & Perc, P. (2002); A maturity model for
2005
quality improvement in knowledge management;
Ladley, J. (2002); Beyond the Data Warehouse: Proceedings of the 13th Australasian Conference
Information Management Maturity; DM Review on Information Systems (ACIS 2002).
(http://www.dmreview.com) August 2002.
Robertson, J. (2003); Metrics for knowledge
Lapkin, A. (2004); A users guide to architectural management and content management; Step Two
patterns; Gartner Report G00124049, 22 October Designs (www.steptwo.com.au) February 2003,
2004 accessed May 2006.
Lapkin, A. (2004); Architecture Frameworks: Ross, J.W., Weill, P., & Robertson, D.C. (2006);
How to Choose; Gartner Report G00124230, 19 Enterprise as strategy: creating a foundation
November 2004 for business execution; Harvard Business School
Publishing; 2006.

126
Measuring the Benefits of Enterprise Architecture

Rosser, B. (2002); Architectural styles and En- Vandegriff, L.J. (2006); Unified approach to agile
terprise Architecture; Gartner report AV-17-4384, knowledge-based enterprise decision support;
13 August 2002. VINE Vol 36, Issue 2; 2006)
Saha, P. (2004); A real options perspective to Weerdmeester, R., Pocterra, C., & Hefke, M.
Enterprise Architecture as an investment activity; (2003); Thematic Network/Roadmap: Knowledge
(accessed 24 Aug 05 through The Open Group Management Maturity Model; Information Soci-
Architecture Forum http://www.opengroup.org/ eties Technology Programme, June 2003.
architecture).
Zachman, J.; The Physics of Knowledge Man-
Schekkerman, J. (2004); Enterprise Architecture agement; undated, retrieved 29 Apr 2007 from
Validation; Institute for Enterprise Architecture http://www.zifa.com
Developments, August 2004.
Zachman, J.A (1987); A Framework for Informa-
Schekkerman, J. (2004); Trends in Enterprise tion Systems Architecture; IBM Systems Journal,
Architecture: How are organizations progress- Vol 29, No 3, 1987
ing?; Institute for Enterprise Architecture Devel-
Zachman, J.A. (1996); Enterprise Architecture
opments, 2004.
and legacy systems. Getting beyond the legacy; ac-
Schekkerman, J. (2006); How to survive in the cessed from Information Engineering Services Pty
jungle of Enterprise Architecture Frameworks: Ltd via http://members.ozemail.com.au/~visible/
Creating or choosing an Enterprise Architecture papers/zachman1.htm on 25/07/2005
Framework; Trafford Publishing; 3rd Edition 2006
Zachman, J.A. (1997); Concepts of the frame-
(First published 2004).
work for enterprise architecture. Background,
Schulman, J. (2004); Architecture Frameworks description and utility; accessed from Information
provide system road maps; Gartner Report Engineering Services Pty Ltd via http://members.
G00125007, 29 November 2004. ozemail.com.au/~visible/papers/zachman3.htm
on 25/07/2005
Snyman, S., & Kruger, CJ; The interdependency
between strategic management and strategic Zachman, J.A. (1997a); The challenge is change:
knowledge management; Journal of Knowledge a management paper; accessed from Information
Management; Vol 8, Issue 1, 2004). Engineering Services Pty Ltd via http://members.
ozemail.com.au/~visible/papers/zachman2.htm
Sowa, J.F., & Zachman, J.A.(1992); Extending
on 25/07/2005
and formalizing the framework for information
systems architecture; IBM Systems Journal, Vol
31, No 3, 1992. Endnotes
Standards Australia (2005); Australian Standard 1
http://www.enterprise-architecture.info/
5037-2005: Knowledge management a guide; 2
The listed frameworks are: Zachman
Standards Australia, September 2005.
Framework; The Open Group Architecture
Steen, M.W.A., Akehurst, D.H., ter Doest H.W.L., Framework (TOGAF); Command, Control,
& Lankhorst M.M.(2004); Supporting Viewpoint- Communications, Computing, Intelligence,
Oriented Enterprise Architecture; Proceedings of Surveillance and Reconnaissance (C4ISR);
the 8th IEEE International Enterprise Distributed Treasury Information Systems Architecture
Object Computing Conference (EDOC) 2004. Framework (TISAF); Federal Enterprise

127
Measuring the Benefits of Enterprise Architecture

5
Architecture Framework (FEAF or FEA); According to Wikipedia, the Return on
Treasury Enterprise Architecture Frame- Assets (ROA) percentage shows how prof-
work (TEAF); Department of Defence Ar- itable a companys assets are in generating
chitecture Framework (DoDAF); Extended revenue. Investopedia (http://www.investo-
Enterprise Architecture (E2A); Object pedia.com/terms/r/returnonassets.asp) notes
Management Groups Model Driven Ar- ROA as a useful indicator of how profitable
chitecture (MDA). The Australian Defence a company is relative to its total assets.
Force (ADF) has adapted the DoDAF to pro- Interestingly, Investopedia notes ROA as
duce the Defence Architecture Framework sometimes being known as ROI.
6
(DAF). http://en.wikipedia.org/wiki/Quality_Man-
3
http://en.wikipedia.org/wiki/Enterprise_ar- agement_Maturity _Grid (accessed 25
chitecture March 2007) but the original source is
4
According to Wikipedia, return on invest- cited as (Crosby, P. (1979); Quality is Free;
ment (ROI) is a calculation used to determine McGraw Hill)
7
whether a proposed investment is wise, and http://en.wikipedia.org/wiki/Observer_ef-
how well it will repay the investor. fect and http://en.wikipedia.org/wiki/Haw-
thorne_effect (accessed 12 Aug 07)

128
Section II
Leadership, Governance, and
Management
130

Chapter VI
The Criticality of
Transformational Leadership to
Advancing United States
Government Enterprise
Architecture Adoption
William S. Boddie
National Defense University, USA

Abstract

An effective enterprise architecture (EA) capability enables an organization to develop sound enterprise
plans, make informed human, materiel, and technology resource investment and management decisions,
and optimize key business processes. Despite U.S. Congressional legislation, U.S. Office of Management
and Budget guidance, and U.S. Government Accountability Office reports and recommendations, many
U.S. government leaders struggle in advancing EA adoption in their organizations. U.S. Government
leaders must embrace transformational leadership to advance EA adoption. The author presents the
Vision, Integrity, Communication, Inspiration, and Empowerment Transformational Leadership Model
that describes competencies U.S. Government leaders need to advance EA adoption. The author also
presents the Transformational Leadership and Enterprise Management Integration Framework that
describes the relationship between transformational leadership and enterprise management functions.
U.S. Government leaders must adopt this framework to realize improved enterprise performance.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

Introduction interdependencies and interrelationships among


organizations business operations and the under-
Many U.S. government organizations struggle in lying information technology supporting these
implementing effective enterprise architecture operations (GAO, 2000, p. 4). An effective EA
(EA) capabilities. Despite Congressional legis- capability can enable government organizations
lation, U.S. Office of Management and Budget to realize improved performance.
guidance, and U.S. Government Accountability Advancing an effective EA capability requires
Office recommendations, many U.S. government organizational leaders to adopt an enterprise per-
leaders struggle in advancing EA adoption in their spective rather than focusing exclusively on sub-
organizations. The U.S. General Accounting Of- enterprise activities. The GAO (2004) repeatedly
fice (GAO) (2001) concluded that an EA is critical identified the lack of an enterprise architecture as
to modernizing enterprise business processes, a key management weakness in major moderniza-
information technology (IT), and improving enter- tion programs at a number of federal agencies
prise performance effectiveness. The GAO (2004) (p. 1). Many government organizational leaders
found EA was critical to improving organizational struggle to embrace an enterprise perspective
performance in the private and public sectors. The and consequently miss significant opportunities
U.S. Office of Management and Budget (OMB) to improve their organizations performance.
(2006) stated Architecture is a management prac- Additionally, many government leaders lack the
tice to maximize the contribution of an agencys necessary leadership competencies to advance EA
resources to achieve its mission. Architecture can adoption. Kotter (1995) reported, A paralyzed
establish a clear line of sight from investments to senior management often comes from having too
measurable performance improvements whether many managers and not enough leaders (p. 60).
for the entire enterprise or a portion (or segment) Kotter found Change, by definition, requires a
of the enterprise (p. 1 2). new system, which in turn, always requires lead-
An EA describes an organizations current ership (p. 60). Government organizations need
capabilities and constraints, the organizations strong leaders to advance EA adoption. The U.S.
desired capabilities, and the organizations plans to Government Accountability Office (2006) stated,
transition from the current to the desired capabili- The key to these [U.S. government] departments
ties. Enterprise architectures provide to people and agencies building upon their current status,
at all organizational levels an explicit, common, and ultimately realizing the benefits that they cited
and meaningful structural frame of reference architectures providing, is sustained executive
that allows an understanding of (1) what the en- leadership, as virtually all the challenges that they
terprise does; (2) when, where, how, and why it reported can be addressed by such leadership
does it; and (3) what it uses to do it (GAO, 2003, (p. 1). Transformational leadership is critical to
p. i). An effective EA enables organizations to government leaders advancing EA adoption and
develop sound enterprise plans, make informed improving their organizations performance.
human, material, and technology resource invest- The objectives of this chapter are to review
ment and management decisions, and optimize U.S. government efforts to advance EA capabili-
key enterprise business processes. Enterprise ties, define the current EA state in U.S. govern-
architectures are essential for organizations to ment organizations, emphasize the criticality of
effectively and efficiently develop new and evolve transformational leadership to advancing govern-
existing information systems (GAO, 2000, p. 4). ment-wide EA adoption, situate the relationships
The GAO also found, If defined properly, enter- between transformational leadership and enter-
prise architectures can assist in optimizing the prise management functions, and highlight the

131
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

outcomes the U.S. Department of Labor realized U.S. Office of Management


from its adoption of transformational leadership, and Budget Enterprise
EA, and enterprise management. Architecture Initiatives

The OMB oversees U.S. government organiza-


Review of U.S. Government tions, assists the President in overseeing the
Enterprise Architecture preparation of the federal budget and supervising
its administration in Executive Branch agencies,
U.S. Government EA efforts were originally and oversees and coordinates the Administrations
grounded in information technology (IT). The procurement, financial management, information,
U.S. Senate Governmental Affairs Committee and regulatory policies (OMB, 2007b, para. 1).
(1994) found that billions of U.S. taxpayer dollars OMB initiated programs to advance government-
were wasted buying federal government computer wide EA adoption. Key OMB initiatives included
systems. The committee also found that many the Federal Enterprise Architecture and the En-
government organizations efforts to modern- terprise Architecture Assessment Framework.
ize their computer systems were characterized Federal Enterprise Architecture
by poor management, inadequate planning, and OMB began developing a Federal Enterprise
failed execution. To address these challenges, the Architecture (FEA) in 2002 (OMB, 2007). The
committee recommended government-wide IT purpose of the FEA is to identify opportunities
management reform. to simplify processes and unify work across the
The U.S. Senate Governmental Affairs agencies and within the lines of business of the
Committee report resulted in the Information Federal government (History and Background,
Technology Management Reform Act (ITMRA) para. 1) and to be a more citizen-centered,
of 1996. The IRMRA of 1996 was combined customer-focused government that maximizes
with the Federal Acquisition Reform Act and technology investments to better achieve mission
was renamed as the Clinger-Cohen Act of 1996 outcomes (para. 1). OMB based the FEA on the
(CCA). CCA established the position of the Chief principles of:
Information Officer (CIO) for government depart-
ments and agencies and mandated that the CIO Business-driven: The FEA is most useful
was responsible for developing, maintaining, and when it is closely aligned with government
facilitating the implementation of a sound and strategic plans and executive level direction.
integrated information technology architecture Agency mission statements, presidential
for the executive agency (U.S. Congress, 1996, management directives and agency business
p. 685). CCA defined an IT architecture as an owners give direction to each agencys en-
integrated framework for evolving or maintain- terprise architecture (EA) and to the FEA.
ing existing information technology or acquir- Proactive and collaborative across the
ing new information technology to achieve the Federal government: Adoption of the FEA
agencys strategic goals and information resources is achieved through active participation by
management goals (p. 686). OMB established the EA community in its development and
several initiatives to advance government-wide use. The FEA community is responsible for
EA adoption. the development, evolution and adoption of
the FEA.

132
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

Architecture improves the effectiveness examines the extent to which organizations de-
and efficiency of government informa- scribe their current and target architectures and
tion resources: Architecture development describe their plans to transition from the cur-
is an integral part of the capital investment rent to the target architecture. The Use category
process. No IT investment should be made examines the extent to which organizations use
without a business-approved architecture. the EA for enterprise planning, resource invest-
(OMB, 2006, p. 4) ment decision-making, and management. The
Results category examines the extent to which
The OMB (OMB, 2007) also established the organizations realize performance goals as a result
Performance, Business, Service Component, of its EA. OMB (2007a) reported greater govern-
Data, and Technical reference models to enable ment-wide EA adoption in 2007 than it reported
government organizations to develop effective in 2006 and reported increased EA adoption
EA capabilities. The Performance Reference since 2004. Although OMB reported improved
Model enables organizations to anticipate and government-wide EA adoption, the GAO found
measure the impact of organizational inputs to less promising results.
processes, outputs, and enterprise performance
outcomes. The Business Reference Model enables
organizations to identify business functions U.S. General Accounting
used to deliver services to citizens. The Service Office/Government
Component Reference Model enables government Accountability Office and
organizations to describe the services they use
to perform enterprise business functions. The Enterprise Architecture
Technical Reference Model enables organizations
to describe the technical standards upon which The U.S. Government Accountability Office
their technology assets are based. The Data Refer- (GAO) is the U.S. Congress agency for monitor-
ence Model enables organizations to describe the ing and reporting U.S. government organization
data they process to deliver services to citizens. management performance information. The U.S.
These reference models were established to enable
organizations to advance EA capabilities and, by
extension, to use the EA capabilities to improve Table 1. GAO EA Reports (1998-2007)
enterprise performance. Further, OMB developed
U.S. Government organizational Number of reports
an EA Assessment Framework to evaluate orga- enterprise architecture report year by year
nizational EA capabilities.
1998 1
1999 1
Enterprise Architecture Assessment
2000 11
Framework
2001 14
2002 30
The OMB established the Enterprise Architecture
2003 36
Assessment Framework (EAAF) to evaluate
2004 45
government organization EA capabilities and to
2005 32
advance the use of enterprise architecture (EA)
2006 27
across the Federal government (OMB, 2006a, p.
1). The EAAF is based on EA Completion, Use, 2007 24

and Results categories. The Completion category Total reports 221

133
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

Government Accountability Office (GAO) is an and reported that the DoDs EA was incomplete.
independent, nonpartisan agency that works for To influence government-wide EA adoption, the
Congress. GAO is often called the congressional GAO published an EA assessment instrument.
watchdog because it investigates how the federal The GAO (2002a) published an EA assessment
government spends taxpayer dollars (GAO, 2007, framework to evaluate government organizational
para. 1). The GAO was established in 1921 by EA management. The GAO developed a maturity
the Budget and Accounting Act, is independent framework for enterprise architecture manage-
of the executive branch, and investigates how ment and reviewed architecture use in the federal
federal funds are spent. The GAOs name was government, specifically determining agencies
later changed to the Government Accountability development, implementation, and maintenance of
Office (GAO) in 2004 (GAO, 2007a, para. 1). these architectures, and OMBs oversight (p. 1).
The GAO publishes reports of its investigations The framework, titled, the Enterprise Architecture
of government executive branch organizations Management Maturity Framework (EAMMF)
management effectiveness and efficiency. The version 1.0, enabled government organizations to
GAO published numerous reports regarding earn EA management maturity ratings based on a
government-wide EA management. maturity stages 1 through 5. Stage 1 represented
The GAO began evaluating government-wide the least maturity and Stage 5 represented the
EA management in 1998 and, since then, con- greatest maturity. Using its EAMMF version 1.0,
ducted 221 reviews of government organizational the GAO found that only four percent of organiza-
EA programs. Table 1, GAO EA Reports From tions had effective EA management (p. 1).
1998 2007, reports GAOs EA reports in this The GAO (2003) published version 1.1 of the
period. EAMMF framework in 2003 and based the version
The GAO reports consistently found that on the 31 core EA elements found in the Chief
government organizations were significantly Information Officer Council A Practical Guide
challenged in EA management. For example, to Federal Enterprise Architecture (CIO Council,
the GAO found The Customs Service does not 2001). In its 2004 report, the GAO (GAO, 2004b)
have a complete enterprise information systems found the lack of an enterprise architecture as a
architecture to guide and constrain the millions key management weakness in major moderniza-
of dollars that it spends each year to develop and tion programs at a number of federal agencies
acquire new information systems and evolve (p. 1), found little change in overall maturity
existing ones (GAO, 1998, p. 1). In another between 2001 and 2003 (p.1), and found that
example, the GAO found that the Immigration Only 20 of 96 agencies examined had established
and Naturalization Service (INS) struggled in at least the foundation for effective architecture
developing an EA, that the INS EA was incom- management (p.1).
plete, and that the INS lacked a target architecture In its 2006 report, the GAO found that only
(GAO, 2000, p. 1). four of the 27 assessed organizations had ad-
The GAO concluded effective EA manage- vanced to Stage 3 on the EAMMF and reported
ment was critical to improving organizational that no organizations had matured beyond Stage
performance (2002). The GAO (2004a) reported 3. GAOs report title, Leadership Remains Key
that an effective EA was needed to enable the to Establishing and Leveraging Architectures for
Department of Homeland Security to integrate Organizational Transformation, emphasized the
22 previously independent federal agencies. The criticality of strong organizational leadership to
GAO (2006) found that the U.S. Department of advancing government-wide EA management.
Defenses (DoD) EA management was deficient The GAO stated The key to these departments

134
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

and agencies building upon their current status, Anderson (1998) found that transformational
and ultimately realizing the benefits that they cited leaders build leadership organizations and make
architectures providing, is sustained executive positive differences in organizations and in the
leadership, as virtually all the challenges that they lives of others wherever they go. Transformational
reported can be addressed by such leadership leaders climb the heavens, reach beyond the or-
(p. 1). This review of U.S. government-wide EA dinary, the predictable, the average, and chart
adoption leads to a very clear and concerning new territories and possibilities. These leaders
conclusion. reach, motivate, inspire, and pull others below
Despite extensive U.S. government oversight them upward to greater, unseen heights on the
including Congressional legislation, OMB policy way (1998). Egan (as cited in Anderson, 1998)
guidance, and GAOs assessments and recommen- stated, By stimulating, modeling, advocating,
dations, many U.S. Government leaders struggle innovating, and motivating, they [transformational
in advancing EA adoption. It is evident that gov- leaders] mold this culture, to the degree that this is
ernment oversight alone is insufficient to advance possible, to meet both internal and environmental
government-wide EA adoption. U.S. Government needs (p. 48).
leaders must adopt transformational leadership to Transformational leaders achieve the desired
advance EA adoption in their organizations. results through charisma, inspiration, intellectual
stimulation, and individualized consideration.
They use charisma to influence others to high
Transformational Leadership performance levels. They inspire and motivate
their followers by providing meaning and chal-
Leadership is influencing others to action. lenge to the objective (Bass, 1998). This inspiration
Transformational leaders persuade individu- increases team spirit, enthusiasm, and optimism.
als to achieve group goals (Bass, 1990, p. 11). Transformational leaders engage followers in
Transformational leaders enable organizations viewing meaningful attractive visions of the
to realize long-term organizational performance future. Transformational leaders stimulate their
improvement (Bass, 1990). Various researchers followers efforts to be innovative and creative by
found that transformational leaders improve long- questioning assumptions, reframing problems,
term organizational performance. and approaching old situations in new ways (p.
The transformational leader broadens and 5). The transformational leader pays special at-
elevates the interests of their followers and mo- tention to each individual follower. The leaders
tivates followers to consider the greater good individualized consideration helps develop suc-
of others rather than their own self-interests. cessive higher levels of potential.
Transformational leaders inspire and motivate The transformational leader enables organi-
others to do more than the followers originally zations to realize long-term goals and objectives
intended to do or thought possible (Bass, 1998). rather than just immediate results. As a result of
The transformational leader asks followers to a compelling sense of urgency, vision, and strong
transcend their own self-interest for the good of interpersonal communication skills, these leaders
the group, organization, or society; to consider generate a sense of urgency and excitement for the
their longer-term needs to develop themselves, followers and colleagues to contribute richly to
rather than their needs of the moment; and to their environment. Boddie and Newman (2006)
become more aware of what is really important identified vision, communication, inspiration,
(Bass, 1990, p. 53). and empowerment as competencies needed to ad-
vance government-wide EA adoption. The author

135
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

developed the Vision, Integrity, Communication, light bulb will not light. The electrical circuit is
Inspiration, and Empowerment Transformational based on the electrical engineering AND state
Leadership Model to describe the competencies principle. The AND state principle requires that
government leaders need to advance effective each required input element be sufficiently present
EA capabilities. for the circuit to fire. As a result, using the light
switch example, if any required input element is
missing, the light fail to light.
Vision, Integrity, The VICIE Transformational Leadership
Communication, Inspiration, Model requires each input element to be suffi-
and Empowerment ciently present. If a required element is missing,
transformational leadership will not result. Figure
Transformational Leadership Model 1, the Vision, Integrity, Inspiration, Communi-
cation, and Empowerment Leadership Model,
The Vision, Integrity, Communication, Inspiration illustrates this perspective.
and Empowerment (VICIE) Transformational
Leadership Model consists of vision, integrity, Vision
communication, inspiration, and empowerment.
These elements collectively represent the es- Vision is a critical transformational leadership
sence of transformational leadership. The VICIE competency. Transformational leaders articulate a
Transformational Leadership Model functions clear and compelling vision of the future desired
analogous to an electrical circuit. state. Whether the leader is the informal leader
An electrical circuit produces the expected of a group of playground children or the formal
output if the required elements are present. For leader of a very large and complex transnational
example, the typical electrical light switch op- organization, the leader articulates a clear and
erates in an on and off manner. If the required compelling vision of the desired future state. Ozar-
elements are present, the light bulb will light. alli (2003) found that transformational leaders
If any of the required elements are missing the create a dynamic organizational vision that often

Figure 1. Vision, integrity, communication, inspiration, and empowerment transformational leadership


model

vision

integrity transformational leadership

communication

inspiration

output
empowerment

required inputs

136
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

necessitates a metamorphosis in cultural values Integrity


to reflect greater innovation (Transformational
leadership, para. 3). Forrester (2006) found that Integrity is about doing the right thing. Banutu-
government Change agents see new possibilities Gomez (2006) identified integrity as the most
and know how to create and communicate a clear, important leadership attribute and found A leader
compelling vision (p. 6). Forrester cited Retired with integrity provides consistent responses that
Vice Admiral Art Cebrowski, former Director of show a sense of equal respect for everyone. . . .
the DoD Office of Transformation, as an example A leader who behaves consistently exhibits the
of a transformational leader (p. 6). Rothwell (as integrity necessary to nurture the growth of trust
cited by Forrester) concluded transformational (p. 157). Simmons-Welburn and Welburn (2006)
leaders establish a vision, assemble the right found strong leaders acted with integrity as a
teams, articulate the vision such that everyone way of suppressing self-interest for the good of
embraces the vision and the priorities to achieve the community-in other words, making decisions
that vision (p. 6). with an appreciation of the broader social context
Stephenson (2004) found transformational and institutional and professional values (p.
leaders must have a vision and purpose for their 468). They also described leaders with integrity
organizations, and that this vision and purpose as leaders whose decisions are predicated upon
must be tied to the organizations impact on a leaders understanding that integrity involves
society (p. 4). Stephenson found that leading looking out for the common good of the institution
CEOs around the world have visions for their over self-interest or self-promotion (p. 468).
companies that go well beyond making sure that Zablow (2006) found integrity was integral to
projections are met for the next quarter. This makes establishing a productive organizational environ-
good sense (p. 4). Stephenson further stated, A ment and reported Employees are very sensitive
strong sense of vision and purpose is especially to situations that impact their workplace and base
important to employees (p. 4). The Globe and much of their perceptions of the organizational
Mail reported (as cited by Stephenson, 2004) culture on what they hear senior management
the best employers as the ones who articulated say and, more importantly, what they see senior
a clear and consistent vision, starting with the management do (p. 27). Cloud (as cited by Ude-
CEO [Chief Executive Officer]. This vision kept chukwu, 2007), found that integrity enhances
their employees focused on the companys goals the formation of appropriate character and that
(p. 5). Stephenson further found that a vision character, (1) creates and maintains trust, (2) is
and commitment to social responsibility is a able to see and face reality, (3) works in a way
strategic imperative for companies and business that brings results, (4) embraces negative realities
in general (p. 5). and solves them, (5) causes growth and increase,
Vision is a critical transformational leadership (6) achieves transcendence and meaning in life
competency. U.S. government leaders must estab- (p. 106). Sayer, Wright State University professor
lish a clear and compelling vision and encourage and Department of Communication chairman and
their employees to embrace this vision to advance president of the university faculty, emphasized
EA adoption. U.S. government leaders must also integrity as an integral aspect of personal char-
demonstrate impeccable integrity to advance EA acter. Sayer stated:
adoption.
It used to be said that a mans word was his bond,
that you could take what a person said and trust

137
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

it completely. Now we say to get it in writing and Communication


have it notarized. We live at a time where personal
integrity seems to be more the exception than Communication involves sharing meaningful
the rule, as greed and avarice control so much information with another or others. Kotter (1995)
human behavior. Trust is a critical element in all found that long-term organizational performance
human interaction, but how can we trust anyone improvement is especially challenging and is even
when there is an absence of integrity behind a more so unless hundreds or thousands of people
persons words and actions? Another old axiom are willing to help, often to the point of making
fits perfectly here: Say what you mean, and mean short-term sacrifices. Kotter found that employees
what you say. If all of us did just that, then our will not make needed sacrifices unless they believe
society would be better and we might be able to that useful change is possible. Kotter concluded,
trust one another again. (p. 114) Without credible communication, and a lot of
it, the hearts and minds of the troops are never
Motorola Corporations corporate values are captured (p. 64).
based on integrity. Motorola (as cited by Gorman, Kotter (1995) found that transformational
2007) stated, Motorola has had two enduring core leaders incorporate messages into their daily ac-
values through the years. The first is uncompro- tivities, communicate how proposed solutions fit
mising integrity. The second is constant respect into the large enterprise perspective, and discuss
for the individual. What the leaders wanted to how follower performance is critical to accom-
do was to keep those values, build on them and plishing the vision. Transformational leaders use
evolve them into statements that reflected the more one-on-one opportunities, small group sessions,
competitive, performance-based culture they water-cooler opportunities, staff and team meet-
wished to encourage (p. 24). Darling & Beebe ings, and formal presentations to communicate
(2007) identified trust as a key predictor of leader- the vision. Transformational leaders turn boring
ship integrity, found that trust was critical to an company newsletters into lively articles about
organizations functional effectiveness, and found the vision, transform management meetings into
that trust provided the foundation that maintains exciting transformation discussions, and replace
organizational integrity. They also found that there generic management education with courses that
was no greater need in entrepreneurial leaders than focus on business problems and the new vision.
the need for integrity and defined integrity as the Kotter found transformational leaders use every
integrated ethical framework from which a person possible channel, especially those that are being
functions. They further found that integrity in wasted on nonessential information. (p. 64)
the entrepreneurial leadership position leads to Beebe, Beebe, & Ivy, 2004 (as cited in Darling
trust by those individuals counted on to facilitate & Beebe, 2007), found that entrepreneurial leaders
achievement of excellence in the operational de- communicate and inspire individuals to pursue
velopment of the organization (p. 80). organizational goals. Darling & Beebe (2007)
Integrity is a critical transformational leader- found that transformational leaders communicate
ship competency. U.S. government organizational through their vision, their verbal and nonverbal
leaders must demonstrate impeccable integrity messages, the trust symbolized by their position-
to advance EA adoption. These leaders must ing, and their respect for their associates. They also
also communicate effectively to advance EA found that entrepreneurial leaders communicate
adoption. through appropriate means to create shared mean-
ings with followers, provide information about
the underlying rationale, motive and context that

138
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

empowers and enables followers to accomplish anonymously ask questions regarding the trans-
the enterprise goals. They further found that ef- formation program and posted the responses for
fective communication empowers followers to organizational members to review, authored more
align their actions with the organizational goals. organization-wide e-mails, were more visible at
These authors also found that leaders gain respect corporate events, and delivered presentations
through listening to others. Of the 90% of the time relating the criticality of employee activities to
a leader spends communicating, almost half of the transformation. The FCC President and Chief
that time is spent listening to others (Klemmer & Executive Officer stated that:
Snyder, 1972; Nichols, 2004). Darling & Beebe
(2007) found listening and leadership go hand communication is at the heart of building a high-
in hand. Listening, more than speaking, is what performance culture - a culture where people are
leaders do; at least what good leaders should do fully engaged. Communication is vital. Without it,
(p. 81). leaders cannot effect positive change. Our internal
Harris (2007) found that transformational strategy recognizes employees as a primary audi-
leaders provide numerous communication feed- ence and a key conduit to the customer, the media,
back mechanisms such as face-to-face meetings, stakeholders and communities. Our strategic ap-
roundtable discussions, meals with organizational proach to internal communication significantly
staff members where the leader is available to contributes to business results. (p. 23)
talk to employees in a more casual and informal
setting (p. 12). Harris found that transformational Communication is a critical transformational
leaders, in addition to face-to-face meetings, also leadership competency. U.S. government lead-
provided opportunities for organizational mem- ers must communicate effectively to advance
bers to provide feedback in anonymous manners EA adoption. These leaders must also inspire
as some members might be uncomfortable being their organizational members to advance EA
totally frank with the leader. Garrett & Watson adoption.
(2007) studied transformational leadership dur-
ing the Farm Credit Canada (FCC) multi-year Inspiration
cultural transformational program. They reported
that FCCs significant transformational progress Effective leaders inspire followers to meaningful
was based on leaders who were taught to speak performance. Bass and Avolio (as cited in Higgs,
from the heart, listen to other perspectives, be 2003) defined inspiration as encouraging indi-
open and responsive to feedback and encourage viduals to challenge the status quo, to consider
personal and professional growth (p. 21). Garrett problems from new and unique perspectives and
and Watson reported that strong organizational to be innovative and creative (p. 276). Bass (as
leaders focused on delivering clear, consistent cited in Higgs, 2003), defined inspiration as the
messages about strategic enterprise outcomes ability of leaders to provide a clear sense of mis-
and corporation priorities and related individual sion, which leaders in turn convey to members
actions to business outcomes. and develop a sense of loyalty and commitment
FCC tracked key organizational messages, (p. 278). Griffith (2004) found that high school
adopted a multi-challenge approach, and re- principles in large metropolitan area, suburban
duced information overload (Garrett & Watson, school districts who inspired their teachers con-
2007). FCC leaders hosted monthly lunches for sistently realized significant school performance
organizational members, established an online outcomes.
capability in which organizational members could

139
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

Posner and Kouzes (2002) included inspira- leaders to a higher good, and to the people of the
tion as a key aspect in their work The Leadership organization and the significance of their work.
Challenge. Posner and Kouzes believed leaders They model the leader who lives and breathes
needed to describe their dreams and their [leader] passion for others and consequently see their
ability to life others spirits (p. 144). These authors work as serving others. (p. 530)
concluded, Its not necessary to be a famous,
charismatic person to inspire a shared vision. Kerfoot also found that transformational lead-
What is necessary is believing and developing ers establish bonds between themselves and their
the skills to transmit that belief (p. 144). followers based on trust, are passionate about the
An example of inspiring leadership is former vision, unleash potential by inspiring people from
U.S. President Ronald Reagan. Baldini (2007) within, truly love what they do, and care about their
cited Reagan as an example of inspiring leader- followers. Kerfoot found transformational lead-
ship and concluded: ers care about people, reawaken and open hearts,
listen to their followers, and commit to making
Few could rouse audiences as well as President differences in the lives of their followers.
Reagan. Consider his speech in the wake of the Sir Winston Churchill, former English Prime
Challenger disaster when he praised the bravery Minister, is an excellent example of inspirational
of the astronauts but also made it very clear that leadership. Throughout Germanys blitzkrieg
space travel would continue because it was impor- against England in World War II, Churchill in-
tant to our national identity. A more stern Reagan spired England to overcome the onslaught. Long-
lectured the Soviet Union in Berlin by challenging staffe (2005) reported Churchill unquestionably
the Soviet premier: Mr. Gorbachev, tear down communicated vision and encouraged innovation;
this wall. He was reflecting the hopes and dreams he inspired a nation, perhaps the world, with his
of free people everywhere. (para. 3) passion and determination (p. 80). Churchill
would explain the current realities, then inspire
Kerfoot (2001) found that transformational the team by offering them a vision for how things
leaders inspired organizational members to ef- could be, then tell them how to achieve this and
fective long-term action. Kerfoot reported that finally mobilize them into action (p. 80). Long-
transformational leaders: staffe concluded Churchill communicated vision
with passion and determination, inspiring those
instill an intrinsic drive that is fueled by a higher he led by action and example with courage and
purpose, a sense of mission, and a commitment to integrity (p. 83).
a vast array of possibilities. Inspiring leadership Transformational leaders inspire their follow-
unleashes creativity, enthusiasm, and passion that ers to performance excellence. U.S. government
motivational leadership cannot. The passion an leaders must inspire their members to advance
inspirational leader has is authentic, and surges EA adoption. These leaders must also empower
throughout the organization. These leaders truly their members to advance EA adoption.
believe that their role is to serve the people and
to enable them to reach their innate potential. Empowerment
When people are inspired, they feel the fire of
passion that will drive them intrinsically and Transformational leaders empower their organi-
independently to achieve the right thing. People zational members to realize extraordinary accom-
in an inspired organization feel passionate about plishments. These leaders empower organizational
the values and purposes, the commitment of the members with power, information, knowledge

140
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

and rewards (Raelin, 2004, p. 7). Raelin (2004) ronments, and have greater job performance (Sujan
found that transformational leaders share key in- et al. (1994), as cited in Ahearn et al., 2005).
formation with organizational members, dialogue Transformational leaders encourage collabo-
openly with these members, encourage members ration with organizational members to realize
to challenge leadership decisions without adverse enterprise performance effectiveness outcomes.
repercussions, and empower members to make Collaborative leadership emphasizes consensus
understandable mistakes. Raelin (2004) also building through engaging diverse individuals in
found that transformational leaders encourage dialogue and in building relationships by facilitat-
participative management, establish decentral- ing communication, nurturance, inspiration, and
ized organizational structures, and emphasize the mobilization of teams (Bryson & Crosby,
employee development. Herb Kelleher, former 1992; Chrislip & Larson, 1994, as cited in Fis-
Southwest Airlines CEO, reflected (as cited by chback, Smerz, Findlay, Williams, & Cox, 2007,
Raelin, 2004) that he hopes that when people p. 30). Transformational leaders energize and
think back about their time at work, they say focus people through and across organizational
that Southwest Airlines was one of the finest boundaries (Avery, 1999, as cited in Fischback et
experience they ever had; that it helped them al. 2007). Rogers, Pace, & Wilson (2002) studied
grow beyond anything they though possible (p. 21 remarkable organizational transformational
8). Gilbert Fairhold, Perspectives on Leadership experiences and found that empowering em-
author (as cited by Raelin, 2004), found that ployees was critical to effective organizational
people feel empowered when they are thinking transformation. Rogers et al. (2002) found that
contributors, not just physical extensions of the employee empowerment was critical to contact
managers capacities, ideas and creativity (p. 9). lens maker Wesley Jessens dramatic transfor-
Other researchers reported similar findings. mation. Wesley Jessens leaders empowered
Empowered employees have greater authority organizational members with critical informa-
and responsibility for their work that they would tion and delegated decision-making to the lowest
in more traditionally designed organizations organizational levels. As a result, Wesley Jessen
(Conger & Kanungo, 1988, as cited in Ahearne, transformed a $40 million annual loss into profit
Mathiew, & Rapp, 2005, p. 945.) Organizational in the first month of the new CEOs leadership
member empowerment is an important driver of and maintained profits in each subsequent quarter
organizational effectiveness (p. 945.) Transfor- (Rogers et al. 2002).
mational leaders create organizational cultures Empowered employees have freedom to
that increase employees self-efficacy and control, choose, think and respond, as appropriate, to
eviscerate conditions that foster feelings power- communication from others in the organization
lessness, and are as flexible as circumstances allow (Darling, 2005, as cited in Darling & Beebe, 2007,
(Ahearn et al. 2005). Transformational leaders p. 85). These authors found that Empowered
empower organizational members by delegating employees are fundamental to facilitating an
responsibility down the hierarchy so as to give entrepreneurial spirit throughout a developing
employees increased decision-making authority organizational setting (p. 85).
in respect to the execution of their primary work Transformational leaders empower organi-
tasks (Leach, Wall, & Jackson, 2003, as cited zational members to accomplish organizational
in Ahearn et al. 2005, p. 946.). Individuals with goals. U.S. government leaders must empower
higher self-efficacy levels produce greater effort, their members in their organizations to advance
are better able to manage challenging work envi- EA adoption. U.S. Government leaders must adopt

141
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

the VICIE Transformational Leadership Model of Homeland Security, and the U.S. Government
to advance EA adoption. Accountability Office. The model also resonated
The author presented the VICIE Transfor- greatly with these audiences. Further, the U.S.
mational Leadership Model at 12 conferences National Defense University (NDU) incorporated
in 2006 and 2007 including the 17th Information the VICIE Transformational Leadership Model
Resources Management Association International into the curriculum in five of its academic pro-
Conference in 2006, the ArchitectureGOV 2007 grams and the model was presented to over 400
Conference, and the 2007 Human Resources Gov- NDU students in 2006 and 2007. The model also
ernment 2007 Conference. The model resonated resonated greatly with the students.
greatly with these audiences. The author also The VICIE Transformational Leadership
presented the model to various U.S. Government Model describes the competencies needed to
organizations in 2006 and 2007 including the U.S. advance EA adoption. In addition to understand-
Defense Intelligence Agency, U.S. Army Under- ing these competencies, U.S. Government leaders
secretary for Financial Management, U.S. Army must understand how EA is situated within the
Chief of Staff for Intelligence, U.S. Department context of enterprise management. The author

Figure 2. Transformational leadership and enterprise management integration framework

transformational leadership and enterprise management integration Framework

transformational leadership

governance

enterprise architecture

portfolio management

capital planning and investment control

project
operations and Support (as-is) business implementation operations and Support (to-be)
management
case

time

mission vision mission vision

as-is enterprise transitional activities


to-be enterprise

Strategy
goals
resources

goals Strategy

human materiel technology resources

human materiel technology

142
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

developed the Transformational Leadership and organization to advance an effective EA capabil-


Enterprise Management Integration Framework ity. The EA describes the enterprise As-Is and
to enable U.S. Government leaders to understand To-Be states and the transition plan. The FDA
this context. turned to Enterprise Architecture (EA) to serve
as the methodology to achieve its desired state of
efficiency and effectiveness (OMB, 2005. p. 2).
Transformational Leadership The EA reveals information that enables enterprise
and Enterprise Management portfolio management.
Integration Framework Portfolio management involves making deci-
sions regarding enterprise human, materiel, and
The Transformational Leadership and Enterprise technology resource investment decisions. These
Management Integration Framework situates decisions involve existing and/or desired resource
EA within the context of enterprise manage- investments. The FDA used EA to inform and
ment activities and describes the relationships manage its portfolio of resource investments
that exist between transformational leadership (OMB, 2005). Enterprise portfolio management
and enterprise management functions. Figure then informs the enterprise Capital Planning
2, Transformational Leadership and Enterprise and Investment Control (CPIC) process. The
Management Integration Framework, depicts CPIC process implements enterprise portfolio
these relationships. management resource investment decisions.
Transformational leadership enables organi- Finally, organizations develop business cases to
zations to realize their long-term performance substantiate enterprise investments, manage in-
goals. The transformational leader provides vi- vestments as projects and, over time, implement
sion, integrity, communication, inspiration, and new capabilities to improve enterprise perfor-
empowerment to enable improved enterprise mance. The U.S. Department of Labor adopted the
performance. The criticality of transformational framework elements and dramatically improved
leadership to advancing government-wide EA its performance.
adoption was discussed earlier and is not dis-
cussed in this section. Each enterprise has an
overarching business mission with a related vi- U.S. Department of Labor and
sion and goals. the Transformational
Key enterprise management functions include Leadership and Enterprise
governance, enterprise architecture, portfolio Management Integration
management, and capital planning and invest- Framework
ment control. Governance involves establishing
the rules, roles, and responsibilities for enter- Under its Secretary, Elaine Chao, the U.S. Depart-
prise decision-making. The U.S. Food and Drug ment of Labor (DOL) adopted the Transforma-
Administration (FDA) leveraged governance tional Leadership and Enterprise Management
to enable the FDA to develop an effective EA Integration Framework elements and realized
capability. Governance is the process by which significant performance outcomes. Chao (2007)
the organizations establish and adopt rules, roles, cited leadership as the key critical enabler for
and responsibilities for enterprise decision-mak- DOLs performance outcomes and stated, The
ing. The FDA embraced governance to meet the single most influential factor guiding any agency
U.S. Department of Health and Human Services or organization is the quality of the organizations
mission (OMB, 2005). Governance enables the leadership and core values. Leadership and values

143
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

determine organizational culture. And a manage- universal functions that go across all of DOL and
ment culture that puts a strong emphasis on per- are starting to use the EA process in making IT
formance is one that promotes responsibility and investments. Weve used enterprise architecture
accountability (para. 5). Chao (2007a) stated that in our unified DOL technology infrastructure. The
Leaders advance and defend the interests of their EA helps identify the redundancies. (Mosquera,
organization and their colleagues. So executives 2005, para. 14)
need to be articulate, both in written and in oral
presentations. Thats why skillful communication The DOL performance outcomes were quan-
is absolutely essential to career advancement and tified in its Presidents Management Agenda
becoming a leader (para. 24). scorecard results.
Chao (2007a) cited vision, integrity, commu- The Presidents Management Agenda (PMA)
nication, inspiration, and empowerment as key is a key instrument through which government
leadership competencies. She further observed organizational performance is measured. The U.S.
that everyone can become a better leader through Executive Office of the President established the
practice and stated learning how to be an ef- PMA in 2001 to improve the management of
fective leader is not easy. In fact, its one of the the Federal government. It focuses on five areas
hardest things Ive had to learn in life. And, its of management weakness across the government
a never ending process (para. 28). Tom Weisner, where improvements and the most progress can be
former DOL Chief Information Officer (CIO), made (OMB, 2007c, para. 1). The PMA desired
(as cited in Mosquera, 2005), stated, Theres outcome is improved government performance in
always been leadership and commitment from Human Capital, Competitive Sourcing, Financial
the secretary [Elaine Chao] herself, throughout Performance, Expanded Electronic Government
the senior management and through the entire (which includes EA), and Budget and Performance
department in trying to achieve success in the Integration management (OMB, 2007c). OMB
five PMA areas (para. 16). evaluates each government organization in each
The DOL implemented governance as a area quarterly and assigns a color-coded rating
critical performance enabler. Wiesner (as cited in of Green, Yellow, or Red for each area. A Green
Mosquera, 2005) reported that strong governance rating represents success in meeting the evaluative
contributed to the DOLs performance outcomes area criteria, Yellow represents mixed results, and
and stated, It starts from the management review Red represents unsatisfactory performance.
board level, and the agency heads within the de- The DOL earned Green ratings in each evalu-
partment drill down to our technical review board, ation area in the June, 2005, report and earned
which is made up of senior IT representatives all Green ratings in subsequent reports through
from DOL agencies, and then we spin into the March, 2007. DOL Assistant Secretary for Man-
various subcommittees on capital planning and agement and former DOL CIO Patrick Pizzella
investment, enterprise architecture and security (as cited in Miller, 2005), stated, We got to green
(para. 18). Wiesner further stated: on human capital first and the rest just fell into
place. Human capital impacts every other agenda
Higher than that is a matter of using what youve item, and you can connect the dots (para. 11).
developed in terms of everyday management of Pizzella (as cited in Miller, 2005), further stated
your programs, business processes and IT invest- that Chao emphasized the criticality of leadership
ments. We have a strong governance process to throughout the department and reported Chao
address the EA requirements of the department. held monthly meetings on nothing but manage-
Weve developed an enterprise architecture for ment issues. In four years, she missed only one

144
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

meetingon Sept. 11, 2001 (para. 14). The legislation, OMB guidance, and GAO reports
DOL was the single government organization and recommendations, many U.S. government
to earn Green in all five PMA evaluative areas leaders struggle in advancing EA adoption and,
until the December, 2006, report, when the State as a result, miss opportunities to significantly
Department also earned Green ratings in all five improve their organizations performance. Trans-
evaluative areas (OMB, 2007c). OMB Deputy formational leaders enable their organizations to
Director for Management Clay Johnson (as cited realize long-term enterprise performance goals.
in Miller, 2005), stated, The Department of Labor These leaders establish and encourage shared
is the leader, the best, per the PMA scorecard. . visions, have extraordinary integrity, are strong
. . They are the first and only department ... to communicators, inspire others to excellent perfor-
have installed all the management disciplines and mance, and empower followers. The U.S. DOL,
habits which the president established as priorities by embracing transformational leadership and by
back in 2001 (para. 9). Johnson further reported adopting the Transformational Leadership and
that Chao made the PMA a department-wide pri- Enterprise Management Integration Framework
ority and had tremendous follow-through with elements, realized dramatic and unprecedented
her deputy and assistant secretaries (as cited in performance outcomes. Other U.S. government
Miller, 2005, para. 13). leaders must also embrace transformational lead-
Under Chaos leadership, the DOL realized ership to advance EA adoption and must also adopt
additional significant performance outcomes. The this framework to realize dramatically improved
DOL earned six consecutive clean financial audit long-term performance.
opinions through 2006, four U.S. Presidents Qual-
ity Awards through 2005, and an unprecedented
four consecutive years as the number one ranked REFERENCES
U.S. government organization on George Mason
Universitys annual government performance Ahearne, M., Mathiew, J., & Rapp, A. (2005).
report. The DOL was one of only four govern- To empower or not to empower your sales force?
ment organizations to earn Stage 3 on the GAO An empirical examination of the influence of
2006 EAMMF assessment report (GAO, 2006) leadership empowerment behavior on customer
and was one of only six government agencies to satisfaction and performance. Journal of Applied
earn the highest scores on OMBs 2007 EA as- Psychology, 90(5), 945-955.
sessment (FCW, 2007). Given the performance
Anderson, T. D. (1998). Transforming leadership
outcomes the DOL realized from adopting the
(2nd ed.). Boca Raton, Florida: CRP Press, LLC.
Transformational leadership and Enterprise
Management Integration Framework, other U.S. Baldini, J. (2007). How to master professional
Government leaders must also embrace trans- speaking. Retrieved on June 1, 2007, from http://
formational leadership to advance EA adoption www.cio.com/article/print/104611.
and must adopt the framework to improve their
Bass, B. M. (1990). Bass & stodgills handbook of
organizations performance.
leadership, theory, research, and managerial ap-
plications (3rd ed.). New York: The Free Press.
Conclusion Bass, B. M. (1998). Transformational leadership.
Mahwah, New Jersey: Lawrence Erlbaum As-
Many U.S. government leaders struggle in ad- sociates, Publishers.
vancing EA adoption. Despite U.S. Congressional

145
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

Banutu-Gomez, M. B. (2006). Great leaders know Garrett, K., & Watson, C. (2007). Defining the
that all change must start both at the top and the role of strategic comms at farm credit Canada.
bottom: The whole system must change. The Strategic Communication Management, 11(2),
Business Review, Cambridge, 6(1), 157-161. 20-23.
Boddie, W. S., & and Newman, E. M. (2006). Gorman, B. (2007). Building the buzz, the brand
Stan Boddie and Matt Newman defining effec- and the business at Motorola. Strategic Commu-
tive leadership. Retrieved on June 1, 2007, from nication Management, 11(4), 24-27.
http://www.gcn.com/cgi-bin/udt/im.display.
Griffith, J. (2004). Relation of principal transfor-
printable?client.id=gcn_daily&story.id=41598
mational leadership to school staff job satisfaction,
Chao, E. L. (2007). Speeches by secretary Elaine l. staff turnover, and school performance. Journal
Chao. Retrieved on June 1, 2007, from http://www. of Educational Administration, 42(3), 333-355.
dol.gov/_sec/media/speeches/20070130_Summit.
Harris, S. (2007). Supporting leaders through
htm
change. Strategic Communication Management,
Chao, E. L. (2007a). Speeches by secretary Elaine 11(4), 12.
l. Chao. Retrieved on June 1, 2007, from http://
Higgs, M.(2003).How can we make sense of lead-
www.dol.gov/_sec/media/speeches/20070503_
ership in the 21st century? Leadership & Orga-
APA.htm
nizational Development Journal,24(5/6),273.
Chief Information Officers Council (2001). A
Kerfoot, K. (2001). On leadership: From motiva-
practical guide to federal enterprise architecture.
tion to inspiration leadership. Pediatric Nursing,
Version 1.0. Washington, DC.
27(5), 530-531.
Darling, J. R., & Beebe, S. A. (2007). Effective
Kotter, J. P. (1995). Leading change: Why trans-
entrepreneurial communication in organiza-
formation efforts fail. Harvard Business Review,
tional development: Achieving excellent based on
73(2), 59-67.
leadership strategies and values. Organizational
Development Journal, 25(1), 76-93. Longstaffe, C. (2005). Winston Churchill, a leader
from history or an inspiration for the future. Indus-
FCW (2007). OMB rates agency EAs higher
trial and Commercial Training, 37(2/3), 80-83.
than ever. Retrieved on July 15, 2007, from
http://www.fcw.com/article103177-07-09-07- Miller, J. (2005). PMA yields turnaround at mis-
Web&printLayout managed agencies. Retrieved October 15, 2007,
from http://www.gcn.com/cgi-bin/udt/im.display.
Fischbach, L. M., Smerz, C., Findlay, C. W., &
printable?client.id=gcn&story.id=36519
Cox, a. (2007). Co-CEOs: A new leadership
paradigm for social service agencies. Families Mosquera, M. (2005). Tom Wiesner: Labors
in Society, 88(1), 30-34. e-gov guide. Retrieved October 15, 2005, from
http://www.gcn.com/cgi-bin/udt/im.display.
Forrester, D. P. (2006). The governments new
printable?client.id=gcn&story.id=36769
breed of change agents, leading the war on ter-
ror. Retrieved on June 1, 2007, from http://www. Osaralli, N. (2003). Effects of transformational
governmentchangeagents.com/documents/Gov- leadership on empowerment and team effective-
ernmentChangeAgents.com_WhitePaper.pdf ness. Leadership & Organization Development
Journal, 24(5/6), 335-344.

146
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

Posner, B. Z., & Kouzes, J. M. (2002). The lead- U.S. General Accounting Office (2002). Infor-
ership challenge (3rd ed.). San Francisco, CA: mation Technology: OMB Leadership Critical
Jossey-Bass Inc. to Making Needed Enterprise Architecture and
E-government ProgressGAO-02-389T. Retrieved
Raelin, J. (2004). The bottom line of leaderful
on June 1, 2007, from http://www.gao.gov/new.
practice. Ivey Business Journal Online, Jan/Feb,
items/d02389t.pdf
1-9.
U.S. General Accounting Office (2002a). Enter-
Rogers, P., Pace, S., & Wilson, P. (2002). Mak-
prise architecture use across the federal govern-
ing change stick. European Business Journal.
ment can be improved. Retrieved June 1, 2007,
14(1), 2-7.
from http://www.gao.gov/new.items/d026.pdf
Simmons-Welburn, J. & Welburn, W. (2006).
U.S. General Accounting Office (2003). A frame-
Leadership Lessons in a Climate of Social
work for assessing and improving enterprise
Transformation, Libraries and the Academy,
architecture management. Retrieved June 1, 2007,
6(4), 467-470.
from http://www.gao.gov/new.items/d03584g.
Stephenson, C.(2004).Rebuilding trust: The inte- pdf
gral role of leadership in fostering values, honesty
U.S. General Accounting Office (GAO) (2004). In-
and vision. Ivey Business Journal Online,1.
formation technology: The federal enterprise ar-
Udechukwu, I. I. (2007). Integrity: The courage chitecture and agencies enterprise architectures
to meet the demands of reality. Journal of Ap- are still maturing. Retrieved June 1, 2007, from
plied Management and Entrepreneurship, Fort http://www.gao.gov/new.items/d04798t.pdf
Lauderdale 12(2), 106-107.
U.S. General Accounting Office (2004a). Leader-
U.S. Congress (1996). Public Law 104-106, 110 ship remains key to agencies making progress
Stat. 186. on enterprise architecture efforts. Retrieved
June 1, 2007, from http://www.gao.gov/new.
U.S. General Accounting Office (1998). Customs
items/d0440.pdf
Service Modernization: Architecture Must Be
Complete and Enforced to Effectively Build and U.S. Government Accountability Office (2004b).
Maintain SystemsAIMD-98-70. Retrieved on June Homeland Security: Efforts Under Way to De-
1, 2007, from http://www.gao.gov/archive/1998/ velop Enterprise Architecture, but Much Work
ai98070.pdf RemainsGAO-04-777 Retrieved on June 1, 2007,
from http://www.gao.gov/new.items/d04777.pdf
U.S. General Accounting Office (2000). Informa-
tion Technology: INS Needs to Better Manage U.S. Government Accountability Office (2006).
the Development of Its Enterprise Architec- Leadership remains key to establishing and lever-
tureAIMD-00-212. Retrieved on June 1, 2007, aging architectures for organizational transforma-
from http://www.gao.gov/archive/2000/ai00212. tion. Retrieved June 1, 2007, from http://www.
pdf gao.gov/new.items/d06831.pdf
U.S. General Accounting Office (2001). DLA U.S. Government Accountability Office (2007).
should strengthen business systems modern- The GAO: An introduction. Retrieved on June 1,
ization architecture and investment activities. 2007, from http://www.gao.gov/about/history/in-
Retrieved June 1, 2007, from http://www.gao. troduction.htm
gov/new.items/d01631.pdf

147
The Criticality of Transformational Leadership to Advancing United States Government Enterprise

U.S. Government Accountability Office (2007a). U.S. Office of Management and Budget (2007a).
GAOs name change and other provisions of the Results of FY 2007 federal enterprise architec-
GAO human capital reform act of 2004. Retrieved ture assessment. Retrieved July 28, 2007, from
on June 1, 2007, from http://www.gao.gov/about/ http://www.whitehouse.gov/omb/egov/docu-
namechange.html ments/2007_EA_Assessment_Results_Sum-
mary.pdf
U.S. Office of Management and Budget (2005).
FDA uses ea to standardize and save with con- U.S. Office of Management and Budget (2007b).
solidation effort. Retrieved June 1, 2007, from OMBs mission. Retrieved June 1, 2007, from
http://www.whitehouse.gov/omb/egov/docu- http://www.whitehouse.gov/omb/organization/
ments/FDA_FINAL.pdf role.html
U.S. Office of Management and Budget (2006). U.S. Office of Management and Budget (2007c).
FEA practice guidance. Retrieved June 1, 2007, Presidents management agenda. Retrieved June
from http://www.whitehouse.gov/omb/egov/docu- 1, 2007, from http://www.whitehouse.gov/omb/
ments/FEA_Practice_Guidance.pdf budintegration/pma_index.html
U.S. Office of Management and Budget (2006a). U.S. Senate Governmental Affairs Committee
Federal enterprise Architecture program EA as- (1994). Computer chaos: Billions wasted buying
sessment framework version 2.1 Retrieved June federal computer systems. Investigative report of
1, 2007, from http://www.whitehouse.gov/omb/ Senator William S. Cohen. Retrieved June 1, 2007,
egov/documents/OMB_EA_Assessment_Frame- from https://acc.dau.mil/CommunityBrowser.
work_v21_Final.pdf aspx?id=22163
U.S. Office of Management and Budget (2007). Zablow, R. J. (2006). Creating and sustaining
FEA consolidated reference model document an ethical workplace. Risk Management, 53(9),
version 2.2. Retrieved July 15, 2007, from http:// 26-29.
www.whitehouse.gov/omb/egov/documents/
FEA_CRM_v22_Final_July_2007.pdf

148
149

Chapter VII
Adaptive IT Architecture as a
Catalyst for Network Capability
in Government
Jay Ramanathan
The Ohio State University, USA

Rajiv Ramnath
The Ohio State University, USA

Anand Desai
The Ohio State University, USA

Abstract

Public institutions that are organized in hierarchies find it difficult to address crisis or other unique
requirements that demand networked solutions. This chapter first provides a prescriptive transaction-
based method for achieving such networking organizations with information technologies (IT) and then
discusses how the organization becomes more effective in non-routine responses to citizen requests.
We illustrate how the prescriptive transaction-based enterprise architecture1 framework2 was used for
decision-making in a multi-year interdisciplinary industry-university collaboration resulting in a suc-
cessful 311 system.

Introduction how the resulting capabilities may be used for


crisis-management. We illustrate how the under-
Public institutions are organized in hierarchies lying transaction-based enterprise architecture3
making it challenging for them to address non-rou- framework4 was used for decision-making in a
tine problems that demand networked solutions. multi-year interdisciplinary industry-university
This chapter first provides a prescriptive method collaboration5 with the City of Columbus, Ohio
for achieving such networking organizations with which has implemented a successful 3116 system.
information technologies (IT) and then discusses The collaboration reported here is based on two

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Adaptive IT Architecture as a Catalyst for Network Capability in Government

related projects: 1) the Department of Technologys A common criticism of a complex systems


Strategic Plan [Ramnath and Landsbergen 2005] characterization of an organization, particularly
and 2) the Independent Evaluation of the 311 in the public sector, is that because of the com-
system [Ramnath and Desai 2007]. plexity and its emergent properties it is difficult
Finally, we also introduce an Adaptive Com- to establish clear lines of responsibility. Therefore
plex Enterprise7 (ACE) architecture framework accountability is not readily established. However,
that treats organizations and IT in a holistic man- in this fine-grain monitoring of the requests and
ner to create networked service capability. Figure execution of transactions-deliverables it is possible
1 shows how our basic unit of analysis, the RED to provide accountability and to establish a history,
transaction tuple consisting of Requirements, on a Request basis, even in highly uncertain and
Execution of transaction and Delivery arising dynamic crisis management contexts.
from Requests in its contextual environment. The This chapter is organized as follows. We begin
ACE consists of a number of nested dimensions. with a discussion of the networking research and
The outermost dimension of ACE is the strategic trends in government along with the related IT
dimension where the external context and envi- challenges that demand an interdisciplinary ap-
ronment is scanned and external requirements are proach. We then present the ACE framework itself.
assessed. The business dimension is where the We apply this framework to our case study of the
investments and value creation of ACE are aligned implementation of the citys 311 non-emergency
to respond to this assessment of the external re- response system. Finally, we present the IT deploy-
quirements. The costs and the production aspects ment process, the results of the 311 deployment
of ACE are aligned in the operations dimension and their success in building an adaptive capability
and the transactions are finally executed in the for responding to and managing crises.
infrastructure use dimension where the Require-
ments are operationalized into actual transaction
tasks and deliverables are produced.
In ACE, service-providing agents (that is Figure 1. ACE architecture framework for build-
organizations, applications and processes) are ing network capability on existing silos
dynamically assembled to provide adapting
responses to specific routine and non-routine
Requests. Our focus in this chapter, however, Strategy dimension defines external requirements
is on the collaboration across silos that must Business dimension aligns investments and value
be established in order to manage non-routine creation

Requests, which are the defining characteristics Operations dimension aligns costs and
performance
of crises. Hence the underlying ACE framework Infrastructure use dimension provides
offers a Requirements-Execution-Delivery based services for transactions
execution of
prescription for planning and execution of a strat- requests transactions deliverables
egy through the alignment dimensions where IT
plays a catalyst role in building networks that cut Dynamic use of
services within
across organizational silos. We illustrate how the transactions
ACE-based analysis also succeeds in justifying
the networking and the prioritization in complex
organizations. Infrastructure agents - Actual resources and components .
These include both organizations and systems . These
are the silos made of hierarchies , static models etc.

Figure 1: ACE architecture framework for Building Network Capability on Existing Silos.

This chapter is organized as follows. We begin with a discussion of the networkin


150
trends in government along with the related IT challenges that demand an interdisc
approach. We then present the ACE framework itself. We apply this framework to
study of the implementation of the citys 311 non-emergency response system. Fin
Adaptive IT Architecture as a Catalyst for Network Capability in Government

Background in Government however, ad hoc requests for bulk trash pick-up


and IT Challenges or closing a city street to shoot a movie or for a
block party or a bank hold-up are examples of
Historically, most public enterprises have been non-routine Requests.
organized around hierarchical principles with Responding to non-routine requests requires
decision-making concentrated at the apex of the considerable expenditure of effort in navigating
organization. Centralization has been the typical across organizational silos [Kling et al. 2001].
organization pattern for several reasons, including Traditional public institutions are organized
ensuring fairness of treatment for both service in hierarchies, however, agencies increasingly
recipients and employees; creating clear chains of face difficult, non-routine requests that demand
accountability; and minimizing the exposure of networked solutions and require managers to
service delivery to political forces. In response to weave strong hierarchies into effective networks.
criticisms that centralized hierarchies are stultified While we know that the innovative processing of
and inefficient, some public organizations have non-routine services is the future [Landsbergen
devolved discretion downwards through decen- 2001, Longstaff 2005], it is also true that manag-
tralization or by creation federations by separating ers in the public sector do not have a tradition of
large multi-service bureaucracies into loosely dynamic on-demand cross-silo collaboration, and
coupled units. Recently, organizational bound- have not developed the necessary competencies,
aries in the public sector have become porous as simply because the need for such activity has
service delivery becomes the responsibility of a not existed during their professional lifetimes.
network of organizations government agencies, What is needed is, firstly, a strategic catalyst for,
private firms, non-profit organizations bound and secondly, a foundation on which to build
together by contracts, grants, with a common network capability. We show that a key catalyst
commitment to addressing relevant policy prob- is crises-management planning since all levels
lems [Agranoff and McGuire 2003; Nohira 1992, are being required to (and more importantly are
OToole and Meier 2000]. Large metropolitan receiving federal and state funds to) develop crisis
municipal governments with wide-ranging service management plans and capabilities, and as they
responsibilities are thus typically conglomera- are doing so are beginning to at least talk about
tions of all three of these organization patterns, the networks required [Schwartz 2003].
hierarchies, federations and networks. Non-routine Requests often generate many
We next present our conceptual model of a sub-Requests that require complex coordination
networked organization and discuss the challenges across multiple government units [Groenlund
encountered in achieving full networking. 1997]. Given the growth in non-routine requests
for service delivery, the IT systems that support
Conceptual Model of a Net worked public enterprises must become adaptive, inte-
Organization and Non-Routine Requests: grated, and flexible [Bovens and Zouridis 2002;
Any organization can be logically conceptual- Ho 2002; Moon 2002]. Based on a long history of
ized as in Figure 1. On the left we characterize working relationships with public enterprises, we
the Requests for services originating from the believe this new generation of demands on public
customers in the Strategy dimension. We also enterprises requires a concomitant evolution of
characterize each Request type as being routine IT [Teisman and Klijn 2002].
or non-routine. Regular trash pick-up, maintain-
ing the regular flow of traffic in city streets and Complexity of Network Enabling IT: Ex-
regular policing are routine municipal activities, isting IT systems and Websites are designed to

151
Adaptive IT Architecture as a Catalyst for Network Capability in Government

enable hierarchical public enterprises are not tures (SOA) within which existing applications can
built to adapt to each request. Geared currently be treated as agents and components providing
towards optimizing repetitive routine requests, specific WebServices that is accessed within con-
these systems assume predictability and process texts [Gortmaker et al 2004]. With these advances
stability. This assumption has commonly led to in place, services of agents (human services and
redundant yet distinctly separate organization application services) can be invoked dynamically
and IT elements. The presence of organization by a logical workflow layer to deliver on the
and IT silos makes coordination and information requirements of a Request [WFMC]. Thus, with
sharing difficult [Malone and Crowston 2001]. workflow and SOA, IT has evolved from being
This arrangement has proved effective for simple merely a mechanism in a programmers produc-
requests. However, the environment of public en- tivity tool-kit into an electronic Business Process
terprises is increasingly more dynamic and often Management (eBPM) which is a logical business
turbulent [Salmela and Spil 2002; Thietart and modeling and execution tool [BPMI, Ramanathan
Forgues 1995]. Large bureaucratic organizational 2099, Ramanthan and Ramnath 2004]. Along
systems based on stable models are not designed with dynamic binding of Requests to services,
to be nimble and become effective in the presence execution-level monitoring and accountability of
of rapidly changing environments. It is our conten- service and resource utilization is now possible.
tion that it is possible to create organization-IT Thus upon completion of a response to a Request,
alignment that yields effective performance even performance-related measurements task span
under dynamic uncertain conditions. time, resource time used, quality incidents. - can
be readily captured electronically.
Relationships Between organization Pat-
terns and Technology Patterns: Organization Patterns for Enterprise Architectures: En-
theorists contingency theorists in particular terprise architectures are typically considered to
argue that organization performance is a function have high-level definitions of the processes, data,
of the fit between organizational patterns, their applications, and technology needed to support the
environment, internal processes and technology business. However, there are several challenges
[Child 1972; Donaldson 1999]. Organizations that with current approaches. The links among busi-
adopt the pattern or forms that best fit the relevant ness planning, organizational patterns and imple-
combination of task, technology, and environment mented software architecture is often missing.
are likely to perform at a high level. While the Thus, high-level plans often flounder for lack of
connection between organization patterns and en- a clear connection to actual system development
vironment has been studied extensively [Laurence guided by a detailed strategy implementation
and Lorsch 1967; Drazin and Van de Van 1985], plan [Cross 2002].
research is needed to examine how interactions More generally, as the world becomes de-
between organization and technology patterns mand-driven and linear models become obsolete9,
affect performance [Gresov 1989]. we look to principles from Complexity theory
As characterized previously, IT must in the to reassure us that complex behaviors can
near future support the networking of public or- result from a small number of simple recursively
ganizations so they can embrace externally-driven applied patterns [Peitgen et al 1992]. Others have
variation and non-routine Requests. Recent IT shown [Kelly and Allison 1998] many complex
technological advances [Agha 2002, Anderson enterprises are composed of nested organizations
2001, Bauer 2004, DAML8, Digtalgovernment] that are similar in structure; exhibiting self-
now allow us to build Service-Oriented Architec- similarity. The study of patterns itself has had a

152
Adaptive IT Architecture as a Catalyst for Network Capability in Government

long and varied history in fields such as fractals ACE Framework


[Mendelbrot 1982], architecture [Alexander
1977], and pattern template for object-oriented At a high level, the organization responds to
business and e-Commerce modeling [Eriksson external forces through its vision, by projecting
and Pennker 2000, Adams 2001], and simulation citizen requirements, investments and operations.
along the value chain [Mackenzie 2002]. Based on Within its operations, the organization also takes
these works, the ACE framework was introduced in Requests and produces deliverables. This
to integrate the treatment of organization and IT black-box view of the organization is illustrated
agents. [Ramanathan 2005]. in Figure 2 A. The objective of B and C illustra-
More specifically, guided by the contingency tions of the figure is to progress to a white-box
theory of organizations and the potential of emerg- view of the organization. That is, visualize for
ing service-oriented IT architectures, we identify improvement all aspects of agent interactions
across the enterprise the points of interaction and resulting performance from the perspective
between Requests and enabling agent services to of each stakeholder of that interaction.
produce deliverables. At the same time we retain When applied in analysis the patterns10 ex-
the leverage the services of existing enterprise plicate value-chain interactions between agents,
applications where it has successfully enabled namely, organizations, IT components and ap-
routine processing within hierarchies. We ac- plications, in the infrastructure as they service
complish this with the decision-making guided different REDs. Thus the ACE frameworks RED
by the conceptual ACE representation. pattern informs and guides the architecture team
to 1) produce a conceptual representation of the
Adaptive Complex Enterprise (ACE) frame- organization focused on Request types and related
work objectives for Networking: The objective RED transactions within the enterprise, and 2) use
of the ACE architecture framework is to help this ACE representation and structure to monitor
adapt each response by managing underlying and analyze the performance and develop strate-
agent service interactions. These interactions gies for overall improvement.
can become non-linear, emergent and complex
[Morl 2002, Desai 2005]. The framework le- ACE Framework Concepts: The underlying
verages concepts of complexity theory and recent concepts are first motivated and then presented
evolutions in Internet technologies to implement in detail.
ACE architecture as a logical layer using existing
agent and new services (Figure 1). Dimensions: This structures the various
Consequently we can now implement an IT stakeholders of the organization and aligns
infrastructure that can take traceability to its them into an external-focused business
ultimate goals of networking across the orga- planning-and-execution value chain.
nization and technology layers. As non-routine RED transaction pattern: Identifies each
events occur, the specific organization and IT Request Type its RED transaction - the
services are identified and dynamically invoked Requirements, Execution and Delivery
to provide the most efficient response. Thus the - milestones at which service performance
agent services adapt to handle non-routine events contribution (i.e. ) of its roles11 are mea-
or shocks from the external environment and sured from the perspective of each dimen-
respond to requests efficiently even though these sional stakeholder as shown.
processes are not incorporated into the models of Triage pattern: Applies policies that dy-
existing IT systems. namically assign specific agents to service

153
Adaptive IT Architecture as a Catalyst for Network Capability in Government
Page 7 of 25

Figure 2. ACE concepts at-a-glance

Figure 2: ACE concepts at-a-glance.

154
Adaptive IT Architecture as a Catalyst for Network Capability in Government

roles based on the requirements of a specific the customer-provider agents so that the transac-
Request. And, tion can complete successfully with a satisfactory
Infrastructure roles pattern: Identifies the deliverable. The transaction captures both the
prototypical agent service or service clusters service roles needed for response and the result-
required to service and execute each Request ing execution performance. That is, the same
and RED type. In addition, these roles allow pattern structure is used both for planning and
dynamic assignment, if needed, to achieve execution. Finally, note that at the milestones R, E,
delayed binding between the RED trans- D contributing performance to the corresponding
action and the underlying infrastructure dimensions are as follows:
(agents that are either internal or external RED execution begins with the Request from
to the organization). the customer (a citizen, a government official, or
any entity that can make a demand of the system).
The concepts, patterns and their relation- The arrows from the transaction execution of
ships are in Figure 2 and discussed in detail as Figure 2 B, illustrates the relationship between
follows. the RED execution and the ACE dimensions or
perspectives. We see the performance contribution
Dimension: The dimensions illustrated in starting from the infrastructure use dimension
Figure 2 B structures the organizations planning and working outward. We next see how the scale
and execution value-chain of stakeholders. The and scope of planning and execution interest in
performance of each dimension is aligned with RED performance is different in each dimension
(represented as ) neighboring dimensions. This to meet the needs of its specific stakeholders:
alignment is also external-environment-focused.
The forces identified on the organization in Figure Strategy: The external environment that
2 A as in [Porter 98] are addressed by structuring encourages or discourages the growth of
the organizations internal stakeholders and what certain types of Requests is monitored and
they need to achieve effective responses and cus- trends identified from the organizations
tomer satisfaction for each Request. That is: strategic perspective.
Infrastructure services and use and Request Business: The value provided by collections
satisfaction Operations performance of groups of Request types and instances is of interest
of requests Business value Strategy satis- from the perspective of creating value and
faction. determining investments.
This alignment (similar to the balanced
scorecard [Kaplan and Norton 1996]) along the
internal value-chain between the customer-and- Table 1.
provider organizations of the public enterprise is RED Transaction Milestones 1. Dimensions
as required by contingency theory. This align- Requirements negotiated between the Operations
ment is also enabled through the performance of customer and provider and identification Dimension
of service capacity to be used, costs, and
each and every Request by the RED transaction response time
discussed next. Execution results in value creation for the Strategy
customer measured through customer satis- Dimension
faction and related quality assurance
RED Analysis12 Pattern: Strategy is devised
Delivery in the customers environment Business
for each Request type originating from the external resulting in cost accounting and value to the Dimension and
dimension using the RED pattern for analysis. The organization, performance feedback to the Infrastructure
infrastructure Dimension
RED structure guides the interactions between

155
Adaptive IT Architecture as a Catalyst for Network Capability in Government

Infrastructure use: The roles needed to Triage implements policies by which agents
service each RED transaction type are within the organization are assigned to
identified. These roles are assigned actual RED roles and prioritizes Requests. Since
shared or dedicated resources such as people, this makes it is possible to delay the assign-
IT components etc. Upon assignment, the ment of roles till the RED execution, there
RED transaction executes to complete the is flexibility in determining which agents
response. Note that the roles have associ- are engaged. This flexible scheduling abil-
ated operating-level agreements (or OLAs) ity allows for the flexible use of existing
required to successfully complete the RED resources.
transaction and service-level agreements (or The agents can be from different organiza-
SLAs) that are of interest to the stakeholders tions and yet be assigned to the roles of
in the different dimensions13. The stakehold- a RED to form a temporary coalition to
ers in the infrastructure dimension must complete the transaction. For example, the
ensure value is provided to operations. roles may be supplied by departments or
Operations: The performance of each spe- agencies across political jurisdictions such
cific type of Request and all its instances is as the corporate municipal boundaries, and
of interest to the department (team, group) across geographic communities such as
and its director (leader). The operational neighborhoods and precincts.
stakeholders ensure value is provided to RED transactions that network across
business. boundaries can be audited (for example, to
identify cost implications) providing insights
Finally, a RED transaction step can initiate into questions such as: How often do non-
other RED transactions at any time. Note also that routine Requests involve multiple boundar-
while delivery completes the response transaction, ies? (Note, while this can be implemented
there can be a variety of reasons why transactions [Holowczak 2003], such information is dif-
do not complete. (This is due to various reasons ficult to obtain with current IT systems.)
lack of capacity, customer dissatisfaction etc.
We will not address such issues here due to limi- Infrastructure Roles Pattern: This final pat-
tations of space.) tern focuses on the individual and shared agents
in the infrastructure that perform potentially
Triage pattern: This pattern is a fundamental multiple roles within multiple REDs. To ensure
dynamic interaction pattern between the incom- quality of service (i.e. meet OLAs) that in turn
ing non-routine Requests and the infrastructure ensures RED SLAs, each service or cluster of
needed for servicing that Request. While it pro- services is treated as a whole and monitored as
vides the customer with a single interface into it is used within the specific REDs. The result
the organization, it also handles the assignment of the monitoring is a precise measure of use,
of initial resources for execution and provides the quality delivered and feedback for improvement
networking capability. of agents and the overall infrastructure.
The arrival of a Request causes the triage Together the patterns provide flexibility to
organization (examples of triage pattern include assemble response systems that network across
the help desk, customer support center) to first organizations and agencies. For example, the
understand requirements, clarify the Request and delayed binding of RED roles to the underlying
apply rules to assign initial resources to RED roles. infrastructure at triage provides dynamic capa-
In this context it is important to note: bility. Within a larger crisis-management context

156
Adaptive IT Architecture as a Catalyst for Network Capability in Government
implementing a series of IT improvements. However, the rate of IT solution deployment slow
when, for example, tax revenues declined. The City used our team to help develop a strate
plan to guide the IT implementation. We next illustrate how the ACE framework informed
architecture team as they developed the DOT strategy.
Figure 3. The ACE framework products needed for a dynamic networked enterprise

Figure 3: The ACE framework products needed for a dynamic networked enterprise.
[Arens 2002, NIMS]), the interaction with actual Ohio and 15th largest in the country. Population
infrastructure agents required to address the needs growth has been facilitated by a liberal annexa-
ACE TEAM AND WORK PRODUCTS: The ACE architecture team made up of IT architects
of an incoming Request is determined by policies
customer facing account managerstion policy the City services over 200 square
govern by using the patterns to create the enterprise-spec
implemented at triage. These policies can begin miles
architecture representation and work products of territory. An expanding
(Figure 3) throughservice
followingarea and
steps:
with the rules determining
1.
which Requests should a growing population have combined
Catalog external Request types and performance targets to reflect the strategy to place
be handled first and whoperspective.
should handle them. stress on existing response systems. The current
Current customer2. relationship
Catalog ofmanagement Mayorfor
service roles needed has instituted
each a covenant
RED type, identifythatSLA includes
performance targets.
and enterprise systems Consolidate
have simple customer-
and prioritize across Requests, from strategic value,bebusiness
a guiding principle that technology will a key value and
specified priorities to determine
investmentwhenperspectives
a Request (aligning
tool to achieve
with 1). city objectives, namely improving
should be handled. In3. such systems there is also service responses.
Plan the agents and their availability and capability To this end, theroles
to fill City and
consoli-
meet SLA
a tendency to mark Requests as critical or high. dated its IT operations under
performance objectives - a business process perspective (aligning with a Department of 2).
Requests with lower 4.priorities or secondary Re-
Execute responses driven by triage rules to bind the needed RED rolesato available age
Technology (DOT) and began implementing
quests are typically not entered
services because
to meetthey are (aligning
OLAs series of
withIT improvements.
3). However, the rate of
unlikely to be addressed
5. anyway. Policies should IT solution deployment
Identify services used for each transactions (aligning with slowed when, 4).for example,
also be designed, for6.example, to create
Continuous a learn-
improvement -tax
for revenues
each RED declined.
monitorThe City used
service our team feedback and u
performance
ing environment or even thatbuildtoaninform
organizations to help develop
the next improvement cycle. a strategic plan to guide the IT
capacity. implementation. We next illustrate how the ACE
The work products identified in Figure framework informed
3 were the architecture
created based on team as they
a series of interviews of
various department directors and developed team members the DOTbystrategy.
the ACE Architecture teams. The A
The Citys Strategic
architecture team consolidated and prioritized across all the citys RED transactions using
Technology Plan
work products for decision making. ACE team how
We show and Work
these products: Thesteps
prescriptive ACEapplied to the c
architecture team made up of IT architects and
The illustrative case used here is based on the customer facing account managers govern by us-
City of Columbus which serves as the state capi- ing the patterns to create the enterprise-specific
tal of Ohio. As a result of significant population architecture representation and work products
growth, the City is now the most populous in (Figure 3) through following steps:

157
Adaptive IT Architecture as a Catalyst for Network Capability in Government

1. Catalog external Request types and per- use that to inform the next improvement
formance targets to reflect the strategy cycle.
perspective.
2. Catalog of service roles needed for each RED The work products identified in Figure 3 were
type, identify SLA performance targets. created based on a series of interviews of the vari-
Consolidate and prioritize across Requests, ous department directors and team members by the
from strategic value, business value and ACE Architecture teams. The ACE architecture
investment perspectives (aligning with 1). team consolidated and prioritized across all the
3. Plan the agents and their availability and citys RED transactions using the work products
capability to fill roles and meet SLA per- for decision making. We show how these prescrip-
formance objectives - a business process tive steps applied to the city. The responses were
perspective (aligning with 2). captured in spread sheets as illustrated in Figure
4. Execute responses driven by triage rules to 4. The types of work products aligning the ACE
bind the needed RED roles to available agent dimensions within the city are discussed next.
services to meet OLAs (aligning with 3).
5. Identify services used for each transactions 1. Request types and performance targets; Page 12 of 25
(aligning with 4). strategy Dimension: As with many orga-
6. Continuous improvement - for each RED nizations, the city had already defined its
monitor service performance feedback and strategy - primary citizen Request types

The responses were captured in spread sheets as illustrated in Figure 4. The types of work
Figure 4. At-a-glance workaligning
products product the
spreadsheets and sample
ACE dimensions responses
within corresponding
the city to Figure
are discussed next. 3

Strategy dimension 1: Catalog of Service Request Types, Targets


Request type Target # Response time
<Complaints> <reduce by 15%> <24 hours>

Business dimension 2: Catalog of RED transactions; Priorities and Performance, Roles, SLAs for each service type
Requirements Execution Delivery
Throughput
Request type FTE used (Service Roles (Service Roles (Service Roles Business value Priority
SLA
Forces: competition, used) used) used)
economics, substitutes,
compliance Roles used: Legal, CRM, Website
Complaints 10 per day 3 Administration => Medium Medium
posting

Operations dimension
Environment and 3: Catalog of Infrastructure (ORG & IT) Services, OLAs, Availability
strategy REDs - where used,
Resource type Total volume used Availbility OLA
role, priority of use
Complaints|CRM|high
<Server> 70% 30% Response time
All|Mail|very high

Process (1 Legal & 2


Infrastructure use dimension admin FTE),  hours per
complaint
4: Triage: Request requirements capture execution: delivery: resolution Business votes, 30 in 30
days,
classification and dynamic and assignment: resolution document
role assignment (to Roles: Call center, Roles: Administration, Customer (Med - Customer satisfaction)
unassigned roles) Customer Relationship Roles: Legal, Document Management
Management (CRM) CRM System Deliverables
Triage
and assign to request capture and delivery:
execution: document
Complaint complaint assignment: recording
preparation
processing Ave. Response: 
Ave. Response:  days
Ave. Response: 
days days
Roles: Admin
Role: Experts Role: Admin
Services
use

Agent IT
services Services

Figure 4: At-a-glance work product spreadsheets and sample responses corresponding to Figure 3.
1: REQUEST TYPES AND PERFORMANCE TARGETS; STRATEGY DIMENSION: As with many
158
organizations, the city had already defined its strategy - primary citizen Request types handled
by its departments. With each type there were numbers and targets which were stated as
Uimprovements. Here the Ucould be a positive or negative number. For example, weed
Adaptive IT Architecture as a Catalyst for Network Capability in Government

handled by its departments. With each type Within the business process dimension,
there were numbers and targets which were the objective is to manage agent OLAs to
stated as improvements. Here the achieve the performance SLAs at each RED
could be a positive or negative number. For milestone (e.g. 10 per day for complaints).
example, weed abatement target was a 4. Triage: Request classification, role as-
negative number that implied a reduction signment, RED execution perspective:
was desirable to control undesirable ele- As in Figure 4, the as-is RED types overall
ments, but might need additional service execution performance towards each
capacity and investment to accomplish it. dimension is identified. Also each REDs
The catalog of Request types is identified roles, sub-REDs and needs were explicitly
in the strategy/environment dimension. captured and related to the value to business.
2. Catalog of RED transactions; Priorities Flexibility in role assignment is identified.
and Performance, Roles, SLAs for each 5. Service Monitoring and Continuous Im-
service type; business Dimension: This provement: RED transaction execution
planning step created the logical RED struc- metrics; an improvement perpective:
tures that relate the Request types initiated Since the basic goal of an IT strategic plan
in the environment to the responding roles is to develop a precise road map that takes
and desired performance within providers the city from as-is to to-be with a prioritized
enterprise. As in the business dimension of set of projects, we needed to take individual
Figure 4, for the complaint Request type, department work products and consolidate
the RED milestone and Roles specifics (i.e. and prioritize across all departments. This
CRM, administration etc.) and business was accomplished by the ACE team as fol-
value are all identified. lows.
3. Catalog of Infrastructure (IT) Services,
Availability and OLAs; operations Di- Analysis and Decision-making leading
mension: Using the output of step 2, this to 311 Implementation: As mentioned before,
step takes the perspective of each agent and the ACE architecture team was composed of
service and determines where it is used by selected business analysts, system architects, and
specifically identifying the RED roles sat- departmental directors. The use of the strategic
isfied. For example from the perspective of IT planning process is illustrated in Figure 5.
the CRM service, it is use in the complaint The primary role of the ACE team is to develop
transaction but it also used in many others. the application portfolio for investments through

Figure 5. Governance process using ACE framework


C onsolidated
R ED analysis Application P orfolio
BIOS a cross IT A rchitecture
applying rules C onsolidation and P rioritizaion
departm ents

R ED Application
Perform ance delivery

159
Adaptive IT Architecture as a Catalyst for Network Capability in Government

consolidation of inputs from individual depart- Document management, and


ments and through the RED analysis. Consolidation of call-centers.
From the citys perspective many suggestions
were made to the account management teams. The At the start of our engagement, there was on-
reduction of time or the need for a new IT service going discussion about implementing a single
was often requested. However, there was a need to call-center interface; however the justification for
objectively select projects of maximum impact to this the benefits and the costs - were not clear.
the external environment and to the business. This The ACE framework - work products and RED
was accomplished through the following rules to analysis - gave a precise justification in terms of
consolidate and prioritize the IT projects: value to the organization and through identifying
Rule for RED analysis and prioritization: From across departments where the positive effects
a strategy and environment perspective, prioritize would be of this shared service. For example, we
primary RED transactions for improvement based identified that of the 17 City service departments,
on the following: about 30% of the Requests were non-routine
nature, often requiring interactions with up to
High competitive value to the organiza- three other departments. Previously, interdepart-
tion, mental response processes were all handled in an
High Request volume, ad hoc fashion with manual procedures (such as
Lower than desired throughput, phone calls) and hand-offs (via email). In these
High queue times, instances, the absence of an efficient means of
Use of shared services with other REDs, coordinating across boundaries resulted in slow
and finally and sometimes incomplete responses to citizens,
Identify the sub-transactions of the high- affecting satisfaction.
priority transactions and also assign these Consequent to the strategic IT planning project,
a high priority. the City of Columbus implemented a one-stop ap-
proach to the placement of orders for city services.
Rule for identifying maximum return on invest- The 311 Project entailed centralizing the citys
ment: List all the IT needs and projects, prioritize entire call center structure into one common call
by maximum impact to business value by looking center that can be contacted through the use of one
across REDs (prioritized previously). This gives number (311). This centralized call center utilizes
us the maximum service level impact through a common supporting type of software which is
the investment in the IT services and operating the repository for Requests for city services as
improvements. well as the performance management of those
The aforementioned process actually led to requested services. The City of Columbus decided
the prioritization of the 311 project since many to develop its own supporting software and man-
high-value non-routine Requests identified the age this project with its internal resources.
needed IT support in many different ways. For
example:
Independent Evaluation of
Case management, the 311 system
Status reporting to customer,
Order coordination and management with In the Independent Evaluation of the 311 system
other departments, project we had two tasks 1) to evaluate the system
Project management, as-is and 2) to evaluate the impact of 311 on crises-

160
Adaptive IT Architecture as a Catalyst for Network Capability in Government

management at the City of Columbus. Part of the (This is the expected result of traceability
funding for the 311 Project was obtained from the due to capturing of metrics). .
Department of Justice via a grant. As a require-
ment of the Federal grant, an impact evaluation Approach to Indirect impact: In addition to
on crises-management had to be conducted. evaluating the direct impact of 311, we believed
that a very important benefit of 311 would be as
Evaluation Approach an integrative capability for creating effective
informal networks within the City. We decided to
Approach to Direct Impact: Three areas of investigate this integrative capability through the
direct 311 impact on crises management were specific lens of emergency and crisis management.
identified using guidelines from the Office of In particular, we sought to evaluate whether and
Community Oriented Policing Services outlined how a 311 system, its stakeholders and its support-
in [COPS03-1]. These are listed as follows, in ing services architecture would serve as a catalyst
order of importance: for creating network competencies for delivering
critical, non-routine services. As described in
Workload reduction of public-safety-related [Mendonca 2007] non-routine response requires
departments and divisions: The impact of emergent improvisation by dynamically created
311 in enabling departments and divisions in adhocracies. Thus, we were looking for how
the first line of support with respect to safety 311 may catalyze competencies such as:
(Department of Public Safety, Department
of Health) to improve their performance Activation: i.e. enlisting participation in
by taking away the distraction of handling networks;
non-emergency requests and thus allowing Framing: influencing the operating rules,
them to focus on emergency operations. prevailing values, and norms while altering
(Note that this ties to the Triage pattern the
enables different policies to be designed Perceptions of the participants, in response
and applied.) to emergent phenomena;
Information clearing-house: The ability Mobilizing: developing a view of the stra-
for 311 to serve as an information clear- tegic whole and an ability to develop and
ing-house, i.e. as a unified contact and achieve a set of common objectives based
information dissemination point to assist on this whole; and
in the management of crises. (This ties to Synthesizing: creating the environment
the requirements gathering for each Request for interaction among network participants
and then information sharing.) by blending perceptions [Agranoff 2001].
Community Policing: The ability of 311 Instead of legal authority as the factor that
to provide data to pinpoint trends (such as binds actors, we wished to see if managers
trends in crime, or population demograph- now rely on trust when managing across
ics), detection of unanticipated events (such silos.
as the prototypical Baltimore example of
the detection of a West Nile virus outbreak Tool used: Both structured interviews and col-
from increasing bird deaths) and the ability lected data were used in our evaluation. We used
to identify correlations among trends (such information collected by 311 in terms of addresses
as the correlation of vacant homes to crime) mapped to GIS coordinates for each Request. We
is important in order to anticipate crises. correlated these records with either existing data

161
Adaptive IT Architecture as a Catalyst for Network Capability in Government

available through census tract or publicly available The Department of Public Safety was asked
demographic data indexed by zip code. the following specific questions:
The interviews consisted of questions asked
in a setting intended to encourage discussion 1. Has there been a reduction in 911 overtime
rather than precise answers. Certain questions or budget during this past year?
were repeated in order to elicit a broader range 2. Has there been an increased ability for 911
of answers. All departments were asked the fol- operators to take on additional calls because
lowing questions: there are less non-emergency calls?

1. Have you heard of the Citys ColumbuStat The following Departments were inter-
311 system? viewed:
2. In a few words, could you describe it to
us? 3. Public Safety
3. What is your evaluation of 311? 4. Health
4. How are your Dept.s processes and roles 5. Public Service
integrated with 311? 6. Public Utilities
5. Give examples of how 311 data has benefited 7. Community Relations
or could have benefited your organiza- 8. Recreation and Parks
tion? 9. Department of Development
6. What additional features should exist or
what additional data can be collected in 311 We summarize as follows the direct, indirect,
to assist in the execution and improvement and potential impact.
of your processes?
7. What change management or cultural as- Evaluation of Direct and Indirect
pects have needed addressing because of Impact
311?
8. How has 311 been integrated into your Overall the evaluation concluded that the City
departments systems, especially its work- of Columbus has established a successful 311
order system? program, and that the 311 call-center is now an
9. How have you incorporated 311 into your established asset of the City. The 311 system has
Crisis Management and Disaster Recovery successfully transitioned from a technology proj-
plans? ect in the Department of Technology (DoT) to a
10. What other benefits do you see from 311? service-delivery asset managed by the business
11. What integration issues do you see with specifically the Department of Public Service
311 and existing systems in your organiza- (DPS). The specifics are as follows.
tion?
12. Has your knowledge about the operations and Evaluation of direct impact: The City
capabilities of other departments increased has begun to make progress in integrating 311
over the past year? In what manner? more deeply into the Citys day-to-day business
13. In what manner, other than 311, does your processes, and making it a key source of data
Dept. get citizen Requests for service? How in measuring and managing the Citys service
many such Requests do you get? delivery. In particular, DPS and DoT are work-
ing towards:

162
Adaptive IT Architecture as a Catalyst for Network Capability in Government

1. Safety related cost and workload reduction: to deal with special needs in particular
Leveraging 311 to reduce costs and person- needs of crises management: This is being
nel workloads in City departments that have done by extending the capabilities of 311 (for
a direct responsibility for public safety: In example, by moving to a 24x7 operation)
stead of calling 911, residents are being en- and by adding the necessary variation points
couraged to route non-emergency calls to within the 311 processes and competencies
311. Additional service Request types have and its organizational architecture to (a)
been added to suitably characterize these deal with areas of citizen concern such
calls within 311, so they may be tracked as health and safety where specialized
appropriately. expertise needs to be made available and (b)
2. Information clearing house: 311 is being develop flexibility and extensibility in the
utilized as clearing-house for resident- software, as well as the personnel, needed
relevant information. Processes have been to handle the ad-hoc information intake and
established to be able to rapidly update the dissemination that will be the requirement
311 knowledge-base and also to quickly get during a crisis.
new information to 311 operators at short 7. Integrating it with Crisis-Management Plan-
notice. ning: Once (6) has been addressed, DoT and
3. Maintaining high-level support for 311: DPS plan to actively promote the use of 311
Continuing to remind the Mayor and key in crisis-management through incorpora-
stakeholders of the City of 311 and ensuring tion into the Citywide crises-management,
sufficient DoT representation in all strategic business continuity and disaster-recovery
and any City-wide or cross-Departmental plans.
operational planning and execution. 8. Phase-out of other access to City services:
4. Raising awareness among users and stake- As 311 became established; the diverse call-
holders: Marketing it both with residents centers within the City have been merged
and internally within the City. The desire into 311 and eliminated. Listings of several
is to make sure 311 stays front and center of direct-access numbers from Government
stakeholders consciousness, and being able section of the telephone directory (the Blue
to confirm 311 penetration by incorporating Pages) have been removed and replaced by
systematic feedback mechanisms into the 311. The phasing-out of additional direct
awareness raising process. lines is in the planning stages.
5. Integrating 311 into internal Departmental 9. Building a data warehouse: The City plans
business processes: The work-order systems to create a data warehouse with 311 data
used by Departments and Divisions are being integrated with data from other call centers.
integrated with 311. A range of integration This data warehouse is an essential enabler
architectures must be designed to deal with for data-driven community policing initia-
the different paradigms by which work is tives.
allocated in different departments. A next 10. E-Gov: In the recent E-Government initia-
step will be to integrate 311 data into the tive, 311 has been identified as a foundational
performance reporting systems within each component. The E-Government initiative
department. has been prioritized by citizen-facing re-
6. Extending the capabilities of 311: The capa- quirements, which will mean that 311 will
bilities within the technical and organiza- become the point of support and assistance
tional architecture of 311 need to be extended for the electronic services delivered.

163
Adaptive IT Architecture as a Catalyst for Network Capability in Government

Generally speaking, 311 has had a positive im- currently no ad-hoc capability in 311, such
pact. All the personnel we interviewed were aware as support for online collaboration, and for
of it and encouraging with respect to its continued emergent processes. Thus, new information
and expanded use. For example, the Department to be disseminated is typically supplied
of Health expressed interest in using 311s after- through email to the call center coordinator
hours capability to extend availability of services. to be broadcast to all call center operators.
311 has helped to understand operations of other Use and support of 311 for continuous
departments in cross-over areas (such as rodent improvement in Departmental processes,
control between Health and Public Service, and including those implemented within the 311
in cross-departmental business continuity discus- system. Use of 311 metrics in continuous
sions). Interviewees have also stated that 311 has improvement: We were unable to discover
helped to systematize internal processes. what Departmental processes existed for
Issues highlighted with 311 were generally continuous improvement. However, 311
concrete and backed by considered and thought- metrics were extensively used for continuous
ful opinion. For example, Health had (a) not pro- improvement in certain departments (Public
ceeded to transfer their after-hours call center to Service and Public Utilities), but not yet in
311 because it was not currently available 24x7 others (Health).
and (b) had not transferred its normal call center Change in support of City value systems for
operations to 311 either, because of concerns that increased inter-Departmental collaboration
regular 311 operators would not be able to dissemi- as a result of 311: All the interviewed Depart-
nate health-related information because of their ments that already collaborated prior to 311
lack of medical expertise. Certain departments, and stated that they continued to do so. Few
for instance, Health and Utilities continue to use departments reported that this had changed
their separate lines. A 311 call is transferred to at a Department leadership level due to 311.
these lines, which remain active and are directly However, knowledge may be spreading at
called by service requestors. the operational levels within the City. For
Our evaluation is summarized as follows: example, Department of Public Utilities
reported that staffs knowledge of other
10. The general impression of 311 is good. 311 departments had increased due to 311.
is seen overall as a success, and is now an Changes in relationships and linkages across
established asset of the City. departments attributable to 311: Depart-
11. Progressing beyond its non-emergency call ments that typically collaborated prior to 311
center focus to evolve into an integral part (such as Health, Safety and Public Service)
of a crises-management process remains a reported a better understanding of others
challenge. processes and constraints after 311.
Increased internal collaboration within
Evaluation Indirect Impact of 311: As Departments due to 311: This was reported
aforementioned, the indirect impact of 311 was by the Department of Public Service only.
evaluated through structured interviews and the Changes in City and Departmental opera-
discussions generated during the sessions. Our tional plans after 311: The Department of
evaluation is as follows: Public Service was the only Department
reporting changes in such plans after 311.
Capability of 311 and its service architecture Use of increased visibility of intra- and
of being used in an ad-hoc manner: There is interdepartmental processes for exposing

164
Adaptive IT Architecture as a Catalyst for Network Capability in Government

and resolving accountability and coordina- 311 data into the performance reporting
tion issues within City Government: The systems within each department.
Department of Public Services reported 15. Develop the necessary capability within the
increased accountability due to visibility in 311 technical architecture, variation points
the assignment of City personnel to service within the 311 processes, and competencies
Requests. within an organizational architecture to deal
An increased ability to re-purpose resources, with the specialized areas of citizen concern
such as call-handlers and responders for such as health, safety and neighborhood
example, 911 operators switching to 311, and services. Develop the flexibility and exten-
City staff being made available for activities sibility needed to handle ad-hoc information
associated with emergency response: There intake and dissemination into 311. Establish
was discussion around this topic, but no a Disaster Recovery Plan for 311.
concrete action has been reported. 16. Integration with Crisis-Management Plan-
Enablement of more appropriately tailored ning: Once (4) has been addressed, actively
responses to crises due to 311: We were look to promote the use of 311 in crisis-man-
unable to evaluate this, although it was agement, by incorporation into the City-wide
anecdotally claimed that 311 was used to crises-management, business continuity and
tailor a response to ice storms. disaster-recovery plans.
17. Data warehouse: Create a data warehouse
Our major recommendations: with 311 data integrated with data from other
call centers. This data warehouse is an es-
12. Maintain high-level support for 311: Con- sential enabler for data-driven community
tinue to remind the Mayor and key stake- policing analysis and initiatives [Fayyad et
holders of the City of 311. Ensure sufficient al 02].
DoT representation in all strategic and any
City-wide or cross-Departmental opera-
tional planning and execution.14 Conclusion
13. Raise awareness: Actively continue to
market it both with citizens and showcase We identify the contributions from the perspec-
it internally within the City, to make sure tives of the city and from the underlying meth-
it stays front and center of stakeholders odology which is widely applicable.
consciousness. Note that while marketing
and publicity campaigns to date have man- Case Contributions: We illustrate through
aged to a lot with very little, a big failing is two projects that while crises-management gives
that they do not appear to have incorporated the environmental context to building network
systematic feedback mechanisms into the capability, a 311 system and its associated orga-
process. nizations, processes and IT components serves as
14. Integrate 311 into the internal processes of an adaptive foundation for capability development.
City Departments and Divisions: Integrate As in e-Government literature [NIMS; Punia et
311 into internal Departmental work-order al , Governance, FirstGov] the implemented 311
systems. Note that a range of integration systems played the expected roles within public
architectures must be designed to deal with safety, as follows:
the mismatches in paradigms of the 311
system and the work-order system. Integrate

165
Adaptive IT Architecture as a Catalyst for Network Capability in Government

Alleviating loads on the emergency response additional information to be collected).


system (i.e. 9-1-1) through offloading non- Selective incorporation of information cur-
emergency calls, rently provided by other call centers (specifi-
Enabling advancing community policing, cally in areas where lay CSRs can reliably
by serving as a location-based database for provide correct information). These included
reporting and identifying incident hotspots, providing directions to medical resources
and thereby facilitating the targeting of (while keeping in mind that most medical
responses, information should not be disseminated by
Being available as an established, accepted, lay operators).
and standardized resource for information Integration of 311 and other data sources
dissemination to the public. into a data warehouse. This data warehouse
will provide integrated information for data
Several 311 improvements were identified, analysis for purposes such as community
to the 311 call center, its processes supported by policing.
311, as well as the 311 application itself. These An increased availability ideally 24x7
improvements were as follows:
Methodology Contributions: Traditional
The ability to graphically rubber-band modeling techniques are hyper-rational and focus
an area of interest, and access relevant 311 models and analysis on the most efficient way
information, as well as related GIS-based to build an enterprise IT system. Yet, the most
information in additional mapping layers efficient system may not be the best performing
(such as the water resources of a selected if it ignores new externally-generated require-
area). ments, multiple stakeholder priorities, need to
Reverse-311, i.e. an ability to use 311 to make handle variation in service Requests and service
automated telephone calls and send auto- providers; and political, business and resource
mated emails to user-selectable addresses. constraints. We introduce the Adaptive Complex
Speedup in taking customer information Enterprise (ACE) architecture framework based
during the process of creating a service on patterns that guide the architecture team to
Request isolate and represent points of interactions be-
Additional reporting available on-line. tween Requests and the service provider roles that
Remote access via VPN complete the Requirements-Execution-Delivery
Ability to route calls to operators with transaction with performance that is monitored.
special capabilities such as operators that This approach not only represents the as-is but
are Somali speaking, are medically trained, also the ways in which the representation can
understand utility bills and so on. evolve. Resource agents can be dynamically as-
Direct connection between service delivery sembled into coalitions, new sub-requests can be
and 311 (such as integration with the refuse dynamically spawned and new request types can
collection truck). be added. Thus the model begins to provide the
Collection of additional information spe- representational ability and organization to imple-
cific to certain service Requests (e.g. The ment networks across existing silos. Further, with
Department of Health identified the need for the emerging Internet technologies, services that
time, date, name, address, and jurisdiction are local or remote can be assembled into coalitions
of call, and expressed a desire to involve to deliver on requests. These ACE characteristics,
their epidemiologist in the identification of we have shown through the Case projects, provide

166
Adaptive IT Architecture as a Catalyst for Network Capability in Government

the architecture team with the methodology for Agha, Gul, A. (2002) . Adaptive Middleware.
decision-making which leads to systems such Communications of the ACM, 45(6).
as 311 for triaging Requests. Furthermore, by
Arens, Yigal; and Rosenbloom, Paul. (2002).
building the 311 system to adapt to the needs of
Responding to the Unexpected, USC/Information
each Request, we build in adaptability needed for
Sciences Institute, NSF Workshop.
crisis-management type scenarios.
In summary, we believe that using triage data Ambite, Jos Luis; Giuliano, Genevieve; Gordon,
and simulation techniques [Jain 2003] to provide Peter; Decker, Stefan; Harth, Andreas; Jassar,
information needed for decision-making [Page Karanbir; Pan, Qisheng; and Wang, LanLan.
2003], and very effective crisis and overall IT- (2005). Argos: An Ontology and Web Service
enabled capability [Scholl 2003]. Composition Infrastructure for Goods Movement
Analysis, Information Sciences Institute School
of Policy, Planning, and Development, Digital
Acknowledgment Gov. Website.
Anderson, Ross (2001). Security Engineering:
We wish to acknowledge the many valuable con-
A Guide to Building Dependable Distributed
tributions from Gary Gavin, Jeff Clause, and Paul
Systems.New York: Wiley.
Carlson from the City of Columbus; Joe Bolinger,
Brett Gerke, David Landsbergen, Kelly Yakovich BPMI. Business Process Management Initiative,
and other participants of Center for Enterprise www.BPMI.org.
Transformation and Innovation.
Bauer, Johannes M. (2004). Harnessing the
Swarm: Communications Policy in an Era of Ubiq-
uitous Networks and Disruptive Technologies.
References
Communications & Strategies, 54, 2nd quarter.
Agranoff, R. and McGuire, M. (2001). Big ques- Bovens, M.; and Zouridis, S. (2002). From Street-
tions in public network management research. Level to System-Level Bureaucracies. Public
Journal of Public Administration Theory and Administration Review 62(2): 174-184.
Research 11(3), 295326.
Clements, P. et. al. (2003). Software Architecture
Alexander, C; Ishikawa, S., Silverstein, M., Jacob- in Practice, (2nd ed.) New York, NY: Addison
son, M., Fiksdahl-King, I., and Angel, S. (1977). Wesley.
A pattern Language. Oxford University Press.
CMG. Capacity Management Group
Arora, A., Ramnath, R., Ertin, E., Sinha, P. (2005).
Cross, Cross, S. et al. (2002). SEI Independent
ExScal: Elements of an Extreme Scale Wireless
Research and Development Projects, TECHNI-
Sensor Network, 11th IEEE International Con-
CAL REPORT CMU/SEI-2002-TR-023 ESC-
ference on Embedded and Real-Time Computing
TR-2002-023.
Systems and Applications, Hong Kong, China.
Child, J. (1972). Organizations, Structure, Envi-
Adams, Jonathan; Koushik, Srinivas; Vasudeva,
ronment, and Performance: The Role of Strategic
Guru; and Galambos George. (2001). Patterns for
Choice. Sociology, 6 1-22.
E-Business: A Strategy for Reuse. Mc Pr Llc,
ISBN: 1931182027. COPS 03-1. http://www.cops.usdoj.gov/txt/fact_
sheets/e01060007.txt

167
Adaptive IT Architecture as a Catalyst for Network Capability in Government

DAML. www.daml.org. The DARPA Agent Service Orchestration in Perspective. ICEC04,


Markup Language (DAML). Sixth International Conference on Electronic
Commerce Edited by: Marijn Janssen, Henk G.
Deming W. E. (1982). Out of the Crisis, Cambridge,
Sol, and Ren W. Wagenaar. Copyright ACM
MA: MIT Press.
1-58113-930-6/04/10.
Desai, Anand. (2005). Special Issue: Adaptive
Governance and Performance: New Perspectives
Complex Systems. CACM 49(5).
Washington, DC: Georgetown University Press
Digtalgovernment. Government agencies affili- pp. 263-291.
ated with dg.o, are known as the Digital Gov-
Gresov, C. (1989). Exploring Fit and Misfit with
ernment Consortium. Member agencies often
Multiple Contingencies. Administrative Science
partner with NSF research performers and the
Quarterly 34, 431-453.
private sector to leverage information technology
research and identify financial resources to help Groenlund, A. (1997). Public Computer Systems
build the Digital Government of the 21st Century. A New Focus for Information Systems Re-
www.digitalgovernment.org search. Information Infrastructure and Policy,
6, 47-65.
Donaldson, L. (1999). The Normal Science of
Structural Contingency Theory, in S.R. Alfred Tat-Hei. (July/August 2002). Reinvent-
ing Local Government and the E-government
Drazin, Robert; and Van de Van, Andrew H.
initiative. Public Administration Review, 62(4):
(1985). Alternative Forms of Fit in Contingency
434-444.
Theory. Administrative Science Quarterly, 30,
514-539. Hammer, M.; and J. Champy. (1993). Reengineer-
ing the Corporation: A Manifesto for Business
Gamma, E., R.; Helm, R. Johnson; Vlissides, J.
Revolution. New York, NY: Harper.
(1995). Design Patterns, Elements of Reuseable
Object Oriented Software. New York, NY: Ad- Holowczak, Richard D.; Soon, Ae Chun; Arti-
dison Wesley. gas, Francisco J.; and Atlurit, Vijayalakshmi.
(2003). Customized Geospatial Workflows for
Eriksson, H; and Penker, M. (2000). Business
E-Government Services, Proceedings of the
Modeling with UML: Business Patterns at Work.
IEEE/WIC International Conference on Web
New York, NY: John Wiley.
Intelligence, IEEE.
Fayyad, Usama; and Uthurusamy, Ramasamy.
Jain, Sanjay; and McLean, Chuck; (2003). Mod-
(2002). Into Evolving Data Mining Solutions for
eling and Simulation for Emergency Response,
Insights. CACM, 45,(8).
NISY Technical Report, NISTIR 7071.
Firstgov. To facilitate efforts to transform the Fed-
(ITIL) http://www.itil-officialsite.com/home/
eral Government to one that is citizen-centered,
home.asp
results-oriented, and market-based, the Office of
Management and Budget (OMB) is developing Kaplan, R. S.; and D. P. Norton. (1996). The Bal-
the Federal Enterprise Architecture (FEA), a anced Scorecard. Boston MA: Harvard.
business-based framework for Government-wide
Klijn, Erik-Hans. (1996). Analyzing and Man-
improvement. www.firstgov.gov.
aging Policy Processes in Complex Networks.
Gortmaker, Jeffrey; Janssen, Marijn; and Wage- Administration and Society, 28(1), 90-119.
naar, Ren W. (2004). The Advantages of Web

168
Adaptive IT Architecture as a Catalyst for Network Capability in Government

Kelly, S.; and Allison. M. A. (1998). The Complex- Mandelbrot, B. B. (1982). Fractal Geometry of
ity Advantage. New York, NY: McGraw Hill. Nature. New York, NY: W H Freeman.
Kling, R. et al. (2001). Transforming Coordina- MIPT. (2004). Responder Knowledge base,
tion: The Promise and Problems of Information National Technology Emergency Plan for Emer-
Technology in Coordination. In G. Olson, T. gency Response to Catastrophic Terrorism, MIPT
Malone, J.B. Smith. The Interdisciplinary Study (National Memorial Institute for the Prevention
of Coordination. Mahwah, NJ: Lawrence Erlbaum of Terrorism), April, www.rkb.mipt.org. .
Associates.
Moon, M. Jae. (2002). The Evolution of E-govern-
Warmer, Kleppe A, J.; and Bast, W. (2003). MDA ment among municipalities, Rhetoric or Reality
Explained: The Model Driven Architecture-- Public Administration Review (July / August),
Practice and Promise. New York, NY: Addison- 62:4: 424-433.
Wesley.
Morl, G. (2002). A New Mind for Policy Analysis
Lakoff, G.; and Johnson, M. (1980). Metaphors Westport CT: Praeger.
we live by. Chicago, IL: University of Chicago
NIMS. National Incident Management System,
Press.
www.fema.gov.
Laurence, P.R. and J.W. Lorsch. (1967). Orga-
OAG. Open applications group. Uses XML for
nization and Environment (Boston: Division of
every where to every where integration.
Research, Graduate School of Business Admin-
istration, Harvard University. OASIS: www.oasis-open.org, OASIS (Organiza-
tion for the Advancement of Structured Informa-
Landsbergen, D. and Wolken, G. (2001). Realizing
tion Standards) is a not-for-profit, international
the Promise: Government Information Systems
consortium that drives the development, conver-
and the Fourth Generation of Information Tech-
gence, and adoption of e-business standards
nology, Public Administration Review.
OGC: The Open Geospatial Consortium, Inc.
Longstaff, P.H. (2005). Security, Resilience,
(OGC) is a non-profit, international, voluntary
and Communication In Unpredictable Environ-
consensus standards organization that is leading
ments Such as Terrorism, Natural Disasters and
the development of standards for geospatial and
Complex Technology Program for Information
location based services. www.opengeospatial.
Resources Policy, Harvard University.
org.
Mackenzie, D. (2002). The Science of Surprise
OMG: http://www.omg.org.
- Can complexity theory help us understand the
real consequences of a convoluted event like OSI. The Open Source Initiative (OSI), a non-profit
September. DISCOVER, 23(2). corporation responsible for the management and
promotion of the Open Source Definition (OSD).
Mendonca, D., Jefferson, T., Harrald, J. (March
www.opensource.org.
,2007). Collaborative Adhocracies and Mix-and-
Match Technologies in Emergency Management. Nohria, N. (1992). Is a Network Perspective a
Communications of the ACM. Useful Way of Studying organizations? In N.
Nohria and R. G. Eccles (eds.), Networks and
Malone, T.; and K. Crowston. (2001). The Interdis-
organizations: Structure, Form and Fit (Boston:
ciplinary Study of Coordination. In Coordination
Harvard Business School Press).
Theory and Collaboration Technology, Gary M.
Olson, Thomas W.

169
Adaptive IT Architecture as a Catalyst for Network Capability in Government

OToole, Laurence and Meier, Kenneth. (2000). chapter in Adaptive Technologies and Business
Networks, Hierarchies, and Management: Mod- Integration: Social, Managerial and organizational
eling the nonlinearities, in Heinrich, C. and L. Dimensions, Publisher IDEAS.
Lynn (eds.).
Ramnath, R., Landsbergen, D. (May, 2005) IT-
Page, S. (2003). Entrepreneurial Strategies for enabled sense-and-respond strategies in complex
Managing Interagency Collaboration. Journal public organizations. Communications of the
of Public Administration Research and Theory, ACM, 48(5).
13(3), 311-340.
Ramnath, R. and Desai, A. (2007). City of Colum-
Peitgen, H.; Jurgens, H.; and Saupe, D. (1992). bus, 311 Impact Evaluation, Final Report.
Chaos and Fractals: New Frontiers of Science.
Rosetta Net. http://www.rosettanet.org/.
Berlin: Springer Verlag.
Scholl, H.J. (2003). E-government: A special case
Porter, M. E. (1998). Competitive Strategy: Tech-
of IT-enabled Business Process Change, Chapter
niques For Analyzing Industries And Competitors.
presented at the 36th Hawaiian Conference of
New York, NY: Free Press.
Systems Sciences, Hawaii.
Punia, Devendra K.; and Saxena, K. B. C. (March
Schwartz, Peter. (2003). Inevitable Surprises:
2004). E-government services and policy track:
Thinking Ahead in a Time of Turbulence. New
Managing inter-organizational workflows in
York: Gotham Books.
eGovernment services, Proceedings of the 6th
international conference on Electronic com- SCOR. http://wwwsupply-chain.org.
merce.
Teisman, G. and E.H. Klijn. (2002). Partnership
Ramanathan, J. (1999). Enterprise Integration Arrangements: Governmental Rhetoric or Gov-
with NIIIP Protocols, SME, ASME Autofact ernance Scheme? Public Administration Review,
Proceedings. 62(2), 197-205.
Ramanathan, J.; and Beswick, R. (2000). Impera- Thitart, R.A. and B. Forgues. (1995). Chaos
tive: Why Process-based Architecture is Essential Theory and Organization Science, 6(1):19-31.
for Successful Supply-Chain Participation. EAI
Salmela, H.; and Spil, T.A.M. (2002). Dynamic and
Journal.
emergent information systems strategy formula-
Ramanathan, J. (2005). Fractal Architecture for tion and implementation. International Journal
the Adaptive Complex Enterprise, Communica- of Information Management, 22, 441-460.
tions of the ACM, May.
Williamson, O. E. (1975). Markets and Hierar-
Ramanathan, J. and Ramnath, Rajiv. (2004) IT chies. New York: The Free Press.
Architecture and the Case for Lean eBusiness
Winograd, T. and Flores F. (1987). Understanding
Process Management, Knowledge Supply and
Computers and Cognition - A New Foundation
Information Logistics in Enterprises and Net-
for Design. Reading: Addison Wesley.
worked organizations, Fraunhofer-Institute for
Software and Systems Engineering ISST. TOGAF. http://www.opengroup.org/architecture/
togaf8-doc/arch/.
J Ramanathan and R. Ramnath. (2006). Co-engi-
neering Business, Information Use, and Opera- W3C. www.w3c.org. (August 2003). WSA, Web
tions Systems for IT-enabled Adaptation. Book Services Architecture. W3C working Draft 8.
WfMC. www.wfmc.org.

170
Adaptive IT Architecture as a Catalyst for Network Capability in Government

Endnotes tools and provide a common vocabulary. It


should also include a list of recommended
1
Architecture: the fundamental organization standards and compliant products that can
of a system embodied in its components, be used to implement the building blocks.
5
their relationships to each other and to the The Collaborative for Enterprise Transfor-
environment and the principles guiding its mation and Innovation (CETI) at The Ohio
design and evolution. (ANSI/IEEE Std 1471: State University has been deeply engaged
ISO/IEC 42010, http://www.iso-architecture. with Information Technology initiatives at
org/ieee-1471/index.html). We interpret the the City of Columbus. It is also a research site
components to be both organizational and for the CERCS IUCRC at Georgia Tech.
6
technology components in order to enable a A 311 system is a central, one-stop-shop
uniform system for decision-making, across for requesting non-emergency City services
all the stakeholders of the organization. (such as bulk trash pickup), reporting non-
2
An architecture framework is a tool or emergency information (such as potholes,
method which can be used for developing water leaks, and dead animals) and receiving
a broad range of different solution architec- information such as open routes to Fourth
tures. It describes a method for designing of July fireworks displays.
7
a system of organization and information An enterprise is a collection of organizations
components in terms of a set of building that has a common set of goals. An enterprise
blocks, and for showing how the building can be a government agency, a whole corpora-
blocks fit together. It should contain a set of tion or distinct organizations linked together by
tools and provide a common vocabulary. It a common problem.
should also include a list of recommended 8
Program officially began in August 2000.
standards and compliant products that can The goal of the DAML effort is to develop a
be used to implement the building blocks. language and tools to facilitate the concept of
3
Architecture: the fundamental organization the Semantic Web. Mark Greaves, DARPA
of a system embodied in its components, Program Manager for DAML.
9
their relationships to each other and to the The rapid obsolescence of static plans
environment and the principles guiding its project plans, process models, workflow
design and evolution. (ANSI/IEEE Std 1471: execution models, budgets and business
ISO/IEC 42010, http://www.iso-architecture. models is a testimony to this phenomenon.
org/ieee-1471/index.html). We interpret the For example, re-engineering efforts started
components to be both organizational and during the 90s and 00s resulted in a
technology components in order to enable a variety of different process models [Ham-
uniform system for decision-making, across mer and Champy, 1993]. However, as the
all the stakeholders of the organization. environment changed, many of the models
4
An architecture framework is a tool or became obsolete and never found their way
method which can be used for developing into practice.
10
a broad range of different solution architec- The term pattern has multiple meanings
tures. It describes a method for designing in literature. In object-oriented literature
a system of organization and information [Gamma et al, 1995] it means document-
components in terms of a set of building ing the problem solving process based on
blocks, and for showing how the building object interactions in a standardized form.
blocks fit together. It should contain a set of A generic definition of patterns in design

171
Adaptive IT Architecture as a Catalyst for Network Capability in Government

is given by Alexander (2002). Here we will improvement and measurement [Burk 1994;
use the term to mean a problem solving Demming, 1982; Jones, 2003; Kaplan 1996;
template. In complexity theory [Mandelbrot, Porter, 1998]. ACE uses customer-provider
1982], it also refers to a recursively-applied transactions that are fractals (recursive pat-
structure. terns applied in different scales) to allow
11
We use the term roles to refer to the pro- dynamic non-linear interactions between a
totypical service description that has to be non-routine Request and the resources and
delivered by any agent that performs the services used in satisfying that Request.
role. RED transaction is similar to and maps to
12
The main concept consists of the primary the concept of a transaction as discussed in
RED transaction pattern between a cus- the transactions costs literature [Williamson
tomer and provider organization. This pat- 1975] and nested transactions in Speech
tern is quite ubiquitous and is proposed in the Act Theory [Winograd 1987; Lackoff and
Speech Act Theory [Winograd, 1987]; the Johnson 1980].
13
Plan-Source-Make-Deliver process pattern Note that the agreements can be formal or
between customers and suppliers in any Sup- informal.
14
plyChain pattern [SCOR]; the Rosetta Net Perhaps 311 data could be made available
[Rosetta] for Request and delivery exchange; to candidates during mayoral campaigns.
and lastly the basis for approaches to process

172
173

Chapter VIII
Design Integrity and Enterprise
Architecture Governance
Chris Aitken
Queensland Health, Australia

Abstract

This chapter describes a design integrity framework for developing models of any entity of interest at
various levels of abstraction. The design integrity framework presented describes and defines contextual,
conceptual, logical and physical model types. The framework also defines a set of alignment attributes
for each model type and explains how these are to be used to demonstrate alignment from initial con-
cept and requirements through to actual physical implementation. These concepts are then applied in
an organisational context to identify the roles necessary to support an EA governance framework and
strong alignment from idea to implementation.

Introduction for change and flexibility is driven by changing


public expectations of government provided ser-
Operational agility is a hallmark of contemporary vices, budget constraints and rationalisation of
enterprise management in both the private and government resources. Furthermore, machinery
public sectors. Agility in the marketplace implies of government changes and whole-of-govern-
an ability to quickly and effectively undertake ment consolidation frequently require agencies to
significant controlled change at all levels within an merge, split or re-align to better meet government
enterprise. Change is increasingly a characteristic objectives and service requirements. The impact
of modern government agencies. The requirement on individual agencies may range from relatively

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Design Integrity and Enterprise Architecture Governance

minor technology-based modifications through to the enterprise architect to be confident that the
wholesale changes where the enterprise is transi- transition from current to future states occurs as
tioned to become something entirely new. intended, within any system development meth-
The requirement for change inevitably means odology (eg. Agile, XP, Waterfall) he or she must
that consideration has to be given to design integ- be sure that the necessary governance roles and
rity. Whenever we are concerned with the align- responsibilities within the enterprise have been
ment between an initial idea and the way in which identified and exercised. The second half of the
it is implemented we are dealing with the issue of chapter applies the framework in an organisational
design integrity. In a change driven environment, context, identifies governance roles and illustrates
design integrity assists us to understand whether why and at what point they are required in the
the changes undertaken are required and whether process of enterprise architecture.
they have been implemented as intended. Further-
more, such an approach reinforces modularity of
design allowing incremental change or partition- Design Integrity
ing of change initiatives in a manner that is more
likely to achieve the overall objective or outcomes. Design integrity needs to be understood at both
Clearly, design integrity is closely related to the the level of individual enterprise components
concept of governance. Governance is the ability to as well as at the broader level of the enterprise
control change within an enterprise. In this respect transition from current to future state. Enterprise
design integrity is a key enabler of governance. architectural design integrity addresses the fol-
Within the day-to-day practice of enterprise ar- lowing questions:
chitecture this relationship between governance
and design integrity is arguably even closer. Does the design of an entity satisfy a set of
This is particularly true in environments which initial requirements?
employ agile system development methodologies
(Ambler 2002, Beck 1999). Such methodologies This question relates to whether the design is
involve short iterative cycles of development and the right one given the context, constraints and
modelling, and are more likely to be successful requirements of the entity in question. It is possible
where there is attention to maintaining design to design a solution that delivers a desired outcome
integrity. A common misconception is that such but does not do so in a way that is consistent with
approaches to system development do not require the restrictions in which the component must be
high levels of rigor in modelling. This chapter will operated. For example, an application that provides
argue that in fact upfront effort in developing a the desired output but does so in a way that does
set of well referenced models greatly assists rapid not comply with legislative requirements. There-
development methodologies. fore, design integrity must assess the alignment
This chapter describes a framework for design between the requirements of the broader context
and modelling integrity. Although the framework and the characteristics of a given design.
is generic enough to be applied to the design of
any entity of interest, throughout this chapter Does a given design contain all the relevant
the framework will be applied in the context of elements of an entity?
government agencies. The framework provides
a means for describing the measures for ensuring This question highlights the need to ensure
design integrity from an initial idea through to that a design is complete. The design must ad-
its actual physical implementation. In order for equately represent all the specified aspects of

174
Design Integrity and Enterprise Architecture Governance

the entity of interest. To have integrity a design Only by considering design integrity at each
must completely represent the entity of interest. of the levels addressed by the questions listed
Alternatively, a design must be limited to only before is it possible to assess the degree to which
include those aspects that are considered to be an implemented entity is consistent with what was
in scope for the entity. This problem is at the originally intended. The following section sets
heart of the all too common phenomenon of sys- out an initial framework of definitions designed
tems or applications which provide functionality, to assist the enterprise architect to understand
typically paid for by the user, that is never used. the magnitude of a given change, which of the
Completeness however, does not necessarily mean aspects of design integrity are affected, and how
that all aspects must be represented to the same the implications might best be represented.
level of detail.
Design Integrity from Idea to
Is a given design consistent with the desired Implementation
approach or strategy?
The process of undertaking enterprise architec-
A design must also be able to be assessed for ture inevitably requires that there be some level
conformance to intent. It is possible to develop a of abstraction from physical reality. Within the
design that meets external requirements, repre- discipline of enterprise architecture, levels of
sents all aspects of the entity, but does not repre- abstraction are typically managed through the
sent the desired approach or design strategy. For development and use of models. For example,
example, it is possible that a given outcome might a value chain model might provide a high level
equally be achieved via a stand alone application overview of a set of processes, which in turn might
or by adopting a Service Oriented Architecture be the subject of more detailed process models.
(SOA) based solution involving the orchestration The use of a model enables the enterprise architect
of multiple services. However, the two approaches to represent ideas, concepts and their respective
represent fundamentally different approaches in relationships and explore the inter-dependencies
design. Therefore, design integrity must also ad- and the impact of changes to both concepts and
dress the degree to which a design can be said to their relationships.
reflect a particular desired approach to meeting Enterprise architects frequently refer to the
an initial set of requirements. terms physical, logical and conceptual models to
represent ideas at increasing levels of abstraction.
Has the design been implemented as in- By aligning models across levels of abstraction
tended? the architect is able to represent the same entity
in a way that is suitable for a variety of audi-
Design integrity also refers to the need to ences and types of analysis. A similar need for
ensure that designs and changes to designs at a alignment across levels of abstraction is evident
conceptual or logical level are accurately trans- in the discipline of Science. Table 1 illustrates
lated into physical implementation. Without a a compelling comparison of similar hierarchies
way to measure and assess this alignment it is not of abstraction found within both the positivist
possible to determine whether a given physical scientific method and the discipline of enterprise
implementation is consistent with a given design. architecture. What the comparison suggests is
Again, the design of an SOA solution can look that the need for design integrity is similar both
great on paper, only to be let down through poor for the scientist designing and conducting experi-
implementation and inconsistent adherence to ments as it is for the enterprise architect attempt-
SOA design principles.

175
Design Integrity and Enterprise Architecture Governance

ing to model and ultimately effect change in an This lack of specificity significantly limits
enterprise. In order for the scientist to be able to the architects ability to claim that the ideas or
claim that a given experiment either proves or concepts as they are modelled have in fact been
disproves a theory or hypothesis, the scientist implemented as intended or that a given logical
must be able to demonstrate alignment between design accurately reflects the original idea or
theoretical constructs, the variables representing intent. Furthermore, a not uncommon scenario
the constructs, and the measures used to measure in the authors experience is for two analysts to
change in the variables of interest. Similarly, an independently model a solution component (eg.
architect must be able to demonstrate that the a process model, a use case model) only to find
ideas contained in conceptual level models are that they are not able to be meaningfully brought
also reflected the associated logical models, and together or compared due to differences in detail,
are ultimately translated into physical level models scope or abstraction.
and implementation. A similar comparison be- Clearly, what is required is a framework which
tween the disciplines of mathematics and science defines model types and characteristics which
was famously popularised by Plya (1971) who enables the practitioner to reference lower level
suggested that although they might differ in how detailed models within higher level conceptual
they are outwardly described, the two disciplines or contextual ones. In this way the more abstract
resemble each other in the problem solving pro- models provide a frame of reference for the more
cesses they employ (ie. how practitioners think detailed models. Such a framework would greatly
about things). The framework presented in this assist developers in agile system development
chapter is a further extension of this idea. environments by allowing them to model or even
To achieve design integrity requires that the implement different solution components at dif-
terms conceptual model, logical model and ferent rates and provide some certainty that the
physical model be unambiguously defined. end product will work as in tended and remain
However, although the terms conceptual, logical true to the original concept.
and physical are frequently used within the field The comparison in Table 1 also suggests a
of enterprise architecture they are not always used definitional framework for the terms contextual,
or defined in a consistent fashion. The concepts conceptual, logical, and physical. The fol-
appear most well developed in the area of data lowing sections present a suggested framework
modelling (Tsichritzis & Klug, 1978). However, of model types to represent the various levels of
even here there are plenty of examples of a lack of abstraction.
consistent application (Simsion, 2006). Often the
terms conceptual model, logical model or high
level model are used interchangeably to mean a The Design Integrity
model with some level of abstraction. Framework

The following design integrity framework


Table 1. Comparison of levels of abstraction borrows ideas from the ANSI conceptual data
Scientific method Enterprise architecture model definition (Tsichritzis & Klug, 1978). The
<= Alignment =>

Hypothesis or theory Contextual model framework also draws heavily on ideas found in
Construct Conceptual model the following EA frameworks:
Variable Logical model
Measure Physical model Zachman framework (Zachman, 2005)
Generalised enterprise reference architec-

176
Design Integrity and Enterprise Architecture Governance

ture (Bernus, Nemes & Schmidt, 2003) contextual, conceptual, logical and physical
EA cube (Bernard, 2005). and a defined set of alignment attributes.
In the following sections each model type is
In order for the architect to achieve alignment described and a set of criteria provided to assist
from idea to implementation each model or level the practitioner in identifying the category to
of abstraction needs to be appropriately referenced which a given model belongs, and for determining
in relationship to the other levels. The framework the characteristics required of a model of a given
presented here provides definitions of each model type. It is not uncommon to encounter models
type, purpose, and relationship to other models which include characteristics of two or more of
or levels of abstraction. The framework also de- the types listed here. In these cases it is usually
scribes features of the models at each level that beneficial to deconstruct the model into two or
are required to ensure design integrity. more separate models. For example, implementa-
The framework can be applied to the design tion details might be included in a logical process
of any entity. Where the entity is an enterprise model for reasons of expediency. However, such
the model types and levels of abstraction ap- an approach means that changes in the physical
proximately correspond with the rows of the implementation model of the process (eg. work
Zachman Framework (Sowa & Zachman, 1992). instruction) are also likely to require re-work of
Furthermore, the columns of the Zachman the logical level process model (eg. procedure).
Framework suggest at least six domains in which Furthermore, such an approach does not promote
the modelling framework might be applied (ie. logical model re-use.
data, process, roles, business rules, logistics and Although consistent modelling notation is
events). Similar to the Zachman Framework the important, the most important aspect of the fol-
framework presented here is recursive and can lowing framework is that subordinate models
equally be applied to any given cell within the clearly reference themselves within their super
Zachman Framework. However, there are some ordinate or parent model type. The alignment
important differences. Firstly, whereas the cells in between models is top down as it is typically not
the Zachman Framework are loosely vertically possible to deduce a higher order model from a
related, the purpose of the design integrity frame- lower level one. This approach promotes model-
work is to provide a means of achieving strong ling modularity which means that components of
vertical alignment by referencing lower cells in a given entity or solution are able to be developed
those with higher levels of abstraction. Secondy, relatively independently of one another while
although both frameworks represent the concepts still achieving consistency and overall integrity.
contextual, conceptual, logical and physical For example, once a conceptual level model has
as rows, these concepts are differently defined in been developed it provides a frame of reference
each framework. This means that the cell contents for lower level logical models, allowing the pos-
are likely to differ between frameworks. Zach- sibility of them being developed by different
man claims to have derived the rows or views design teams, or at different iterations of an agile
within his framework from careful observation system development process. The following sec-
of design practices in other design and engineer- tions define each model type and provide a listing
ing domains. The rows or model types in the of modelling criteria which help distinguish one
framework presented in this chapter are derived model type from another.
by applying a set of strict definitions to the terms

177
Design Integrity and Enterprise Architecture Governance

Contextual Model between constructs must be consistent with exter-


(Requirements) nal constraints identified in the parent contextual
model. A conceptual model can be thought of as
Purpose: To describe requirements and external a template against which state based descriptions
related entities. The model identifies the external are subsequently mapped. A conceptual model
constraint requirements, the overall goal of the must be able to support the mapping of both
entity (ie. its purpose), and the outcomes it will current and future state logical representations.
need to achieve. A reference model is an example of a conceptual
model (eg. MacKenzie, Laskey, McCabe, Brown,
Definition: A contextual model treats the Metz, 2006). Business process and technology
entity of interest as a black box. A contextual patterns are further examples. Value chain models
model describes external entities, their relation- (Porter, 1985) are also an example of a concep-
ship to the entity of interest, and the requirements tual level model. A value chain model describes
that must be met to satisfy the relationship. It does broad sequential categories of activities within
not however, contain a description of the entity an organisation that turn inputs into value-added
itself. The IDEF0 Top-level Context diagram outputs. Note that the model typically does not
(Computer Systems Laboratory of the National describe the detailed processes of which these
Institute of Standards and Technology, 1993) is categories are comprised.
an example of a contextual model. A change in a Changes in a conceptual model are likely
contextual model is likely to require changes to to require changes in the logical models which
the conceptual models which reference it. Changes reference it. Changes at the conceptual level will
at the contextual level will represent changes to represent the introduction of new constructs and
requirements or constraints. therefore new characteristics (eg. functionality)
Modelling criteria: A contextual model will that need to be captured in any logical level de-
have the following characteristics: sign. For example, in the case of business process
modelling, changes at the conceptual level will
The entity of interest is depicted as a black represent new business functions not previously
box (ie. no description of the entity make considered as falling within the entity specifica-
up is provided); and tion. Such a change may mean that there are no
Describes only those entities external to the current state logical level process models which
entity of interest and their relationships to are able to reference the new construct and that
it. the logical process models associated with another
area in the business may now become associated
with this entity.
Conceptual model (Scope) A conceptual model provides a point of refer-
ence that allows partitioning and management
Purpose: To define the entitys construct1 do- of logical level models. This means that logical
main. models can be developed for discrete sections of
the overarching conceptual model while retain-
Definition: A conceptual model is stateless ing the correct relationship between one logical
in the sense that it is independent of current or model and another. Such an approach inherently
future state. The conceptual model is comprised promotes the principle of modularity of design.
of all the constructs and relationships required
to fully represent the entity. The relationships

178
Design Integrity and Enterprise Architecture Governance

Modelling criteria: A conceptual model will Does not introduce new constructs;
have the following characteristics: Provides a state specific description of logi-
cal components; and
Defines the domain of constructs and their Does not include implementation detail (eg.
relationships that specify the make up of the technology descriptions).
entity;
Is independent of state such that both current
and future state logical level descriptions Physical model
can be mapped to it; (Implementation)
Does not describe the entitys environment
or context; Purpose: To describe an actual physical imple-
Does not include state based descriptions; mentation and measures for a given logical de-
and scription. The physical model is the critical link
References a single parent contextual between abstract design and the real world.
model.
Description: A physical model is implementa-
tion and state specific. It describes the way in which
Logical model (Design) a given logical model will be or is implemented.
A physical model translates logical components
Purpose: To describe a design through the ap- into specific physical components, and provides
plication of entity constructs to particular states a comprehensive listing of all required physical
(ie. current or future state). A logical model components that make up the implemented entity
translates conceptual level constructs into logical (ie. a bill of materials).
components. The model selects and arranges these
components according to design principles. Modelling criteria: A physical model will
have the following characteristics:
Description: A logical model represents a
particular design strategy and the associated con- Includes implementation specific detail (eg.
figuration of logical components and relationships make, version, condition etc);
between them. A logical model is independent Does not include physical components that
of any physical implementation. A logical data cannot be mapped to a logical model com-
model (Tsichritzis & Klug, 1978) is an example of ponent; and
a logical level model. Changes in a logical model References a single (state specific) logical
will require change to the physical models which model.
may reference it. Changes at the logical level will
represent changes to the components for which
physical implementation will be required. Implementing Design Integrity

Modelling criteria: A logical model will have The previous section outlined model type defini-
the following characteristics: tions for a design integrity framework. The model
types within the framework can be used to repre-
References a single conceptual level model sent any entity at any of four levels of abstraction.
and represents all constructs within that In this section we will identify types of attributes
model; associated with each model type that are required

179
Design Integrity and Enterprise Architecture Governance

Table 2. Alignment attributes summary documented in a contextual model provide a


frame of reference for a sub-ordinate conceptual
Model type Purpose Alignment attribute type
level model.
Contextual Requirements Goal
Requirements
Conceptual Scope Objectives
Constructs Conceptual model
Logical Design Design principles and
assertions
Logical components and The first alignment attribute type within a con-
implementation criteria ceptual model are a set of documented objectives
Physical Implementation Measures which describe what the entity must achieve in
Physical components
order to satisfy the contextual level models stated
entity goal. The objectives may be stated in ab-
solute or relative terms but must be quantifiable.
to ensure design integrity from idea through to The second alignment attribute type that must be
implementation. The attribute type framework documented in a conceptual level model are the
presented here allows subordinate model types constructs contained within it. Each construct
to be correctly referenced and aligned to their within a conceptual level model must reference
parent model type. Table 2 provides a summary one or more of the contextual model requirement
listing of the attribute types for each model type. attributes. These linkages to contextual require-
The following sections describe each attribute ments provide the reason for including the
type in detail. construct as part of the conceptual model.

Contextual model Logical model

A contextual level model must contain an attri- The first alignment attribute type documented
bute or attributes that provide a description of the in a logical model are the logical components of
goal or purpose of the entity of interest (ie. the which it is comprised. Each logical component of
black box entity). Such goal alignment attributes the model must reference at least one construct
are typically referred to as the mission or vi- within the parent conceptual level model. The
sion when applied in an organisational context. full specification of any logical component also
However, it is important that the goal alignment includes a description of implementation criteria.
attribute does not describe anything internal to These criteria (eg. performance criteria) describe
the entity (eg. internal processes, roles, strategies). in an implementation neutral way, the criteria any
A contextual model must also specify a complete given physical component must satisfy to be said
listing of requirements. This alignment attribute to implement the logical level design. For example,
type includes outcomes the entity must achieve in a logical model where the design principle of
or provide, constraints within which it must be efficiency has been applied the implementation
implemented, or other externally driven speci- criteria for logical components might include a cost
fications. The listing of requirements is derived criteria. This would most likely be a comparative
from consideration of each external entity and measure in terms of throughput or other relevant
the requirements of the relationship between it characteristic of the model. The development of
and the entity of interest. Together both the goal the implementation criteria requires careful con-
and requirements alignment attribute types when sideration to ensure that there is not a mismatch

180
Design Integrity and Enterprise Architecture Governance

later on between the demands of the logical design The second alignment attribute type that a
and the ability of the physical implementation to physical model should include are measures.
support it. Each measure documented within the model must
The logical level models are primarily con- reference one or more of the design principles
cerned with design. Therefore, the second align- and associated assertions in the parent logical
ment attribute type to be documented within a model. The alignment between measures and
logical model are a set of design principles and an design principles is discussed further in the fol-
associated set of assertions. The design principles lowing section.
indicate the design approach or design strategy
to be adopted (eg. the principle of modularity of
design, the principle of re-use of components, or Using the design integrity
the principle of limiting unnecessary variation). framework
Each design principle should reference one or more
objectives within the parent conceptual model. This section briefly outlines how the design
This provides the level of justification for adopting integrity framework covered in previous sec-
a given design principle. Each principle should also tions might be used within the broader process
be associated with one or more assertions. The of enterprise architecture. A well aligned set
assertions are statements which can be answered of models that translate a set of requirements
affirmatively if a given principle has been applied through to physical implementation represents a
to a given model. For example, an assertion for thorough description and decomposition of a given
the principle of modularity of design might be entity. A fully specified set of models allows the
that components should be able to be replaced by enterprise architect to powerfully demonstrate
alternative components without compromising the that they have correctly understood the business
operation of the entity. Alternatively, the design context, concepts and requirements. Such a set
principle of maximising performance speed ap- also allows the architect to describe the design
plied to a logical data model could be evidenced strategy or approach adopted with respect to
by the assertion that the model represented the business concepts, and how this strategy will be
minimum number of logical data table lookups translated into a tangible implementation.
required per logical transaction. Figure 1 illustrates the capacity of the de-
sign integrity framework to provide a means to
reference and align models of varying levels of
Physical model abstraction. This allows the enterprise architect
to possibly compartmentalise the development
The physical components within a physical level of lower order models. For example, in Figure 1
model provide the first alignment attribute type. several implementation models (eg. Physical 1 (b))
The full specification of the physical components might be evaluated against the implementation
documented in the model must include an exact criteria and design assertions in a higher order
description of the technology to be implemented logical model (eg. Logical 1 (b)). Figure 1 also
(eg. brand, model, version etc). Each physical com- highlights the ability of the framework to capture
ponent must reference one or more of the logical and reference changes in logical design between
level components in the parent logical model, and current and future states of an entity with refer-
satisfy the implementation criteria documented ence to a single conceptual parent model.
in the relevant logical component.

181
Design Integrity and Enterprise Architecture Governance

Figure 1. Referencing across levels of abstraction

182
Design Integrity and Enterprise Architecture Governance

Design integrity also provides a means for Performance assessment


the effect of changes to a design to be evaluated.
Furthermore, design integrity allows the com- The design integrity framework presented in
pleteness of modelled entities to be tested and in previous sections provides a means to assess
this way also assess whether all relevant aspects performance at the following four levels of ab-
of a design or concept have been captured. The straction
following section examines some of these issues
further. Contextual: Whether the entity as imple-
mented supports the overall goal.
Conceptual: Whether the entity achieves
Choosing measures its objectives.
Logical: Whether the entity has been de-
The alignment attribute type framework outlined signed according to a particular strategy or
previously provides a means to measure align- design principle.
ment at all levels of abstraction. However, the Physical: Whether the entity meets particu-
framework is dependent on the appropriateness lar implementation criteria.
of the measures included in the physical level
model. Careful consideration should be given to At the contextual level all measures within the
the selection of these measures in terms of: physical model are ultimately a measure of the
fit between implementation and the entity goal.
The purpose of the measure. Measures At this level the measures can be considered to
should be designed and selected on the basis represent a type of entity profile. The degree to
of their ability to test the design principle which one implementation of the entity meets this
assertions documented in the logical model. goal compared to another can be determined by
There need not be a one-to-one relationship a comparison of measurement profiles.
between measures and design principles, At the conceptual level measures will relate to
as some measures may be more global and specific objectives and provide a global measure of
provide overall feedback about a number the extent to which the objective has been achieved
of principles. Conversely, a single design by the entity as implemented. At this level it is
principle may be measured using a number of possible to compare implementations of a given
measures. The key point is that the measures entity in terms of their ability to satisfy the enti-
need to be designed and selected ahead of ties objectives (eg. comparison of the ability of
time on the basis of their ability to provide current and future state implementations to meet
information about the implementation of a the same set of objectives).
given design principle (ie. their construct In order to assess the performance of a logical
validity2). design we must be able to identify the separate
Performance. Measures that do not at- contributions of design and physical implementa-
tract a performance cost should be chosen tion to overall performance. Where designs are
in preference to those that do. This usu- implemented using the same number and type
ally means selecting as a first choice those of physical components, any improvement in
measures which are provided as a natural performance3 can be attributed to differences in
consequence of the operation of the imple- design. Where the same physical components are
mented entity. not used the contribution of design differences
becomes more difficult to determine. However,

183
Design Integrity and Enterprise Architecture Governance

within the alignment attribute type framework Figure 2. Gap analysis across levels of abstrac-
outlined previously, the measures in the physi- tion
cal model are designed to measure application
of design principles or strategies. They therefore
provide a means to evaluate the effect of changes
in design. However, their ability to provide this
measure is dependent on their construct validity.
Construct validity is a concept borrowed from the
social sciences. It describes the ability of a measure
to reflect changes in a concept or construct. Con-
struct validity is usually determined through the
application of explicit logical argument regarding
what is understood about the mechanisms thought
to underpin the construct, and the comparison (or
correlation) of the measure with other measures
also thought to be related to the construct. Usu-
ally for logical design models this determination
is readily made with respect to design principles.
However, there may be occasions where the re-
lationship between selected physical measures
and the relevant design principle may need to be
tested and evaluated before including it in the
physical model.
At the physical level measures are concerned
with determining whether individual physical
components meet or exceed the implementation
criteria specified in the parent logical model
components.

Gap analysis

Gaps may exist in all models at the various levels


of the design integrity framework. As illustrated
in Figure 2 4 there may be contextual level require-
ments for which no conceptual constructs exist,
or conceptual constructs for which there are no
logical or physical level mappings. Each one of
these situations highlights a significant lack of
alignment or gap in the design integrity of the
entity of interest. Experience has shown that an
analysis of gaps across all four levels of abstrac-
tion usually results in the identification of fruitful
insights or new aspects of the entity of interest.

184
Design Integrity and Enterprise Architecture Governance

Therefore, it is recommended that a thorough gap levels of abstraction. Changes at the contextual
analysis is conducted. or conceptual levels will typically represent large
Gaps at the contextual, conceptual, logical or wholesale changes to the purpose or constructs
physical levels should be resolved before moving by which the entity of interest is represented or
to actual implementation. A gap at the contextual identified. Within the government agency context
level may mean that there is a mismatch in scope these changes are typical of machinery of govern-
between the contextual level requirements and ment changes where whole departments may be
conceptual model. This suggests that there are ex- created, abandoned or merged. Conceptual level
ternal entities and relationships that the conceptual changes are represented by those situations in
model does not address. In this situation either which functionality is moved from one agency
the contextual level model external entities need to another to better meet the needs of the public.
to be deemed out of scope by the project sponsor Contextual level changes represent those situa-
(or similar role) or the conceptual model needs tions where the agency acquires new customers
to be revised to satisfy the additional contextual and an associated set of new requirements. The
level requirements. Alternatively, there may be consequences of these changes can be mapped to
conceptual constructs which do not map to any current logical level and associated physical level
contextual level requirements. This suggests pos- models. From this mapping the extent of any gaps
sible missing external entities in the contextual can be identified. This analysis then allows some
model or unnecessary constructs within the con- understanding of the consequences of the changes
ceptual model. Finally there may be conceptual in terms of physical implementation (eg. costs,
level objectives which do not relate to the entity training, personnel, information systems).
goal. This suggests that there is a mismatch be- Changes at the logical level will represent
tween the overall purpose of the entity and the changes in design strategy or approach. Again,
conceptual model thought to support it. the impact of these changes can be understood by
A gap at the conceptual level means that there determining the ability of existing physical models
are conceptual constructs or objectives for which to support the design change, and identifying and
there are no logical level components or design quantifying the gaps where the current physical
principles. Or alternatively logical level compo- model is unable to support or accommodate the
nents or design principles which do not relate to any change. The design level change can also be as-
conceptual level construct or objective. This situ- sessed in terms of its ability to support the con-
ation suggests either an incomplete logical model, ceptual level objectives and the entitys context
or unnecessary logical level components. level purpose. From the perspective of an indi-
A gap at the physical level suggests that either vidual government agency, logical level change
the implementation contains physical components is typical of internal re-structuring initiatives.
that are not specified in the design, or that the Here the requirements and overall functionally
physical implementation will be incomplete. are likely to remain the same whereas the internal
configuration of resources, roles and processes
are likely to change significantly to align with a
Impact analysis new strategic approach.
The design integrity framework also allows for
Impact analysis is concerned with understanding a more holistic understanding of the consequences
the consequences of change. The design integrity of changes at the physical implementation level.
framework presented in this chapter allows im- Using the measures in the physical model, changes
pact analysis to be conducted at each of the four at this level can be assessed in terms of their

185
Design Integrity and Enterprise Architecture Governance

overall impact on the entity goal and objectives. The Enterprise Architecture
Changes at this level usually reflect changes in Steering Committee
technology or personnel.
Most government agencies that have an enterprise
architecture program will have a committee or
Governance roles board which oversees the implementation of the
program and its initiatives. The level of influence
This section adds to the design integrity frame- the committee has will vary depending on the
work by introducing a set of governance roles. This maturity of the organisation and its enterprise
section does not provide a complete enterprise architecture program. In a mature enterprise the
architecture governance framework, however it committee will include its most senior executive
does provide a description of the key roles and managers. In less mature organisations the com-
the levels at which these are important within the mittee is likely to sit within the IT section and be
overall governance process and across levels of chaired by the CIO or CTO. Irrespective of the level
abstraction. For a comprehensive treatment of IT of maturity every enterprise architecture program
governance frameworks and approaches the reader will require such a committee as it forms the point
is referred to Weill & Ross (2004) and Betz (2006). of accountability for program decision making.
Each role described here has a unique contribu- Most committees of this type soon discover that it
tion to the governance over the implementation of is not possible to exercise all aspects of enterprise
the models within the framework. The roles are architecture governance. This is particularly so
described at a conceptual level (ie. do not include at the contextual and conceptual levels where the
design or implementation detail). Therefore, in decision making typically has nothing to do with
reality there may be many positions within a given technology. Most committees require instead that
organisation which might fulfil these roles. Table evidence be provided of verification by business
3 illustrates the alignment between role and level representatives of contextual or conceptual issues.
of abstraction or model type. It also highlights the The discussion in the following sections assumes
key model attributes that each role is responsible the existence of a committee such as the Enterprise
to define or approve. Table 3 provides the enter- Architecture Steering Committee or similar.
prise architect with a conceptual framework for
categorising actual roles and stakeholders for a
given context.

Table 3. Governance roles

Model type Purpose Alignment attribute type Governance role


Contextual Requirements Goal Customer
Requirements
Conceptual Scope Objectives Sponsor
Constructs
Logical Design Design principles and assertions Designer
Logical components and implementation criteria
Physical Implementation Measures Implementer
Physical components

186
Design Integrity and Enterprise Architecture Governance

The design integrity the governance process in any number of ways.


governance roles For example, the Enterprise Architecture Steering
Committee may include customer representatives
It is important to realise that the roles listed, within its membership. Alternatively, in the private
although similar, are not the same as the roles sector shareholders exercise a gross contextual
associated with the horizontal views within the level governance at a corporations AGM. Simi-
Zachman Framework. The purpose of the roles larly, within the public sector governance is exer-
listed in Table 3 is to reinforce strong alignment cised by the community through public forums,
between levels of abstraction within the design submissions and ultimately their vote at election
integrity framework. The roles are described in time. For smaller internal change initiatives the
a generic or logical sense in terms of the vari- customer role may be fulfilled by a functional area
ous aspects of the design integrity framework to situated within an agency. Obviously however,
which they apply. The actual positions within it is sometimes not possible for the customer to
an enterprise which might fulfil the roles will be provide direct governance. Nevertheless, in these
determined by the nature of the entity of interest. situations there are a variety of customer feed-
Although most if not all the models within the de- back mechanisms (eg. questionnaires, complaints
sign integrity framework will be developed by the processes) that might be deployed or accessed by
enterprise architect, each model will have specific the enterprise architect to ensure that the require-
governance requirements that must be met before ments are sufficiently described and validated.
the architect can be sure that proper governance Irrespective of the level of direct involvement of
has been exercised. Each role and its responsibili- the customer the enterprise architect will need
ties are discussed in detail as follows. to demonstrate adequate validation of the goal
statements and requirements described in the
contextual model. This may require the architect
Customer to work with consumer or customer groups or
stakeholders to specifically identify the goals and
Purpose: To identify the purpose and require- requirements. It is typically the validation of goal
ments to be met by the entity. and requirements statements that is provided to
the Enterprise Architecture Steering Committee
Responsibilities: To approve the goal state- for endorsement. Not providing sufficient priority
ment and requirements as documented within the to this role or opportunity for it to exercise gov-
contextual model. ernance frequently leads to the all too common
scenario where solutions are identified well before
Actor: This role represents any external stake- for the problem is fully understood.
holder or recipient of the services or outputs from
the entity of interest.
Within the design integrity framework the role Sponsor
of customer is responsible for clearly articulating
and determining the purpose and requirements Purpose: To set the objectives to be achieved by
of the entity of interest. The concept of customer the entity of interest, and to identify the scope and
might equally apply to an agency CEO or alterna- constructs to be defined within the entity.
tively service recipients or citizens in the wider
public depending on the nature of the entity of
interest. Customers might be directly involved in

187
Design Integrity and Enterprise Architecture Governance

Responsibilities: To approve the objectives All too often this results in siloed initiatives that
and constructs as documented within the con- are not well designed to support the wider context
ceptual level model. or purpose they are intended to achieve.
The designer role will determine from the
Actor: Any position which has the ability to logical and physical level models, a program of
initiate change to the entity of interest in response work to be completed to transition the entity from
to changes in purpose or requirements. current to future state. The Enterprise Architec-
In practice this role is usually fulfilled by a ture Steering Committee oversees and monitors
senior position within an organisation. Nonethe- progress with this program of work.
less, any position can potentially fulfil this role
where the position is responsible for defining the
scope and objectives of the entity of interest. The Implementer
development of objectives and definition of the
constructs may in reality fall to the enterprise ar- Purpose: To instantiate the physical model.
chitect working in collaboration with the sponsor.
However, the sponsors approval of the objectives Responsibilities: To provide or report
and constructs should probably be presented to measures as defined in the physical model. To
the Enterprise Architecture Steering Committee ensure that physical components selected meet
prior to design work commencing. the relevant logical component implementation
criteria.

Designer Actor: Any position responsible for imple-


menting a design (eg. project manager, builder).
Purpose: To identify the design to be adopted to There is an important hand-off between the
meet the stated objectives. Designer and the Implementer. The hand-off
needs to include the logical model component
Responsibilities: To approve the logical model implementation criteria. For a more detailed
design principles and assertions. To approve the treatment of this issue the reader is referred to
logical model components and implementation Phase G Implementation Governance of The
criteria. Open Group Architecture Framework (The Open
Group, 2006) .
Actor: Any position responsible for design Although the Designer might determine which
(eg. Enterprise architect, business planner, en- projects are required, it is not the role of Designer
gineer) to undertake individual projects. The build process
The enterprise architect is employed within should be the responsibility of the Implementer.
most organisations to act as an authority on what Ideally there should be very few design decisions
constitutes good design. It is therefore, the role left to the Implementer. The physical level model
of the architect to provide approval of the design can be used to provide a bill of materials to the
selection. The level of maturity of the organisa- Implementer. The implementation criteria for each
tion and its enterprise architecture program will component within the logical level model can also
determine the extent to which this is actually be used to provide guidance to the Implementer
where the accountability for design decisions will where there are a number of alternative physical
sit. In less mature organisations some or all of this components that might equally be deployed. In
responsibility will be subsumed by the sponsor. practice the development of the physical model

188
Design Integrity and Enterprise Architecture Governance

is likely to be a joint collaboration between the ologies for undertaking enterprise architecture
enterprise architect and the relevant project based on experiment and observation, and easier
managers. integration or collaboration with disciplines such
While it is common to have a Program Delivery as organisational psychology.
Committee or Board to oversee the coordination The final section in this chapter has attempted
and implementation of a portfolio of projects, it is to identify the organisational roles required to
the role of the Enterprise Architecture Steering implement the framework. The roles are discussed
Committee to see that the hand-off between en- with reference to contemporary enterprises and
terprise architect and project manager occurs and government agencies in particular. By defining
to track project completion in order to determine governance roles for each level of abstraction the
the status of transition. The implementer role has framework provides a means for realising strong
responsibility for providing the measurements alignment between layers necessary to ensure ac-
as specified in the physical model which allow curate translation from idea to implementation.
implementation to be tracked, and verification
that the logical model and its design principles
has been accurately implemented. References

Ambler, S. W. (2002). Agile Modeling: Effective


Conclusion Practices for Extreme Programming and the
Unified Process. New York, New York: John
This chapter has outlined a design integrity frame- Wiley & Sons.
work which allows the enterprise architecture
Beck, K. (1999). Extreme Programming Ex-
practitioner to readily identify a range of models
plained: Embrace Change. Boston: Addison-
required to fully describe and represent any entity
Wesley Professional.
of interest. The framework is centred around a
set of definitions of four levels of abstraction. Bernard, S, A. (2005). An Introduction To Enter-
These definitions together with a set of defined prise Architecture: Second Edition. Bloomington,
alignment attributes provide a means for ensuring Indiana: AuthorHouse.
strong alignment between initial idea through to
Bernus, P., Nemes, L., & Schmidt, G, (Eds.).
actual physical implementation.
(2003). Handbook on Enterprise Architecture.
The design integrity framework has been
Berlin : Springer.
developed using the scientific method rather than
the construction industry as the underlying Betz, C. T. (2006). Architecture and Patterns for
analogy or metaphore. Adopting such an analogy IT Service Management, Resource Planning, and
poses some interesting questions for the future Governance: Making Shoes for the Cobblers Chil-
maturity of the discipline of enterprise architec- dren. San Francisco, CA: Morgan Kaufmann.
ture. The adoption of a scientific paradigm would
Computer Systems Laboratory of the National
represent a similar shift as the adoption of Six
Institute of Standards and Technology. (1993).
Sigma (Pande & Holpp, 2002) was for the field
FIPS Publication 183.
of process improvement. The author believes that
such an approach might represent a significant step MacKenzie, C.M., Laskey, K., McCabe, F., Brown,
away from the dominant and possibly too rigid P. F., & Metz, R. (2006). Reference Model for Ser-
engineering and construction industry paradigm. vice Oriented Architecture 1.0, OASIS Committee
Such a shift suggests new processes or method- Specification. OASIS Open 2005-2006.

189
Design Integrity and Enterprise Architecture Governance

Pande, P., & Holpp L. (2006) What is Six Sigma?, Weill, P., & Ross, J. (2004). IT Governance: How
New York, NY: McGraw-Hill. Top Performers Manage IT Decision Rights for
Superior Results. Boston, Massachusetts: Harvard
Plya, G. (1971). How to Solve it: A New Aspect of
Business School Press.
Mathematical Method. Princeton, NJ: Princeton
University Press. Zachman, J. A. (2005). The Zachman Frame-
work for Enterprise Architecture: A Primer for
Porter, M. (1985). Competitive Advantage: Creat-
Enterprise Engineering and Manufacturing.
ing and Sustaining Superior Performance. New
Zachman International, www.ZachmanInterna-
York, NY: The Free Press.
tional.com.
Simsion, G. (2006). Conceptual, Logical, Physi-
cal: Clearing the Confusion. The Data Adminis-
tration Newsletter, No. 36. Robert S. Seiner.
Endnotes
The Open Group, The Open Group Architecture
Framework. (2006) , Version 8.1.1, Enterprise
1
Definition: an image, idea, or theory, esp. a
Edition. complex one formed from a number of sim-
pler elements. Random House Unabridged
Tsichritzis, D., & Klug, A. (Eds.). (1978). The
Dictionary.
ANSI/XWSPARC DBMS framework report of the

2
This term is defined in the following sec-
study group on database management systems.
tion.
Information Systems, 3(3), 173-191. 3
In this discussion the word performance is
used in its most general sense.
4
Coloured elements represent potential gaps
in the logic of the models

190
191

Chapter IX
Policy Mapping:
Relating Enterprise
Architecture to Policy Goals

Dwight V. Toavs
National Defense University, USA

Abstract

Few government executives can explain the enterprise architecture of his or her agency, and it is rare to
find a political executive who is able to explain how their political objectives are furthered by a govern-
ment-wide enterprise architecture (Holmes, 2007). This low level of awareness translates to enterprise
architecture efforts that are often undervalued and under funded because the budget priorities of political
and functional executives rarely include enterprise architecture. Unsurprisingly, many points of tension
exist as the CIOs and architects work to translate political goals into resources and architectural plans
supporting the agencys programs. This tension, between the rational orientation of enterprise archi-
tecture advocated by the CIO and the political nature of policy goals sought by executives, often puts a
CIO at odds with his or her organizations political and functional executives. This chapter discusses
that tension, and advocates that CIOs and enterprise architects develop a Policy Map to bridge the
gap between the political and the rational perspectives. A policy map provides the Purpose Reference
Model missing from present architecture models and policies, and visually portrays and communicates
key relationships between policy goals and functional programs on the one hand, and the enterprise
architecture and its implementing IT initiatives on the other hand. A well-crafted Policy Map is a visual
reference for aligning resources, effort, architecture, and the policy goals of political executives.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Policy Mapping

PARADOX OF GOVERNMENT political goals. They are established to serve po-


ORGANIZATIONS litical purposes and address societal challenges
that have been defined and justified in political
We spend most of our lives in organizations. terms, challenges such as reducing illiteracy, im-
Although we rarely think about it, the formal proving air and water quality, or providing a level
organizations with which we are familiar are playing field for businesses seeking to sell their
abstract concepts. We see the building and think goods and services to government organizations.
of the organization; we see the people and think In working to fulfill political goals, government
of the organization. Despite the physical evidence, organizations are clearly political in character, yet
the notion of the organization exists primarily in in pursuing these political goals through rational
our minds. At this conceptual level organizations organizational actions they are rational in nature
are created and exist in order to serve specific and instrumental in pursuing their purpose. This
purposes that is, they are instrumental entities. dual nature of government organizations, that
Typically these purposes are defined by the is, an organization that simultaneously serves a
organizations leaders, individuals who may be political purpose (has a political face) as well
the organizations creators, its owners, or perhaps as a rational purpose (has a rational face) cre-
its managers. For example, businesses are cre- ates an organizational paradox and a signifi-
ated by an individual or a group of individuals cant challenge for enterprise architects and the
with an idea, a product they wish to sell, or a CIOs as they try to implement their enterprise
service they wish to offer. These organizations architectures. This chapter encourages CIOs and
are instrumental in helping fulfill the intent of enterprise architects to create a Policy Map for
their creators. Business organizations use rational their organizations to help resolve this organiza-
approaches in the conduct of their activities, that tional paradox. Your Policy Map can effectively
is, approaches based on reasoning that produce serve as the Purpose Reference Model for your
goods and services as efficiently and effectively enterprise architecture, and serve to relate politi-
as possible. Therefore, it would be rational for cal goals to rational organizational activities with
the business owners to expect a profit from their the goal of educating political and functional
endeavors, and to run their business organization executives, congressional overseers, managers
as effectively as they reasonably can. They may and technical specialists, and citizens.
even create and implement an enterprise architec-
ture, one of the latest rational and comprehensive Organizational Faces
approaches to structuring efficient and effective
organizational action. Depending upon where you are within the organi-
Government organizations are simultaneously zation you may see one or the other of the faces
similar to and yet different from the generic busi- of government organizations. For example, legisla-
ness organization noted previously. Government tors, parliamentarians, elected and appointed po-
and business organizations are similar in that gov- litical executives devote most of their attention to
ernment organizations also seek to perform their the political face of government organizations.
missions or fulfill their goals as effectively and This perspective views organizations as politi-
efficiently as they can in this respect government cal and instrumental in nature, as mechanisms
organizations are also instrumentally rational. But for turning political ideas into societal realities.1
government and business organizations differ in The political face of a government organization
that government organizations are established is turned toward society, and exhibits its organi-
through a political process that seeks to satisfy zational strengths and capabilities as resources to

192
Policy Mapping

address societal problems and achieve politically and Straussman, 1990). Simultaneously these
defined societal goals. As a result the public typi- organizations are expected to apply their capa-
cally sees the political face of the government bilities and resources in a rational and objective
organization, such as when they need assistance manner to perform their missions, be they to
in recovering from a disaster; when they seek to rescue the victims of disasters, to restore some
qualify for some entitlement program; or when semblance of public order in the affected com-
they are dissatisfied with the actions or decisions of munities, or to stimulate the economic recovery
an agency and seek to affix blame. Never far from of the area. A failure to live up to this model of
this political view of government organizations citizens expectations results in harsh criti-
are issues of competence and trust; of political cism. Critiques of government organizations in
promises and citizens hopes and dreams; and of the wake of the September 11, 2001 attacks on
our individual and collective ideas for a desirable New York and Washington, D.C. demonstrate
and democratic society. the imprint of political authority on government
Functional executives, managers, IT profes- organizations, and the need to affix blame when
sionals and enterprise architects see the inter- things go wrong. Comptroller General of the
nal face of the organization and thus view the U.S. David Walker (GAO, 2002) noted that the
government organization quite differently. These government organizations under scrutiny had
professionals constitute the rational face of gov- been established in a very different era to solve
ernment as they perform the assigned missions a rather different set of societal problems. Upon
and seek to achieve the goals of their agencies. the logic of this argument legislators justified
From this rational perspective, the organization the need to create the Department of Homeland
is a purposeful entity with people and processes Security (DHS) in response to this new societal
designed to carry out the assigned mission, imple- need. The DHS new composite form aggregated
ment policies, and deliver desired results. Action capabilities from twenty-two previously existing
oriented, this view of government organizations is government agencies to address the homeland
focused on the rationality and objectivity needed security threat. Yet when Hurricane Katrina dev-
to produce organizational results efficiently and astated the Gulf coast of the U.S. in August 2005,
effectively. The government organization, from the inadequate response from the Department of
this point of view, is an instrumental organization. Homeland Security brought an immediate and
As one would expect, this face is turned inward blistering critique.
on the organization, and focuses on managerial Government organizations, departments,
concerns such as acquiring resources and creating agencies, or bureaus, are assigned responsibility
organizational results through its money, people, for implementing the policy pronouncements of
processes, techniques, and technologies. political leaders, policies which may be either
The paradox of governmental organizations substantive or procedural in nature. Substantive
arises from these seemingly contradictory states, policies outline the what of public policy, the
where the organization is simultaneously a politi- goals and challenges in society that are being ad-
cal entity and yet is an objectively rational entity. dressed. Implementation or procedural policies
Government organizations are creatures of the provide the how of public policy, and focus on
political system, brought into being by political translating political goals into organizational re-
processes, and intended to solve societal problems sponsibilities and guidance to organizational lead-
that have been defined through the political pro- ers and functional experts. Policies are translated
cess. In this way government organizations bear into the functional programs and the resources
the deep imprint of political authority (Bozeman used by managers to create desired organiza-

193
Policy Mapping

tional outcomes. CIOs marshal the organizations integral IT support (Toavs, 2004). Early research
information technology (IT) resources and ca- in information systems focused on technical
pabilities to support these functional programs. or systems architecture approaches (Zachman,
Organizational effectiveness, and a programs 1987). Eventually functional stove-piping, cost,
ability to deliver results can thus be evaluated and duplication in program support arrangements
from two very different points of view, one of led to demands for increased use of organization-
them substantive in nature and the other focused wide information technology (Sowa & Zachman,
on procedural concerns. Political executives in 1992) to promote efficiency and effectiveness in
government departments and agencies typically organizations (Gore, 1993). By the mid-1990s
focus on political utility, that is, the ability of process reengineering was a new skill requirement
the organization and its programs to achieve the in IT organizations (Hammer & Champy, 1994),
substantive and politically desired goals of the and new approaches to managing information
administration to which they owe allegiance. focused on innovation (Davenport, 1992) and
Career executives and managers of functional improving the processes central to functional
operations in organizations, on the other hand, programs. Additional efficiency and productivity
are focused on rational goals and the procedural gains could be achieved, it was believed, by craft-
concerns necessary to achieve results attentive ing an enterprise-wide architecture for holistic
to cost, schedule, performance and reliability management of an organizations information
concerns the focus of contemporary manage- systems (Spewak, 1993). Building on these efforts,
ment. And while each of these perspectives is advocates of enterprise architectures convinced
equally valid, it should be emphasized that they political leaders that architectures could deliver
originate from and are justified in vastly different additional efficiency and effectiveness gains
terms. The challenge comes in trying to rectify by eliminating arbitrary program boundaries,
the differing perspectives where the enterprise stovepipes, and organizational barriers. In 1996
architecture is concerned. all these innovations became agency requirements
by their inclusion in the Information Technology
Management Reform Act of 1996, later renamed
ENTERPRISE ARCHITECTURE the Clinger-Cohen Act of 1996, Public Law 104-
ENTERS GOVERNMENT 106, in honor of its legislative sponsors. This
substantive policy required agencies to implement
Information technology was introduced into the enterprise architectures; they proceeded with
US Federal government through two venues, caution as little in the way of implementation
first as number-crunchers for agency financial or procedural policy guidance was available or
managers, and later to support functionally-ori- provided to agencies.
ented programs. Functional programs initially The notion of enterprise architecture in
acquired their own unique IT support systems, government was positively advanced by the
a process that simultaneously grew increasingly government reform initiatives launched by the
expensive and opaque to congressional overseers Bush administration in 2001. Rather than pursu-
(Commission on Federal Paperwork, 1977). As ing management reforms based on a legislative
information technology became increasingly agenda or on the recommendations of an expert
ubiquitous it was obvious that the tipping point commission, the Bush administration intended to
was approaching; by approximately 1986, agency implement a management reform agenda within
programs were so reliant on information technol- the framework of existing legislation and policy.
ogy they could no longer function without their Electronic government was envisioned as the

194
Policy Mapping

delivery mechanism, and enterprise architectures rent FEA Reference Model is shown at Figure 1
established the conceptual framework for efficient (OMB, 2007b).
and effective service delivery. (Toavs, 2004, p. The notion of enterprise architecture is a
299). The administrations e-government efforts relatively recent innovation in thinking about
began with an interagency task force (OMB, organizations and government functions. Viewing
2001) of knowledgeable individuals drawn from a an entire sovereign government as an enterprise,
wide representation of agencies. As the e-govern- that is, the concept of a government-wide archi-
ment strategy evolved and candidate initiatives tecture is even more recent, and arises principally
identified, it became apparent that significant from the literature of disciplines associated with
redundancies existed. In addition to the obvious information technology, business, and man-
redundancies across agencies, existing enterprise agement. Enterprise architecture concepts and
architecture efforts made few if any provisions practices are motivated primarily by the search
for inter-agency activities such as resource shar- for lower costs and additional profits through
ing or information transfer (OMB, 2002). These increased business efficiency and effectiveness.
insights led to developing an overarching Federal Traditionally the study of government organiza-
Enterprise Architecture (FEA) to which each of tions was informed by older and well established
the agency enterprise architectures would relate. disciplinary perspectives such as organizational
As noted in the Federal Enterprise Architecture theory, political theory, and public administration.
home page, development of the FEA began in These traditional voices are notably absent from
early 2002 and refinement of the architectural con- the discussion of enterprise architecture. Public
cepts, guidance and tools continues today (OMB, administration and political science, the principal
2007a). The development and evolution of both disciplines focusing on government, have largely
substantive and procedural policies for the Federal ignored the potent effects of information technol-
Enterprise Architecture and its implementation in ogy (Toavs, 2004, p. 36) and enterprise and gov-
agencies has continued as conceptual knowledge ernment-wide architectures. Rather, researchers
and practical experience have advanced. The cur- in these disciplines appear to have narrowed their

Figure 1. Federal enterprise architecture reference model (OMB, 2007b)

195
Policy Mapping

investigations to less-technical treatments such as Your policy map is a visual depiction of your
transforming government via e-government. Top- organizations charter - what your organization is
ics such as the underlying structure or architecture charged with doing and why. It should show politi-
of the organization and its information-technology cal goals and expectations on the one hand, and
enabled capabilities are not often researched and the relationships to parts of the agencys rational
consequently not well understood in many parts enterprise architecture and implementation plans,
of academia that study organizations. For example thus describing the connection between purpose,
a text search conducted in July 2007 for the term rationale, and instrument. A policy map such as
enterprise architecture in the database of Public this provides a number of instant benefits: first,
Administration Review articles for the past seven and foremost, a policy map is explicit, giving
and one-half years (2000 to the present) resulted reality to substantive legislation and procedural
in only two articles; the search term e-govern- policies; secondly, a policy map is visual, giving
ment yielded thirty-two citations for the same memorable form, texture, and color to the agencys
time period. Anecdotal evidence suggests that mission; thirdly, a policy map is descriptive of
mid-level program managers in government are reality, showing what the agency does and why;
aware of the concept of enterprise architecture; and fourthly a policy map identifies important
however even they often lack an understanding relationships thus allowing individuals to locate
of the operational impacts of architecture con- themselves and relate their contributions to the
cepts on their programs and on the agencys IT organizations overall effort. Placed in a public
infrastructure. This uneven level of knowledge area, a policy map quickly becomes a conversation
about enterprise architecture by political leaders, magnet as members of the organization inform
functional experts and managers, and academic themselves and their colleagues about the enter-
researchers suggests that the traditional commu- prise architecture; about the functional programs
nications methods lack effectiveness and could the architecture supports; about government and
benefit from new approaches. organizational policies; and about the political
goals they work to support.
The Missing Link: The Purpose Readers will note the continued use of the term
Reference Model policy map rather than the term purpose refer-
ence model. Using the latter term is tempting,
A policy map is intended to help inform and edu- however, terms are typically abbreviated in daily
cate executives, stakeholders, managers, and tech- usage and the FEA reference model already has
nical professionals about the agencys assigned a PRM the Performance Reference Model. A
mission, its authority to perform that mission on policy map is intended to be used at the level of
behalf of citizens, and its political goals all in a department, an agency, or at sub-agency level,
relation to the rational instruments that transform not at the national level (the U.S. Constitution
mission statements into tangible outcomes. The eloquently describes the purpose of the Federal
policy map is essentially a purpose reference government), therefore the term policy map is
model. This may sound a bit brash to some, but preferred and used throughout. The policy map
in modern IT-enabled organizations the enterprise is intended to answer three key questions:
architecture is nothing if not a depiction of how
the organization intends to conduct business. What is the central purpose of this organi-
Missing, and typically assumed to be under- zation, i.e., what is its charter, and where is
stood by all, is an articulation of what your agency that charter found?
is doing and why it is engaged in that activity.

196
Policy Mapping

What substantive programs is the organiza- and deliberation required to convey the precise
tion charged with managing, and what is the idea and nothing more.
authority for those programs? portfolio In any communication, knowing your audience
Who are the key stakeholders and who are and knowing the message you want to convey are
the programs clients? essential to your success. Most CIOs and techni-
cal professionals working with architectures are
Answers to these questions should clearly comfortable with the objectivity, rational logic,
define and describe the mission and goals of the and language used in information systems and
organization, identify its authority to pursue these enterprise architectures. They are, very likely,
activities on behalf of the countys citizens (and notably less comfortable in political and policy
the limits of this authority) and authorize the use contexts characterized by politics, political co-
of public funds to pay for these activities, and alition building, subjectivity, tradeoffs, compro-
identify the stakeholders and program clients in mise, and negotiation. This is not to fault their
order to better the understand the priorities of experience, dedication, or education, but simply
various mission and program components. to point out that the political side of government
organizations uses a skill set and vocabulary
POLICY MAPPING: WHY, WHAT, quite different from that with which most CIOs
AND HOW and enterprise architects are familiar.

The second half of this chapter focuses on the why, Why Create a Policy Map?
what, and how of policy maps. First, a few reasons
why one might want to consider a policy map are Chief Information Officers and enterprise archi-
examined in light of the earlier discussion of the tects in government organizations are confronted
two organizational faces. This discussion exam- with at least a quartet of fundamental challenges,
ines several arguments for a policy map from a each of which has the potential for clashes between
CIOs or enterprise architects point of view. Simi- the rational approach of the enterprise architecture
larly, a few reasons why political executives might and the political orientation of the organizations
find a policy map useful are examined. Secondly political executives. First and foremost is the
this discussion defines and describes a policy map, continual challenge of estimating, justifying,
examining its attributes and the what of a policy and finally acquiring resources. Secondly, CIOs
map. Reasons that visual approaches like policy must communicate with diverse constituencies to
mapping are considered effective approaches to convince them of the usefulness of the enterprise
communicating are discussed. Then thirdly the architecture and supporting IT projects. Third,
how to of a policy map is addressed. Here, I must CIOs must demonstrate performance in their own
be candid. Ive not had the opportunity to craft organizations while simultaneously identifying
a true policy map in real-world circumstances. I the contribution IT makes to individual programs
have however, used many of Horns (1998) visual and to the organizations overall outcomes. And
language techniques to communicate in a variety fourth, the CIO is challenged to create agile and
of other venues, and have experienced the chal- adaptation tolerant capabilities in the face of
lenges of trying to convey technical concepts changing circumstances. Lets examine these
such as enterprise architecture to government challenges in more detail.
executives. The preeminent challenge one faces in The first challenge, acquiring and justifying
creating a policy map is the considerable thought resources, is an ever-present concern given the
annual budget cycle of most governments. CIOs

197
Policy Mapping

and their staffs typically work across at least political executives in the agency should better
three fiscal years as they plan, implement and understand EA activities and be able to explain
operate IT capabilities for their agencies. The how their enterprise architecture contributes to
present years budget is being executed through achieving political goals.
its projects and daily operations, even as next A third fundamental challenge facing the CIO
years budget request is being estimated, justi- is to demonstrate that the enterprise architecture
fied, defended and prioritized. Simultaneously, positively contributes to organizational perfor-
planning is underway for projects and operations mance and to achieving desired organizational
in the out-years, long-lead time infrastructure outcomes. Simultaneously the CIO must demon-
items, and consolidation projects identified in strate that his or her organization is performing
the architecture. A policy map can help sustain effectively. While it is imperative that the CIO
a concerted focus on the goals, and keep the assist functional programs in improving their
multitude of necessary conversations focused outcomes by innovative uses of information
on achieving desired organizational outcomes technology, that of itself is not enough; the IT
rather than becoming jargon-filled discussions organization itself must demonstrate the desired
about technical details. When reprioritization level of performance, and demonstrate innovative
of effort and resources occurs, as it typically approaches to implementing the architecture and
does in projects of this nature, the policy map boosting the effectiveness and efficiency of the
can help focus attention toward those projects organizations programs. Again, the policy map
that contribute most to achieving both political can be effective by keeping all parties focused
goals and desired organizational performance on and working toward producing the desired
and outcomes. outcomes. Despite the different roles of orga-
Secondly, CIOs have a responsibility to in- nizational components, they all face the single
form as well as educate organizational members imperative of working together to achieve the
about the role of information technology and desired outcomes a condition called strategic
the enterprise architecture in achieving desired alignment.
organizational performance and outcomes. Since The need to become agile and adaptation tol-
the CIOs and architects activities cut across all erant, the fourth challenge, is a new requirement
internal organizational units, they are expected for 21st century organizations as they encounter a
to understand each of the agencys functional variety of challenges such as globalization (Fried-
programs and the role and contribution of infor- man, 2005). While government organizations
mation technology in each program. They should are more indirectly affected by global economic
be able to discuss the enterprise architecture, change than are their business counterparts, they
and its supporting IT projects, with people at all face a parallel challenge of global political reform
levels of the organization, helping individuals (Kettl, 2000) that challenges their relevancy and
understand the relationship of their individual viability. Developing organizational capabilities
efforts to organizational effectiveness. As a that are agile and adaptable are the usual responses
result of the CIO and architects policy mapping to these external forces of change. Frequently over-
activities, IT professionals should increase their looked as a source of turbulence in government
understanding of architecture implementation organizations, however, are the election cycles that
and supporting IT projects. Functional and pro- go hand-in-hand with political executives time-
gram executives should more clearly understand limited tenure. Frequent executive turnovers are
how the architecture provides more effective a significant source of organizational turbulence.
and efficient IT support for their programs. And Agility and adaptation to a new leader or a new

198
Policy Mapping

leadership team are important qualities for CIOs organizational adaptability and agility, a signifi-
and program executives. Policy maps can help ease cant asset to leaders involved in organizational
the steep learning curve facing new executives change (Lawrence, Dyck, Maitlis, & Mauws,
by identifying essential relationships between 2006). Knowledge of the structural and informa-
political goals and organizational actions. By tional attributes and relationships displayed on
familiarizing new executives with the policy map policy maps can assist in creating and evaluating
CIOs and program executives can demonstrate sophisticated scenarios of organizational change.
their support for their new political bosses. And given that todays organizations were crafted
The previous paragraphs have suggested some in another era to address a different set of chal-
of the contributions a policy map can make from lenges, significant opportunities exist to reshape
the CIOs point of view. From that perspective, a todays organizations to new purposes.
policy map can provide a resource focus; inform As CIOs address each of the challenges noted
and educate members of the organization; sup- before, resource acquisition, communication, per-
port efforts to achieve alignment for performance formance, and agility, they carry out an implicit
improvement; and promote agility and adapta- translation in which they relate the context and
tion in the face of external as well as internal technologies of functional programs and processes
organizational turbulence. As generically listed to the priorities and information needs of political
before, these benefits seem rather similar to the executives. Skillful and successful CIOs perform
capabilities and insights political executives might this implicit mental mapping and translation in
desire of their organizational decision environ- real time as they address their audiences concerns.
ments. In other words, a policy map may serve to Individuals less aware of organizational politics
not only convey the logic, approach, and intent of or less skilled at addressing issues in executive
the rationally focused enterprise architecture, but contexts, typically watch in awe as functional con-
may also serve broader politically oriented goals cerns, political issues, and technological details are
of the organizations leaders. Political executives addressed with seeming ease by seasoned CIOs.
certainly need to understand the challenges of Such performances demonstrate that his or her
resource acquisition, allocation, and prioritiza- success is not accidental. Rather, successful CIOs
tion in their agency and be able to relate resource have taken the time and effort to understand the
requests to the goals and missions addressed. political or functional executives interests, and
Informing, educating and communicating are have mentally mapped the relationships between
leadership functions supported by policy mapping, the executives interests and the CIOs knowledge
however much of political executives efforts in of enterprise architecture and IT projects. He
this regard might be expected to focus on external or she has already created a mental policy map
stakeholders and key players in political processes. representing the CIOs tacit knowledge of the
Influence plays large in political environments, relationships between executive and CIO envi-
and policy maps provide strong visual illustrations ronments. In order to make this knowledge more
of the desired to-be state articulated by the widely available and useable, CIOs and enterprise
architecture, all intended to positively influence architects need to create explicit and visual policy
stakeholders. Intended performance improve- maps, incorporating and displaying the wisdom of
ments incorporated into the enterprise architecture their implicit mental policy maps. Such policy
can be depicted in relationship to the organizations maps should become a component of the agencys
mission, goals and political agenda. Lastly, well enterprise architecture, be a standard feature of
developed policy maps used in conjunction with the organizations architecture presentation, and
an enterprise architecture can be used to create be converted to poster-sized hallway displays.

199
Policy Mapping

When included as part of the EA, a policy map insights for functional programs and processes,
has the potential to help all interested parties and highlights the usefulness of EA efforts for
understand the translation of political goals into political, functional, and technical executives.
agency implementation actions enabled by infor- The notion of a policy map is, of course, meta-
mation technology. phoric. And to truly understand it, if the metaphor
is a useful one, the attributes or entailments of
A Policy Map Shows Relationships the metaphors source domain (the map) should
transfer to the metaphors target domain (the
What exactly is a policy map? At its simplest, a policy map) and help explain the nature of the
policy map is and does what any map does it target domain (Horn, 1998, p. 113). To illustrate the
depicts and describes relationships. A geospa- entailments of a map, Mark Monmoniers How
tial map of the Mid-Atlantic region of the US, to Lie With Maps (1996) is recommended. In a
for example, shows the relationship between witty yet brutally truthful volume, Monmonier
Washington, D.C. and Philadelphia expressed discusses maps and mapping as well as the ways
in terms of distance and direction. Depending in which maps both portray and distort reality.
upon its properties, this map might also display Since we desire to portray the intersection of a
terrain, hydrographic information, transportation rational enterprise architecture with the reality
systems, and points of tourist interest. Similarly, of political executives, we need to be able to deal
a policy map for an e-government application with both distortion and reality, as we understand
in the U.S. Federal government might show the and perceive them. Maps have three basic at-
relationship between the citizen-centered services tributes: scale, projection, and symbolism. Each
goals of the Presidents Management Agenda and element is a source of distortion. As a group, they
the Recreation One-Stop e-government initiative. describe the essence of the maps possibilities and
It might show, for example the Department of limitations. No one can use maps or make maps
Interior as the lead egovernment agency for this safely and effectively without understanding
initiative and list each of the agencies collaborating map scales, map projections, and map symbols.
to make Recreation One-Stop a successful egov- (Monmonier, 1996, p. 5).
ernment initiative. It could depict how Recreation Transforming the attributes of a map scale,
One-Stop is integrated into the departments projection, and symbolism into their counter-
architecture framework, and depending upon parts in a policy map completes the metaphor and
the level of detail desired, might show OMBs lends some needed definition to the concept of a
egovernment and security policies and how the policy map. First, the attribute of scale focuses
policies are implemented in the initiative. By on describing the ratio of reality to representa-
creating a policy map, one creates a line-of-sight tion. Inherent in determining scale is the question
between the political goals that are sought (the of what are the boundaries of the reality being
ends), and the processes and delivery mechanisms represented? Does this policy map represent
within the architecture that are designed to deliver the enterprise architecture for the entire agency,
citizen services (the means). Within an enterprise or does it represent the architecture of a single
architecture, a policy map brings together the functional program? Scale, in a policy map, iden-
policies, procedures, and guidance that provide tifies the portion of the enterprise architecture
justification and rationale for the enterprise ar- represented in that particular map. One might
chitecture and its implementing initiatives. In address the scale issue by representing only the
articulating policies and creating a clear view of top-most portion of the enterprise architecture,
accountability, a policy map provides significant that part associated with the performance refer-

200
Policy Mapping

ence model. Scale can be indicated by a short are likely to be interested in both the PRM and
descriptive sentence: This policy map depicts the BRM, with the BRM receiving perhaps greater
relationship of political goals and policy initiatives scrutiny due to its relation to program activities
to the agencys performance reference model. as shown in Figure 2.
While two other methods of stating the scale ex- Symbolism, the third map attribute, is the
ist, ratios and graphs, they are less appropriate system of map symbols, the mechanisms for
for policy maps. encoding information on a map. Maps typically
Projection, the second attribute of a map, is the use three geometric symbols points, lines, and
means by which the planets three-dimensional areas which can then be varied by size, shape,
surface is converted into a flat two-dimensional graytone value, texture, orientation, and hue
plane. This notion is analogous to the notion of (Monmonier, 1996, pp. 18-22). Most of use are
perspective used in the information systems quite familiar with the typical map conventions:
architecture framework (Sowa & Zachman, 1992, points on maps typically denote towns or places
p. 601), Bernards EA Framework (2004, p. 38), of interest, with the size of the point providing an
or the hierarchical set of five reference models indication of the size of the town; lines typically
that comprise the Federal Enterprise Architecture denote roads, railroads, streams and rivers; size
(OMB, 2007b) shown as Figure 1. Using the FEA and hue (color) are added to provide a descrip-
reference models for example, the projection of a tive dimension to line symbols; and area symbols
policy map might incorporate the Performance typically suggest contiguous areas, such as in-
Reference Model (PRM) or the Business Refer- corporated cities, parks, or specially designated
ence Model (BRM), the two most likely policy map areas. Descriptive richness is then added to map
projections used to construct policy maps for use symbols by using size, hue, and texture. As shown
with political executives. Functional executives on Figure 2, lines are used to show relationships

Figure 2. Policy map depicting scale and projection

policy map egovernments prm & brm


policies: Pres Mgmt Agenda & EGov Act of 00
performance: Getting to Green
processes: Consolidated reservations

Figure 2 - Policy Map Depicting Scale and Projection

Symbolism, the third map attribute, is the system of map symbols, the mechanisms for encoding 201
information on a map. Maps typically use three geometric symbols points, lines, and areas
which can then be varied by size, shape, graytone value, texture, orientation, and hue
(Monmonier, 1996, pp. 18-22). Most of use are quite familiar with the typical map conventions:
Policy Mapping

between political goals shown as the perfor- keep discussions focused while surfacing vari-
mance initiative Getting to Green (Emery, ous points of view, and to produce creative and
2003) and the PRM portion of the enterprise non-intuitive approaches to persistent challenges.
architecture. Here the policy map illustrates the The few research efforts into the effects of visual
linkage between a political initiative and the language show interestingly positive results. Horn
relevant portion of the enterprise architecture, reports (1998, p. 234) a study conducted at the
the Performance Reference Model. In the same Wharton School of Business found that visual
manner, the goal of creating a consolidated reser- language aids decision making; makes a better
vation system for Recreation One-Stop is shown impression; shortens meetings; promotes group
as a process related to a portion of the Business consensus; and is persuasive.
Reference Model. A side annotation could have
listed the two IT projects planned for next year Crafting Your Policy Map
that will enable the process to deliver the desired
outcome a consolidated reservations capability. Earlier we described successful CIOs as hav-
A note of cautionary is in order. It is important to ing an implicit mental model that allows her or
remember that when creating policy maps, the map him to (seemingly) effortlessly and effectively
characteristics just described are not part of the address the challenges and concerns of the po-
enterprise architecture, but can be overlaid on a litical executives with whom they are dealing.
portion of the architecture to show the underlying Expertise, experience, judgment, and timing are
relationships. In all cases, however, ensure you all hallmarks of effective performance. Crafting
craft your enterprise architectures in accordance and presenting a policy map that defines and il-
with extant guidance. lustrates the relationships between an enterprise
In summarizing the discussion of what consti- architecture and political goals and objectives
tutes a policy map, it is important to emphasize requires a stage-worthy performance. Know the
that a policy map is a means to communicate. context, the environment, and the message you
Policy mapping uses visual depictions of relation- are delivering; know your lines and responses to
ships to aid communication between groups that the likely questions; and practice your delivery
have very different vocabularies, despite sharing until it becomes natural. Practice sessions with
a common language. Visual language combines an audience are especially valuable, as their ques-
words, images and shapes to communicate through tions provide important clues to topics or concepts
four general types of visual devices: 1) icons requiring greater clarity.
are a simple graphic with a fixed meaning (e.g., Constructing a policy map is not difficult.
toolbar icons on Microsoft Office applications); Todays office environment provides the tools one
2) concept diagrams use a simple to moderately might need for crafting a policy map, especially if
complex graphic and a sentence or two to convey using the concepts of visual language. Graphics
a single concept; 3) an information graphic, typi- or presentation programs, such as PowerPoint can
cally a page-sized illustration, combines images, be effectively employed to create the content for
shapes and text into a complete communication a policy map, and newer versions of MS Word
unit; and 4) an information mural that can range provide most of the same capabilities. Clip art can
from poster to wall-sized and contains one or used to create any needed images, shapes can be
more information graphics (Horn, 1998, pp. 55- constructed through the drawing features of both
64). Visual language approaches have been used Word and PowerPoint, and text capabilities are
effectively to provide visibility into complex native to both applications. Icons have been devel-
issues, to illuminate cross-boundary issues, to oped for many physical items and for some com-

202
Policy Mapping

monly used concepts. A remaining challenge is is the abstract thinking and contextual creativity to
the lack of useful graphic representations of more extract essential ideas and relationships, and then
complex conceptual constructs, those notions synthesize and present them a coherent manner.
that do not yet have a defined visible form. Some A notional policy map for Getting to Green is
conceptual constructs have been given generally shown at Figure 3.
recognizable form, such as the lighted bulb over To summarize, a policy map expresses the
a persons head to indicate an idea, or getting an relationships between political goals and agendas
idea, or a sudden new awareness. In some places and the enterprise architecture. It is intended to
this notion has been turned into an icon, using bridge the gap between political goals and ideas
just the outline of a bulb to represent the idea. and rational organizational planning. In form it
Other concepts, however, are a bit more difficult is intended to be context dependent and visual,
to visualize. Consider, for example, the concept and like its geographical counterpart, has the at-
of federalism which is important in egovernment tributes of scale, projection, and symbolism. Scale
applications and which may figure prominently in refers to the portion of the enterprise architecture
some enterprise architectures. Federalism is an represented in the policy map. Projection, or
agreement by which a central and superior state perspective, indicates the viewpoint within the
with prescribed powers is created from several hierarchy of architecture reference models. And
states which retain limited powers in their own symbolism is concerned with the presentation
right. This concept is particularly interesting be- of information content. Policy maps can be cre-
cause it contains two sets of paradoxes, the first ated with standard office software suites using
in the notions of sovereignty and dependency; visual language constructs (images, shapes, and
and the second in the notions of exclusivity and text) and communication units (icon, concept
inclusivity. These complexities notwithstanding, diagram, information graphic, and information
the preeminent challenge to creating a policy map poster and mural).

Figure 3. Notional policy map for Getting to Green

e-government implementation policy map

goal: get to green in e-government on the presidents management Scorecard

Scale: architecture for recreation one-Stop

perspective: business reference model (brm)

Symbolism: overlaid on this portion of the architecture are line symbols


showing traceability from the presidents management agenda (e-
government initiative) through the business reference model portion of the
architecture (key processes) to the presidents management Scorecard.
Folder symbols represent approved Form 300 business cases for projects
that implement our architecture (expected completion 4QFy07).

T h is s pace c o n ta ins a rch ite ctu ra l com po n e n ts a n n o ta te d to s h ow th e p o licy g oa l


tra c e a bility a n d th e a rea s o f o n g o ing p ro je cts. C le arly in d ica te d is th e tim e lin e fo r
G e ttin g to G re e n b y th e e n d o f 4 Q F Y 07 .

203
Policy Mapping

CHALLENGES TO POLICY policy mapping tries to bridge a level-of-detail


MAPPING gulf likely to raise analytic eyebrows. Whereas
architecture analysis focuses on decomposition
Earlier we discussed a quartet of sound rational and fine-grained assessment, political analysis
reasons to undertake policy mapping, citing the tends to be more holistic and rather course-grained
benefits and payoffs to the CIO and architect and by comparison. Critics using this argument may
highlighting the insights offered to political execu- tend to unreasonably demand predictability and
tives. However, human behavior is frequently other precision from qualitative and speculative political
than completely rational, and in many instances analysis, and fault such analysis as being messy
is more like political behavior. Policy mapping at and non-rational. A fourth criticism of policy map-
this time should be considered an experimental ping is that it is new and different and because of
venture, with all the risks and rewards associated this is suspect. New ideas, like new adventures
with experimental work. Some individuals will always face a wide array of obstacles, mostly
see the promise and payoff of a new idea such as from the established order. Closely associated to
policy mapping and be excited about exploring the newness objection is the fifth challenge. Here
the possibilities of linking policy goals to orga- opponents cite the necessity to learn new skills
nizational endeavors. Other individuals will be and develop new processes, there being a dearth
less able to see a payoff and instead will find it of training available for such activities. And of
difficult to surmount what they perceive as the course this argument is absolutely right! Having
additional effort and the risky possibility of being disposed of these five arguments, opponents will
less than successful. As excited as I am about the now present you with their showstopper. You are
possibilities for strategic alignment that policy likely to be told that, should you proceed with
mapping offers, due diligence and responsible your policy mapping effort, you had better get
argumentation necessitate examining some of the it right the first time or you can kiss your career
difficulties one is likely to encounter. goodbye. Yet experience shows that new ideas
Policy mapping as described here is a cross- and approaches do indeed survive and thrive. The
disciplinary endeavor, in both an academic context notion of enterprise architecture was just such an
as well as in an operational context. Researchers idea in the late 1980s, yet by late 1996 it was a
are unlikely to find much support or funding for requirement codified in U.S. public law.
conducting studies of the communications effec-
tiveness of policy mapping. Operators are likely Possibilities to Consider
to be told to stick to doing what they know how to
do and cautioned to go through channels with A policy map provides coherence and promotes
the intent of keeping this idea guy from contact understanding at the intersection of the enterprise
with political executives. Secondly the challenge architecture with other organizational mandates,
of crossing the line between rational planning and both explicit and implicit. One can foresee a
political goals is one to approach cautiously. In number of less than direct benefits to organiza-
an ideal world, the opportunity to create a policy tions that have their roots in the effort to craft
map would present itself in the form of a political credible policy maps. The following beneficial
executive expressing interest in the time and effort by-products are provided for your consideration,
being expended on enterprise architecture. Skilled and since they are only loosely related, the order
entrepreneurs may be able to arrange such an op- in which they are presented should not be viewed
portunity by collegial staff contact. A third chal- as particularly significant.
lenge to policy mapping is more technical, in that

204
Policy Mapping

First, from a performance management point of can benefit greatly from policy mapping. In these
view, outlining the relationship of political goals instances policy maps should be created at each
to architecture components and IT initiatives level of government to ensure end-to-end compat-
may help organizations to better define program ibility. Policy mapping could be especially useful
success, a difficult proposition to describe in to e-government efforts in the fields of health care,
objective terms. The tough question, what does housing, and welfare.
success look like? is brought more clearly into Policy maps provide an opportunity to educate
focus when policy ends are viewed in concert with professionals within the IT organizations, func-
the process-based means and the policy ideas that tional programs, and within the political layers
energize government activities. of agencies. It is becoming increasingly impor-
The effort invested in crafting a policy map tant that all professionals understand enterprise
may help relocate the organizations effectiveness architecture and how it both affects and benefits
vs efficiency debate into a more productive venue. political initiatives, functional programs, and the
Whereas enterprise architectures in business or- CIOs office. A creative and enlightening policy
ganizations have a primary concern efficiency map enlarged to the size of an information poster
enterprise architectures in government organiza- or information mural could provide a hallway
tions have several simultaneous and sometimes conversation focus that benefits all members of
conflicting drivers. For example, US Federal an organization.
acquisition policies are crafted to promote not And lastly, communication with executives
only efficiency, but to also simultaneously cre- is enhanced when policy maps provide a point
ate a level playing field for those offering goods of reference around which to array architectural
and services to the government. Small business and functional initiatives. Policy maps provide
set-asides and programs to give preferences to essential references to overarching goals, creat-
minority and women-owned businesses are driven ing a point of departure for discussing decisions,
by concerns over equity, not efficiency. Success, tradeoffs, and implementation planning.
as noted previously, may mean promoting such
societally desirable programs at the expense of
efficiency. CONCLUSION
Cross-agency collaboration can be both eased
and enhanced through the use of policy map- This chapter has posited the idea of creating policy
ping. Most political goals cannot be achieved maps to help bridge the gap between the politically
by a single organization operating in an agency- oriented face of government typified by political
centric manner. The need for multi-agency executives, and the rational face of government as
collaboration, essential for achieving effective typified by the organizations Chief Information
outcomes is more easily seen when looking at Officer, its enterprise architect, and its enterprise
the big picture provided by a policy map. Even architecture. A policy map in concept allows one
the most parochial executive must at some point to stretch a string from the political goals and
admit that the broad policy objectives can only agendas through the enterprise architecture to
be achieved by collaborative effort. The lessons the implementation and the organizations desired
of Hurricane Katrina and the rebuilding of New outcomes. This concept is an extension of the
Orleans provide useful examples. practice of ensuring requirements traceability,
Federalism, collaboration that extends verti- the extension being into the goals and agenda
cally to link national endeavors with sub-national items of political leaders.
and local endeavors serving the same purpose,

205
Policy Mapping

Many, while acknowledging the positive ben- commission on federal paperwork. Washington,
efits of policy maps, may be tempted to forego D.C.: Government Printing Office.
the investment in time and research needed to
Bozeman, B., and Straussman, J.D. (1990).
develop useful policy maps. A variety of excuses
Public management strategies: Guidelines for
will be presented, including all of the following:
managerial effectiveness. San Francisco, CA:
a) we assume that the policy environment is
Jossey-Bass, Inc.
static and will remain so; b) we assume political
executives will embrace the architecture because Davenport, T. H. (1992). Process innovation:
it is required by statute; c) we assume the archi- Reengineering work through information tech-
tecture will be funded because it is required; and nology. Boston, MA: Harvard Business School
d) we hope that someone else will recognize the Press.
importance of the architecture and take steps
Emery, G.R. (2003, July 21). It aint easy getting
to get the necessary resources to develop and
to green: Most agencies making progress but
implement it. Rather, CIOs and architects might
management goals yet to be achieved. Wash-
do well to view policy as being nearly as dynamic
ingtonTechnology. Retrieved Oct 25, 2007 from
as information technology, and with a similarly
http://www.washingtontechnology.com/print/18_
short product cycle.
8/21225-1.html
As this is written in the fall of 2007, intense
political maneuvering is already underway for Office of Management and Budget. (2001, July
the election that will be held in 12 months. The 18). Citizen-centered e-government: Develop-
political cycle for the 2008 election in the US is ing the action plan. (OMB Memorandum 01-28).
well underway. Between mid-November 2008 and Retrieved June 10, 2007, from http://www.white-
the end of June 2009 a sea change will occur at house.gov/omb/memoranda/m01-28.html
the top of most Federal agencies. A new crop of
Office of Management and Budget. (2002, Febru-
political executives, full of energy and ideas on
ary 27). E-government strategy. Retrieved June
what is broken and what needs fixing will replace
10, 2007, from http://www.whitehouse.gov/omb/
todays political executives. As the CIO or architect
inforeg/egovstrategy.pdf
you will eventually prepare a series of informa-
tion briefs and position papers for the new crop of Office of Management and Budget. (2007a, July).
political executives. Consider developing a policy FEA consolidated reference model document
map to demonstrate how the work youve been version 2.2. Retrieved June 10, 2007, from http://
doing will help achieve the political goals your www.whitehouse.gov/omb/egov/documents/
new executives have pledged to support. FEA_CRM_v22_Final_July_2007.pdf
Office of Management and Budget. (2007b,
July). FEA reference model mapping quick guide
REFERENCES
(FY09 budget preparation). Retrieved June 10,
2007 from http://www.whitehouse.gov/omb/egov/
Bernard, S. A. (2004). An introduction to en-
documents/FY09_Ref_Model_Mapping_Quick-
terprise architecture. Bloomington, IN: Autho-
Guide_July_2007.pdf
rHouse.
Friedman, T.L. (2005). The world is flat: A brief
Commission on Federal Paperwork. (1977). Infor-
history of the twenty-first century. New York,
mation resources management: A report of the
NY: Farrar, Straus and Giroux

206
Policy Mapping

Gore, A. (1993). Creating a government that Spewak, S. H. (1992). Enterprise architecture


works better and costs less: The report of the planning: Developing a blueprint for data, appli-
national performance review. New York, NY: cations, and technology. New York, NY: Wiley.
Penguin Books.
Toavs, D. (2004). Pixelating policy: Issue trans-
Hammer, M. & Champy, J. (1994). Reengineering formation in real and virtual worlds. (Doctoral
the corporation: A manifesto for business revolu- dissertation, Virginia Polytechnic Institute and
tion. New York, NY: HarperBusiness. State University, 2004). Retrieved June 10, 2007,
from http://scholar.lib.vt.edu/theses/available/etd-
Holmes, A. (2007). Gov. Perdue knows IT. Gov-
12222004-094635/
ernment Executive. Retrieved August 8, 2007,
from http://blogs.govexec.com/techinsider/ar- U.S. General Accounting Office. (2002). Home-
chives/2007/08/gov_aligns_it_with_government. land security: Proposal for cabinet agency has
php merit, but implementation will be pivotal to
success. (GAO Publication No. GAO-02-886T).
Horn, R. E. (1998). Visual language: Global
Washington, D.C. Retrieved June 9, 2007, from
communication for the 21st century. Bainbridge
http://www.gao.gov/new.items/d02886t.pdf
Island, WA: MacroVu.
Zachman, J. A. (1989). A framework for informa-
Kettl, D. (2000). The global public management
tion systems architecture. IBM Systems Journal.
revolution: A report on the transformation of
3.
governance. Washington, D.C.: Brookings In-
stitution Press.
Kettl, D. (2002). The transformation of gov-
Endnote
ernance. Baltimore, MD: The Johns Hopkins
University Press. 1
Throughout this chapter the U.S. Federal
Lawrence, T. B., Dyck, B., Maitlis, S., & Mauws, model of governance is used. Within the U.S.
M. K. (2006). The underlying structure of con- context this key principle was established
tinuous change. MIT Sloan Management Review, in the Constitution and articulated best by
(2006, Summer), 59-66. James Madison. Madison, Kettl notes, built
a political theory in which administration
Monmonier, M., 2ed. (1996). How to lie with maps.
was subservient, in practical operation and
Chicago, IL: University of Chicago Press.
in theoretical understanding, to political
Sowa, J. F., & Zachman, J. A. (1992). Extending power (2002. p. 38).
and formalizing the framework for information
systems architecture. IBM Systems Journal. 3.

207
208

Chapter X
Enterprise Architecture
Management and its Role in IT
Governance and IT
Investment Planning
Klaus D. Niemann
act! Consulting GmbH, Germany

Abstract

A comprehensive enterprise architecture management has strategic and operative aspects. Strategic tasks
cover the identification of appropriate fields of activity for information technology (IT) investments in
accordance with business strategy and portfolio management. Enterprise architecture management is
cross-linked with other IT management processes and delivers the necessary information for a sustainable
governance. The continuous analysis of the IT landscape, the deduction of measures for optimization
and its controlling also belong to the tasks of architecture management. Standards for development and
infrastructures are made, e.g. reference architectures and a book of standards, whose implementation
is overseen by solution architects throughout the operative architecture management.

Introduction committees. Sometimes there is also the role of


a project- or solution architect, who designs ap-
In many companies the role of architecture propriate architecture concepts for single projects.
management amounts to nothing more than Thus, architecture management concentrates on
drawing up plans of the actual IT landscape and the modelling of the actual status and, through
putting them at the disposal of target groups like project support, on the accompanying of change
IT management, project leaders, or IT steering processes evolving from the business.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

Yet, are there no other big opportunities for Background


a more comprehensive version of architecture
management? Enterprise Architecture Management

Could the actual model not serve as the basis Enterprise architecture (see Figure 1) is a struc-
for a target-oriented evaluation with which tured and coordinated collection of plans for the
weaknesses in the grown IT landscape can design of the IT-landscape of a company,
be identified? (s. section 5.2, Figure 8)
Could this as-is model not also serve a better Which represent in various details and
controlling of a companys IT investments? views,
(s. section 5.2, Figure 9) Focused on special groups of interest (e.g.
Could there be standards and guidelines for managers, planners, clients, designers)
transformation processes evolving from the Different aspects of IT-systems (e.g. data,
business which guarantee an efficient devel- functions, interfaces, platforms, networks)
opment, maintanance, and safe operations? And their embedding within the system (e.g.
(s. section 5.3.1) goals, strategies, business processes)
Finally: is it not possible to cross-link the In past, present, and future specifications
work of solution architects with planning (Niemann, 2006).
tasks more tightly? (s. section 5.4)
Enterprise architecture management combines
By dealing with these questions this chapter all those processes, methods, tools, and respon-
tries to show approaches for the development of sibilities which are necessary to make things
a more comprehensive enterprise architecture work, to ensure that IT-systems do just what they
management must do cost-efficient, smoothly, and elegantly.
Simply said: architecture management is a process
resulting in enterprise architecture.
Enterprise architecture management is the
instrument with which to run the household: to cul-

Figure 1. Enterprise architecture

209
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

tivate application- and infrastructure landscapes, and documentation of the area we want to travel
maintain and improve the value of existing assets, in. This would be the enterprise architecture which
seamlessly integrate new components, adjust consists of elements of existing models: business
everything and make it work. Housekeeping is process models, organization models, IT-product
in high demand when budgets for new prospects lists, IT infrastructure catalogues, and the like.
decrease! As soon as we have the maps for our travel
This continuous analysis of application- and area we want information on places of interest,
infrastructure portfolios belongs to the tasks hotels, road conditions. Likewise, an enterprise
of an enterprise architect. For this the ongoing architecture displays its true value if not only
maintenance of the enterprise architecture model seen as a static picture but if actively used for
is indispensable. On this basis weaknesses can be analyses and as the management information
identified and potentials for optimization detected, system of the CIO.
then measures can be taken and incorporated into The analysis of our maps is followed by the
change processes. For an enterprise architect this planning of the route. The analysis of enterprise
means to focus his work on these requirements architecture, too, must be followed by the de-
and consider enterprise architecture as a means velopment of planning scenarios which address
of IT-governance. In this context enterprise ar- detected weaknesses and show problem solutions.
chitecture The to-be image and transformation planning
are then incorporated into the project portfolio
Must generate transparency and be under- and program management to realize the strategic
stood by the management; be the RADAR plan. Within the implementation of the transfor-
of the Chief Information Officer (CIO) and mation plan enterprise architecture functions as
a management information system, a governance instrument.
Must be analytically useable and derive new An initial version of the enterprise architecture
information from known facts, must react emerges from a project with a duration of 3-6
on new demands, be flexible and, better still, months and must then be imported into an on-
actively prepare for changes, going architecture management process.
Must open perspectives on the future; may An enterprise architecture designed for im-
not only be a static representation of the mediate use in the context of an IT-governance
actual state, but must be the basis for sce- program thus originates from a cycle of docu-
narios and plans for the to-be,
Must be realizable and operatively effective,
and with methods, organisation forms and Figure 2. The enterprise archi-tecture cycle
architecture management tools strongly
support the tranformation of strategy into
operative reality,
Must be measurable and binding and an
effective basis for the controlling and moni-
toring of strategic IT-measures (Niemann,
2005).

An analogy will help us understand what the


key steps are for construction and use of enterprise
architecture. As for a journey we firstly need maps

210
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

mentation, analysis, planning, imple-mentation, Tools and their integration into the tool-
and control (see Figure 2). box,
An enterprise architect focuses on the con- Procedural methods and responsibilities,
tinuous devel-opment and optimization of the Key figures and controlling.
application- and infrastruc-ture landscape ori-
ented at the business strategy. On the one hand Architecture management has both an opera-
architecture management as an enabling process tive and a strategic dimension. Documentation,
sup-ports the demand processes of order- and analysis, and planning of enterprise architecture
portfolio man-agement. On the other hand, as a on a strategic level must result in measures which
governance instrument it has standardizing and are to be operatively implemented into projects
controlling effects on the supply processes of or line functions.
project-, program-, and service management. Here, too, architecture man-agement must give
Architecture management is responsible for support, e.g. develop reference archi-tectures in
the planning, development, use, and maintenance the fields of ap-plication- and system archi-tecture,
of enterprise architecture. It organizes associated monitor their use and implementation, ac-tively
processes, controls and monitors the development. help, get things started.
Therewith architecture management describes
procedures for the close interlocking of business, IT Governance
IT-applications, and IT-infrastructure.
Architecture management is concerned Searching for definitions of the term Corporate
with: Governance, we find (e.g. in Germanys Corporate
Governance Code) (DGI, 2003) that corporate
The strategic processes for documentation, governance contains essential legal directives to
analysis, and planning of enterprise archi- the direction and supervision of listed companies
tecture and defines international and national standards of
The operative processes for the consistent good and responsible business management. The
implementation of enterprise architecture, board of directors is responsible for the appropri-
the conformity check against reference ate risk management of the enterprise Furtherand
architectures, and defined infrastructure develops the strategic alignment of the business
shopping carts, and provides for its implementation.
The definition of documentation proce- Good and responsible management, strategic
dures, focus of the company and its implementation, ap-
Analysis- and planning methods, propriate risk management and controlling: the
Evaluation procedures, top managers of our companies are committed to

Figure 3. Operative and strategic architecture management

211
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

these principles. Facing this list which IT-manager are they going to do to meet these requirements?
would not react enthusiastically if asked for his The first action will probably be an analysis of the
contribution to the realization of these principles? current status to generate a detailed list, e.g., of
And surely he would indicate that information is the distribution of costs across the departments,
the key to success of the corporate governance or of the series of operations, or to thoroughly
program, that all kinds of management need trans- understand the distribution of costs across the
parency, that each implementation of strategies distribution channels. The figures for this analysis
needs a clearly defined course of action developed are obtained from the information systems of the
on the basis of all pieces of information, that risk company. IT-systems will likely play an important
management and controlling can not be realized role in the controlling of the measures derived
in the dark but only in the light of a transparent from the analysis.
basis of information. And he would finish his Thus IT plays a significant role in corporate
remarks by adding that it is no other than IT governance issues. This is often demonstrated by
which, with the help of its information systems, legal specifications such as the Sarbanes Oxley
produces the light without which no controlling, Act, Section 404 which make high demands
navigation, monitoring or correction of course on internal company controlling and therefore
would be possible. on the IT. But what about governance of the IT
To follow governance principles also means department itself?
to make informed decisions. Governance presup- Lets have a look at another example: The
poses planning, organization, controlling, and management board decrees cost savings which
monitoring in short: management on the basis for the IT department mean a budget decrease of
of comprehensive information. 15%. Now our CIO is in a similar situation as his
But what exactly does the IT department do colleague in aforesaid example. Which IT system
to support the other specialist departments in can the CIO use to generate an initial analysis as
their planning-, controlling-, and monitoring a preparation for this strategy? Where do we find
tasks and to contribute to the implementation information on IT applications, IT infrastructure
of corporate governance principles? It delivers components, their dependencies on the business
precisely this comprehensive information: with (organization units and business processes), and
data warehouse systems, business intelligence which in addition to this identifies and makes
suites, management or executive information analyzable the costs, risks, ongoing projects and
systems. The management of the departments available IT staff? Does the IT department deliver
use just these systems to improve the business, the key information for the implementation of
save costs, open new markets, develop or place corporate governance for all other company areas
new products. With the information provided by but has no own tools to develop and control IT
these systems they support good and responsible governance processes?
corporate management, the strategic orientation Where do we find the management information
of the company and its realization, an appropriate system of the CIO? Where is the model which
risk management and controlling. documents IT assets with all their dependencies,
Lets have a look at following example: On the effects, and cross-references in a way that they are
basis of their key figures the board of manage- transparent, analyzable, and can be planned? We
ment finds that one product area does not oper- find the answer to these questions in enterprise
ate profitably. The departmental management is architecture. This is the model which documents
required to reduce costs and increase sales. What and networks all IT assets in the necessary form;
enterprise architecture provides support for analy-

212
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

sis and planning indispensable for an effective tation of an enterprise architecture model and
IT governance. the development of an enterprise architecture
The installation of an IT governance program practice within the company.
asks for measures on three areas of activity: proc- The IT Governance Institute (2000) defines IT
esses, organization, and information (Mandler, government as follows: IT governance is under
Niemann and Henning, 2007). Typical topics of the responsibility of the board of directors and the
these areas are: management and is an integral part of company
management. IT government consists of leader-
Process ship, organization structures and processes which
ensure that IT supports the company strategy and
Networking of IT management processes goals. IT governance ensures that
BusinessIT Alignment
Workflow The expectations on IT are fulfilled,
Result types and templates IT-resources are continuously planned,
Quality Gates controlled, and optimized,
Ways of decision making (monarchic, dual, The performance of IT is measured
feudal, or federal structures) And risks are minimized.
Stakeholders
Use Cases So this is about effectivity, efficiency, and
reliability. To do the right things correctly and
Organziation reliable. Enterprise architecture provides the
necessary overview, the understanding for the
Bodies relation of company goals, business processes,
Roles (task, competence, responsibility) technical requirements, projects, IT applications,
Escalation- and steering committees IT platforms, and IT infrastructure. It intercon-
Communication (acceptency, commitment, nects these elements, demonstrates effects and
perforation) dependencies, documents costs, risks, availabili-
ties, stability, and a lot more attributes.
Information But enterprise architecture can do significantly
more: it can not only document a given situation,
Goals and strategies but also delivers procedures for the analysis of
Focus (scope) weaknesses. Where are the cost drivers in the
Assessment and benchmarks application landscape? Where are redundant
Transparency (dependencies and effects) development technologies? Where the support of
Information model and tool environment business processes is inadequate or redundant?
Weakness analysis (e.g. heterogeneity, com- This as-is analysis is the basis of an effective
plexity, cost drivers, value creation) IT governance process and, as part of corporate
Standards and reference architectures governance, indipensable.
Principles, compliance rules & policies What is the next step after the analysis? It is
Decisions the planning and implementation of measures.
Metrics and KPIs Enterprise architecture helps us plan, it is the
basis for the development of planning scenarios in
All three areas of activity of IT governance which alternative ways of IT application portfolios
are addressed and supported by the implemen- are evaluated. Enterprise architecture therefore

213
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

is a central instrument of any kind of governance On this basis projects are positioned within a
program. How could we lead, direct, and control port-folio, for example (see Figure 4), where the
without knowing where we stand, how the route ex-pected project costs are indicated by the size
looks like and where it leads to? of the symbol, too. The allo-cation of available
budg-ets on projects which are economically and
IT Investment Planning strate-gically important results in a red line
and the assignment of those pro-jects which are
The point of IT investment planning is to direct above/right of this line in the portfolio.
IT budgets onto the right areas, i.e. to ensure the The term IT investment planning used here
effectivity of investments. Finance management has further meaning, though. The IT budget as a
supports IT investment planning by defining, ad- whole covers significantly more than just the part
ministering, and monitoring IT cost centres. From which is available for new projects and controlled
our experience IT investment planning is often purposefully and according to business strategy
equated with project portfolio management, which by the project portfolio management.
- usually annually - balances business require- An examination of the distribution of costs of
ments with the budgets available for the projects. big IT areas helps to find out how big the share of
To this end projects are e.g. evaluated regarding the whole IT budget needed by portfolio manage-
their monetary and strategic importance for the ment is to ensure a target-oriented investment to
business. The monetary importance is derived the benefit of the business.
from the business case of the project, the strate- Figure 5 shows an exemplary distribu-tion.
gic significance is derived from the support this As in recent years for many eco-nomic fields
project provides for the actual business strategy, a significant reduction of new developments as
e.g. an impact on the improvement of the market opposed to main-tenance has been obvious, this
position in relation to the competition. example on development assumes 30% correc-

Figure 4. Project portfolio (example)

214
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

Figure 5. Distribution of IT costs Enterprise Architecture,


IT Investment Planning, and
GoveRNance

Primary Objectives

How can we ensure that while planning our IT


initiatives we address the right fields of activity,
that means pushing those activites which optimize
the contribution IT to the business value? How
can we ensure that our IT systems, our develop-
ment and operation processes run optimally, i.e.
cost-efficient, well-performing and without fric-
tion? How can we ensure that the expectations
on IT are continually and safely met, namely that
processes are continually supervised, measured,
tive maintenance and 70% for new de-velopments and monitored?
and adaptive maintenance. The subject of enterprise architecture manag-
If we assume that the business invests a share ment is to identify the right fields of activity, to
of 10% on innovations of technology projects, for support them appropriately, and to continually
example, we find that only about 30% of the whole accompany the process and monitor it. The overall
IT budget is spent on real innovations. Only this objective of enterprise architecture management:
share is used to increase the value of the IT for to do the right things efficiently and reliably (see
the business. Figure 6).
Portfolio management concentrates on the
evaluation of IT investments in new projects and
Figure 6. Use of enterprise archi-tecture man-
sometimes also directs part of investments into
agement
adaptive maintenance. This then depends on the
scale of maintenance activities. Often enough,
though, the controlling of adaptive maintenance,
i.e. the adaptation to changes of business require-
ments or legal conditions, is done by dedicated
maintenance activities.
Usually, investments in corrective maintenance
and the operation of the existing landscape are
not included into investment controlling through
portfolio management or similar concepts, but are
seen as must-investments. But is it not especially
this grown landscape which is full of technical
challenges and therefore a true cost-driver?

215
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

Enterprise architecture creates transpar- Figure 7. Cluster map


ency and control-lability of IT transformation
processes. It identifies the proper IT services by
expert knowledge and technically driven applica-
tion portfolio management and directs IT invest-
ments for maintenance and optimization into the
correct fields of activity (housekeeping). To do
this efficiently heterogeneous structures within
the applica-tion- and technology portfolio must
be consolidated and successful solutions must be
standardized and re-usable. Governance requires
reliability and accountability, transparency of IT
assets and processes. This serves risk manage-
ment and compliance, increases the safety of the
development and supply of applications. The use
of enterprise architecture management therefore
can be evaluated by its impact on the dimensions
effectivity, efficiency, and reliability of IT.

Finding the Right Fields of Activity

An important task of architecture management is business support matrix (see Figure 8), which
to design and cultivate the as-is model of enter- e.g. juxtaposes the main processes of the orga-
prise architecture regarding purposes of analysis nization with the main services provided by the
and planning in a suf-ficiently current status. organization within a matrix (Matthes and Wit-
The analysis of the actual landscape indicates tenberg, 2004; Niemann, 2006). The supporting
potentials for optimization and is thus the basis applications are then entered into the matrix and
of the application portfolio. There are a number may be coloured regarding cost of production or
of figure types for the representation an actual maintenance, availability, compliance or indicat-
model of enterprise architecture. Figure 7, e.g., ing white spots, for example. Often instead of the
shows a so-called cluster map in which applica- main services organization units or locations are
tion systems and their interfaces are graphically juxtaposed with the processes.
presented. Such displays can highlight many The business support matrix offers the pos-
enterprise architecture attributes relevant for sibility to set application systems in direct rela-
analysis, for example in terms of colour. Often tion to supported business processes and their
this is called cartography of enterprise archi- importance for the business, or to services and
tecture (Matthes and Wittenberg, 2004). Costs, their volume share. With this it becomes possible
availabilities, business criticality, and compliance to operationalize the IT support for the business.
can be examples for such at-tributes. For the analysis of enterprise architecture this
Besides cluster maps there are other forms form of representation has been well tried. The
of representation which allow to establish direct placement of application systems within such a
relations to the supported business. A well-known matrix allows the analysis of costs, of the tech-
sample for such a form of representation is the nical coverage regarding gaps or redundancies,

216
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

Figure 8. Business support matrix (example: public administration)

and to examine interfaces regarding complexity with projects shows that such visualizations are
or heterogeneity. often drawn up according to situation, but rarely
The placement of application systems in a comprehensively across different areas of interest,
structured application landscape is based on ref- and not combined with necessary maintenance
erences between the architectural levels business and adaptation processes.
and application. Application systems support busi- As soon as the objects in our application
ness processes and the handling of products. The landscape are mapped one can begin with the
visualization of a product/process matrix already evaluation regarding costs, redundancies, gaps,
enables some evaluation, but even more can be and breaks. Did we analyze the number of inter-
achieved by a documentation of the application faces, run scenarios? Do we really use the data
landscape in a data bank and/or a special tool for of the application landscape or do we merely look
the modelling of enterprise architectures. at it instead of into it?
Such a documentation of the application land- The representation of the application landscape
scape is an efficient basis for analyses and sets the needs attributes. If the objects within the enterprise
stage for the optimization of existing enterprise architecture have no attributes the analysis of the
architecture. The visualization of the application application landscape will not result in a proper
landscape is also prerequisite for navigation and statement. Costs, strategic impact, dependencies,
communication. In projects, steering committees, performance indicators, efforts, age, capacities
coordination meetings: everywhere a visualiza- all these are sets of information required for a
tion is necessary. Our daily practical experience complete enterprise architecture, and to be able

217
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

to analyze them throughout the references in the tion of the models, and referencing. Sources for
application landscape. the design are existing application portfolios and
An application- and infrastructure landscape sketches of the application landscape.
is not only a sketch or map. It is alive, has attri- When the as-is model is developed in this way
butes, is subject to change, and can provide a lot the coherence becomes visible and a thorough
of useful information. analysis of weaknesses can be made. Such an
This requires a planned development. Which enterprise architecture can, e.g., also present
references do we need? Which evaluations do the context of an IT financial management and
we want to make and with which actuality? How therewith show how the costs for IT support are
often? Which key figures shall be derived thereof aggregated through several levels (see Figure
and how shall they be condensed? How will the 9). Thus the basis for a complex IT investment
application- and infrastructure landape be main- planning is made.
tained and kept up to date? Who is responsible, To use the information on costs for the car-
partaking, coordinating? tography of application landscapes allows, e.g.,
These questions are worth answering, because the identification of hotspots in which high main-
the outcome is the key to the real use of enterprise tanance costs occur regularly. This perspective
architecture. Most companies have models galore (see Figure 10) allows the alignment of IT invest-
but can not use them because they are neither ment procedures with the strategic areas important
aligned nor consolidated; they are semantically for the business: are maintenance investments
and syntactically incompatible and can not be made exactly for those fields of activity which
compared. are presently important?
To design an application landscape by an- Considering that only about 20% of total ap-
swering the aforementioned questions requires a plication costs throughout the complete life cycle
syntactic and semantic alignment, a synchroniza- are spent on the initial development, but 80% on

Figure 9. Finance management in enterprise architecture

218
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

Figure 10. Maintenance & integration costs

cur-rent maintenance and especially inte-gra- implemented. Can portfolio management ensure
tion, this question becomes more important (see that IT investments are made for those fields of
Figure 11) activity which support the strategic direction of
Can we ensure with the help of known and the whole company?
existing mechanisms such as IT portfolio manage- The following situation shall serve as an
ment that IT invest-ments are made in coherence example: the annual evaluation of the project
with the business strategy? portfolio defined n new projects. Each of these
Portfolio management as the interface between projects has calculated its own individual business
business and IT is responsible for the decision case, is conform to the strategy, and was allocated
from which projects the company derives the with a budget. In a grown application landscape
most benefit and which therefore must be we can presume that each of the n projects must
deal with integration issues with other existing
systems. Lets say that the application system ABC
shown in Figure 11 will have to be integrated into
Figure 11. Lifecycle costs of an application m projects (with m <= n), and that each project
system must invest a share of its budget into the integration
with ABC. The investment for the integration of
ABC is thus the result of IABC = Pi (0 < i <= m).
The total investment of all m projects is ensured
by portfolio management. But all these projects
invest parts of their budgets into application ABC
and thereby contribute to the 80% maintenance
and integration costs shown in Figure 11.

219
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

Portfolio management did not assess invest- The Right Support of the Right
ment IABC against system ABC but against the ac- Fields of Activity
tual importance of the m projects for the business.
Therefore investment IABC is only justified through Development of Standards
the business cases of the new projects. But are we
really willing to continuously invest in application As hotspots with high maintenance costs indicate
ABC? Does the application fit into the landscape? to the enterprise architect to examine the compat-
Maybe these investments are necessary because ibility of the technology used in these hotspots with
ABC uses a non-standard technology, resulting other parts of the application- and infrastructure
in higher integration efforts? landcape, hotspots with high development costs
Portfolio management does not question the indicate development tools which are inefficient,
quality of the grown landscape and the conse- e.g. due to a lack of maturity or bad support.
quences for new projects and adaptive mainte- Whenever these hotspots belong to domains
nance resulting from this. Could we not strongly (e.g. cross-points of business processes and prod-
decrease the costs for operation, new projects, ucts) which are business crucial and distinctive
and mainanance by a continuous optimization an enterprise architect is under high pressure to
of the application and infrastructure landscape, act: standards must be established which ensure
and therewith significantly increase the budget efficient and effective activities for development,
for innovation? maintenance, and operations.
We have already looked upon the role of ar- Often standards are generated bottom-up: a
chitecture management in the context of house- book of standards is developed which lists products
keeping. Why is housekeeping so important? In and technologies for development, maintenance,
many economic sectors IT has become a primary and operations. Sometimes we find additional
means of production: banks, insurance companies, information on products, e.g. life cycle attri-
energy brokers, and telecommunication compa- butes, which tell us how long a specific product
nies produce their services and products almost is usually supported. It is even more effective to
exclusively with IT; logistics, transportation and classify products regarding the level of support
trading firms highly depent on IT. they are given by the company. To determine
Thus the grown application- and infrastructure technological cornerstones such levels of sup-
landscape has an immense value for a company port or standard levels are defined for available
and must be taken care of and maintained just or planned components of the book of standards
like real assets and means of production. This (see Figure 12):
facility management for the IT department re-
quires planning and controlling: do we still invest Level A is supported as produc-tion- and
in the proper IT production facilities, or do we development environ-ment.
maintain applications, interfaces and development Level B is supported as produc-tion envi-
technologies for products which are no longer ronment. Standard software systems which
the focus of our business strategy? Do we have require components of B can be oper-ated.
badly adapted or developed IT systems which Integration of standard software into the
disturb smooth business operations or prevent existing land-scape is possible.
the establishment of new systems and thus have Level C is only supported as production en-
a negative impact on the time to market? vironment. Standard software only conform
with level C components can be operated
(perhaps with support of external partners),

220
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

Figure 12. Standard level Setting Standards Through the


Development of Reference
Architectures

Hardly any company can keep open all options,


can support all conceivable principles, master all
possibilities of software architecture design: that
would be too complex and expensive. It makes
sense to have guard rails, make commitments,
exclude options. It makes more sense to define
but must be run on its own and can not be reference architectures. A reference architecture
integrated into the existing landscape. is a construction pattern for software systems
which defines principles for
There are quite a few more standards, though
(see Figure 13): The creation of components and levels and
their responsibilities,
Superior standards: principles, rules, and The vertical and horizontal structure of a
IT decisions system,
Standardization of ap-plications by an infra- The design of interfaces and their intercom-
structure portfolio (shopping cart) in the munication,
book of standards The integration of surfaces,
Standardization of development and sup-ply The integration of components and services,
of applications through reference ar-chitec- e.g. error management, reporting, work-
tures flow.

The following example of reference architec- A specification of a reference architecture


tures shall help to clarify the use of standards in contains the resources necessary for its implemen-
architecture management. tation such as the infrastructure for development,

Figure 13. Standards

221
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

testing, and operation, as well as skills and proce- development tools, and infrasctructure used in a
dures (e.g. data saving, deployment). Heuristics to project or application system or groups thereof.
fulfill functional and non-functional requirements The existing development lines are examined
and for development costs, dates, and risks also regarding common technology and construction
belong to a reference architecture. principles, and differing criteria.
Usually there are several reference architec- To derive reference architectures from de-
tures for a company. The popular vision of just velopment lines is necessary because reference
the one target or reference architecture for a big architectures need experience values. There is
company could in practice not be realized. The no reference architecture without heuristics! We
requirements on back office systems, mobile dis- need this experience to check architectural drafts
tribution support, Web applications, production and choose the reference architecture appropri-
controlling or dispositive systems are too diverse. ate for a concrete task, and to be warned in time
Also, the business scenarios which serve as the if threshold values, e.g. of transaction rates or
basis for system development differ too much. availiabilities, are exceeded. We also need these
Usually several reference architectures are needed heuristics to assert governance into the operative
because just one can not serve all business areas, environment. Also, conformity checks are based
products, and distribution channels of a complex on experience values.
company. So do not keep open all kinds of options Each reference architecture is tied to an
for development but use an instrument of defined operational scenario, for example mobile sales
reference architectures which is target oriented support, development of Internet portals, back
at the business! office services. A reference architecture describes
A reference architecture delivers construction a technical solution pattern for such an operational
plans for new systems. To define such construc- scenario and defines the principles on which a
tion plans one can fall back on patterns for soft- company builds and supplies application systems
ware development; reference architecture itself which support this operational scenario. From
is a pattern for the design of whole systems. To a technical perspective the term architecture
this belongs the determination of development domain is often used to describe the fields in
technologies to be used and of tokens from the which the construction principles necessary for
shopping cart of system architecture. a specific operational scenario are specified in a
Reference architecture is an extract of the reference architecture.
complex diversity of all thinkable principles for How are operational scenarios identified?
the design of software systems. Thus a reference Many companies do this with a sense of propor-
architecture narrows down the necessary expert tion and good knowledge of the technical incidents
knowledge, limits the heterogeneity of develop- which result in requirements on IT. Often an
ment-, testing- and production environments. organisation chart of the departments is helpful.
Once there is a commitment to its introduction, One procedure for the methodical derivation of
reference architecture provides an important operational scenarios is based on the juxtaposition
contribution to ensure an efficient development of major processes and products of the company.
and supply of applications. In this matrix fields for operational scenarios can
Reference architectures are not developed out be easily defined and analysed.
of the blue but are typically derived from existing Reference architectures and operational sce-
developing lines within the company usually narios are the most effective instruments in terms
while an enterprise architecture is built up. De- of convergence. The step-by-step convergence of
velopment line refers to construction principles, business and IT and the reduction of heterogene-

222
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

ity and complexity require governance extending While examining project specific architec-
to the operational level. The things defined in an ture drafts an architecture board finds gaps
application portfolio are operatively implemented in the builiding of reference architectures
by the use of reference architectures. Operational and orders or initiates the testing of a new
scenarios and their reference architectures gener- development line, which is then, after a pos-
ate the basis for compliance checks. sible modification, included into the number
Usually, with the outlined procedures, ref- of eference architectures.
erence architectures providing the necessary The planning of strategic application port-
heuristics are derived from existing development folios leads to the realization that there are
lines. But reference architectures can not always fields to which no reference architecture can
be de deduced from existing development lines, be applied. In this case, too, the trying out
sometimes new ways have to be found. The of a new development line and its inclusion
standardization of reference architectures must into the number of reference architectures
not slow down innovations. When a reference must be initiated.
architecture does not become obvious, an archi-
tecture planning must be carried out within the Both cases presuppose that there is a depart-
framework of the project or a pilot study. In the ment in charge of the project. Any architectural
context of this architecture planning and based development solely motivated by technology
on sytem requirements and conditions several remains unfocused.
architecture scenarios must be developed and The examples show that reference architec-
evaluated. In these cases new development lines tures play a role in various contexts of architecture
are drawn, assumptions are made and supported management processes:
by prototypes, and pilot projects will be made.
If a new development line proves successful Architects of operative software make use
it will enable the fulfillment of expectations, be- of reference architectures as patterns for
cause a new reference architecture will emerge project work.
from this. Only after a successful implementation Within the framework of evaluating archi-
of at least one system a reference architecture for tecture drafts be it in a project, review,
this operational scenario can be derived, and the or by an architecture board reference
experience with it is then taken into account for architectures serve as a measure. Without
the application portfolio. This is why one should them there would be no reference figures
always refer to experience when developing ref- for the usefulness of architecture drafts.
erence architectures. One needs information on Only a reference architecture which has
volumes, performance, availability, reliability, already proven its value for a defined and
scalability, number of users, and security. To a documented number of requirements, e.g.
certain extent the experience gained out of ones quantity structures, allows us to evaluate
own company can be used, too. Information ex- another architecture draft.
change with other users, architecture management Reference architectures are used in the
days, congress reports, and benchmarking can context of application portfolio planning
be the sources. Yet, for a reference architecture to determine the kind of building for a
heuristics are imperative! lot which is empty or in need of refurbish-
There are other sources for the development ment. Thus the prevalence of reference
of new reference architectures, new technical architectures can already be specified dur-
impulses, and innovation: ing the planning of application portfolios.

223
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

Then requirements e.g. regarding needed tions with many and diverse requirements the
qualifications can be derived, and human enterprise architect in charge is faced with the
resources development and staff planning question which areas he should focus on. Ideally,
are provided with another planning basis. standards are created for exactly those functional
The specification of reference architectures domains which are currently important for the
is accompanied by the determination of com- business strategy, and which then can ensure an
ponents of the shopping cart. The total of efficient development and efficient operations.
all infrastructure components needed for the An example shall clarify this: Let us assume
implementation of reference architectures that a public IT service provider pursues the
is the actual shopping cart for development strategy to gain market leadership in terms of
and production. Development lines no longer providing statistics. The objective is to create a
enforced eventually need further infrastruc- statistics department which later on shall act as a
ture components, but these find production service provider for several public organizations.
support only until the development line is Thus the IT support for the domain of processing
ended. Other infrastructure components statistics becomes very important (see Figure 14
may be supported with the productional and Figure 15). This domain needs standards for
help of external partners. development, maintanance, and operation: the
reference architecture for data collection and
Reference architectures belong to most pow- processing of statistics must be derived from the
erful instruments of enterprise architects: they experience values of existing systems. The book
deliver standard patterns for the controlling of of standards must be maintained and advanced
new developments and maintenance. They are accordingly, and solution architects, project man-
based of efficient development technologies based agers and developers must be made familiar with
of a set of tools reinforced in the infrastructure these standards. The strategy of our IT service
portfolio. They deliver the initial acceleration for provider is to enter a market segment in which
development projects and provide guidance for the the price, i.e. the costs of statistics processing,
solution architects. Also, they define a standard determines the position of a company.
which can be checked on the conformity to the The service provider wants to modify its
architecture. business and be more cost efficient in commod-
ity issues than the competition. Figure 16 shows
Controlling of the Standardization a rating matrix with a positioning of the service
Process providers strategy in the upper left quadrant.
The industry specific mapping of technolo-
The controlling of the standardization process pre- gies to matrix cells within this matrix supports
vents the enterprise architect from slipping into the the development of standards conform with the
role of a policeman enquiring into the conformity business strategy.
with regulations which are inadequately specified, Thus in addition to the bottom-up catalogiza-
communicated, and supported. How can we focus tion and classification the standardization can be
the process of development and maintenance of made top-down.
standards and ensure that the necessary standards For our example Figure 16 repre-sents data
for development, maintenance, and operation are warehouse technologies in the upper left quadrant,
available for precisely those areas in which IT which should be included with high pri-ority into
investments result in a high contribution to the the standardization proc-ess in accordance with
business success? Especially in big IT organisa- the business strategy of the services provider. With

224
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

Figure 14. Diverse systems and technolo-gies Figure 16. Technology standardization priorities
within functional domain (example) based on business strategy

the help of this rating matrix depicting technolo-


gies which are to be standardized, the enterprise
architect ensures that at first those standards are
Figure 15. Standardization within func-tional do-
established which support the development and
main through reference archi-tecture (example)
operation of business critical ser-vices.

To Support the Right Fields of


Activity Right and Reliably

The measures derived from the running analysis


of the application- and infrastructure landscape
must be implemented. This presupposes that
the enterprise architect is able to launch these
housekeeping project out of his office in the IT
department. Herefore an independent housekeep-
ing is needed or a jump on the bandwagon of
project portfolio management.
What do we need to establish such a house-
keeping process as a major part of strategic archi-
tecture management, and as primary task of the
enterprise architect? We must classify architecture
management into the context of IT management
processes. Demand-, supply-, and enable-proc-

225
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

Figure 17. Big Picture of IT-Management Pro- 1. Architecture Management has identified
cesses an application system with non-standard
architecture, which must be reengineered to
an application system with standard architec-
ture. Architecture Management reports this
to the demand management. This demand
report includes a business case and a rough
architecture scenario.
2. Demand management presents a project
proposal to portfolio management.
3. Porfolio management checks the budget with
IT financial management.
4. IT financial management accepts or denies
the requestd budget.
5. Portfolio management accepts or denies the
housekeeping project.
esses must be categorized and cross-linked into 6. Demand management launches the house-
the big picture (see Figure 17). keeping project.
In this big picture we will find the connection
between architecture management and port-fo- There are exceptional situations, e.g. during
lio management, which allows the enter-prise a merger, when it can make sense to allocate an
architect to initiate housekeeping pro-jects (see independent budget to housekeeping which cov-
Figure 18). ers the consolidation measures. Then it can be
The process (simplified here) is run by fol- regarded as a strategic action for renovation and
lowing steps: optimization rather than being subject to portfolio

Figure 18. Initialization of housekeeping project

226
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

management. Usually, though, the housekeeping Conclusion


business case initiated by the enterprise architect
should prevail against other business projects. In the given context, the importance of architecture
As soon as architecture management is cross- regarding impact and focus is increasing. The
linked with the other IT management processes road trends from IT architecture to enterprise
and the enterprise architect is able to directly architecture: to develop, standardize, plan, and
launch housekeeping projects the measures in controll architecture (see 19).
progress must be supported. Standards such as Driven by requirements, the development of
infrastructure portfolio or reference architectures architecture is based on projects. Primarily ef-
must be included in housekeeping activities. This ficiency and security benefit from this: in the re-
is the task of solution architects, which pursue the usablility, initial acceleration, reduction of set-up
operative architecture management processes. times through conventions, patterns, frameworks,
The office of the enterprise architect is in and industry standards.
charge of the identification of the right fields The standardization of architecture is con-
of activity and for the definition of necessary cerned with the conception of shopping carts for
optimization measures. Also, by the portfolio infrastructure, and reference architectures for
of standards it delivers the required guidance the development. This requires a cross-project
for the implementation, which must then be ac- perspective. Here, too, the immediate use of
companied by the solution architects. Thus, the architecture lies in efficiency and security. Yet,
enterprise architect is responsible for the strategic the standards set the stage for a business-based
architecture management process, which must application portfolio, the objective of which is IT
go hand in hand with the operative architecture alignment throughout the business.
management of the solution architects. Architecture planning requires an analysis of
The teamwork of strategic and operational weaknesses of the IT landscape. First steps are
architecture management is key for the reliable analysis and mapping: among others, heterogene-
implementation of the strategy into stable and ity, complexity, gaps, value creation, costs must be
functioning IT systems. analyzed to obtain a basis for planning. Applica-
tion portolio is focused on the wish to optimize

Figure 19. The growing importance of IT architecture

227
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning

the application- and infrastructure landscape Matthes, F., Wittenburg, A. (2004). Softwarekar-
regarding the technical quality and orientation ten zur Visualisierung von Anwendungslandschaf-
at the business. ten und ihren Aspekten Eine Bestandsaufnahme.
The business oriented and strategy driven Retrieved December 19, 2004, from http://ww-
controlling of architecture requires an all-em- wmatthes.in.tum.de/de/main.htm.
bracing transparency and operationalization.
Niemann, K. (2005). IT Governance and Enter-
Measurability through key performance indi-
prise Architecture - Impact of IT cost reduction
catiors, compliance checks, embedding into IT
on innovation power. The Journal of Enterprise
management processes, and the value oriented
Architecture, 1 (1), 31-40.
optimization of the IT portfolio are the building
blocks of a strategic architecture management Niemann, K. (2006). From Enterprise Architec-
which is business focused. ture to IT-Governance. Wiesbaden: Vieweg.
The short programme is the alignment of IT
the business sectors, and as the freestyle event a
CIO will continuously take over the responsibil-
ity for the process optimization thoughout the ADDITIONAL READING
corporation.
Such a strategic architecture management has Benson, R.J., Bugnitz, T.L., Walton, W.B. (2004):
not in view single project architectures but an From Business Strategy to IT Action. New Jersey,
enterprise architecture which makes transparent N.J.: Wiley.
the connections between objectives, strategies, Keller, Wolfgang (2004): Perfect Order versus the
business processes, IT services, and platforms. Timeless Way of Building, Lecture at the EAI
For informed decisions such a navigational help is Congress sponsored by TU Berlin 2004 (Internet
called for, so that enterprise architecture becomes download from http://www.sysedv.tu-berlin.de,
the information system of a functioning IT gov- December 2004)
ernance. In a comprehensive IT planning process
ensuring an effective use of means architecture Lutchen, M.D. (2004): Managing IT as a Business.
management and portfolio management act com- New Jersey, N.J.: Wiley.
plementary guided by IT governance. Niemann, K. (2007): Enterprise Architecture:
From Business Strategy to IT-Service. SAP Info,
143, 33-35.
References
Pfeifer, A. (2003): Zum Wertbeitrag von Infor-
DGI. (2003). Deutscher Corporate Governance mationstechnologie. Retreived June 24, 2005
Kodex. Retrieved May 21, 2003 from http://www. from http://www.opus-bayern.de/uni-passau/voll-
corporate-governance-code.de/ger/kodex/index. texte/2004/34.
html. Spewak(1992): Enterprise Architecture Planning,
IT Governance Institute. (2000): Management Princeton, 1992
Guidelines for COBIT. Retreived June 29, 2004 Weill, R., Ross, J.W. (2004): IT Governance.
from http://www.isaca.org Boston, Mass.: Harvard Business School Press.
Mandler, Niemann, von Henning (2007). Servi-
ceorientierte Architekturen: Governance, Com-
pliance und Security. Duesseldorf, Euroforum.

228
229

Chapter XI
The GEA:
Governance Enterprise
Architecture-Framework and Models
Vassilios Peristeras
National University of Ireland, Ireland

Konstantinos Tarabanis
University of Macedonia, Greece

Abstract

Departing from the lack of coherent and ready-to-use models and domain descriptions for public admin-
istration, we present here our effort to build a set of generic models that serves as a top-level, generic
and thus reusable Enterprise Architecture for the overall public administration domain. We have called
this set of models Governance Enterprise Architecture (GEA). GEA has deliberately remained technology
independent and following the Model Driven Architecture approach, GEA constitutes a computationally
independent model for the domain. GEA has been derived from multi-disciplinary influences and insights
and identifies two broad modeling areas, called governance mega-processes: Public Policy Formulation
and Service Provision. These two, together with the object versus process perspective, form a four-cell
matrix that defines four modeling areas for the GEA models. To populate these cells with models we use a
challenging metaphor: we model the society - public administration interaction as a discourse to identify
important elements and functions of the governance system. Until now, a large number of services has
been modeled using GEA and more recently, an extended modeling effort has started with GEA being
chosen for use by a national EU-country project. GEA can be also used as a knowledge infrastructure
for applying semantic technologies. In this line, it has been used for creating a public administration
specialization of a formal Semantic Web Service ontology, namely WSMO.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The GEA

1. Introduction Motivation Through historical analysis, we conclude that


contemporary PA systems have gradually devel-
In the era of a highly networked world, public oped a great degree of internal differentiation in
administrations (henceforth: PAs) worldwide order to cope with a turbulent and complex exter-
are facing similar types of problems and chal- nal environment. However, this progress was not
lenges: supported with the required level of integration,
through the development of adequate internal
Re-inventing government in a client-focus PA interfaces amongst agencies. The result has
approach been a highly fragmented administrative space.
Improving performance & quality through In addition and despite major changes in PA size,
measurements output and culture during the last century, the
Changing organizational boundaries and external PA-society interface remains mostly the
structure same. Thus, we identify a dual communication
Building partnerships with the private sec- /integration problem:
tor
Delegating decisions and responsibilities to Internally among PA agencies and
independent agencies Externally between PA and its external
Globalization & competition environment.
Information Technology (IT) enabled ser-
vices This has been called the dual PA integration
deficit (Peristeras V. & Tarabanis K., 2006).
The use of IT to facilitate the major efforts of Related to this, a clear business need for all PA
reorganization, modernization and reinvention of systems emerges:
governance has proven not to be a simple task.
There is an increasing pressure on PA organiza- In order to manage the volume and diversity of
tions to manage information systems and infor- social needs and at the same time avoid fragmenta-
mation technology as an enterprise key capital tion, dissolution and a legitimacy deficit, PA sys-
resource (Tapscott & Caston, 1994). IT-based tems should be reengineered and a paradigm shift
solutions need to overcome a series of negative of todays modus operandi should be introduced
PA specific characteristics in order to add value in order to facilitate the necessary PA internal
to the administrative outcome: and external systemic adjustment. Specifically,
PA systems should develop advanced internal and
High complexity of the administrative pro- external interfaces to address the dual PA integra-
cedures since many actors, many interests, tion deficit; that is, to achieve internal integration
and many goals are intertwined. at the administrative intra- and inter- agency level,
Sparse, hierarchical (vertical) and low qual- external integration with society.
ity communication amongst PA agencies,
leading to stovepipe or legacy systems Thus, the need for inter- and intra- orga-
both organizationally and from an informa- nizational exchange of information becomes
tion viewpoint. indispensable: PAs must shift the proportion of
Diverged views, definitions and terminology resources dedicated to maintaining existing stove-
for the same piece of information. piped systems to architected systems focusing on
Vague business processes. enterprise-wide data, processes and technology
based on open architectures.

230
The GEA

The ability to analyze and document the As an EA can be used to provide and organize
processes performed by each agency and iden- sets of domain models it can also be linked with
tify the information flows has become a key ontological engineering projects where ontologies
feature towards this direction. The discipline of are drafted to express several organizational char-
Enterprise Architecture (e.g. (Zachman, 1987; acteristics. These ontologies could then populate
Zachman & Sowa, 1992)) provides the enabling different perspectives in an EA framework (e.g.
framework in which to integrate process & data actors, data, processes, events). Domain models
models into one enterprise-wide representation. and ontologies are perceived as a key concept
These representations, if built, constitute a valu- for employing semantic technologies (e.g. (Ber-
able asset. They document the current state of ners-Lee, Hendler, & Lassila, 2001; Fensel D.,
the system and can be used in various types of C. Bussler, & Maedche, 2002)). Governmental
organizational development initiatives related to domain models recently attracted a lot of interest
e.g. IT acquisition, information systems develop- in eGovernment research (e.g. (Brahim Medjahed,
ment, Business Process Re-engineering, Total Abdelmounaam Rezgui, Athman Bouguettaya,
Quality Management, Activity Based Costing, & Ouzzani, 2003; Klischewski, 2004; Klisch-
Benchmarking, etc. An Enterprise Architecture ewski & Jeenicke, 2004; Missikoff, 2002; Motta,
(EA) is expected among other things to: Domingue, Cabral, & Gaspari, 2003; Semantic
Interoperability Community of Practice (SICoP),
Serve as a common language for all terms 2005; Tambouris, Kavadias, & Spanos, 2004;
and relations in PA (Klischewski, 2004), Vitvar T., Kerrigan M., Overeem v. A., V., & K.,
Assist decision making, policy formulation 2006)).
and citizen information, Identifying the lack of suitable and ready-to-
Provide common semantics for the develop- use models and domain descriptions for public
ment and representation of life-events and administration, we gradually built a set of ge-
one-stop portals (Tambouris, 2001) neric models that documents the operation of the
Provide the necessary infrastructure to or- system under analysis. We have called this set
ganize collective discussion, effective and of models Governance Enterprise Architecture
efficient action and all the services needed (GEA). GEA is a top-level, generic and thus reus-
to support e-Government (Rosati, Lai, & able Enterprise Architecture (EA) for the overall
Gnoli, 2004). governance domain. We have tried to keep GEA
as technology independent as possible. Follow-
There are already some EA frameworks that ing a Model Driven Architecture approach, we
could be used as a basis for EA development. may say that GEA constitutes the Computational
Among the most famous are the Open Group Independent Model (ATHENA Project, 2005) for
Architecture Framework (TOGAF)1, the Zachman the governance system. In the following parts, we
Framework (Zachman & Sowa, 1992), the C4ISR present an overview of this work.
Architectural Framework (C4ISR Integration We have organized this chapter as follows:
Task Force, 1997), the Enterprise Architecture In part 2 we present the background (literature
Planning (EAP) (Spewak & Steven C. Hill., review). The foundations of GEA are presented
1992), and the Federal Enterprise Architecture in part 3. In part 4, we present an overview of all
Framework (FEAF) (TopQuadrant, 2005b). The the existing GEA models. Part 5 provides conclu-
latter is discussed in more details below as it is sions and future direction of work.
relevant to public administration.

231
The GEA

2. State of the Art The part of the public administration domain


modelled: Support Operations (S), Public
In this part, we briefly present a set of relevant Policy Formulation (P), Service Provision
initiatives. We have included not only purely EA (O)
initiatives but more general attempts to create Perspective: Technical, Conceptual/Busi-
generic models for the Governance domain. The ness
following relevant initiatives have been identi- View: Focusing on Process, Object or Holistic
fied. (attempts to combine both views).

Three spheres in eGovernance (Gronlund, The results are presented in the table below,
2005) with some additional comments including their
Gartner Government Performance Frame- relationship with our approach (GEA).
work (Gartner, 2003)
Faceted Classification of Public Administra-
tion (Rosati et al., 2004) 3. The Governance Enterprise
SAP Public Sector Solution Map (SAP, Architecture Framework
2000)
Government Process Classification Frame- In this part, we present the GEA framework and
work (Inter-Agency Benchmarking & Best its theoretical foundation.
Practices Council, 1996)
ONTOGOV project service ontology (D. 3.1 Theoretical Foundation
Apostolou, L. Stojanovic, T. Pariente Lobo,
& Thoenssen, 2005) For constructing the GEA framework and populat-
UK Government Common Information ing the GEA models, we followed a multi-disci-
Model (Office of e-Envoy UK, 2002) plinary approach and used theories and concepts
WebDG Ontologies (Brahim Medjahed et from several areas:
al., 2003)
DIP eGovernment Ontology (DIP Project, (a) Public administration and public policy
2004) theory in order to comprehend the domain of
Federal Enterprise Architecture (FEA) interest (e.g. (Bevir & Rhodes, 2001; Hogwood
Ontology (TopQuadrant, 2005a) & Gunn, 1984; Lane, 1995; Rhodes, 1997; Riley,
2003; The World Bank, 1992)). We have used
We rate all the above initiatives based on the fol- these theories to define the governance system,
lowing five criteria: delineate the scope of our initiative and propose
a broad categorization of relevant concepts to
Their relevance to the PA domain: Low be used.
(domain independent), Medium (partly PA
domain specific), high (PA domain spe- (b) Speech Act Theory (e.g. (Searle, 1969))
cific) and Language Action Perspective (LAP) (e.g.
The depth of analysis (e.g. number of con- (Dietz & Mulder, 1998; Goldkuhl, 1996; Johan-
cepts): Low (up to 10), Medium-Low (10-30), nesson, 2001)) has been used to model specific
Medium (30-50), Medium-High (50-100), parts of the domain. We consider the relationship
High (over 100) between public administration and society as
a discourse. This metaphor has been proven a

232
Initiative Relevance Depth Domain Perspective View Relationship-to-GEA
The GEA

Three spheres in High Low S-P-O Conceptual Holistic It provides a top-level categorization of the overall domain, identifying its primary actors and their
eGovernance functions. It is compatible to the GEA overall process model. The functions performed are not
further elaborated.
Gartner High Medium- S-P-O Conceptual Holistic It provides a top-level categorization of the overall governance domain, compatible with the GEA
Government Low overall process model. These categories are further elaborated but in lower levels it becomes clear
Performance that the model constitutes an evaluation and assessment tool and not an attempt to analyze and model
Framework the domain.
Faceted Clas- High Medium- S-O Conceptual Holistic It provides a reference eGov ontology using concepts of the faceted theory. It looks like ongoing
sification Low work that currently provides more details only for the procedure/process concept. The classification
of eGov processes is interesting but lacks clear definitions.
Table 1. Relevant literature review

SAP Public Medium Medium- S Conceptual Process This is a blueprint of generic processes that are executed by every PA agency. The focus is on the
Sector Solution Low service provision but stemming from a rather introvert ERP approach only the supportive and not the
Map operational functions are analyzed.
Government High High S-P Conceptual Process This initiative is quite close to the above. A very detailed organization of all governmental processes
Process Clas- is proposed, but again the focus remains on the supportive functions, then at the policy related func-
sification Frame- tions and excludes the analysis of the operational (service provision) functions
work
ONTOGOV Medium Medium O Technical Holistic It is an attempt to present an OWL-S specialization for the PA service. The PA domain specific se-
mantics introduced are rather limited. The strong point here is the compatibility with a standardized
and well-accepted service description/ontology. The modeling covers only service provision and has
technological emphasis.
UK-GCIM High Low O Conceptual Object This is a pure PA service modeling attempt. It provides an interesting view of the service, but re-
mains at a very high level of description. GEA elaborates on the concepts introduced here.
Web Low Medium- O Technical Holistic The proposed ontology aims at facilitating Web Service composition. It uses the eGovernment do-
DG-Ontologies High main as a test bed and does not provide any type of domain specific conceptual modeling.
DIP-eGov Low High S-O Conceptual Object This is a taxonomy of terms used by PA agencies rather than a reference PA domain description
Ontology model.
USA-FEA High Medium- S-O Conceptual Process This model is the only FEA PA domain specific model that provides an articulated categorization
(Business Refer- High and description for the service provision process (but not for the policy process). It uses a functional
ence Model) approach and roughly follows the ministerial departmentization of government.
USA-FEA (other Low Medium- S-O Technical Holistic With the exception of BRM, all the FEA models are domain independent.
models) High
GEA High Medium S-P-O Conceptual Holistic It is a pure PA modeling effort claiming to be technology independent. It provides a holistic view
for the overall governance system and constructs PA domain models based on two axes: objects and
processes.

233
The GEA

valuable asset both at the initial stage of scoping 3.2 The GEA Framework
and at latter stage when specific models were
developed. Specifically, we used concepts from The GEA Framework is based on a two-dimen-
these disciplines to: sional framework which consists of a vertical and
a horizontal dimension.
Construct the overall object model of the
governance system (part 4.1) In the first, the governance system mega-
Identify the main type of goals performed processes have been included.
by the governance system (part 4.1.3). In the second, we introduce the process
Model the service provision mega-process versus object modelling view.
by distinguishing its informative and per-
formative parts (part 4.6). These two dimensions define a number of cells.
Each cell constitutes a modeling area.
(c) Moreover for specific parts of GEA, we
have employed concepts from fields like: Vertical Dimension: Governance
System Mega-Processes
Organizational theory (e.g. defining the
operational/support layers (H. Koontz, Don- In this dimension, we present the two mega-pro-
nell, & Weihreich, 1980)). cesses of the governance system (see also part
Upper ontologies (e.g. DOLCE, (Claudio 4.2). A mega-process is defined as the aggrega-
Masolo, Stefano Borgo, Aldo Gangemi, tion of all governmental functions, services and
Nicola Guarino, & Oltramari, 2003)) for processes which are related to one of the two main
identifying e.g. the two core dimensions of interaction types that take place in the citizen-state
the GEA framework (process-object). discourse. These are:
Semantic web services (e.g. (Battle et al.,
2005; Hepp, Leymann, Domingue, Wahler, Public Policy Formulation. During this
& Fensel, 2005)) for proposing e.g. a model as mega-process, the demand from society
the PA domain specific service ontology. for state action is identified and political
Deontic modelling and patterns analy- processes such as prioritizing public needs
sis/design (e.g. (Fowler, 1997; Hay, 1996; take place. The main actor is the political
Johannesson & Wohed, 1998; Lind M. & system.
Goldkuhl, 2001; Wieringa & Meyer, 1993)) Service Provision. The production and
for e.g. adding a knowledge layer to an exist- distribution of public services takes place
ing transaction model. in this mega-process. The main actor is the
public administration system.
The models were built in a combined top-down
and bottom-up fashion: for the first, theories and Thus, the GEA framework defines two model-
concepts from the above-mentioned disciplines ing areas, namely the Public Policy Formulation
were used; for the second, a number of real Area and the Service Provision Area (Figure
public administration cases were analyzed and 3-1).
studied. Some administrative areas are still left out of
scope for our analysis:

234
The GEA

Following Montesquieus fundamental sepa- governance system contains both the political and
ration of the three administrative powers, administrative subsystems and the governance EA
our analysis remains at the executive power, refers to models relevant to both mega-processes.
and we deliberately leave out of scope the We use the term government to refer to the ad-
legislative and judiciary powers. ministrative system (public administration). As
We also do not consider here a third a consequence of this, when we mention eGov-
mega-process that has been called Support ernment, we refer to the use of ICTs by public
Services/Operations (see also part 4.2). In administration to facilitate the service provision
this, we group all the supporting functions mega-process. When we use eGovernance, we
to the above two core layers (e.g. logistics, refer to the use of ICTs to facilitate both mega-
financial/taxation services, information and processes. As such governance can be also
human resources management). This sup- perceived as a super concept of government.
portive mega-process has not attracted our This definition remains compatible with common
interest, as it does not acquire significant PA literature, e.g. (Rhodes, 1997).
PA domain specific characteristics, which
means that analysis and modeling performed Horizontal Dimension: Objects and
for the private sector can be easily reused Processes
and transferred with small customization to
the support operations of PA. In the horizontal dimension, we accommodate
the distinction between objects and processes.
It is important to make a clarification with These are fundamental concepts in the upper
regards to the usage of the terms government level ontology and the enterprise architecture
and governance in this chapter. Governance is literature:
used to refer to the aggregation of the two mega-
processes presented above. Thus as examples, the In SUMO (Niles & Pease, 2001), physical
entities may be Objects, or Processes.

Figure 31. The complete GEA framework

235
The GEA

In DOLCE (Claudio Masolo et al., 2003; 3. The GEA object model for public policy for-
Oltramari A., Gangemi A., Guarino N., mulation (Tarabanis, Peristeras, & Fragidis,
& Masolo C., 2002) the most fundamental 2001)
division is between perdurants, entities that 4. The GEA object model for service provision
unfold in time (processes) and endurants, (Peristeras V. & Tarabanis K., 2004a)
entities that are present all at once in time 5. The GEA process model for public policy
(objects). formulation (Vassilios Peristeras, Tsekos,
MITRE discusses the concepts of continu- & Tarabanis, 2003)
ant (process) and occurrent (objects) (Semy, 6. The GEA process model for service provi-
Pulvermacher, & Obrst, 2004). sion (Peristeras V. & Tarabanis K., 2005)
In the Zachman Enterprise Architecture
Framework ((Zachman, 1987; Zachman &
Sowa, 1992)) the WHAT and HOW columns 4. The Governance Enterprise
correspond to objects and processes. Architecture Models

The matrix defined by these two dimensions 4.1 The Overall Object Model for the
is presented in Figure 3.1. Governance System
The four cells correspond to separate modeling
areas. These areas are the following: The core of this model has been basically derived
in a top-down fashion. The basic models entities,
Formulate Public Policy Objects area instances and relationships emerged by employ-
Formulate Public Policy Processes area ing the linguistic metaphor and perceive the
Provide Service Objects area interaction between society and the governance
Provide Service Processes area system as a discourse. Following this metaphor,
we identify a constant dialogue going on between
For each of these areas/cells, we propose society and the governance system.
models. Moreover, we have added two models: During the Public Policy Formulation mega-
one as a top-level representation of all the objects process, society is the initiator of the discourse
and the other for all the processes. These models communicating needs, while the governance
ensure consistency of the framework. system receives this information and processes
Thus developing GEA actually means populat- it to set an agenda for action, as a set of goals to
ing the framework with models. be fulfilled. We classify these goals following a
GEA provides rich semantics for the PA domain Speech Act Theory perspective (Searle, 1969), and
as it currently consists of six models at different propose a taxonomy based on the main types of
levels of analysis. The list below presents the GEA speech acts as proposed by Searle (Searle, 1975).
models that are discussed in the next part. A mechanism (public administration) for imple-
menting these goals is also established during
1. The GEA object model for the overall gov- this mega-process.
ernance system (Peristeras V. & Tarabanis Then, at a second stage a conversation between
K., 2004b) public administration and society takes place.
2. The GEA process model for the overall There, the established mechanism (PA) provides
governance system (Vasilis Peristeras & services to fulfill the goals that were set in the
Tarabanis, 2000) previous stage and thus cover the societal needs.
Using the linguistic metaphor, we may say that

236
The GEA

public services are sentences uttered by PA in to the goals accomplishment. Goals and public
order to perform the necessary changes in the services are again loosely coupled and classified
world (speech acts). in different typologies with an existing but loose
In language, the types of speech acts intended relationship. Thus, in addition to the typology of
by an interlocutor are not identical with the types goal, here we also propose a separate typology
of the sentences uttered to perform these acts. The for public services. All the above are discussed
first is related to What the interlocutor want to do in detail below.
(e.g. to declare something or to direct a behavior), We organize this section as follows. First, we
while the second How the interlocutor tries to present the participating actors (subjects) in the
do it (e.g. by command, statements, questions). model (4.1.1). Then, we introduce the Need
We may say that speech acts and sentences are and Goal objects (4.1.2). In 4.1.3, we present
loosely coupled. This means that speech acts and a typology of governance goals, using the dis-
sentences are classified in different typologies course metaphor. In 4.1.4, the Public Service
with an existing but loose relationship between object is introduced. A public service typology
the various types of acts/sentences. is presented in 4.1.5. We discuss the relationship
In a similar way in the governance-society between Public Service and Goal (4.1.6). Last,
discourse, the types of public services used to the overall model appears in 4.1.7.
perform a goal should not be identified with the
type of the goals they try to fulfill. The goals 4.1.1 The Subject Object
concept presents What the governance system
want to do (e.g. promote social justice), while the We use the object Subject to cover all the participat-
public service represent How PA has decided to ing actors in the Governance-Society interaction.
fulfill the goal (e.g. by providing unemployment At the first level, Subject may consist of Gover-
benefits). Public service is the technical means nance Entities and Societal Entities. Governance

Figure 41. The participating Subjects (actors) in the governance system

237
The GEA

Entities refer to all entities participating in the ties. The process of defining goals (e.g. issue
governance system. Societal Entities refer to any filtration and agenda setting (Hogwood & Gunn,
actor existing out of the governance system bound- 1984)) is quite complicated in public policy, as
aries that (may) exercise any kind of influence on amongst others things drafting goals is directly
the latter. These two are the main types of actors linked to the ability of realizing them (Browne
that participate in the governance domain. Gov- & Wildavsky, 1984).
ernance Entities may be Public Administration
Entities (e.g. PA agencies) and Political Entities 4.1.3 Typology of Governance Goals
(e.g. Ministers). Societal Entities may be decom-
posed into several types of entities (e.g. Citizens, Regardless of the encountered difficulties, gover-
Businesses and NGOs) (Figure 4-1). nance entities come up with a concrete and usu-
ally long list of goals to pursue. Some examples
4.1.2 The Goal and Need Objects are prevent criminal actions, prevent pollution,
promote exports.
As already presented in the introduction of this Taking into account the large number of all
section, societal entities have needs. Needs are possible goals, a challenging task is to classify
deficits that society feels Governance Entities them. Researchers in public policy and PA theory
as the appropriate actor to address them. These usually address this issue by proposing various
needs are communicated to the governance system classifications (Lane, 1995; Lowi, 1979; Mus-
through the Public Policy Formulation mega-pro- grave, 1959). One of the more common is based
cess. The governance system receives this need, on the functional notion of the public policy field
processes and prioritizes them and sets goals to and administrative function is classified along
be fulfilled. Goals refer to the desired outcome of categories such as transportation, foreign affairs,
the governance action. These governance goals social services, health, etc.
should be ideally set in line with the needs of In order to present more advanced typologies of
the society. governance goals and goal-seeking behaviour, we
Not all needs expressed by societal entities present two types of typologies (Figure 4-3):
are eligible to be handled by governance enti-

Figure 42. The Goal and Need objects

238
The GEA

Figure 4-3. Typology of goals

The first is based on the goals functional perform a set of speech acts, which could be also
type. perceived as types of societal behavior.
The second is based on structural char- A speech act implies that by each utterance
acteristics and concepts from Speech Act a speaker not only says something but also does
Theory. certain things: giving information, stating a fact
or hinting an attitude.
Functional Typology Searle identified the following classes of speech
The identification of the top nodes of a functional acts (Searle, 1975):
hierarchy/typology of governance goals is a chal-
lenging exercise. We propose the following three Assertives, statements that may be judged
top nodes: true or false because they aim to describe
a state of affairs in the world.
Safeguard the Social Contract; meaning Directives, attempts by the speaker to get
obtain the peaceful coexistence amongst the addressee to do something.
the members of the society. Commisives commit the speaker to some
Obtain Sustainable Development; meaning future course of action.
direct and streamline the macro-economic Expressives express a psychological state.
development taking into account sustain- Declarations attempt to change the world by
ability concepts (e.g. environment). representing it as having been changed.
Promote the Social Welfare; meaning
enhancing the social cohesion by fighting Austin (Austin, 1962), Vendler (Vendler, 1972),
exclusion and poverty. Alan (Allan, 1994) and Bach (Bach & Harnish,
1979) have also proposed similar or slightly dif-
Structural Typology ferent speech acts categorizations.
Speech Act Theory (SAT) studies the speech Through setting goals, the governance system
acts and is part of pragmatics, which forms part exhibits a particular goal-seeking behavior: not
of linguistics. Pragmatics is about the language only does it says something but also does certain
use. According to this, a speaker uses language to things (acts). The governance goals pertain to

239
The GEA

specific types of governance acts and are the Table 42. Indicative list of certifications
equivalent to the speech acts in SAT. A governance An indicative list of the state information
entity pursues specific goals, and this should be that governance entities certifies
perceived as a type of governance behavior. We The citizen
use a similar to the linguistic typology for clas- Personal data
sifying these governance goals/acts and identify Family status
Health issues
four main types:
Property status
Professional capacity
Declarative Criminal records
Assertive The enterprise
Directive, which is further broken down into Tax and insurance compliance
two categories: Imperative and Optative. Economic situation
Interrogative Environmental conformity
The land and its use

As governance goals are central in our analy- Commodities, Vehicles, Others

sis, we further elaborate on these structural goal


types and present them in detail.
in society: a kind of honest broker recording
4.1.3.1.1 Declarative Goals world change in a neutral manner.
Through declarative goals, governance entities Nowadays, public administration registers
want to change the world by representing it an extended set of world changes as can be seen
as having been changed, to use the linguistic in Table 4-1.
equivalent. Through declarative goals, the gov-
ernance entities pursue changes in the states of 4.1.3.1.2 Assertive Goals
the world. Through assertive goals, governance entities
Social entities need a third party to officially inform and certify the existence and the truth of
register and keep records of important world certain world states. This behaviour is referential
changes (events). PA entities are considered to be and descriptive, meaning that no changes in the
the most reliable and official registering actor real world happen.
Social entities need to interchange certified
information during their interaction. Governance
Table 41. Indicative list of declarations entities are considered to be the most reliable
certification actors in society: a honest broker
An indicative list of the world changes that
arbitrating private transactions in a neutral man-
Public Administration keeps records of
ner.
The citizen
Birth
Governance entities certify an extended set
Marriage of information as can be seen below.
Death
Personal and professional capacities (e.g. 4.1.3.1.3 Directive Goals
issuance of driving license) Through directive goals, the governance system
The enterprise directs society to certain states. This goal and
Company establishment and shut down
behaviour is constructive and deontological. The
The land and its use
governance system leads society towards certain
Commodities, Vehicles, Others desired states that are politically defined.

240
The GEA

Public administration uses two types of means circumstances (e.g. not to build without a
to promote these desired states: building permit).

By command, this means by imposing com- The latter category refers to permissive goals.
pulsory the behaviour towards the desired We define as permissive, the goals/acts through
state (Imperative). which governance entities recognize special
By providing incentives, by trying to rights and allow behaviours otherwise prohibited.
persuade society to voluntarily adopt the Through permissive acts, exceptions are activated
behaviour that leads to the desired state in situations where a universal prohibition has
(Optative). been enforced.

4.1.3.1.3.1 Imperative Goals 4.1.3.1.3.2 Optative Goals


As imperative, we define the goals through which In this broad category, we define the set of goals
the governance system tries to mandates or forbids through which governance entities offer guidance
special types of societal behaviours. and support in order to promote specific behav-
Interestingly, imperative goals appear in two iors. Historically, public administration fully
forms: developed these functions after the 2nd World War,
with the emergence of the Welfare State.
Absolute command, when the prohibition or Optative goals are promoted though providing
obligation is general and without exception either Incentives or Support.
(e.g. theft, kidnap, rape)
Conditional command, when the prohibition Incentive: Through incentive acts, the gov-
or obligation can be lifted under specific ernance entities promote specific behaviours

Figure 44. Types of directive goals

241
The GEA

by offering a special bonus to persuade and ment this has become a significant
urge society towards these behaviours (e.g. trend (Yergin & Stanislaw, 1998).
subsidizing investments, providing a grant
for having a third child or for employing Figure 4-4 depicts the various types of Direc-
people previously unemployed). tive goals.
Support: Governance entities support access
to goods and services that are considered as 4.1.3.1.4 Interrogative Goals
vital and for which exclusion is considered Through its interrogative function, the gover-
unacceptable. This may happen by: nance system collects societal needs. Contrary
Directly providing grants and benefits to the declarative and directive goals, this type of
to reduce social exclusion (e.g. unem- acts/goals is directly linked to the Public Policy
ployment benefits) Formulation mega-process and not to that of
Facilitating access to vital services and Service Provision.
goods. This may occur in two ways, Concluding this part, it is important to stress
that is, through: that the governance goals may vary in strength
Internal Production, when gov- and frequency depending on the particular type of
ernance entities offer for free (or governance system in place, e.g. in non-democratic
below the production cost) infra- regimes the interrogative function may become
structure and services that have weak and volatile. Nevertheless, all these goals are
been produced internally (e.g. practically pursued by all contemporary states.
public goods).
Financing: The internal production 4.1.4 The Public Service Object
of services is not always considered
a suitable approach and outsourc- In this part, we introduce the Public Service
ing is preferred. Recently with the object which is considered central in the Service
support of New Public Manage- Provision mega-process.

Figure 45. The Public Service object

242
The GEA

There are three main actors that are related 4.1.5 Typology of Public Services
to the public service object. These are (Figure
4-5): Focusing our analysis on the Public Service
object, we have tried to create a typology of
Political entities decide and define the public public services, similar to the typology of goals
services to be provided to society in order presented in previous part.
to address the identified needs. Again the most commonly used classification is
Public administration entities provide (ex- based on the policy field criterion (transportation,
ecute) public services to society. health, education, etc). This classification has the
Societal entities ask for and receive (con- same problems as the functional classification of
sume) public services. goals. To use the linguistic analogy, the functional
categorization of sentences would result in clas-
The relationships between public services sifying the sentences: This is a dog, Do you
and political-societal entities are important in have a dog? and I dont like dogs under the
our analysis. We summarize these relationships same sentences that speak of dogs category.
in Figure 4-6. The model reads: This classification is based on the semantics of the
Societal entities have needs. By collecting, sentence but not on their structural characteristics.
processing and prioritizing these needs, political Similarly, the policy field based classification of
entities set goals (through the Public Policy For- public services is also based on the semantics of
mulation mega-process) to be fulfilled. In order the service e.g. set of services that promote health,
to pursue these goals a set of public services are education, etc.
defined and become available by public admin- Taking a different stance, we emphasize on
istration entities. Societal entities have needs the structural (e.g. process patterns) and not on
and these needs are fulfilled (or covered) by the semantic/functional characteristics of public ser-
provision of public services. vices. We employ again the discourse metaphor.

Figure 46. Public services relationships with political/societal entities

243
The GEA

In linguistics, a quite common categorization


gives three types of sentences (R.E. Asher (ed.), Top-Down. Using as a starting point the PA
1994): goals described, we examined the ways in
which public administration realizes them.
Statements The hypothesis has been: Each type of
Questions government goal is mainly realized by one
Commands generic type of public service.
Bottom-Up. Studying a great number of pub-
Interestingly, a speaker may use different lic services, we focused on the type of action
types of sentence in order to perform the same the administration performs each time. The
type of speech act e.g. to declare something or verbs used in describing the service were
direct the behavior of its interlocutor. Similarly, used as a guide. The hypothesis has been:
PA may alternatively use different types of public A few verbs can describe all public services
services to fulfill a given governance goal. We and each of these verbs is associated with
present this idea in detail below. one generic type of public service
Can we classify the hundreds of public services
provided by public administration into general Following this perspective, we identified five
types with common structural characteristics? generic types of public services. These are:
By addressing this question, we then can identify
generic types of public services. These generic Declaration
types could be described once and these descrip- Certification
tions could then be used either to analyze exist- Control
ing or to create new instances of services by just Authorization
reconfiguring the generic types appropriately. A Production
generic process model could also be proposed for
each such type of public service. We describe these types below.
We tried to identify such generic types of
public services in two ways:

Figure 47. Types of public services

244
The GEA

4.1.5.1 Declarations hibits or forces upon society specific behaviours?


There is a characteristic public service type for And how does public administration secure the
fulfilling declarative type of goals and this is compliance to the rules? At the practical level, PA
Declaration. Through providing public services has to secure that society adheres to all prohibi-
of declaration type, PA declares and registers tions and obligations posed. The main role of PA
changes in the state of the world (e.g. marriage). in this case is to suppress and control.
The typical process model followed by public PA uses a specific type of public service in
administration for performing declarations is order to address this: Control. As the offender
composed of the following steps: tends to hide his/her behaviour from PA, the
most ordinary type of control is inspections on a
A societal or public administration entity periodic or on an impromptu basis.
asks for registering a world change. In order to perform controls, PA follows a
A set of evidence needed to be validated is process model with the following steps.
gathered.
The service provider checks completeness PA performs various types of controls (e.g.
and correctness of all evidence. inspections).
The service provider may ask for additional PA arrives at a decision regarding compli-
evidence, information and clarifications. ance or not.
The service provider declares or justifies In case of non-compliance, PA passes sen-
the refusal to declare the new state. tences.

4.1.5.2 Certifications 4.1.5.4 Authorizations


There is a characteristic type of public service There is one prevailing type of public service
for fulfilling assertive type of goals and this is through which public administration realizes both
Certification. Through certifications PA certi- permissive and support goals. We call this type
fies existing states of the world (e.g. issuing birth of public services Authorization.
certificate). The typical process model followed Public administration has to set up an entire
by public administration in order to perform mechanism to exercise this type of services. In
certifications is similar to that presented above general, either universal prohibition should be
for declarations, with the difference that at the relaxed (permissive) or support should be awarded
first step the societal entity applies for a certifi- (supportive), if special conditions are met.
cation. At the end, PA either certifies or justifies The process model for authorization is similar
the refusal to certify. to that of declarations/certifications.
There are cases where PA simply informs
society about certain states of the world (e.g. 4.1.5.5 Production
weather report, statistical reports). These infor- In the description of the optative type of gover-
mational PA services can be also perceived as a nance goals, support through the production of
special type of certifications, where the process services was identified to be one of the possible
and PA commitment is much looser than in formal implementations of the governance goals. The
certifications. type of public service that is employed in order
to fulfil this goal is unique. Public administration
4.1.5.3 Controls has organized internally a production mechanism
How does public administration realize the goals and Production thus becomes a new type of
of imperative type, through which it either pro- public service. Examples of this type of services

245
The GEA

Table 44. Multiplicity in the Speech Act Sentence relationship


Goal: to have the window opened by someone else
Speech Act Type: Directive
Sentences uttered to fulfil this Speech Act:
a. Could you please open the window? (Question)
b. Open the window! (Command - characteristic)
c. It is hot here with the window closed (Statement)

may include services related to health, education, Table 43. Characteristic types of public service
defence, police, transportation, etc. and governance goals
Production as a generic type of public service Governance Goal Characteristic Type of
cannot be easily depicted using a generic descrip- Public Service
tion. Production as performed by PA is quite Declarative Declaration
similar to production of services by the private Assertive Certification
sector. We can even question whether production Imperative (absolute command) Control
is a straightforward public administration type of Permissive Authorization
public service, or just a private sector function Optative Authorization
that has been historically transferred for several Production Production
reasons to PAs. The similarities with production
in the private sector, regarding the organization of
work, are so apparent that it would be difficult to
affirmative or an interrogative sentence may be
identify significant differences. As a result, well-
used for directive, declarative or another type of
known criteria (e.g. effectiveness, productivity,
Speech Act. An example of the relationship be-
quality) can be transferred from private sector
tween speech act and type of sentence is presented
management with little customisation.
in table 4-4. Although there is a characteristic
type of sentences to utter speech acts of directive
4.1.6 Relationship between
type, other types can be used as well.
GoalsPublic Services
Similarly and despite the characteristic rela-
tionship between the types of governance goals
In the table below, the correspondence is shown
and the types of public services (table 4-3), each
between the types of governance goals and the
type of governance goals can be realized by dif-
characteristic types of public services typically
ferent types of public services.
employed for the implementation of each type of
The choice of the specific public service,
goal. Characteristic here means most common.
through which PA addresses a goal, depends on
Interestingly, the authorization type of public
various factors, such as administrative capacity,
service is employed to fulfill both permissive and
information technology, existing organizational
optative types of goals.
and institutional infrastructure, administrative
In language, there is a many-to-many relation-
culture etc. Thus, in order to meet goals of e.g.
ship between a speech act and a sentence. Differ-
imperative type, PA could alternatively use public
ent types of sentences may be used to perform
services of certification, authorization, control
a specific type of speech act. For example, an
and/or of the production type.

246
The GEA

Table 45. Multiplicity in the Goals Public Services relationship


Goal: Prohibition of polluting the atmosphere
Goal Type: Directive-Imperative
Public services provided to fulfil this goal:
a. Periodic control of pollutant emission from factory flues (Control characteristic)
b. Issuance of an operating license for factories (Authorization)
c. Issuance of a certificate asserting that no pollution is caused (Certification)

We demonstrate this multiplicity feature Declarative


between goals and public services using an ex- Assertive
ample (table 4-5). Directive
Interrogative
In this case, the goal (prohibition of polluting
the atmosphere) is of directive imperative type. Societal Needs are fulfilled by the provision
PA realizes this goal by exercising public services of Public Services. These services are defined by
of control, authorization and certification type the Goals set by Political Entities and are realized
according to circumstances. Although there is a by PA Entities. Societal Entities participate in the
characteristic relationship between imperative provision of Public Services by asking for and/or
=> control, PA can use other types of services as receiving these services.
well, in order to meet the goal posed. Public services exhibit some common struc-
tural characteristics that allow the identification
4.1.7 Model Overview of certain types of public services. These are:

Here we present an overview (Figure 4-8). This Declaration


reads: Certification
We identify two major actors in Governance: Control
Governance Entities and Societal Entities. Gov- Authorization
ernance Entities are either Political Entities or Production
PA Entities. Societal Entities may be Citizens,
Businesses and NGOs (not depicted in figure for
simplicity). In the table that follows, we summarize the
Societal Entities have Needs. Political Entities analogy we have found between linguistics and
take into account these Needs and set up Goals governance.
to be fulfilled.
In contemporary states, the Governance Goals 4.2 The Overall Process Model for
belong to three broad functional categories. the Governance System
These are:
In this part, we present the overall process model
Safeguard the Social Contract for the governance system. This description is a
Obtain Sustainable Development high level abstraction (black-box view) that identi-
Promote the Social Welfare fies the basic processes of the overall governance
system. These are called mega-processes.
Moreover, Governance Goals belong to struc-
tural types. These are:

247
The GEA

Figure 48. The GEA object model for the overall governance system

Table 4-6. The Linguistic Metaphor in modeling This separation of the overall governance
Governance-Society interaction domain was introduced in (Vasilis Peristeras &
Tarabanis, 2000) and has been followed by Gartner
LINGUISTICS GOVERNANCE
in the Gartner Government Performance Frame-
Types of Speech Acts Governance Functions
work. Gartner refers to these three dimensions
- Declaration - Declarative
- Assertive - Assertive as political management, service supply manage-
- Directive - Interrogation ment and support services (Gartner, 2003).
- Commisive - Directive
- Expressive o Imperative During the first mega-process, the gover-
o Optative nance system collects, processes and prioritizes
Sentence Public Service the emerged social needs. It also organizes a
- Statement - Declaration
- Question - Certification
mechanism - public administration - to address
- Command - Authorization these needs. The study of this mega-process is
- Control the research area of political theory and public
- Production
policy literature.
m:m relationship m:m relationship
between Speech Act - between Goals Public In the second mega-process, the established
Sentence Service mechanism (public administration) produces and
delivers services to society.
In the third layer, all the supporting functions
The governance system performs three mega- to the above two core layers are held (e.g. logis-
processes: tics, financial, information and human resources
management).
Public Policy Formulation Putting these three mega-processes together,
Service Provision we depict governance as a system that receives
Support Services

248
The GEA

Figure 49. The GEA overall process model Figure 410. The main actors participating in
Governance

administration are decreasing (Hughes & Owen


E., 1994).
In the following figure, we present the model
societal needs as input, processes and prioritizes (Figure 4-11). A description of its entities fol-
them and then designs, produces and delivers lows.
services to address these needs as output (Figure
4-9). Political Entity. Political Entities receive
This model constitutes the GEA overall process Needs from Societal Entities and process
model and at the same time it defines the two them according to their Knowledge and
separate, core domains for the modeling exercise Values to develop Vision and Mission. In
in the GEA framework: Service Provision and doing so, they are influenced by their Power
Public Policy Formulation. Structure.
The overall governance process incorporates Values. They refer to attitudes, beliefs, out-
two basic actors and their interactions. These look, ideology and philosophy of Political
actors are identified to be (Figure 4-10): Entities.
Mission. The concept of Mission refers to
Society long-term and high level target of Political
The Governance System as the aggregation Entities. Mission is considered to incor-
of Administrative System (PA) plus Political porate all enterprise goals in high level of
System abstraction. Despite the fact that it is very
significant, it is often not made explicit and
is taken for granted.
4.3 The Object Model for Vision. It refers to the desired situation that
Public Policy Formulation Political Entities imagine Societal Entities
to be in the long term.
In this part, we present the object model for the Power Structure. It refers to diverged set
Public Policy Formulation mega-process. of interests, conflicts and power that affects
The concepts used for the construction of this and even shapes all political activities. In
model are basically based on concepts employed modern democracies, this is a very complex,
in business strategy models as adapted to a PA contradictory and ever changing set.
perspective. This adaptation becomes possible Societal Entity. It refers to any force exist-
since the differences between business and public ing out of political system boundaries that

249
The GEA

Figure 411.The GEA object model for public policy formulation

(may) exercise any kind of influence on the Level 1 refers to strategic plan, what
latter. a Political Entity should do in order to
Need. It is a deficit that society feels Political attain its goals, not how to do it.
Entities as the appropriate actors to address Level 2 describes in detail how a Po-
it. litical Entity implements the strategic
Knowledge. It refers generally to knowl- plan.
edge acquired by Political Entities and Public Service. The Action Plan defines
utilized during Mission and Goal setting Public Services to be executed. These ser-
processes. vices are provided by PA Entities.
Goal. It is a central object in the model. It
refers to the desired outcome of governance 4.4 The Object Model for Service
action. Mission is considered to be at a more Provision (PA Service Model)
abstract level of analysis while goals form
its detailed specification. Goals are consid- This model comes from in-depth analysis of the
ered to describe more concrete and specific Service Provision mega-process. It is of particular
governance objectives, rather than generic importance for eGovernment applications and
expressions of the future of governance implementations as it can serve as the conceptual
system. basis for constructing a PA service ontology. This
Success Criteria. It refers to pre-defined is why we alternatively call it, the PA Service
criteria according to which the achievement Model.
of goals of Political Entities is measured. The model is PA domain-specific but at the
Action Plan. It may be considered in two same time, it remains compatible to generic service
levels: ontologies (e.g. OWL-S and WSMO). The model

250
The GEA

may cover many different (ideally all) application 4.4.2 The Outcome Object and its
areas in PA. This makes it reusable in different Types
cases of public service provision.
It is worth mentioning that a large number of We use the term Outcome to refer to all different
services have been already modeled using this types of results a PA service may have. Public
model for verification purposes. Moreover, the Services produce Outcomes. This is a fundamental
model has been recently adopted by the central assumption in GEA, which can be found also in
PA Unit in an EU member state to be used in an PA models like GCIM (Office of e-Envoy UK,
extended national project. The goal of this project 2002) or in generic service models like OWL-S
is to document in a rigid way a large number of and WSMO.
PA services (>100). We define three types of service Outcome
A detailed presentation of the model fol- (Figure 4-13):
lows.
Output
4.4.1 The Core Objects Effect
Consequence
The Public Service object is placed at the
center of the PA Service Model. The core of the The two first concepts are used similarly but
model consists of three more objects (Figure 4- not identically as in OWL-S Process Model (OWL
12). These are: Services Coalition, 2004), while the third is an
extension added due its particular importance in
Input PA domain.
Outcome In OWL-S, Output is related to the acquisi-
Law tion of information by the client. Accordingly, we
use the same definition and define as PA service
All Public Services are executed according to a Output the acquisition of information related
Law (or Rule) that governs the execution process. to the PA service execution by the client (e.g.
This object provides the execution/control logic citizen, business). This information is currently
for the service provision. embedded in administrative documents, which
Each Public Service uses Input and produces officially present (and document) the decision of
Outcome. The types of input/outcome with their the Service Provider regarding the service asked
characteristics are discussed below. by the client.

Figure 412. The core objects

251
The GEA

Figure 413. The Outcome object and its types

The execution of a service may result in a service execution logic by setting Preconditions
change in the state of the world (e.g. transfer- for service provision.
ring money to an account). This is the Effect of Public services need Input to be executed. Input
the service as defined also in OWL-S. In the PA is information needed to be checked or used in any
domain, the service Effect is the actual permis- way in order for a service to be executed. Evidence
sion, certificate, restriction or punishment the placeholder is the part of Input that contains Piece
citizen is finally entitled with. In cases where of Evidence, that is piece of information that the
administration refuses the provision of a service, service provider should have access to in order to
there is no effect. check the validity of the Preconditions. There is a
Consequence is defined as the forwarding of many-to-many relationship between the evidence
the information related to a service execution placeholders and the pieces of evidence depicting
to parties with an interest in the event. Clients the fact that an evidence placeholder (e.g. ID-
usually are not directly interested in the service Card) usually stores many evidences (e.g. date
consequences. Consequence may be: of birth, surname) and a Piece of Evidence might
be found in numerous different placeholders.
Internal, when the same agency providing the Various types of evidence placeholders ex-
service has to inform its own organization ist. For example, they may be physical (e.g.
and/or information system for the service documents) and electronic (e.g. databases, XML
execution. documents).
External, when information related to the Information that is used by the service for
service execution must be communicated other purposes is not considered evidence and is
to other agencies to ensure information modeled here as Other Input (e.g. the applicants
consistency amongst agencies. address to be used for communicating a docu-
ment/decision).
4.4.3 The Input Object and its In each service, a piece of evidence has a
Relationship with Law Purpose. The evidence purpose is related to
the underlying business logic that explains the
Public services are controlled by Laws (e.g. legisla- reason for which the service provider wants to
tion, administrative decisions). Laws provide the have access to the specific piece of information.

252
The GEA

Figure 4 14: The Input and Law objects

For example, the purpose of the ID card number 4.4.4 The Public Administration
(evidence) serves for checking and validating the Entity object
identity of the applicant. It is interesting to men-
tion that in different countries, different pieces There are four types of roles that PA agencies
of evidence may serve the same purpose e.g. can acquire during the service execution process.
the Social Security Number and/or the passport These are (Figure 4-15):
number may be used for identification purposes
as alternative to ID-card number. The Evidence Service Provider is the agency that produces
Purpose is a valuable concept in cross-border and provides the service. Sometimes, it
public service provision. makes sense to separate the service pro-
The different types of service Input and ducer (the entity that produces the service)
its relationship with the concepts of Law and from the service distributor (the entity that
Precondition are presented in Figure 4-14. delivers the output of the service).

Figure 415. The roles of the Public Administration Entity

253
The GEA

Consequence Receiver is a third agency that as the primary server of society. Public ad-
is informed about service execution. ministration is somehow in between society and
Evidence Provider is an agency that provides political system. Its role, presumed by its position,
necessary evidence to the service provider is that of a broker. Its specific function as a
in order to execute the service. broker pertains to two different roles. The first is
Service Collaborator is an agency that linked to and facilitates the upward movement of
participates in service execution process information from society to the Political System.
(workflow). The second role is linked to the implementation
of the Political System will.
4.4.5 Model Overview The model (Figure 4-17) is presented as a
circle starting from the bottom, where the social
The overall PA Service Model is presented in need for collective action triggers and activates
Figure 4-16. the whole system.
A simplified view of the model is also presented
4.5 The Process Model for Public as a UML Interaction Diagram, in Figure 4-18.
Policy Formulation In Figure 4-18, the upper part of the model is
related to the Public Policy Formulation mega-
Societal entities are the ultimate client of the process. Accordingly, the bottom part - which is
governance system. Society has delegated power shaded and discussed in the next part - corresponds
to the Political System, acknowledging the latter to the Service Provision mega-process.

Figure 416. The PA service model

254
The GEA

Figure 417. The GEA process model for public policy formulation

The description of the model follows: structured information that it collects, during the
Everything starts with societal needs to be collection phase. Categorizing this information,
addressed by governance system. These needs translating it to the language of public adminis-
should reach political entities (political system). tration and codifying it are some aspects of this
Generally, society has two ways for communi- administrative processing.
cating needs to the political system: the formal, At the check-in point the processed infor-
bureaucratic channel through public administra- mation reaches political bodies. It is here that we
tion, and a number of alternative channels which usually find supporting offices of political person-
bypass bureaucracy in order to directly reach the nel. They try to filter all the information they feel
political system. These channels may vary from important and transfer it to key people. Informa-
a formal political party or NGO to informal con- tion processing by the political layer though is
versations of political appointees with ordinary different to administrative processing. Since we
citizens. have entered the realm of the political sub-system,
Focusing on the formal administrative chan- choice based on political criteria is enforced. These
nel, the first role of administrative system (PA offices exclude needs as inappropriate (e.g. not
entities) is the collection of societal needs and a compatible with the political agenda) and draft a
whole system should be set up for this purpose. final list of issues to be addressed.
In order for this system to operate effectively, the Then we reach the phase of prioritizing, which
capacity of not only reactively collecting but also is a critical function for the political system. The
proactively sensing societal needs is critical. placement of the Prioritizing step at the head of
After this first step, administrative process- the model emphasizes its importance. The elected
ing follows. This processing is the first attempt political personnel are the main actors in this
by the administrative system to organize un- intensive decision-making process. The output is

255
The GEA

Figure 418. The process model for public policy formulation

a hierarchically ranked list of political To-Dos, trative subsystem (or the private sector). What
which forms a political Action Plan. PA personnel usually receive from this stage
After that, information starts moving down- is a law or a decree that has to be enforced and
wards. The upward movement was the flow of practically implemented. PA has to organize and
needs towards decision makers; the downward execute what has been decided. The check-out
movement is related to realization of political point is the point, where we pass from the Pub-
decisions. lic Policy Formulation to the Service Provision
The prioritizing phase is followed by the as- mega-process.
signing phase. While the former clearly expresses Society has initially asked for collective ac-
political values, the second deals with technical tion to solve emerged issues/problems and finally
arrangements. At this step the political subsystem receives services that address the initial needs.
delegates its mandate to PA to realize its political Closing the description of this process, we
action plan. Nevertheless, an alternative imple- present some interesting feedback mechanisms
mentation channel exists: the private sector can that could be used to monitor the overall process.
act as an alternative provider of public services These are:
to society.
Through its legislative power, the parliament 1st Control Political Awareness: Checks the
assigns duties to entities (public/private) to realize divergence between what society needs and what
the political action plan. The political will becomes the political system thinks society needs.
a concrete plan, with actors, budget, accountability
and management mechanisms. 2nd Control Administrative Accountability:
At the check-out point, information leaves Checks the divergence between what the politi-
the political realm and returns to the adminis- cal system wants to provide to society and what

256
The GEA

society finally receives from the administrative atomic need eligible to be addressed by PA, to
system. the execution and delivery of the service in the
real world.
3rd Control Political Accountability: Checks To deploy this model, we borrowed concepts
the divergence between the demand from society from Speech Act Theory in order to define two
as received by the political system and the final the informative and performative parts of the
plan that is communicated by the political system service provision process. Specifically we have
to the administrative system for addressing this identified:
demand.
The planning phase, which constitutes the
4th Control Governance Responsiveness: informative part of the citizen-administra-
Checks the divergence between what society has tion conversation: citizens ask the who, why,
asked for and what society receives at the end of what, how, when, where of a service. Actions
the process. included here pertain to discovering the
type of service needed, the type and specific
4.6 The Process Model for Service instance of the service provider, the specific
Provision location where the service is available and
information about the service behaviour.
This model depicts the main steps performed The execution phase, which constitutes the
each time a client (citizen, business) asks for PA performative part of this conversation. Dur-
service execution. That is, it covers the path that ing this phase public administration executes
leads from the conceptualization of a clients the service and provides outcome.

Table 47. The GEA process model for public service provision

Informative Phase (Planning)


1. An atomic need/obligation eligible to be addressed by the government emerges to a Client.
2. The Client identifies the type of Public Service (Service) available from the administrative system that addresses the
emerged atomic need/obligation.
3. The Client finds the type of PA agency that provides the Service needed (e.g. the proper administrative level with the man-
date to provide a type of service).
4. The Client finds the specific instance of the PA agency that acts as the actual Service Provider for the specific case (WHO
provides the Service).
5. The Client finds the Location (physical or electronic) from where the Service is available by the specific Service Provider
(WHERE the Service is provided).
6. The Client visits/contacts the Location from where the service is available. At this point, a communication channel between
the Client and the Service Provider is established.
7. The Client gets information regarding various aspects of the service (HOW the Service is executed behaviour).
Performative Phase (Execution)
8. The Client initiates the Service execution.
9. The Service Provider receives and processes all the service input and validates the Logical Preconditions of the service
(iterative). During this process, external agencies may be communicated either to provide additional evidence (evidence
providers) or to participate in the workflow (service collaborators).
10. The Service Provider checks the overall service Procedural Preconditions. Although, all Evidences checks have been
performed in the previous step, some additional check of the service as a whole takes place in this step (e.g. eligibility,
quality of service).
11. The Service Provider comes up with the final decision regarding the case.
12. Output: The Service Provider prepares the administrative document, which is the output of the service. The administrative
cument includes the official decision made by the Service Provider.
13. Consequence: The Service Provider updates archives kept internally (local consequence) and may inform other agencies
(global consequence).

257
The GEA

Several GEA defined objects participate in GEA models. Towards this goal, we aim at
the process of PA service execution (part 4.4). A elaborating and applying improvements to
brief description is presented in table 4-7. More the GEA models. This may take the follow-
detailed description can be found in (Peristeras ing directions:
V. & Tarabanis K., 2005).
Bottom-up experience by analyzing and
modelling a great number of real PA services
5. Conclusion / Future Work following the proposed models in order to
identify possible improvements and further
The work presented here constitutes a domain validate them. Although we have modelled
analysis effort for public administration. It has a great number of services for verification
resulted in a set of models that constitute the purposes we are currently applying some of
Governance Enterprise Architecture (GEA). GEA the models to a project run by an EU Member
is a top level, generic and thus reusable enterprise State Administration to document national
architecture for the overall governance system and PA services. We anticipate that this down-
covers its two core mega-processes, namely Public to-earth extended experience will provide
Policy Formulation and Service Provision. further insights to our modelling effort.
These models are valuable and exploitable per Top down insights which may come by study-
se as business modeling constructs can be used ing and putting side by side GEA models
as blueprints for designing and documenting PA and the ever evolving, contemporary public
systems. So for example, when a PA agency de- policy and public administration theory.
cides to provide a new service, the service model Elaborating and extending the discourse
presented in part 4.4 could be used as a template metaphor that we used to model the Society-
to allow the designers of the service discuss and Governance interaction.
decide the various aspects and characteristics of
the service. The same model could be used to Taking the above into consideration, we fore-
document existing services and provide uniform see that at a future time there may be a need for
description/language for cross-agency and reen- developing a second version of the GEA models
gineering projects. This is what has already been to incorporate all the improvements and amend-
planed in a large scale national project in an EU ments.
country. More than 100 public services will be
modeled using the GEA service model. B. We have already started working towards the
We also place emphasis on the potential to use direction of using GEA in order to build a
these models for information systems analysis and full Semantic Web Service based execution
development based on semantic technologies. In environment. This environment is based on
such technological environments, the GEA mod- GEA defined semantics, models and ontolo-
els provide the basic knowledge infrastructure gies. We have combined the formal service
(domain models) to make real the potential of ontology semantics provided by WSMO and
semantic technologies. proposed a WSMO-PA specification as a
Our future work includes mainly two direc- specialization of WSMO for the PA domain.
tions: WSMO-PA uses and builds heavily on GEA
concepts and models. Some related work
A. Further verification/elaboration through that links WSMO and GEA can be found in
real world and extended application of the (Peristeras V., Goudos S., Vitvar T., Mocan

258
The GEA

A., & Tarabanis K., 2006) and (Xia Wang Bevir, M., & Rhodes, R. A. W. (2001). A Decen-
et al., 2007). tered Theory of Governance (Working Paper
2001-10). Berkeley: Institute of Governmental
As a further step, we intent to use this PA Studies, University of California.
Service Ontology (WSMO-PA) in a Semantic
Brahim Medjahed, Abdelmounaam Rezgui,
Web Service execution environment that could
Athman Bouguettaya, & Ouzzani, M. (2003).
be tailored to the PA semantics, practices and
Infrastructure for E-Government Web Services.
special characteristics.
IEEE Internet Computing, 7(1), 58-65.
Last but not least, we try to propose the GEA
reference enterprise architecture and modeling Browne, A., & Wildavsky, A. (1984). Should
perspective to several national and international Evolution become Implementation: Pressman
bodies and work towards the creation of a com- and Wildavsky.
munity of practice that adopts and uses GEA de-
C4ISR Integration Task Force. (1997). C4ISR
scriptions for eGovernance systems development,
Architecture Framework, Version 2.0.
documentation of PA services, re-engineering
projects, etc. In the future this line of work could Claudio Masolo, Stefano Borgo, Aldo Gangemi,
further lead to a standardization activity. Taking Nicola Guarino, & Oltramari, A. (2003). Wonder-
into consideration the complexities of such an Web: Deliverable D1.8, Ontology Library (IST
effort substantial support is sought by important Project 2001-33052).
actors in the eGovernance field, including big
D. Apostolou, L. Stojanovic, T. Pariente Lobo,
information systems and consulting vendors.
& Thoenssen, B. (2005). Towards a Semanti-
cally-Driven Software Engineering Environment
for eGovernment. In (Vol. 3416, pp. 157 168):
References
LNAI.
Allan, K. (1994). Speech act classification and Dietz, J. L. G., & Mulder, J. B. F. (1998). Organi-
definition. In R. Asher (Ed.), Encyclopedia of sational transformation requires constructional
Language and Linguistics (Vol. 8, pp. 4124- 4127): knowledge of business systems. Paper presented
Oxford: Pergamon Press. at the 31st Annual HICCS.
ATHENA Project. (2005). D.A6.1, Specification DIP Project. (2004). D9.3 e-Government ontol-
of a Basic Architecture Reference Model. ogy.
Austin, J. L. (1962). How to do things with Words. Fensel D., C. Bussler, & Maedche, A. (2002).
Cambridge, MA: Harvard University Press. Semantic Web Enabled Web Services. Paper
presented at the ISWC 2002.
Bach, K., & Harnish, R. M. (1979). Linguistic
Communication and Speech Acts. Cambridge Fowler, M. (1997). Analysis Patterns: Addison-
MA: MIT Press. Wesley. New Performance Framework Measures
Public Value of IT, Research Note, 8 July 2003
Battle, S., Bernstein, A., Boley, H., Grosof, B.,
2003).
Gruninger, M., Hull, R., et al. (2005). Semantic
Web Services Framework (SWSF). Goldkuhl, G. (1996). Generic business frame-
works and action modeling. Paper presented at the
Berners-Lee, T., Hendler, J., & Lassila, O. (2001).
1st International Workshop on Communications
The Semantic Web. SCIENTIFIC AMERICAN,
Modeling - The Language/Action Perspective.
May 2001.

259
The GEA

Gronlund, A. (2005). Whats In a Field Explor- at the 37th Hawaii International Conference on
ing the eGoverment Domain. Paper presented System Sciences.
at the 38th Hawaii International Conference on
Lane, J.-E. (1995). The Public Sector: Concepts,
System Sciences.
Models and Approaches (2nd ed. ed.): Sage
H. Koontz, Donnell, C. O., & Weihreich, H. (1980). Publications.
Management (7th Edition ed.): McGraw Hill.
Lind M., & Goldkuhl, G. (2001). Generic Layered
Hay, D. (1996). Data Models Patterns. NY: Dorste Patterns for Business Modeling. Paper presented at
House Publishing. the 6th International Workshop on the Language-
Action Perspective on Communication Modeling,
Hepp, M., Leymann, F., Domingue, J., Wahler,
Montreal, Canada.
A., & Fensel, D. (2005, October 18-20). Semantic
Business Process Management: A Vision Towards Lowi, T. J. (1979). The End of Liberalism: The
Using Semantic Web Services for Business Pro- Second Republic of the United States. New York:
cess Management. Paper presented at the IEEE W.W. Norton.
ICEBE 2005, Beijing, China.
Missikoff, M. (2002). Harmonise an ontology-
Hogwood, B. W., & Gunn, L. A. (1984). Policy based approach for semantic interoperability.
Analysis for the Real World. Oxford: Oxford ERCIM News, 51, 33-34.
University Press.
Motta, E., Domingue, J., Cabral, L., & Gaspari, M.
Hughes, & Owen E. (1994). Public Management (2003). IRS II: A Framework and Infrastructure
and Administration: an introduction. New York: for Semantic Web Services. Paper presented at the
St. Martins Press. 2nd International Semantic Web Conference.
Inter-Agency Benchmarking & Best Practices Musgrave, R. A. (1959). The Theory of Public
Council. (1996). Government Process Clas- Finance. New York: McGraw-Hill.
sification Scheme. Retrieved Dec. 2001, from
Niles, I., & Pease, A. (2001, October 17-19).
http://www.va.gov/fedsbest/index.htm
Towards a Standard Upper Ontology. Paper
Johannesson, P. (2001). A Language/Action based presented at the 2nd International Conference on
Approach to Information Modeling. In Rossi M. Formal Ontology in Information Systems (FOIS-
& Siau K. (Eds.), Information Modeling in the 2001), Ogunquit, Maine.
new Millenium: IDEA Publishing.
Office of e-Envoy UK. (2002). e-Services De-
Johannesson, P., & Wohed, P. (1998). Deontic velopment Framework Primer v1.0b. Retrieved
Specification Patterns - Generalisation and Clas- Noe 2002, from http://www.govtalk.gov.uk/docu-
sification. Paper presented at the International ments/eSDFprimerV1b.pdf
Conference on Formal Ontologies in Information
Oltramari A., Gangemi A., Guarino N., & Masolo
Systems, Trento, Italy.
C. (2002, October 2002). Sweeting ontologies with
Klischewski, R. (2004). Semantic Web for e-Gov- DOLCE. Ontologies and the Semantic Web. Paper
ernment - a Research Agenda. AIS SIG SEMIS presented at the 13th International Conference,
Newsletter Volume 1, Issue 1. EKAW 2002, Siguenza, Spain.
Klischewski, R., & Jeenicke, M. (2004). Semantic OWL Services Coalition. (2004). OWL-S: Se-
Web Technologies for Information Management mantic Markup for Web Services. Retrieved
within e-Government Services. Paper presented March 2005, from http://www.daml.org/services/
owl-s/1.1/

260
The GEA

Peristeras, V., & Tarabanis, K. (2000). Towards an Paper presented at the 2006 AAAI Spring Sym-
Enterprise Architecture for Public Administration posium, The Semantic Web meets eGovernment
: A Top Down Approach. European Journal of (SWEG), Stanford University, California, USA.
Information Systems, 9(Dec. 2000), 252-260.
R.E. Asher (ed.). (1994). The Encyclopedia of
Peristeras, V., Tsekos, T., & Tarabanis, K. (2003, Language and Linguistics. Oxford: Pergamon.
31 Jul.-2 Aug.). Building Domain Models for the
Rhodes, R. A. W. (1997). Understanding Gover-
(e-) Governance System. Paper presented at the
nance: Open University Press.
International Conference on Politics and Infor-
mation Systems: Technologies and Applications Riley, B. T. (2003). e-Government vs. e-Gover-
(PISTA 03), Orlando, Florida, USA. nance (International Tracking Survey Report,
No 4). Ottawa: Commonwealth Centre for E-
Peristeras V., Goudos S., Vitvar T., Mocan A.,
Governance.
& Tarabanis K. (2006). Towards Semantic Web
Services for Public Administration based on the Rosati, L., Lai, M. E., & Gnoli, C. (2004, 10th
Web Service Modeling Ontology (WSMO) and December). Faceted Classification for Public
the Governance Enterprise Architecture (GEA). Administration. Paper presented at the Semantic
Paper presented at the 5th EGOV International Web Applications and Perspectives (SWAP) - 1st
Conference, DEXA Krakow, Poland. Italian Semantic Web Workshop, Ancona, Italy.
Peristeras V., & Tarabanis K. (2004a). Advancing SAP. (2000). R/3 System SAP Solution Map.
the Government Enterprise Architecture - GEA: Retrieved Dec. 2000, from www.sap.com
The Service Execution Object Model. In R. Traun-
Searle, J. R. (1969). Speech Acts. An Essay in the
muller (Ed.), Electronic Government, DEXA, 3rd
Philosophy of Language. London: Cambridge
International Conference EGOV 2004, Zaragoza,
University Press.
Lecture Notes in Computer Science 3183 (pp.
476-482): Springer. Searle, J. R. (1975). A taxonomy of illocutionary
acts. In Gunderson K. (Ed.), Language, Mind
Peristeras V., & Tarabanis K. (2004b). The Gov-
and Knowledge. Minneapolis: University of
ernance Enterprise Architecture (GEA) Object
Minesota.
Model. In M. A. Wimmer (Ed.), Knowledge Man-
agement in Electronic Government, Lecture Notes Semantic Interoperability Community of Practice
in Computer Science 3035, (5th IFIP International (SICoP). (2005). Introducing Semantic Technolo-
Working Conference, KMGov 2004, Krems, Aus- gies and the Vision of the Semantic Web, White
tria, May 27-29) (pp. 101-110): Springer. Paper Series Module 1.
Peristeras V., & Tarabanis K. (2005, 22-24 April Semy, S. K., Pulvermacher, M. K., & Obrst, L.
2005). The GEA Generic Process Model for J. (2004). Toward the Use of an Upper Ontology
Public Administration Service Execution. Paper for U.S. Government and U.S. Military Domains:
presented at the 8th International Conference for An Evaluation (No. 04B0000063): The MITRE
Business Information Systems (8th BIS 2005), Corporation.
Poznan, Poland.
Spewak, S. H., & Steven C. Hill. (1992). Enterprise
Peristeras V., & Tarabanis K. (2006, Mar. 27-29). Architecture Planning: Developing a Blueprint
Reengineering the public administration modus for Data, Applications and Technology: John
operandi through the use of reference domain Wiley & Sons.
models and Semantic Web Service technologies.

261
The GEA

Tambouris, E. (2001). An Integrated Platform Wieringa, R., & Meyer, J. (1993). Applications of
for Realising One-Stop Government: The eGOV Deontic Logic in Computer Science: A Concise
project. Paper presented at the E-Government Overview: Wiley.
Workshop within DEXA01.
The World Bank. (1992). Governance and De-
Tapscott, D., & Caston, A. (1994). Paradigm Shift velopment. Washington: World Bank.
: The New Promise of Information Technology.
Xia Wang, Goudos S., Peristeras V., Vitvar T.,
Tarabanis, K., Peristeras, V., & Fragidis, G. (2001, Mocan A., & Tarabanis K. (2007, 4-10 Jan. ).
June 2001). Building an Enterprise Architecture WSMO-PA: Formal Specification of Public Ad-
for Public Administration: A High Level Data ministration Service Model on Semantic Web
Model for Strategic Planning. Paper presented Service Ontology. Paper presented at the 40th
at the 9th European Conference on Information HICSS, Hawaii.
Systems, Bled, Slovenia.
Yergin, D., & Stanislaw, J. (1998). The Command-
TopQuadrant. (2005a). FEA Reference Models ing Heights: The Battle Between Government and
Ontologies v.1.1. Retrieved 16 Mar., 2006, the Marketplace That is Remaking the Modern
from http://www.topquadrant.com/documents/ World. New York: Simon & Schuster.
TQFEARMO.pdf
Zachman, J. A. (1987). A framework for informa-
TopQuadrant. (2005b). FEA Refererence Model tion systems architecture. IBM Systems Journal,
Ontologies (FEA RMO) v1.1. 26(3).
Vendler, Z. (1972). Res Cogitans: Ithaca: Cornell Zachman, J. A., & Sowa, J. F. (1992). Extending
University Press. and formalizing the framework for information
systems architecture. IBM Systems Journal,
Vitvar T., Kerrigan M., Overeem v. A., V., P., &
31(3).
K., T. (2006, Mar. 27-29). Infrastructure for the
Semantic Pan-European E-government Services.
Paper presented at the AAAI Spring Symposium, Endnote
The Semantic Web meets eGovernment (SWEG),
1
Stanford University, California, USA. http://www.opengroup.org/architecture/
togaf8-doc/arch/

262
263

Chapter XII
Enterprise Architecture and
Governance Challenges for
Orchestrating Public-Private
Cooperation
Bram Klievink
Delft University of Technology, The Netherlands

Wijnand Derks
Telematica Instituut, The Netherlands

Marijn Janssen
Delft University of Technology, The Netherlands

Abstract

The ambition of the Dutch government is to create a demand-driven government by means of effective
use of information and communication technology. This requires not only public, but also private parties
to interact with each other. This is a complex endeavour as private and public organizations have their
own goals, systems and architectures that need to be coordinated. Within this setting, a new architecture
should be created for managing and orchestrating the interactions among governmental and private
organizations. In this chapter we present an architecture aimed at supporting the coordination of public
and private parties for creating a one stop shop and the main challenges therein. We found that a public-
private service network poses higher requirements on the architecture of a service network, whereas the
variety in systems of the various organizations and different aims make it more difficult to develop such
an architecture. Furthermore, it is difficult to isolate architectural challenges from governance aspects,
as many architectural issues need to be complemented by governance mechanisms. Architecture and
governance cannot be considered in isolation.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

INTRODUCTION delivery (ICTU, 2007). The NORA is based on a


Service Oriented Architecture (SOA), which is a
It is the ambition of many governments to improve fundamental principle, but it also includes very
service-delivery to citizens. One way to do this specific guidelines. Some of those principles are
is by ensuring a widespread and effective use mandatory (by law), some are advisory. The task
of information and communication technology of this reference architecture is to guide public
to create a demand-driven government. Many organizations in the direction of a responsive,
governmental organizations offer products and demand-driven and efficient government.
services to citizens. From the citizens perspec- Demand-driven service-delivery does not
tive, the services provided by one organization are stop at the boundaries of individual organiza-
often only one part of the total service process they tions, nor does it at the boundaries between the
require. From their point of view, their situation public and the private sector. Private parties
involves multiple steps to be taken, and some of might be involved in the service provisioning, in
these steps have to be fulfilled by services per- several ways. Sometimes governmental services
formed by various governmental organizations. are funded by public money, but are in fact ex-
This is especially true in countries with highly ecuted by private organizations. This might be
fragmented governments where the government considered a form of outsourcing. Furthermore,
consists of many agencies and organizations that services provided by private parties can be closely
each have a relatively high degree of autonomy. related to governmental services, even so close
To fulfil the objective of demand-driven e-gov- that from the citizens perspective, it is part of
ernment, the focus should shift from services the same service-delivery process. Health care is
offered by a single organization to an integrated a good example, in countries that publicly fund
service-delivery process fulfilling citizens needs. basic health care services, the actual care may be
From the citizens perspective, these services do provided by privately held organizations. From
not stop at organizational boundaries. There- the citizens perspective this does not consist of
fore, many citizens requests require multiple separate processes at the government and the
organizations to interact with each other. These health care provider, but it is one and the same
cross-agency service-delivery processes need to process. Finally, governmental organization might
be coordinated. deliver their services using channels operated
In the Netherlands, this call for coordination by private parties (Janssen, Kuk, & Wagenaar,
recently gave rise to the development of a na- 2008). For example, when buying a car, the car
tional reference architecture (for a comprehensive dealer also registers the car and the new owner
description see the chapter A Service-Oriented at the responsible governmental agency. In these
Reference Architecture for EGovernment by cases, truly demand-driven e-government re-
Lankhorst and Bayens in this book). The Dutch quires cooperation with private organizations
Government Reference Architecture (abbreviated as well. In this chapter, the cooperation between
as NORA (Nederlandse Overheid Referentie Ar- public and private organizations will be denoted
chitectuur) in Dutch) provides a common ground as public-private service networks, or service
for developing the electronic government (Ken- networks for short.
niscentrum, 2007). It consists of design principles Given these public-private service networks,
arranged by an architecture framework based there is a need to go beyond a governmental ref-
on the Zachman framework and models for the erence architecture and to design an enterprise
(re)engineering of (electronic) government service architecture that supports the cooperation between

264
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

public and private organizations for integrated ser- BACKGROUND


vice delivery. The national reference architecture
provides directions in governmental enterprise The introduction of enterprise architectures
architecture, while private organizations have encompassing several actors is a complex under-
their own strategies, enterprise architectures, taking. This is complicated as there is often no
systems and interests. Since these organizations uniform view on architecture and every organiza-
are (semi-)autonomous, it is often not possible to tion has its own strategies, interests and systems.
enforce a unified enterprise architecture or pro- Despite the agreement that the development of
cess-specifications that should be adhered to. The enterprise architectures is a complex undertaking,
diversity of key stakeholders and their interests there is little insight in the specific challenges that
makes service networks very complex (Provan need to be dealt with, nor theories that provide
& Milward, 2001). Within this institutional and support for this. The literature available draws
organizational setting, new architectural guide- attention to aspects that should be investigated.
lines are needed for managing and orchestrating For example Janssen and Hjort-Madsen (2007)
the interactions among the public and the pri- found that in such complex architectural efforts
vate partners to offer integrated services. This at least five elements should be considered; (1)
demands an enterprise architecture facilitating policies, actors and structures, (2) governance,
the public-private cooperation and governance (3) architecture models, (4) architecture principles
mechanisms to ensure that the enterprise archi- and standards and (5) implementations. This
tecture is used. literature is of help to investigate the aspects
The objective of this chapter is twofold. The that are needed, but does not provide insight into
first objective is to identify and present guidelines the types of problems that need to be dealt with
for an architecture enabling cooperation between when designing enterprise architecture for pub-
public and private partners. The second objective lic-private service networks. This chapter aims at
is to identify architectural and governance chal- fulfilling this gap by investigating the development
lenges that should be dealt with. The architecture of an enterprise architecture for demand-driven
has been developed using action research, and we e-government in which both public and private
derive architectural and governance challenges parties are involved.
from the implementation of the architecture and
literature. The Role of Architecture
This chapter is structured as follows. In the
next section we describe the background, the Integrated service delivery requires integrating
complexity of the situation and the key concepts. the single fragments that make up a service deliv-
In section three the research approach is presented. ery process. These parts can either be provided by
In section four the case study and the developed public or by private parties and the dependencies
architecture are briefly discussed. In the section among these parts need to be coordinated in a
thereafter we analyze the main architectural and coherent and consistent manner. In the past, many
governance challenges. Finally, we offer future organizations within the Dutch government have
trends and conclusions about architecture as a implemented their own systems and procedures.
management instrument and the need for effective To coordinate ICT efforts within government,
governance mechanisms guiding a public-private the NORA was introduced as a reference archi-
service network. tecture. The national reference architecture may
link ICT efforts of governmental organizations,
but this does by no means align them with the

265
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

Figure 1. The need for architecture


P u b lic s e cto r P riva te s e cto r

D utc h G ov ernm ent R eferenc e A rc hitec ture V arious enterpris e a rc hitec tures

T ax H ealth c are C ons truc tion


M unic ipality ...
A dm inis tration prov ider c om pany

Integrated
s erv ic e

architecture of private organizations that are Enterprise Architecture and


(or could be) involved in the delivery of specific Governance
services. Furthermore, the national enterprise
architecture was only recently developed, there In order to orchestrate the public-private service
is no obligation for organizations to use it, and network, a frame of reference is needed. This
it may take organizations years to comply with frame of reference can be created using enter-
its principles. prise architecture. Many definitions of enterprise
Given this background, integrated service architecture (EA) can be found in the literature
delivery needs to deal with heterogeneous sys- (e.g. Lankhorst, 2005; Richardson, Jackson, &
tems and business processes of public and private Dickson, 1990; Ross, 2003). As yet, there is no
organizations. In order to integrate services and generally accepted definition on architecture
truly focus on citizens demands, some kind of (Ross, 2003). Conceptually, architecture is about
coordination is necessary. The problem of pub- defining the structure and functions of a design at
lic-private cooperation for integrated service an abstract level, often used in construction. One
delivery is schematically sketched in Figure 1. All of the first definitions of enterprise architecture
the organizations provide one or more elements in information technology (IT) was by Rich-
that should be managed to provide an integrated ardson, Jackson and Dickson (1990). Recently,
service. the city plan concept has given birth to a type
In this complex multi-actor environment, of architect that develops detailed drawings of
enterprise architecture should help to coordinate the interactions between various systems (Ross,
the services provided by the individual organiza- 2003). With enterprise architecture, the concept
tions. Furthermore, there is a need for governing is not just applied to technology and information,
the relationships and architecture among these but also to the entire organization or enterprise.
organizations. Therefore, we explore the concept Therefore, enterprise architecture can be defined
of enterprise architecture and governance in the as the coherent whole of principles, methods and
following subsection.

266
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

models that are used in the design and realisation of cesses as governance mechanisms involve man-
an enterprises organizational structure, business agement techniques for securing widespread and
processes, information systems, and infrastruc- effective involvement in governance decisions and
ture (Lankhorst, 2005, p. 3). An architecture can their implementation, for example by service level
be descriptive, prescriptive or both. In a descriptive agreements (SLAs). This is especially important
sense an architecture shows the existing relation- in public-private service networks, because were
ships among the elements which can be used to dealing with existing autonomous organizations,
analyze weaknesses and opportunities. In a pre- each with existing decision making structures,
scriptive sense it can be used as a blueprint that processes and systems. Governance should help
needs to be realized within a certain timeframe. to manage the development and practice of an
If both descriptive and prescriptive architectures architecture that coordinates the dependencies
are available, a roadmap from the current to the among public and private organizations.
envisioned future situation can be realized. In this
chapter we take a prescriptive view on EA, as the The Need for Orchestration
objective is to move towards a situation in which
public and private parties cooperate seamlessly. The dominant architectural paradigm is currently
This needs to be complemented by governance the Service Oriented Architecture (SOA). In a
mechanisms to take aspects like differences in SOA, the focus is on services that offer function-
interests and systems into account. ality, thereby uncoupling functionality from the
IT governance represents the framework for technical implementation of the functionality.
decision rights and accountabilities to encourage The focus on services offers a way to align pro-
desirable behaviour in the use of IT resources cesses in public-private service networks, while
(Weill, 2004). In analogy, architecture governance leaving the underlying organizational structures,
can be viewed as the practice and orientation by processes and systems untouched. Demand-driven
which enterprise architectures are managed and service-delivery processes can be composed of
controlled. The governance of architecture is various services at various public or private or-
complicated due to the heterogeneity of network ganizations. Citizens currently select and invoke
partners and their various strategies, interests and services themselves. Consider the following situ-
systems. Each organization might have different ation: first, a citizen searches for information and
strategic objectives, capabilities and resources. selects the appropriate services. Next, the citizen
Moreover, potential partners may have different requests the service at each organization, uses
processes and levels of IT sophistication that the response to request a subsequent service at
needs to be taken into account before services another organization and so on. Finally, the citizen
can be shared. monitors the status, submits reminders, collects
Organizations can make use of three kinds the responses and integrates them. Due to the
of governance mechanisms: (1) decision-making complexities involved in governmental service-
structures, (2) alignment processes and (3) formal delivery, the coordination of the dependencies
communications (Weill & Ross, 2005). Allocat- among the activities and systems of the individual
ing decision-making responsibilities, roles and parties is a major challenge.
organizational committees are part of the deci- The effective coordination of the dependencies
sion-making structures. Reaching effective IT among various organizations with the aim of creat-
governance by formal communications includes ing an integrated service-delivery requires process
two-way communication and a good relationship orchestration, or orchestration for short. Process
between business- and IT people. Alignment pro- orchestration is the goal-oriented coordination by a

267
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

single responsible entity in a cross-organizational ant are determining which organization is overall
process flow (Janssen, Gortmaker, & Wagenaar, responsible for the service and which organization
2006). In the situation described before, the handles the customer interactions. Figure 3 shows
citizen performs the role of orchestrator because a schematic overview of these basic variants of
they select and invoke services themselves. To roles that handle interactions with clients. When
improve service-delivery, the orchestration role considering other design variables, many more
should be performed by the government instead specific variants of orchestration can be derived.
of by the citizen. This should result in a reduction The basic models on the allocation of the primarily
of administrative costs for citizens. role of orchestration are the following:
The transition of this orchestration role from
the citizen to the government is depicted in Figure First-in-chain: The agency that delivers
2. In this figure, the orchestrator role is visual- the service is responsible for the orchestra-
ized by adding a layer on top of the individual tion of the entire chain and returns a single
organizations. The introduction of this role is answer to the user. This can be a different
aimed at reducing the administrative burdens for agency depending on the point of entry in
the citizen, as only one request needs to be made. the service chain;
The orchestrator handles all activities necessary Pass-the-buck: The agency that delivers the
for the coordination of the cross-agency service service shifts the responsibility for (parts
process and returns one answer. Basically, the of) the execution of the process to the agen-
orchestrating process orchestrates the services at cies directly involved in executing the next
various organizations into one single request by process step (or part);
and one single response to the citizen. Director: Agencies in the partnership cre-
The basic concept of orchestration provides ate a separate process orchestration role and
a simplistic view which is useful for explanation allocate this role to one actor. This could be
purposes, but does not capture the full complexity a new organization or any of the organiza-
of reality. There are many orchestration variants tions most qualified to perform this job. The
possible. Essential parts of any orchestration vari- actor fulfilling this role is orchestrating the

Figure 2. Basic concept of orchestration (Based on: Gortmaker, 2008)

C lient

O rc hes trating pr oc es s

C lient

O rc hes trated p roc es s

Organization A Organization B Organization C Organization A Organization B Organization C

268
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

Figure 3. Schematic overview of basic orchestration variants


First in chain Pass the buck Director

1. request

Client 1. request Client 1. request Client


4. answer 4. answer

A 4. answer Director

2. answers 2. requests 3. answers

B C A B C A B C

2. forward request 2. forward results 3. forward results

cross-agency process; thereby becoming a interest. Strengths include possible financial gains,
specialized director. while weaknesses include possible conflicts of
interests and concerns on privacy.
Previous research on orchestration of electronic Research in the United States and the United
governmental services (e.g. Janssen et al., 2006) Kingdom show the performances of these part-
shows that this is not just a technical challenge, nerships are mixed, often resulting in short-term
governance-related issues should be considered financial gains at the expense of long-term public
as well. In order to successfully orchestrate these costs on accountability, transparency and equal
service delivery processes, agreements need to be access to services (e.g. Flinders, 2005; Rosenau,
made on issues such as lead-times, accountability 1999). The Internet and SOA paradigm might
and information sharing (Gortmaker & Janssen, provide new incentives to come to successful
2007). We elaborate on this research by stressing public-private cooperation. ICT may play a role
the role of agreements and other components of in shaping this cooperation. In the introduction
governance that become even more important we already argued that including private partners
if private organizations are among the service in public services may be necessary to achieve
partners. the vision of a truly integrated, demand-driven
and citizen oriented e-government. Orchestrating
Public-Private Cooperation these public-private service networks is necessary
to come to successful cooperation.
Cooperation between public and private partners An important part of these orchestrations
has a long history. Already back in the 1970s, are agreements, contracts, procedures, etc. that
and again in the 1990s, public-private partner- specify the relationship between the partners in a
ships (PPP) were established to strike a balance service network (Pongsiri, 2003). The downside of
between the entrepreneurial spirit and public strictly formalized relationships is that the service
interest considerations (Linder, 1999). Research network loses some of its flexibility and becomes
on public-private partnerships identifies both more tightly coupled, while a loosely coupled
strengths and weaknesses in the practice of having network would suit the orchestration model best.
private parties execute projects concerning public An important instrument in orchestrating these

269
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

service networks is the Service Level Agreement household care to needing people. Such a project
(SLA), in which agreements on response time, involves both public and private organizations.
management information, availability, etc. are The authors were involved in the design of the
specified at the level of the organizational services. architecture, therefore the type of research can be
This should be specified in such a way that enough labelled action research. We confront our findings
freedom is provided to the participants, but the with the literature and identify specific architec-
main conditions for effective cross-organizational tural and governance challenges for orchestrating
service-delivery are guaranteed. public-private service networks.
The clear allocation of roles, responsibilities Action research or applied case study research
and accountability is another important part of was chosen because this type of research instru-
the governance of orchestrating public-private ment is focused on how to questions (Checkland,
service networks. Who takes the initiatives in 1981). This enabled the investigation of the design
case of failure? How are decisions made and and development process of the application of the
enforced if they concern more than one organiza- enterprise architecture to this case. The authors
tion? The difference in interests might complicate were involved in designing the architecture for
these kinds of decisions. Governmental agencies demand-driven e-government. In addition, the
have a primary (social) responsibility towards case study aspect came from the interviewing
the public, whereas private organizations have a of a number of key persons from different or-
primary (economic) allegiance towards manage- ganizations and disciplines to identify the main
ment, owners, and stakeholders (Rosenau, 1999). challenges.
The aforementioned public-private partnerships
were mainly aimed at increasing public services
efficiency by introducing the entrepreneurial spirit CASE: AN ARCHITECTURE FOR
of private organizations. However, this may lead INTEGRATED SERVICE DELIVERY
to democratic, public and political costs, like
privacy and public responsibilities on failures The motivation for the development of the architec-
of private parties (Flinders, 2005; Rosenau, ture stems from the observation by several larger
1999). The clear allocation of responsibilities and governmental institutions and private parties in the
roles and introducing other types of governance Netherlands that cooperation is necessary to meet
mechanisms may help to avoid the occurrence of the demands of citizens and enterprises, in order
these negative aspects. Clear responsibilities, in to bring about a truly demand-oriented e-govern-
combination with SLAs creates a setting in which ment (Lankhorst & Derks, 2007). This resulted
trust can develop between partners. in the B-dossier project (http://www.b-dossier.
nl), a joint research initiative with partners from
government, academia and business. The project
RESEARCH APPROACH aims at establishing requirements and solutions for
public-private service networks. In this setting a
In this chapter we present enterprise architecture generic functional architecture and a demonstrator
guidelines for integrated service delivery and have been developed. Both the architecture and
identify the main architectural and governance the generic end-user interface were applied to the
challenges therein. Based on the literature survey case study in the Netherlands.
in the previous section, a case study in the Dutch Part of social security facilities in the Neth-
public sector was conducted. This case concerned erlands is the household care. People can apply
the design of an architecture for the allocation of for this facility in case they cannot take care of

270
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

their household themselves. In these cases, these is entitled to, based on the degree of dis-
persons apply for a personal budget, which can ability.
be used to buy the necessary care. This has the Social Insurance Bank (SVB): SVB pro-
advantage that people can choose the care they vides (among others) services to holders
need themselves, but this comes at the cost of of a personal budget to relieve them from
considerable administrative overhead. In the administrative overhead. SVB is a large
context of the Social Support Act (abbreviated as organization, with over 4000 employees.
WMO (Wet Maatschappelijke Ondersteuning) in Dutch Tax and Customs Administration:
Dutch) the social security facility of household The tax office provides income details on
care has been decentralized by the government which the budget is based.
from the national level to the municipal level. Care providers: Organizations offering
This act combines several laws on care entitle- household care.
ments. As a part of this law, municipalities have
become responsible for providing their citizens Generic Process
with appropriate services to support them. In
our case we investigate the application of our In order to research how a demand-driven elec-
architecture to a new portal initiated by the City tronic portal could be realized in the WMO case,
of The Hague to facilitate the WMO. The City a prototype of such a portal was developed by
of Hague sees public-private service networks Residentie.Net and was branded WMO-portal.
as a powerful means to provide demand-driven, A typical process consists of the following main
integral services to citizens. This is demon- steps.
strated by her initiative to start Residentie.Net,
an internet portal for citizens of The Hague that 1. Application: If a client thinks he/she may
connects citizens to public and private services be entitled to household care, the client can
in one portal. This portal supports citizens of The apply for this care him/herself, using the
Hague in acquiring and managing their personal WMO-portal. The portal features a process
budget for household care. The following public plan that consists of a number of sequential
and private stakeholders are involved: steps;
2. Check entitlement: One of these steps is
City of The Hague: The Hague is the seat the application for household care. Part of
of the Dutch Parliament and serves as the the application form is a field with the cli-
International City of Peace and Justice. ents income. This data can be provided by
As a municipality it is responsible for the the Dutch Tax Office. Whether the client is
implementation of the WMO, including entitled to care, is decided by the Centre for
household care. Care Entitlement (CIZ);
Residentie.Net: Residentie.net is a public- 3. Contract: If the application is accepted,
private partnership creating a digital portal the client can search for a household care
for the community of The Hague. The mis- provider. Once a provider is selected, a for-
sion of Residentie.Net is to connect citizens mal contract will be made using a template
of The Hague to public and private parties provided by the portal. Both the client and
to encourage use of public and private facili- the provider can sign the contract digitally,
ties. from their computers;
Centre for Care Entitlement (CIZ): This 4. Receive and consume care: Household
institute decides how much care somebody care is provided for the period and amount
of care the client is entitled to;

271
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

5. Manage budget: During the period the the Archimate language, which is an architecture
household care is effective, the client can description language derived from several other
manage his/her budget in the portal. The languages and shows the dependencies between
SVB can help the client in administrative architectural layers (Lankhorst, 2005).
overhead. Figure 5 shows that services and functions
related to authentication and authorisation are
The main steps of this process are schemati- seen as part of the shared infrastructure, and
cally shown in Figure 4. The client passes through are delivered by separate providers. Those third
the individual steps in the process that is facili- party organizations are shown in the left block
tated by the portal. The actors presented in the (shared infrastructure). The delivery of sub-
previous paragraph are also shown; the City of services, adapting these services to the clients
The Hague is overall responsible, Residentie.NET question and the integration of information from
offers the portal and the other organizations are several sources all are examples of functions that
shown in the lower layer, each offering services are executed by the service providers involved in
that are part of the overall process. It is clear that the cross-agency process. These service providers
this case suits our description of service-delivery are the organizations that provide (parts) of the
by a network of public and private organizations, service-delivery. Integrating all required services
thereby illustrating the fragmentation. and the supply of user information is done by an
application, which in turn may be provided by
The Architecture a third-party. This is shown in the upper part of
Figure 5 and may be seen as the core functionality
The enterprise architecture for demand-driven of a demand-driven architecture, and therefore
e-government was applied to the WMO case in under the direct responsibility and supervision
a functional architecture specific for this case, of the client (Lankhorst et al., 2006, p. 55).
the functional architecture was developed in the The architecture supports the generic process
B-dossier project (Lankhorst, Derks, Fennema, of the user, which starts when the user logs-on
Iacob, & Joosten, 2006). Figure 5 provides an and is authorized. The user can browse and/or
overview of the most important services and func- search the directory of services and information
tions of the architecture. This figure is drawn in and create and update a step-by-step plan. The

Figure 4. Generic WMO-portal process

T h e H a g u e (re s p o n s ib le )

W M O -p o rt a l R e s id e n t ie . N e t
C lient

C hec k S et up R e c e iv e M anage
A p p lic a t io n
e n t it le m e n t c o n t ra c t c a re budget

T ax
C IZ C a re p ro v id e r SVB
A d m in is t ra t io n

A c to r e x e c u tin g th e p ro c e s s

272
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

Figure 5. An overview of the service architecture blueprint (Lankhorst & Derks, 2007; Lankhorst et al.,
2006, p. 55)
In te g ra te d d e m a n d -
d rive n s e rvice

P ro ce ss o rch e stra tio n In fo rm a tio n su p p lie r

S te p -b y-ste p P ro ce ss sta te In fo rm a tio n


p la n s a n d h isto ry ce rtifie d b y u se r
a n d s o u rce

S h a re d in fra stru ctu re S e rvice p ro vid e rs

U se r lo g -o n A d a p ta tio n In te g ra tio n In fo rm a tio n


D ire cto ry se rvice
se rvice se rvice se rvice su p p ly s e rvice

A u th e n tica tio n o f F in d in g se rvice s S e rvice b y In te g ra tin g


A d a p t se rvice s
u se r a n d in fo rm a tio n se rvice p ro vid e r in fo rm a tio n

A u th e n tica tio n P ro vid in g


se rvice su b- se rvice
T ra n sa ctio n
se rvice D ata v erified by s ourc e
A u th e n tic
A u th o riza tio n o f A u th o riza tio n in fo rm a tio n
u se r se rvice D ata v erified by u s er and
s ourc e

user can also configure and manage the applica- Solving the Fragmentation of
tion, for example to authorize access to his file. In Services Across Many Different
these steps, various application services are used, Organizations
like those for authentication and authorization
(Lankhorst et al., 2006, p. 53). Process orchestration. End-users are faced with
The functional architecture is based on the the fact that services are dispersed over multiple
service-oriented architecture paradigm and con- organizations. End-users need support for the
sists of a set of requirements and guidelines for an management of scattered service provisioning.
architecture for public-private service networks. The proposed solution to this fragmentation fol-
These guidelines are divided into four categories: lows the lines of the B-dossier functional archi-
(1) fragmentation, (2) compatibility, (3) quality tecture (Lankhorst et al., 2006). This means that
and (4) access. Those requirements are derived the basic infrastructure of all service providers (in
from the enterprise architecture and translated this case the City of The Hague, CIZ, SVB and the
to the case at hand. For a full list of guidelines Dutch Tax and Customs Administration) remains
and requirements we refer to Lankhorst and in place. Residentie.Net plays a central position;
Derks (2007). We limit our description to those it provides a broker function that facilitates the
requirements that proved to be challenges in the operation of the public-private service network. As
public-private service network we investigated. such, Residentie.Net provides a generic orchestra-
tion service that is able to execute the step-by-step
plans. In this application, The Hague provides the

273
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

step-by-step plan to Residentie.Net, in such a way to Residentie.Nets access control. The client
that its users can orchestrate the process. controls access to his/her data stored at different
Single identity. End-users and employees have service providers from Residentie.Net. In addition,
different accounts at different service providers. the client can authorize other users and service
Users and entities are registered in different ways providers to view data.
at different registries. There is a need for managing
these identities in order to create a uniform identity. Compatibility of Service Demand
In the case, each service provider is allowed to and Supply
maintain its own registration of identities, in order
to provide maximum flexibility. When a service Translation support. Terminology used by ser-
provider exchanges data, the identity service at vice providers and end-users is often idiomatic.
each provider generates pseudonyms for the keys This increases the chance of errors in the service
of the data items, such that third parties cannot provisioning process. In the case, the translation
easily combine data. This way, the privacy of of terminology is performed by the service pro-
users is guaranteed. viders that interact with the client. They address
Single authentication. End-users and employ- the target group in their own terminology. The
ees have to authenticate themselves for most of the generic architecture foresees in a translation
service providers separately and each organiza- service to facilitate the necessary interoperability
tion has its own facility and user administration. on syntactic, semantic and organizational levels
Therefore, a single sign-on facility is desirable for (Lankhorst et al., 2006). However, this has not
true integrated service delivery. A single sing-on been implemented yet.
is created by accepting the authentication at one of
the service provider by the other service provid- Quality of Services
ers in the service network. This means that users
that are authenticated at Residentie.Net are also Choice of services. In many cases, service pro-
authenticated (indirectly) at The Hague. Similarly, viders are pre-selected by some party. Often, the
authentication of employees by SVB is accepted reason for this is not regulation, but operational
by Residentie.Net. efficiency. Therefore, end-users should have the
Single authorization. Exchange of information freedom to select and execute services they find
among service providers is often cumbersome. most suitable. In the WMO case, a directory of
Either service providers cannot access the in- household caretakers is maintained, which al-
formation of the client such that the client needs lows a client to select one of those caretakers. A
to provide the same information over and over client may also decide to choose another service
again, or information is exchanged without the provider.
consent of the owner. Each service provider has
its own access control infrastructure, including Accessibility of Services
policy enforcement, decision, administration and
information points (Demchenko et al., 2005). Each Access. Service provisioning in our case study
of the service providers has a policy enforcement involves many providers, many services and much
point that controls the transaction service on the data. This requires access control and consis-
end-users records. At Residentie.Net there is an tency preservation. In the WMO case, access to
integral transaction service that has access to the the records of a client is controlled by the client
transaction services of the other service provid- his/herself through Residentie.Nets authorization
ers. The integral transaction service is allocated services, and by the service providers through

274
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

their authorization services. Consistency can be CHALLENGES


achieved by direct access to the clients records at
other organizations, trough Residentie.Net. Still, In the previous section, a number of requirements
the client is in control and he/she may decide to on the enterprise architecture for public-private
supply data him/herself, e.g. fill in a net income, service networks and their fulfilment in the WMO
rather than importing the data from the Dutch case are described. The requirements are imple-
Tax and Customs Administration. mented in a demonstrator and various choices
Informed consent. An end-user may desire concerning the implementation were made. Many
or need to share information with other users or other ways to implement these requirements are
service providers, for example to get assistance. A possible and we do not know the best way yet. As
requirement is that users should be able to explic- such, each of the aforementioned requirements can
itly grant access to this data. In the architecture be viewed an architectural challenge in developing
and demonstrator for this case study, a client can a public-private service network.
explicitly authorize an employee of a service The overall challenge is to design an enterprise
provider to remotely access his/her information, architecture that allows public and private partners
in order to assist the client in a step. to cooperate in a service network. Besides the
Context-sensitive role-based access. A user or architectural challenges, this overall challenge
service provider may provide others with access to also puts challenges on the governance of the
services and data. For example, a user may grant architecture. We describe the main architectural
another user to perform some service for him and challenge first and then turn to the challenges
therefore grants access to all data that is required on the governance aspects in a public-private
to complete the service. This access should be service network.
context-sensitive and based the role the user that
gets access should play. An example from the case Architectural Challenges
is that a client could allow (registered) household
caretakers access to the application form. The ac- The overall architectural challenge is to allow
cess is only allowed in the context of the household public and private partners to cooperate in a
care request (context-sensitive) and only granted service network. The requirements discussed in
to household caretakers (role-based). The context the preceding section are at the same time the
and role are both captured in the authorization challenges that need to be met by the enterprise
records stored at Residentie.Net. architecture. Partners can connect to the archi-
Logging of access. For acquiring manage- tecture by using standardized interfaces in the
ment information for control purposes, it should developed enterprise architecture. To reach the
be logged who had access to what data and ser- ideal of a flexible architecture for public-private
vices at what point in time. Also the requests and service networks, the interfaces should be further
outcomes of services should be archived. Each decoupled from organizational processes and
public and private service provider has a logging systems. This allows partners to plug-in or -out of
service. Aggregating this variety of data is neces- the service network, in analogy to the electricity
sary for creating an overview of the management network where you just connect using the power
information. In the case, Residentie.Net monitors plug and eventually use adapters to translate one
the access by the client and other users of the format in another format. This plug-in principle
information of the client. This allows for tracking is schematically depicted in Figure 6.
use by service providers of clients records. All of the requirements described in the previ-
ous section can be directly translated into chal-

275
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

lenges for such a plug-and-play architecture. For accessible, but this doesnt solve the fact legacy
this case, the most notable challenges are resolv- systems are involved.
ing a lack of standardization, coping with legacy The ability of a system to adapt to the number of
systems and designing a scalable architecture. partners involved, the volume of data and transac-
The involvement of different service providers tions, etc. is referred to as scalability (Medjahed,
deals with a lack of standardization among various Benatallah, Bouguettaya, Ngu, & Elmagarmid,
service partners. Technologies like Web Services 2003). The demand-driven architecture is very
can solve technical problems of interoperability, high-level (as shown in Figure 5) and has only
but terminology used by service providers and been specified to a few cases. Since the architec-
end-users is often incompatible. This increases ture deals with a number of partners, the service
the chance of errors in the service provisioning networks are complex. Scaling the architecture to
process. In addition, incompatibility may result include more services or a wider variety of service
in inefficiency at the service providers side. The providers increases this complexity even more.
architecture should be able to translate service Service oriented architectures are better at this
providers and end-users terminology. The chal- than traditional architectures are, but scalability
lenge of overcoming incompatibilities grows as remains a challenge nonetheless.
more different organizations are included in the The architectural challenges cannot be re-
service networks. solved without governance of the architecture. The
Coping with legacy systems is another interop- success of a plug-and-play architecture depends
erability challenge. As the number of partners on the compliance to governance mechanisms and
grows, so does the number of legacy systems principles. Especially accountabilities and respon-
involved in the cross-agency process. Standard- sibilities need to be clearly allocated to partners
ized interfaces can help in making legacy systems in the service networks. In the case, the overall

Figure 6. Orchestration by standardized sockets

P u b lic se cto r P riva te se cto r

D utc h G ov ernm ent R eferenc e A rc hitec ture V arious enterpris e arc hitec tures

T ax H ealth c are C ons truc tion


M unic ipality ...
A dm inis tration prov ider c om pany

S e rvice o rch e stra to r

Integrated
s erv ic e

276
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

responsibility was assigned to the municipality, Availability of Management


in this case the City of The Hague, as required Information
by law. The City of The Hague is innovative and
already uses Web service technology to allow If a process is executed by various partners
for communication with partners. Combining and includes many services and data, acquiring
these technological standards with Service Level management information is a challenge. Some
Agreements should result in an architecture with questions can only be answered if data sources
standard sockets for partners to plug-in (or out). of multiple organizations are combined. In the
case, the logging of access is standard facility
Governance Challenges for providers and disclosure is considered not a
problem. The challenge remains to track back the
The view on process orchestration, as depicted in executive data among different service providers
Figure 2, assumes that a cross-agency processes to create a complete picture of a service-process
can be centrally orchestrated. In reality, the situa- that has already been completed.
tion is often much more complex. For various parts
of the process there can be different orchestra- Including Private Partners
tors. Moreover, there can be a nested structure in
which an orchestrator coordinates sub-processes The creation of demand-driven electronic govern-
that are each managed by their own orchestra- ment requires the inclusion of relevant private
tor. The challenge is to gain insight in layered partners. These partners could improve the overall
or distributed orchestration mechanisms, which quality of the service by adding functionality
enables the client to orchestrate the high-level or by completing a chain of related services by
service according to his needs, but also enables integrating sub-services with public providers
the actual coordination of all sub-services in order services (thus, realizing a one-stop-shop). Spe-
to provide that service. cifically for public-private cooperation there is
This is a challenge that is not specific for an implicit assumption that private organizations
public-private service networks, but is relevant to do certain things best while public organizations
cross-governmental processes as well. Including are better at other things. Cooperation between
private partners adds to this relevance and com- these sectors should ideally bring the best of both
plexity. It is usually not possible to predefine a worlds (Pongsiri, 2003; Rosenau, 1999).
cross-organizational process and actually enforce Although partnering with private organiza-
it. Private partners often have their own specific tions offers the possibility of integrating services
processes and orchestrators and need an orches- and thereby bringing about demand-driven ser-
trated interaction with governmental agencies, vice-delivery, cooperation with private organiza-
without being forced into an orchestrated overall tions can also have disadvantages for government.
process. This adds to the challenge. Public values like the uniformity of the channels
From the case study and the literature review, used, the equality of rights and access for citizens
we identify a number of governance challenges and the privacy of citizens might not be warranted
that can be seen as requirements on the coordina- and depend on the quality of a private organization.
tion or orchestration of the enterprise architecture Focus on profits may lead private organizations
for public-private service networks. to address only those clients that are profitable.
Agreements about service levels, the monitor-
ing of quality, allocation of responsibilities, and
how to deal with problems have to be made to

277
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

guarantee these public values. The exact role and mechanism. In the Netherlands this means that
responsibilities of each of the partners (public and organizations would like adopt the governmen-
private) should be specified to facilitate public- tal citizen service number (abbreviated as BSN
private cooperation. (Burger Service Nummer) in Dutch), rather than
On the issue of privacy, the case shows con- introducing their own identification within each
cerns by public organizations for sharing pri- service provider. The citizen service number can
vacy sensitive information with private partners. be viewed as one of the building blocks of the
Citizens expect their government to handle their enterprise architecture. Private parties also like
confidential information with care. This requires to adopt this BSN, but it is still unclear if this is
agreements on what information is shared among going to be allowed. Thus, using a single identity
partners, and these agreements should be trans- may be blocked if private parties are involved.
parent in order to demonstrate that information is In line with the adoption of BSN, governmental
shared only if necessary for the provision of the parties as well as private parties favour a global
service. A citizen should have a (last) say in what authentication service for citizens over federated
information is shared with private partners. authentication. A challenge service providers face
with federated authentication is insufficient trust
Developing Trust Between Partners of authentication by third parties. Both govern-
ment and private parties would like to adopt the
Differences in interest may occur between public global authentication service DigiD that is of-
and private organizations, for example a conflict fered by the Dutch government.
of interest; Business is in the business of selling A problem with the current global authentica-
us as much as it possibly can, says Mintzberg tion facility is that private parties are not allowed
(1996, p. 77). The objective is making a profit, to use it. Another problem regarding a global au-
while governments use public money to achieve thentication service are concerns on availability,
public goals. Another example is transparency; for example, the fear to become too dependent on
businesses may want to disclose the least possible the central authentication service for its service
information in order to keep or gain a competitive provisioning. Therefore, despite the preference
advantage. Public organizations on the other hand for global authentication, federated authentication
must be transparent. These types of conflicts of is still present in some organizations and single
interests cannot always be avoided; they have to authentication remains a challenge.
be dealt with (Flinders, 2005; Rosenau, 1999). The considerations not to trust authentication
This calls for a mechanism to govern coopera- services of third parties are also seen in the context
tion between public and private partners, in order of authorizations. Organizations are generally
to cope with conflicts of interests. One way to reluctant to trust authorization services by other
achieve this is by reducing conflict potential, parties, for example because of the responsibility
allowing partners to develop trust relationships. public institutions have with respect to citizens
In the case, we found a number of examples that privacy. Security is extremely important in order
stress the importance of trust between partners, to enable the service network to build relations
both public and private. based on trust. This requires a security mecha-
One of those examples derives from the ar- nism, for example in authentication and autho-
chitectural challenge of creating a single identity. rization services, certification and verification
Service providers appear to be biased towards functionality.
the adoption of a global customer identification

278
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

Orchestrating Interactions This shows a trade-off in building public-private


service networks. On the one hand, there is more
The concept of orchestration as presented in this security by clear and strict contracts; on the other
chapter is overly simplified. For explanatory pur- hand there is more flexibility by loosely-coupled
poses, Figures 2 and 3 illustrate a situation in which networks. It is a challenge to design SLAs that
one of the partners handles the interactions with enable a flexible network, while providing enough
the client. In reality, individual service providers security for all parties involved.
often have contact with the client themselves, These SLAs are extremely important, for
and with other partners. They independently example because in organizational networks the
run parallel processes that sometimes interact costs and benefits are often spread over the vari-
on a common case. On top of that, sub-services ous organizations. The interdependency of costs
are seldom of the simple request-response type. and benefits over organizations causes a unique
More often than not, the services that are delivered challenge. The organizations that need to invest
by a partner are too complex to refer to them as in the architecture may not gain return on their
one sub-service. In reality, this often involves a investments. For example, in our case study, The
set of services and a complex pattern of interac- Hague is responsible for creating integrated ser-
tions, often including both technical and human vice delivery and bears most costs associated with
components. the infrastructure of Residentie.Net. As a result,
These complex interactions in an orchestra- there is no or only a limited incentive for partners
tion require an extension of the simplified model to develop or improve the enterprise architecture.
of orchestration as is discussed in this chapter, Furthermore, the unequal division of benefits may
because orchestration comprises not just respon- cause opposition to necessary changes.
sibility and contractual relations between service Riggins and Mukhopadhyay (1994) found that
partners and/or the client, but also the operational for electronic interactions, unequally distributed
coordination of their service processes (which benefits affect the initial adoption decision nega-
may run in parallel) and the interactions between tively. Furthermore, they found that how organi-
partners and/or the client. Designing such a generic zational partners implement and use the system
model for orchestration is a challenge. internally and externally may directly affect the
level of benefits. An organizational modification
Establishing Service Level may result in specific benefits for that organiza-
Agreements tion, but not necessarily for the network.
Prior to the architectural efforts, it may be
If organizations decide to open up their records necessary to negotiate the division of the costs
to partners, they like to maintain some level of and benefits among participating organizations.
control to whom information is provided. Allow- This might not be easy, as the cost of implement-
ing partners access to the records of an organiza- ing a system can be relatively easily assessed, but
tion requires trust and strong authentication and the benefits are much more difficult to assess and
authorization mechanisms, since all organizations often comprise qualitative and/or non-tangible
need to rely on it. Besides these mechanisms, this benefits.
requires strict agreements that rule the roles and
responsibilities of each of the partners. Accountability and Responsibility
Contrary to these strict agreements is the de-
sire to create loosely-coupled service networks, In cross-agency service-delivery processes, al-
which ideally results in a flexible infrastructure. locating accountability for the combined service

279
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

is a challenge (Gortmaker, Janssen, & Wagenaar, ture and clear interfaces with the partners. This
2005). In complex orchestrations, it is necessary is visualized in Figure 6 by providing a platform
to specify who is accountable for failures like that allows for plugging in partners. Besides the
exceeding lead-times. This also extends to deter- technical implementation, it is a challenge is to
mining which partner can provide accountability determine governance principles and conditions
information to stakeholders or clients, if requested. to add and remove partners to the network. For
It should be specified who takes the lead and who example, an intuitively appealing governance
is responsible for monitoring the cross-agency mechanism is that one partner must not be removed
process and the quality of the services provided. before there is a suitable replacement. This may
These accountability issues and the allocation of be contradictory to a private partners interest,
responsibilities in a cross-agency process have thus calls for governance.
to be dealt with before an orchestration becomes
effective (Gortmaker & Janssen, 2004). Orchestrating Over Multiple
Maintaining transparency and accountability Channels
while including private partners, increases the
challenge. A focus on efficient public service Many organizations have implemented a multi-
delivery by public-private service networks, may channel strategy, or are considering to implement
lead to costs on democracy and equity (Flinders, one. Channels like the Website, the telephone and
2005; Rosenau, 1999). Central to democratic a counter desk require synchronisation of infor-
governance is the ability to hold public officials mation across channels. For service networks,
and government responsible for public services this means that not only various organizations
(Rosenau, 1999). Therefore, the governance of need to be taken into account, but also the vari-
public-private service networks should also be ous channels at the organizations. Orchestrating
held responsible for the performance of these across channels is a challenge that adds to the
networks. However, there is some evidence in complexity.
our case that the costs for public-private service
networks are in large parts or even completely
paid by the public partners. In the literature it is FUTURE TRENDS AND RESEARCH
even argued that this goes for responsibility as
well; if public-private service networks fail, the In order to realize demand-oriented e-government,
democratic costs are paid for by government services related to governmental processes are
(Flinders, 2005; Rosenau, 1999). It is therefore more and more executed by private organiza-
necessary to clearly allocate responsibilities in tions and these private organizations need to be
a public-private service network. This can for included in the service-delivery process. This
example be done by assigning orchestration roles stresses the importance of further expanding the
(Janssen et al., 2006). knowledge about developing and using enterprise
architectures for public-private service networks.
Flexibility The developed architecture deals with some of
the challenges and further research is necessary
Networks are not static and will likely change over to deal with them all.
time. Consequently, flexibility is necessary to add Since public-private service networks are
new partners to the network and remove existing rarely static, private providers will likely come and
partners without letting the service network fail. go. Takeovers, bankruptcies, changing strategies
This requires at least a loosely coupled architec- and specialization may lead to new providers of

280
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

certain services or to the disappearance of some among the two areas and how they can strengthen
providers. It may even lead to the disappearance each other is still scarce.
of all providers. Therefore, governments must be Since we have only studied one case, albeit
able to fill this void, even if it is very unlikely to extensively, this researchs main purpose was
happen, in order to warrant the continuation of to identify typical challenges in a public-private
public services. The versatility in providers of service delivery architecture and governance.
(partial) services requires the enterprise archi- Our findings call for additional research in this
tecture to be flexible and adaptive; partners must field to rise to the challenges identified here and
be able to plug-in to the network and play. The to further develop and test the architectural and
creation of a flexible and adaptive plug-and-play governance principles of public-private service
architecture requires further research. networks.
Orchestration of public-private networks be-
comes more and more important and influences
public sector efficiency and effectiveness. Orches- CONCLUSION
tration has gained limited attention by research-
ers. There is a lack of theory concerning which Cooperation by different partners in government
orchestration arrangement is the best for which and the private sector makes it increasingly dif-
situation, especially concerning the specificities of ficult to design an architecture for integrated
public-private cooperation. Moreover, orchestra- service delivery. Many challenges need to be
tion has had a central focus, which does not match bridged and some of them require trade-offs to
the layered or even decentralized nature of the be made. A uniform way of dealing with those
investigated public service network. These issues challenges does not exist yet. In our case study,
are addressed by an ongoing research programme the main elements of the service network were
at the Delft University of Technology that focuses outlined by an architecture. Architecture needs
on the orchestrations of complex public-private to be complemented by governance mechanisms
service networks. We need more insights into the to help communicate it to the various organiza-
requirements on public-private service networks, tions and to ensure that it will be used. Even the
which coordination mechanisms are able to meet division of challenges in architectural and gover-
the complexity of such networks and what type of nance challenges proved to be difficult, because
architecture fits these complex networks. the architecture cannot do without governance,
Although enterprise architecture is a single and vice versa.
research area, it is more and more interwoven Orchestration is viewed as the management of
with governance, which gives rise to the future the dependencies among public and private orga-
research direction architectural governance. nizations with clear allocation of responsibilities.
Architecture and architectural descriptions needs Our case study showed that taking the view of
to be governed by rules, where governance can one stakeholder, that is a too narrow view as each
be supported by architecture as an instrument for organization orchestrates its own activities and
communicating the current situation, potential various orchestration roles might be located to
future situations and the long term vision. Our different organizations. More layered or decentral-
case study demonstrated the interplay between ized forms of orchestration are subject of further
governance principles guiding the development of study by the authors. The architecture presented
the architecture and we conclude that architecture in this chapter is a step in the right direction, but
and governance should be considered simultane- still many challenges need to be bridged.
ously. Research investigating the dependencies

281
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

Architecture serves as a means for the com- REFERENCES


munication and prescription on how the goals
of such a project could be reached. It deals with Checkland, P. (1981). Systems Thinking, Systems
challenges on orchestration, authentication, Practice. Chichester: Wiley.
authorization, interoperability and scalability.
Demchenko, Y., Gommans, L., De Laat, C.,
Governance is necessary to deal with clear re-
Oudenaarde, B., Tokmakoff, A., Snijders, M.,
sponsibilities, ensuring public values like privacy
et al. (2005). Security Architecture for Open
and accountability and to interact with private
Collaborative Environment. Paper presented
parties. Even flexibility, which might initially be
at the European Grid Conference - EGC 2005,
considered as primarily a hard issue, needs to be
Amsterdam, The Netherlands.
accompanied by governance mechanisms. In order
to realize effective service networks, a trade-off Flinders, M. (2005). The Politics of Public-Private
must be made in flexibility, thus allowing part- Partnerships. The British Journal of Politics and
ners to plug in (or out), and strict contracts, that International Relations (BJPIR), 7, 215-239.
help in aligning parties and avoiding conflicts.
Combining organizations in a service networks Gortmaker, J. (2008). Designing a Reference
requires agreements and contracts, standards for Architecture for the Accountable & Adaptive
technology, implementation and governance of Orchestration of Public Service Networks. Un-
the network, the allocation of roles and respon- published doctoral dissertation (forthcoming).
sibilities, the building of trust relations and the Delft University of Technology.
alignment of processes and technologies. Only Gortmaker, J., & Janssen, M. (2004). Business
after these measures are taken, we can create ef- Process Orchestration in e-Government: A Gap
fective public-private service networks, and truly Analysis. International Resources Management
focus on citizens demands, instead of government Association (IRMA).
processes.
Gortmaker, J., & Janssen, M. (2007). Automating
Governmental Cross-Agency Processes Using
ACKNOWLEDGMENT Web Service Orchestration: A Gap Analysis. In L.
Al-Hakim (Ed.), Global E-Government: Theory,
Part of this chapter results from the B-dossier Applications and Benchmarking. Hershey: Idea
project (http://b-dossier.telin.nl) of the Tele- Group Publishing.
matica Instituut, a combined research initiative Gortmaker, J., Janssen, M., & Wagenaar, R.
with partners from government and academia, W. (2005). Accountability of Electronic Cross-
comprising the Dutch Tax and Customs Admin- Agency Service-Delivery Processes. EGOV2005,
istration, the Municipality of The Hague, SVB, 4th International Conference on Electronic Gov-
UWV, ING, ICTU, the University of Twente, and ernment, 49-56.
Delft University of Technology. The project aims
to support integrated, demand-driven electronic ICTU. (2007). Flyer NORA v2. Retrieved June,
services from public and private organizations to 15, 2007, from http://www.e-overheid.nl/data/
citizens and companies. files/architectuur/flyer-nora-v2.pdf
Janssen, M., Gortmaker, J., & Wagenaar, R. W.
(2006). Web Service Orchestration in Public
Administration: Challenges, Roles, and Growth

282
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation

Stages. Information Systems Management(Spring Mintzberg, H. (1996). Managing Government,


2006), 44-55. Governing Management. Harvard Business
Review(May-June 1996).
Janssen, M., & Hjort-Madsen, K. (2007). Analyz-
ing Enterprise Architecture in National Govern- Pongsiri, N. (2003). Public-Private Partnerships
ments: The cases of Denmark and the Netherlands. in Thailand: A Case Study of the Electric Util-
Paper presented at the Hawaii International ity Industry. Public Policy and Administration,
Conference on System Sciences (HICSS), Hawaii, 18(3), 69.
Big Island.
Provan, K. G., & Milward, H. B. (2001). Do Net-
Janssen, M., Kuk, G., & Wagenaar, R. W. (2008). works Really Work? A Framework for Evaluating
A Survey of Web-based Business Models for Public-Sector Organizational Networks. Public
e-Government in the Netherlands. Government Administration Review, 61(4), 414-423.
Information Quarterly, 25(2) (forthcoming).
Richardson, L., Jackson, B. M., & Dickson, G.
Kenniscentrum. (2007). NORA 2.0 (Nederlandse (1990). A Principle-Based Enterprise Architec-
Overheid Referentie Architectuur): Stichting ture: Lessons From Texaco and Star Enterprise.
ICTU. MIS Quarterly, 14(4), 385-403.
Lankhorst, M. M. (2005). Enterprise Architecture Riggins, F. J., & Mukhopadhyay, T. (1994). In-
at Work: Modelling, Communication and Analysis. terdependent benefits from interorganizational
Berlin: Springer. systems: opportunities for business partner reen-
gineering. Journal of Management Information
Lankhorst, M. M., & Derks, W. L. A. (2007).
Systems, 11(2), 37-57.
Towards a Service-Oriented Architecture for
Demand-Driven e-Government. Paper presented Rosenau, P. V. (1999). Introduction. The Strengths
at the 11th IEEE International EDOC Conference and Weaknesses of Public-Private Policy Part-
(EDOC 2007). nerships. American Behavioral Scientist, 43(1),
10-34.
Lankhorst, M. M., Derks, W. L. A., Fennema,
P., Iacob, M. E., & Joosten, S. (2006). B-dossier Ross, J. (2003). Creating a strategic IT architecture
architectuur. Enschede: Telematica Instituut. competency: Learning in stage. MISQ Quarterly
Executive, 2(1), 31-43.
Linder, S. H. (1999). Coming to Terms With the
Public-Private Partnership: A Grammar of Mul- Weill, P. (2004). Dont Just Lead, Govern: How
tiple Meanings. American Behavioral Scientist, Top-Performing Firms Govern IT. MIS Quarterly
43(1), 35-51. Executive, 3(1), 1-17.
Medjahed, B., Benatallah, B., Bouguettaya, A., Weill, P., & Ross, J. (2005). A Matrixed Approach
Ngu, A. H. H., & Elmagarmid, A. K. (2003). to Designing IT Governance. MIT Sloan Manage-
Business-to-business interactions: issues and ment Review, 46(2), 26-34.
enabling technologies. The VLDB Journal The
International Journal on Very Large Data Bases,
12(1), 59-85.

283
Section III
Realization and Deployment
285

Chapter XIII
People-Led Enterprise
Architecture
Neil Fairhead
Fujitsu Services, UK

John Good
Serco Consulting, UK

Abstract

This chapter provides an approach to Enterprise Architecture that is people-led, as a contrast to being
led by technology or modelling methodology. It identifies the major stakeholders in Enterprise Architec-
ture and suggests where in the organisation they may be found and how they may be connected with the
Enterprise Architecture. It highlights the roles of stakeholders throughout the process of defining and
implementing an Enterprise Architecture. The view of stakeholders managing the EA effort is described
through the complete lifecycle, from setting the EA mission to sustaining the benefits after implementation.
In proposing the adoption of such an approach, we aim to encourage a more direct link between Enter-
prise Architecture, the needs of the stakeholders it serves, and the pubic policy outcomes it enables.

Introduction people before technology. Based on the authors


experience working in both the public sector and
This chapter highlights the need to ensure that commercial organisations, it posits that the value
enterprise architecture, as both a discipline and of enterprise architecture comes from making it
set of deliverables, recognises the need to focus on easier to introduce successful change into organi-

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
People-Led Enterprise Architecture

sations and that this requires leadership by key is necessary, that it is possible and that it will
stakeholders. A key conclusion is that identifying, happen again and again. In short, People have
engaging and gaining real commitment by relevant to lead the change if they want other people to
groups of stakeholders is a critical success factor follow it.
for an enterprise architecture team. However, there are still many government
organisations where enterprise architecture is led
by a choice of method or framework, or a desire to
Background model the enterprise, before an understanding of
the problem, from the problem owners perspec-
Over recent years there has been an increasing tive, is obtained. Coupled with a typically long
focus in Government and the wider public sector distance from the determination of public policy
on technology and transformation. For example, and the delivery of public services to the chief
the UK Government published Transformational architect (if one even exists), enterprise architec-
Government Enabled by Technology (Cabinet ture has a long way to go to realise its potential
Office, 2005) as a key strategy for the reform in the public sector.
of public service provision and managing the This chapter, based on our experience of do-
relationship between citizens, organisations and ing enterprise architecture in the public sector,
Government. However, while technology does describes how enterprise architects can deliver
enable transformation, it does not cause it. People an approach in which people lead, and technol-
have to decide what transformation is needed and ogy enables, real business transformation. We
why. They have to think through all the steps which propose a both/and world not an either/or
lead from current situation to desired state and one. Both people and technology are necessary
build the plans to implement those steps. but the sequence is important. There are still far
People have to communicate to everybody too many large change programmes which come
impacted by the proposed change that the change close to failure because the people affected were
not involved early enough and so are not com-
mitted. It is not the technology that successfully
Figure 1. delivers transformation, it is people using the
technology. Beginning enterprise architecture
B usiness O utcom es with this simple recognition and ensuring that
people are at the centre of the architecture the
big picture of change is a strong first step towards
successful transformation.
S takeholders This approach, and therefore this chapter, is
as much about choices and values as it is about
specific techniques. Enterprise architecture is
about change. Change is driven by a need to
E nterprise A ssets improve the business outcomes. The current
outcomes are not satisfactory or are not sustain-
able. Stakeholders in these outcomes, i.e. people,
O rg a n isa tio n s
IT S yste m s
In fo rm a tion
P ro ce sse s

have to choose what needs to change in order to


C a p ita l
P la n t

achieve the improved outcomes. The changes are


implemented though changes to the enterprise
assets which are the subject of the enterprise

286
People-Led Enterprise Architecture

architecture. Hence the key link between the The stakeholders of the enterprise architecture
target outcomes and the enterprise architecture function provide the guidance and direction for the
is the stakeholder. Enterprise architecture must function to ensure that it is focused on the highest
therefore be people-led and people-focused to value priorities, that the architecture is developed
make a lasting and positive impact. in the most efficient and effective manner and that
the resulting products are fit for purpose and use.
Which People - Know your Understanding who needs what from enterprise
Stakeholders architecture, and why, is a critical step in ensur-
ing that the enterprise architecture gets used and
Architecture is about change, which means that so delivers real value. In this way we can ensure
it is about people. It is often stated that people do that stakeholders are active team members who
not like change. This is not necessarily true but are inside the EA process. (Further, committee
it is certain that they hate having change forced experience indicates that progress is best made
upon them without their understanding and in- with the top-level management team supported by
volvement. Done well, enterprise architecture can an architecture team composed of a small number
help ensure that change is actively adopted. As of full-time professionals dedicated to the task.
the U.S. General Accounting Office (2003, p. 2 National Research Council (2004).)
- our emphasis) states, Enterprise Architectures
provide: What Do We Need From
Stakeholders?
to people at all organisational levels an explicit,
common, and meaningful structural frame of refer- Stakeholders have a variety of contributions to
ence that allows an understanding of (1) what the make. Understanding clearly what we need from
enterprise does; (2) when, where, how, and why them is a first step to ensuring that we have the right
it does it; and (3) what it uses to do it. ones. The following items are typically important
to the success of enterprise architecture.
Recognising that communication is part of
the service that EA delivers, and that the value of 1. The first thing we need from stakeholders
any service is measured by the recipients, leads is direction in targeting the highest value
us naturally to placing stakeholders at the centre and most important issues as perceived
of our approach to developing, implementing by the business stakeholders. Developing
and maintaining an organisations enterprise enterprise architecture has significant cost
architecture. In this people-led approach, stake- since it requires high calibre, multi-talented
holders become subjects not objects. Stakeholder people. Most organizations find this type
management is no longer about how the enterprise of individual both valuable and scarce so
architecture function sells to or manages it is essential that we make the best use of
stakeholders but rather about identifying who them. But what is that best use? Enterprise
has real and significant needs that the enterprise architects need to get clear guidance on the
architecture approach can help to meet, and how priorities for improvement and the value
the EA function delivers to those stakeholders. they will deliver from people involved in
We must ensure that stakeholders actively man- all business functions. By ensuring that all
age the process rather than being passive players architecture work is focused on supporting
responding to the EA specialists. It is a team high value improvements, we can ensure
approach.

287
People-Led Enterprise Architecture

Table 1.
Focus on Value

The value of EA is related to its impact on the total, net, present, probable, realised value of the changes that it is
guiding. To improve this we need to focus on:
1. The highest 2. How to achieve 3. Delivering that 4. While identifying, 5. And ensuring that
potential value them at minimum value as soon reducing and the processes by
changes cost as possible managing the risks which the benefits
will be harvested
are in place.

that we are maximising the value of what chitecture was built without the involvement
we do. of the key people who can make it happen.
2. Stakeholders need to provide real business If there is no adequate intent to implement
insight into the business opportunities, then the architects are wasting their time
challenges and constraints in the specific and the organisation is wasting valuable
areas that have been prioritised. While resources.
good architects have an understanding of For example, when helping a government
the business, this is no substitute for being department to design its enterprise archi-
immersed on a daily basis. This insight can tecture function we went to visit another
often require the involvement of stakehold- organisation. We were very impressed by
ers with management responsibility for the their knowledge, their models and their
subject area. They will be leading the people tools. Then we asked who is using this?
most directly impacted as well as carrying The silence was eloquent. The lack of intent
the responsibility for achieving the business to implement was obvious. The value of all
improvements and harvesting the benefits. their efforts was questionable.
3. Architects need to ensure implementation 5. However, even when an architecture is
plans are realistic by getting user contribu- implemented, built out through changes to
tions. We need to avoid the situation where processes and systems and people, that is
the architecture has been developed but not the end. To quote Winston Churchill,
cannot be implemented because it is con- it is perhaps the end of the beginning. The
sidered too theoretical and does not respond success of the architecture depends on it
to operational realities. We need to involve having a sustained impact and delivering
stakeholders who understand the day-to-day continuing improvement. This requires
details, including history, attitudes, skills commitment at all levels rather than mere
and capabilities. In this way, the architecture acquiescence. Help in building this ongoing
will demonstrate understanding and can be commitment is another key contribution that
made tangible to the people whose activities we need from our stakeholders. They can
will be changed. ensure that we build commitment through
4. The fourth contribution needed from stake- responding to deep felt needs.
holders is building the intent to implement. 6. To be effective, we need our stakeholders
As we look at architecture work, how often to generate respect and to show it publicly.
do we see examples that were never imple- (This could be construed as a statement
mented? This often occurs because the ar- of the obvious but experience shows that

288
People-Led Enterprise Architecture

many EA functions are not respected, often things happen. Typically they are important line-
being considered ivory tower theorists who of-business and programme managers, however
are disconnected from business realities.) having authority, visible respect and owning a
However, we cannot just demand respect, priority task are also attributes of other key staff
we need to earn respect, delivering value and influencers who can link EA to business
by significantly helping key stakeholders plans, strategies and budgets.
who themselves are respected through the Customer stakeholders are focused on achiev-
organisation. ing significant business improvements and driving
any required changes. Typically therefore, they are
Stakeholder Roles managing many moving parts in order to achieve
specific, tangible and compelling improvements
Looking at the contribution that we need from in the performance of their areas. They need
our stakeholders leads to the recognition that enterprise architecture to provide structure, to
we can segment our stakeholders into different simplify where there is complexity and to ensure
groups. This will make it easier to identify the a consistent common understanding of what needs
set of stakeholders required for success and make to change, how and why. However, they are not
it easier to explain their roles and associated re- necessarily familiar with enterprise architecture
sponsibilities and contributions to them. There (which tends to come from within the IT or-
are three main segments; Customer, Builder ganisation) nor do they always understand how
and User stakeholders. Each of these has clearly enterprise architecture can deliver this service.
different roles. Note that this segmentation is by Hence, a key part of obtaining their agreement to
role so one person may be in more than one seg- becoming a stakeholder is making tangible to them
ment but different contributions are required in the contribution that enterprise architecture can
each role. This is a pattern that is regularly seen make. We need to show them that we can help to
in government where the same people or even increase their probability of success in ways for
group may have two quite different roles. (For which they are willing to pay. Only then are .they
example, from the Canadian Province of Ontario, likely to contribute their own time and involvement
Treasury Board/Management Board of Cabinet in developing the EA. Without that insight, they
is a joint committee of Cabinet established under will probably remain outside the process whose
the Treasury Board Act and Management Board of value will be severely diminished.
Cabinet Act. In its capacity as Treasury Board, it Builder stakeholders: They will create ar-
sets policy direction as the architect and manager chitectural artefacts. They are not necessarily
of the governments fiscal plan, makes ongoing located in a formal architecture function, but
decisions about operating and capital expenditures they are using architectural methods and creating
and ensures consistency and coordination. In its architectural products. For example, they may be
capacity as Management Board, it sets policy business analysts inside an operating division,
direction as the governments employer and modelling processes and designing improvements.
makes decisions about the governments people, Bring them into the architecture community and
land, buildings, technology and information. share both deliverables and best practices and
(Government of Ontario, 2006).) broaden the knowledge base being applied to
Customer stakeholders: They need the output developing the enterprise architecture. Note that
of EA to achieve bigger business ends. Here you they may also be outside the organisation too as
will find the sponsors, people with the need and partners working with your organisation together
the authority, both positional and personal, to make (for example, to create a shared service for a

289
People-Led Enterprise Architecture

single point of contact for citizens), or they may thinking about the users, their needs and wants
be vendors (for example, an outsourced service and how to help make them more productive.
provider).
Builder stakeholders are also valuable because Balancing the Needs of our
of the network they have. Often they are embedded Stakeholders
in the organisation in a way that the enterprise
architecture function is not, since it often resides By now it should be obvious that the needs and
in the IT function. The aim is to create a virtual contributions of our stakeholders can vary consid-
team which uses the same basic approach, fol- erably. This fact alone justifies spending time and
lows the same standards and contributes products thought on segmenting them and understanding
to a single, logical, repository of architectural those differences rather than just treating them as
information. In this way enterprise architecture a homogenous group. In addition, a key challenge
can help to simplify the complexity of a large of developing enterprise architecture is finding
organisation and make it easier for knowledge solutions that meet all their needs. There is no
and information to flow across the silos that still point in planning an architecture that perfectly
often form barriers to change. meets the requirements of one vertical in the
User stakeholders: They will use the products organisation if it causes problems in another.
of enterprise architecture in the implementation of There is no point in designing an architecture
change, be it to processes, to systems, to business which perfectly meets the needs of the Customer
relationships or to people and their goals, skills stakeholders if we do not have the ability to build
and performance. This group typically includes it. Similarly there is no point on developing a new
a rich variety of people, for example: enterprise architecture if the User stakeholders do
not take it and implement it. We do not merely need
Business improvement directors looking to knowledge of our stakeholders and a relationship
change key performance indicators who will with them, we also need a mechanism for resolving
need the business view products. all their different requirements and capabilities
Programme and project managers and their to the benefit of the organisation as a whole. The
solution designers who will use the archi- following diagram (Good and Fairhead, 2007)
tecture to drive change. shows how we can approach this.
Planners, such as an IT strategist looking This diagram shows the different types of
to simplify an organisations application stakeholder, gives examples of each and the
portfolio who will clearly need the products primary community that they represent. It also
of the information systems view of the en- shows the forum in which these differences can
terprise architecture. be resolved and a common direction provided
Corporate compliance manager concerned to the enterprise architecture development. This
about privacy who will need outputs from forum is the Enterprise Architecture Governance
the data/information view. Board. It is the core team of Executives, across
all the functions of the organisation who drive
User stakeholders are significant because if the the enterprise architecture function and focus it
products of enterprise architecture do not get used on the areas of highest value to the enterprise.
then they have no value. It is not the architecture The Board sets priorities for enterprise architec-
itself that is important but its use, and user stake- ture work, approves key architecture guidelines,
holders have enormous influence on that. From standards and products, oversees the quality
the beginning, enterprise architects need to be assurance of enterprise architecture work and is

290
People-Led Enterprise Architecture

Figure 2.

S ta k e h old e r R o le s
C u sto m e rs U se rs
(N e e d R e su lts) (U tilise E A P ro du cts)
B u ild e rs
(C re a te E A P ro du cts)
B u sin e ss M g t B u sin e ss M g t
B usiness A nalysts
E nterprise A rchitects
IT M a n a g e m e nt IT M a n a g e m e nt
D om ain A rchitects
S olutions A rchitects
E xte rn a l Infrastructure A rchitects E xte rn a l
S trategic S uppliers
A rch ite ctu re C o m m u n ity
O th e r O th e r
E n te rp rise A rch ite ctu re G o ve rn an ce
B o a rd
B u sin e ss C o m m u n ity P ro je ct & C h an ge C o m m u n ity
S o u rc e : S e rc o C o ns u ltin g

the point of escalation for issues concerning the Where is the cost and poor quality of infor-
implementation of architecture products. The mation causing a problem?
Customer members are responsible for ensur- Who is hurt by the time and cost of develop-
ing both business buy-in and business priorities ment and change of business systems?
and guidance. Who has big change strategies and pro-
grammes impacting many people, processes
How Do You Find Your Customer and systems?
Stakeholders? - Who has a Need? o How do you know if the projects and
programmes will/are achieving the tar-
Building the base of stakeholders is one of the get improvements? If you do not, what
most important tasks in enterprise architecture. problem does that cause, to whom?
Identifying potential Customer stakeholders is the o How do you ensure that your pro-
first step. We suggest that the following questions grammes and projects complement and
will guide the search. The initial objective is to enhance the value of each other rather
build a sufficient base to get started and to ensure than conflict and confuse? If you can-
that we are focused on the most important issues, not, what problem does that cause, to
not to be exhaustive. whom?

Where is the business stress? How Do You Find Your Builder


Who feels real pain from lack of an archi- Stakeholders - Creating a Virtual
tectural approach? Team of All the Architects
Where is the complexity and cost of systems
causing a problem? We have noted that many different groups can be
involved in building components of the architec-

291
People-Led Enterprise Architecture

ture, and not all of them need be, or often are, in 2. A mission of service: for the function not
the line-management of the Chief Architect. It is the organizational unit. Enterprise Archi-
highly beneficial that this be done in a coherent, tecture can be viewed as a profession, like
consistent and coordinated manner. To achieve engineering. Professions typically have
this we recommend that all the builders be seen as a number of key characteristics such as
members of a virtual team who work together to agreement on the purpose of the profession,
create the single overall architecture that reflects its mission of service. It highlights that the
the organisation as a whole while delivering to enterprise architecture does something re-
the individual business units within. ally valuable - and places value on you, the
Even though we are now focused down on the architect. The mission of service typically
Builder stakeholders, the architects themselves, also highlights the principles that you live
they are in many places and may not consider by (e.g., as demonstrated by the Hippocratic
themselves architects. These include the IT func- Oath);
tion (including centralised, decentralised or 3. Agreed common methods and tools: Hav-
outsourced), major change programmes and line- ing a common set of methods, standards,
of-business delivery units. Within each category formats and tools will make it much easier
there may be many instances (e.g. line-of-business to share information across all the differ-
units). In short, the virtual team will be much ent groups involved in creating enterprise
larger than you originally expect. architecture components and bringing them
It is valuable to carry out a reasonably com- together to create a single overall architec-
prehensive search for builders for two reasons. ture. A key part of creating a community is
First, you will have a broader influence and, as involving all the different teams in agreeing
the coordination improves, a bigger resource the standards and choosing the tools;
base. Second, the other architects will carry on 4. A sense of community: A community is
doing their job. Doing so in isolation increases made up of people, not organisational units.
the possibility of duplication of effort and may Ensuring that people want to work together
result in incompatible approaches that are only requires trust. Share the success. Be gener-
discovered at the implementation phase. As we ous - it will multiply and come back. Make
know, any rectification gets more costly the later sure people know of successes and that you
it is done. are promoting other peoples success.
In summary, People-Led Enterprise Architec-
ture ignores organisational boundaries to create How Do You Find Your User
the community. Obviously this means working Stakeholders - Meeting the Needs of
relatively closely across organisational boundar- the Implementers
ies which can be problematical. Four key things
can help: The third group are equally important and much
more diffuse the users of your architecture.
1. The Enterprise Architecture Governance Reaching them is a classic marketing exercise.
Board: Should represent, at a senior level, They need to be identified, segmented, understood
most of the organisational units involved. and communicated with. We need to think about
They can provide a remit that prescribes what we can do to make it easier for them:
this collaborative approach as well as defin-
ing the constraints within which it must be 1. To recognise that the deliverables of archi-
carried out (e.g., no transfer of budget); tecture can help them do their jobs better;

292
People-Led Enterprise Architecture

2. To know that appropriate deliverables may defined by each team in accordance with the
exist (i.e. it is worth looking for them); requirements of, and to meet the concerns of, the
3. To find those appropriate deliverables (or be relevant stakeholders. We have used a typical set
reasonably sure that they do not exist); of viewpoint names that have common currency
4. To retrieve the deliverables; in EA to illustrate the point.)
5. To give access to the builders to get a deeper
understanding of the deliverables if neces- Signing Up Your Stakeholders
sary;
6. To use the deliverables in the daily execution Of course at this point we have merely described
of their jobs. how you identify the stakeholders that you need,
which is not the same as getting them committed
Thinking about how our deliverables can be and signed up. Two elements are crucial to this.
used helps to both identify prospective users and First, do you have a heavy-weight sponsor? One
ways of segmenting them. In particular, it can be who believes that having an enterprise architecture
helpful to start with considering the typical users is important? Who really cares - and why?
of that major portion of the EA deliverables, the Again going back to U.S. Government experi-
major architectural viewpoints that are typically ence, the General Accounting Office reports that
defined. (It is not the purpose of this chapter to making IT investments without putting them
define the EA deliverables, as these should be into the context of architecture often results in

Table 2.
Architecture Typical Users
Viewpoint (examples, not exhaustive)
Performance Programme managers focused on outcomes not just outputs
Management Information Office focused on measuring and reporting
performance
Business Line managers focused on improving their processes
Business analysts focused on designing and implementing improved
processes
Human Resources focused on people, skills, training
Organisational development focused on how people and responsibilities
should be structured and organised
M&A focused on acquiring new high value capabilities or disposing of
existing non-core activities
Application / Developers building or maintaining applications
Service ICT financial management focused on overall lifecycle costs and their
reduction
Shared service centres working to maximise the return on their investment
through reuse of functionality
Line managers looking to improve the productivity of their people through
using applications and services already available
Information / Marketing management focused on what do we know about our customers?
Data Risk managers focused on being able to identify and measure key risks
Compliance managers focused on being able to prove the efficacy of key
controls
Technology Operations managers focused on simplifying the infrastructure that they run
to make it easier to manage, identifying single points of failure to reduce risk
or finding consolidation opportunities to reduce costs
Procurement looking to reduce licenses or increase buying power
Legal focused on ensuring that all software is legitimate

293
People-Led Enterprise Architecture

systems with requirements that are not clearly Of the contribution that enterprise architec-
and succinctly derived from business objectives, ture can make;
processes and targeted improvements as well as Of the risks of not having an architecture.
unnecessary repetition of functionality and com-
ponents which can result in excessive complexity Stakeholder Management Principles
and lifecycle costs.
Examples include the FBI Trilogy program One of the attractive components of TOGAF1 is
of which the National Research Council (2004) the structured approach it applies to principles. We
report stated: the FBI must first and as a matter suggest that this can be applied by the enterprise
of its highest priority in its IT efforts formulate architecture team to its stakeholders as follows.
an enterprise architecture. (page 3). When a You will need your sponsor to step forwards
key part of the programme, the Virtual Case and personally request other stakeholders to take
File (VCF), was cancelled in March 2005 after part, i.e. to get stakeholders first have a stakeholder.
costing $170 million it was described in IEEEs Any enterprise architecture needs a senior spon-
Spectrum journal as follows: This cavalier sor who understands the difference the structured
approach to software development would prove approach can make and is willing to press the
fatal to the VCF. Today, many organizations case to their peers. This case is based on the
rely on a blueprintknown in IT parlance as an contribution that enterprise architecture can make
enterprise architectureto guide hardware and to helping senior executives to achieve tangible,
software investment decisions.......The problem significant and compelling improvements. That
was, the FBI didnt have such a blueprint, ... contribution includes:
(Goldstein, 2005)
The key step in signing up stakeholders is Addressing complexity. Complexity slows
making them aware: diagnosis (whats happening), slows design

Table 3.
Name Stakeholder Roles

Statement The role of every identified stakeholder will be defined in terms of both what
they require from the enterprise architecture and what they will contribute to
the enterprise architecture.
Rationale Reasons for implementing the principle
Three types of role can be stakeholders in the enterprise architecture func-
tion, those who have a need for the enterprise architecture in order to achieve
bigger business objectives (Customers), those who will build enterprise
architecture products (Builders) and those who will consume the enter-
prise architecture products in their job (Users). Knowing why a role is a
stakeholder will make the enterprise architecture function more responsive
to the stakeholders requirements
Enable tuning of information flows to match individual stakeholders role,
e.g. meetings will have a narrower, more effective scope
Focus stakeholders on the contribution expected from them (i.e. being a
stakeholder implies responsibilities as well as rights.)
Impact of not implementing the principle
Overlapping responsibilities leading to confusion or discord
Implications Need to make very clear what the different roles are (and why), the selection
criteria, the authority of and the contributions expected from each role.
Need to identify the key stakeholders and gain their agreement to being a
stakeholder
Need to maintain regular communications with the stakeholder community

294
People-Led Enterprise Architecture

(whats got to change), slows development tively little continuity of decision makers
and slows implementation. Unnecessary with concomitant difficulty in recreating
complexity also adds cost and risk. As the how and why decisions were taken. This
CTO of Microsoft, Ray Ozzie wrote Com- causes two problems. First we can waste
plexity kills. It sucks the life out of develop- time and resources recreating information
ers, it makes products difficult to plan, build that has already been captured because the
and test, it introduces security challenges, people who knew the information have
and it causes end-user and administrator moved. Second, we fail to learn from pre-
frustration. (Lohr, 2006) vious work, whether successes or failures,
The enterprise architecture will provide because we do not remember how that work
knowledge and tools to identify where how was approached. Enterprise architecture
and why complexity can be taken out of the can make a very useful contribution to the
infrastructure and processes (including ICT) corporate memory provided that we set out
hence helping to identify unnecessary dupli- to do so and hence plan to capture relevant
cation of function, information and effort as information and hold it in our architecture
well as ensuring that differences in methods repository for use by our stakeholders.
reflect real differences in requirements not
just preferences. Remember: Stakeholder Management = stake-
Addressing uncertainty. Uncertainty can holders managing EA
stem from changes in needs, changes in pri-
orities and surprises (changes not predicted).
The objective is to think through the sources Realising the Architecture,
of uncertainty, plan how to respond to pos- from a People-Led Point of
sible alternatives fast (as opposed to planning View
for just one alternative) and recognise that
a change is arriving in advance so we have Essential to the people-led objective in realising
enough time to implement the necessary the architecture are motivated, skilled and in-
actions in response. formed senior stakeholders with a demonstrated
Providing corporate memory. In large or- consensus on the objectives and purpose of the
ganisations, including governments, there is architecture. The architecture team then has the
constant movement of people. In particular, responsibility to motivate, skill and inform the
high calibre personnel who are expected to participants to deliver the right things for the
achieve high rank and authority are often business.
moved relatively swiftly to give them a As enterprise architects, we have to continu-
broad experience as well as enabling them ously ensure that we are undertaking our work in
to climb fast in organisations with many response to a clear customer requirement, using
layers. In addition, in many commercial tools, methods and products that our stakeholders
organisations the ranks of middle manage- can understand and use, to a plan that fits with their
ment have been significantly reduced over own plans (from strategic enterprise objectives
the last two decades. For example the US through to tactical departmental ones).
Federal Government reduced its middle To provide a framework for describing our ap-
management ranks by over 20% (from proach to implementation, we have used a simple
161,000 to 126,000) between 1993 and 1998 5-step method as follows:
(Light, 1999). As a result there can be rela-

295
People-Led Enterprise Architecture

1. Identify the purpose for the architecture To achieve maximum value from investments in IT
(WHY) services and the efficient and effective delivery of
2. Develop a focused architecture framework change programmes through the design of optimal
that will serve as a means for people to enterprise and solution architectures.
deliver the value set out in the purpose
(WHAT) In the first there is no sense of why the EA
3. Develop a migration path and associated should exist, other than to be created for itself. In
plan of activities (HOW) the second, we understand the purpose to which
4. Implement the architecture approach the enterprise architecture is to be put and can
5. Review, measure success and revise. see in this the influence of customer stakeholders
(in this case the purchasers of IT services and the
The formulation of a complete and rigorous sponsors of change programmes).
method is not our purpose here, and we encourage In order to understand the needs of the stake-
the use of a more robust method as appropriate (e.g., holders you first have to identify them (see the
such as TOGAF ). However, we do commend Stakeholder Roles section). Stakeholders are
the people-led messages in each of the 5-steps be always working and operating in a particular
applied to whichever method you choose. context, defined by the drivers of change they face.
Such drivers include competitive pressures, cus-
Identify the Purpose tomer preferences, and other political, economic,
social, technological, legal or environmental,
At this initial step, we identify the purpose of PESTLE (Prime Ministers Strategy Unit, 2004),
the architecture. Without a clear and agreed un- external drivers. As people, they choose a response
derstanding of this purpose, we will not be able to those drivers that will (it is hoped) effect an
to provide focus and measure success. From our improvement in their situation. This response
people-led perspective, the main objective here is expressed variously as a requirement, resolu-
is to align ourselves with the motivations of our tion of an issue, realisation of an opportunity or
customer stakeholders and so provide a motiva- acceptance of a constraint. Together these will
tion for all stakeholders for engagement in the form the stakeholder concerns that will drive our
enterprise architecture. mission statement.
We have often observed a mission statement
for the enterprise architecture derived from a
definition of enterprise architecture itself, rather
Figure 3.
than from the purpose to which a customer wishes
enterprise architecture to be put. Compare the
D river
following types of mission statement:

To provide an explicit and cohesive description of S takehold er


our business from the perspectives of the business C oncern
strategy, operations, information systems and
technical infrastructure; R esp onse

296
People-Led Enterprise Architecture

The output of this exercise can be captured in to the delivery of the vision. It is useful to
a simple matrix with four items as follows (Good think of this in three parts:
and Fairhead, 2007): A first clause describing the core, cus-
tomer stakeholder focused, outcome-
Vision statement. A broad picture of what the based purpose;
future will be like. This statement need not A second clause describing how to
be constrained to the enterprise architecture. achieve motivated, informed and
It is often wise to paint a broad vision for skilled customers, builders and users,
the enterprise from the perspective of the and
stakeholders in the enterprise architecture. A third relating to the nature of the
This will then capture something of the ambi- resulting EA itself.
tions of the stakeholders, rather than of the Goals. For each element of the mission
enterprise architecture. It is useful to com- statement, a defined set of goals that will
plete the sentence A world in which... to contribute to the achievement of the mission.
get the right sense of a visionary outcome! There may be many goals, but around 3 to
Mission statement. A statement of the contri- 4 per clause in the Mission statement will
bution that enterprise architecture will make

Table 4. An Example of public-service enterprise architecture purpose matrix

Vision Mission Goal Success Factor


A world in which each To define a cost-effective, To align implementation of Access to development
citizen can choose the channel independent, the architecture with the local plans and alignment of
method, location and timing government service access development plans of all dependencies
of their access to government architecture that provides for stakeholders
services (e.g., renewing a a measurable, incremental
To rationalise the component All components and service
driving licence, applying for migration path to realisation
architecture, re-using existing building blocks must
a grant or submitting their tax through the maximum use
building blocks where be defined to the same
return) of shared components and
possible architecture description
services
standards
To enable the goals of To have the stakeholders in Alignment between
Transformational Government Transformational Government the Transformational
(Cabinet Office, 2005) adopt the enterprise government milestones and
directed by the CTO Council architecture the implementation of the
(Cabinet Office, 2007) and enterprise architecture
in partnership with strategic
To have the members of Enterprise Architecture to
information systems suppliers
the CTO Council use the provide for abstraction and
enterprise architecture in localisation where necessary
cross-government and local to enable both uses.
initiatives
through the definition of develop and deliver a repository meets the needs
an enterprise architecture repository that serves as the of all stakeholders, is
description that is tuned to single source of information trustworthy and simple to use
the needs of its users, easy to relating to the enterprise
search and use, accurate and architecture
complete.
develop and deliver a EA is integrated and aligned
consistently used EA method with change programme
and framework that is people- delivery methods
led in its derivation and use

297
People-Led Enterprise Architecture

be sufficient (any more will be difficult to prise architecture, users and builders may not be
track and manage); familiar with the artefacts and how to use them.
Success Factors. For each goal, a definition A useful principle is that architecture models
of the things that have to be done, and done come with people. This proposes that if a user
well, to assure success. It is important here or builder needs a model, it is always delivered
to focus on only those things that are critical, in person by an architect who can explain the
so as to provide for management attention model and its use, assist the user to use it and
in the high priority areas. provide ongoing assurance to ensure that the best
value is obtained from the product. With a wider
This model is motivated mainly by the cus- perspective, this engagement also ensures that
tomer stakeholders, and provides for linkages to updates are captured to enrich the model for the
user and builder stakeholder concerns. In order to next user and that the models remain relevant as
reflect this purpose back and provide motivation the architecture implementation progresses.
for its delivery for the people involved, we would
expect these goals to be translated into perfor- Plan
mance objectives agreed in the performance ap-
praisal and development plans of each stakeholder, The people-led objective in planning is to ensure
be they customers, builders and/or users. that we are informed about our stakeholder needs
and take them into account in planning our work.
Develop Architecture Framework We then use our plan to inform our stakeholders
of what we will do. This is crucial to obtaining
The people-led objective in developing our EA their support and involvement. Clearly this stage
framework and methodology is to develop stake- is also about good planning, but a plan is worth
holders who are skilled to use the architecture to nothing if it is not relevant to those it serves and
best effect. For the customer stakeholders, this is communicated to those it affects.
not so much of an issue, but for the users it means The key factors in our approach to planning
defining what they will have to be able to do to are direction and balance.
carry out their responsibilities, and for the builders
it is about enabling them to deliver Direction
The people-led approach starts with the users.
What architecture views do they need, and what As noted previously, the focal point in giving
services have to be provided by the EA team to direction is the EA Governance Board. In par-
enable this use? Once you know what the users ticular they will need to choose between different
need, you can look to off-the-shelf frameworks opportunities for applying the limited enterprise
and methods to adopt and adapt. In short, if you architecture function resources. While there will
cannot identify a user with a need, dont develop be ongoing enterprise architecture services (e.g.,
the architecture artefact or the service that goes management of policy and standards, management
with it. of architecture change) major enhancements will
Consideration should be given to creating an be delivered via projects focused on supporting
architecture service that defines how each archi- specific business requirements.
tecture product is created, used and maintained. Projects will mostly be initiated by senior
These services will be a lifeline for users and sponsors with whom the enterprise architects
builders in the wider architecture community. In should engage to agree their contribution through
the initial stages of developing and using enter- jointly defining a Statement of Architecture

298
People-Led Enterprise Architecture

Work. A request to develop such a Statement 5. The products to be developed have been fully
would be assigned to either the core enterprise identified and provision for their lifetime
or appropriate domain architecture teams. The management beyond the initial project has
nominated architect should ensure that the State- been identified. This is crucial as typically
ment responds to the specific requirements of the these products will define and impact the
project, but also wider concerns from any parent architecture for a period some time after
Change Programme (which typically exist to drive the project has ended;
the achievement of the most strategic goals and 6. There is a plan for the inclusion of the EA
will be concerned that the results of many projects Governance Board at the appropriate key
are cohesive in that context) and other enterprise milestones to provide review and assurance
architecture stakeholders. on the architecture products developed.
Once agreed, the Statement should be submit-
ted to the EA Governance Board for review and Balance
approval. The criteria to be applied to reviewing
the Statement would be expected to include: When the enterprise and the domain architecture
teams create the overall plan for developing and
1. The Statement is compliant and has been implementing the architecture, there needs to
approved by the project/programme and be balance between the local requirements of
architecture team management; projects and the broader requirements of wider
2. The Statement considers the direct needs of stakeholders. This is an architecture for people
the programme/project and also the wider to use, rather than for compliance with a compre-
concerns of other related stakeholders. These hensive classification or taxonomy.
would be expected to include related gov- In general terms we therefore propose that a
ernance boards (e.g., an IT or information broad architecture view is developed that models
security committee), standards bodies (e.g., the current and target enterprise at a high, but
involvement in related inter-Governmental specific, level. This initial view serves to provide
or industry standards groups), departmen- context for all the detailed work that follows, and
tal steering groups (in related functions of helps us identify overlaps and gaps in the com-
the enterprise, including in IT), business pleted architecture description. It enables usage
partners (e.g., in the case of ministry or as it allows the users to see where, in navigation
departmental collaboration), architecture terms, they are in the architecture at any point.
user groups (e.g., there may be a corporate For each of the prioritised purposes we then
data model or business process special in- drill down to provide complete pictures that
terest group) and product vendors (perhaps meet the business needs of a particular pro-
through membership of a user group); gramme, project or other group of stakeholders.
3. The work proposed is commensurate with the We do not drill down in each interrogative dimen-
objectives, timescales, risks and resources sion separately (e.g., by completing a standalone
of the programme/project and architecture data architecture) as this is of little use without
team; the context of the related models in other dimen-
4. All related impacts have been identified and sions. Typically we achieve this by managing two
there are no remaining assumptions (having sets of models: a series of composite models that
all been signed-off by an owner or reflected meet the needs of the users, and a series of atomic
in the project risk register where they have
been mitigated);

299
People-Led Enterprise Architecture

models that meet the needs of the architects to are engaged with and the people-factors in change
ensure cohesion and completeness across all the dealt with.
composites. This requires the enterprise architecture
We balance this pragmatic development with programme to have an explicit understanding of
periodic reviews, where we identify gaps and over- the culture, people, communications and how-
laps and resolve these, validating the relationships things-get-done-around-here, as much as the
between the elements, to improve the coverage, more procedural and structural elements of the
cohesiveness and standardisation of the architec- organisation such as governance and manage-
ture. These exercises are not just academic, but ment structures, delegated authorities, approvals
also assist in identifying opportunities for further processes, management processes etc.
value (e.g., by identifying overlaps in application The enterprise architecture programme should
functionality that may be rationalised). therefore formulate explicit strategies for how it
It is often useful to represent this balance be- will engage with the organisation to ensure the
tween short-term project implementation-focused definition, delivery and implementation of the
delivery and longer-term strategic development architecture.
using two-track planning, where tactical delivery
is tracked on one plan, and the achievement of Using and Enhancing Existing
strategic milestones on another. In this way, when Governance and Management
there is a preponderance of tactical requirements Approach
(as there always is!) the architect can demonstrate
the risk to strategic milestones and make the case The stakeholders we have identified will already
for retaining some effort in the plan for furthering know and be accustomed to their existing gover-
strategic goals as well as supporting immediate nance and management. We should not seek to
delivery. burden them with new modes of governance and
Further, such a two-track plan helps the EA management, but rather inject appropriate ele-
Governance Board as it enables two checks; 1) ments into the existing approach. The following
is the project proposed in line with the strategy are examples of this approach:
and 2) is the strategy being furthered in as best a
way as possible by the project. This later check is Enhancing the review criteria of existing
often the more difficult, as it suggests the ability OGC Gateway reviews (as defined by UK
to amend the scope of the project to ensure that Government) to include review criteria from
strategic benefits are delivered, which may not the enterprise architecture function (e.g., for
have the immediate approval of a project sponsor compliance with corporate data or technol-
focused on short-term benefit. ogy standards);
Providing architecture input into issue reso-
Implementation, Realising the lution processes to bring a comprehensive
Architecture view of the impact of alternative resolution
tactics for consideration by the stakehold-
The people-led implementation approach looks ers;
for the most value from the least impact on the Provide alignment between the service
people. This is not to say that we shy away from management metrics of IT services with
change, major change can be achieved without the performance indicators of the customer
negative impact provided that the stakeholders stakeholders.

300
People-Led Enterprise Architecture

It is important in all these examples to identify Using and enhancing existing programme and
unique and compelling criteria for the enterprise project delivery and management methodologies
architect that cannot be adopted by any other role. and frameworks.
Often this is in the enterprise architects view The same argument is applied to the work of
across the enterprise in terms of breadth (i.e., takes the enterprise architect with the solutions delivery
a view across many business domains) and time change programmes of the enterprise. The intro-
(i.e., balances short and long-term thinking). duction of new processes and techniques can be

Table 5.
Start-Up Feasibility Initiation Delivery Closure
Strategic
Critical business change projects delivering major elements of the enterprise architecture
Provide the Core EA team Core EA Core EA team Core EA team
project team works with team provides reviews and works with
with access to project team to certification certifies that project sponsor
the repository develop architec- that project is the design is to review EA and
Core EA team ture products compliant with compliant with EA contribution
provides advice Core EA team EA and/or terms EA and/or terms for review
on what informa- develops request of EA waiver of EA waiver Core EA team
tion may be most for waiver if Core EA team prepares RFC
relevant required and identifies content to EA content
works through for loading into or process if
EA Governance the repository justified by post
Board to get ap- project review
proval
Standard
Important, domain-based, projects, building on major EA elements.
Provide project Domain or Domain or Domain or Domain or
team with access infrastructure infrastructure infrastructure infrastructure
to repository team works with team provides team reviews team works with
Domain or infra- project team to certification and certifies that project sponsor
structure team develop architec- that project is the design is to review EA and
provides advice ture products compliant with compliant with EA contribution
on what informa- Domain or infra- EA and/or terms EA and/or terms for review
tion may be most structure team of EA waiver of EA waiver Domain or infra-
relevant develops request Domain or infra- structure team
for waiver if structure team prepares RFC
required and identifies content to EA content
works through for loading into or process if
EA Governance the repository justified by post
Board to get ap- project review
proval
Minor
Smaller projects with no material impact on the enterprise architecture
Provide access Domain or Domain team n/a n/a
to repository to infrastructure provides certifi-
project team team provides cation that proj-
ad-hoc support ect is compliant
on request by with EA
project team (no
waiver should
be required by a
minor project)

301
People-Led Enterprise Architecture

disconcerting for some people. The involvement Providing common tools and processes for
of the enterprise architect can benefit all stake- the delivery and management of project ar-
holder types (from the programme perspective) tefacts, and a repository service that outlives
as follows: the project to serve as corporate memory of
the project and the solution;
The programme customers may benefit Enhancing the requirements management
from an improved value opportunity as process by linking requirements to the
the architect identifies cross-programme relevant architecture views describing the
opportunities for re-use, sharing solution solution to enable change impact assessment
elements and simplification of systems and and configuration control (e.g., in release
processes; management).
The programme builders may benefit from
reduced cost and risk if they re-use exist- In these and any other examples, we suggest
ing enterprise architecture assets (such as keeping the enterprise architects own methods
a corporate process model) and this in turn and techniques hidden from the stakeholders
prompts the re-use of existing solution build- as far as possible. Exposure to architecture-
ing blocks; speak alienates stakeholders, sets barriers to
The users of the programme deliverables may communication and can create the impression of
benefit from a more cohesive and consistent architecture for architecture sake.
systems architecture that maximises the in-
vestments in systems and therefore in their Work with the Culture
own training, and reduces complexity.
There are many sources of guidance as to the pat-
It is useful for the programme and project terns of enterprise architecture to adopt that are
managers to be able to define the architects re- based on the nature of the problem to be solved,
sponsibilities to them, and their obligations back the business sector or the in-vogue technology
to the architects, and the enterprise architecture. paradigm of the day amongst others. Our people-
The following table of definitions and modes of led approach suggests that an examination of the
engagement (Good & Fairhead, 2007) provides culture of the enterprise, that is, of the way the
examples as the basis for developing such an people work with each other, communicate and
engagement model between project types and organise themselves and are led and managed,
project phases: will provide the driving influence both to how to
In addition, there are general techniques that go about implementing the enterprise architecture
would be shared between projects and enterprise and what sort of architecture to adopt.
architects. Again, we recommend adopting and Table 6 represents a simplified view of three
enhancing the standard practices where possible. cultural metaphors for enterprises, selected for
For example refer to Table 5. their contrasting suggestions as to the how and
what of an enterprise architecture.
Re-use of the PRINCE2 (OGC, 2005) prod- (This table is derived from the results of a
uct quality review technique for the enter- workshop run by the author (Good, 2004) which
prise architects reviews of the architecture itself was inspired by the writings of Morgan
artefacts produced by the project (assuming (1986) and the BBCs Leadership Programme
a PRINCE2 working environment);

302
People-Led Enterprise Architecture

Table 6.
How to do What EA to
Type of organisation Indicators of this type Examples of this type EA consider
Process-driven Strategy by structured Back-office processing-unit Decree Process-centric
analysis (e.g., processing benefits Centralised Centralised
Management focus on claims). Formalised Integrated
process Operational service-delivery
Decision-making by agencies
numbers
Systematisation of
work
Organic Strategy follows Vision Policy Unit Visions Federated
Leadership not man- Charitable Organisation Standards Standards-based
agement Overarching government Project-focus Interoperable
Consensus-based deci- departments that set the context
sion-making around a for delivery via various agencies
shared direction School
Focus on working
together
Networked Strategy by gut-feel Research department Subversively Localised
Leadership focus on Scientific or product R&D Networking Distributed
having conversations University By-Example Low-level
Autonomous and local
decision making
Ideas driven by the
people network

designed and delivered by Ashridge Manage- Monitoring, Measurement and


ment School.) Continuous Improvement
Viewed another way, the table suggests that
there are some approaches, which might be thought If we have established our vision, mission and
of as standard for enterprise architecture (such as goals as suggested at the top of this section, and in
defining enterprise-wide single function services particular developed these into individual objec-
as might be defined from an SOA approach, in a tives, then we must ensure that the measurement
networked culture) that are simply not suitable in activities are planned to monitor, review and take
a given culture because the people will not back action on progress towards achieving these.
them or work with them.

Table 7.
Stakeholder Customer Builder User
Key Criteria Did it deliver value? Did we do it well? Was it useful?
Example Questions Did the EA enable the Were our own processes Am I able to access and
preferred business outcomes? effective and efficient? Were use the EA?
Is the EA resilient to other we more productive? Does the EA enhance
business scenarios? What is the level of customer productivity?
Is it easier to judge which satisfaction in our work? Is the enterprise easier
investments to make? to understand, more
accurately?

303
People-Led Enterprise Architecture

To reinforce the people-led approach to enter- Periodic repository reviews will present op-
prise architecture, we suggest organising the terms portunities to measure how up-to-date the
of reference for the quality assurance reviews products are (against review and archival
carried out according to our three stakeholder dates), how used the products are, where
groups. This form of review ensures that the demand lies (e.g., by capturing search cri-
findings are directly relevant to our stakeholders teria) and therefore measure the usefulness
and engages them in addressing their issues and of the architecture.
concerns. This is in contrast to other approaches,
defined by the step in the process (e.g., define
purpose, or create plan), architecture view (e.g., Sustaining the Effort, Being
performance, business, information etc) or other ready for the Future
based on the structure of the architecture itself
which can often appear introverted (EA review In this section we look forward, to how we can
for EA) and meaningless for stakeholders. anticipate and prepare for the future demands
Of particular importance is the linking of User our stakeholders will place upon us. Much of
quality criteria to Customer criteria. For example, the work we need to do on an ongoing basis is
if a business/systems analyst on a major change described previously. We need to plan, execute,
programme is able to quickly and consistently review and revise our approach and architecture
gain access to information regarding the business on a continuous basis. We need to ensure that
processes in the enterprise and the applications our architecture governance is embedded in our
that support them, then there should be a link to day-to-day procedures and practices.
reducing the cost and risk of the programmes in When looking to the future and planning our
which the customer stakeholders are investing. future capability, we ask slightly different ques-
Opportunities for measurement can take many tions of ourselves, our customers and our users.
forms and the following should be considered as The following pragmatic questionsn (Table 8) can
good candidates: be asked, reflecting that we often have a view of
the specific changes planned by the organisation
At any enterprise architecture review of a over the next 18 months or so, but only a strategic
project, the use of a shared checklist to mea- view for the longer term after that (Good and
sure common objectives and criteria such as Fairhead, 2007).
compliance, product quality and error rates, Using the quality assessment matrix presented
customer satisfaction, resource deployment, previously (Table 7) you can assess your capabil-
timeliness of delivery will build up a picture ity maturity in a way that is innately tuned to the
relating to the engagement of the architec- needs of the stakeholders. Within each stakeholder
ture team with the project, usefulness of the assessment, maturity is driven by the following
architecture products and the effectiveness factors:
of the architectural processes;
Periodic EA plan reviews will enable wider Repeatability: The extent to which the
measures such as stakeholder engagement requirements of the stakeholders are met
and communication, success in hitting on an ongoing basis, not just in one-off
strategic milestones, resource utilisation project delivery;
and deployment, risk mitigation success to Resilience: The extent to which the capabil-
be measured; ity is flexible and adaptable to changes in
circumstances;

304
People-Led Enterprise Architecture

Table 8.

Optimisation. A m I getting the most out of what I m currently doing?

Prioritisation. A m I going to do the right things?


Preparedness. Have I the right resources?
Planning. W hat are my opportunities/constraints?
L everage. W hat can I re-use?

I mplementation. Is my strategy right?

Positioning.
Is my vision right?

Now 18 months 3 years 5 years

Value recognition: The extent to which there Conclusion


is explicit recognition of value achieved and
ongoing measurement of outcomes; We have proposed that when considering all as-
Coverage: The scope of implementation of pects of enterprise architecture, we take a people-
the enterprise architecture; led approach. Unless there is an explicit alignment
Usage: The extent to which all the artefacts between the interests of the stakeholders and the
of the enterprise architecture are used by all proposed architecture, there is a high probability
relevant stakeholders. that the architecture will not be implemented and
that the value of the enterprise architecture pro-
Using the understanding of our stakeholder gramme will fail to be understood and realised.
needs, now and into the future, the assessments This stands regardless of the feasibility of the
of enterprise architecture quality and the matu- underlying IT from a technical perspective.
rity assessment, you can plan required capability We have proposed that stakeholder manage-
going forward. ment means stakeholders managing us. That we
We should always remember that perfection specifically recognise, understand and be led by
often fails (as it is generally measured in technical our customers, involve the whole of the builder
terms rather than by the opinions of the stake- community and address the needs of our users.
holders) and constant improvement works. By We have seen how the general steps of defin-
listening and responding to our stakeholders in ing our purpose (why), our approach (what)
ways that they direct and find most appropriate, and our plans (how) is not only an intuitive
we will continue to improve our service and the approach but also addresses motivating, skilling
value we generate for the organisation. If there is a and informing our stakeholders.
single long-term goal, it is to make it easier for our We have suggested techniques for defining our
stakeholders to do the right thing, first time. mission statement and objectives and our imple-
mentation plan in the context of this people-led

305
People-Led Enterprise Architecture

approach, not least through the explicit recognition Light, Paul C (1999). The Changing Shape of
of the enterprise culture. Government The Brookings Institute, Policy
Finally, we have suggested that a people-led Brief # 45
approach to quality assessment would be one that
Lohr, Steve and Markoff, John (in press) Windows
would engage more directly with all our stakehold-
Is So Slow, but Why? New York Times; March
ers, by being tuned to their original requirements
27, 2006
and needs as we should have identified them at
the start of the enterprise architecture process. Morgan, Gareth (1997) Images of Organisation,
This in turn will lead us to plan the enhancement 2nd Edition, London. Sage Publications
of the enterprise architecture capability in line
National Research Council (2004). McGroddy,
with our stakeholders needs and better serve
James C., and Lin, Herbert S., Editors, A Review
them over time.
of the FBIs Trilogy Information Technology,
Committee on the FBIs Trilogy Information
Technology Modernization Program, Computer
References
Science and Telecommunications Board, Division
on Engineering and Physical Sciences, National
Cabinet Office (2005), Transformational Govern-
Research Council of the National Academies, .
ment, Enabled by IT. Retrieved 31st July 2007 from
ISBN:0-309-09224-8. Retrieved on August 6 2007
http://www.cio.gov.uk/documents/pdf/transgov/
from http://www.nap.edu/catalog/10991.html
transgov-strategy.pdf
Office of Government Commerce (2005). Manag-
Cabinet Office (2007), Chief Technology Officer
ing Successful Projects with PRINCE2 Manual
Council. Retrieved 31st July 2007 from http://www.
2005, 4th Ed. TSO (The Stationery Office).
cio.gov.uk/chief_technology_officer/index.asp
Prime Ministers Strategy Unit (2004). Strategy
Goldstein, H (2005) Who Killed the Virtual Case
Survival Guide v2.1. Retrieved 31st July 2007 from
File?, IEEE Spectrum September 2005, http://
http://www.cabinetoffice.gov.uk/strategy/down-
www.spectrum.ieee.org/print/1455
loads/survivalguide/skills/s_pestle.htm
Good, J (2004) Defining an Architecture Roadmap
U.S. General Accounting Office (2003). Informa-
that talks to the Enterprise Culture, EA Confer-
tion Technology: A Framework for Assessing and
ence Europe 2004, London, IRM UK Ltd
Improving Enterprise Architecture Management
Good, J and Fairhead, N (2007) Getting started in (Version 1.1), GAO-03-584G, April 1, 2003.
Enterprise Architecture EA Conference Europe Retrieved 3rd August 2007 from http://www.gao.
2007, London, IRM UK Ltd (copyright Serco gov/new.items/d03584g.pdf
Consulting, used with permission)
Government of Ontario, Office of the Premier
(2006). Description of the role of the Treasury Endnote
Board / Management Board of Cabinet. Retrieved
1
30th July 2007, from http://www.premier.gov. TOGAF is a trademark of The Open Group
on.ca/team/Committee.asp?Team=2 in the US and other countries

306
307

Chapter XIV
Using Enterprise Architecture to
Transform Service Delivery:
The U.S. Federal Governments
Human Resources Line
of Business

Timothy Biggert
IBM Global Business Services, USA

Kunal Suryavanshi
IBM Global Business Services, USA

Ryan Kobb
IBM Global Business Services, USA

Abstract

This chapter provides a case study on how the U.S. Office of Personnel Management has led the estab-
lishment of the Human Resources Line of Business (HR LOB). It explains how the HR LOB program has
used enterprise architecture to drive transformation to a new Human Resources service delivery model
across the United States Federal government. The authors propose that the common view and vocabulary
that EA artifacts provide, along with the collaborative governance that took place to create the artifacts,
has produced a solid business foundation for this extensive business transformation effort.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Using Enterprise Architecture to Transform Service Delivery

INTRODUCTION dozen agencies came together in dozens of work


sessions over a four year period to define a gov-
Enterprise architecture synthesizes a business ernment-wide HR enterprise architecture.
entity and much of its complexity into a The results of this collaboration are presented
single integrated set of structures that can be in the pages that follow. This chapter is organized
used as a basis for strategy and planning. In into the following sections:
a large modern enterprise, a rigorously defined
framework is necessary to be able to capture a BACKGROUND: Provides environmental
vision of the entire system in all its dimensions and historical context for the U.S. Govern-
and complexity. Enterprise architecture (EA) is a ments electronic government initiatives and
framework which is able to coordinate the many the events that led to the formation of the
facets that make up the fundamental essence of HR LOB program.
an enterprise. It is the master plan which acts as ENTERPRISE ARCHITECTURE: De-
an integrating force between aspects of business scribes how the HR LOB EA helped achieve
planning (Stevenson, 1995, para. 2). the vision of standardization of HR processes
The United States Office of Management and across the Federal HR function.
Budget has formulated an enterprise architecture GOVERNANCE: Explains how HR LOB
strategy for the U.S. government that can help gov- used collaborative governance to develop an
ernment agencies manage complexity and move EA necessary to standardize and modernize
toward innovation and transformation informed HR services delivery.
and enabled by enterprise architecture. This TARGET R EQUIR EMENTS FOR
chapter is about the U.S. Federal governments SHARED SERVICE CENTERS: De-
transformation of service delivery for Human scribes how the HR LOB EA has been used
Resources using enterprise architecture and re- to drive implementation by compiling and
inforced by collaborative governance. developing the solution-level target require-
The Human Resources Line of Business ments for shared service centers.
(HR LOB) is driving transformation of Federal LESSONS LEARNED: Outlines critical
Human Resources service delivery via enterprise lessons learned while developing an EA for
architecture. The HR LOB enterprise architecture the HR LOB.
provides a common, government-wide view and FUTURE TRENDS AND RESEARCH:
vocabulary for the HR function a view and Provides insight into how EA can be used
vocabulary that provide a basis for common, to help government calibrate how it delivers
government-wide solutions that agencies will shared services to its customers.
implement to realize the vision and goals of the
Federal governments HR transformation.
Using broad-based collaboration as a funda- BACKGROUND
mental governance principle, the HR Line of
Business program at the U.S. Office of Person- Innovation in the use of technology is driving a
nel Management was able to achieve consensus revolution in business today, enabling the creation
on its enterprise architecture and use that EA to of new businesses and business structures. Hom-
define shared services-based service delivery eowners can shop for refinance loans from their
expectations for the future Federal HR operation. own homes. Businesses can integrate suppliers
Under the leadership of the HR LOB program, and customers into their own end-to-end business
hundreds of HR professionals representing three processes with seamless precision. Companies can

308
Using Enterprise Architecture to Transform Service Delivery

outsource functions to other companies located In his February 2002 budget submission to
on the other side of the planet. Congress, the President of the United Statespro-
Fueled by technology, the pace of change posed his strategy for achieving this shift to a
is in fact accelerating. According to McDavid customer focus. The President stated that our
(1999): success depends on agencies working as a team
Technological innovations give rise to across traditional boundaries to better serve the
increased opportunities: new ways to do old American people, focusing on citizens rather
things better and whole new things to do. These than individual agency needs (OMB, n.d.a, The
opportunities give rise to business innovations, President Urges Agencies to Work Together sec-
and companies move in to take over new niches tion). According to OMB (n.d.a) the Presidents
and sub-niches. These changes in the way of do- Management Agenda proposes that this can be
ing business create new ideas and expectations accomplished through expanding electronic gov-
of even better, more innovative performance on ernment or E-Government which leverages
the part of technology. In turn, pressure is put advances in technology to:
on technology providers to support still more
new and innovative forms of business behavior. Make it easy for citizens and businesses to
(Purpose of a business system architecture sec- interact with the government
tion, para. 7) Save taxpayer dollars
Expectations about innovation do not stop with Streamline citizen-to-government commu-
business; the public expects innovation to thrive nications
throughout government as well. Polling data from
the Pew Foundation, for example, show that over The United States Government has been a par-
40 million Americans went online to look at Fed- ticular beneficiary of information technology:
eral, State and local government policies and over
20 million used the Internet to send their views to The United States Government continues to
governments about those policies. This and similar be one of the largest users and acquirers of data,
data show that if the U.S. Government can har- information and supporting technology systems
ness the power of technology, it will be meeting in the world, by investing approximately $65
expectations of an increasingly wired citizenry billion annually on Information Technology (IT).
(Office of Management and Budget [OMB], n.d.a, The Federal Government has made improvements
What the Public Expects section). but continues to strive to be the worlds leader in
According to the U.S. Office of Management managing technology and information to achieve
and Budget (OMB), the goal of the United States the greatest gains of productivity, service and
Government is to be the best manager, innovator, results (OMB, 2006, December, p. 1).
and user of information, services, and informa- The E-Government Act of 2002, signed by the
tion systems in the world There continue to be President on December 17, 2002 and made effec-
great opportunities to apply existing and emerg- tive on April 17, 2003, codified 24 E-Government
ing business best practices to government to initiatives into legislation. The initiatives have
achieve increases in productivity and delivery of already achieved tangible progress. Following are
services and information. We remain focused on just some of the benefits OMB (2007, February)
the customer instead of our traditional approach reported to Congress in the second annual Report
of focusing on departments and agencies (OMB, to Congress on the Benefits of the E-Government
2006, December, p.1). Initiatives.

309
Using Enterprise Architecture to Transform Service Delivery

GovBenefits.gov: The GovBenefits.gov managing the travel function of the United


initiative provides a single point of access States Governments civilian agencies.
for citizens to locate information and de- The Department of Labor, one of the first
termine potential eligibility for government agencies to complete its migration to an E-
benefits and services. It receives an average Travel service provider, reported a decrease
of approximately 300,000 visits per month in travel voucher costs from approximately
by citizens and to date has provided nearly $60 per voucher to approximately $25 per
one million citizen referrals to benefit pro- voucher (a decrease of about 60%) and a
grams. reduction in voucher processing time from
IRS Free File: For the 2006 filing season seven to three business days. Additionally,
to date, more than 3.9 million citizens have both the Department of Transportation and
filed taxes online for free using the Free File the Department of the Interior are realizing
E-Government solution. savings of over $1 million per year through
Grants.gov: With over 1,000 grant programs the use of online booking.
offered by all Federal grant making agencies, e-Training: The e-Training initiative is
Grants.gov provides a means for navigat- transforming learning by creating a pre-
ing through the complexity of finding and mier e-Learning environment to support
applying for U.S. Government grants. The the development of the Federal workforce
initiative has seen a substantial increase in and to advance the accomplishment of
the number of grant application packages agency missions through simplified and
posted on Grants.gov since the beginning one-stop access to high quality e-Learning
of fiscal year 2005. In the first quarter of products, tools, and services. To date, over
FY05, 252 packages were posted on Grants. 840,000 Federal employees have registered
gov. By the last quarter of fiscal year 2006, in the GoLearn.gov Learning Management
4,523 packages were posted on Grants.gov, System. Federal employees have completed
almost 17 times the number at the beginning more than 2.7 million courses provided
of fiscal year 2005. through the E-Training initiative. E-Training
SAFECOM: SAFECOM provides research, is assisting the United States Government
development, testing, and evaluation, guid- in maintaining a highly skilled workforce at
ance, tools, and templates on communica- a fraction of the cost of classroom training
tions-related issues to local, tribal, state, alone.
andFederal emergency responseagencies. E-Payroll: The E-Payroll initiative is
In 2006, the initiative increased the number consolidating 26 Executive branch Federal
of urban areas that can establish interoper- payroll providers to just four providers,
able communications at the command level standardizing payroll policies and proce-
within one hour of a major event from 10 dures, and simplifying and better integrat-
to 75. Additionally, 66% of public safety ing payroll, human resources, and finance
agencies report using interoperability to functions. Through migration to one of the
some degree in their operations. four payroll service providers, agencies are
E-Travel: E-Gov Travel is a collabora- able to realize cost savings and improved
tive interagency program the purpose of efficiencies. For example, the Department
which is to realize the cost savings and of Health and Human Services has reduced
increased service associated with a com- the annual costs of payroll processing for
mon, automated, and integrated approach to its more than 65,000 employees from $259

310
Using Enterprise Architecture to Transform Service Delivery

to $90 per employee (an annual savings of data and processes. It has the potential to produce
almost $11 million) while the Environmental cost savings of hundreds of millions of dollars.
Protection Agency has reduced the cost from At the onset, OPM convened a task force com-
$270 to $90 per employee for its staff of prised of 24 Federal agencies to chart the vision
18,000 (an annual savings of approximately and goals for the HR Line of Business. The vision
$3.2 million). of the HR LOB is government-wide, modern,
Recruitment One-Stop. Each month, over cost-effective, standardized, and interoperable
100,000 resumes are created on USAJobs. HR solutions providing common, core function-
gov, the branded Web site of Recruitment ality to support the strategic management of
One-Stop (the Federal online recruitment human capital and addressing duplicative HR
service). USAJobs.gov receives over 240,000 systems and processes. The goals of the HR
visits daily from job seekers looking for LOB program include:
information regarding career opportunities
with the United States Government. Improved Government-wide Strategic Man-
agement of Human Capital
Working across traditional government agency Operational Efficiencies
boundaries to achieve business benefits of this Cost Savings / Avoidance
magnitude requires a common view that spans Improved Customer Service
government boundaries, a view that enables cross-
agency conversation, debate, and collaboration. Two dimensions that underlie the HR LOB
This common view is achieved through enterprise vision are standardization and common solutions.
architecture. Recognizing this, OMB commis- Standardization implies that solutions are to be
sioned the Federal Enterprise Architecture developed through a set of common and repeatable
(FEA) Program on February 6, 2002. The FEA processes and tools. This standardization will be
Program provides specifications for building a a basis for government-wide common solutions
comprehensive business-driven blueprint of the that not only provide economies of scale, but also
entire United States Government. address measurable business improvements. En-
In 2004, OMB appointed the U.S. Office terprise architecture has provided the means for
of Personnel Management (OPM) to lead five making tough decisions around standardization
of the 24 E-Gov initiatives. That appointment and common solutions.
constituted a White House challenge to OPM: The concepts of standardization and common
assume a key role in supporting the transforma- solutions will in large part be operationalized
tion of the United States Government with 1.8 by the introduction of HR shared services. A
million employees deployed across multiple dis- small number of agencies have been identified to
parate agencies into an efficient, cost-effective, deliver HR services to other agencies via shared
performance-driven business. OPM is meeting service centers (SSCs). Additionally, private
that goal through its Human Resources Line of sector providers will also deliver HR services to
Business (HR LOB) an initiative that is creat- Federal agencies. Over time, this will enhance
ing a modern, standardized, and interoperable competitive market forces in the HR Line of Busi-
HR function throughout the Federal government. ness, supporting another tenet of the Presidents
Up to now, each Federal agency has handled its Management Agenda.
own HR operations, resulting in duplication and Shared services is traditionally defined as an
waste across hundreds of agency locations. The operational model in which services are delivered
HR LOB program is driving consolidation of HR by business entities that are internal to an organiza-

311
Using Enterprise Architecture to Transform Service Delivery

tion but operate independently shared service transform the HR function throughout the United
centers (SSCs). SSCs operate as a business and States Government. The next section of this
have dedicated resources to provide well-defined, chapter, ENTERPRISE ARCHITECTURE,
process-based or knowledge-based services for describes how the HR LOB EA helped achieve
more than one unit of a company (division, busi- the vision of standardization of HR processes
ness unit, or agency). SSCs are fully responsible across the Federal HR function.
for managing costs, quality, and timeliness of
services. The concept of shared services is not
new; the private sector embraced it ten to fifteen ENTERPRISE ARCHITECTURE
years ago. It is just now gaining momentum in
the public sector. The Human Resources Line of Business Pro-
The HR LOB Concept of Operations states gram established enterprise architecture (EA) as
that these HR shared service centers will take a one important means of achieving the vision and
phased approach to delivering HR services. At a objectives of the program. EA provides the com-
minimum, all SSCs will offer the same common mon view and vocabulary across 24 United States
core functionality. The solutions that operate at Federal agencies that enables dialog, debate, and
these SSCs will be evaluated and recommended collaboration around standardization, common
by a multi-agency steering committee that stresses solutions, and the new shared services-based HR
scalability, interoperability, and portability. Agen- delivery model.
cies will select SSCs on a competitive basis and Over the course of four years, various work-
have choices; they can shop around for the SSCs groups were convened to build out the models.
that best meet their needs. The shared service Each workgroup was comprised of government
centers will leverage plug and play architecture human resources professionals representing the
concepts. human resources point of view of the HR LOB
In his report on innovation in government, member agencies. The HR LOB approach to
Borins (2006) of the University of Toronto reports EA was based on a fundamental tenet that would
that, interestingly, frontline staff and middle drive the multi-year effort: EA deliverables
managers are the most frequent initiators of public would comply with OMBs Federal Enterprise
management innovation (p.5). The results of his Architecture guidelines and, more important,
study also reveal that innovative organizations would provide real business value to agencies.
draw ideas from people at all levels (p.5). Borins The objective was to produce artifacts that were
conclusions are quite consistent with the HR both compliant and useful.
LOB Program experience: collaboration is key. The United States General Accountability
Since 2004, over 400 participants from 24 Federal Office (2003, November) reports that there are
agencies have collaborated to produce the busi- seven EA frameworks in use at various agencies
ness and technical architectures that define this across the United States Federal government. The
new HR service delivery approach. The HR LOB frameworks in most widespread use are:
program is a model for leveraging cross-govern-
ment expertise and collaboration to develop an Federal Enterprise Architecture Framework
enterprise architecture that standardizes business (FEAF) - 61 agencies
processes, data, performance measures, business Federal Enterprise Architecture Program
services, and technical infrastructure. Management Office (FEAPMO) Reference
The Human Resources Line of Business is Models - 56 agencies
using enterprise architecture to innovate and Zachman Framework - 36 agencies

312
Using Enterprise Architecture to Transform Service Delivery

Other frameworks in use, albeit less popular, view. This provides for discovering duplication
include: of processes, services and /or systems and for
recognizing best of breed that are recommended
Treasury Enterprise Architecture Frame- for use across the government.
work (TEAF) And although the framework may be specific to
National Institute of Standards and Technol- the U.S. Federal government, the modeling meth-
ogy Framework (NIST framework) ods that underlie the framework are not uncom-
Command, Control, Communications, mon. FEA Practice Guidance, published by the
Computers, Intelligence, Surveillance, and FEAPMO (2006, December), states that Segment
Reconnaissance (C4ISR) Framework architecture work products are developed using
Department of Defense Architecture Frame- standard formats and content Standard work
work (DoDAF) product content and formats promote collabora-
tion and reuse by facilitating the reconciliation
The Office of Management and Budget of segment architecture work products with the
strongly encouraged the various lines of business agency EA and relevant cross-agency initiatives
to develop their segment architectures using a found in the Federal Transition Framework
common framework, the FEAPMO Reference (section 2, p.8).
Models. The rationale behind this is simple: the The program facilitated the development
lines of business have been established to con- and validation of all five models put forward by
solidate services across the government, reducing FEAPMO Reference Model guidelines (Figure
or eliminating duplicative services and systems. 1.).
Having a common framework allows for the seg- These models are described in more detail in
ment architectures to roll up to a government-wide the pages that follow.

Figure 1.
1. T he HR LOB Business Reference Model p rovides an end-
to-end v ie w of t he h um an r esources p rocesses th at tak e place
in departm ents and ag encies a cross the U nited S tate s
G overnm ent.

2. T he HR LOB Performance Model p ropose s a set of


perform ance m easures for c ore H R functions a nd p rovides
linkag es b etw een m easures and program objectives.
business
architecture 3. T he HR LOB Service Component Model p rovides a services
vie w and identifies a nd d efines th e business services t hat can
be put into p lace to s upport t he B R M b usiness processes. It
also d escribes m ethods fo r delivering services to the
consum ers of those s ervices.
technolog y
architecture
4. T he HR LOB Data Model p rovides a vie w o f th e data
necessary to p erfo rm the B R M a ctivities. A t the c onceptual
leve l, i t provides a c om plete view o f data o bjects and t heir
relationsh ips. A t th e log ical level, i t i dentifies and d efines d ata
elem ents f or those d ata objects that w ill be shared a cross
ag encies.

5. T he HR LOB Technical Model provides a v ie w of t he


technolog y r eq uired to e nable b usiness services p lus the
standards that c an b e put i nto place to p rom ote interoperability.

313
Using Enterprise Architecture to Transform Service Delivery

HR LOB Business Reference Model Administrative Management


Information Technology Management
The first EA artifact developed by the HR LOB EA
workgroup was the Business Reference Model And lines of business are comprised of sub-
(BRM), an end-to-end process model for the functions, the lowest level of granularity in the
Human Resources function of the United States government-wide BRM. The entire government-
Government. Although previous efforts had been wide Business Reference Model can be found
made to build a government-wide HR process on OMBs Web site at:http://www.whitehouse.
model, this was the most comprehensive to date gov/omb/egov/a-2-EAModelsNEW2.html
in terms of the extent of agency participation and Using the government-wide BRM as the
the completeness and breadth of the result. Over context, the HR Line of Business constructed a
300 participants representing 33 agencies met BRM for the Human Resources function, taking
to develop and validate the HR LOB Business the government-wide model down to a greater
Reference Model. level of detail. The HR LOB Business Reference
According to OMB (2007, July) FEA guide- Model, first published on December 31, 2004 and
lines: re-validated and re-published in January 2006,
The BRM provides a framework facilitating provides an end-to-end process view for Human
a functional (rather than organizational) view Resources Management.
of the Federal governments lines of business, The model consists of ten Human Resources
including its internal operations and its services sub-functions, organized by HR life cycle phase.
for citizens, independent of the agencies, bureaus The model is three layers deep. For each line of
and offices performing them. The BRM describes business, the sub-function layer represents the top
the Federal government around common business layer. Underlying the sub-function is the process
areas instead of through a stove-piped, agency by layer and underlying the process layer is the ac-
agency view. It thus promotes agency collabora- tivity layer. The HR LOB model was not defined
tion and serves as the underlying foundation for below three layers for three important reasons:
the FEA and E-Gov strategies (p.6).
The BRM is structured into a multi-tiered First, it would have been quite impracti-
hierarchy. Business areas appear in the topmost cal and difficult to decompose to the next
tier and include: (task) level; the model would have become
unwieldy in terms of size and complexity.
Services for citizens It would also have been quite difficult to get
Mode of delivery agreement across 24 agencies on task level
Support delivery and services detail.
Management of government resources And the downstream business purpose of
the model was to be a management tool,
Business areas are comprised of lines of busi- not a design document; there was no need
ness. For example, the business area Management to go to the task level.
of Government Resources is comprised of the
following lines of business: The HR LOB BRM provides a level of detail
that is flexible enough to be applicable to the entire
Supply Chain Management Federal government while remaining tangible
Human Resources Management enough to be relevant for individual agencies.
Financial Management

314
Using Enterprise Architecture to Transform Service Delivery

Box 1.
Using EA to drive workforce analytics
the U.S. Department of Health & Human Services

Just after the HR LOB Business Reference Model was first published in 2004, the Depart-
ment of Health & Human Services (HHS) leveraged this artifact to make strategic workforce
decisions and build a business case for moving to a new HR operational model.

Using the process framework of the BRM, HHS HR personnel developed an analytical
tool to determine the number of full-time equivalent employees (FTEs) who performed
each HR process and to estimate the percentage of time each FTE spent on each process.
The tool was designed to provide an order of magnitude view of labor costs currently
allocated to each business process. They then made decisions about whether these pro-
cesses would, in the future, be delivered directly by HR personnel, via the Web, or via
a call center. Given these new service delivery methods, they projected future staffing
requirements.

This data became the basis for a business case that projected investment costs versus
cumulative benefits over a ten year period. This business case was used to justify the
new operational model and to provide a basis for planning the deployment of the service
delivery methods.

For HHS, the HR LOB Business Reference Model served as a useful business planning
tool.

Figure 2. HR LOB BRM end-to-end process view


human resources life cycle Sub-function view
Strategize, organize and plan acquire

3. Staff acquisition

Sustain

4. performance management

5. compensation management

2.
1. hr organization 6. benefits management
Strategy and position
management

7. human resources development

8. employee relations

9. labor relations

Separate
10. Separation
management

315
Using Enterprise Architecture to Transform Service Delivery

Figure 3. HR LOB BRM sub-function view


human resources life cycle process view
Strategize, organize and plan acquire
1.1 C onduc t
Internal 3.3 E s tablis h
3.1 D ev elop 3.2 D ev elop 3.4 S ourc e 3.5 E v aluate 3.6 H ire
E nv ironm ent E v aluation
S A S trategy S A P lan C andidate C andidate E m ploy ee
A naly s is A pproac h

1.2 C onduc t
E x ternal Sustain
E nv ironm ent 2.1
A dm inis ter 4.1 E s tablis h 4.2 E s tablis h and
A naly s is 4.4 E v aluate
O rganiz ation A genc y Im plem ent 4.3 M anage
P erform anc e
and P os ition P erform anc e P erform anc e E m ploy ee
1.3 D ev elop M anagem ent
M anagem ent M anagem ent M anagem ent S y s tem P erform anc e
HC & HR E ffec tiv enes s
S trategy and P rogram s
S trategies
5.2 A dm inis ter
1.4 E s tablis h 5.1 A dopt 5.3 5.4 M anage
B onus and 5.5 M anage
H R P olic y and C om pens ation A dm inis ter T im e and
A w ards P ay roll
P rac tic es P rogram s P ay or Leav e Labor
P rogram s

1.5 M anage 6.1 E s tablis h


C om petenc y 6.2 P roc es s
B enefits
M odel B enefits A c tions
P rogram s

1.6 C onduc t 7.1 E s tablis h A genc y 7.2 C onduc t H R 7.3 D ev elop 7.4 Im plem ent 7.6 E v aluate H R
W ork forc e 7.5 M anage
H R D ev elopm ent D ev elopm ent HR HR D ev elopm ent
P lanning HR
M anagem ent N eeds D ev elopm ent D ev elopm ent P rogram
D ev elopm ent
S trategy A s s es s m ent P rogram P rogram E ffec tiv enes s
1.7 C onduc t
S uc c es s ion 8.2 A ddres s 8.5 A dm inis ter 8.6 P artic ipate in 8.7 D eterm ine
8.1 A ddres s 8.3 M anage 8.4 P rov ide
P lanning E m ploy ee E m ploy ee A dm inis trativ e C andidate /
E m ploy ee A dm inis trativ e R eas onable
P erform anc e A s s is tanc e T hird P arty E m ploy ee
M is c onduc t G riev anc es A c c om m odation
P roblem s P rogram P roc eedings S uitability
1.8 M anage
H R B udget 9.3 P artic ipate
9.1 M anage 9.2 M anage
in N egotiated
Labor N egotiated
1.9 P rov ide H R T hird P arty
R elations G riev anc es
P roc eedings
C ons ultativ e
S upport
Separate
1.10 M eas ure 10.1 M anage
and Im prov e E m ploy ee
HR S eparation
P erform anc e

The HR LOB BRM sub-function view appears An activity flow diagram was constructed for
in Figure 3. each process showing activities, roles, and major
The ten sub-functions decompose to a total of inputs and outputs. A precise narrative defini-
45 processes. The HR LOB BRM process view tion was written for each activity and informa-
appears in Figure 3. tion needed to perform the activity (inputs) and

Table 1. Activity definition for determine qualified / eligible applicants


Process 3.5 Evaluate Candidate
ID Activity Name Activity Definition
3.5.1 Determine Qualified / Inputs: Recorded Applicant Documentation, Selection Criteria, Eligibility Require-
Eligible Applicants ments, Qualification Standards, Selection Factors
Determine applicant eligibility and qualifications by reviewing applications for
Role: completeness and conformance to eligibility, qualifications and / or legal require-
Management ments (e.g., degree accreditation) including ICTAP. Those found to be ineligible are
HR Organization provided no further consideration. This activity includes identifying candidates who
qualify for consideration under special appointing authorities.
Outputs: List of Qualified/Eligible Applicants, List of Special Authority Candidates,
and Candidate Notifications.

316
Using Enterprise Architecture to Transform Service Delivery

information produced as a result of the activity Most important, it has become a useful man-
(outputs) were also listed. Table 1 below provides agement tool. At the HR LOB program level,
a sample definition for the activity Determine for example, all collaborative work sessions
Qualified / Eligible Applicants. are organized by BRM sub-functions. And
The HR LOB BRM and the work that led to at the agency level, the General Services
it is significant for a number of reasons. Administration has used the BRM to drive
transformation of its hiring processes.
First, the simple structure, along with the
thorough information behind it, provides an The entire HR LOB BRM can be found
easily understood view of HR that could be at the U.S. Office of Personnel Management
developed and validated and subsequently Web site: http://www.opm.gov/egov/documents/
used by HR professionals with no knowl- architecture/#brm
edge of enterprise architecture.
The initiative was the most comprehensive HR LOB Performance Model
collaboration that ever took place regarding
U.S. Federal HR process, and over the course In January 2006, a workgroup convened to develop
of the collaboration HR professionals came the HR LOB Performance Model (PM). The HR
to the realization that there is a large degree LOB PM proposes a common set of performance
of commonality across the government. measures for use throughout the Federal govern-
The HR LOB BRM is a springboard for ment. These performance measures will gauge
process innovation. Workgroup members how effectively government HR resources are
were encouraged to be innovative and cre- used to support agency mission results, support
ate a future view of the human resources the effective management of human capital across
process in the United States government. the government, and provide for effective human
However, since the process is driven by resources service delivery to employees, manag-
legislation and policy, it was quite difficult ers / supervisors, and other HR constituents. A
for them to think outside the current view. total of 49 participants representing 12 agencies
Because of its widespread acceptance since met to develop and validate the HR LOB Perfor-
its introduction, we can expect the BRM to mance Model.
become a starting point, over time, for in- According to FEA guidelines, the PM will
novation. (The BRM does contain kernels ultimately have three main uses:
of innovation. For example, although the
concept of competency management is not 1. Help produce enhanced performance in-
well established in the government, it ap- formation to improve strategic and daily
pears as a thread throughout the model.) decision-making.
The BRM is a basis for the subsequent 2. Improve the alignment and better articulate
models built and thus serves as the integrat- the contribution of inputs to outputs and
ing artifact. The activity inputs and outputs outcomes, thereby creating a clear line of
provided an important starting point for the sight to desired results.
HR LOB Data Model. It provided a structure 3. Identify performance improvement oppor-
for the HR LOB Performance Model. And it tunities that span traditional organizational
established the basis for identifying the HR structures and boundaries.
services that appear in the HR LOB Service
Component Model.

317
Using Enterprise Architecture to Transform Service Delivery

Table 2. Total compensation as a percent of agency budget


Measure Name Definition Purpose
Total Compensation as a percent of Percent of budget allocated to Shows the percentage of budget allocated
agency budget compensation. Compensation Cost to compensation; useful for market
includes salary, student loans, benefits, comparison.
recruiting / retention / relocation Useful for year over year comparison and
incentives trend analysis.

The first version of the HR LOB PM focuses (performance measure) that addresses each
only on the end-to-end processes of the core Busi- of the outcomes and objectives.
ness Reference Model sub-functions Compensa-
tion Management and Benefits Management and For each BRM sub-function (measurement
those BRM activities that result in a personnel grouping), the workgroup identified and defined
action. These areas are the first to be supported a set of performance measures (measurement
by the new shared service centers because they categories). The group was very careful to identify
are highly transactional and administratively pragmatic measures, i.e., measures for which re-
intense. sults data exists and can be collected. To illustrate
FEA guidance describes a hierarchical con- the model, for the sub-function Compensation
struct for the PM that has four levels. Management the workgroup identified a total of
13 performance measures, one of which is named
Measurement area is the broadest area and total compensation as a percentage of agency
is the high-level organizing framework cap- budget. This measurement indicator is defined
turing aspects of performance measures at as follows:
the output level. The HR LOB falls under The PM provides a framework that links
the Management of Government Resources measures to government-wide HR strategic out-
Measurement Area. comes1 as defined by the Office of Personnel
The measurement category level reflects Management and to the strategic objectives
collections within each measurement area of the HR LOB program. These linkages are
describing the attribute or characteristic to important as the government-wide HR strategic
be measured. This aligns with the Lines of outcomes and HR LOB strategic objectives link to
Business. specific agency business objectives. Thus, the PM
The measurement grouping level is a further measures, when implemented, provide tangible
refinement of the measurement category. evidence of agency business results.
The groupings align with the BRM sub- To continue the aforementioned illustration, all
functions. 13 of the measurement indicators that support the
The measurement indicator level defines BRM sub-function Compensation Management
those specific measures identified for the were linked to HR LOB objectives as shown in
specific sub-function. The indicators evalu- table 3 below. This mapping is important because
ate the results of the sub-functions contribu- it provides line of sight between performance
tion to agency business results. According and desired results.
to the FEA guidance, each Measurement The concept of moving highly transactional
Grouping (HR LOB sub-function) should and administratively intense activities to shared
have at least one measurement indicator service centers to reduce costs, increase efficiency

318
Using Enterprise Architecture to Transform Service Delivery

Table 3. Performance indicators mapped to strategic objectives


Strategic Objectives Compensation Management Measures
Total compensation as a percentage of agency budget
Average compensation per agency FTE
Improved Mgmt
Employee satisfaction with compensation
Compliance
On time project performance
Retroactive payroll adjustments
Electronic access
Amended / corrected time records
Operational Efficiency
Payroll certifications
Timeliness: time to disburse off-cycle payroll transactions
Cycle time: W-2 distribution
Quality: W-2 corrections as a percent of total W-2s
On budget project performance
Cost Savings / Avoidance
Cost / price per W-2
Quality: Personnel Action corrections bonus & awards
Improved Customer Service Timeliness: Change Notification
Customer Service: Time to resolve / respond to inquiry

and even improve employee satisfaction appears site: http://www.opm.gov/egov/documents/


on the surface to be a good idea. And the notion architecture/#pm
that this could free up agency HR personnel to do
more valuable HR work is intuitively appealing. HR LOB Service Component Model
However, this new operating model could have
negative value. It could in fact cost U.S. taxpay- In March 2006, a workgroup was formed to begin
ers twice as much, create more inefficiency and to develop an approach to building the HR LOB
create employee dissatisfaction given the pos- Service Component Model (SCM). The SCM
sibility that when agencies migrate to the new lays the groundwork for the new services-based
model, there is a very real likelihood that they approach to HR service delivery described in
will retain shadow staff to duplicate the work of the HR LOB Concept of Operations in a very
their service providers. tangible way. The SCM formalizes a government-
It is thus imperative to baseline current perfor- wide view of services by proposing the universe
mance and track performance over time as more of business services that could be put into place
and more agencies migrate to this new operational to support the HR processes depicted in the HR
model. Having a common set of measures across LOB BRM, and provides the construct that can be
the government will provide benchmarks that will used to realize the shared services vision proposed
enable comparative analysis across shared service by the HR LOB.
centers, across agencies, and with private sector The Service Component Model identifies all
enterprises. Having this performance data will the services that could be provided by HR service
help identify high performers whose practices providers to support BRM processes the list
can be replicated. It will also help identify per- of potential services from which providers will
formance issues and provide a basis for improve- select to establish their portfolio of services. These
ment programs. portfolios of services, in turn, provide the menu of
The entire HR LOB PM can be found at services options that customer agencies will have
the U.S. Office of Personnel Management Web when shopping for services. The HR LOB SCM,

319
Using Enterprise Architecture to Transform Service Delivery

thus, provides a brand new services view that is Tier 0 direct access: Enables the user to
crucial to defining this new line of business. perform an action related to the task or
FEA guidelines provide a hierarchical con- activity without any direct involvement or
struct for the SCM. Service domains appear at guidance from another person (e.g., Web,
the top of the hierarchy. Service domains are IVR)
comprised of service types and service types in Tier 1 call center: Enables the user to speak
turn are comprised of service components. The to a Human Resource generalist who utilizes
service domain Back Office Services, for example, scripts and a knowledge base to respond to
is comprised of five service types: a wide variety of questions and issues
Tier 2 subject matter expert: Interprets
Data management policy to respond to escalated issues and
Human resources questions
Financial management Tier 3 decision maker: Interprets policy
Assets / material management services and has decision-making authority around
Human capital management complex issues, questions and critical
incidents
The HR LOB SCM workgroup, which included
97 participants representing 14 agencies, identi- The service delivery model provides a useful
fied 17 service components under the service planning tool for service providers to understand
type Human Resources (e.g., Pay Administra- the skills, resources, and infrastructure required
tion, Payroll Processing, Benefits Enrollment, at each tier.
Benefits Counseling, Recruiting) and 16 service The SCM and its companion service deliv-
components under the service type Human Capital ery model demonstrate in a very real way how
Management (e.g., Competency Management, enterprise architecture is being used to shape
Workforce Planning, Succession Planning, Staff- HR service delivery for the United States gov-
ing). They also identified 30 service components ernment. Previously, the processes and activities
outside the service types HR and HCM that sup- in the BRM were used as a basis for discussing
port HR processes (e.g., Customer Support, Call services. This was quite useful, but imprecise
Center Management, Knowledge Management, because many of the activities are collaborative
Consultative Support, Project Management). (i.e., both provider and customer have a role in the
The entire HR LOB SCM can be found activity). The SCM provides a common view of
at the U.S. Office of Personnel Management services that will provide the basis for providers
Web site: http://www.opm.gov/egov/documents/ portfolios of services. The narrative definitions
architecture/#scm provide a vocabulary for discussion services. This
The SCM workgroup also constructed a ser- common view and vocabulary around a common
vice delivery model. The workgroup identified set of services will allow providers to more easily
user types: generic customers or constituents differentiate their services from other providers
that might take advantage or use a service. The and will allow customers to compare offerings
group mapped service component to user types across providers.
to identify viable usage instances. For each usage It will also conceivably provide a more solid
instance, the group decided the most appropriate basis for customers and providers to negotiate
delivery mode: service level agreements (SLAs). Since Target
Requirements (described in a subsequent sec-
tion) will be mapped to service components, those

320
Using Enterprise Architecture to Transform Service Delivery

requirements help set expectations between the of what it accomplishes and the resources
customer agency and service provider regard- it needs, there is minimum rippling effect
ing how the provider is expected to meet each when the trade-out occurs.
requirement that is linked to each service being
negotiated. Thus, very specific expectations can Identifying these assets is one step toward
be set. achieving the concepts of reusability and interop-
According to the OPM HR LOB SCM Report erability (pp. 4-5).
(2007): The HR LOB Service Component Model
The HR LOB Common Solution(s) White identifies and defines reusable assets at the busi-
Paper and Concept of Operations (CONOPS), ness services level.
developed by the HR LOB Common Solution and The real value of the SCM is that it promotes the
Target Architecture Workgroup under the multi- concept of reusable asset at the business services
agency HR LOB Task Force in 2004, discussed level. The various lines of business will submit
two dimensions that would be very important to their models to OMB and OMB will consolidate
any Federal line of business: common solutions the models into a consolidated government-wide
and standardization. reference model. This government-wide model
The concept of common solutions is based on will be available to help agencies identify op-
a model that provides a business-driven approach portunities for collaboration and sharing of as-
to deliver standardized, scalable, and portable HR sets. Thus, this EA artifact has real potential to
services across the Federal Government. Shared contribute directly to innovation and cost savings
service centers would be a keystone for common throughout the United States Government.
solutions, producing economies of scale and sup-
porting the four goals of the HR Line of Busi- HR LOB Data Model
ness: reduced cost, better efficiency, improved
customer service, and improved management of In July 2005, a workgroup of 42 participants
human capital. representing 10 agencies convened to launch the
Standardization defines common and repeat- HR LOB Data Model (DM) initiative. Using
able processes that make common solutions the activity inputs and outputs in the Business
possible. Enterprise architecture provides the Reference Model as a starting point, the DM
framework and vocabulary for deciding what is workgroup identified and modeled the data re-
to be standardized. quired to perform the BRM activities.
Two desirable outcomes result from building According to OMB (2005, November) Federal
out these dimensions reusability and interop- Enterprise Architecture guidelines, the DM can
erability. provide value to agencies by:

Reusability is the ability to utilize a busi- Providing a means to consistently describe


ness asset in more than one context by data architectures. The DMs approach to
multiple organizations or across multiple Data Description, Data Context, and Data
processes. Sharing enables data architecture initiatives
Interoperability is the ability to exchange to uniformly describe their data artifacts,
assets for like assets without undue impact. It resulting in increased opportunities for
enables the purchaser of an asset to trade out cross-agency and cross-COI data sharing.
one asset for another. And because the asset Bridging data architectures. The DM
is self-contained and independent in terms provides a Rosetta Stone to facilitate com-

321
Using Enterprise Architecture to Transform Service Delivery

munications between enterprise and data relationships between data objects. Additionally,
architects about data and data architecture in a definition was written for each data object.
their efforts to support the business/mission A logical data model was also created for
needs of the enterprises that they support. a subset of the above data that is likely to be
Facilitating compliance with require- shared between agencies and shared service
ments for good data architectures. The centers. For this subset of data objects, data ele-
DMs standardization areas provide a foun- ments were identified and defined. The logical
dation for agency data architecture initiatives data model also identified information exchange
to put forth requirements that can result in packages, specific recurring data exchanges be-
increased compatibility between agency tween a shared service center and an agency or
data architectures. (p. 4) a shared service center and a third party. These
information exchange packages lay the ground-
The objectives of the HR LOB DM initiative work for interoperability. They are groupings
were to: of data attributes from various data entities that
come together for a particular business purpose.
Promote common identification, use, and Examples include:
appropriate sharing of HR LOB data and
information across the United States govern- Personnel action
ment. Since existing data structures do not Approved time and attendance
allow for easy data exchange between agen- Thrift savings plan enrollment
cies, shared service centers, and the Office Payroll disbursement
of Personnel Management, this standardized
data structure will facilitate information All of these information exchange packages
sharing. It will also define common data contain data elements from multiple data entities
elements and structures needed to share that are compiled into a single grouping of data
data across BRM processes. that serves a business purpose.
Provide a standard for service providers and This model is important because data sharing
point solutions. It will delineate a vision for is a key element of interoperability. Technology
a standardized version of how the data is components cannot work together unless those
stored and transmitted, providing for the components can send and receive data in a coherent
ability to share information. fashion. The DM provides a view of data and the
Specify future solution design data format. common data definitions that will be the basis for
It will provide a standardized data structure this data sharing. And again, HR professionals
that provides a basis for future detailed de- were recruited to participate in the workgroup
sign documents, including government-wide and business-oriented facilitators worked with
standard reports. the workgroup to build the models. A technical
architect was also assigned to the workgroup to
The HR LOB DM provides two levels of ensure the model was technically viable.
detail. The conceptual data model consists of an The entire HR LOB DM can be found at
entity relationship diagram (ERD) for data that the U.S. Office of Personnel Management Web
supports the entire breadth of the end-to-end hu- site: http://www.opm.gov/egov/documents/
man resources process depicted by the BRM. The architecture/#dm
ERD shows data objects and it names and defines

322
Using Enterprise Architecture to Transform Service Delivery

HR LOB Technical Model service area consists of multiple service


categories, which in turn group technolo-
The HR LOB Technical Model (TM) initiative gies and standards that directly support the
was launched in June 2007 to establish a common service area.
view of technology for the line of business and to Service categories classify lower levels of
compile a set of standards for each of the technol- technologies and standards with respect to
ogy services that appear in the model. the business or technology function they
According to OMB (2007, July) Federal En- serve. Each service category is comprised
terprise Architecture guidelines, the TM: of one or more service standards.
is a component-driven, technical framework Service standards define the technologies
categorizing the standards and technologies and standards that support the service cat-
to support and enable the delivery of Service egory. To support agency mapping into the
Components and capabilities. It also provides TM, many of the Service Standards provide
a foundation to advance the reuse and standardiza- illustrative specifications or technologies as
tion of technology and service components from examples.
a government-wide perspective. Aligning agency
capital investments to the Technical Model The HR LOB Technical Model is a compo-
leverages a common, standardized vocabulary, nent-driven, technical framework that identifies
allowing interagency discovery, collaboration, the standards, specifications, and technologies
and interoperability. Agencies and the Federal that support and enable the delivery of service
government will benefit from economies of scale components and capabilities. It is not a specific
by identifying and reusing the best solutions and system or solution design. Rather it establishes a
technologies to support their business functions, common vocabulary and defines a set of services
mission, and target architecture. (p. 7) and interfaces common to the solutions. The
The HR LOB Technical Model along with Technical Model will also identify and organize
standards profile and best practices will facilitate the standards that apply to the technology com-
the reusability of service components at both ponents that appear in the model. It will provide
business and technical levels and promotes in- a standards profile, which is a database of facts
teroperability of technical service components. and guidance relative to technology standards.
Conceptually, the TM provides two things. First, The standards profile will point to standards that
it provides a model of technology that proposes a come from many sources: from formal standards
view of and vocabulary for technology services bodies such as NIST, ANSI, ISO or IEEE; from
and interfaces. It also provides a set of standards authoritative consortia, like the World Wide Web
for the technology. This is important because Consortium and the Object Management Group;
common standards are an important means and from internal sources, such as agency HRIS
for achieving interoperability across disparate development standards. Over time, this compen-
technologies. dium of standards will become an important basis
OMB (2007, July) FEA guidelines specify a for interoperability across disparate systems and
hierarchical construct for the Technical Model technologies (Prabandham, 2007).
comprised of three layers: Unlike the other four artifacts, the HR LOB
Technical Model has been developed by techni-
Service areas represent a technical tier sup- cal architects. It has, however, traceability to the
porting the secure construction, exchange, HR LOB business architectures via the HR LOB
and delivery of service components. Each Service Component Model. The SCM shows that

323
Using Enterprise Architecture to Transform Service Delivery

service components are delivered to user types A consistent and common lexicon for de-
using a delivery structure. The TM shows the scription of interoperability requirements
technology components that enable this service between diverse systems,
delivery, directed by a standards profile. This A means for consistent specification and
business to technology view is called the delivery comparison of system/service architec-
process-action chain. The delivery process-action ture,
chain is not an implementation design or a solu- Support for commonality across systems,
tion specification; rather, it is a traceability and The consistent use of standards, and
linkage structure between the SCM and the TM. Comprehensive identification of information
The concept of process-action chain is illustrated exchange and interface requirements
in Figure 4 (Prabandham, 2007).
The Technical Model will contribute to ef- Over time, HR LOB architects will work
ficiency and cost reduction by enabling interop- with architects across other lines of business to
erability across systems that support the line of compile a government-wide technology model
business. In the absence of a Technical Model, and standards profile with the goal of achieving
systems interfaces are based on ad hoc efforts these objectives on an even broader scale.
leading to rigid information infrastructures,
duplicate efforts, continual reinvention of the HR LOB Enterprise Architecture
wheel, and as many systems with interfaces as
potential partners. According to Prabandham The HR LOB EA was developed in alignment with
(2007) the goal of the TM is to ensure services FEA guidelines and consists of the five models:
components achieve effective levels of reusability Business Reference Model, Performance Model,
and interoperability by promoting: Service Component Model, Data Model, and

Figure 4. Delivery process-action chain

Service component

defined in
Service delivery the Scm

delivered to U sing

User types delivery


Structure

enabled by

access & platform & interfaces & lob Specific


components
delivery infrastructure integration applications
defined in
the trm

Facilitated and directed by

Standards profile

324
Using Enterprise Architecture to Transform Service Delivery

Technical Model. Agencies and shared service cal, strategic business and technical advances has
centers use these models as useful business tools positioned the public sector to transform the way
for business planning, performance measure- it orchestrates the business of government. Can a
ment, and IT investment. The next section of public sector organization truly reinvent itself? Do
this chapter, GOVERNANCE, explains how HR transformation efforts work? If so, what are the
LOB used collaborative governance to develop critical success factors and lessons learned?
an EA necessary to standardize and modernize E-Government. Information technology
HR services delivery. continues to trigger disruptive change in the
U.S. economy. Many business processes can
be incrementally improved but many need to
GOVERNANCE be completely transformed to capture the full
benefits. Areas of interest include: electronic
The dynamics of innovation are enormously com- delivery of information, programs, and services;
plex. Innovation changes continuously, while the web 2.0 and the expansion of social networking,
pace of innovation change accelerates. Innovation blogging, wikis, etc.; electronic communications
is more open, spans virtually all disciplines, is to increase citizen engagement; and the use of
increasingly global, and starts in more places. new cross servicing arrangements. What issues
Understanding the dynamics of innovation is a first occur when the government adopts private sector
step toward exploiting it to make the government practices?
more effective. What approaches to human capital Inter-departmental / Inter-agency Col-
management foster innovation? What manage- laboration. Government lines of business are
ment systems and cultures support a climate that realigning traditional agency boundaries. Areas
accepts innovation? What business processes are of interest include the enhancing of public sec-
conducive to innovation? As increasing economies tor performance or mission-centric operations
of scale and use of IT encourage more partnering, through end-to-end operating models that extend
what approaches foster getting more innovation traditional organizational boundaries and models
from those partners? for effective integration of organizations and
Most governments have been actively reform- processes.
ing their operations for several decades. Initially, Shared Services Beyond the Back Office.
these efforts were relatively straightforward ones The private sector has increased efficiency and
of improving efficiency, reforming management effectiveness through the use of shared services
practices, streamlining program operations, and for many internal operations. Public sector orga-
outsourcing commercial or non-core activities. nizations are increasingly following suit. What
Public sector organizations are now under ever- are the best practices? Which private sector ap-
increasing pressure for more profound changes to proaches work in the public sector and which do
better address growing fiscal pressures, terrorism, not? What governance frameworks are needed
and new requirements of contemporary society. for success (Breul & Morales, 2007)?
Transforming Government. Governments Human Capital Management. A more effec-
at all levels Federal, state, local, and especially tive back office frees up resources to do the more
defense and homeland security organizations are strategic work of HR. Areas of interest include:
challenged to reposition, reinvent, and realign the strategic alignment of human capital with
themselves in light of an increasing demand for a organizational objectives; workforce planning and
more cost effective, citizen-centric, and networked deployment; the recruitment, retention and devel-
government. A combination of economic, politi- opment of talent; results-oriented performance

325
Using Enterprise Architecture to Transform Service Delivery

culture; leadership and knowledge management; The HR LOB governance structure comprises
e-learning; workforce development; workforce of three broad tiers:
security; human resource service delivery mod- Strategy / Policy, Planning and Oversight.
els; accountability; and use of contractors versus The 24-agency MAESC is the primary decision
government employees. making body that sets the strategic direction for
According to Breul (2006), to drive innovation, the HR LOB. The MAESC meets regularly to
governments need more sophisticated strategies take key decisions on human resources strategy,
for governing transformation than they have architecture, and concept of operations that will
generally had to date. This section describes the impact the 1.8 million civilian employees of the
governance strategy employed by the U.S. Office Federal government.
of Personnel Management (OPM) to address The MAESC is co-chaired by the Director of
the challenges incurred in leading the Human HR LOB and the OMB Portfolio Manager for the
Resources Line of Business. e-Government portfolio of Internal Efficiency
OPM is the Managing Partner agency respon- and Effectiveness (IEE). The Strategy / Policy,
sible for the HR LOB. The Office of the HR LOB, Planning and Oversight tier of the HR LOB gov-
a division within OPM, serves as the Program ernance structure also includes the Requirements
Management Office (PMO) for the HR LOB. The Board which is led by OPMs Strategic Human
PMO brings focus and provides momentum for Resources Policy (SHRP) Division. The Require-
the HR LOB. The HR LOB PMO is staffed with ments Board is the ultimate arbiter of the target
senior executive staff personnel steeped in HR requirements for the shared service centers from
services and payroll delivery expertise. These se- an HR policy perspective.
nior Federal managers are supported by IBM con- User Requirements. This tier of the gover-
sultants with expertise in program management, nance structure is comprised of workgroups or
facilitation, change management, and Federal HR sub-committees focused on developing require-
and enterprise architecture principles. ments from the customer or user perspective.
The HR LOB governance was set up in early These sub-committees of HR subject matter
2004 to establish the vision, goals, and objectives experts (SMEs) are typically employees at or be-
of the HR LOB. The Director of the Office of HR tween levels 12 through 15 on the Federal General
LOB, in conjunction with the Heads of OPM and Schedule (level 15 is the highest level) and have
the E-Government Directorate of the Office of been recommended by the MAESC members for
Management and Budget (OMB), invited 22 their specialized HR skills and expertise. The
agencies to join OPM and OMB in a task force User Requirements workgroups have played a
that set the vision and timeline for transformation seminal role in developing HR LOB deliverables.
of the Federal HR function. Some of the notable workgroups under the User
The success of the 2004 HR LOB Task Force Requirements tier are as follows:
in building consensus and acceptance of the vi-
sion and timeline for HR transformation provided Customer Council. This standing council
impetus to the Director of HR LOB to establish, is comprised of members from agencies
in 2005, a permanent governance body of the 24 that are or will receive HR services from
agency coalition. This permanent chartered body, HR service providers and represents the
referred to as the Multi-Agency Executive Strategy voice of the customer. This council also
Committee (MAESC), reports to the Director of plays an important role in evaluating and
OPM and the Director of E-Government and IT selecting public and private sector shared
Reform at OMB. service centers.

326
Using Enterprise Architecture to Transform Service Delivery

Business Reference Model (BRM) Work- deliver those services to customers of the
group. This ad-hoc workgroup developed services.
the first ever government-wide end-to-end
business process mapping of the HR sub- The architecture and requirements workgroups
function. This workgroup comprised of HR met in many sessions over the past four years to
subject matter experts from over 30 agencies establish a body of knowledge that is visionary
defined the ten sub-functions of the HR LOB and evolve-able. When developing these mod-
and mapped out the processes, activities, els, agencies focused on their similarities rather
definitions, and inputs and outputs of the than their differences. The notable feature of all
HR function. the aforementioned workgroups has been their
Target Requirements Workgroups. These dedication to improving Federal HR and their
ad-hoc workgroups developed the detailed passion for standardizing definitions, processes,
business and technical requirements for the and requirements under the HR function.
shared service centers. These workgroups Operations and Delivery. This tier of the
took policy inputs from the Requirements HR LOB governance provided the voice of the
Board and developed detailed requirements provider and was comprised of operationally-
for government-wide delivery of HR func- focused members from the Federal designated
tions. shared service centers and e-Payroll providers.
Service Component Model (SCM) Work- The Shared Service Center Advisory Council
group. This ad-hoc workgroup developed (SSCAC) meets on a regular basis to discuss
standardized definitions for HR services the operational challenges of delivering the HR
and the service delivery channels that and payroll services and other issues related to

Figure 5. HR LOB governance structure

Director, OPM
CHCOC Subcommittee on E-Gov Administrator
HR LOB OMB
CHCOC Chair

OPM HR LOB Program


Director
Co-Chair MAESC Strategy / Policy,
Planning &
OMB IEE Portfolio Manager,
Co-Chair MAESC
Oversight
HR LOB PMO

HR LOB Multi-Agency Executive Strategy Committee


Requirements OPM Ex CIO Council CFO Council Small Agency Federal Acquisition Budget Officers Advisory
Officio Seats Liaison Liaison Council Liaison Council Liaison Council Liaison
Board
AGENCY REPRESENTATIVES

Mgt Improvement
SC M W or kgr oup
Requirements Program
Workgroups
Information Security
B R M W or kgr oup
Workgroup User
Configuration Requirements
C ustomer C ouncil
Control Board

eOPF User Group LDAC

SSC Advisory
Council / PAC
Operations &
Delivery
Shared Service Shared Service Shared Service Shared Service Shared Service
Center Center Center Center Center

327
Using Enterprise Architecture to Transform Service Delivery

meeting the target requirements established by make tough decisions and then represent
the HR LOB.Figure 5 shows the three tiered HR those decisions to their stakeholders.
LOB governance structure.
The HR LOB organizational structure pro- Governance is critical to the success of any
vided a forum for collaborative governance that EA program. The HR LOB used governance to
led agencies to put aside their differences and achieve stakeholder buy-in from the beginning;
work together to modernize and standardize HR this is one of its key triumphs. The next section
services delivery. This HR LOB model of col- of this chapter, TARGET REQUIREMENTS
laborative governance produced some valuable FOR SHARED SERVICE CENTERS, describes
insights: how the HR LOB EA has been used to drive
implementation by compiling and validating
Perspective. Through asking the HR LOB the solution-level target requirements for shared
governance bodies to review and comment service centers.
on strategic and architectural deliverables,
the HR LOB was able to gain information
and insight from many different points of TARGET REQUIREMENTS FOR
view. This enabled agencies to have a seat SHARED SERVICE CENTERS
at the table in making strategic decisions
and provided OPM with a government-wide The HR LOB EA artifacts were produced with a
perspective to set HR policy. very particular business outcome in mind: the suc-
Buy-in. The model of collaborative gover- cessful adoption of a new shared services-based
nance worked because we involved people HR delivery model. This new delivery model has
who are going to be affected by the vision in been put forward with some very real objectives
defining the vision. People buy into results in mind: reduced costs, increased efficiencies,
when they feel they have been involved in improved customer satisfaction, and enhanced
producing the results. management of human capital throughout the
Change Advocacy. Any governance body government. From the onset, the EA artifacts
will have its skeptics, but there will also be have been used to conceive this new operating
the bright lights that get it. Initiatives must model and in turn advance the program toward
leverage their support and really use them its business objectives. Presented here is an il-
to advocate change. lustration of how the HR LOB leveraged its EA
Education and Outreach. People get to yield business results in alignment with the
smart when they get involved. Encourage vision and goals of the program.
the stakeholders on your governance bod- One of the first real uses of the HR LOB EA
ies and workgroups to take what they learn artifacts involved using the Business Reference
and tell it to others. Provide them with tools Model as a basis for discussing and organizing
(presentations, newsletters, etc.) they can business and technical requirements. While EA
use to do outreach. provides the conceptual framework for standard-
Leadership. The objective is to be collab- izing business processes, data, and services across
orative, but ultimately you are going to ask the government, there existed a need to define
your governance body to make some tough more specific expectations for shared service
decisions and resolve cross-organizational center operations. Government legislation and
issues. The governance body must consist policy is very specific about how certain opera-
of leaders who are willing to step up and tions are conducted, including human resources.

328
Using Enterprise Architecture to Transform Service Delivery

A comprehensive set of business and technical gathered and linked to those activities that will or
requirements was compiled and validated to could be supported by SSCs (2 and 3). Agency-
document SSC operational expectations. only requirements (1) were not included.
According to OPM HR LOB (n.d.), the HR LOB
Target Requirements for Shared Service Centers Development of the Target
represents the first-ever government-wide set of Requirements
detailed business, technical, and data requirements
for human resources. The target requirements The HR LOB Target Requirements for Shared
report provides the detailed requirements outlin- Service Centers (SSCs) is the result of landmark
ing the expectations of shared service centers cross-agency collaboration between hundreds of
(SSC) by describing the role of the SSC in the HR subject matter experts working over a two-
HR process and providing specifications for the year period to define target requirements for
efficient and successful delivery of services and both core and non-core services that may be
solutions. The target requirements also outline offered by HR LOB SSCs. The HR LOB lever-
the expectations the Federal government strives aged a phased approach to the development of
to achieve through the implementation of the HR the requirements by addressing in FY 2005 the
LOB service delivery model (OPM HR LOB, requirements that SSCs will provide (core) to
2006). The HR LOB Target Requirements for agencies, deferring to FY 2006 the development
Shared Service Centers is publicly available on of the requirements that SSCs may provide (non-
the OPM Web site at: http://www.opm.gov/egov/ core) to agencies.
documents/requirements/ According to OPM HR LOB (2006) in Janu-
Scope of the Target Requirements ary 2005 an initiative was launched to define
The HR LOB Business Reference Model business and technical requirements around the
(BRM) provided the overall framework to de- BRM. The HR LOB program designated three
fine the scope of the requirements effort and to highly transactional, administratively intense
develop the target requirements. Every BRM areas to be the focus of this effort. Eighty-eight
activity was scrutinized to determine whether it representatives from 24 agencies validated these
should be supported by a shared service center requirements in a series of work sessions com-
in the future or continue to be performed at the pleted in the second half of 2005 and produced
agency. Each BRM activity was then given one core requirements that specify services and
of the following designations: supporting technology for:

1. The activity will be performed in the future Personnel Actions


by the agency only. Compensation Management sub-function
2. The activity will be performed in the future (Payroll related)
by an SSC only. Benefits Management sub-function
3. The activity may be collaboratively per-
formed in the future by some combination In Fiscal Year 2006, the HR LOB completed
of both the agency and an SSC. the development of the target requirements by
addressing the remaining sub-functions for re-
These designations provided the basis for the quirements not defined in the version 1.0 report.
scope of the target requirements. Since the inten- One hundred and seventy-one representatives
tion of the target requirements is to set expecta- from 29 agencies participated in a series of work
tions of shared service centers, requirements were sessions to validate the non-core requirements

329
Using Enterprise Architecture to Transform Service Delivery

that specify services and supporting technology the requirement; some requirements are more
for activities that fall within the remaining BRM easily understood when the process context is
sub-functions: understood.

Human resources strategy Downstream Use and Next Steps


Organization and position management
Staff acquisition Changing Requirements. Defining the target re-
Performance management quirements for service delivery was an important
Compensation management (beyond pay- achievement but is only a first step. The require-
roll) ments defined and validated in version 2.0 of the
Human resources development report (September 2006) reflect the current state
Employee relations of HR service delivery as it pertains to existing
Labor relations Federal HR policy, technology, and best business
Separation management practices. The reality is that the Federal HR land-
scape is continually changing as new policies are
written and old policies revised, and as innovation
The Target Requirements drives business practices forward.
Report To meet the challenges of the continually
changing Federal HR landscape, the HR LOB
The HR LOB Target Requirements for Shared has defined a requirements change process to
Service Centers provides SSCs and agencies provide over time the same level of participation
with two views of the target requirements. The that took place when the requirements were ini-
first view, the Conceptual Design, provides a tially defined. The change process is outlined in
descriptive view of the role of the shared service the HR LOB Target Requirements for Shared
center in the end-to-end HR process depicted by Service Centers version 2.0. The change process
the HR LOB BRM. It also describes SSC innova- is currently being operationalized as the HR LOB
tion, outlining how SSC performance will change is validating a series of changes based on require-
agencies service delivery. ments use and changes to Federal HR policy. The
The report also provides a very detailed view, results of this update to the target requirements
listing all the business and technical requirements will be reflected in version 3.0 to be published in
that support each BRM sub-function. The require- September 2007. It is expected that updates to the
ments are presented in a matrix format as seen target requirements will be published on annual
below in table 4. basis into the future.
Each requirement is linked to the activity(s) Design Documentation. Requirements de-
it supports. This linkage serves to further define scribe business outcomes that a shared service

Table 4. HR LOB requirements format


Primary Unique ID Requirements Type Priority Who Process
Reference Description Linkages

Lists policy The ID by which The requirements Policy, Service, Mandatory, SSC, SSC / The BRM
references for requirements are statement Technology, Critical, Useful Agency activities the
each requirement identified Performance requirement
links to

330
Using Enterprise Architecture to Transform Service Delivery

center could produce for each BRM sub-function terms of customer expectations (requirements)
and are not meant to provide design-level detail. for the service. It could be a very important basis
SSCs will be responsible for translating target for negotiation between customer and provider.
requirements into design-level blueprints that A number of benefits could be achieved from
meet customer expectations. The expectation is this mapping:
that this approach was taken to foster innova-
tion among SSCs, to encourage competition, to It will provide detailed content to the SLA
encourage customer involvement, and to decrease and be a very tangible basis for SLA nego-
the need for maintenance over time. (OPM HR tiation.
LOB, 2006, September) It will reduce risk because expectations will
SSC Selection. The target requirements sup- be clarified and thus surprises will, conceiv-
port the evaluation and selection of SSCs at two ably, also be reduced.
levels: at the program level and at the agency level. It will provide a means for delineating basic
At the program level, HR LOB shared service service (defined by those requirements des-
centers ability to deliver the target requirements ignated as SSC only) and premium service
to agencies is part of the criteria to become shared (defined by those requirements designated
service centers. To be selected as an HR LOB SSC, as SSC/agency).
the candidate SSCs provided self-evaluations of It will enable providers to better predict their
their ability to meet the target requirements. SSCs involvement in the whole process and thus be
that do not fully meet the target requirements are better able to project staffing, infrastructure,
subject to ongoing improvement reviews from the and other resource requirements.
HR LOB Customer Council, a group consisting It will afford a real basis for providers to
of customer agencies that ensures that customer price their services.
needs are addressed by the SSCs.
At the agency level, the self-evaluation results The Target Requirements for Shared Ser-
are an important set of criteria supporting an vice Centers serve as a tangible example of how
agencys selection of an SSC to provide services the HR LOB used EA to develop detailed business
to the agency. In defining its future HR operational and technical requirements that will serve as the
model, each agency will identify which services cornerstone for the successful implementation of
to migrate to an SSC and which HR processes to shared services across the Federal government.
retain within the agency. Having identified the The next section of this chapter, LESSONS
scope of services for the SSC, the agency will LEARNED, outlines critical lessons learned
leverage the results of the self-evaluations to while developing the EA for the HR LOB.
identify the appropriate SSCs to compete for its
HR services and to justify its best value selection
of an SSC. LESSONS LEARNED
SCM-Requirements Mapping. Based on
agency and SSC recommendations, the HR LOB is The HR LOB program has taken an innovative
undertaking an initiative to map the requirements approach to make EA a relevant and useful tool
to Service Component Model (SCM) service for conceiving and managing this new line of busi-
components. According to OPM HR LOB (2007, ness. The potential fiscal benefits of the program
September), understanding the collection of re- are staggering; it has the potential to save U.S.
quirements that supports each service component taxpayers many millions of dollars through con-
would help to define that service component in solidation of services and supporting technology

331
Using Enterprise Architecture to Transform Service Delivery

and infrastructure. The business case, however, sionals with a very particular business outcome
is long-term; agencies will not begin to migrate in mind: the successful adoption of a new shared
to service centers until year five of the program services-based HR delivery model. The agen-
and benefits will not begin to accrue for at least cies that provided resources to participate in EA
three years beyond that. workgroups saw the link between these artifacts
Maintaining the momentum of any govern- and the outcome. They knew that, because the
ment program that does not have demonstrable EA artifacts were intended to be the blueprints
short-term benefits can be a struggle, even if the for the new operating model, participating in the
long-term business case is clear. The HR LOB construction of these blueprints gave them an ac-
program continues to exist in part because of tive voice in designing the new model.
the experience and insight of the program man- The artifacts were never meant to be an abstrac-
agement team. Some of that insight is shared tion of a theoretical to-be state but are blueprints
below. for very real impending change. This relevance
motivated solid participation and this participa-
Sponsorship tion resulted in deliverables that reflect a broad
government-wide point of view on an unparalleled
No EA initiative can survive without a credible scale. This broad participation also strengthened
executive sponsor who is willing to visibly and buy-in into a program that had many skeptics at
vocally support it. The HR LOB programs sponsor the inception of the program.
reports directly to the Director of the U.S. Office Lesson learned: Find relevant business rea-
of Personnel Management. The placement of the sons to do EA; make sure people understand the
program at this high level provides the program links between EA and those business outcomes
with a credibility that would not exist had the and involve them in the development of the solution
program been buried in the organization. to increase buy-in and win hearts and minds.
The program director came from the private
sector, bringing his 40+-year career experience Political Correctness
to this directorship. During his tenure, he reached
out to a variety of stakeholders and interests Working with a consortium of 24 diverse govern-
including the Office of Management and Bud- ment agencies to produce defined EA deliverables
get, participating agency HR executives, shared with limited resources in a specific time frame was
services providers, and professional organizations a tremendously complex undertaking. Cultivating
on the relevance of EA to the overall HR LOB their support and soliciting meaningful involve-
transformation effort. This program has made ment required significant resources and more
great progress in four years in large part due to than a little tenacity. It also required a thoughtful
the experienced leadership of this director. approach to communicating certain concepts and
Lesson learned: Engage an executive spon- plans. Although program managers made efforts to
sor who is both capable and willing to take on an communicate as much as possible as frequently as
active leadership role to drive the EA initiative possible, sometimes the messages were necessar-
to succeed. ily shaped by political correctness: certain topics
were understated and certain words were avoided.
Relevance Communication was some times watered down
and messages, at times, became mixed. Com-
The HR LOB EA artifacts (with the exception of munication frequently required a balancing act
the Technical Model) were produced by HR profes- to address disparate concerns. Certainly, candor

332
Using Enterprise Architecture to Transform Service Delivery

is discouraged in many environments in both A formal change management program identi-


the private sector and the public sector but the fies the potential change issues and addresses them
public sector can be particularly restrained. in a holistic way. A change management program
For example, an early version of the HR LOB identifies pockets of resistance, strategies about
Target Requirements for Shared Service Centers how to overcome this resistance, and puts action-
referred to shared service centers providing busi- able plans into place to achieve the strategy. It
ness process and technology support for selected also provides a coherent communication program
core functions. There was disagreement among the that orchestrates the various messages that are
stakeholders concerning the mention of business provided to various stakeholder groups. And it en-
process support because the original HR LOB courages broad-based participation that produces
business case was based on savings from tech- both results and buy-in into the results.
nology consolidation and the original Concept of Lesson learned: Dont assume everyone un-
Operations therefore also focused on technology derstands the value of EA. Implement a formal
consolidation. Most stakeholders agreed to the change management program to educate stake-
SSCs taking on administrative process support as holders on the value of EA, address resistance to
well as technology support, but the concerns were doing EA, and increase the probability of having
addressed by deleting the words process and a successful, relevant result.
from the report narrative, leaving just technol- Developing an EA across a broad-based
ogy support. Ironically, there remained target community such as the U.S. Federal government
requirements in the addenda of the report that requires innovation and enthusiasm to maintain
spoke to business process support. momentum. The next section of this chapter, FU-
Lesson learned: Work hard to communicate TURE TRENDS AND RESEARCH, provides
clearly and openly, but political correctness may insight into how EA can be used to help govern-
at times triumph over candid, open communica- ment calibrate how it delivers shared services to
tion. its customers.

Change Management
FUTURE TRENDS AND RESEARCH
The EA efforts of the HR LOB program demon-
strate that business enterprise architecture can A widening resource gap in government has
drive transformation. However, business profes- produced an imperative for challenging any and
sionals can be quite skeptical of EA and claim it all government budgets that do not contribute
is time consuming, irrelevant, and esoteric. Even directly to government services. The issue is
when you can demonstrate true business relevance, global in nature and based on a fundamental
you have to convince your stakeholders. A formal reality: demographics. As nations populations
change management program can help. age, tax bases taper down thereby reducing funds
In the beginning, HR LOB EA efforts did available for government programs. At the same
not have the support they eventually came to time, aging populations have basic health and
have. The HR LOB Business Reference Model welfare needs that increase the need for govern-
was the first of the EA artifacts to be developed ment spending. Costs go up while revenues go
and many BRM workgroup participants told us down. In this climate, administrative budgets are
they attended BRM work sessions because they certainly likely to be reduced. High cost operating
were told to. In some instances, participants told models for administrative services are becoming
subordinates to attend. a phenomenon of the past.

333
Using Enterprise Architecture to Transform Service Delivery

Furthermore, the maturing of government Reduce costs by moving transactional and


workforces is producing a drain on government administrative processes to shared service
talent resulting in a shrinking knowledge base centers
around policies and practices. It is estimated that Leverage the knowledge and experience of
over the next ten years, 60% of the United States HR professionals that remain at the agency
Federal government workforce will become eli- level to do the more valuable, strategic
gible for retirement (Springer, n.d.). The inevitable work of Human Capital Management for
loss of experience and intellectual capital could the agency
dramatically degrade government services.
Agency Transformation through Shared The UK government embraced the concept
Services some time ago, having identified shared services as
In this era of funding constraints and dimin- a key enabler of Transformational Government.
ished intellectual capital, we must find innovative They believe that shared services offers the
ways to effectively deliver government services opportunity to accelerate change in the culture
with the resources that remain. The Human Re- of Public Sector organizations and improve the
sources Line of Business has chosen to adopt delivery of services to citizens. Unless taxes and
a shared services-based HR service delivery other revenues rise dramatically (one unaccept-
model, an operational model that has yielded able, the other unlikely), it follows that maximiz-
profound benefits in the private sector for quite ing Public Value requires not only greater effi-
some time and is now gaining ground in the U.S ciency but genuine and significant Public Sector
public sector: EquaTerra and the International transformation. This must not only occur within
Public Management Association for Human individual organizations but critically across or-
Resources (2006) report that 58% of Federal ganizations; removing unnecessary complexity
agencies surveyed already employ some shared and duplication at all levels. The move to shared
services to deliver HR services. The HR LOB services will greatly improve the main focus of
is working toward expansion of this operating Public Sector Transformation improved citizen
model throughout the United States Federal service through delivering Efficiency, Effective-
government to: ness, and Employee Experience. And since the

Figure 6. Transformation of the HR function resources will shift

Strateg
Strategy
Strategy

perf.
performance
enhancement
performanc
performance
enhancemen
enhancement
transaction
performance
enhancement
transaction
administratio
administration admin
transactions
administration

334
Using Enterprise Architecture to Transform Service Delivery

cost of a public sector back office in the U.K. is Future of Enterprise Architecture in
estimated to be two and a half times the cost of the U.S. Federal Government
its private sector counterpart, shared services
also has the potential to significantly reduce cost The FEAPMO (2006, December) advocates the
(BuyIT Best Practice Network & Shared Services concept of segment architecture. A segment
Advisory Group, 2006). architecture is a shared vision for business and
The HR Line of Business is looking at IT transformation within a core Mission area or
shared services as a strategy for realizing common service. Segment architectures have
comparable benefits through transforming the been formed around each of the Federal lines
Human Resources function across the United of business, including the HR Line of Business
States government. Agencies currently apply a (section 2, p.9).
majority of their HR resources to administrative Over the years, resource management at the
and transactional work and far fewer resources to individual agency level has resulted in a stove-
performance enhancement and strategic work. If a piped approach to agency business processes,
preponderance of administrative and transactional services and technology. One might surmise
activities were moved to shared service centers, that adding the segment layer opens up an op-
resources that remain at agency HR departments portunity for a whole new layer of stovepipes!
could be shifted to more valuable work. A shared The FEA framework, however, works to prohibit
services-based operating model would have fewer this. Segment architectures roll up to government-
agency HR personnel doing administrative and wide reference models which provide visibility
transactional work, allowing a major shift of across segments and thus serve to identify and
resources to performance enhancement work help manage redundancy. More important, this
and strategy. This new operational model will government-wide perspective helps identify op-
enable agency HR departments to do more with portunities for collaboration and sharing across
less (see figure 6). lines of business. This has the potential for a
Enterprise Architecture proved invaluable fundamental shift in the management of govern-
to devising the new operational model. The HR ment resources in the future.
LOB Service Component Model has identified And just as government-wide reference models
the reusable business services that have been provide a means for consolidating segment archi-
proposed to be candidate shared services. The tectures, segment architectures provide a means
collaboration that took place to build this model for consolidating solution level architectures
provided an objective technique and forum for and the means for identifying opportunities
discussing those services that could become part for cross-agency collaboration and sharing at this
of a providers portfolio of services. The Business level. Figure 7, published by the FEA PMO (2006,
Reference Model, similarly, provides a govern- December), illustrates the relationships between
ment-wide reference for those more value-adding enterprise architecture, segment architecture, and
processes that will remain with the agency HR solution architecture (section 1, p.9).
operations. And the Technical Model provides
a common government-wide abstraction of the Plug and Play: The Future of Shared
technology that will enable these services plus Services
the standards and specifications that will promote
reusability and interoperability at the technical Given funding and time constraints, shared
services level. service providers will not have the luxury to

335
Using Enterprise Architecture to Transform Service Delivery

Figure 7. Architectural levels and attributes

design and build solutions. Public sector provid- provide these solutions to customers on demand
ers will likely not be appropriated the funds for will be critical to the success or failure of any
these capital outlays; private sector providers shared service provider. Segment architectures
will not have the time or expertise to develop will be the key to identifying these partnerships
new solutions. Providers will likely partner with and defining these solutions for rapid deployment
best of breed providers to link together best of to a providers customer base.
breed composite solutions. The ability to rapidly

Box 2.
Partnering to deliver
the GoLearn model

As part of the E-Training initiative established by the E-Government Act of 2002, the Office of
Personnel Management (OPM) established an online training capability, branded GoLearn. GoLearn
was intended to be a catalyst for transforming the way government manages human capital by
effectively and efficiently implementing solutions that align workforce development with organi-
zational goals, resulting in improved mission attainment (GoLearn, n.d., para.1).

GoLearn provides a learning management system (LMS) with online course content and access
to government-mandated training. To provide for rapidly changing demands of agency training
needs, GoLearn also provides a wide variety of content from multiple vendors and serves as a
contracting vehicle for agencies to obtain training as needed. GoLearn provides the following
highly technical contracting services:

development of statements of work (SOWs) and task orders


coordination of activities between GoLearn vendors and client agencies
management of task order award competitions
awarding task orders (GoLearn, n.d.).

This approach to establishing a portfolio of services is a viable model for creating the best composite
solutions on demand from any number of suppliers in the marketplace.

336
Using Enterprise Architecture to Transform Service Delivery

Conclusion REFERENCES

This chapter demonstrated how the HR LOB Borins, Sandford. (2006). The Challenge of In-
is driving transformation of Federal Human novating in Government (2nd ed.). Retrieved 5
Resources service delivery via enterprise archi- June 2007 from IBM Center for the Business of
tecture. The Office of Management and Budget Government Web site: http://www.businessofgov-
formulated an enterprise architecture strategy for ernment.org/pdfs/BorinsReprint.pdf
the U.S. government to help government agencies
Breul, J.D. (2006). What is Transformation?. In
manage complexity and move toward innova-
M.A. Abramson, J.D. Breul, & J.M. Kamensky
tion and transformation. The HR LOB used this
(Eds.), Six Trends Transforming Government (p.
strategy and developed an enterprise architecture
7). Retrieved 16 April 2007 from IBM Center for
that provides a common, government-wide view
the Business of Government Web site: http://www.
and vocabulary for the HR function a view
businessofgovernment.org/pdfs/SixTrends.pdf
and vocabulary that provide a basis for common,
government-wide solutions that agencies will Breul, J.D., & Morales, A. (2007, June). 2007-
implement to realize the vision and goals of the 2008 Research Announcement: Providing Cut-
Federal governments HR transformation. ting Edge Knowledge to Government Leaders.
Using broad-based collaboration as its fun- Retrieved 16 July 2007 from IBM Center for
damental governance principle, the HR LOB Business of Government Web site: http://www.
program achieved consensus on its enterprise businessofgovernment.org/pdfs/Research_An-
architecture and is using that EA to define shared nouncement_07.pdf
services-based service delivery expectations and
BuyIT Best Practice Network & Shared Services
drive agency transformation to this new opera-
Advisory Group. (2006). Shared Services in the
tional model.
Public Sector: Vision. Retrieved 27 April 2007
from BuyIT Best Practice Network Web site: http://
www.buyitnet.org/Best_Practice_Guidelines/
Thoughts on Future
SharedServicesPubSect/docs/G1%20Vision.pdf
Research
EquaTerra & International Public Management
1. As enterprise architecture programs mature Association for Human Resources [IPMA-HR].
throughout the U.S Federal government, (2006, June). Human Resources Transformation
opportunities may exist to identify services in Public Sector Organizations. Retrieved 2
for reuse that span lines of business. Future May2007 from the IPMA-HR Web site: http://
research could explore how other public www.ipma-hr.org/pdf/TransformationWhitePa-
sector enterprises have leveraged EA across per.pdf
lines of business to realize process improve-
McDavid, D.W. (1999). A standard for business
ments, cost savings, and reuse of assets.
architecture description. IBM Systems Journal,
2. Shared service centers will likely seek to
38 (1), 12-31. Retrieved 20 April 2007 from IBM
partner with other public and/or private
Systems Journal Web site: http://www.research.
sector providers to supply best of breed
ibm.com/journal/sj/381/mcdavid.html
solutions quickly and effectively. Future
research could explore how shared service Prabandham, S.M. (2007, June). A Case Study
centers have used EA to build partnering in Service Component Reusability and Interop-
capability and to manage the multi-provider erability: HR LOB Technical Reference Model.
supply chain. Unpublished manuscript.

337
Using Enterprise Architecture to Transform Service Delivery

Springer, L.M. (n.d.). Retirement Systems Mod- United States. Executive Office of the President.
ernization. Retrieved 1 August 2007 from the Office of Management and Budget [OMB]. (2007,
OPM Web site: http://www.opm.gov/rsm/index. July). FEA Consolidated Reference Model Docu-
asp ment Version 2.2. Retrieved 16 July 2007 from the
OMB E-Gov Web site: http://www.whitehouse.
Stevenson, D.A. (1996, April). Positioning Enter-
gov/omb/egov/documents/FEA_CRM_v22_Fi-
prise Architecture. In D.A. Stevenson, Component
nal_July_2007.pdf
Based Enterprise Architecture. Dissertation pre-
sented to the Department of Information Systems, United States. Executive Office of the President.
University of Cape Town, South Africa. Retrieved Office of Management and Budget [OMB]. (n.d.a).
10 August 2007 from the IS World Net Web site: E-Gov Background. Retrieved 8 May 2007 from
http://users.iafrica.com/o/om/omisditd/denniss/ the OMB E-Gov Web site: http://www.whitehouse.
text/eapositn.html gov/omb/egov/g-1-background.html
United States. Executive Office of the President. United States. Executive Office of the President.
Office of Management and Budget [OMB]. (2005, Office of Management and Budget [OMB]. (n.d.b)
November). The Data Reference Model Version Federal Enterprise Architecture. Retrieved 22
2.0. Retrieved 10 August 2007 from the OMB May 2007 from the OMB E-Gov Web site: http://
E-Gov Web site: http://www.whitehouse.gov/omb/ www.whitehouse.gov/omb/egov/a-1-fea.html
egov/documents/DRM_2_0_Final.pdf
United States. General Accountability Office
United States. Executive Office of the President. [GAO]. (2003, November). Information Technol-
Office of Management and Budget [OMB]. Federal ogy: Leadership Remains Key to Agencies Mak-
Enterprise Architecture Program Management ing Progress on Enterprise Architecture Efforts.
Office [FEAPMO]. (2006, December). FEA Prac- Retrieved 10 October 2007 from the GAO Web
tice Guidance. Retrieved 22 October 2007 from site: http://www.gao.gov/new.items/d0440.pdf
the OMB E-Gov Web site: http://www.whitehouse.
United States. Office of Personnel Management
gov/omb/egov/documents/FEA_Practice_Guid-
[OPM]. GoLearn. (n.d.) The Office of Personnel
ance.pdf
Managements GoLearn Program. Retrieved 24
United States. Executive Office of the President. October 2007 from the GoLearn Web site: http://
Office of Management and Budget [OMB]. (2006, www.golearn.gov/MaestroC/index.cfm?room=w
December). Expanding E-Government: Making elcome&roomaction=about
a Difference for the American People Using In-
United States. Office of Personnel Management
formation Technology. Retrieved 30 April 2007
[OPM]. (n.d.). Human Capital Assessment and
from the OMB E-Gov Web site: http://www.
Accountability Framework [HCAAF]. Retrieved
whitehouse.gov/omb/egov/documents/expand-
18 May 2007 from the OPM Web site: http://www.
ing_egov_2006.pdf
opm.gov/hcaaf_resource_center/2-2.asp
United States. Executive Office of the President.
United States. Office of Personnel Management
Office of Management and Budget [OMB]. (2007,
[OPM]. Human Resources Line of Business [HR
February). Report to Congress on the Benefits of
LOB]. (2006, January). HR LOB Business Refer-
the E-Government Initiatives. Retrieved 16 May
ence Model version 2. Retrieved 23 April 2007
2007 from the OMB E-Gov Web site: http://www.
from the OPM HR LOB Web site: http://www.
whitehouse.gov/omb/egov/documents/FY07_
opm.gov/egov/documents/architecture/BRM_Re-
Benefits_Report.pdf
port_V2.pdf

338
Using Enterprise Architecture to Transform Service Delivery

United States. Office of Personnel Management ponent Model version 1. Retrieved 23 April 2007
[OPM]. Human Resources Line of Business [HR from the OPM HR LOB Web site: http://www.
LOB]. (2006, February). HR LOB Data Model ver- opm.gov/egov/documents/architecture/HRLOB-
sion 1. Retrieved 23 April 2007 from the OPM HR SCMv1.pdf
LOB Web site: http://www.opm.gov/egov/docu-
United States. Office of Personnel Management
ments/architecture/HRLOB_DM.pdf
[OPM]. Human Resources Line of Business
United States. Office of Personnel Management [HR LOB]. (2007, September). HR LOB Service
[OPM]. Human Resources Line of Business [HR Component Model version 2. Retrieved 15 No-
LOB]. (2006, June). HR LOB Performance Model vember 2007 from the OPM HR LOB Web site:
version 1. Retrieved 23 April 2007 from the OPM http://www.opm.gov/egov/documents/architec-
HR LOB Web site: http://www.opm.gov/egov/doc- ture/HRLOBSCMv2.pdf
uments/architecture/HRLOB_PM_6.30.06.pdf
United States. Office of Personnel Management
United States. Office of Personnel Management [OPM]. Human Resources Line of Business [HR
[OPM]. Human Resources Line of Business LOB]. (n.d.). HR LOB Benefits and Accomplish-
[HR LOB]. (2006, September). HR LOB Target ments. Retrieved 30 May 2007 from the OPM
Requirements for Shared Service Centers version HR LOB Web site: http://www.opm.gov/egov/
2.0. Retrieved 23 April 2007 from the OPM HR HR_LOB/benefits/
LOB Web site: http://www.opm.gov/egov/docu-
ments/requirements/Reqv2.pdf
United States. Office of Personnel Management Endnote
[OPM]. Human Resources Line of Business [HR
LOB]. (2006, September). HR LOB Service Com- 1
See Office of Personnel Management [OPM]
(n.d.), for more information on these out-
comes defined in the HCAAF.

339
340

Chapter XV
Enterprise Architecture as
Context and Method for
Designing and Implementing
Information Security and Data
Privacy Controls in
Government Agencies
Scott Bernard
Carnegie Mellon University, USA

Shuyuan Mary Ho
Syracuse University, USA

Abstract

Government agencies are committing an increasing amount of resources to information security and
data privacy solutions in order to meet legal and mission requirements for protecting agency informa-
tion in the face of increasingly sophisticated global threats. Enterprise Architecture (EA) provides an
agency-wide context and method that includes a security sub-architecture which can be used to design
and implement effective controls. EA is scalable, which promotes consistency and alignment in controls
at the enterprise, program, and system levels. EA also can help government agencies improve existing
security and data privacy programs by enabling them to move beyond a system-level perspective and
begin to promote an enterprise-wide view of security and privacy, as well as improve the agility and ef-
fectiveness of lifecycle activities for the development, implementation, and operation of related security
and privacy controls that will assure the confidentiality, integrity, and availability of the agencys data
and information. This chapter presents the EA3 Cube EA methodology and framework, including an
integrated security architecture, that is suitable for use by government agencies for the development of
risk-adjusted security and privacy controls that are designed into the agencys work processes, informa-
tion flows, systems, applications, and network infrastructure.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Architecture as Context and Method

Introduction One fundamental aspect of security and


privacy is the realization that there isnt a 100%
Designing and implementing effective controls for foolproof solution or set of solutions for any
information security and data privacy in govern- government agency. The reason for this is that
ment agencies is optimized through integration program activities and controls are created by
with other areas of governance including: strategic members of the agency, and even the people in
planning, capital investment planning, enterprise the most trusted security or system administration
architecture, program management, and work- positions can decide to disable, evade, or sabo-
force planning. This chapter focuses on the role tage the security solutions. This type of insider
that enterprise architecture (EA) plays in design- threat is the Achilles Heel of all security and
ing, implementing, and operating security and privacy programs, and creates what are referred
data privacy controls in complex organizations, to as risk-adjusted solutions. This means that
including government agencies. Information se- a security or privacy solution is selected based
curity and data privacy are intertwined concepts on several considerations, including the cost, the
that work like a thread that weaves through the level of protection needed, the effect on end-users
strategic, business, and technology levels of an and system administrators, and the effectiveness
EA framework to produce risk-adjusted solutions of available technologies.
that assure the confidentiality, integrity, and avail- An integrated set of security and privacy
ability of the agencys data and information in controls for the agency is best created by includ-
the face of growing global threats to government ing these requirements in the planning of all EA
functions and mission accomplishment. segments, components, and systems; doing so in
The threats to the security of a government a top-down manner (beginning at the strategic
agencys business and technology operating level of the EA framework) so that security is an
environment come in many forms. This in- embedded part of all of the agencys strategic
cludes hackers, disgruntled employees, runaway initiatives and business services. For information-
technologies, poor system maintenance, natural centric enterprises, including security and privacy
disasters, terrorism, and unintentional mistakes. as a required design element of strategic initiatives
As the global use of information technology (IT) can provide a strong and meaningful statement
continues to accelerate, government agencies about the importance of protecting the business
are increasingly exposed to daily threats to the and technology operating environment.
confidentiality, integrity, and availability of their Information security and data privacy require-
information. How seriously the agency addresses ments and solutions should be a consideration in
these threats is often related on how aware the business process reengineering and improvement
agency is of its dependency on IT to support key activities throughout the agency, and should be
government services, and the probability of a part of the design of information flows, IT systems,
threat affecting the agency. Without an awareness applications, databases, knowledge warehouses,
of the full scope of global threats and/or industry Websites, and network infrastructures. Informa-
best practices to counter those threats, government tion security and data privacy are also key checklist
agencies may not invest in a sufficiently robust items when making acquisition decisions for IT
and scalable information security and data privacy hardware, software, and support services.
program, nor will they incorporate best practices
such as EA to promote program success.

341
Enterprise Architecture as Context and Method

Enterprise Architecture to meet particular organizational requirements.


General Concepts The following equation is the sound bite ver-
sion of what EA is all about, and is intended to
EA is a management practice and a documenta- show the difference between EA and technology
tion methodology that is devoted to improving planning (T) that it is driven by strategic goals
the performance of organizations by enabling (S) and business requirements (B): EA = S + B
them to see themselves in terms of a holistic and + T (Bernard, 2005).
integrated view of their strategic direction, busi-
ness practices, information flows, and technology EA as a Management Program
resources. By developing current and future
versions of this integrated view, an organization EA is a management program that provides a stra-
can better manage the transition from current to tegic, integrated approach to resource planning.
future operating methods. This transition includes An EA program is part of an overall governance
the identification of new goals, activities, and all process that determines resource alignment,
types of capital and human resources (includ- develops standardized policy, enhances decision
ing information technology) that will improve support, and oversees resource development
bottom line financial and mission performance activities. EA can help to identify gaps in the
(Bernard, 2005). performance of line of business activities and the
The strategic use of resources is increasingly capabilities of supporting IT services, systems,
important to the success of public and private and networks. As a management program, EA
sector organizations as well as other types of provides:
enterprises such as consortia and extended en-
terprises involving parts of multiple internal and Resource Alignment: Resource planning
external participants (e.g., supply chains). How and standards determination
to get the most from business, technology, and Standardized Policy: Resource governance
human resources requires an organization to think and implementation
in terms of enterprise-wide solutions, rather than Decision Support: Financial control and
individual system development projects. Doing configuration management
this requires a new approach to planning and Resource Oversight: Lifecycle approach
systems development, an approach that during to development/management
the past twenty years has come to be known as
Enterprise Architecture. The word enterprise Resource Alignment
implies a high-level, strategic view of the entire
organization, while the word architecture implies EA supports strategic planning and other opera-
a structured framework for the analysis, planning, tional resource planning processes by providing
and development of all types of resources. macro and micro views of how resources are to
With regard to resources, one of the greatest be leveraged in accomplishing the goals of the
challenges that many enterprises continue to face organization. This helps to maximize the effi-
is how to identify the business and technology ciency and effectiveness of these resources, which
components of strategic initiatives. A big part of in turn will help to promote the organizations
this challenge is that IT in particular has histori- competitive capabilities. IT resources and associ-
cally not been viewed as a strategic asset. As ated development projects within the organization
such, planning activities often have focused on the should be reviewed to determine if they support
development of individual technology solutions (and conform to) one or more strategic goals. If a

342
Enterprise Architecture as Context and Method

resource and/or project is not aligned, then its value Decision Support
to the organization will remain in question.
EA provides support for IT resource decision-
Standardized Policy making at the executive, management, and staff
levels of the organization. At the executive level,
EA supports the implementation of standardized EA provides visibility for large IT initiatives and
management policy pertinent to the development supports the determination of strategic alignment.
and utilization of IT and other resources. By At the management level, EA supports design
providing a holistic, hierarchical view of current and configuration management decisions, as well
and future resources, EA supports the establish- as the alignment of IT initiatives with technical
ment of policy for: standards for voice, data, video, and security. At
the staff level, EA supports decisions regarding
Identifying strategic and operational require- operations, maintenance, and the development of
ments IT resources and services.
Determining the strategic alignment of
activities and resources Resource Development
Developing enterprise-wide business and
technology resources EA supports standardized approaches for devel-
Prioritizing the funding of programs and oping IT and other resources. Depending on the
projects scope of the resources involved and the avail-
Overseeing the management of programs able timeframe for development, various system
and projects development lifecycle methods can be used to
Identifying performance metrics for pro- reduce the risk that cost, schedule, or performance
grams and projects parameters may not be met. EA further sup-
Identifying and enforcing standards and ports standardized, proven approaches to project
configuration management management that promote the comprehensive and
effective oversight of ongoing programs and new
Policy documents include those which can be development projects. Finally, EA supports the
categorized as general guidance (e.g., high-level use of a standardized process for selecting and
directives and memos); specific program guidance evaluating investment in IT resources from a
(e.g., plans, and manuals); and detailed process business and financial perspective.
guidance (e.g., standard operating procedures). By
using these hierarchical categories of documents, EA as a Documentation Method
succinct and meaningful policy is established. It
does so in a way that no single policy document References to EA began to emerge in the late
is too long and therefore not too burdensome to 1980s in various management and academic
read. It is also important to understand how the literatures, with an early focus on technical or
various areas of policy are inter-related so that systems architectures and schemas for organiz-
program implementation across the enterprise ing information (Zachman, 1987; Spewak 1992).
is coordinated. EA policies must integrate with The concept of enterprise architecture docu-
other policies in all governance areas, so as to mentation emerged in the early 1990s and has
create an effective overall resource management now evolved to include views of strategic goals,
and oversight capability. business services, information flows, systems
and applications, networks, and the supporting

343
Enterprise Architecture as Context and Method

infrastructure. Additionally, documentation ations are an ongoing aspect of an EA program.


includes threads that pervade every level of the Figure 1 shows the relationship of these six basic
architecture. These threads include standards, elements (Bernard, 2005).
security, and workforce planning.
As a documentation method, EA provides: EA Documentation Element 1:
The Framework
EA Approach: A modeling framework and
implementation methodology The EA documentation framework identifies the
Current Views: Views of as-is strategies, scope of the architecture to be documented and es-
processes, and resources tablishes relationships between the architectures
Future Views: Views of to-be strategies, areas. The frameworks scope is reflected through
processes, and resources its geometric design and the areas that are identi-
EA Management Plan: A plan to move from fied for documentation. The framework creates an
the current to the future EA abstracted set of views of an enterprise through
the way that it collects and organizes architecture
The approach to EA documentation is based information. An example that will be used is the
on the adoption of (1) a documentation framework framework that is illustrated in Figure 2, which
and (2) related implementation methodology. has a cubic shape with three dimensions that
Documenting (3) the current and (4) future views relate to different aspects of documenting the
of an EA helps the organization to identify and abstracted enterprise.
manage its current resources, select and implement Known as the EA Cube (Bernard, 2005),
future resources, and manage the EA transition the levels of this example framework are hierar-
in an effective, standardized manner. The (5) chical so that the different sub-architectures (that
transition from current to future architectures and describe distinct functional areas) can be logically
(6) security, standards, and workforce consider- related to each other. This is done by positioning

Figure 1. Elements of EA documentation

Lines onetwork
f B usiness Linesnetwork
o f B usiness
network
infrastructure
C 2 network
infrastructure
C
H ighest infrastructure
goals & infrastructure
Updated Strategic O
network O network
Level & V iew initiatives Goals & Initiatives M
M
network
infrastructure network
infrastructure P
1 products &
infrastructure
P
O Improvedinfrastructure
Business O
network N
Services architecture network
Products and Services N
EA Framework

network
infrastructure E management & network
infrastructure E
data &
infrastructure N transition plan Enhancedinfrastructure
Data and N
network T network T
information Information Flows
S
infrastructure S
network 5 network
infrastructure
Systems &
infrastructure Integratedinfrastructure
Systems
network
applications network
and Applications
network
infrastructure network
infrastructure
L ow est networks &
infrastructure Optimizedinfrastructure
Networks
L evel & View infrastructure and Infrastructure
6
multi-level threads (Security/Standards/workforce)

CURRENT 3 FUTURE 4
ARCHITECTURE ARCHITECTURE

344
Enterprise Architecture as Context and Method

Figure 2. The EA cube documentation framework

ts
en i t h
m s e w rc e s
e ri u
g
: S te rp e s o
n 2 en d r
sio h e a n
F ram ew ork D im ension 3: artifacts e n o f t it i e s
i m s iv
T he docum entation of com ponents at each k D ea ct
o r -a r s a
lev el of the architecture, including all threads e w su b in e s
am a l s
F r r ti c t b u
V e s tin c
d i

lines of business
network
infrastructure
network

S ub -architectures; distinct functional


F ram ew ork D im ension 1: levels
goals &
infrastructure
network c
Security / Standards / workforce

initiatives
Technology Business Strategy

areas and their relationships


o
infrastructure
network m
products &
infrastructure p
network o
Services n
infrastructure
network e
data &
infrastructure n
network t
information S
infrastructure
network
Systems &
infrastructure
network
applications
infrastructure
network
networks &
infrastructure
infrastructure

high-level strategic goals/initiatives at the top, encompassing all five framework levels that is
business products/services and data/information focused on one or more LOBs can be referred to
flows in the middle, and supporting systems/appli- as a segment of the overall EA.
cations and technology/infrastructure at the bot-
tom. In this way alignment can be also be shown EA Documentation Element 2:
between strategy, information, and technology, EA Components
which aids planning and decision-making.
To lower risk and promote efficient, phased EA components are the changeable processes
implementation methods, the EA framework is and resources that may extend enterprise-wide or
divided into segments of distinct activity, also be contained within a specific line of business.
referred to as Lines of Business (LOBs). For Examples of EA components include strategic
example, each LOB has a complete sub-architec- goals and initiatives; business products and ser-
ture that includes all five hierarchical levels of vices; information flows, knowledge warehouses,
the EA Framework. The LOB therefore can in and data objects; information systems, software
some ways stand alone architecturally within the applications, enterprise resource programs, and
enterprise except that duplication in data, applica- Web sites; voice, data, and video networks; and
tion, and network functions would occur if each supporting infrastructure including buildings,
LOB were truly independent. An architecture server rooms, wiring runs/closets, and capital

345
Enterprise Architecture as Context and Method

Figure 3. Examples of EA components

network
network
infrastructure
goals &
infrastructure
mission Statement V e rtica l
Strategic
network
goals C o m p o n en ts
initiatives Strategic initiatives
network
infrastructure
products & manufacturing
infrastructure
Financial
network
Services
Services marketing & Sales
network
infrastructure Examples
data &
infrastructure
knowledge warehouse
databases
of EA
information network
& data marts
data interchange Components
network
infrastructure
Systems & information Systems
infrastructure
web Sites
applications network
desktop applications
network
infrastructure C ro ss cu ttin g
intranets & extranets C o m p o n e nts
technology & infrastructure
telecommunications
infrastructure buildings & equipment

equipment. Figure 3 provides examples of vertical level of the framework, which are archived in an
and crosscutting EA components at each level of on-line EA repository to make them useable by
the EA Framework. various EA stakeholders.

EA Documentation Element 3: EA Documentation Element 4:


Current Architecture Future Architecture

The current architecture contains those EA com- The future architecture documents those new or
ponents that currently exist within the enterprise modified EA components that are needed by the
at each level of the framework. This is sometimes enterprise to close an existing performance gap
referred to as the as-is view. The current view or support a new strategic initiative, operational
of the EA serves to create a baseline inventory of requirement, or technology solution.
current resources and activities that is documented As is shown in Figure 4, the future architecture
in a consistent way with the future view of the is driven at both the strategic and tactical levels in
EA so that analysts can see gaps in performance three ways: new directions and goals; changing
between future plans and the current capabilities. business priorities; and emerging technologies.
Having an accurate and comprehensive current The EA cannot reflect these changes in the future
view of EA components is an important refer- architecture unless the enterprises leadership
ence for project planning, asset management, and team provides the changes in strategic direction
investment decision-making. The current view and goals; unless the line of business managers
of the EA is composed of artifacts (documents, and program managers provide the changes in
diagrams, data, spreadsheets, charts, etc.) at each business processes and priorities that are needed

346
Enterprise Architecture as Context and Method

Figure 4. Enterprise architecture drivers of change

new direction & goals

S trategic
(Lead ership T e am ) operating
C a pa b ilitie s Scenarios C a p a b ilitie s
of the new business priorities of the
(M a na gem e nt T ea m )
C u rre n t F u tu re

T a ctical
E n te rp rise program E n te rp rise
emerging technologies
(S u ppo rt T ea m ) plans

to accomplish the new goals; and unless the sup- Management Plans can also be called an EA
port/delivery staff identifies viable technology Transition Strategy or an EA Modernization
and staffing solutions to meet the new business Blueprint.
requirements.
The future architecture should cover planned EA Documentation Element 6:
changes to EA components in the near term Planning Threads
(tactical changes in the next 1-3 years), as well as
changes to EA components that are a result of the EA documentation includes threads of common
implementation of long-term operating scenarios activity that are present in all levels of the frame-
that look 4-10 years into the future. These sce- work. These threads include IT-related security,
narios incorporate different internal and external standards, and workforce considerations.
drivers and can help to identify needed changes in IT Security: Security is most effective when
processes, resources, or technology that translate it is an integral part of the EA management
to future planning assumptions, which in turn program and documentation methodology. A
drive the planning for new EA components. comprehensive IT Security Program includes
internal controls for systems security and data
EA Documentation Element 5: privacy, and within these areas has several focal
EA Management Plan areas including: information, personnel, opera-
tions, and facilities. To be effective, IT security
The EA Management Plan articulates the EA must work at all levels of the EA framework and
program and documentation approach. The EA within all of the EA components.
Management Plan also provides descriptions of IT Standards: One of the most important
current and future views of the architecture, and functions of the EA is that it provides technology-
a sequencing plan for managing the transition to related standards at all levels of the EA framework.
the future business/technology operating envi- The EA should draw on accepted international,
ronment. The EA Management Plan is a living National, and industry standards in order to pro-
document that is essential to realizing the benefits mote the use of non-proprietary solutions in EA
of the EA as a management program. How the components. This in turn enhances the integration
enterprise is going to continually move from the of EA components, as well as better supporting
current architecture to the future architecture is a the switch-out of components when needed.
significant planning and management challenge, IT Workforce: Perhaps the greatest resource
especially if IT resources supporting key business that an enterprise has is people. It is therefore
functions are being replaced or upgraded. EA important to ensure that IT-related staffing, skill,

347
Enterprise Architecture as Context and Method

and training requirements are identified for LOB processes within organizational structure, and
and support service activities at each level of the artificial intelligence in understanding subtleties
EA framework, and appropriate solutions are re- in human languages and motivation. Information
flected in the current and future architectures. security management draws from disciplines of
information systems, organizational science and
psychology. The levels of importance in infor-
Security Architecture mation classification are perceived differently
Concepts among individuals, which affects management
decisions on the granularity of access control and
The term Security Architecture is used in system access privileges within an organization.
this chapter to encompass IT security and data Managing and discerning the obscurity of human
privacy requirements as well as solutions within behavior continues to challenge management
the context of an over-arching enterprise archi- decisions. While the security mechanism and
tecture. The image of security architecture as part infrastructure-building emphasizes information
of an EA is that of a vertical thread that weaves management, information is ultimately handled
its way through all levels of the EA framework. by humans.
This image was chosen (as opposed to a separate
dedicated level) because information security is CIA: Confidentiality, Integrity and
most effective when it is integral to the enterprises Availability
strategic initiatives, business services, informa-
tion flows, systems/applications, and technology Confidentiality refers to protecting and preserving
infrastructure. private information, such as corporate data, social
The security architecture includes computing security numbers, and financial transactions, to
security, information content security and infor- the extent that it prevents improper disclosure
mation security management. This scope forms from unauthorized entities. Entities here refer
an information security architecture that can be to both individuals and processes. The mecha-
adopted as part of a larger security program. To nism used to protect information is proper access
explain, IT security and data privacy concepts control over information in storage, and the use
are drawn from disciplines of computer science, of encryption when data is transmitted over un-
information science and technology, engineer- trusted or non-secured networks. Authentication
ing, and business management. The study of through validation of credentials, identification
computing security emphasizes user-based ap- and verification of both people and data, should
proaches to modeling information systems with be incorporated into the access control scheme.
the goal of securing information and dataflow. Proper authorization and granular access control
Information content security draws from a variety should be adopted with the Principle of Least
of disciplines of information science as well as Privileges, to allow applications to have suf-
technology (such as classification, categoriza- ficient rights.
tion, natural language processing, information Integrity of information means to ensure the
retrieval, and information seeking and use, etc.), accuracy and completeness of information in
organizational science and psychology. The study transit (or storage) from unauthorized modifica-
of information content security also emphasizes tion. This includes protecting data from entry
user-based systematic approaches to informa- errors, malicious users, transmission errors, and
tion classification, information content filtering application processing errors. It requires that all

348
Enterprise Architecture as Context and Method

system actions are associated with an individual Availability mainly refers to protecting informa-
user who can be held responsible. It also requires tion systems against Denial of Service attacks.
that applications verify the origin of each mes- It ensures system resiliency and timeliness. The
sage to ensure that a malicious individual (man- best practice for availability is to over-build the
in-the-middle) is unable to insert data into the infrastructure and avoid single points of failure
transaction stream. The concept of non-repudia- within the architecture. Availability also refers
tion is enhanced here. Non-repudiation refers to to the utilization of incident response, disaster
the prevention of individuals to be able to deny recovery and business continuity planning.
receipt or transmission of a message; it also veri-
fies the time of the electronic communications so
that a transaction committed by two parties can Security Architecture
not be repudiated. Furthermore, system auditing Framework
and monitoring should be reinforced to address
the criticality of information integrity. These The Security Architecture Framework (SAF)
two concepts work hand-in-hand to provide presented in this chapter is based on and works to-
chronological records of system activity and to gether with the EA3 Cube Framework (Bernard,
track system usage. Auditing identifies incorrect 2005). This eight-layered security architecture
system configurations, process or procedures provides confidentiality, integrity and availability
while monitoring detects anomalies from a set to assure risk-adjusted levels information security
of normalized system records. and data privacy throughout the enterprise. As
Availability is a characteristic that applies to is shown in Figure 6, the eight layers of the SAF
information assets. An asset should be appro- are: (1) information security governance; (2)
priately resilient, available and accessible by an operations security; (3) personnel security; (4)
authorized entity on a timely basis. The assets information and data flow security; (5) systems
can include property like information, infor- security; (6) application development security;
mation systems (both hardware and software), (7) infrastructure security; and (8) physical se-
network infrastructure, facilities and resources. curity.

Figure 6. Security architecture framework


Confidentiality, Integrity, Availability

Strategic
Security Architecture

IS Initiatives
Governance
Enterprise Architecture

Operations
Security Business
Processes
Personnel
Security
Information
App. Information & Dataflow
Systems
Development & Data Flow
Security
Security Security Systems &
Services
Physical Security
Technology
Infrastructure
Infrastructure Security

349
Enterprise Architecture as Context and Method

Table 1.
EA3 Framework Level SAF/IS Governance Level Concepts & Goals

Strategic Initiatives Helps facilitate the achievement of strategic initiatives.

Business Processes Defines how the security policies and guidelines are used.

Defines which guidelines and policies will govern the flow of information and
Information & Dataflow:
data in the enterprise.

Defines which guidelines, policies and baseline will govern the systems, services,
Systems & Services
and applications.

Defines which guidelines and policies will govern the use and procurement of
Technology Infrastructure
technology infrastructure on which systems, services and applications will reside.

Security Architecture Framework need to be clearly stated. In addition, its important


Layer 1: Information Security to clarify to whom, what, where, when and how
Governance such policy applies. Security policy should state
the principles to meet the compliance level. A
The purpose of the IS Governance layer of separate document should describe the compli-
the SAF is to define security strategies, policies, ance requirements. Some questions can be asked
standards and guidelines for the enterprise from to examine whether corporate security policies
an organizational viewpoint. Activities involved are good policies.
with, and documents produced in this layer in-
clude, but are not limited to, High Level Policy Is the policy aligned with corporate mis-
Statements, Access Definition Policies, Fair Infor- sion statement? Is this policy accurate and
mation Practices, and Security Lifecycle Charts. interoperable with other policies that shape
The relationship of SAF/IS Governance concepts the organizations secure business opera-
and goals to the EA3 Framework are as follows: tions?
Does the policy function consistently
The IS Governance layer of the SAF also ad- throughout specified programs, issues,
dresses policy and standards for IT security and or system configurations? Are there any
data privacy as follows: unintended backdoor loopholes in this
Policy: A policy statement defines a corpo- policy?
rate general commitment, business direction, or Is the development of the security policy
intention. An information security policy state- overly costly in terms of time and resourc-
ment reflects managements commitment to the es?
design, implementation, operations, maintenance, Can this policy be easily understood, learned
and improvement of its information security and adapted to all lines of business?
compliance.
Policy formation and evaluation: The cor- If a policy is too general, it might be fuzzy to
porate security policy is formed to address secure implement. If a policy is too specific, it might be
operations among different programs, issues and too tedious to implement. In addition, it might
systems within an organization. The purpose, not be easy to replicate to other lines of business.
scope and the responsibility of the organization When making security policy, various concerns
need to be thought through before roll-out.

350
Enterprise Architecture as Context and Method

Standards: A standard is a set of rules and Security concepts and goals to the EA3 Framework
regulations that control how information systems, are as follows:
materials, products, services, technologies, and The Operations Security layer of the SAF
management processes, etc. should be developed, also addresses risk management and continuity
managed and operated. For example, ISO IEC of operations/disaster recovery planning for IT
27001 / ISO 17799 are sets of standards governing security and data privacy as follows:
information systems security and secure manage- Risk assessment: Risk assessment is a con-
ment operations, which are developed and agreed tinuous and repeated process. Organizations need
among technical committees with broad support. to identify critical components and resources.
In addition, standards such as FISMA, Sarbanes- Then, assess risk exposure based on the asset
Oxley, HIPAA, NIST, or Gramm-Leach-Biley Act values, probability of risks and threats, and the
have been made compliant, and implemented in likely occurrence of those threats to the resources.
private and public sectors. It is important for organizations to recognize
that the sources of threat can be both internal
Security Architecture Framework and external.
Layer 2: Operations Security Vulnerability Assessment: Organizations
can conduct self-assessments. General imple-
The purpose of the Operations Security Layer mentation phases include:
is to define the enterprises intra-organizational
and operational needs as they interact with and Discovery Phase: This is a review-to-
require access to the enterprise IT services, in discover stage. Security analyzer reviews
order to identify and address security needs at documentations about security policies,
the enterprises organizational level. Activities standards, guidelines, information clas-
involved with, and documents produced in this sification schemes, access control plans,
layer include, but are not limited to, Risk As- and applications/systems security require-
sessment, Authorization Models, Access Control ments.
User Requirements, Business Impact Analysis, Manual Inspection Phase: Compare ex-
and Disaster Recovery & Business Resumption isting systems with what was recorded in
Planning. The relationship of SAF/Operations documentation.

Table 2.
EA3 Framework Level SAF/Operations Security Level Concepts & Goals

Creates security and assurance in the internal operations through the use of
Strategic Initiatives
disaster recovery, etc. and based upon risk assessment analysis, etc.
Business Processes Identifies specific needs of each LOB in the form of risk assessment, etc.
Defines levels of information classification and access control system to address
enterprise specific problems. Plan the information flow during disaster recovery
Information & Dataflow:
and the business continuity stage. Build Security Operations Center (SOC) for
emergency response and incident handlings.
Converts and documents logical information classification and access controls
Systems & Services into system and service controls. Normalize system & service operations and
emergency response centered by the SOC.
Meets standard operational requirements and procedures. Ensure the
Technology Infrastructure workability, testability and redundancy of component systems and devices.
Assess financial liability and continuity of system operations.

351
Enterprise Architecture as Context and Method

Vulnerability Testing Phase: It is also includes sabotage, theft or corruption of resources,


called penetration test. Penetration test is successful large scale hacker/virus attacks, build-
to systemically review configurations and ing damage, fire, flood, and electrical outages.
identify security deficiencies. Two time-related aspects of disaster recovery
Process Validation Phase: Consideration need to be periodically evaluated: (1) the method
of the human element is included in the for recovery, and (2) the affect on mission ac-
self assessment. In this phase, how humans complishment. Both of these may change as the
are alerted when security incidents happen amount of time increases from the moment the
needs to be reexamined. How process is disaster occurred (e.g., data restore procedures and
executed at the management and operational the affect on business services will probably be
levels -and how systems are controlled at the different for 2-minute, 2-hour, 2-day, and 2-week
technical levels - should be assessed. outages). In addition, priorities in this recovery
procedure need to be sorted out. In this plan, it
Contingency planning: Contingencies refer should specify the types of back-up mechanisms,
to incidents that may disrupt systems or busi- alternative sites, equipment to be used, roles and
ness operations. Contingency planning means responsibilities, and cost considerations.
that business has immediate incident handling/ Business Continuity Planning (BCP): This
response plan at both management as well as refers to procedures that are invoked if all or part
technical support level. This plan is documented of the enterprise are unexpectedly destroyed or
in the Standard Operating Procedures (SOPs) to forced to disband. This scenario, however, does
ensure that timely and effective action is taken mean that the enterprise is unable to conduct any
by end-users and system administrators, when business functions or information operations for a
facing a security incident. This plan may include period of time. The recovery response is scripted
swappable choices and cost analysis during vari- in a Continuity of Operations Plans (COOP) that
ous disastrous scenarios. describes how organizations should operate in
Incident handling team: The mission for an a contingency situation so that damages can be
incident handling team is to amend immediate, minimized. COOP also identifies where and when
identifiable vulnerabilities on current information business and information infrastructure would
systems, to respond so as to quarantine malicious be restored. If the contingencies are serious and
codes and viruses, to restore infected information it might take several months or longer period of
systems, and to prevent future damages especially time to recover, then corporations need to solidify
by advanced denial of services attack, unauthor- business operations.
ized access, etc. An incident handling team can Security Operations Center (SOC): A SOC
either be in-house, partially out-sourced, or fully is a group, integrated with other operations in a
out-sourced. Incident handling teams are linked center, which oversees all security issues within
with other groups of similar missions, and can the organization. It designs and reinforces the
form centralized communications with expertise implementation of security measures in the in-
in responding to computer incidents. formation systems infrastructure, monitors data
Disaster recovery planning (DRP): It is an and transactions, and provides incident handling
assessment and recovery procedure that identifies and response capability during contingency situ-
critical information systems or operational sites ations. While security principles of defense are
needed to recover when a man-made or natural done in layers, details of implementation should
disaster occurs. Such a disaster, however, does be in physical and infrastructure security. SOC
not threaten the existence of the enterprise. This is the means to centralized management.

352
Enterprise Architecture as Context and Method

Table 3.
EA3 Framework Level SAF/Personnel Security Level Concepts & Goals

Defines and creates personnel security measure in the form of procedural


Strategic Initiatives and awareness training, (etc.) that are based upon the security needs of the
organization and that are in alignment with security policies.
Business Processes Identifies specific security needs for each LOB.
Assesses and documents the levels and mechanisms of personnel access
Information & Dataflow: control, authentication, authorization and accounting system according to their
roles and responsibility throughout the enterprise.
Defines and documents the personnel access policy based on their roles and
Systems & Services
responsibility on the systems and services.
Implements and reinforces the authentication, authorization and accounting
Technology Infrastructure
over systems, devices and applications.

Security Architecture Framework from terrorists who might assassinate or kidnap


Layer 3: Personnel Security executives as hostages for either psychological or
monetary reasons. Threats to personnel safety also
Personnel security is essential since employees are include workplace violence, bombings or harass-
ultimately responsible for handling and control- ments. The second dimension is the threats caused
ling the dissemination of sensitive information. by the alteration of personnel trustworthiness,
The purpose of the Personnel Security layer is commonly called the insider threats. Individuals
to ensure that enterprise personnel are access- who hold key position and have critical access
ing and utilizing its information and technology to sensitive data or classified information in the
services safely, securely, and in accordance with organization could cause severe security breaches
their predefined roles and responsibilities of their by illegally transporting or exchanging informa-
job functions, through proper access control plans tion for profits or psychological reasons. The real
and detection of employee anomalous behavior. challenge here is to be able to detect the changes in
Activities involved with, and documents produced a persons trust level after someone has obtained
in this layer include, but are not limited to, user au- a high-level security clearance and trust.
thentication, role-based access control, awareness Personnel security policy: Due to threats
training, desktop security policies, procedural caused to and by personnel, it is essential to
training. The relationship of SAF/Personnel Se- establish a crisis management plan and a crisis
curity concepts and goals to the EA3 Framework management team. Periodic threat analysis and
are as follows: evaluation would help to understand current
The Personnel Security layer of the SAF also organizational safety level in advance. Access
addresses user-related threats and policies, due control is an important concept that can be done
diligence practices, and training requirements for at the physical level, personnel level, information
IT security and data privacy as follows: systems level and information flows level. Infor-
Threats in personnel security: There are two mation and critical infrastructural access should
different threat dimensions when discussing the be restricted to individuals on a need-to-know
personnel security issues. The first dimension is basis. Due diligence is the ultimate rule of thumb
threat to personnels physical safety especially when protecting personnel - as well as information
the safety of the executives. This threat comes systems - from unauthorized access.

353
Enterprise Architecture as Context and Method

Due Diligence practices: An organizations Security Architecture Framework


existence depends on the integrity of its employ- Layer 4: Information & Dataflow
ees. Without security processes in practice, an or- Security
ganizations reputation, assets and finances could
be at risk. It is important to set up both criteria and The purpose of the Information & Data Flow
checklists before hiring. Background checks and Security layer is to identify and classify informa-
screening are common practices during hiring. tion and data as it moves through the enterprise
Organizations should let employees know that - in order to justify adequate security controls.
they will be periodically monitored and audited The data needs to be valued from a quantitative
in the workplace. Employers should also provide and qualitative aspect, then classified into levels
security awareness and best-practice training depending on the risk of data loss, repudiation,
to avoid ignorance, mistakes and such. Person- competition, and availability. Activities involved
nel disciplinary actions should be announced with, and documents produced in this layer in-
explicitly. When employees are terminated, it clude, but are not limited to, data design, dataflow
is important to minimize potential violence or assurance, information classification forms, logi-
workplace disruption. All corporate tangible and cal access controls, associative access controls.
intangible assets shall be returned. The procedure The relationship of SAF/Information & Dataflow
of examining the returned items should be done Security concepts and goals to the EA3 Framework
in an efficient and effective manner. are as follows:
Security awareness training: Security aware- The Information & Dataflow Security layer of
ness training should be provided to all end-users the SAF also addresses user-related threats and
and system administrators. This should include policies, due diligence practices, and training
the signing of security awareness agreements requirements for IT security and data privacy
to acknowledge that the enterprise owns the as- as follows:
sociated resources and hosted information. This Information classification: It is a set of guide-
agreement should state explicitly that monitoring lines and requirements that classify information
and auditing online and offline activity of both according to its confidentiality and sensitivity
end-users and system administrators are to be level. Information classification scheme helps
expected. This security awareness training should identify what information is vital to an organi-
be given periodically to reinforce employees zation, and which protection mechanism should
compliance to corporate security policy and be applied. Meeting requirements of information
security practices. classification demonstrates an organizations com-

Table 3.
EA3 Framework Level SAF/Info-Data Security Level Concepts & Goals

Strategic Initiatives Designs information flows and classifications of information.


Designs and defines information and data types shared between LOBs
Business Processes
or internal business processes.
Classifies levels of data, information and knowledge. Converts
Information & Dataflow: associative access control system into logical access control system.
Assess risks associated with the information classified system.
Assesses risks quantitatively and qualitatively involves with systems and
Systems & Services
services during disaster, financial loss or reputation damage.
Ensures the accountability and availability of the systems, devices and
Technology Infrastructure
infrastructure.

354
Enterprise Architecture as Context and Method

mitment to security best practices for regulatory, viduals who perform the steps. It prevents not only
compliance or legal reasons. Information can be unauthorized users from making modifications,
coarsely classified into four levels: public, internal, but also authorized users from making improper
confidential and restricted. To an organization, modifications - by incorporating the principle of
public information is something that can be re- separation of duty. Other models, such as the
leased to the press and made known to the public Multi-Level Security Model, emphasizes that not
as well as competitors. Internal information is all personnel have approval or need-to-know au-
sensitive, such as physical layout of a workplace, thorization for all information on the system. The
and should remain within the organization. Con- System High Security Model depicts that all users
fidential information should not be disclosed to of a system may have clearance and approval to
the public without proper authorization. It could view systemic information, but not all personnel
be customer or vendor contact information; it can have need-to-know access for domain/application
include the source codes of a software product that information.
is owned by the organization. Restricted informa- Risk controls: Risk controls by nature are
tion is something that is extremely sensitive, such classified into three types: preventive controls,
as payroll, marketing/operations strategy, etc. detective controls, and corrective controls.
Individuals would require need-to-know authori- Preventive controls are steps designed to avoid
zation before accessing restricted information. potential nonconformities, make improvements,
Security models: Security models set prin- and thus mitigate risks. They attempt to prevent
ciples of allowable paths of information flow in a the occurrence of problems by removing their
secure system. These are used to define security causes. Monitoring information access and the
requirements for systems to handle data at dif- security models are examples of preventive con-
ferent sensitivity levels. Data and information trols. Detective controls are used to understand
must not be abused by execution of a process or when something has happened that was meant
by another sub-system. For example, the Bell La- to be prevented. With detective controls, the
Padula Security Model, ensuring confidentiality time required to identify and respond to triggers
through access control rules, was developed by is critical. However, false alarms may happen
David Elliott Bell and Len LaPadula in 1973. It from time to time. Eliminating false positives
prevents write-down access within an informa- (falsely identifying occurrences) and false nega-
tion access matrix. Programs (or processes) with tives (falsely ignoring occurrences) in the control
higher classification level cannot write to another mechanism are critical. Corrective controls are
programs (or processes) with lower classification steps to address existing nonconformities and
level. Quickly after, the Biba Integrity Model make improvements. This refers to fixing errant
assuring information integrity was developed situations based on actual events that have already
by Kenneth J. Biba in 1977. This model prevents occurred. Effectiveness and cost are two important
unauthorized users from making modifications. factors to consider when choosing a type of risk
Subjects cannot read objects of lesser integrity; control. In addition, when circumstances or risks
subjects cannot write to objects of higher integrity. are changed, the associated controls might need
The Clark-Wilson Integrity Model, developed by to be reconfigured so that they are able to handle
David D. Clark and David D. Wilson in 1987, ad- more sophisticated risks. In these situations,
dresses information integrity issues. It promotes another rigorous development and testing cycle
the idea of performing steps in order. Additionally may need to be reconsidered. Regardless whether
it initiates the concept of authenticating the indi- automated or manual controls are implemented,

355
Enterprise Architecture as Context and Method

procedures for handling different types of controls Security Architecture Framework


and transactional logs need to be documented as Layer 5: Application Development
risk assessment materials. Security
Risk management: Risk management is the
ability and process of identifying, analyzing, The purpose of the Application Development
controlling and minimizing losses associated Security layer is to design the authentication,
with threats. Since it is not possible to eliminate authorization and accounting (AAA) components
risks completely, the goal of risk mitigation is to into the applications used in the enterprise; to en-
reduce risks to an acceptable and survivable level force the application process flow throughout the
without making major adjustments to the strategy enterprise; and to ingrain security in the SDLC.
or mission. Risk management influences planning Activities involved with, and documents produced
and decision-making processes dealing with both in this layer include, but are not limited to; design
physical building safeties as well as informa- & development, application development secu-
tion systems design. It helps an organization to rity, application gateways, application security
understand the cost-to-value ratio of a security placement. The relationship of SAF/Application
countermeasure. Development Security concepts and goals to the
Risk analysis: Risk analysis is the function of EA3 Framework are as follows:
risk management. Risk analysis identifies actual The Application Development Security layer
threats, the possible consequences, the probable of the SAF also addresses vulnerabilities, best
frequency of occurrences, and the probability practices, and lifecycle issues for IT security and
that each identified threat might actually happen. data privacy as follows:
In addition to analyzing the potential damage Common application vulnerabilities: The
that a given threat would occur and the potential defense-in-depth concept starts at designing se-
losses that a threat would cause an organiza- cure applications. Application developers need to
tion, risk analysis is performed to understand understand the environment, and risks associated
the cost and benefits of a protection mechanism. with it - so that applications can be developed and
Risk analysis can be done quantitatively as well deployed securely. Developers also need to know
as qualitatively. The quantitative risk analysis about security implications when coding software
quantifies the impact of potential threats, while so that the security infrastructure can be incor-
qualitative risk analysis facilitates the delegation porated. One commonly programmed threat is a
of management and responsibility down through flawed access control policy that does not reflect
organizational hierarchy. the corporate policy. Other threats include buffer

Table 4.
EA3 Framework Level SAF/Application Security Level Concepts & Goals

Strategic Initiatives Designs and models applications to support and process information flow.
Defines security measures needed to ensure LOB based on Information constraints.
Business Processes

Reinforces the personnel AAA in application systems during development life cycle
Information & Dataflow:
and application logic process flow.
AAA systems based on the personnel security policy should be designed, developed
Systems & Services
and documented into the process flow provided by the systems and services.
Ensures the integrity and maintainability of the newly updated application with
Technology Infrastructure
existing infrastructure.

356
Enterprise Architecture as Context and Method

overflows, SQL injections, and script injection, etc. continuity in contingent scenarios. Second, its
Lack of secure programming practices can have a necessary to eliminate threatening factors, such
cascading impact on application utilization. as identifying entry, data flow, and exit points of
Best practices: The application should specify the application, so that threats to each application
and validate the types of the inputs coming from can be mitigated at a minimum level. Third, a
the network and make sure to call trusted external design review includes reviewing application
resources so that issues like buffer overflow, script documents and interviewing developers and
injection, and SQL injection, etc. can be avoided. business analysts - to not only make sure that all
In addition, each application should be structured requirements are fulfilled, but also to make sure
with good data flow and controls. The principle all logical processes and procedures have fol-
of least privileges should be followed whenever lowed the principles of least privileges. Fourth,
an application accesses database. For example, if a code review should be conducted to ensure that
the application only needs data located in certain no backdoor or unnecessary process (modular
cells in a row, the application should not be given calls) are executed. Fifth, before any application
full privileges to read or modify the table. When a is rolled out to operations, its critical to assess
process has failed, the full description of the failure potential associative risks. This is the time to
should not be given to the end users. Instead, all mitigate, transfer or eliminate risks. Further-
error messages should be logged with exceptions more, the application should be benchmarked
for the system administrator to troubleshoot. with the industrial standards, such as ISO IEC
Simply displaying that the application has failed 27001 / ISO IEC 17799, FISMA, Sarbanes-Ox-
is good enough, which avoids giving potential ley, HIPAA, NIST, or Gramm-Leach-Biley Act.
hackers too much configuration information. Finally, security must be regularly maintained to
Software Development Life Cycle (SDLC): avoid new exploits that cause the applications to
In order to enhance security at the application become vulnerable.
development stage, it is critical to incorporate
security into the software development life Security Architecture Framework
cycle. It starts first at the initial review with the Layer 6: Systems Security
customer, and includes technical requirements.
An important lesson is that the application logi- Systems here refer to the systems that support
cal processes and procedures should be deployed platform services for applications. The purpose
so that the organizations can pursue business

Table 5.
EA3 Framework Level SAF/Systems Security Level Concepts & Goals

Strategic Initiatives Designs and defines security measures and constraints for software systems.
Ensures each security requirement for the software system is implemented
Business Processes
specifically for each LOB.
Prioritizes and controls information granular access during configuration,
Information & Dataflow:
integration and implementation process.
Hardens systems from kernel operating system throughout all system files and
database repository. Tests and evaluates modular security components involved
Systems & Services with systems and services. Compliance and consideration is given to public key
infrastructure and cryptography modules that should be ingrained at all levels
within systems.
Technology Infrastructure Periodically updates versions and patches against known vulnerabilities.

357
Enterprise Architecture as Context and Method

of the Systems Security layer is to protect sen- retina scan, facial recognition, etc.), and posses-
sitive applications and provide granularity of sions (something you have, ex. Smart card, ID card,
access controls to sensitive resources. Activities etc.). User authentication is usually maintained in
involved with, and documents produced in this a directory service. Authorization is the process of
layer include, but are not limited to, user account giving users access rights to computer resources
management & privileges, certificate request based on their permissions and privileges. When
management, password storage & management, the authentication mechanism is verified by the
remote access, authorization models, file system directory services, the access control system either
hardening procedures, patching, and security allows or denies users access.
repositories. The relationship of SAF/Systems Database security: Database security in-
Security concepts and goals to the EA3 Framework volves protecting the database from both internal
are as follows: and external threats. It includes issues of secure
The Systems Security layer of the SAF also system administration, availability, recoverability,
addresses hardening, authentication, authoriza- integrity, reliability and performance. It is im-
tion, database, public key infrastructure, single portant to recognize that each database has some
sign-on, and intrusion detection issues for IT built-in security features, but also has embedded
security and data privacy as follows: vulnerabilities. One critical configuration issue
Platform hardening: Most systems are manu- involves setting up a database server based on
factured and shipped with unnecessary features whether it supplies information to a Web server.
enabled. Platform hardening is a concept for ana- If it does, be sure to configure it in a way that it
lyzing vulnerability of operating kernels that run allows access only from that Web server. Then,
on a host. It also is a methodology of determining disable all anonymous connection to database
what unused ports and services should be closed server. Avoid using default sa account (with sys-
out. For example, a server that is not function- tem administrator privileges) and default values
ing as an email server should disable its SMTP to access a database for every single connection.
service. A database server should disable default If your database server is providing information
user account access. A Web server should use to dynamic applications, do not allow immediate
HTTPS for viewing pages. In addition, a system unauthenticated updates to a database.
should be regularly patched. Passwords and user PKI-enabled applications: Public Key In-
permissions should be periodically checked and frastructure uses certificates as online digital
strengthened. In addition to functioning as a file identities. The authentication takes place when
server, a system also refers to a unit serving a one user signs a message with a private key and
communication purpose, such as a router or a a public key is contained in the certificate. The
switch. Therefore, hardening the platform refers signature is signed on the message and sent over to
to tightening up configurations and controls on a receiver (another user or a server). The receiver
all services and processes while preserving avail- uses the public key to check the signature of the
ability. The network layout should be designed message. Web-based applications that can authen-
and wired to fit the security requirements. ticate users through digital signatures look up the
Authentication and authorization: Authen- directory server for the users attributes. Then, the
tication is the verification of the claimed identity applications check the CRL (Certificate Revoca-
of a user. There are generally three types of au- tion List) issued by a CA (Certificate Authority)
thentication mechanisms: information (something as to whether the user is currently active and
you know, ex. Passwords, secret questions, etc.), trustworthy. Then, this Web-based application
biometrics (something you are, ex. Finger print, authenticates and interacts with the user through

358
Enterprise Architecture as Context and Method

his/her certificate on a browser. tion uses known intrusion patterns to detect or


Single Sign-On (SSO): Single Sign-On is a predict subsequent similar attempts. This method
mechanism where a single action of user authen- of target monitoring looks for modification of
tication and authorization would permit a user to specific system files. This is more of a correc-
access all applications and systems where he/she tive control, designed to uncover unauthorized
has access permission. This user does not need actions performed on the system kernel files or
to enter into multiple passwords. While Single Web pages. This type of monitoring is the easiest
Sign-On reduces human errors when accessing to implement, since it does not require constant
systems, it is costly and difficult to implement. It monitoring. Integrity checksum hashes can be
is recommended that you use combined authen- computed against the original files to determine
tication mechanism (such as smart card with a if the files have been altered. If hackers probe for
random password, or a certificate) instead of a system vulnerability and open ports, the stealth
simple password, since the chain effect is much probe can be used to detect this intrusion. Stealth
greater once this authentication is broken into probes can be combined with the anomaly detec-
by a hacker. tion and signature-based detection to uncover
Host-based Intrusion Detection System suspicious activity.
(HIDS): Intrusion detection is a process of
monitoring incidents occurring in an information Security Architecture Framework
system or on a network, and analyzing them for Layer 7: Infrastructure Security
signs of intrusion. HIDS monitors system files,
logs, logon activity, and processing with the kernel The purpose of the Infrastructure Security layer
and other resources. Since intrusion detection is to develop a secure infrastructure that meets
systems can be designed for different security all the security requirements of the enterprise and
purposes, its method is classified as anomaly can safeguard against future attacks against the
detection, including signature-based detection, enterprise. This is a mixture of art and science.
target monitoring, and stealth probes. Anomaly Activities involved with, and documents produced
detection establishes baselines of normal usages in this layer include, but are not limited to, network
of systems and then identifies any outliers or partitioning, VLANs, firewalls, packet filtering,
abnormal systemic usage. Signature-based detec- circuit level gateways, PKI architectures, VPNs,

Table 5.
EA3 Framework Level SAF/Infrastructure Security Level Concepts & Goals

Defines security measures for the infrastructure that fits with the security policies and goals of the
Strategic Initiatives
enterprise, and further strengthens the need of the software systems.
Defines how the infrastructure will be used by each LOB and what security concerns exist
Business Processes
regarding those uses.
Defines how the information will flow between LOB and within the enterprise, and where
Information & Dataflow:
infrastructure components need to be placed.
Defines the appropriate countermeasures that will protect and regulate all Systems and Services,
Systems & Services
and ensure that devices are compliant with industrial security standards.
Installs the physical infrastructure components that will partition the network and implements
Technology Infrastructure safeguards to ensure the infrastructure is accessible by the authorized personnel. Implements
confidentiality and integrity checks on the transmitted information.

359
Enterprise Architecture as Context and Method

SSL, and stateful inspections. The relationship of (Corporate Information Security Officer) should
SAF/Infrastructure Security concepts and goals work together to prioritize the information flow
to the EA3 Framework are as follows: and information process so as to ensure that the
The Infrastructure Security layer of the SAF organizational perspective is considered.
also addresses network, testing, broadband, Network-based Intrusion Detection System
wireless, and telecommunications issues for IT (NIDS): NIDS functions as a protocol analyzer
security and data privacy as follows: or a network sniffer. It is like a wire tap device
Network partitioning: Creating logical that eavesdrops on the network. It works in stealth
groups and users/systems which contain the flow mode, like a single-purpose sensor, scanning and
of information to and from these components is analyzing packets at various points on a network.
an important concept in network partitioning. NIDS detects probing, network configuration
These virtual networks prevent sniffing activities vulnerabilities, and monitors attacks to and from
because nodes are not allowed to see each others nodes while having little impact on network traffic.
ports without permission. However, NIDS is very resource intensive because
Firewall security: The firewall provides pe- it logs massive quantities of network activity. It is
rimeter security. With packet filtering, the firewall not easy to analyze traffic in a complex network
examines the source address, destination address, architecture unless one is an experienced security
and types of traffic for every packet, and makes officer. NIDS could not analyze encrypted traffic,
decisions of accept, deny, or discard on each nor can it be applied to complex switched networks.
packet. With stateful inspection, firewall security If there is unusual traffic detected, NIDS cannot
oversees the state of communication sessions at even tell if an attack was successful. It requires
packets level from source to destination. When a further investigation into that specific node or
firewall is appliance-based, it provides high speed device, perhaps with the help of a HIDS. NIDS
of filtering traffic. Very often, it is accompanied can detect known attacks with signatures or pat-
with a load balancer for high availability. When a terns - this is called misuse detection. NIDS can
firewall functions as an application proxy, it relays also create profiles of network usage over a long
point to process and route requests between client period of time in order to detect unusual activ-
and server. It can also incorporate more features ity - this is called anomaly detection. Anomaly
such as user-based authentication, traffic filtering, detection establishes a baseline for normal traf-
content acceleration, and activity logging. fic, then watches for outlier data points. But it
Network security testing: Security testing is requires extensive training to regulate the NIDS
necessary once a network is deployed. Security from frequent false positive alarms.
testing allows for the uncovering of network design Broadband security: Since the broadband
and operational flaws that violate security policy. connection is always active, potential hackers
The degree of consistency between the system can arbitrarily search for victims. A personal
documentation and its implementation must be firewall is one of the solutions that consumers can
assessed. The goal of the network security testing install to protect their broadband connection. A
is to maximize the benefits to the organization as personal firewall blocks unsafe incoming services
a whole. Therefore, it normally requires participa- and unauthorized outgoing services. If stealth
tion and coordination among senior management, mode is enabled, a personal firewall can monitor
security officers, network administrators, and the connection. In addition, secure Web browsers
business managers, so that the security policy can using strong password and patch software are good
be reinforced and applied at the systems level. The tools for enhancing broadband security.
CIO (Corporate Information Officer) and CISO

360
Enterprise Architecture as Context and Method

PKI associated risks: Public Key Infrastruc- telecom infrastructure, with privacy afforded
ture (PKI) has some associated risks. First, PKI by reserved facilities (e.g., private circuits con-
binds the individual to the private/public key pair nected via shared switches), a tunneling protocol
issued by a Certificate Authority, specifically by (e.g, IPsec), or encrypted transmission. A trusted
a Register Authority, using an identity proofing VPN refers to circuits reserved exclusively by the
mechanism. Regardless of how the individual service provider for one customer, to allow them
holds his own private key, there is no biometric private addressing & security policies, routed via
element built in for digital signature. In a law- shared switches. The customer trusts the VPN
suit, no physical or biometric characteristics (or provider to maintain the integrity of circuits
evidence) can be found to link the person who and prevent unauthorized access. A secure VPN
signs a fraudulent claim with his digital signa- encrypts traffic on entering the VPN providers
ture key pair. Second, in addition to PKI, the shared network, then decrypts on exiting. Informa-
electronic process depends on reliable software tion cant be read in transit. It will be rejected if
and hardware. If either software or hardware is changed. The VPN requires that all traffic must be
not dependable, data integrity can be affected, encrypted and authenticated to address integrity
which impedes forensic analysis. Third, the use and confidentiality issues. Some protocols allow
of electronic process with public key technology either authentication or encryption. Although
itself might also have inherent risks. For example, an encrypted network without authentication is
if the PKI-enabled applications are not designed, a little more secure than a clear network, such a
coded or deployed properly, the systems might network is not technically a VPN because it lacks
not function as planned. privacy. Administrators much agree on VPNs
PKI implementation issues: To implement security properties for both ends of every tunnel.
PKI in a large scale, it involves many practical This peer authentication ensures that the data is
issues. The certificate policy and certification sent from the expected host. It also eliminates the
practices need to be specified. What directory possibilities for an attacker to change the security
services does your public key infrastructure intend properties of any part of a VPN, e.g., to either
to serve? How is your public key infrastructure weaken encryption or change shared keys.
interoperable with other public key infrastruc- Concerns in wireless security: Assuring the
tures? What are the requirements for electronic physical security for mobile device access points
commerce applications to be PKI-enabled? How that contain sensitive information is the first step in
do applications take in or send out the certifi- wireless security. Other security concerns include
cates and digitally-signed documents? What are loss of confidentiality through passive eavesdrop-
the publication methods to revoke certificates? ping, loss of availability through jammed wireless
Whose responsibility is it to audit PKI certificate signals, and unauthorized access to network from
transactions? Liability is also a big issue in digi- terminals. Therefore, facilities that provide a wire-
tal signature validation. Whose liability it is to less network need to also have physical access
provide long-term signature validation services? controls such as photo identification or biometrics
Should the organization which provides the to authenticate users. External boundary control
PKI-enabled applications be responsible for the with proper surveillance prevents unauthorized
signature validation, or should the infrastructure wanderers from eavesdropping on network com-
be the ultimate provider for validating signatures munications by using a wireless device that picks
automatically? up the RF emanations, or changing the settings
Virtual Private Networks (VPN): A VPN on the access points. Proper control of the wire-
by definition is a private network on a public less coverage area by limiting signal dispersion

361
Enterprise Architecture as Context and Method

Table 6.
EA3 Framework Level SAF/Physical Security Level Concepts & Goals

Identifies physical security methods to protect and regulate access enterprise


Strategic Initiatives
infrastructure resources.
Defines how each LOB would need access to the physical infrastructure and what
Business Processes
security measures need to be implemented to ensure each LOB appropriately
Ensures physical access facilities be properly controlled, safeguarded and governed.
Information & Dataflow: Controls and screens mobile devices or other available communication channels that
have the capability to carry information and data.
Server rooms, building security and cabling security should be planned, designed, built
Systems & Services
and safeguarded for protecting systems and services.
Implement and integrate data security devices with the physical security devices.
Technology Infrastructure Convergence Analysis enhances accountability and availability of wired and wireless
infrastructure component devices. Meets industrial standards.

prevents the wireless signals from extending tions of wiring used to connect systems and the
beyond the intended coverage area. provisioning of redundancy systems. Physical
measures may be complemented by operations
Security Architecture Framework and personnel security measures, such as the
Layer 8: Physical Security need-to-know principle, which limits physical
access to sensitive information only to appropri-
The purpose of the Physical Security layer is to ate personnel with clearance. In a governmental
construct a secure perimeter physical defense organization, the main physical defenses include
system that safeguards the facility and physical security keys and containers to protect classified
resources for the enterprise. Activities involved information, access control measures, as well as
with, and documents produced in this layer in- security alarm systems to detect unauthorized
clude, but are not limited to, Building & Facility access, and physical barriers to deter, detect and
Security, Physical Access Controls, Network delay unauthorized entry. By setting up security
Operation Centers (NOC) Server Rooms, Wir- perimeters, organizations are able to physically,
ing Closets, and Cable Plants. The relationship psychologically and legally deter intruders.
of SAF/Physical Security concepts and goals to Physical security assessment: Physical
the EA3 Framework are as follows: security can be assessed by evaluating threat sce-
The Physical Security layer of the SAF also narios (x-axis) with business functional elements
addresses access and assessment issues for IT (y1-axis) and site subsystems (y2-axis). There
security and data privacy as follows: are many different types of threat scenarios to
Physical security: Physical security is an es- be considered, such as accidents, contamination,
sential part of information security architecture. natural disasters, cyber attack, power outages,
Physical security refers to data protection against system failure, etc. Threat scenarios must be con-
accidental destruction or modification by forces of sidered in light of the different business functional
nature or by people, against intentional destruc- areas. Business functional elements can include
tion or modification by unauthorized people, an assessment of facility criticality, e.g., mission
and against accidental or intentional disclosure critical area vs. vulnerable area. Once the busi-
to unauthorized people. It encompasses not ness functional areas are identified, its necessary
only the area of system hardware, but also loca- to determine how to properly protect the site and

362
Enterprise Architecture as Context and Method

building subsystems. There are various categories to defend corporate assets may not be sufficient.
to be examined; including site/architectural de- System administrators may still have to read
sign, structural elements, the building envelope, thousand lines of logs everyday in order to under-
utility systems, mechanical systems, plumbing, stand what is going on within their information
electrical and gas systems, information and com- systems, as well as in the corporate networks.
munication systems, etc. Subsystem examination The real problem lies not only in the ineffective
also includes overall operations and maintenance correlation analysis from multiple systems, but
assessment plans. also the complex human social behavior. Whether
organizations are able to protect information se-
curity while also protecting the individuals right
Future Trends to privacy through aggregating and analyzing
problems in both a systems and social context is
Security Architecture Management a real challenge today.

The security architecture and associated programs Lack of Theory-Based Defense


in a government agency should be managed by a Mechanisms to Address Information
specialist in this field. Increasingly, agencies are Integrity Issues
establishing positions for an Information Systems
Security Manager (ISSM). The ISSM should have The phenomenon of the coordinated attack has led
business and IT operating experience in addition the information security industry to aggressively
to training in the various elements of information promote technology integration for coordinated
security. The ISSM should report to the Chief defense. However, without a governing theory to
Information Officer (CIO) or Chief Technology explain existing threat phenomenon, simple infor-
Officer (CTO) and should work collaboratively mation system integration cannot help organiza-
with the Chief Enterprise Architect to ensure that tions to effectively defend their information and
EA component and artifact design, implementa- intelligence resources. In other words, coordinated
tion, and operational activities have effective se- defense mechanisms cannot be built to defend
curity as a requirement. The ISSM should also be from both outside and inside joint attacks. Instead
responsible for the development, implementation, of simply pulling information systems together,
and maintenance of the enterprises IT Security usability of the information systems managed by
Plan. This plan should provide the security and IT personnel should be emphasized to standard-
privacy-related policies and procedures for the ize the security components. Corporate defense
documentation, testing, certification, accredita- theory and mechanisms should be researched
tion operation, and disposal of EA components and built so that the threat phenomenon can be
and artifacts at all levels of the EA framework. traced and explained in a way that can prevent
information and intelligence property from being
Emerging Threats cloned or modified. Only then can true informa-
tion integrity be assured.
The evolution of information protection is very While mechanisms for aggregating system
similar to a game of chess, where one move on logs and human access logs are still being devel-
the board can change all future strategies. Sim- oped, the theories and methods built upon those
ply pulling information systems together, such analyses are not sufficient to explain or address
as integrating active mechanism firewalls with the phenomenon of insider threats. It is important
passive mechanism intrusion detection systems to develop a theory that addresses and explains

363
Enterprise Architecture as Context and Method

insider threat phenomenon when human behavior by security policy, then information becomes less
and social activities threaten corporate security available to employees. When information exists
in loss of profit, intelligence property, or even on different access-controlled database servers,
corporate credibility. it requires additional steps to gain access. This
creates cumbersome administrative barriers to
Insufficient Balance between information availability. As a result, convenience
Information Availability and Access of access and information availability cannot
Control always go hand-in-hand with confidentiality and
integrity.
Gathering identity-based or role-based informa-
tion in order to monitor an individuals social Human Factors
activities requires a great deal of concern for legal
and privacy issues. The Computer Matching and Security industry emphasis has been on system-
Privacy Protection Acts of 1988 (amending the based, rather than behavior-based information
Privacy Act of 1974) protect records that contain confidentiality issues. Since ARPANET was
private information on individuals. It states; invented in 1969, the government and military
no agency shall disclose any record which is have always taken the lead on inventing infor-
contained in a system of records by any means mation classification schemes and cryptographic
of communication to any person, or to another algorithms. A system-based approach to informa-
agency, except pursuant to a written request by, tion confidentiality is derived from a positivist
or with the prior written consent of, the individual approach. Security mechanisms are developed
to whom the record pertains (Privacy Act of and implemented from the perspectives of system
1974). architect. But in a socially networked environ-
The dilemma of balancing information control ment, it is not sufficient to use a single lens to
with information availability is evident when view a complex issue as insider threats. As the
human rights to privacy and freedom are con- human factor is the weakest linkage in the chain
sidered. Although social engineering is used of security defense (Mitnick and Simon, 2002), a
as a technique to get some level of confidential need to bolster this weak linkage becomes criti-
information or even used to penetrate a site, in- cal. Insider threats require not only system-based
depth approaches that analyze insider threats security analysis, but intensively behavioral-based
through integrating activities of systems as well security analysis.
as humans are not yet fully available. The most so- Understanding and identifying human in-
phisticated threats can occur when an individuals tention and motivation takes both social and
social power and freedom is exercised. While cognitive psychological analysis. Traditional
access control mechanisms are implemented to information systems architects and developers
secure information access, authorized personnel do not have the appropriate training to solve such
will always have excessive privileges to copy or complicated problems when the focus is insider
modify information. This creates the threat of threats. Protecting information has gone beyond
excessive system privileges that can lead to a what programmed, algorithmic analysis can
potential threat from a powerful user. achieve. Cryptography and security models are
On the other hand, when information is clas- fundamental tools for information confidential-
sified and controlled, information becomes less ity, but a behavior-based approach to information
available. When the types of Internet Websites security is the next step in building coordinated
are filtered by a proxy server that is constrained defense mechanisms.

364
Enterprise Architecture as Context and Method

The Concept of Information a security culture that becomes the norm in


Assurance organizations is the focus of social psychology
studying organizational behavior. In psychology,
Scientists and practitioners in the IT security and ISS especially focuses on issues that are related
data privacy community of interest and inquiry to motivation and thought processes. Along this
share the goal of wishing to facilitate information same vein, when thinking of the security-related
assurance (IA). IA, as defined by the Alliance for behavior of malicious individuals, the perspectives
Telecommunications Industry Solutions, means of criminology also influence ISS research.
the information operations that protect and
defend information and information systems (IS)
by ensuring their availability, integrity, authen- Summary
tication, confidentiality and non-repudiation.
This definition includes practitioners perspec- In this chapter the EA3 Cube Framework and
tives of providing for restoration of information integrated security architecture were presented as
systems by incorporating protection, detection examples of how the emerging management prac-
and reaction capabilities (ATIS Telecom Glos- tice of enterprise architecture (EA) can provide
sary 2000). Information assurance pertains to the context and method for developing effective
a set of processes or activities meant to ensure information security and data privacy controls
the service availability of information systems in government agencies. The EA3 Framework
and system infrastructure, protect information establishes the overall scope and relationship of the
content integrity, confidentiality and non-repudia- organizations strategic, business, and technology
tion, and establish security-centric information architecture. The security framework is a sub-
management. architecture that pervades all five levels of the EA3
Framework and includes eight layers that contain
Information Systems Security information security and data privacy require-
ments and resources at the enterprise, segment,
The scope of information systems security (ISS) and system levels of the government agency. The
is defined in the disciplines in which ISS resides. eight layers encompass information security gov-
Its identity is drawn from information systems, ernance; operations security; personnel security;
information science, organizational science, information/data flow security; systems security;
psychology, and criminology (Figure 1). In the application development security; infrastructure
information systems discipline, ISS adopts a user- security; and physical security.
based approach of modeling information systems The chapter covered an integral set of risk-
that provide security features and architecture. In adjusted information security and data privacy
the information science and technology discipline, solutions that derive from an agencys mission
ISS adopts approaches of analyzing information requirements within and across the security
content through information architecture, clas- architectures eight layers. The idea of risk-ad-
sification, and categorization. How to perceive justed solutions highlighted the fact that totally
information behavior and human behavior so foolproof information security and data privacy
better prediction can be attained is the central controls do not exist because EA components
theme for information content security. In the (processes and systems) and security solutions
organizational/management science disciplines, are often designed and managed by members of
ISS adopts views of information security policy the organization or contracted agents, and in-
and secure management practices. Creating sider access is the ultimate threat which cannot

365
Enterprise Architecture as Context and Method

completely be overcome due to inherent trust Bernard, S. (2005).. An Introduction to Enterprise


relationships and access privileges. Architecture: Second Edition. AuthorHouse,
The chapter concluded with a discussion of Bloomington, IL. ISBN: 1-4208-8050-0. 2005
future trends in EA and security architecture.
Center for Information Technology, National
Only by using EA, can an agency fully address
Institutes of Health Canadian Trusted Computer
insider threats and information security/data
Product Evaluation Criteria (CTCPEC). Accessed
privacy requirements and solutions at the enter-
from http://www.alw.nih.gov/Security/FIRST/pa-
prise, segment, and system levels so that the best
pers/criteria/ctcpec1.ps.
possible levels of confidentiality, integrity, and
availability are provided for the agencys data CommonCriteria.org (2005) Common Criteria
and information. for Information Technology Security Evaluation
(CCITSE). Accessed from http://www.com-
moncriteriaportal.org/public/consumer/index.
References php?menu=2.
CSIRT Services. Carnegie Mellon University.
Ankolekar, V. (2003). Application Development
(2002). Software Engineering Institute. CERT
Technology & Tools: Vulnerabilities & Threat
Coordination Center. Stelvio bv, The Netherlands;
Management with Secure Programming Practices,
PRESECURE Consulting GmbH, Germany.
a defense in-depth approach. GIAC Security
Accessed July 2002 from http://www.cert.org/
Essentials Certification (GSEC) Practical As-
csirts/services.html.
signment, Version 1.4b, Option 1. 10 November
2003. Department of Defense Directive 5200.28-STD
(December 1985) Trusted Computer System
Babb, J. (2006). Signification and Information
Evaluation Criteria (TCSEC). Accessed from
Systems Security Policies: a Semiotic Analy-
http://www.boran.com/security/tcsec.html.
sis and Case Study. Virginia Commonwealth
University School of Business, Department of Donnelly, M. (April 2000). An Introduction to
Information Systems. LDAP. Obtained from http://www.ldapman.org/
articles/intro_to_ldap.html.
Bace, R., Mell, P. (?). NIST-SP800-31 Intrusion
Detection Systems. NIST Special Publication on Federal Information Processing Standards
Intrusion Detection Systems. Publication 199. (February 2004).Standards for
Security Categorization of Federal Information
Barker, W. (June 2004). NIST Special Publication
and Information Systems. National Institute for
800-60 Volume 1: Guide for Mapping Types of
Standards and Technology, Computer Security
Information and Information Systems to Security
Division.
Categories. National Institute of Standards and
Technology. Computer Security Division. Federal Trade Commission. (June 1998). Privacy
Online: A Report to Congress. Chapter 3: Fair
Bernard, S. (2001). Evaluating Clinger-Cohen
Information Practice Principals. Accessed July
Compliance in Federal Agency Chief Information
2006, from http://www3.ftc.gov/reports/privacy3/
Officer Positions. Doctoral Dissertation, Vir-
priv-23a.pdf.
ginia Polytechnic Institute and State University,
Blacksburg, VA. Federal Trade Commission. (May 2000). Pri-
vacy Online: Fair Information Practices in the
Electronic Marketplace: A Report to Congress.

366
Enterprise Architecture as Context and Method

Accessed July 2006, from http://www.ftc.gov/re- Ho, S M. (2006). The Mechanism Discovery of
ports/privacy2000/privacy2000.pdf. Personnel Anomaly Detection. ISOneWorld 2006
Doctoral Symposium, Las Vegas, Nevada, 19-21
FISMA Implementation Project. (2003). National
April 2006.
Institute for Standards and Technology, Computer
Security Division. Accessed July 2006, from Ho, S M. & Caldera, C. (2005). Eight Challenges
http://csrc.nist.gov/sec-cert/ca-proj-phases.html. Faced By a Defense Contractor: An Interview with
a Security Chief. (ISC)2 Newsletter May-June
Frankel, S., Kent, K., Lewkowski, R., Orebaugh,
2005. Obtained from https://www.isc2.org/cgi-
A., Ritchey, R., & Sharma, S. (December 2005).
bin/content.cgi?page=766 on July 18, 2006.
NIST-SP800-77 Guide to IPsec VPNs - Recom-
mendations of the National Institute of Standards Innella, P. (December 2001). An Introduction to
and Technology. Computer Security Division IDS. SecurityFocus.com. Obtained from http://
- Information Technology Laboratory - National www.securityfocus.com/infocus/1520.
Institute of Standards and Technology.
Jansen, W. & Karygiannis, T. NIST Special Pub-
Grance, T. et. al. (October 2003). NIST Special lication 800-19: Mobile Agent Security. National
Publication 800-64: Security Considerations in Institute of Standards and Technology.
the Information System Development Life Cycle:
Karygiannis, T. & Owens, L. (November 2002).
Recommendations of the National Institute of
NIST SP-800-48 Wireless Network Security -
Standards and Technology.
802.11, Bluetooth and Handheld Devices. Recom-
Grance, T. et. al. (January 2004). NIST Special mendations of the National Institute of Standards
Publication 800-61: Computer Security Incident and Technology. Computer Security Division
Handling Guide: Recommendations of the Na- - Information Technology Laboratory - National
tional Institute of Standards and Technology. Institute of Standards and Technology.
Harris, S. (2003). CISSP All-In-One Exam King, C., Dalton, C., and Osmanoglu, T. Security
Guide, Third Edition. McGraw-Hill/Osborne, Architecture: Design, Deployment & Operations.
Emeryville, CA. ISBN: 0-07-222966-7. Osborne/McGraw-Hill, Berkeley, CA. ISBN: 0-
07-213385-6. 2001.
Hash, J. et. al. (March 2005). NIST Special Pub-
lication 800-66: An Introductory Resource Guide Kuhn, D. Richard, et. al. (August 2002). NIST
for Implementing the Health Insurance Portability Special Publication 800-46: Security for Tele-
and Accountability Act (HIPAA) Security Rule. commuting and Broadband Communications:
National Institute of Standards and Technology. Recommendations of the National Institute of
Standards and Technology.
Ho, S M. (2006). Conceptualizing Security Ar-
chitecture based on Enterprise Architecture. End- Kuhn, D. Richard, et. al. (January 2005). NIST
of-Coursework Statement. School of Information Special Publication 800-58: Security Consider-
Studies, Syracuse University. Obtained from ations for Voice Over IP Systems: Recommenda-
http:// Web.syr.edu/~smho/research.htm. tions of the National Institute of Standards and
Technology.
Ho, S M. (2008). Towards A Deeper Understand-
ing of Personnel Anomaly Detection. Encyclo- Kramer, J. (2003). The CISA Prep Guide: Master-
pedia of Cyber Warfare and Cyber Terrorism. ing the Certified Information Systems Auditor
IDEA Publications. Exam. Wiley Publishing, Indianapolis, Indiana.
ISBN: 0-471-25032-5.

367
Enterprise Architecture as Context and Method

Lyons-Burke, Kathy. (October 2000). NIST Spe- National Institute of Science and Technology.
cial Publication 800-25: Federal Agency Use of Special Publication 53A: Techniques and Proce-
Public Key Technology for Digital Signatures and dures for Verifying the Effectiveness of Security
Authentication. Federal Public Key Infrastructure Controls in Information Systems.
Steering Committee.
National Institute of Science and Technology.
Mason, M. (2005). Obtained from www.asison- Special Publication 800-60 (Guide for Mapping
line.org/certification/ ppt/CPPPersonnelSecurity- Types of Information and Information Systems
Training8-2-01.ppt, July 1, 2006. Lyondell/Equi- to Security Categorization Levels),
star Chemical Companies.
Office of Management and Budget, Federal EA
Maynard & Ruighaver (2006). What Makes a Program Management Office. Federal Enterprise
Good Information Security Policy: A Preliminary Architecture Security and Privacy Profile (version
Framework For Evaluating Security Policy Qual- 1.1). June 2006.
ity. Proceedings of the 5th International Security
Park, J. S. & Ho, S M. (2004). Composite Role-
Conference, Las Vegas.
based Monitoring (CRBM) for Countering Insider
Nassar, M., et. al. (June 2006). Intrusion Detec- Threats. Second Symposium on Intelligence and
tion Methods for VoIP Applications. The Third Security Informatics (ISI), Tucson, Arizona,
Annual VoIP Security Workshop. Accessed June June 2004.
2006 from http://www.iptel.org/voipsecurity/
Pattinson, M. & Anderson, G. (). Information
New Zealand, Security in the Government Sector Risk Management: Some Social-psychological
(2002). Obtained from http://www.security.govt. Issues.
nz/sigs/html/chapter7.html, June 29, 2006.
Qurashi, R. (2005). Eight Steps for Integrat-
National Institute of Science and Technology. ing Security Into Application Development.
Federal Information Processing Standard Publica- MCI NetSec. Published by ComputerWorld,
tion 199: Standards for Security Categorization of December 6, 2005. Obtained from http://www.
Federal Information and Information Systems. computerworld.com/securitytopics/security/
story/0,10801,106805,00.html.
National Institute of Science and Technology.
Special Publication 800-37: Guide for the Security Rodriquez, E. (2005). Physical Network Security.
Certification and Accreditation of Information Obtained from http://www.skullbox.net/physical-
Systems. networksecurity.php, June 29, 2006.
National Institute of Science and Technology. Ross, R.. et. al. (May 2002). NIST Special Publica-
Special Publication 800-12. An Introduction tion 800-37: Guide for the Security Certification
to Computer Security: The NIST Handbook. and Accreditation of Federal Information Systems.
National Institute of Standards and Technology, National Institute of Standards and Technology,
Technology Administration. Published by U.S. Computer Security Division.
Department of Commerce.
Ross, R. et. al. (February 2005). NIST Special
National Institute of Science and Technology. Publication 800-53: Recommended Security Con-
Special Publication 800-53 (Guide for the Selec- trols for Federal Information Systems. National
tion and Specification of Security Controls for Institute of Standards and Technology, Computer
Federal Information Systems), Security Division.

368
Enterprise Architecture as Context and Method

Siegel, Lloyd H. (2006). Lessons Learned, Dept The Open Group. (1995-2005). Single Sign-On.
of Veterans Affairs, Physical Security Assess- Obtained from http://www.opengroup.org/secu-
ment Program. Federal Facility Council. Physical rity/sso/.
Security & Hazard Mitigation Committee, March
Tracy, M. et. al. (September 2002). NIST Special
14th, 2006. Obtained from www.va.gov/facmgt,
Publication 800-44: Guidelines on Securing
June 29, 2006.
Public Web Servers: Recommendations of the
Sinha, Rajiv. (March 2001) A Security Checklist National Institute of Standards and Technology.
for Oracle 9i. Oracle White Papers. Accessed June
Tracy, M. et. al. (September 2002). NIST Special
2006 from http://www.oracle.com/technology/de-
Publication 800-45: Guidelines on Electronic
ploy/security/oracle9i/pdf/9i_checklist.pdf.
Mail Security: Recommendations of the National
Snouffer, R., et. al. (June 2001). NIST Special Institute of Standards and Technology.
Publication 800-29: A Comparison of the Security
United Kingdom, Department of Trade and Indus-
Requirements for Cryptographic Modules in FIPS
try (June 1991) Information Technology System
140-1 AND FIPS 140-2.
Evaluation Criteria (IITSEC). Accessed from
Spears, J. (2006). Defining Information Security. http://nsi.org/Library/Compsec/eurooran.txt.
The Pennsylvania State University, Smeal College
United States Congress (1996) Public Law 191-104
of Business. 5th Security Conference 2006. Las
Health Information Portability and Accountability
Vegas, Nevada.
Act of 1996. Accessed from http://fr Webgate.
Spewak, S. and Hill, S. (1992). Enterprise Ar- access.gpo.gov/cgi-bin/getdoc.cgi?dbname=104_
chitecture Planning. Developing a Blueprint for cong_public_laws&docid=f:publ191.104.
Data, Applications and Technology. John Wiley
United States Congress (2002) Public Law 204-
and Sons, Inc. New York. ISBN: 0-471-599859.
107 Sarbanes-Oxley Act of 2002. Accessed from
State of Arkansas (2004). Personnel Security. Accessed from http://fr Webgate.access.gpo.
Office of Information Technology. Document gov/cgi-bin/getdoc.cgi?dbname=107_cong_pub-
Number SS-70-007. February 2004. lic_laws&docid=f:publ204.107.
Stoneburner, G., et. al. (July 2002). NIST Special United States Congress (2002) Public Law
Publication 800-30: Risk Management Guide for 347-107 Federal Information Security Manage-
Information Technology Systems: Recommenda- ment Act of 2002. http://fr Webgate.access.gpo.
tions of the National Institute of Standards and gov/cgi-bin/getdoc.cgi?dbname=107_cong_pub-
Technology. lic_laws&docid=f:publ347.107.
Swanson, M. (November 2001). NIST Special United States Department of Justice System
Publication 800-26: Security Self-Assessment Development Life Cycle Guidance Document.
Guide for Information Technology Systems. (2003). The Department of Justice Information
National Institute of Standards and Technology, Resource Management, January 2003. Obtained
Computer Security Division. from http://www.usdoj.gov/jmd/irm/lifecycle/
table.htm.
Swanson, M. et. al. (June 2002). NIST Special
Publication 800-34: Contingency Planning Guide United States House of Representatives Govern-
for Information Technology Systems: Recom- ment Reform Committee (February 2005) Federal
mendations of the National Institute of Standards Computer Security Report Card for 2003 2004.
and Technology.

369
Enterprise Architecture as Context and Method

Accessed from http://reform.house.gov/Upload- Wiedman, B. (2005). Database Security (Com-


edFiles/Computer%20Security%20Report%20c mon-Sense Principles.) GovernmentSecurity.
ard%202%20years.pdf. org Network Security Resources. Obtained from
http://www.governmentsecurity.org/articles/Da-
Wack, J., et. al. (January 2002). NIST Special
tabaseSecurityCommon-sensePrinciples.php.
Publication 800-41: Guidelines on Firewalls and
Firewall Policy: Recommendations of the National Wilson, M., Zafra, D., Pitcher, S., Tressler, J.,
Institute of Standards and Technology. Ippolito, J. (1998). NIST Special Publication 800-
16: Information Technology Security Training
Wack, J., et. al. (October 2003). NIST Special
Requirements: A Role- and Performance- Based
Publication 800-42: Guideline on Network Secu-
Model. National Institute of Standards and Tech-
rity Testing: Recommendations of the National
nology, Computer Security Division.
Institute of Standards and Technology.
Zachman, J. (1989). A Framework for Infor-
mation Systems Architecture. IBM Systems
Journal. Volume 26, Number 3.

370
371

Chapter XVI
Architecture Based Engineering
of Enterprises with Government
Involvement
John Mo
RMIT University, Australia

Laszlo Nemes
Nemes Consulting, Australia

Abstract

With a plethora of architectures, modelling techniques and methodologies on offer, it is difficult to decide
how to begin building an enterprise and achieving seamless integration. This difficulty is most notice-
able in consortia that need to deal with government participation. Various government projects have
different objectives and agenda. In addition, changes in business environment (or) as well as government
policies impose extra conditions onto the project. Failure to comply with the project requirement can
lead to loss of business and sometimes unexpected penalty. We use three case studies to show various
ways of government involvements in our projects. Based on the experiences of these cases, we discuss
how enterprise engineering can help creating and managing the enterprise that can engage government
services successfully

INTRODUCTION riety of purposes such as training (Shankararaman


and Lee, 1994), support (Mo and Menzel, 1998),
Todays working environments are supported with design (Jiang and Mo, 2001), project management
a large number of technologies that serve wide va- (Hall, 2000), data analysis (Gabbar et al, 2002),

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Architecture Based Engineering of Enterprises with Government Involvement

and many others related to the management of desired outcomes. The concept of the government
the business. They are, arguably, advantages to operating as an enterprise is to include not only
all stakeholders, irrespective of whether they are the systems that support government services,
the customers, staff, suppliers, managers or other but also to understand the management processes
roles related to the company. that may affect the effectiveness of the execution
In this environment, human organisations can of government policies.
become volatile. This is particularly noticeable in The term enterprise refers to an identifiable
government activities because they are principally group of people who have a common vision and
people-oriented services to the public. Govern- mission. An enterprise concerns all aspects of
ment processes are changing to e-Government tasks, activities, events related to this group.
environment but there is still difficulty in cap- Integration of the enterprise activities requires
turing the concept of citizen engagement, which modelling and analysis of the business processes,
is a measure of success of government policies process data and knowledge within the enterprise
(Jones et al, 2007). Government services have a (Shen et al, 2004). A holistic, customer oriented
wide variety of forms and purposes. When people approach in enterprise integration helps companies
look at government services, they only realise the to cater for different requirements and more
public face of the services, that is, the interactive importantly, provides a way to implement a good
portal of government departments. However, there solution for integration (Oritz et al, 1999).
are many other services that a government has to This chapter serves as a guide to the design
provide and the enterprise engineering processes and implementation of government supported
in those services must be handled carefully to enterprises. We discuss the importance of enter-
ensure the best outcome. Orange et al (2007) prise engineering in the design and execution of
investigated the innovation value in government enterprise models to cope with changes. Three
and recognized the importance of a clear vision case studies are used to illustrate the different
for the future. Government funded programmes forms of government services and the impact
for enterprise development are difficult to manage. different enterprise engineering approaches on
Some governments adopting a private sector the outcomes. By comparing these cases, we de-
model for delivering public good services faced velop the view of a new dimension in modelling
with considerable challenges of understanding to cater for change.
organizational dynamics, for which government
agencies were not competent enough to handle
effectively (Massey, 2003). BACKGROUND
Enterprise architecture adoption in govern-
ment businesses is important but there are many Williams et al (1994) summarised architectures
patterns (Hjort-Madsen, 2007). It is difficult to of enterprises as a result of evolution from years
decide which one to adopt since they are emergent, of experimentation and observation. The ulti-
evolving, embedded, fragmented, provisional. Wu mate goal of enterprise integration is to develop
(2007) proposed layering method in the direc- a cohesive environment that can perform busi-
tion of strategy, business, process, service and ness activities in a seamless fashion and to be
information for developing enterprise integra- responsive to the external world in a timely way.
tion in e-government. Gregor et al (2007) used However, the operating conditions of enterprises
enterprise architecture for enabling alignment and more significantly, government environment,
of IS/IT in government. Enterprise architecture are now characterised by frequent changes. The
should enable these services to be delivered to the challenge to management is to establish a structure

372
Architecture Based Engineering of Enterprises with Government Involvement

that can cope with the changing operating condi- and activities that the enterprise should run, and
tions. Success for achieving the goal therefore at the same time, enables a smooth business pro-
demands well-coordinated agility in all internal cess environment for inter-company operations
and external relationships of the enterprise. (Patankar and Sadiga, 1995). It is crucial that
While it is clear that an enterprise exists to an enterprise involving government activities
fulfil a mission, the owners of an enterprise still requires more public accountability than private
have to define their own objectives and establish organisations, should be supported by a systematic
rules and operating parameters that are leading to design methodology that adequately describes the
achieving the mission. Two desires are becoming logistics in the enterprise and helps the manage-
more important in modern enterprise design and ment to develop well defined policy and process
development: across organisational boundaries.

The customers desire to get products and Enterprise Engineering


services to the exact specifications and to
receive them in a timely manner. Enterprise Engineering is a discipline that has
The enterprises desire to produce goods taken an overarching view of all aspects of en-
and services only for orders, rather than for terprise knowledge areas including:
distribution networks to identified customers
by maximizing operation flexibility. Integration of information, operation and
services
Many different studies have been trying to Business process modelling and analysis
develop a concrete body of knowledge that address Total product life cycle development that
these issues. Business process re-engineering has includes concurrent engineering
been popular in commercial businesses where Globally networked organization taking sup-
changes of existing business environment are ply chain management to a global view
crucial to the survival of the company in highly Resources planning that covers finance as
competitive market. Wortman et al (2000) embed- well as human and organizational issues
ded enterprise software into extended enterprise
models to adapt the business to changing operating Today very few companies offer their products
conditions. Enabling agility in enterprise can be and services from their own in house resources
done through the introduction of reconfigurable alone (Nemes and Mo, 2004). In fact most agile
systems and components to the operation (Weston, enterprises cooperate with large number of sup-
1999). Depending on the problem at hand, human pliers and sub-contractors. Similarly, government
and organisational issues are often addressed as a services must focus on the fundamental processes
secondary function and are developed separately that are required to provide and encompass - as
on the basis of new information systems being put critical parts of - the entire chain of value adding
in place to extract efficiency out of the existing activities in the society. Enterprise activities may
environment. change quickly and so the respective business
In practice, an enterprise will need an archi- process should follow them closely. The dynamism
tecture that defines, not only to the knowledge of the enterprise throughout the whole life-cycle
of the owners but also to many others who are of the enterprise is critical and should be assessed
working on matters related to the enterprise. in the early stage of design (Van den Berg and
An enterprise architecture is the anatomy of the Tolle, 2000).
system defining the protocols, rules, processes

373
Architecture Based Engineering of Enterprises with Government Involvement

To indicate the complexity of the issues, it is et al, 1997). Execution of the decisions would be
worth pointing out that integration of enterprise performed by the physical system at the opera-
subsystems started in the seventies. The initial tional level (Doumeingts et al, 2000).
approaches had failed to deliver the complex Several immediate issues are almost unavoid-
integration of large system as they used different able:
methods for linking various applications. Com-
panies, university, research consortium in Japan, There are too many technologies. It is almost
Europe and the US started addressing the problem impossible for an individual enterprise to
of system integration applying different concepts evaluate every technology and decide which
and using special definitions. The International one best suits the application.
Federation of Information Processing (IFIP) and There are different methods for mapping
the International Federation of Automatic Control architectures one on another.
(IFAC) established a joint Task Force in early Modelling toolbox is large and it is full with
1990s to investigate whether it was possible to variety of products
find common grounds among different schools The enterprise engineer should familiarize
of thoughts on enterprise architectures so that oneself with the nature of the business before
enterprise designers have a common language to it starts working on its integration.
communicate and to cooperate. The IFIP-IFAC
Task Force (1999) invited leading enterprise engi- There are risks in enterprise engineering. En-
neering researchers working together to develop terprises are complex entities that can fail easily if
a unified view of what enterprise engineering they are not designed properly, that is, the rules and
should be. processes are not established to handle changing
The work of the Task Force was based on sev- circumstances. Malladi and Min (2005) used risk
eral enterprise architectures existed at that time. models to assist in the selection of information
The CIMOSA project funded by the European technology infrastructures for rural communities.
ESPRIT research program was the most significant The essence of enterprise engineering is to treat
effort to define an enterprise architecture that had the enterprise as a complex product with a set of
four major views: functions, resources, human principles. Enterprise risks can be minimised by
and finance (Kosanke et al, 1999). CIMOSA applying the science of enterprise engineering to
was particularly useful for discrete manufac- design and make changes to the enterprise.
turing systems where workflow and processes
are highly versatile. PERA, on the other hand, Enterprise Architecture
originated from the study of computer integrated Standards: Path to Solution
manufacturing in the process industries, handled
the management of the enterprise using a phased Government enterprise processes are inherently
development view (Williams, 1994). Through more complicated due to their nature of business.
the top down approach and the visualisation of Mednikarov and Dereliev (2004) attempted to
interconnectivity of phased functions and activi- define naval tasks in structured description to as-
ties, the enterprise architecture could be laid out sist in the development of enterprise architecture.
in advance of the project development stage (Li Bruce (2006) described information linkages for
and Williams, 1997 and 2000). GRAI methodol- multiple government agencies in New Zealand.
ogy took a different approach to segregate the Burk (2006) described the long term vision of the
enterprise as decision centres that were linked enterprise architecture managing US budget. Elli-
by an enterprise wide information system (Chen man et al (2007) were working on an exploratory

374
Architecture Based Engineering of Enterprises with Government Involvement

project investigating enterprise architecture for Improving operations on a continuous,


government. There is no universally acceptable predictable fashion.
concept of enterprise architecture in govern-
ment. Once the architecture is defined, the details are
An enterprise involves people, assets and in- captured using suitable modelling tools. System
formation. There are also processes that govern behaviours such as rules, procedures, decision
the interaction of these elements. The totality of criteria, quality controls and so on need to be
these systems and subsystems forms the anatomy described and understood. These enterprise be-
of an enterprise. Different industries have different haviours are sometimes described as bureaucracy
practices that are usually evolved from experience. if not enough flexibility built into the system to
Past practices are useful references but they are adjust for unforeseeable situations.
not necessarily correct in a new environment.
Design of an enterprise requires understanding
the necessary elements in the anatomy of enter- HOW TO ENGINEER AN
prises and their inter-relationships or constraints. ENTERPRISE
An enterprise architecture provides the basic
building blocks. To achieve the goal of designing an enterprise
Experience has shown that if an enterprise is that is fit for the mission, we need to:
below a certain level of technology and manage-
ment culture, integration by technologies is not Design the system architecture;
feasible. On the other hand, if the enterprise is Develop proven methods to eliminate errors
operating reasonably well, and there is already in the system;
some form of process management and automated Develop tools that assist in the design,
information capturing, then integration architec- validation, preparation and implementation
tures and methods can dramatically improve the phases.
operation of the company (Sulin et al, 1997). The
minimum criterion for readiness to integration is Adoption of an enterprise architecture is an
a management culture for willingness of thinking important starting point of enterprise engineer-
strategically and acting accordingly. Financial ing project. The Generalised Enterprise Refer-
consideration is another major issue and the best ence Architecture and Methodology (GERAM)
way is to justify it with the returns from the inte- describes a set of principles that can be used for
gration process (in a way, self-financing). the design, management, continuous improvement
The existence of many enterprise modelling and operation of enterprises (Figure 1). GERAM
methodologies makes it hard for general business defines a complete methodology that captures
practitioners to select the best for their modelling the engineering and integration requirements
requirements (Vernadat, 2002). The method to for any organisation to develop a fit-for-purpose
design an enterprise that will perform as expected enterprise model supporting its business. GERAM
at the start depends on the expertise of the enter- encompasses essential enterprise concepts of life
prise engineer in: cycles, life history, partial models and generated
views (Noran, 2005). It distinguishes the functions
Understanding the anatomy of the enter- of modelling framework, modelling languages
prise; and modelling tools in the process of design,
Modelling system behaviours in sufficient implementation and operation of enterprise ar-
details; chitectures. Following the recommendations of

375
Architecture Based Engineering of Enterprises with Government Involvement

GERAM, an enterprise designer will be able to that visible when people are loaded with other
make informed, less risky decisions on which simultaneous work.
enterprise architecture should be used for his/her Enterprise engineering processes prepare
enterprise. more thorough understanding of the project by
We now have a framework to work on. The three major steps:
next question is how this can be done step by
step? What are the tasks that should go first and Build the AS-IS structure of the enterprise.
how? It is usual that the start of this activity can This requires detailed analysis of the op-
be seen easily but the rest of the project is not eration of functions, relationships in the

Figure 1. GERAM (Bernus & Nemes, 1996)

376
Architecture Based Engineering of Enterprises with Government Involvement

organisational structures, and the available government related enterprises. These examples
information management systems. To do include: a defence service enterprise, a research
that the enterprise engineer organises focus enterprise and an industry enterprise.
groups addressing each of the areas, but
making it sure that the groups will cooperate Case Study: Product Life Time
with each other. That sort of joint work has Service Enterprise
to be documented with the kind of systems
description methods familiar with the people The ANZAC Ship Alliance (ASA) is an organi-
involved. The range of the tools varies de- zation formed as a virtual enterprise agreement
pending on the technical background of the between Tenix Defence, Saab Systems and the
members of the teams. It can be drawings Australian Government with the aim to provide
with simple labels on the components, or design and implementation of changes to the
sophisticated modelling language (which ANZAC class frigates in service over the life
usually requires technical training for the time of the product. It is an attempt of all parties
participants). This step requires a bottom involved in the creation of the ANZAC fleet to
up approach, analysis detailed solution and provide a stable support environment ensuring that
working upwards to create the bird eye views the ships are always combat ready, fit for purpose
which is needed in later stages. at any given time with the best value outcome.
The next major activity is to define the The Alliance is not a legal company (entity). It
TO-BE state. This is a design phase where is indeed a Virtual Enterprise (VE) as activities
the enterprise engineers together with the span across the three main participants. It draws
management develop the model how the the most suitable resources such as staff and asset
enterprise will operate in the future re- from the member organizations as required for a
engineered state. The teams here work in a particular project.
top down manner creating the overall views The ASA case illustrates a defence related
first and putting detailed information in the enterprise architecture design and develop-
description as the model progresses. ment project in which the Government is a key
After that comes the Migration phase. When component of the enterprise. It shows that when
designing these activities one needs not collaborating with the private sector for support
only consider the logical steps in the change of its asset, the Government needs to participate
process. As most of the time we modify actively in the definition of the enterprise.
existing operations therefore the integra- To engineer the enterprise, we developed
tion system must not bring the enterprise the AS-IS structure using the PERA model and
to halt, or compromise safety and security solicited information through an initial briefing
when making changes. The modification of session with the key executives of the ANZAC Ship
the processes should be implemented in a Alliance (ASA). The AS-IS model served as an
proper time sequence making sure that the important guiding tool for formulating questions
adjustments in the processes make use of and focusing the effort of investigation during
the operation of all the other components. subsequent meetings and process examination.
From this investigation, it was found that due to
To assist in understanding the development and the requirements of the defence materiel acquisi-
implementation of an enterprise architecture, we tion process, there were a number of government
use three case studies to illustrate the process and processes that had to be satisfied before a final
methods and their implications to engineering of decision could be made. These processes formed

377
Architecture Based Engineering of Enterprises with Government Involvement

a series of cascaded life cycles which were inter- enterprise model using PERA. To populate the
connected as shown in Figure 2. ASA model, we used two major instruments:
The concept of a new organisation was evolved questionnaires and interviews. On the basis of the
from a number of meetings with the Defence, both PERA model, the questionnaire was structured
formally and informally, to identify the mission of in 22 parts. Each part examined different aspects
this enterprise and define its structure. This was of the virtual enterprise including the specific
followed by signing of agreement and development objectives of the virtual enterprise in a particular
of management plan for the alliance. The ASA area, the actions that were taken to achieve the
was officially launched with the establishment objectives and the performance indicators that
of ANZAC Ship Alliance Management Office the enterprise adopted. The questionnaire was
(ASAMO) in Perth. These series of actions were distributed to all levels of personnel in the ASA.
modelled as the left hand cycle in Figure 2. In conjunction with the questionnaire, a series of
When the ASAMO was in operation, it started in-depth interviews was conducted with selected
to develop projects that were initiated by the cus- personnel and work groups. The objectives of the
tomer, that is, the Royal Australian Navy. Each interviews were to clarify answers and verify the
project would go through four initial stages of coherence of opinions between different parts of
planning and two stages of completion (middle the enterprise. The ASA had many participants
cycle). from different backgrounds and personal aspira-
For each of the step in the Projects cycle, de- tions. In the process of soliciting commonality,
pending on the expertise and responsibility, the there were contradicting views and deviations
task can be taken up by any of the partners in the from normal practices. The purpose was not to
ASA. The partners will have their own project suppress but rather find a way to deal with these
cycle as shown in the spawned off projects in the non-common issues. The best method was to iso-
right hand cycle. late these views and practices so that the enterprise
Based on the life cycle model in Figure 2, the could work out solutions for them.
enterprise engineering team developed an ASA

Figure 2. Life cycle model in the ANZAC ship alliance


Cwth
A SA Projects T enix
I Proj. creation Saab

Planning

A lliance A gt R OM

A ll
Mgt plan aspects T CE

A SA MO E xecution

Dissolve Wrap up

C ommer cial/deliver able

Note: ROM = Rough Order of Magnitude; TCE = Target Cost Estimate

378
Architecture Based Engineering of Enterprises with Government Involvement

Figure 3 Effect of different performance indicators on organisational objective


boundary condition for all cases: management philosophy

Objective Objective Objective


fulfilled by fulfilled by fulfilled by
providing solutions activities of
design occurred shareholders

Solution Solution Solution


focussed focussed focussed
Ensure
Change Change changes
solutions solutions undertaken by
designed implemented shareholders
Develop Ensure change Manage
change undertaken by change
solutions shareholders programme

(i) design ve (ii) manufacturing ve (iii) consultant ve

The focus was on how the decision centres is a Manufacturing VE by nature. In the last case
operated within the boundary condition speci- shown in Figure 3(iii), the focus is on managing
fied in that part of the interview, including their the change programme. The VE has no obliga-
objectives (What do you want to achieve?), action tion to effect change if the shareholders refuse to
(What do you do in order to achieve the objec- make changes. It is an arms length situation and
tive?), performance indicator (How do you know hence the VE is a Consultant VE.
you have achieved the objective?). It is important that the members of the ASA
Next, we analysed the AS-IS enterprise model understand what goals they are working towards.
and developed the TO-BE model. The outcome Immediately after this part of the study, the ASA
of the model analysis was crucial to the study of held a series of workshops involving all levels of
the TO-BE enterprise architecture. Activity plans, personnel to define exactly what the organisational
information system design, processes and many objective should be. The result was a clear state-
other aspects of the enterprise were determined ment that confirmed the ASA should be developed
by the organisational objective. Three potential as a Consultant VE.
TO-BE enterprises were identified through this The migration phase was a long process. To
process. In Figure 3(i), the focus was to develop begin with, the ASA searched for an information
change solutions and the success for this action was infrastructure system that could potentially be
measured by the solution successfully designed. used throughout the lifecycle of the enterprise
The Alliance had the responsibility to provide as well as its projects. There were some lessons
design of the changes and hence the nature of the learned, for example, in defining the expectation
VE was a Design VE. In Figure 3(ii), the focus is to between different parts of the consortium. It
ensure that the industry partners (i.e. members of was eventually decided to develop a Web-based
the Alliance) to undertake change for the ANZAC project management system that provided the
ships. The measure of success in this case is the communication and coordination hub among all
occurrence of the solution. The Alliance has the participants (Mo et al, 2006). This was proved
responsibility of making the change and hence it to be vital as a first step towards implementing a

379
Architecture Based Engineering of Enterprises with Government Involvement

Consultant VE with different software platforms sharing on the network and staff could concentrate
used by the partners. on the intellectual works, which could produce
the value-added functions.
A Case Study: A Research The VRIDGE example illustrated the applica-
Enterprise tion of enterprise engineering methodologies to
the design and experimentation of new or future
The Globeman21 project was an international enterprises. The VRIDGE enterprise did not ex-
research project under the Intelligent Manufactur- ist at the time when the project was done but the
ing Systems Program investigating the application outcome of this work laid the foundation for Toyo
of information and communications technologies Engineering to establish enterprise integration
in the 21st century (Larsen and Vesterager, 1999). capabilities that eventually span off as an inde-
Although it was completed eight years ago and pendent enterprise system developing company.
many aspects of it have been published but it is Using the three step enterprise engineering
important that we point out some lessons relevant process, the VRIDGE project team developed
to this topic. The project was funded by several the AS-IS enterprise model of the existing project
Governments including Japan (through Ministry enterprise using PERA architecture.
of International Trade and Industry or MITI), A formal definition was needed to identify
European Commission (through Framework the requirements for the enterprise model of the
Program V or FP5), Australia (through Industrial VRIDGE Inc. In order to develop the necessary
Research Alliance Program or IRAP). models, several commercial tools were evaluated.
The Globeman21 project was a large scale It was concluded that no single modelling tool
international project and the results were dis- satisfied all our requirements at this moment, and
seminated through 15 industry demonstrators. hence we used a combination of these tools for
The VRIDGE Demonstrator was initiated by different modelling objectives.
Toyo Engineering (one of Japanese partners) and The KBSI AI0Win, an IDEF0 based modelling
had involvement of partners from Australia, Fin- tool, had been used for business process analysis
land, Denmark, Norway and UK. The objective and model presentation. The FirstSTEP, a user-
of VRIDGE demonstrator project was to study friendly enterprise modelling tool from Interface
how manufacturing systems, integrated with ICT, Technologies, was selected for interactive enter-
could change both the business and life styles prise modelling and simulation. The FirstSTEP
of engineers. By applying the proper informa- had also been used to identify the cross company
tion access and control, the communication in boundary information access and control require-
extended enterprises was more secure than in ments by using its swimming lane presentation.
ordinary companies. We also selected METIS, from NCR, as a core
The VRIDGE Demonstrator hypothesised modelling tool and model repository because of
the pervasive use of information and communi- its flexibility. The ontology based model mapping
cation technologies in the future in such a way facility was developed in METIS environment.
that was unimaginable at the time of the project. According to the PERA methodology, we
It was assumed that all business activities would needed the Enterprise Business Entities (EBE)
be supported by the innovation of ICT through which was fundamental for achieving a shared
more efficient office processing which would understanding of the virtual enterprise. However,
carry out most of the manual works humans had we found that there were quite different views
to do at the time. IT would strongly support the on what would be the business for the VRIDGE
collaboration through information and knowledge Inc. In order to get a common understanding we

380
Architecture Based Engineering of Enterprises with Government Involvement

categorised the business entities according to their exchange standards, communication technologies
lifecycles. We identified three lifecycles closely and application integration platforms.
related to the VRIDGE Inc., as shown in Figure The authors held a series of training session
4. They were: on how to design enterprises using architectures
and conducted workshops with the partners of the
The lifecycle of the VRIDGE Inc. (i.e. pro- project as well as including other Globeman21
ducer of the XFU Plant), participants to determine the future vision and
The lifecycle of the XFU Plant (i.e. product mission of the hypothetical company in the mid
of the VRIDGE Inc.), of 21st century. The TO-BE enterprise architec-
The lifecycle of Xylene as a product (i.e. ture that would overcome the constraints was
product of the XFU Plant). developed and new business processes that could
connect clients, employees and organisations flex-
The identification of these three lifecycles ibly on the network were defined (Shinonome et
helped us to achieve a common understanding of al, 1998). Part of this work was the definition for
the business process of the VRIDGE Inc. where enterprise policies:
the product lifecycle was embedded. It was in this
business process (enterprise lifecycle) where we Information policies:
identified the product related activities (product Secure, authenticated information
lifecycle), and further identified the information exchange
access and control requirements of the product Use of minimal distributed database
lifecycle. The AS-IS model showed a lot of con- Use of open communication network
straints by the technology at the time, particularly (Internet, ISDN/telephone)
on the availability of Internet, bandwidth, data Operation policies (plant engineering proj-
ect):

Figure 4. Lifecycles related to the VRIDGE Inc.

381
Architecture Based Engineering of Enterprises with Government Involvement

Client can enter at multiple points of the


Workbench comprised three service layers (Fig-
plant design / construction life-cycle ure 5).
Distributed operation
Collaborative work demonstration 1. Coordinator
VRIDGE design policies: Tools for the VRIDGE Inc project initiation
Use of object oriented technologies execution, and dismissal:
Use of version control The modeling/design tools for the
Maintain dependence information VRIDGE Inc.
VRIDGE technology policies: The operation management tool (mem-
Use of STEP ber profiles, contacts, capabilities,
Use of STEP tools etc.)
Use of commercial CSCW tools Negotiate/Specify the protocols
Security policies: Daily supervise/monitor/support
Use of firewalls 2. Collaborator
Tools for VRIDGE Inc collaboration (mainly
Since the VRIDGE enterprise was a research through information access and control):
enterprise, the partners decided to test the new Manage the distribution/ exchange of
architecture by executing it within Globeman21 product information
project environment. To achieve this goal, the Manage the review and release of
project team developed the VRIDGE Workbench, product information
which provided an interface for visualizing and Manage the access right
controlling the working environment. VRIDGE Product information change manage-
ment

Figure 5. VRIDGE workbench layers

382
Architecture Based Engineering of Enterprises with Government Involvement

3. Communicator partners participated in the testing of the func-


Tools for support the VRIDGE Inc Com- tionality of the system (Figure 7).
munication: The success in this work was the development
Basic IT Infrastructure of the conceptual framework for understanding
Enable/facilitate the exchange/sharing the formation, operations and information control
of product information of the extended enterprise. Substantial challenges
Enable/facilitate the communication were encountered at the starting stage of the
among the members of the VRIDGE project when the background of participants had
Inc prevented people to think more cohesively.
Provide a central information reposi- The VRIDGE case illustrates a research related
tory Enterprise Architecture in which government
provides funding to the industry on research work
The VRIDGE Workbench was implemented only. From the governments point of view, it is
as a Web-based portal as shown in Figure 6. important that the companies in the project could
The VRIDGE Inc. was a virtual enterprise research and improve their competitiveness in
which carried out the design, procurement, the global market. This was demonstrated using
construction, and manufacturing of a chemical a short success story approach and simulated
plant (Shinonome et al, 1998). The VRIDGE Inc. within the modelling tools used in this demon-
facilitated the understanding of global manufac- strator (Figure 8).
turing business processes and the investigation of Government enterprise design shares many
the requirements for global product information similar aspects as VRIDGE. For example, exist-
access and control. A group of 20 staff from the ing government processes do not normally exist

Figure 6. Realised VRIDGE workbench

383
Architecture Based Engineering of Enterprises with Government Involvement

Figure 7. Roles to test VRIDGE Inc. concept

Figure 8. Screens of the short success story

due to changes in government or its policies. The development, thus reduces the cost for not making
development is often one off and does not repeat too many mistakes. The final result is that techni-
in other governments (e.g. local government). The cal and financial risks will be minimized.
migration from manual paper based process to
latest ICT based enterprise is clear. Hence, enter- An Example: Virtual Enterprise of
prise engineering approach, especially referencing SMEs
to the use of specific enterprise architectures, is
particularly relevant. The moral of the example The Australian government strongly encouraged
is that visionary research will show the way for SMEs to be competitive on the world market

384
Architecture Based Engineering of Enterprises with Government Involvement

Figure 9. The RELINK VERA lifecycles

without being protected by tariffs. There was an structural issues. The design of the enterprise is
important demonstrator project to show that small a crucial step towards successful operation. The
toolmakers, which usually compete for orders, enterprise engineering design of RELINK is based
could successfully cooperate when the job is too on the Virtual Enterprise Reference Architecture
big, or when the deadline is too short for any one (VERA) (Zwegers et al, 2003), which defines three
participant. Government involvement in this case entities, the network entity, the VE entity and the
has been predominantly an industry support role product entity (Figure 9).
in which the work will be continued after the Each of these three entities is represented by
project. Intermediate reporting is essential on a a life cycle describing possible phases. An entity
quarterly basis. can be operating from identification to decommis-
The RELINK initiative demonstrated the sion. The important characteristic of VERA is the
methodologies and systems that would enable changes of architecture requirements in different
small firms in the tooling and automotive indus- phases of the virtual enterprise. Conceptually,
try to participate with medium and large firms there are 3 architectures: Information Systems,
in turnkey projects as part of a broader supply Manufacturing Equipment and Human and Or-
chain. Globalisation has forced companies to ganisational architectures. Information systems
work together in a new arrangement known as and manufacturing equipment architectures rep-
virtual enterprise. The characteristics of virtual resent automation of information and materials
enterprises are flexible, dynamic with minimal or flows. Human and organisational architecture
sometimes no contractual agreements among the sits between the two architectures and serves as
partners. A virtual enterprise can be created and the operating centre of the virtual enterprise. It
disbanded in very short time frames. Interaction at is essential that a balance is required to ensure
organizational, technical, social and commercial all three architectures are running in supporting
levels give rise to emergent properties that have each other rather than one moving too far ahead
specific technical, communications and infra- (or behind). Individual companies may vary the

385
Architecture Based Engineering of Enterprises with Government Involvement

balancing point (known as extent of automa- to quickly align their objectives and informa-
tion) but in a virtual enterprise, collaborative tion systems with the amalgamated business
partners must find a common acceptable extent processes with their partners, otherwise, the VE
of automation. might suffer from not having integrated support
Development of the AS-IS scenario was not of effective decision-making and informed ac-
a straight-forward task. Although the general tions. Without the right information at the right
understanding of the industry was that there was time, delays and more seriously costly mistakes
no cooperation across the board, several larger could occur. The question was: how could this
companies claimed that they were working with ability be assessed while the VE was still in the
groups of small companies to bid for new jobs. Network entity. VERA enables modelling the
After a series of industry visits, it was concluded relationship between the changes of ICT require-
that these groups were basically sub-contracting ments to the maturity of the virtual enterprise,
arrangements and the relationships normally i.e. the life cycle phases in VERA. This led to
ended when the job was done. There was no sign the development of the RELINK Communica-
of knowledge sharing and accumulation, between tion Framework (RCF) by Mo et al (2005). The
the parties. Communication and data exchange RCF defined the technology levels that guided the
between partners in these circumstances were industry partners in RELINK to quickly establish
largely through meetings and paper transfer. ICT alignment by identifying the technologies
This situation was primarily classified as the and possibly commercial products that could be
Network entity. acquired immediately.
VERA provided a clear migration path for this The RELINK case study illustrated an impor-
tooling industry virtual enterprise. The TO-BE tant aspect for government enterprise architecture
scenario would logically be the Virtual Enterprise designer. SMEs do not have tremendous ICT re-
entity. For a virtual enterprise to succeed: sources. If there is a need for SMEs to work with
the government enterprise in a new system, the
All partners in the virtual enterprise, irre- ability of the SMEs to cope with the new technol-
spective of its size, must communicate with ogy level is vital to the success of the new project.
the same protocol at the enterprise level; The costs involved, irrespective of who is going
A unified (or standard) information and to pay, must be taken into account.
physical architecture must be agreed by all The RELINK case illustrates an industry
partners in the virtual enterprise; virtual enterprise in which government plays
Irrespective of the level of ICT employed a monitoring role (with progress report and
by individual toolmakers, the intermedi- participation requirements). The Enterprise Ar-
ate layer of functions must be fulfilled by chitecture has to be both incentive to small busi-
alternative technologies; ness as well as return to government in terms
The information and physical architectures of SME engagement rate. We demonstrated that
must be in place in all entities (network, enterprise engineering could facilitate a simulta-
VE and product) and in all phases of the neous harmony of competition and cooperation
virtual entities. The architectures will vary of networked enterprises which the government
in content. had visibility on its formation, requirements,
tasks and processes.
The migration from AS-IS to TO-BE scenario
in RELINK required the ability of the companies

386
Architecture Based Engineering of Enterprises with Government Involvement

DYNAMICS OF CHANGE: appropriate enterprise architecture for the virtual


FUTURE RESEARCH ISSUES enterprise. This point of view is supported by the
findings by Sackett et al (2003). Once an enterprise
There are several messages from the three case architecture is adopted, enterprise engineering is
studies. The involvement of government in en- the key to enable the project to proceed.
terprise formation is complex and often requires The global market is changing in an ever
significant changes and innovative approaches increasing speed. There are new entrants to
to satisfy what is needed to achieve the goals. compete or cooperate with, existing partners
An important observation of these cases is the are changing their business profiles and leave
fact that they are all designed and executed in a the network together with old, established com-
virtual enterprise environment. Clarity of mission panies who simply go out of businesses. In this
is critical to defining a pathway and adoption of kaleidoscope dynamics of the business world it

Figure 10. Time dimension in enterprise engineering

V irtual enterprise E nterprise m odels


architecture defined im plem ented in the
spec ific to the form of processes,
project system s and roles

e.g.
ASA

G eneric
enterprise
architecture
(V E R A )

e.g.
V R ID G E

e.g.
R E LIN K

T im e
P roject E nterprise E nterprise
start design execution

387
Architecture Based Engineering of Enterprises with Government Involvement

is vital that enterprises operating in such agile ture, irrespective of whether the new enterprise
business environments can adapt to new, un- is evolved from an existing system or from a
foreseeable circumstances quickly. The use of completely new venture:
integration methodologies alone is not enough
as they require time consuming modelling done Increased complexity requires collaboration
by iterations. By the time the models are ready between a large numbers of participants.
the environment has changed, so the original Increase of cooperating partners is a quan-
mission goals which were the starting points of titative issue until certain size. There is a
our re-engineering activities should be changed point when the partners are just too many to
before we have finished designs. Hence, we need handle in the established ways as complexity
a new dimension in enterprise engineering to be demands different methods.
ready for managing these changes. Ever shortening delivery time requires opti-
Virtual enterprises are commonly project misation across entire network. Companies
oriented collaborations from a network of people have to realise, that their best performance
or organizations that have worked together in the (local optimum) does not necessarily deliver
past, and have some common, generally tacit the biggest profit for the venture. (This
understandings of what work is to be done, and poses a question when managers are paid
how they can do it together. The use of VERA in according to the share price of their local
the RELINK case study illustrated an important operation.) There is a need for holistic view
point: VERA was specifically developed for the of the networked business. People say chang-
application of virtual enterprise. Enterprises ing technology is easy; changing human
that involve interaction between government perception is difficult.
and SMEs are by nature virtual enterprises with Business imperatives mutate the networks
ambiguous goals. Starting with a close enough often and quickly. There are cases when not
enterprise architecture would make the job a the company objectives change the priorities
lot easier. In a generic sense, the engineering in the network but in the contrary: the global
of any specific government related enterprise business environment forces the network
architecture can be done in a stepwise fashion to change its priorities and companies just
as shown in Figure 10. have to adapt to the changes if they would
At the start, when the consortium receives gov- like to remain part of the network.
ernment participation, the consortium will use the
generic enterprise architecture specified by VERA Enterprise engineering will help organisa-
as a basis to form a default virtual enterprise. The tions to overcome these problems by a number
enterprise design engineers from all partners will of ways. An enterprise model is a computational
work together to assess what the current system is representation of the structure, activities,
and design the virtual enterprise that is most suit- processes, information, resources, people,
able for supporting the project at hand (TO-BE). behaviour, goals and constraints of an enterprise.
The design of specific enterprise architecture is It is necessary that shareable representation
iterative but with the help of modelling tools and of knowledge be available that minimizes
mutually agreed processes, the virtual enterprise ambiguity and maximizes understanding and
will be able to move to the TO-BE state by careful precision in communication. The creation of
management of the changes. such a representation should eliminate much of
The following factors must be considered when the programming required.
developing a new, dynamic enterprise architec-

388
Architecture Based Engineering of Enterprises with Government Involvement

CONCLUSION Burk, R.R. (2006, 21-22 February). Enterprise


Governance: Defining the Long Term Vision.
This chapter examines the issues of creating Paper presented at the Conference in Enterprise
and managing the enterprises that have certain Architecture for Government, Canberra, Aus-
levels and characteristics of government involve- tralia.
ment using enterprise engineering. The essence
Chen, D., Vallespir, B., & Doumeingts, G. (1997).
of enterprise engineering is the total life cycle
GRAI integrated methodology and its mapping
approach that can be adopted across complex
onto generic enterprise reference architecture
business, engineering and supply networks. The
and methodology. Computers in Industry, 33,
three case studies demonstrated the foundations
387-394.
of three different virtual enterprises with varying
roles and degrees of government participation. Doumeingts G., Ducq Y., Vallespir B., & Klein-
Most virtual enterprises will be working on hans S., (2000). Production management and
projects of significant value and resource commit- enterprise modelling. Computers in Industry,
ment; otherwise, it would not be cost effective to 42, 245-263.
form a partnership. Under these circumstances,
Elliman, T., Irani, Z., & Jackson, P. (2007). Estab-
it is important to establish a framework of pro-
lishing a framework for eGovernment research:
cesses and systems to assist the operation of the
project VIEGO. Transforming Government:
virtual enterprise for the reason of extracting
People, Process and Policy, 1(4), 364-376.
efficiency, even at a small percentage of savings.
Enterprise engineering is therefore an important Gabbar, H.A., Shimada Y., & Suzuki K., (2002).
step in achieving the ultimate goal of the extended Computer-aided plant enterprise modelling en-
enterprises mission. Government is itself a large vironment (CAPE-ModE) design initiatives.
enterprise and hence its interaction with the public Computers in Industry, 47, 25-37.
varies from time to time. Starting with VERA,
Gregor, S., Hart, D., & Martin, N. (2007). Enter-
which fits well with the preamble of inter-organi-
prise architectures: enables of business strategy
sational interaction, the virtual enterprise can be
and IS/IT alignment in government. Information
designed and implemented to fulfill the mission
Technology & People, 20(2), 96-120.
of the government sponsored project readily.
Hall, W.P. (2000). Managing Technical Documen-
tation for Large Defence Projects: Engineering
REFERENCES Corporate Knowledge. In J.P.T. Mo & L. Nemes
(Eds.) Global Engineering, Manufacturing and
Bernus, P., & Nemes, L. (1996). A framework to Enterprise Networks (pp.370-378). Boston: Klu-
define a generic enterprise reference architecture wer Academic Publishers.
and methodology. Computer Integrated
Hjort-Madsen, K. (2007). Institutional patterns of
Manufacturing Systems, 9(3), 179-191.
enterprise architecture adoption in government.
Bruce, E. (2005, 21-22 February). Linking Enter- Transforming Government: People, Process and
prise Architectures between Multiple Government Policy, 1(4), 333-349.
Agencies The NZ Experience. Paper presented
IFIPIFAC Task Force on Architectures
at the Conference in Enterprise Architecture for
for Enterprise Integration, (1999). GERAM:
Government, Canberra, Australia.
Generalised Enterprise Reference Architecture
and Methodology Version 1.6.3, Annex to ISO

389
Architecture Based Engineering of Enterprises with Government Involvement

WD15704, Requirements for enterprise-reference Mednikarov, B.K., & Dereliev, P.H. (2004).
architectures and methodologies. March, pub: Structured description of naval tasks. Information
IFIP and IFAC. and Security, 13, 25-34.
Jiang, H.C., & Mo, J.P.T. (2001). Internet Based Mo, J.P.T., Beckett, R., Nemes, L. (2005, 26-28
Design System for Globally Distributed Concur- September). Technology Infrastructure for Virtual
rent Engineering. Journal of Cybernetics and Organisation of Tooling. Paper presented at Sixth
Systems, 32(7), 737 754. IFIP Working Conference on Virtual Enterprises
(PRO-VE05). Valencia, Spain.
Jones, S., Hackney, R., & Irani, Z. (2007). Towards
e-government transformation: conceptualising Mo, J.P.T., & Menzel, C. (1998). An integrated
citizen engagement: A research note. Transform- process model driven knowledge based system for
ing Government: People, Process and Policy, remote customer support. Computers in Industry,
1(2), 145-152. 37, 171-183.
Kosanke, K., Vernadat, F., & Zelm, M. (1999). Mo, J.P.T., Zhou, M., Anticev, J., Nemes, L., Jones,
CIMOSA: enterprise engineering and integration, M., Hall, W. (2006). A study on the logistics
Computers in Industry, 40, 83-97. and performance of a real virtual enterprise.
International Journal of Business Performance
Larsen, L.B., & Vesterager, J. (1999, 15-17 March).
Management, 8(2-3), 152-169.
Framework and methodology for creating virtual
enterprises - Initial results from the Globeman21 Nemes, L., & Mo, J.P.T., (2004). Collaborative
project. Paper presented at the 5th International Networks in Australia Challenges and Rec-
conference on Concurrent Enterprising: The ommendations. In L.M. Camarinha-Matos, H.
Concurrent Enterprise in Operation. The Hague, Afsarmanesh (Eds.). Collaborative Networked
the Netherlands. Organizations (pp.97-102). Boston: Kluwer Aca-
demic Publishers.
Li, H., & Williams, T.J., (1997). Some extensions
to the Purdue Enterprise Reference Architecture Noran, O. (2005). A systematic evaluation of the
(PERA) - I. Explaining the Purdue architecture C4ISR AF using ISO15704 Annex A (GERAM).
and the Purdue methodology using the axioms Computers in Industry, 56, 407-427.
of engineering design. Computers in Industry,
Orange, G., Elliman, T., Kor, A.L., & Tassabehji,
34, 247-259.
R. (2007). Local government and social or inno-
Li, H., & Williams, T.J., (2000). The interconnected vation value. Transforming Government: People,
chain of enterprises as presented by the Purdue Process and Policy, 1(3), 242-254.
Enterprise Reference Architecture. Computers
Ortiz, A., Lario, F., & Ros, L., (1999). Enterprise
in Industry, 42, 265-274.
Integration Business Processes Integrated Man-
Malladi, S., & Min, K.J., (2005). Decision sup- agement: a proposal for a methodology to develop
port models for the selection of Internet access Enterprise Integration Programs. Computers in
technologies in rural communities. Telematics Industry, 40, 155171.
and Informatics, 22, 201219.
Patankar, A.K., & Sadiga, S., (1995). Enterprise
Massey, C. (2003). Enterprise assistance: respons- integration modelling: a review of theory and
es from the public and private sectors. Journal practice. Computer Integrated Manufacturing
of Small Business and Enterprise Development, Systems, 8(1), 21-34.
10(2), 128-135.

390
Architecture Based Engineering of Enterprises with Government Involvement

Sackett, P., Rose, T., & Adamson, V. (2003). The Vernadat, F.B. (2002). Enterprise Modelling and
importance of business process clarification Integration (EMI): Current Status and Research
within the virtual enterprise. Journal of Small Perspectives. Annual Reviews in Control, 26,
Business and Enterprise Development, 10(3), 15-25.
298-305.
Weston, R.H. (1999). Reconfigurable, component-
Shankararaman, V., & Lee, B.S. (1994). Knowl- based systems and the role of enterprise
edge-Based Safety Training System (KBSTS) engineering concepts, Computers in Industry,
- A Prototype Implementation. Computers in 40, 321-343.
Industry, 25, 145-157.
Williams, T.J. (1994). The Purdue Enterprise
Shen, H., Wall, B., Zaremba, M., Chen, Y., & Reference Architecture, Computers in Industry,
Browne, J. (2004). Integration of business model- 24(2-3), 141-158.
ling methods for enterprise information system
Williams, T.J., Bernus, P., Brosvic, J., Chen,
analysis and user requirements gathering. Com-
D., Doumeingts, G., Nemes, L., Nevins, J.L.,
puters in Industry, 54, 307-323.
Vallespir, B., Vlietstra, J., & Zoetekouw, D. (1994).
Shinonome, M., Hashimoto, H., Fuse, A., & Mo, Architectures for integrating manufacturing
J.P.T. (1998). Development of an information tech- activities and enterprises. Computers in Industry,
nology infrastructure for extended enterprise. In J. 24, 111-139.
Mills & F. Kimura (Eds.). Information Infrastruc-
Wortmann, J.C., Hegge, H.M.H., & Rolefes,
ture Systems for Manufacturing (pp.353-364).
S. (2000). Embedding enterprise software in
Boston: Kluwer Academic Publishers.
extended enterprise models. Computers in
Sulin, B.A., Lang, K.R., & Whinston. A.B. Industry, 42, 231-243.
(1997). Enterprise decision support using Intranet
Wu, R.C.Y. (2007). Enterprise integration in e-
technology. Decision Support Systems, 20, 99-
government. Transforming Government: People,
134.
Process and Policy, 1(1), 89-99.
Van den Berg, R.J., & Tolle, M. (2000). Assess-
Zwegers, A., Tolle, M., & Vesterager, J., (2003).
ing Ability to Execute in Virtual Enterprises. In
VERAM: Virtual Enterprise Reference Archi-
J.P.T. Mo & L. Nemes (Eds.) Global Engineering,
tecture and Methodology. In I. Karvonen, R. Van
Manufacturing and Enterprise Networks (pp.370-
den Berg, P. Bernus, Y. Fukuda, M. Hannus, I.
378). Boston: Kluwer Academic Publishers.
Hartel, J. Vesterager (Eds.). VTT Symposium 224
(pp.17-38), Helsinki, Finland.

391
392

Chapter XVII
Collaborative Enterprise
Architecture for Municipal
Environments
Leonidas G. Anthopoulos
Hellenic Ministry of Foreign Affairs, Greece

Abstract

E-government evolves according to strategic plans with the coordination of central Governments. This
top-down procedure succeeds in slow but sufficient transformation of public services into e-Government
ones. However, public agencies adapt to e-Government with difficulty, requiring holistic guidance and a
detailed legal framework provided by the Government. The setting up of common Enterprise Architecture
for all public agencies requires careful analysis. Moreover, common Enterprise Architecture could fail
to cover the special needs of small or municipal agencies. The chapter uses data from various major
e-Government strategies, together with their enterprise architectures, in order to introduce a develop-
ment model of municipal Enterprise Architecture. The model is based on the experience collected from
the Digital City of Trikala, central Greece, and results in Collaborative Enterprise Architecture.

INTRODUCTION Administrations. The strategic plans define the


political targets for e-Government, such as time
Governments worldwide are investing heavily in and cost savings for citizens and public Agencies
e-Government, according to ambitious strategic (Cap Gemini Ernst & Young, 2003) and the de-
plans aimed at friendlier and more effective public velopment of a citizen-centered, results-oriented

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Collaborative Enterprise Architecture for Municipal Environments

and market-based public Administration (Federal projects. EA is the bridge that joins strategic
Enterprise Architecture, 2002). Moreover, stra- plans and their implementation (Federal Enter-
tegic plans set the technological standards that prise Architecture (FEA Group), 2005). Moreover,
will be followed during e-Government evolution, according to (Adigun and Biyela, 2003), the EA
such as openness, usability, customization and documents the elements that make up e-Gov-
transparency for public portals (Gant and Gant, ernment in a form that can be understood by its
2002) and interoperability between e-Govern- stakeholders (for example politicians, political
ment systems (UK Cabinet Office, Office of the parties, councils, heads of departments etc.). EA
e-Envoy, 2002). can assist central e-Government supervisors in
Strategic plans are being implemented accord- understanding and combining technical standards
ing to the top-down procedure (Anthopoulos, and political aspects.
Siozos and Tsoukalas, 2007), meaning that Gov- Each strategic plan is now accompanied by a
ernments define the primary targets and assign centrally defined EA that can supply all e-Govern-
their implementation to central authorities, while ment projects with common standards and opera-
e-Government target groups (citizens, enterprises, tion principles. However, central EA has to deal
civil servants) are not involved in the design with problems similar to the ones that central stra-
procedure. Top-down strategic planning defines tegic planning faces (Anthopoulos et. al., 2007):
policies and targets, but not methods and principles smooth transition of the public Agencies from
for e-Government. Information and Communi- traditional procedures to e-Government, change
cation Technology (ICT) vendors have provided acceptance by all target groups, and the treatment
solutions for e-Government and for digital service of individual, local and peripheral needs.
execution that are mainly eCommerce-based The purpose of this chapter is the introduction
applications, transformed and parameterized to of the Collaborative Enterprise Architecture
public Administration methodologies (Lawry, (CEA) that can be applied in local, state or pe-
Albrecht, Nunamaker and Lee, 2002). ripheral governments and Agencies. CEA is the
The application of the strategic plan on the result of: a) the experiences of the strategic plans
public Administration is a difficult procedure, that are being implemented by central Govern-
since various Authorities did not participate in ments, such as those of the US, the UK, Canada,
the top-down strategic planning, they do not Germany and the European Union. All have
know planning extensions and they are not aware followed the top-down planning procedure for
of the upcoming changes. Distributed and local e-Government and they have resulted in specific
authorities require the existence of controlling EAs for the public sector. b) The experiences
procedures and of specific legal frameworks in extracted by the implementation of the metro-
order to adopt changes. Central Agencies defined politan e-Government environment in the Digital
by Governments are assigned strategic planning City of Trikala, central Greece (Anthopoulos
implementation, change management and the and Tsoukalas, 2005), where the bottom-up
application of common technical standards in planning procedure (Anthopoulos et. al., 2007)
separate e-Government projects. was followed. Municipal area environments and
However, central supervision lacks func- individual Agencies can follow the bottom-up
tions (Peristeras and Tarabanis, 2004) that could planning procedure for e-Government, and their
establish common standards for interoperable, implementation model can be common. The re-
usable and accessible e-Government projects. sulting Collaborative Enterprise Architecture
The Enterprise Architecture (EA) is a tool that combines the bottom-up planning method,
can establish standardization in e-Government major EAs and groupware tools.

393
Collaborative Enterprise Architecture for Municipal Environments

In section 2 of this chapter, the background do more with Government than with the e,
of the proposed CEA is given. In section 3 the meaning that e-Government technologies exist,
contribution of this chapter is analyzed. The but their application requires the simplification
main thrust of this chapter is the proposal of the of public services and the modernization of ad-
CEA. The notion begins with the key findings ministrative structure and culture.
from existing e-Government strategies and En- The primary target of e-Government is the
terprise Architectures. All strategies culminate development of an efficient and citizen-centered
in Enterprise Architectures that have common Public Administration that will operate according
features. Then, the implementation model that to business methods and profit both citizens and
can be followed when a local Administration the Public Sector. E-Government projects aim at
wishes to enter the e-Government era is analyzed. cost- and time-minimization of public transac-
In the form of a step-by-step guide, the perspec- tions, at the simplification and the elimination
tives that public Agencies need to consider are of paper production during public services and
analyzed. Major e-Government case studies and at the treatment of corruption in Public Admin-
their experiences have to be combined with local istration.
needs. The implementation procedure is extracted The evolution of e-Government is currently
by the case study performed in the Digital City based in the centralized design and implementa-
of Trikala, Central Greece (e-Trikala), where the tion supervision of Strategic Plans, supported
local Administration decided to move towards the by huge investments in ICT infrastructures.
Information Society: e-Government methods and Governments appear satisfied, since they have
local social needs were analyzed and combined. succeeded in cost and time savings. Moreover,
The result of this initial procedure was the de- Governments consider that the pressure they
velopment of an Enterprise Architecture that can apply for the transformation of Public Administra-
extend national EA and is called the Collaborative tion will in the end achieve the primary targets
Enterprise Architecture (CEA). of e-Government. Enterprise Architecture is a
tool that supports the central implementation
of a Strategic Plan, by setting targets, principles
BACKGROUND and methods that can be followed by all public
Agencies. According to (Chief Information
There are many definitions of e-Government. Officers (CIO), 2001) Enterprise Architecture
Some (Devadoss, Pan, Huang, 2002) refer to the (EA) is a strategic information asset base, which
installation and use of IT systems in Public Ad- defines the mission, the information necessary to
ministration for offering digital public services. perform the mission and the technologies neces-
Others (Wimmer, Traunmuller, 2000) refer to the sary to perform the mission, and the transitional
transformation of Public Administration, which processes for implementing new technologies in
is based on the re-designing and digitization of response to the changing mission needs. EA in-
public transactions. Moreover, e-Government is cludes a baseline architecture, target architecture
related to social participation in policy making and a sequence plan. EA is accompanied with
(Pavlichev, Garson, 2004) and in the improvement a specific framework (CIO, 1999) containing the
of all public transactions, such as procuring and proper procedures that each public Agency has
auctioning methods (Schubert, Hausler, 2001). to follow in order to implement the EA. The EAs
Furthermore, according to the Organization that were investigated for the purposes of this
of Economic Co-operation and Development chapter have many similarities regarding their
(OECD) (OECD, 2001) e-Government has to development procedures, while their missions
have common primary targets.

394
Collaborative Enterprise Architecture for Municipal Environments

The development of e-Government strategic Central Greece (Anthopoulos, 2005), show that
plans is a top-down procedure (Anthopoulos citizens prefer the involvement of public servants
et. al., 2007), meaning that central Governments in digital transactions, while civil servants appear
supervise the design and execution of national reluctant to support the diffusion of e-Govern-
e-Government initiatives. The top-down proce- ment. Different points of views show that neither
dure is defined in detail by means of educational citizens nor civil servants trust e-Government.
methods, where an instructor presents the general The Digital City notion is used for the purposes
concept of a system and proceeds to its subsys- of this chapter. Digital City is defined as the
tems. In e-Government initiatives, the instructor global municipal area information environment,
is the Government usually with the support and focusing on the needs of a city area. The environ-
knowledge of special consultants invited from the ment contains Information and Communication
private sector which plans and monitors multiple Technology (ICT) solutions, but is not designed
projects. Top-down developed e-Government to offer only digital public services or to create
plans contain policies and targets, but not methods digital communities. The primary targets of the
and principles. Information and Telecommunica- Digital City are: a) to offer digital means for sup-
tion Technology (ICT) vendors have provided porting social needs in all daily transactions; b) to
solutions for e-Government and for digital service acclimate the local community to the notion of the
execution that are mainly eCommerce-based Information Society; and c) to collect official and
applications, transformed and parameterized to unofficial information from the local community
Public Administration methodologies. in order to support sustainable growth of small
On the other hand, current centralized design societies (Anthopoulos and Tsoukalas, 2005). The
has specified neither citizen nor civil servant definition extends previous ones by (Sairamesh,
needs. Surveys carried out in the US (Accenture, Lee & Anania, 2004), (Sproull & Patterson, 2004),
2005) (ACSI, 2005) show that citizens evaluate (Widmayer, 1999) and (Ishida, 2002).
digital public services and seem to prefer tradi- In the Digital City of Trikala, [on behalf of the
tional transactions. Citizens expect more from local Administration] e-Government issues were
digital services (Accenture, 2005), while they are investigated (Anthopoulos, Tsoukalas, 2005), and
not confident regarding security and privacy as- the bottom-up planning method was applied.
pects of e-Government transactions. Furthermore, The bottom-up design, too, is defined in detail
surveys carried out in the Digital City of Trikala, by means of educational methods (Anthopoulos

Table 1. Comparing top-down and bottom-up methods

395
Collaborative Enterprise Architecture for Municipal Environments

et. al., 2007), where participants consider e-Gov- data is useful for the introduction of CEA, as it
ernment as a hierarchical system consisting of was used in the e-Trikala case. CEA contains a
multiple elements (sub-systems) that need to be mission statement and an implementation model,
identified, combined and analyzed from multiple which follows a number of perspectives and steps
perspectives in order for the whole system to that can be common for similar cases. CEA also
be realized. Participants (end-users, public offi- contains a logical architecture and some techno-
cials, politicians) share knowledge, and support logical principles that can be followed by local
Administration modernization. A comparison of agencies.
the bottom-up and top-down design methods
is presented in (Table 1). Key Findings from Existing
They start by setting out their expectations E-Government Strategies
with regard to e-Government systems, digital
public services and their simplification, and the A formal definition of public services suggests that
smooth transition from traditional to ICT-based independent public services are legally grounded
procedures. The bottom-up strategic planning business of public organizations in an economi-
was successful for the e-Trikala case, since in a cal sense. They represent the development and
mid-sized Greek town with a development index delivery of products and services of an organized
under national average values, the investment of unit to the public. A public service is referenced to
more than 4 million for a metropolitan e-Gov- a life event or business situation and is analyzed
ernment environment (Anthopoulos and Manos, in multiple steps that are executed according to
2005) was achieved in less than 3 years, and the relevant legal restrictions.
closing of the digital divide with the contribution The US Federal Governments e-Government
of all social groups was performed. E-Trikala action plan (US Federal Government, 2002) aims
can be a case study for similar cases, where local at the transformation of public administration
Agencies, municipal or state Governments wish into a citizen-centered, results-oriented and
to enter the e-Government era. market-based e-Government. Extensive invest-
ment, exceeding $52 billion by the end of 2003,
is being made in e-Government projects. About
MAIN THRUST OF THIS CHAPTER 40,000 Web pages from State Governments and
local authorities are accessible from a one-stop
The main purpose of this chapter is to introduce the e-Government portal called FirstGov (www.
Collaborative Enterprise Architecture (CEA): a firstgov.gov), while the e-Authentication (US
model that can support local Agencies and munici- Federal Government, 2003) platform provides
pal or state Governments in their e-Government secure services and preserves privacy during
projects. The CEA was extracted in the e-Trikala public transactions.
case study, where e-Government Strategies were The US strategic plan is supported by the
analyzed and combined with individual needs. Federal Enterprise Architecture (FEA) (CIO,
The summarized process and the data that were 2001), which was inspired by Zachmans model
used in the e-Trikala case are contained in this (Zachman, 1987), (Sowa, 2000). FEA adopted
section. Initially, the key findings of some major the National Institute of Standards and Technol-
e-Government strategies are presented. This ogy (NIST) model (CIO, 1999), containing the
investigation culminates in a common central following layers: business, information, infor-
e-Government Information System and a com- mation systems, and data and delivery systems
mon procedure for public service execution. This architectures.

396
Collaborative Enterprise Architecture for Municipal Environments

In Europe, member countries have signed the connects existing systems with different data
eEurope Action Plans, describing ways of build- structures and establishes user authentication
ing a favorable environment for all European for all public agencies and civil servants. The e-
citizens to participate in the Information Society. GIF (e-Government Interoperability Framework)
These plans have the power of contract between contains a range of standards for technical data
the member countries, presenting targets for IT exchange formats and protocols, in order to es-
projects. According to the previous eEurope 2005 tablish interoperability between different systems
plan (European Commission, 2002) for instance in British public Administration. By complying
public authorities in all member countries should with the technical standards, all public Agencies
offer digital services by the end of 2005. Recently, access central solutions and principles. British
the European Council adopted the i2010 Strategic Government approved its EA called the cross-
Plan (Reding, 2005), where innovation and Government Enterprise Architecture (xGEA) in
inclusion have become the main priorities for 2005 (UK CIO, 2005), describing the common
an open information space in Europe. European business-led vision and procedures for British
central Agencies did not suggest a specific EA Administration.
for e-Government in member countries. How- Germany has designed and followed the Bun-
ever, e-Europe strategic plans (http://ec.europa. dOnline 2005 strategic plan (German Federal
eu/information_society/eEurope) set out targets Government, 2003) for its Information Society
as defined by the Information Society Directorate framework program, which contained specific
General (http://ec.europa.eu/information_society) targets for e-government. The Bund portal (www.
and approved by the European Council. European bund.de) is the main point of access, where more
Directives support the implementation of e-Eu- than 100 agencies are interconnected and endeav-
rope strategic plans, which are coordinated and our to offer more than 450 different services. The
supervised by the Information Society Directorate German Federal Government wants to make the
General. European member-state national strate- Bund portal the main information platform for its
gies had to adapt to eEurope plans and to their public Administration, and a customer-centered
targets. The UKs Modernizing Government plan and open environment. The German EA is called
(UK Crown, 2000) is one of the major European SAGA Framework (KBSt Publication Series,
e-Government projects that matches the eEu- 2003) and contains centrally selected, common
ropes targets, while German (http://www.bund. solutions and standards for ICT projects in Ger-
de), French (www.service-public.fr) and Italian man Administration. Furthermore, the framework
(http://www.italia.gov.it) plans follow. European presents different perspectives that the ICT archi-
one-stop e-Government portals provide similar tecture designers in public Administration must
procedures to those of FirstGov for the execution follow for e-Government projects.
of public services. The Federal Government of Canada designed
The UKs strategic plan runs under the man- its Government on-Line (GOL) e-Government
agement of the Office of the e-Envoy. Two am- Strategic plan in 1999 (Treasury Board Secre-
bitious programs, UK Online and UK Gateway, tariat, Government of Canada, 2001), aiming at
rooted in the highest level of government. UK the availability of all digital public services by
Online developed the current DirectGov portal 2004. The Canadian strategic plan also aimed at
(http://www.direct.gov.uk), from where public a) spreading Internet use and b) public informa-
services are offered centrally, while the Govern- tion offering via citizen-centered methods. In
ment Gateway (http://www.gateway.gov.uk) is a January 2001 both targets were initially achieved
centrally financed infrastructure solution that and the central e-Government portal was online

397
Collaborative Enterprise Architecture for Municipal Environments

(www.canada.gc.ca) (Treasury Board Secretariat, produced during public transactions. They


Government of Canada, 2001), where more than transact with legacy systems already in-
450 unique public Websites are interconnected. stalled in the Public Administration via Web
Government on-Line targets include the improve- service architecture.
ment of public transactions (accessibility, quality d. Authentication systems and security options,
and response), social participation, transparency which provide security and privacy during
in public transactions, improvement of internal transactions, and offer different levels of
public procedures and efficiency in public Ad- authentication.
ministration. The Government on-Line strategy e. Interoperability framework based on XML
has evolved the Service Oriented Architecture descriptions, are followed for the Web
(SOA) Strategy (Treasury Board Secretariat, service transactions between the central
Government of Canada, 2006). Service orienta- information system and legacy systems.
tion is defined as the planning and delivery of f. Content Management Systems that ad-
all services by formally componentizing each of minister public information and software
the services and their subordinate services such engines that execute different steps of the
that the overall collection of services work as a public services. The engines transact with
whole and supports a high level master-plan. multiple modules of the central Information
The Canadian SOA can be regarded as its EA System and with legacy systems via Web
since it contains the vision, the rules and the services.
methods for e-Government to be complied with g. A government portal operates as the access
by all public agencies. point and the interface between citizens and
public authorities. It uses multiple com-
A Common Architecture for munication channels such as the Internet,
E-Government Models 3rd generation mobile networks and voice
communication.
The e-Government strategic plans presented
previously culminate in central information sys- The common procedure of a service execution
tems and one-stop portals to offer digital public consists of the following steps (Figure 2):
services. Central systems and portals are based on
multi-tier e-Government solutions, which contain i. Citizen visits a one-stop e-Government
the following entities (Figure 1): portal and selects among the public services
offered online, presented in a UDDI cata-
a. An RDBMS operating as a repository for logue.
digital public service descriptions. It can ii. Citizen is redirected to an authentication
store XML documents (Wesley, Addison, environment where he is authenticated ac-
2003) describing the execution procedure cording to simple logon methods or Public
of all available digital public services. Key Infrastructure (PKI) credentials.
b. An optional RDBMS for the legislative rules iii. When the citizen is authenticated, he is
applied in public services contains the legal directed to the back-office where the public
framework in LegalXML or LexML format service can be executed.
and is available to all software modules of iv. An on-line application form that the citi-
the system. zen must fill in is presented, and he either
c. Databases with public information (digi- downloads it and follows traditional methods
tal records and documents), uploaded or for public transactions or submits it to the
back-office.

398
Collaborative Enterprise Architecture for Municipal Environments

Table 2. Major key-findings from investigated case studies

399
Collaborative Enterprise Architecture for Municipal Environments

Figure 1. A logical view of a common central e-Government system. Arrows show possible paths chosen
by citizens to access public information or services. Workflow systems in the back-office offer content
management and service execution options

v. The application is directed to the proper b. The re-designation and simplification of


Agency, where a workflow system, matched many public services so that they fit into
to the Weberian hierarchical architecture specific workflow schemas and can be trans-
(Tat-Kei Ho, 2002), is installed. The work- formed into fully automated digital services.
flow system receives the application form In Europe it is estimated that only 45% of
and public executives handle the occasion. the total public services (Cap Gemini, Ernst
vi. Software modules such as those presented & Young, 2003) can become fully digital,
previously verify submitted data to records due to the fact that most public services are
in the existing back-office databases or in composite and customized.
legacy systems distributed in the public c. The legislation of the proper framework
Administration, and execute different steps covering digital transactions.
of the service. d. The re-organization and transformation of
public Agencies to transact with the back-
The major problems and social issues that the office environment.
implementation and installation of such an e-Gov- e. The training of both citizens and public
ernment system faces are presented below: executives in basic IT skills.
f. The minimization of telecommunication
a. The definition of XML schemas to describe costs for citizens and enterprises. In Europe,
public services and data produced and ex- broadband services are still very expensive
changed. for single users and thus hinder the diffusion
of e-Government.

400
Collaborative Enterprise Architecture for Municipal Environments

Figure 2. The common procedure of service execution

Public Agencies can select between workflow (CIO, 1999) and by (Sowa) and consists of the fol-
or service execution environments to cover their lowing architecture layers placed in the columns
needs. On the other hand, they have to deal with of (Table 3):
all e-Government aspects in order to develop the
proper digital environment. a. The organization architecture, dealing with
the organizations physiognomy and vision,
The Collaborative Enterprise and national EA.
Architecture b. The collaborating architecture that refers
to the cooperating schema of the involved
The bottom-up strategic planning, where participants in the strategic planning and
representatives of e-Government target groups implementation phases. The cooperating
participate in the design and implementation schema contains descriptions about the
procedures, suggests the Collaborative Enterprise collaborating procedure in different stages
Architecture (CEA) notion. The Collaboration (UML rules, connections and data flow),
Enterprise Architecture (CEA) is an information together with groupware systems that es-
plan whereby the strategic e-Government mission tablish the participation.
and the information needed for the missions c. The technical architecture, which contains
performance are defined with the contribution of the technical standards for the development
representatives of all the target groups and they and interoperability of the architectures
meet end-users needs. The enterprise lifecycle subsystems.
is executed with the collaboration of the working d. The data architecture describing physical
group, the involved social parties and experts storages and repositories, file and records
invited from the private and academic sectors. structure, semantics for information ex-
The evaluation of the architectures progress is change, copyright and securing options.
based on end-user satisfaction and acceptance. e. The accessibility architecture that describes
The implementation methodology is described the efficiency of the architecture, since its
in the following subsection and suggests the En- vision and implementation are being evalu-
terprise Lifecycle of the CEA. CEA was inspired ated by members of their target groups.
by the US Federal Enterprise Architecture (FEA)

401
Collaborative Enterprise Architecture for Municipal Environments

Table 3. The collaborative enterprise architecture

Applying CEA in Local where the municipality decided to approach the


Administrations Cases Information Society. The implementation model is
presented in the form of a guide and it is extracted
The significance of the Collaborative Enterprise from the bottom up procedure (Anthopoulos et.
Architecture (CEA) can be extracted from cases al, 2007). The implementation model consists of
where a local Administration or an individual some primary perspectives, which are placed in
public Authority wishes to enter e-Government the rows of (Table 3) and which were considered
Era. In such cases the local Administration or in the e-Trikala case. These perspectives are
public Authority must address certain critical not strict and can be differentiated according to
issues that accompany its transformation: a) it custom conditions.
must conform to the national EA and b) it must
investigate local or individual needs. This section A. Authoritys Perspective: Setting up
is a common implementation model for individual the Working Group
or local Authorities and is a conclusion drawn
from the case study of the Digital City of Trikala, The heads of Agencies or the Municipal Council
are the leaders of the Authority that wishes to

402
Collaborative Enterprise Architecture for Municipal Environments

enter the e-Government era. Agency heads and Local needs arise from procedures occurring
politicians are probably not aware of ICT in de- in the Agency or in the City, together with local
tail, but they can understand local and individual conditions (social, economic and demographic
needs, they can diffuse their decisions to the local characteristics, geographical and urban param-
environments, and they must keep a leading eters, cultural and educational networks, trans-
role in the initiative. Heads of agencies need to portation and telecommunication infrastructures,
invite highly-skilled ICT seniors (academics or etc.). Local needs set the priorities for digital public
staff from the private sector) to cooperate with services and e-Government. Their investigation is
representatives from the Agency or from the local based on the contribution of the group members,
societys organized groups. All participants will while social participation may be requested via
comprise the working group for e-Government open dialogue. In e-Trikala the investigation of
transformation. The group will work on political local needs defined the axes of precedence for
targets, exchange ideas, extract local needs, find e-Government: a) Economy and employment,
e-Government solutions for them conforming to b) Improvement of everyday life, c) Educa-
EA architecture, implement these solutions and tion, professional training, life-long learning, and
close the digital divide in the local environment. d) Tourism and culture. All public services that
The whole process will deliver a business plan were implemented according to the above axes
for e-Government. In the case of e-Trikala, the of precedence exceed Administrating activities
working group was structured with representa- and municipal authorities. However, the digital
tives from the Municipality, Academics, people city is a global e-Government environment where
from the private sector and representatives from multiple digital environments are combined for
the organized social groups of the city of Trikala: the improvement of the local communitys life.
educational society (students, teachers and par-
ents), teams working on cultural aspects (cultural C. Financial Perspective: Secure
organizations and local museums), media (local Funding, Re-Use Infrastructures,
newspapers and radio stations), teams of elderly Encourage Private Investments and
citizens and citizens with disabilities and from the Minimize Maintenance Expenses
local market (local chamber of trade, groups of
enterprises involved in local tourism and local E-Government planning demands funding for
production). the implementation and maintenance of infor-
mation systems, software and digital service
B. Business Perspective: Discover the development, diffusion and training activities,
Individual Background and for telecommunication services. The finan-
cial perspective requires the examination of all
The first thing the working group must do is to existing ICT infrastructures and the necessary
define its resources (ICT, human resources who interoperability or updating costs. In the case of
will use e-Government tools), its individual e-Trikala funding was secured by the national
environment (the geographical field of action Information Society Framework Program, from
and the target-groups) and local needs. In the European Framework Programs and from na-
case of e-Trikala, the resources deal with ICT tional resources. The working group also encour-
infrastructures in the town hall and municipal aged ICT companies to offer volunteer support
agencies, and ICT-skilled municipal executives, with pilot projects, testing their technologies and
public buildings, telecommunication vendors and products in Trikala city. Interoperability between
connections over the city. new, legacy and third-party infrastructures was

403
Collaborative Enterprise Architecture for Municipal Environments

built to comply with the national interoperabil- and worst practices from all over Europe using
ity framework. The maintenance of the Digital Eurostat (http://epp.eurostat.ec.europa.eu) and Eu-
City infrastructures and services will be based robarometer (http://ec.europa.eu/public_opinion)
on payment policies over operators and digital services, in order to strengthen competitiveness
public services. and prevent further failures in Europe. Individual
and municipal Agencies can make use of the
D. Political Perspective: Comply with results extracted from e-Government case stud-
National EA ies: they can learn from both success and failure,
via understanding the conditions and the factors
EA is a tool that can succeed in e-Government that influenced results. In the e-Trikala project,
initiatives with common standards and interop- the experiences from the major strategic plans
erable features. However national EA contains presented above were combined with digital city
priorities that are formulated according to a cases. National strategic plans contributed with
political and economic background. All unique their visions and their Enterprise Architectures.
projects designed for e-Government must comply Digital city case studies were used for the evalu-
with the national EA mission and principles, and ation of their different technological models and
must comprise an architecture that will also follow for their different physiognomies. The result
EAs technological standards. Local administra- extracted by this combination is a novel Digital
tors can define their primary targets, but they City model, which is a metropolitan e-Govern-
have to formulate them in a manner compatible ment environment, where non-profit, social and
with the national mission. In the e-Trikala case, administrative public services are offered to
local needs were defined and assigned to axes of citizens (Anthopoulos and Manos, 2005).
precedence that comply with the Greek strategy.
The Greek Information Society strategy conforms G. Technical Perspective: Use
to the European strategy and to the principles Common E-government Architectures
that are set by the European Council and by and Standards to Cover Individual
the European Information Society Framework Needs
Programme. Moreover, the Greek strategy has
succeeded in the development of the broadband The implementation of the local e-Government en-
Network Syzefxis (www.syzefxis.gov.gr), which vironment requires common ICT infrastructures
connects all public agencies; the Greek strategy for the information system, the content manage-
has also legalized the Citizen Service Offices ment system and the service execution modules.
Information System (www.kep.gov.gr), with which Common tools and procedures were described
all e-Government initiatives must conform and previously. The local Agency has to opt for the
interoperate. E-Trikala Digital City EA contains optimal software, hardware and service solutions,
interfaces that interoperate with both of the above according to common national and international
public infrastructures. standards. The local e-Government environment
will interoperate with legacy and external envi-
F. Implementation Perspective: Make ronments, in order to transact data and forward
Use of Experience from International service requests. In e-Trikala the Digital City is
Case Studies based on an n-tier architecture, whose levels
are compatible with national and international
Excellence is the key to encouraging progress. e-Government standards. The whole architecture
The European Commission identifies both best is modular (Anthopoulos and Tsoukalas, 2005)

404
Collaborative Enterprise Architecture for Municipal Environments

and consists of sub-systems, which also follow K. Administrative Perspective:


the same architecture. Define the Operational Procedures and
Rules; Diffuse the Results in the Target
I. Project Managers Perspective: Groups
Project Life-Cycle (Design and Imple-
ment Projects, Evaluate and Improve Local Authority has to define the operational
the Resulting System) plan and the terms of use of the e-Government
environment. The operational plan deals with
Unique projects must be designed to cover spe- the organizational structure that will administer
cial needs. All projects must comply with the the e-Government system: the layers of access,
global Architecture and with national EA. The the roles and the rules of involvement for differ-
implementation procedure must be administered ent kinds of users, administrative procedures,
by groups of experts with specialized knowledge crisis management models, disaster recovery
of the projects physiognomies. Implementation plans, etc. Moreover, the operational plan sets
procedures can be based on common standards the limits, defines criminal activities in the e-
(such as PRINCE method), and assign tools for Government environment and presents methods
supervision, risk management and evaluation of reaction against different kinds of violation.
criteria. Specific deliverables must be expected Finally, different scenarios for communicating the
in different phases of the projects, and must be e-Government environment to the target groups
evaluated and redesigned by demand. In e-Trikala, are contained. In the e-Trikala case, although the
a number of unique projects aimed to cover lo- Digital Citys system is central, its sub-systems
cal needs: a) e-Government information system are distributed and they operate under the re-
designed to offer services to citizens all over the sponsible municipal Authorities. The technical
province. b) smart transportation system designed administration and the monitoring of the whole
to support and improve local mass transport system are assigned to a specific municipal
means. c) e-voting and decision-making tools Agency. This Agency holds different plans for
were designed to encourage social participa- managing, monitoring, securing, recovering and
tion. d) tele-care system designed to support the extending the system. The legal framework of the
elderly and citizens with disabilities. e) wireless Digital City environment complies with the Greek
hotspots and metro-wifi free for use by the citizens and the European frameworks, and is applied by
were designed and installed to close the digital national and municipal authorities. The diffusion
divide. e) All above sub-systems were installed of the Digital City principles and benefits was
in public buildings, centrally operated and inter- supported by the bottom-up strategic planning
connected via a broadband fiber-optic network because social representatives participated in the
and mesh networks. The logical architectures of implementation progress and they delivered their
all sub-systems shared the same logical layers, feedback to their groups of citizens. Furthermore,
which were also those of the Digital Citys logical technical events and schools have been organized
architecture. Their implementation was admin- by the Municipal authorities in order to spread
istered by specialists invited from the private technical knowledge to young members of the
and academic sectors who evaluated the quality local community.
of project deliverables by measuring end-user
satisfaction and acceptance.

405
Collaborative Enterprise Architecture for Municipal Environments

CONCLUSION satisfaction growth stalls. March 15, 2005. Re-


trieved May 25th, 2006, from
In this chapter we introduced the notion of the
http://www.customerservice.gov/historical_com-
Collaborative Enterprise Architecture (CEA) as
mentaries/e-gov_comm_0305.pdf.
an EA that can support individual Agencies and
municipal or state Governments who wish to Anthopoulos L., Siozos P., & Tsoukalas I. A.
enter the e-Government Era. The CEA was ap- (2007) Applying Participatory Design and Col-
plied in the case of the Digital City of Trikala and laboration in Digital Public Services for discov-
it is modeled to support similar cases. The CEA ering and re-designing e-Government services.
resulted from the investigation of some major Government Information Quarterly, Volume 24,
e-Government strategies, it considers common Issue 2, April 2007, Pages 353-376, ElSevier.
information system architecture and service
Anthopoulos, L., & Tsoukalas, I.A. (2005) The
processes, it incorporates participating methods
implementation model of a Digital City. The case
and groupware tools, and it is accompanied by
study of the first Digital City in Greece: e-Trikala.
a step-by-step implementation model for e-Gov-
Journal of e-Government, Vol.2, Issue 2, 2005.
ernment initiatives. Moreover, the CEA suggests
Haworth Press, Inc., University of Southern Cali-
some primary principles that are common for
fornia, Center for Digital Government.
all small-area e-Government projects that were
verified in the e-Trikala case study. The CEA will Anthopoulos, L., & Manos A. (2005) e-Govern-
also be tested in a Digital Geography case study ment beyond e-administration. The evolution of
in central Greece through 2013, where various municipal area environments could establish a
Digital Cities will comprise a common e-Govern- digital framework of confidence for citizens. In
ment environment. the 5th European Conference on e-Government,
(ECEG 2005) University of Antwerp, Belgium,
16-17 June 2005.
REFERENCES
Cap Gemini Ernst & Young (2003) Online avail-
ability of public services. How is Europe progress-
Accenture (2005) Leadership in Customer Ser-
ing? Information Society DG, 2003.
vice: New Expectations, New Experiences. The
Government Executive Series, Accenture, April Chief Information Officer (CIO) Council (1999)
2005. Retrieved May 25th, 2006, from http://www. Federal Enterprise Architecture Framework.
accenture.com/NR/rdonlyres/F45CE4C8-9330- Retrieved May 25th, 2006, from http://www.cio.
4450-BB4A-AF4E265C88D4/0/leadership_cust. gov/Documents/fedarch1.pdf
pdf) .
Chief Information Officer (CIO) Council (2001)
Adigun M. O., & Biyela D. P. (2003) Modelling A Practical Guide to Federal Enterprise Archi-
and Enterprise for re-Engineering: A Case Study. tecture, version 1.0, February 2001. Retrieved
In the 2003 annual research conference of the May 25th, 2006, from http://www.gao.gov/best-
South African institute of computer scientists and practices/bpeaguide.pdf
information technologists on Enablement through
Devadoss, P., Pan, S., & Huang, J. (2002) Struc-
technology (SAICSIT 2003), ACM.
turational analysis of e-Government initiatives:
American Customer Satisfaction Index (ACSI), a case study of SCO. Decision Support Systems,
e-Government Satisfaction Index (2005) Number vol. 34, p. 253-269, ElSevier.
of e-GOV sites measuring satisfaction surges,

406
Collaborative Enterprise Architecture for Municipal Environments

DG The Information Society (2004) User Satisfac- Ishida, T. (2002). Digital City Kyoto. Communica-
tion and Usage Survey of eGovernment services. tions of the ACM, July 2002, vol.45, No.7.
Retrieved August 15th, 2007, from
KBSt Publication Series (2003) SAGA: Standards
http://europa.eu.int/information_society/ac- and Architectures for e-government Applications,
tivities/egovernment_research/doc/top_of_the_ Version 2.0. Retrieved August 15th, 2007, from
Web_report_2004.pdf) http://egovstandards.gov.in/egs/eswg5/ enter-
prise-architecture-working-group-folder/stand-
eGov Consortium (2002) IST Project 2000
ards-and-architectures-v2.pdf/ download
28471. An Integrated Platform for Realising
One-Stop Government. D121Services and Lawry, P., Albrecht, C., Nunamaker, J., & Lee,
process models functional specifications, 2002. J. (2002) Evolutionary development and research
Retrieved August 15th, 2007, from http://www. on Internet-based collaborative writing tools and
egov-project.org/egovsite/eGOV_D121.zip. processes to enhance eWriting in an eGovernment
setting. Decision Support Systems, vol. 34, (2002),
European Commission (2002) eEurope 2005: An
229-252, ElSevier.
information society for all. European Commission
- COM 263, 2002. Retrieved August 15th, 2007, Organisation for Economic Co-operation and
from http://europa.eu.int/eeurope Development (OECD) (2001) The Hidden Threat
to E-Government: Avoiding large government
Federal Enterprise Architecture (FEA) Working
IT failures (Policy brief). Retrieved August
Group (2002) E-Gov Enterprise Architecture
15th, 2007, from http://www.oecd.org/datao-
Guidance Common Reference model. (July
ecd/19/12/1901677.pdf
25, 2002). Retrieved August 15th, 2007, from
http://www.feapmo.gov/resources/E-Gov_Guid- Pavlichev, A., & Garson, G. D. (2004) Digital Gov-
ance_Final_Draft_v2.0.pdf ernment Principles and Best Practices, Chapter
1 (The promise of Digital Government), page
Federal Enterprise Architecture (FEA) Working
2, IDEA Group Publishing.
Group (2005) Enabling Citizen-Centered Elec-
tronic Government. 2005-2006 FEA-PMO Action Peristeras V., & Tarabanis K. (2004). Governance
Plan. Retrieved August 15th, 2007, from www. Enterprise Architecture (GEA): Domain models
whitehouse.gov/omb/egov/documents/2005_ for e-Governance. In the 6th international confer-
FEA_PMO_Action_Plan_FINAL.pdf ence on Electronic commerce (ICEC), ACM.
Gant, J., & Gant, D. (2002) Web portal function- Powel, A., & Picolli, G. (2004) Virtual Teams: A
ality and State Government E-service. In the Review of Current Literature and Directions for
proceedings of the 35th Hawaii international Future Research. The DATA BASE for advances
conference on system sciences (IEEE 2002). in Information Systems-Winter 2004, vol 35,
No.1. ACM.
German Federal Government (2003). BundOnline
2005. 2003 Implementation Plan. Retrieved May Reding, V. (2005) i2010: The European Commis-
25th, 2005, from http://www.bunde.de sions new programme to boost competitiveness
in the ICT sector. European Committees press
Godart, C. Saliou H., & Bignon, J.C. (2001) Asyn-
releases. Retrieved August 15th, 2007, from
chronous Coordination of Virtual Teams in Crea-
http://europa.eu.int/rapid/pressReleasesAction.
tive Applications (co-design or co-engineering):
do?reference=SPEECH/05/format=HTML&age
Requirements and Design Criteria. IEEE.
d=0&language=EN&guiLanguage=en)

407
Collaborative Enterprise Architecture for Municipal Environments

Sairamesh, J., Lee, A., & Anania, L. (2004). Part two: Technical Policies and Specifications.
Information Cities. Communications of the ACM Retrieved August 15th, 2007, from http://www.
February 2004, vol. 47, No.2. govtalk.gov.uk/documents/e-GIF4Pt2_2002-
04-25.pdf
Schubert, P., & Hausler, U. (2001) e-Government
meets e-Business: A Portal Site for Startup Com- UK Chief Information Officers Council (UK CIO)
panies in Switzerland. In the 34th International (2005) Enterprise Architecture for UK Govern-
Conference on System Sciences (IEEE 2001) ment. An overview of the process and deliverables
for Release 1. Retrieved August 15th, 2007, from
Sowa, F. J. (2000) Levels of Representation.
http://www.cio.gov.uk/documents/cto/pdf/enter-
Knowledge Representation. Logical, philosophi-
prise_architecture_uk.pdf
cal and computational foundations (pp. 188-189).
Brooks/Cole Thomson Learning. US Federal Government (2002) e-Government
Strategy: Simplified Delivery of Services to
Sproull, L. & Patterson, J., (2004). Making In-
Citizens. Executive Office of the President, Of-
formation Cities Livable. Communications of the
fice of Management and Budget, US Federal
ACM February 2004, vol. 49, No.2.
Government February 2002. Retrieved May
Tat-Kei Ho, A. (2002). Reinventing Local Gov- 25th, 2006, from http://www.firstgov.gov/Topics/
ernments and e-Government Initiative. Public Includes/Reference/egov_strategy.pdf
Administration Review, July/August 2002, Vol.
Wesley, Addison (2003). XML Data Management.
62, No. 4., Blackwell Synergy.
Native XML and XML-enabled Database Systems.
Treasury Board Secretariat, Government of Pearson Education Inc., Boston,U.S.A.
Canada (2001). Canadas Report on Portals,
Widmayer, P. (1999). Building Digital Metropo-
August 10, 2001.
lis: Chicagos Future Networks. IT Professional
Treasury Board Secretariat, Government of Volume 1, Issue 4, July-Aug. 1999, p. 40 46.
Canada (2006). Service Oriented Architecture IEEE.
Strategy. Retrieved May 25th, 2006, from http://
Wimmer, M., & Traunmuller, R. (2000) Trends
www.tbs-sct.gc.ca/cio-dpi/Webapps/architecture/
in Electronic Government: Managing Distributed
sd-eo/sd-eo_e.pdf)
Knowledge. In the 11th International Workshop
UK Cabinet Office (2000). e-Government, a on Database and Expert Systems Applications
strategic framework for public services in the in- (IEEE, DEXA00)
formation age. Retrieved May 25th, 2006, from
Zachman, J. A. (1987) A Framework for Informa-
http://archive.cabinetoffice.gov.uk/e-envoy/re- tion Systems Architecture. IBM Systems Journal,
sources-pdfs/$file/Strategy.pdf vol. 26, No. 3, 1987 (available at http://www.re-
search.ibm.com/journal/sj/263/ibmsj2603E.pdf)
UK Cabinet Office, Office of the e-Envoy (2002) e-
Government Interoperability Framework (e-GIF).

408
409

Chapter XVIII
Government Enterprise
Architectures:
Enabling the Alignment of Business
Processes and Information Systems

Nigel Martin
The Australian National University, Australia

ShirleyGregor
The Australian National University, Australia

Dennis Hart
The Australian National University, Australia

Abstract

This chapter describes the development and use of government enterprise architectures for the framing
and alignment of the core business processes and enabling information systems at the Australian Bureau
of Statistics (ABS) and the Centrelink Social Services agency. The chapter focuses on the construc-
tion and ongoing maintenance of public enterprise architectures that enable the alignment condition.
An established research model has been used to guide the analysis and explication of the government
business processes, enabling systems and architectures, and the resulting agency alignment. While the
discussion acknowledges the existence of other formal and informal enablers of alignment (such as
strategic planning or management support), this chapter concentrates on the enterprise architecture
enabler. The functionally integrated government business processes and information systems that are
established within the instantiated enterprise architecture are examined. The agencies performance
data reflects two public organizations that are closely aligned and have achieved upper benchmarked
outcomes and recognition awards. The agencies business processes and architectural practices conform
to established theoretical frameworks.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Government Enterprise Architectures

INTRODUCTION 6.5 million customers, processing over 5 billion


electronic transactions each year, and operating
Since 1985 the Australian federal government with an annual budget that exceeds A$63 billion
has been directing public agencies to ensure that (Commonwealth of Australia, 2006b; Martin
the business processes associated with service & Gregor, 2006). Given the inherent portfolio
delivery are closely aligned and integrated with the resource constraints, both agencies are focused
enabling information systems and infrastructure. on delivering their products and services in the
The introduction of Program Management and most efficient and effective manner. The PMB
Budgeting (PMB) called for federal government and Outcomes-Outputs frameworks has forced
organizations to align resource inputs, systems the two agencies to examine the resources at their
and processes with output results and performance disposal, and how best to align and integrate those
in a framework designed to drive accountability, resources to meet their performance outcomes.
efficiency and effectiveness (Commonwealth of The aim of this chapter is to examine and
Australia, 1997). The PMB initiative represents analyze the agencies enterprise architecture
the governments first attempt to draw together activities in order to develop an understanding of
underlying government business processes with how the architecture can enable the alignment of
the supporting information systems in a coherent the business processes and information systems.
and performance enhancing fashion. The ABS and Centrelink case organizations
In 1997 the Australian government further de- were selected for their exemplary public sector
veloped these accountability and efficiency driven architectural practices, and continuing record
arrangements, and installed a new Outcomes-Out- of business and technical systems integration in
puts framework in 1999-2000 (Commonwealth of the pursuit of quality public products and ser-
Australia, 2007b). The framework was intended vices delivery. Both organizations use a highly
to bring a sharper focus to the use of government centralized architectural approach that supports
resources, and the associated output of products the creation of integrated business and techni-
and services. Importantly, public agencies were cally oriented artifacts (eg, business processes,
requested to identify the assets and resources technical systems infrastructure, and applications
under their control, and the specific service and architectures). However, as a point of difference,
product outputs that they would produce. This the two agencies use different architectural
requirement formed part of the organizational frameworks and methods for the development
regime that supported the linkage between agency of their respective enterprise architectures (ie, an
resources and performance, management of internally developed ABS architecture method
growing complexities, and the movement of vast and the Zachman architecture framework for
information and data stores. Centrelink). The research presented in this chapter
These public efficiency initiatives had a pro- adopts the internationally accepted definition of
found impact on agencies, such as the Australian architecture as a description (model) of the basic
Bureau of Statistics (ABS) and Centrelink, which arrangement and connectivity of parts of a system
provide core government outputs of public ser- (either a physical or a conceptual object or entity)
vices and products. The ABS is Australias official (International Standards Organization, 2000).
statistical organization that provides over 600 The agencies data and experiences presented
different information products and services that in this chapter were gathered as part of a larger doc-
assist and promote informed decision-making, toral study on the use of enterprise architectures
research and discussion. Centrelink is Australias in government organizations (Martin, 2005). The
primary social services agency, serving over study used a qualitative research method which

410
Government Enterprise Architectures

included discovery and analysis of architectural critical alignment, architecture, and business
documents and designs, semi-structured and process concepts are the subject of detailed dis-
unstructured interviews with agencies execu- cussions in the following sections.
tives and staff, studies of organizational public
announcements and executive presentations, and Strategic Alignment
participation in agencies system and technology
demonstrations. The research data includes the The organizational alignment construct has its
agencies enterprise architecture structures and roots in strategic management literature dating
components, and the business process and infor- back to the mid 1950s (Drucker, 1954, 1980;
mation systems alignment analysis. Porter, 1980, 1981, 1991). In his seminal work in
While this first section has provided a brief the management discipline, Porter (1980, 1981)
introduction, the balance of the chapter is orga- termed the condition of internal and external
nized as follows. In the second section, the theo- compatibility as strategic fit (sometimes also
retical foundations for the chapter in the areas of known as organizational fit). Porter (1991) also
strategic alignment, enterprise architecture, and identified an important condition for business suc-
government business processes are established. cess and leading corporate performance stating
In the third section, a model of business process that an organizations internally consistent set
and information systems alignment is introduced of goals and policies aligns the firms strengths
and discussed in some detail. In the fourth section, and weaknesses with the external opportunities
the agencies enterprise architecture data and col- and threats (p. 99). Accordingly, Porters con-
lection methods is presented. In the fifth section, cept of strategic fit was an early and important
the two agency case sites are discussed, including component of the alignment construct.
the enterprise architecture implementations (eg, Following the work of management strate-
frameworks, methods, governance arrangements, gists, such as Drucker and Porter, Earl (1989)
and resultant architectures). In the sixth section, the applied some of these strategic management
analysis of the alignment of government business principles to the information technology func-
processes and information systems is presented, tion, establishing a theory concept that links
including critical examples from the two cases. and integrates the organizations information
In the final section, the chapter concludes with a technology strategy and infrastructure with
summary of the agency enterprise architectures business objectives. Importantly, this alignment
and their capacity for enabling business process and integration was considered to be enabled by
and information systems alignment, including the formal organizational processes and mechanisms
value of the architecture in the alignment dynamic and more social people-based interactions, con-
and the importance of establishing foundation sistent with other established strategic planning
business processes. principles (Horovitz, 1984). As a further advance
in the alignment theory set, Henderson and Ven-
katraman (1993) developed a Strategic Alignment
BACKGROUND Model (SAM) that aligned and integrated business
strategy, organizational infrastructure, informa-
The theoretical foundations of this chapter draw tion systems strategy, and information systems
together several important concepts. The theory infrastructure (see Figure 1).
related to strategic alignment, enterprise architec- The SAM aligns the externally and internally
ture, and government business processes provides focused components of the enterprise (termed
the underlying background for the chapter. These strategic fit), while also integrating the business

411
Government Enterprise Architectures

Figure 1. Strategic alignment model (Source: Henderson & Venkatraman, 1993)

E xte rn a l B u sin e ss IS
F o cu s S tra te g y S tra te g y

Strategic
Fit

In te rn al O rg a niza tio nal IS


F o cu s In fra stru ctu re In fra stru ctu re

B u sin e ss D o m a in IS D o m a in

Functional
integration

and information systems domains (termed func- Solomon, Raymond & Bergeron, 2001; Reich &
tional integration). The model also represents Benbasat, 1996, 2000; Sabherwal & Chan, 2001).
four view points of alignment where the business Various studies have investigated the strategic fit
strategy shapes the organizational and informa- and functional integration aspects of alignment
tion system infrastructures design (strategy with a view to determining whether improved
execution view); the business strategy shapes the alignment conditions can ultimately lead to in-
information systems strategy and infrastructure creases in corporate and business performance
design (technology transformation view); the (Chan, Huff, Copeland & Barclay, 1997; Croteau,
information systems strategy shapes the business Solomon, Raymond & Bergeron, 2001). In gen-
strategy and organizational infrastructure design eral, the findings of alignment research suggest
(competitive potential view); and, the information that closer alignment and integration results in
systems strategy shapes the information system stronger organizational business performance,
and organizational infrastructures design (service a seemingly desirable outcome for any public or
level view). Each of the four views depicts how private organization (Chan, Huff, Copeland &
a selected SAM component can be used as an Barclay, 1997; Croteau, Solomon, Raymond &
anchor for shaping the alignment and integration Bergeron, 2001; Sabherwal & Chan, 2001). These
conditions of the complete organization. research outcomes, and the expansion of our
In this chapter, we will be primarily concerned understanding of the alignment construct, serve
with the functional integration dimension of align- as a firm basis for the examination of business
ment, where the business process segment of the process and information systems alignment as
organizational infrastructure is aligned with the a means of improving public agency efficiency
information systems infrastructure. The selection and performance.
of the SAM for use in the scoping of this chapter
is based on its high level of theoretical utility, and Enterprise Architecture
its extensive use in other information systems
and technology research studies (Chan, 2002; Some of the earliest literature in the Enterprise
Chan, Huff, Copeland & Barclay, 1997; Croteau, Architecture discipline was published during

412
Government Enterprise Architectures

Figure 1. Zachman enterprise architecture framework (Source: Sowa & Zachman, 1992)
What How Where Who When Why
Layer
(Data) (Function) (Network) (People) (Time) (Motivation)
List of locations List of List of
Scope Context List of things List of processes List of events
in which organizations business
Boundary important to the business significant to
the business important to the goals/
(Planner) the business performs the business
operates business strategies
Business e.g., Semantic
Model or Entity- e.g., Business e.g., Business e.g., Work Flow e.g., Master e.g., Business
Concepts Relationship Process Model Logistics System Model Schedule Plan
(Owner) Model
System Model e.g., Distributed e.g., Human e.g.,
e.g., Logical e.g., Application e.g., Business
Logic System Interface Processing
Data Model Architecture Rule Model
(Designer) Architecture Architecture Structure
Technology
e.g., Physical e.g., System e.g., Technology e.g., Presentation e.g., Control e.g., Rule
Model Physics
Data Model Design Architecture Architecture Structure Design
(Builder)
Component
e.g., Data e.g., Network e.g., Security e.g., Timing e.g., Rule
Configuration e.g., Program
Definition Architecture Architecture Definition Specification
(Implementer)
Functioning
Enterprise e.g.,
e.g., Data e.g., Function e.g., Network e.g., Schedule e.g., Strategy
Instances Organization
(Worker)

the late 1980s and early 1990s, when informa- greater level of non-technical content for artifact
tion systems specialists commenced developing construction (Sowa & Zachman, 1992).
systematic taxonomies for categorizing real world Over time, other technical architecture spe-
objects, computers, and other information systems cialists and commercial information technology
entities (Sowa & Zachman, 1992; Zachman, 1987). organizations and vendors have contributed to
The original Zachman (1987) information systems our understanding of enterprise architectures,
architecture framework developed three domain concentrating their efforts in the areas of con-
views (ie, data, function, and network) across five trolled planning of technical architectures and
different perspectives (ie, scope, enterprise model, systems, technical systems analysis, business
system model, technology model, and compo- and technology architectures, and technology
nents). The framework columns depict different policy development (Gibson, 1994; Lloyd &
ways of representing real world entities (eg, in the Galambos, 1999; McDavid, 1999; Spewak & Hill,
network domain, an enterprise model might take 1993; Targowski, 1990; The Open Group, 2006).
the form of a sales network retail stores linked by This seemingly technology-focused approach
telephones). Importantly, the extended framework to architecture, while wholly consistent with
(see Figure 2) introduced additional formalisms, its technical origins, highlights an opportunity
including people (ie, organizational structure or to consider and examine architecture as a more
people-to-people relationships), time (ie, schedule holistic and integrated business and technical
or event-to-event relationships), and motivation systems artifact. If viewed in this way, architec-
(business motivation or ends-means-ends relation- ture offers organizations a useful and valuable
ships) domains or columns, thereby providing a mechanism for combining, closely aligning, and

413
Government Enterprise Architectures

functionally integrating their operating business harmonized through the use of the combined
and technology domains. whole-of-enterprise architecture.
Indeed, further contemporary research in What we can conclude from this evolving base
the area of organizational architectures shows a of literature is that the use of enterprise architec-
growing interest in the use of enterprise archi- tures for enabling business-technology alignment
tectures for combining business and technology and integration has taken on a growing importance
domains (Feurer, Chaharbaghi, Weber & War- in private and public organizational settings. It
gin, 2000; Gordon & Gordon, 2000; Murray & should be highlighted that while the business
Trefts, 2000). For example, Gordon and Gordon strategies, goals and processes portion of com-
(2000) examined the alignment and integration pany enterprise architectures may not necessarily
of strategic business and information technology be comparable to government architectures (ie,
units in eight large private organizations, and profit motivated strategies and processes versus
determined that internal and external business public service driven processes), the respective
factors can impact the information technology information technology and systems architecture
unit structures. This research also showed that components (such as the software, hardware, and
the information technology architecture directly IT infrastructure) may be similar in scope and
influences the whole technology domain and the scale (Martin, 2005).
connective relationships with the business units. Accordingly, architecture practitioners and
In a similar case study of the Hewlett Packard researchers in private and public sector orga-
(HP) organization, researchers examined how the nizations are providing a greater level of focus
company developed and implemented a business on the alignment dimension, while establishing
alignment framework that incorporated business the blueprints and theoretical frameworks for
processes, information, applications, data and combining the business and information systems
technology layers with a set of social organiza- domains. This chapter is directed at building
tional dimensions including culture, values and further knowledge and understanding of govern-
teams (Feurer, Chaharbaghi, Weber & Wargin, ment enterprise architecture implementations, and
2000). The researchers found that the HP business how these architectures might be used to align
alignment framework was created for aligning the and integrate business processes and information
business and information technology strategies systems in public organizations.
through mapping the core business processes and
information technology solutions so as to facilitate Government Business Processes
and enable visible company changes.
Other studies have examined the theoretical In the early 1990s, organizational business pro-
engagement of business and information technol- cesses emerged as a major issue of concern for
ogy in true corporate partnerships. Murray and executive and technical managers within private
Trefts (2000) developed a new managerial process and public organizations (Davenport & Short,
that combined the business and information tech- 1990; Hammer, 1990; Hammer & Champy, 1993;
nology architectures for the delivery of technol- Harrington, 1991). These concerns were based on
ogy projects, while aligning the organizations the assertion that some business processes and
business strategy and information technology intrinsic corporate activities were unplanned or
infrastructure. The study also asserted the im- under-designed in nature. Hammer (1990) typified
portance of ensuring that new business processes some of these concerns when he posited Why
and information systems are coordinated and did we design inefficient processes? In a way, we
didnt. Many of our procedures were not designed

414
Government Enterprise Architectures

at all; they just happened The hodgepodge of efficient business processes will likely involve the
special cases and quick fixes was passed from one synergistic use of information systems and tech-
generation of workers to the next (p.107). The nologies (Alavi & Yoo, 1995; Johnson, 1993; Leith,
widely adopted definition of business processes as 1994; Smith, 1994). Extant literature in the area
a set of logically related tasks that use the resources of organizational business processes asserts that
of an organization to achieve a defined business information systems combine with processes and
outcome further highlights the importance of task associated tasks in the enabling of performance
integration and resource planning (Davenport improvements (Gadd & Oakland, 1995; Hammer
& Short, 1990). As a consequence, some orga- & Champy, 1993). In a further supporting study,
nizations, such as the Ford Motor Company and McAdam and Donaghy (1999) found that the use
Xerox, engaged in large scale business process of information systems and technologies is one
re-engineering efforts (Davenport & Short, 1990; of the critical success factors related to organi-
Hammer, 1990). Hence, the Business Process zational process and performance improvement.
Re-engineering (BPR) discipline arose from the Second, more efficient government business pro-
need to make work processes more efficient and cesses should target performance improvement
organizationally integrated. from the customers perspective (Chang, 1994).
What this earlier business process work sug- Some researchers have suggested that Demings
gests for public sector agencies is a continual drive philosophy of continuous improvement can be
towards greater process and system alignment and readily applied to client services delivery in the
integration for the delivery of larger volume and public and private sectors (Deming, 1986; Para-
higher quality products and services. In support suraman, Zeithaml & Berry, 1985). The assertion
of this government direction, the Kettinger and is that enhanced process management practices
Grover (1995) business process change model should ultimately lead to customer-focused busi-
provides a comprehensive environmental schema ness process improvements and elevated corporate
that functionally aligns and integrates business performance. Some studies support this assertion
processes, information technology, people and and have found that the functional integration of
interpersonal aspects, management aspects, and information systems with organizational business
the organizational structure for the delivery of processes positively impact knowledge and data
products, services and corporate performance. sharing, expand corporate learning, and build
Under this model, the alignment of core informa- transparency and trust with clients (Grover, Teng
tion systems (and the associated technologies) & Fiedler, 1993; Johnston & Carrico, 1988). In
with business processes was considered to have a summary, government business processes read-
profound and lasting impact on the organizations ily combine with the organizations information
ability to deliver public products and services in a systems and technology resources in delivering
dynamic and more efficient manner. Interestingly, public products and services. The use of these
the inclusion of the people and interpersonal as- types of customer-facing business processes,
pects of process change underlines the importance which are closely aligned with synergistic infor-
of the interactions between the processes, systems, mation systems, forms part of the larger machinery
and socially based alignment mechanisms (Mar- of government that delivers these products and
tin, Gregor & Hart, 2005). services. Accordingly, these processes are wor-
In relation to government business operations thy of some further investigation and improved
there are possibly two further points that should be understanding, especially in the context of pro-
made. First, the implementation of new and more cess-system integration.

415
Government Enterprise Architectures

A MODEL OF BUSINESS PROCESS dependence on technical systems, corporate his-


AND INFORMATION SYSTEMS tory) interact and shape the context of the agency
ALIGNMENT environment and its process-system alignment.
The organizational alignment process is char-
The study of government enterprise architectures, acterized by the dynamic interaction of social
and their use as enablers of agency business (eg, managerial support, communications) and
processes and information systems alignment, formal (eg, enterprise architecture, governance
required the combination of the key concepts into processes) alignment mechanisms that result in
a suitably detailed research and analytical model. an interactive and continuous state of alignment,
The model was constructed to provide a foundation represented by the alignment outcomes segment
for the critical analysis of the case organizations, of the model.
enterprise architectures, and other high level In this form, the process model allows us to
alignment mechanisms, and was adapted from present four major research themes and associ-
the work of Reich and Benbasat (1996, 2000) (see ated questions for this chapter (Gregor, Hart &
Figure 3) (Gregor,, Hart & Martin, 2007; Martin, Martin, 2007; Martin, Gregor & Hart, 2005). First,
2005; Martin, Gregor & Hart, 2005; Reich & Does an enterprise architecture framework, either
Benbasat, 1996, 2000). internally developed or sourced commercially,
The illustrated model is a dynamic process influence the enabling of alignment? In the ABS
representation of alignment that flows from top case, the agency enterprise architecture method
to bottom, and includes interaction layers and was developed internally, while in the Centrelink
feedback channels between the components. The case, the agency used the Zachman framework.
enterprise conditions (eg, organizational structure, Second, Does the structure of an enterprise

Figure 3. Alignment research and analysis model (Source: Martin, 2005)


Enterprise Conditions (context)
(e g , o rga n ization a l s tru ctu re , d ep en de nce o n
te chn ica l syste m s, c o rp o rate h isto ry, g e og rap h ic
sp re ad o f o pe ra tio n s)

Interaction layer

Social Alignment Formal Alignment


Mechanisms Mechanisms O rg an iza tio na l
(e g , m a na ge m e nt su pp o rt, (e g , e nte rp rise a rch ite ctu re, A lig n m en t
staff co m m un icatio n, g o ve rn an ce p roce sse s, P ro ce ss
sh a red te chn ica l a nd n on - e xe cu tive m a na ge m en t
te chn ica l p lan n in g ) stru ctu re s, stra te g ic p lan )

Interaction layer

N o te : B lack
Alignment Outcomes a rro w s a re
(e g , p ro ce ss-syste m a lign m en ts, th ird -p a rty fe ed ba ck
re co gn ition , o uttu rn b u sine ss p e rfo rm a n ce ) ch an ne ls

416
Government Enterprise Architectures

architecture influence the degree of alignment in the agency structure (enterprise conditions
achieved? In this segment of the analysis we will or context), with structural changes having the
present the structures, components and charac- potential to modify levels of management sup-
teristics of the ABS and Centrelink architectures port or social communication (social alignment
and their relative influence on the alignment state. mechanisms). This is just one example of how
Third, Does the use of an enterprise architecture dynamic change can impact the overall alignment
combine with social mechanisms of alignment outcome (ie, less or more alignment).
in processes that enable alignment outcomes? In In studying government enterprise architec-
this segment of the analysis we will examine and tures, we acknowledge that some level of align-
present the combination of the agencies man- ment would likely exist prior to an architectural
agement support, business planning styles, and implementation. Specifically, other research and
business plan communications with the enterprise analytical studies support our analytical approach,
architecture mechanisms in processes enabling and have found that different types of social and
alignment. Finally, Does the use of an enterprise formal alignment mechanisms, such as executive
architecture combine with other formal alignment management support, collective planning styles,
mechanisms in processes that enable alignment? governance processes and strategic plans, can
This segment of our analysis will briefly examine work to enable an organizations alignment condi-
and present some of the combined relationships tion (Henderson & Sifonis, 1988; Pyburn, 1983;
and interactive processes of the formal alignment Raghunathan & Raghunathan, 1989; Venkatra-
mechanisms. In a holistic sense, the four research man, Henderson & Oldach, 1993). In the balance
themes provide an aggregated view of government of this chapter, we will practically demonstrate
agency alignment and the relative contribution of how public organizations enterprise architectures
the enterprise architecture as a formal alignment can combine with other alignment mechanisms to
mechanism. Later in the chapter, we will pres- functionally integrate and align business processes
ent a process-system alignment analysis, further and information systems.
supported by resultant business performance
data and third-party recognition of information
system enabled business delivery, to illustrate the ENTERPRISE ARCHITECTURE
potential alignment outcomes. DATA AND COLLECTION METHODS
The research and analysis model is consistent
and complementary with the Henderson and The case data presented in this chapter was ex-
Venkatraman (1993) SAM outlined earlier in the tracted from a larger doctoral study that investi-
chapter. Strategic alignment is considered to be gated the use of enterprise architectures in four
a dynamic and ubiquitous organizational state Australian government agencies, including the
(ie, alignment, change, re-alignment), where the ABS and the Centrelink social services agency
various segments of the model can be collec- (Gregor, Hart & Martin, 2007; Martin, 2005;
tively and interactively influenced (Henderson & Martin, Gregor & Hart, 2005) (The agency cor-
Venkatraman, 1993). The dynamism of agency porate data has been updated to take account of
alignment is represented by the feedback channels the 2005-2006 financial year performance). The
and posits that a change in any part of the model studys case organizations were selected from
may impact the alignment state, and the model as the Commonwealth Architecture Forum and the
a whole. As an example, a change in the agency Queensland Government Forum for Enterprise
enterprise architecture or strategic plan (formal Architecture Collaboration special interest groups
alignment mechanisms) can stimulate changes that were established to further architecture goals

417
Government Enterprise Architectures

and initiatives at the federal and state government representation and glossary) contained in the ISO
levels. The decision to present the ABS and Cen- 15704 standard (Industrial Automation Systems
trelink case material in this chapter was based on Requirements for Enterprise-Reference Archi-
the highly detailed agency enterprise architecture tecture and Methodologies) that was modified to
implementations, high visibility of social and suit government agencies (Gregor, Hart & Martin,
formal alignment mechanisms, and the capacity 2007; International Standards Organization, 2000;
to examine the alignment of government business Martin, 2005; Martin, Gregor & Hart, 2005). The
processes with corporate information systems. analysis for both agencies will be presented later
Proven multiple qualitative research methods in the chapter.
were adopted for case data collection (Burgelman, Also, seven executives and thirteen managers
1983, 1994). This approach allowed research from both agencies offered comments and views
data and information to be triangulated across during eighteen semi-structured interviews and
multiple sources. The two agencies provided fifteen follow-up discussions of up to one and
archival and publicly available documents (ie, a half hours in duration (Martin, 2005; Martin
audited parliamentary and agency papers) in & Gregor, 2005, 2006; Martin, Gregor & Hart,
the areas of governance, information systems, 2005). The theme based questions are attached
agency performance, enterprise architecture at Appendix A to the chapter. In accordance with
and business plans. Architectural documents the Miles and Huberman (1994) data processing
and drawings were analyzed by comparing the principles, the interview comments were recorded,
agencies architectural state with the requirements two pass coded, and stored on a purpose built
(ie, architecture coverage, concepts, components, database management system for use in the case

Table 2. Example case analysis codes (Source: Martin, 2005)

Code Code Definition


T1-CM-ZA Theme 1 Commercial Architecture Method Zachman architecture framework
T1-IM-AM Theme 1 Internally Developed Architecture Method ABS architecture framework
T2-CO-AC Theme 2 Architecture Completeness Architecture components
T2-CO-AP Theme 2 Architecture Completeness Applicability and Coverage of Enterprise Entity
T2-CO-EC types
T2-CO-GL Theme 2 Architecture Completeness Enterprise concepts
T2-CO-RP Theme 2 Architecture Completeness Architectural glossary
T2-CU-BF* Theme 2 Architecture Completeness Architectural representation (depiction)
T2-CU-CM* Theme 2 Current characteristic Business focused (driven) architecture
T2-CU-DD* Theme 2 Current characteristic Capability management enabling architecture
T2-CU-GM* Theme 2 Current characteristic Document management deficiencies in architecture
T2-CU-IS* Theme 2 Current characteristic Governance mechanism in architecture
T2-CU-RA* Theme 2 Current characteristic Information structuring architecture
T2-CU-TC* Theme 2 Current characteristic Reusable (component) architecture
Theme 2 Current characteristic Technology control architecture
T3-MS-HI Theme 3 Management Support High
T3-MS-MO Theme 3 Management Support Moderate
T3-MS-LO Theme 3 Management Support Low
T3-PS-NO Theme 3 Business Planning Style NO - Not present
T3-PS-YS Theme 3 Business Planning Style YES - Present
T4-AL-SP Theme 4 Existence of Organizational Alignment Supported
T4-AL-NU Theme 4 Existence of Organizational Alignment Neutral (No valence in either direction)
T4-AL-NS Theme 4 Existence of Organizational Alignment Not Supported

Note: Codes were replicated for non-current, or emerging, characteristics that were in development

418
Government Enterprise Architectures

analysis (Martin, 2005; Miles & Huberman, 1997). The Australian Bureau of Statistics
The codes were designed to classify, present and
publish commentaries by research theme and The ABS is a federal government agency head-
summary notations within each theme (see code quartered in Canberra, Australia that employs
examples in Table 1) (Gregor, Hart & Martin, approximately 3,000 staff and has origins dat-
2007; Martin, 2005; Martin, Gregor & Hart, 2005; ing back to the early 1900s, when the Census
Miles & Huberman, 1997). and Statistics Act (1905) was passed and the
In addition, executive presentations and corpo- Commonwealth Bureau of Census and Statistics
rate announcements by the ABS and Centrelink (CBCS) established. The CBCS was abolished
were collected and integrated into the written case in 1974 and the ABS installed in its place. In
evidence. In order to gain experience with agency its capacity as Australias official statistical or-
information systems, the ABS and Centrelink also ganization, the ABS has a mission to assist and
provided researchers with system demonstrations encourage informed decision-making, research
of data warehouse facilities, automatic workflow and discussion through the delivery of high quality
applications, corporate database environments, and objective national statistics (Commonwealth
and legislative interpretation applications. This of Australia, 2005b, 2005c, 2006a). The ABS
facilitated improved understanding of some of manages a recurrent budget of approximately
the underlying internal business processes and A$338 million (in 2006 dollars) (Commonwealth
the enabling technical systems. of Australia, 2006a).
The aggregation of the collected and analyzed The ABS is characterized as a quality infor-
case data has culminated in a rich body of critically mation organisation that collects, processes and
evaluated evidence that supports the augmentation disseminates accurate and timely economic data
of the research and analysis model. Staff members and community information. The ABS offers
and executives at the agencies were not averse statistical publications in the two major areas of
to providing critical comments on architectural economic statistics (eg, trade, business, national
practice, the social mechanisms of organizational accounts, manufacturing, agriculture) and popu-
alignment, or the potential limitations of using an lation statistics (eg, census, demography, labour,
Enterprise Architecture or other formal alignment social conditions, crime), supported by three
mechanisms (Martin, 2005; Martin, Gregor & functional service groups (statistical methodol-
Hart, 2005). ogy; information management and census; and
technology and corporate services) (Common-
wealth of Australia, 2005c, 2005d, 2006a).
GOVERNMENT AGENCY CASE The ABS has been recognised as a world
STUDIES leader in the statistics delivery business since the
early 1990s (The Economist, 1991, 1993), while
In this section of the chapter, we will introduce the consistently rating well above average against
case agencies and develop a detailed discussion international government and non-government
of the two enterprise architecture implementa- organizations in Gartner Group information
tions. The opportunity will be taken to contrast technology benchmarking studies, particularly in
the different architecture approaches adopted the areas of software and systems development
by the agencies, while highlighting the impor- (Commonwealth of Australia, 2000, 2001). The
tant consistencies with commercial architecture enterprise architecture mechanism is an integral
standards and frameworks. part of the agency infrastructure, and has assisted
with the understanding of future business direc-

419
Government Enterprise Architectures

tions and processes, while aiding the identification an Australian government technology gold award
and management of the information systems and in 2003. The enterprise architecture mechanism
technologies required to support that future state is a critical tool of the agency that has enabled
(ie, maintain alignment) (Palmer, 2003). the building of connections with customers and
important information systems and technologies
The Centrelink Social Services capabilities (Treadwell, 2003).
Agency
The Enterprise Architecture
The Centrelink agency operates as the govern- Frameworks and Methods
ments social service delivery arm and is respon-
sible for delivering services and payments, such The creation of an enterprise architecture can
as job seeker assessments and referrals, parenting take many development paths and, as we have
payments, youth allowances, and social work seen earlier in the theory section of the chapter,
services on behalf of eighteen (18) government can also involve the use of proven architectural
agencies and departments at the state and fed- frameworks and methods (Sowa & Zachman,
eral levels (Commonwealth of Australia, 2006c). 1992; The Open Group, 2006; Zachman, 1987).
Centrelink was legislated as a federal agency in In the first case organization, four staff members
1997, following the merger of the Department of from the ABS commenced the architecture devel-
Social Security and the Commonwealth Employ- opment and documentation process in 1999 with a
ment Service. The organization is headquartered completed version 1.0 in September 2001, and an
in Canberra, Australia, employs approximately updated version 2.0 in March 2003. The internal
25,000 staff at over 1,000 service delivery points, architecture development method formed part of
and supports over 6.5 million customers (repre- the information resource management process,
senting approximately one-third of the population and was based on the identification of business
of Australia) (Commonwealth of Australia, 2006b, and technical systems capability gaps (see Figure
2007a, 2007c). Centrelink manages a recurrent 4) (Gregor, Hart & Martin, 2007; Martin, 2005;
budget of approximately A$2.3 billion (in 2006 Martin & Gregor, 2006; Palmer, 2003).
dollars) (Commonwealth of Australia, 2006b). The ABS enterprise architecture documenta-
In order to understand the scale of the Cen- tion was reviewed and updated periodically (every
trelink operations, it should be noted that on 6 to 12 months) by the Chief Information Officer
an annual basis the agency delivers more than (CIO) and technical services division, to reflect
140 different products and services, pays over changing alignment, systems, environments, and
10 million individual entitlements valued at business capability gaps. The architecture update
over A$63 billion, records 5.2 billion electronic process was typically triggered by shifts in busi-
customer transactions, and receives more than ness products and processes, changes in service
30.77 million telephone calls and over 47 million delivery patterns, and associated investment ac-
online page views (Commonwealth of Australia, tivities. The business drivers (eg, new products,
2007a, 2007c). Centrelink has also won several services, client needs, financial constraints) that
national awards for business delivery and technol- stimulated the development of new and enhanced
ogy driven productivity in the area of electronic information systems for product and service de-
business and customer relationship management livery were a primary input to the architecture
(Commonwealth of Australia, 2005a, 2006b; change process and method.
Martin & Gregor, 2006). As an example, the The primary mechanism for evolving the
suite of five major e-Business projects secured physical ABS enterprise architecture was the

420
Government Enterprise Architectures

Figure 4. ABS enterprise architecture method (Source: Palmer, 2003)


A B S B u sin e ss
ABS D rivers In d u stry a n d I T
M anagement
T re n d s
D e cisio n s

Target P ro je cts
N e tw o rk,
Architecture
S e rve rs,
W orksta tio n s,
O p e ra tin g
S yste m s
____________
Current Architectural
H a rd w a re / Architecture Gap
S o ftw a re

Investment
A B S P ro d u cts Activities B u ildin g B lo cks

A B S P ro d u ct P a tte rn s,
F a m ilie s F ra m e w o rks,
C o m p o n e n ts
A B S B u sin e ss
P ro ce ss T a xo n o m y
rd
B u sin e ss S e cu rity T o ols 3 P a rty a n d
In fra structu re In -H o u se

identification of an architectural gap (ie, difference In our second case, the Centrelink agency
between current and target architectures based on adopted the Zachman Enterprise Architecture
business drivers and changes) and the enunciation Framework for developing and documenting their
of the investment activities required to bridge the architecture (Sowa & Zachman, 1992; Treadwell,
gap. A good example of architectural evolution 2003; Zachman, 1987). While Centrelink (as the
was the development of the ABS Input Data Ware- former Department of Social Security) had been
house (IDW) (2001-2004) (Gregor, Hart & Martin, developing its technical architectures since the
2007; Martin & Gregor, 2005). In 2001, the ABS late 1980s, it made a conscious decision to adopt
identified a gap in business capability (ie, statistics the Zachman framework as a more formal de-
provider processes and workloads were high and velopment method in late 2002, some four years
inefficient due to multiple database entry tasks), after its physical establishment as a government
coupled with the need for a single database struc- agency. The framework had been divided into
ture and integration tool in the architecture (ie, Zachmans Interrogatives (ie, Why, Who, What
SAS database software). The investment activities When, How and Where) and populated using
required to deliver the new system included the the Centrelink business constructs and technical
construction and documentation of a production systems artifacts (see Figure 5) (Martin, 2005;
pilot warehouse, operating pilot warehouse, and Treadwell, 2003).
full production warehouse, training of business It should be noted that Centrelink did not
operations staff, and the development of applica- augment the horizontal layers of the Zachman
tions interfaces and associated systems. The full framework, instead choosing to identify the major
production warehouse holds over 400 million clients, products, services, processes, systems,
records and was commissioned into operation business drivers and delivery locations.
in mid-2004. Importantly, the major business processes
are encapsulated in the vertical programs and

421
Government Enterprise Architectures

Figure 5. Centrelink augmentation of the Zachman framework (Source: Treadwell, 2003)


why who what when how where who

Delivery of Legislation/Policy

government programs & capabilities centrelink community the


departments payment information access community
& agencies (Services- &
processes) technology

F am ily & E nquiry C entrelink U N IX C entrelink A ged &


C om m unity S ervic es O n-line S ervic es S ervic e H ealth C a re
S ervic es C entre
R egistration C ustom e r C entrelink
E m plo ym ent S ervic es R egistration O n-line C entrelink C om m unity
& W ork place F ram e C all C e ntre G ro ups
R elations Ide ntifica tio n E xternal
S ervic es T ransfer S ecurity C entrelink
P erio dic
E duca tion , M an ag em en t O n-line F a m ilies
P rovisio ns
S cienc e & A ssessm e nt N atio nal
T rainin g S ervic es Ind e x MQ C entrelink
M ess aging A gencies Indigen ous
O ne -off
H ealth N otific atio n U pda te
G ove rnm e nt P rovisio ns
Insu ra nce S ervic es F am ily IS IS A da pto r C entrelink
Legislatio n /
C om m ission Incom e D ata N otific atio n M aternity
P olic y
P a ym ent U N IX O /S
A d-h oc
Im m igratio n S ervic es O n-line T ruste d
P rovisio ns
A ccess N ovell S ervic e Job S eek ers
V eterans C ard F a cility D irectory P rovid ers
A ffairs S ervic es S erve r
E m erge nc y
P roof of B ank s & Y o uth &
P rovisio ns
R efe rral Ide ntity F ina ncial S tude nts
other S ervic es M ain fram e Institutio ns
commercial F am ily S ervic es
providers R evie w A ssistan ce IB M 0S 39 0 C om m unity, S pecial
S ervic es D ata O n -line C om m ercial Inte res t
Incom e P rovid ers G ro ups
S tate A ppointm en t IS IS B en efit S ecurity
G ove rnm e nts S ervic es T ransfer Inte grate d O the r G ovt.
S ystem D epa rtm e nts
O the r IS IS (IS IS ) & A gen cies
Inte res ts P a ym ents
VTAM
IS IS
R evisio ns O S 39 0 O /S

Recognition of Community
Needs and Legislation
Requirements

payment layer of the augmented framework and more reliable health and welfare payments and
are aligned with Centrelinks information and streamline and better align internal agency busi-
technology systems and community access layers ness processes. Since mid-2005, payments such as
(see process-system mappings later in the chap- the Youth Allowance, Austudy Student Payments,
ter). The architecture framework formed part of Maternity Payment and Family Tax Benefit have
the larger agency management and governance been available through online channels, form-
arrangements, and was driven by changes in ing a significant portion of the 250,000 online
business posture and structures (including the transactions processed each week. Centrelinks
underlying legislation). A typical example of architectural practice has enabled the nationally
architecture driven development was the Online recognized, continuous improvement of online
Claims and Services system (Commonwealth of services and payments, and the associated trans-
Australia, 2006d). Online claims and services formative business processes (Commonwealth of
systems were redeveloped in 2005-06 to provide Australia, 2006b, 2006d). As a further example,

422
Government Enterprise Architectures

the Student Notification of Employment Income Martin, 2007; Martin, 2005; Martin & Gregor,
Initiative supported the development and repli- 2006; Palmer, 2003). The ABS tabled larger
cation of e-Business services and processes in project (such as the data warehouse mentioned
multiple customer groups, while reducing annual earlier) business cases and documentation with
physical mail-outs by over 2 million notification the Information Resource Management Commit-
letters (Commonwealth of Australia, 2005d). tee (IRMC) that was chaired by the Deputy Chief
A critical point in the comparison of the two Executive Officer, with smaller projects (such as
architecture frameworks or methods is the parity desktop operating system upgrades) passed to
of the two development artifacts in their capacity to the CIO-chaired Investment Review Board (IRB)
describe the organization, and develop the matched for consideration and guidance. Centrelink used
business and technical system components. The a similar dual committee structure that included
two cases show that it is possible to establish and a Business Investment Committee (BIC) for
maintain a whole-of-enterprise architecture using large business directed projects, and a separate
internally developed or commercially available e-Business governance group for those key busi-
frameworks or methods. While several estab- ness process and online systems developments
lished architecture frameworks and methods exist (Commonwealth of Australia, 2002, 2003a). Both
(eg, The Open Group Architecture Framework, agencies also used working level project boards
Federal Enterprise Architecture Framework), the and joint business-technical architecture panels
creation of an architecting method that closely for the provision of guidance and support (Martin,
reflects the needs and scope of the agency should 2005; Martin & Gregor, 2006; Palmer, 2003).
not be undervalued (Commonwealth of Australia, Importantly, the two agencies used formal
2006d). The ABS method serves as an example of executive management structures to ensure that
an architecture that is tailored to reflect the busi- the architecture was corporately governed and
ness environment and dynamics that characterize managed, particularly in the areas of business
the work of the agency. process and technical systems implementation
and alignment. The two agencies practices were
The Architecture Governance found to be wholly consistent with the Informa-
tion Technology Governance Institute (ITGI)
The governance of the physical architecture is guidelines for corporate boards and executive
an important management dimension for the es- management teams (Information Technology
tablishment and maintenance of process-system Governance Institute, 2003). We would stress
alignment (Information Technology Governance that architectural governance is considered to be
Institute, 2003). In this section of the chapter we a prime responsibility of the government agencys
will present the different lines of process-systems leadership. However, ultimately this responsibility
governance for each agency, and highlight the key flows down to all operational members of staff,
structures for architecture management. particularly those charged with process-systems
The two case agencies use a combination of implementations.
information systems and technologies resource
committees for the ongoing governance and man- The Enterprise Architecture
agement of the business and technical architecture Structures
artifacts (Martin & Gregor, 2006). The ABS used
a dual committee structure supported by business While the adoption of an enterprise architecture
and technology panels and working groups in man- framework or method provides the instantiation
aging the enterprise architecture (Gregor, Hart & tool for government architectures, the ultimate

423
Government Enterprise Architectures

outcome is an agency architecture that accurately process-system alignment condition. In the busi-
reflects the shape of the organizations business ness component (shaded in grey), the ABS first
and its largely technical systems. In the follow- developed sub-structures that described how the
ing sections, we will discuss the resultant agency architecture, technologies and online environ-
architectures and their consistency with interna- ment would be developed and maintained, and
tional architecture standards. a comprehensive taxonomy and management
In the ABS case, the architecting method arrangements for the pivotal corporate business
yielded a highly structured business and techni- processes (ie, Business survey, Household survey,
cal systems architecture (see Figure 6) (Com- Index survey, Administrative By-Product collec-
monwealth of Australia, 2003b; Gregor, Hart & tion, and Derivation collection process classes).
Martin, 2007; Martin, 2005; Palmer, 2003). Importantly, the business process taxonomy com-
The ABS architecture was segmented into ponent of the architecture integrated the primary
three major structural components. In the gen- corporate business processes with the enabling
eral component, the architecture included a set information systems and technologies (see pro-
of principles and objectives that were used in the cess-system mappings later in the chapter).
architectural construction. Importantly, the two In the technical component, the ABS defined
driving objectives of the architecture were to and described its key domain architectures (ie,
ensure that the IT environment is aligned with the applications, security, data management); com-
ABS business imperatives (its mission, outputs mercial systems, tools and technology standards
and outcomes, and processes) and, to help the (eg, XML); software components, objects and
ABS build anThe ABS architecture
IT environment that canwas segmented into
be easily three designs
interface major structural
(eg, objectcomponents. In the
oriented designs,
general component, the architecture included a set of principles and objectives that
changed and extended, so as to retain its alignment application programming interfaces); and the
were used in the architectural construction. Importantly, the two driving objectives of
with changing business imperatives. hardware and software infrastructure required
the architecture were to ensure that the IT environment is aligned with the ABS
These objectives
business reinforced
imperativesthe(its ongoing for business
mission, outputs delivery
and outcomes, and(ie,processes)
mid rangeand,
computing
to help
connection between the architecture and the systems, DeveloperWorks
the ABS build an IT environment that can be easily changed and extended, sotechnology demon-
as to
retain its alignment with changing business imperatives.

Figure 6. ABSFigure
enterprise architecture
6. ABS Enterprise(Source: Palmer,(Source:
Architecture 2003) Palmer, 2003)

aBs aBs It maintaining and aBs aBs Business


Website Governance using the aBs Business Process
Governance framework enterprise Process management
architecture taxonomy

aBs aBs
technologies application
and toolsets
aBs enterprise architecture

architecture summary
aBs aBs
commercial components
systems and
tools
Principles and objectives and services
Interfaces

extensible aBs aBs Input aBs aBs Data aBs


markup It Data security management Developer
Language Infrastructure Warehouse architecture architecture Works
(XmL)

These objectives reinforced the ongoing connection between the architecture and the
process-system alignment condition. In the business component (shaded in grey), the
ABS first developed sub-structures that described how the architecture, technologies
424 and online environment would be developed and maintained, and a comprehensive
taxonomy and management arrangements for the pivotal corporate business processes
Government Enterprise Architectures

stration sandbox, data warehouses, desktop and In the Centrelink case, the Zachman frame-
mobile networks). The scope of the ABS technical work offered the agency an opportunity to segment
systems is extensive and, when combined with the architecture into five business and technical
the business component, shows a good measure systems components and allocate these to senior
of consistency with international architecture executive managers (organizational architects)
standards (see Table 2). (see Figure 7).
A comparative analysis shows that, in terms In formally enunciating its architecture,
of the key requirements for instantiating the ar- Centrelink established a detailed list of archi-
chitecture (ie, architecture coverage, concepts, tecture development principles. The principles
components, representation, and glossary), the that supported the process-system alignment
ABS enterprise architecture is largely consistent condition included each (technical) architecture
with the ISO 15704 reference architecture standard cluster having a unity of purpose which binds
(International Standards Organization, 2000). its unique business processes and data together
The table outlines a combination of business and and, each architecture cluster being owned by a
essential that
technical system artefacts for enterprise
are essentialoperations
for and overall
technical business
systems delivery.
team Important
and having examples
a business
include
enterprise operations the description
and overall business and explication
deliv- of managerial
process sponsor. governance, work activities, and
business processes that are critical for corporate performance outcomes; and the
ery. Important examples include the description The agency business architect held responsibil-
technical system development methods, technologies, toolsets, and operating entities
and explication of managerial governance, work ity for business models, processes, capabilities,
that directly support business delivery. The ABS architecture has benefited from the
activities, and business processes that are criti- and governance
adoption and implementation of the internally developed frameworks (shaded inmethod
architecture grey). that
cal for corporate performance
constructs andoutcomes;
binds theandbusiness
the Centrelink
and technical developed
parts of the sub-architectures
organization. that
technical system development methods, technolo- modelled the organizations primary
In the Centrelink case, the Zachman framework offered the agency an opportunity to business
gies, toolsets, and segment
operatingtheentities that directly
architecture into fivebehaviours
business and and client relationships,
technical systems acomponents
description and
support business delivery. The ABS architecture of the high level business processes
allocate these to senior executive managers (organizational architects) (see (ie, service
Figure 7).
has benefited fromIntheformally
adoptionenunciating
and implemen- its architecture,
delivery Centrelink
management, established
governance, a relationship
detailed list of
architecture
tation of the internally development
developed principles.
architecture The principles
management, that management,
change supported theinformation
process-system
alignment condition
method that constructs and binds the business included each (technical) architecture cluster having
management and staff capability) and operating a unity of
and technical partspurpose which binds its unique processes
of the organization. business processes
(ie, client and data together
registration, and, each
assessment,
architecture cluster being owned by a technical systems team and having a business
process sponsor.
Figure 7. Centrelink enterprise architecture (Source: Treadwell, 2003)
Figure 7. Centrelink Enterprise Architecture (Source: Treadwell, 2003)
enterprise architecture Principles

Business architecture security Information


architecture architecture
Business model
applications Portfolio
Business Processes
corporate Web
applications applications
Business capabilities

Governance framework
It Infrastructure

The agency business architect held responsibility for business models, processes,
capabilities, and governance frameworks (shaded in grey). Centrelink developed sub-
architectures that modelled the organizations primary business behaviours and client
relationships, a description of the high level business processes (ie, service delivery
management, governance, relationship management, change management, 425
information management and staff capability) and operating processes (ie, client
registration, assessment, planning, referral, payments, and review) using benefits
Government Enterprise Architectures

planning, referral, payments, and review) using tecture reflects an augmentation of the Zachman
benefits realisation techniques and process maps, framework that has enabled the creation and inte-
a register of significant internal and external gration of the business and technical parts of the
business capabilities (eg, project management, organization (Sowa & Zachman, 1992).
financial management, customer service, service In both agencies, the architectures were found
providers, telephone call centres) that are critical to to have promoted early and continued concen-
customer delivery, and the governance framework tration on the business aspects of the enterprise
that guide and direct the business and supporting including the constituent items (eg, processes,
technical systems (see process-system mappings models, capabilities), information systems and
later in the chapter). technology governance arrangements, integration
The technical segments of the architecture of the business delivery units with the supporting
reflect Centrelinks critical business delivery corporate information, and reuse of architecture
systems. The information architecture includes components for improved business efficiency and
a vast data warehouse, and data/information generic systems design (Gregor, Hart & Martin,
holdings in excess of 215 Terabytes at any point 2007; Martin, 2005). These architecture char-
in time (Martin, 2005). The security architecture acteristics further assisted the development and
covers the mainframe processing and e-Business maintenance of the business and technical systems
platforms with standards-based security access nexus and the agency alignment condition.
monitoring and intrusion systems (Martin,
2005). The IT infrastructure draws together the Other Alignment Mechanisms
mainframe and on-line production and assurance
activities for batch services, mail-outs, and sys- Earlier in the chapter, we mentioned the capacity of
tems upgrades; and the network services that are other social and formal alignment mechanisms to
related to enterprise server and desktop design, promote and sustain alignment. During the course
management and support in local and wide areas. of our work, we were able to examine and detail
The applications portfolio is segmented into the executive mangement support, business planning
larger corporate applications for mainframe, styles, and business planning communications in
production, transaction processing and customer the social alignment context (Martin, 2005; Mar-
servicing, and the critical Web applications re- tin, Gregor & Hart, 2005). The research showed
quired for e-Business delivery in the Intranet and that a strong executive management support
Internet service channels. Again, in the case of regime, a collegiate business planning style that
Centrelink, the combination of the business and utilises business and technical staff, and open
technical architecture components is largely con- internal and external communications channels
sistent with the ISO 15704 reference architecture are compelling social mechanisms of alignment
standard (International Standards Organization, (Martin, 2005; Martin, Gregor & Hart, 2005).
2000) (see Table 2). Similarly, other formal alignment mechanisms,
Some of the more relevant examples of such as the agencies strategic plan, line manage-
compliant components include the description ment structures, balanced score cards, and audit
and explication of the guiding business models, and review actions, were uncovered and formed
corporate governance arrangements, and agency part of the ubiquitous alignment dynamic (Gregor,
business processes; and the secure e-Business de- Hart & Martin, 2007; Martin, 2005). These cases
livery and backroom processing systems that are illustrate the important point that the enterprise
underpinned by network systems infrastructure architecture is one of many alignment mechanisms
for business enablement. The Centrelink archi- present within organizations. In most cases, these

426
Requirement Sub-Requirement Architecture Content ABS Centrelink Examples of Architecture Content

Applicability Enterprise Design Activities required to design, build, maintain and The ABS design activities for surveys and information processing business analysis, re-
and Coverage manage enterprise entities. engineering, prototyping, synthesis. Centrelink design activities value chain analysis,
of Enterprise Enterprise Operation Work activities required in enterprise entities simulation, business redesign, and website design.
Entity Types operations. The ABS work activities data collections, publishing operations, clearing house work.
Centrelink work activities customer service, call centre operations, transaction processing,
notification, and client access.

Enterprise Human Orientation Human roles, responsibilities, authorizations, and The ABS architecture corporate directory and plans details the roles and responsibilities of
Concepts relations to the enterprise the executive management team and staff. Centrelink architecture (governance section) details
roles and responsibilities of the board of management directors, executive management team
Process Orientation Business processes, process functionality, and and staff.
operational behaviours The ABS architecture high level business processes (eg, Census, Business surveys, Household
surveys), and operational behaviours (eg, data extraction, transformation, and loading).
Technology Orientation Technologies employed in enterprise operations and Centrelink architecture (business processes section) eg, service delivery, relationship, and
processes change management, staff capability, registration, assessment, referral.
The ABS architecture ABS technologies and IS toolsets (eg, XML, Common Object Modelling,
Mission Performance Processes or activities involved in the performance of SQL, Java Tools, MS.net). The Centrelink architecture technologies and IS toolsets (eg, Cobol,
the stated enterprise mission DB2, OS390, SQL, Java Tools, SAS, MS.net).
Government Enterprise Architectures

The ABS architecture critical business activities and processes for mission performance (eg,
2005; Palmer, 2003; Treadwell, 2003)

Life Cycle Life cycle representations of the enterprise entities Client groups surveys/information dissemination, publication production processes, systems
and constructs governance). The Centrelink architecture critical business activities and processes for mission
performance (eg, Client registration, customer service, payments/transactions, governance,
Sub-architectures Sub-architecture representations to the user social and welfare support).
The ABS architecture systems/technology lifecycle phases and history (eg, 1980s mainframe
computer retired in 2005, midrange systems implemented in 2000s). The Centrelink architecture
systems/technology lifecycle phases and history (eg, 1980s STRATPLAN M204 DB
implementation, IT Refresh Program in 2003).
The ABS architecture applications, security, data management and IT infrastructure sub-
architectures. The Centrelink architecture business, applications, security, information and IT
infrastructure sub-architectures.

Architectural Information Systems Identification of ISDMs for systems development The ABS architecture ISDM, project management framework, and software development
Components Development methodology. The Centrelink architecture ISDM (Agile based), project management
Methodologies, ISDM framework, joint applications development, and rapid applications development.
Enterprise operations modeling languages or
Modelling Languages or descriptive constructs
Descriptive Constructs The ABS architecture UML (for some software applications), XML and Lotus Workflow
Architect to model and describe agency outputs, operations and processes. The Centrelink
Enterprise Tools Computer-enabled tools that support integration architecture UML (for some software applications), XML, Forte Tools and MS Visio to model
projects and initiatives and describe agency outputs, operations and processes.

Enterprise Modules Enterprise module, building block or product family The ABS mandated toolsets for integration projects XML, Simple Object Access Protocol,
representations UML, IBM Websphere, and MS.Net. The Centrelink toolsets for integration projects XML,
Internet Inter-Orb Protocol, UML, IBM Websphere-MQ Series, CORBA Tools, and MS.Net.
Operational System Description of operational hardware and software The ABS architecture software components, service interfaces, application families, and
Descriptions systems product line architectures. The Centrelink architecture systems clusters (common business,
benefit specific, support, development), business logic modules, service interfaces, and product
families.
The ABS architecture desktop, mid range server, online, mobile hardware and associated
software. The Centrelink architecture desktop, mid range server, mainframe, online, mobiles,
call centres, and vendor and agency developed software.

Architectural Graphical Depictions High level graphical depictions of architecture The ABS architecture rich graphical depictions of the concepts/schemas (eg, IT Infrastructure
structures depicted as a rain forest ecosystem). The Centrelink architecture graphical depictions (eg,
clusters, architecture framework segments).

Architectural Glossary of Terms Reference all major terms used in the architecting The ABS architecture corporate glossary of terms. The Centrelink architecture e-Reference
Glossary approach suite, Data Dictionary, Thesaurus, and other reference tools (eg, EDGE Decision support
systems).
Table 2. Enterprise architecture requirements analysis (Adapted from ISO15704) (source: Commonwealth

427
of Australia, 2003b; Gregor, Hart & Martin, 2007; International Standards Organization, 2000; Martin,
Government Enterprise Architectures

Table 3. ABS process-systems analysis (Source: Gregor, Hart & Martin, 2007; Martin, 2005; Palmer,
2005)

Major Business Business Sub-Process Information Systems/Information Technology


Process
Business Survey Provider Management Lotus Notes DB, Survey Facility, Interim Despatch and Collection Control
Class system (IDACC), SAS DB, Input Processing Systems (IPS), INSPECT
process and report software, Optical Character Reader (OCR), Imputed
Marker Reader (IMR), Optical Marker Reader (OMR), BLAISE computer
assisted interview software
Input Quality Assurance IPS, SAS DB, Lotus Notes DB
Derivation SAS DB, Lotus Notes DB
Imputation, estimation, Generalized survey imputation processor (GENIMP), Generalized survey
aggregation estimation facility (GENEST), SAS

Macro-edit, analysis SAS OLAP tool, SAS Assist tool, Generalized survey winsorisation
component (GENWINS)
Administrative By- Data Capture Natural software system, PL1 system, SAS DB, EAI XML, Centura SQL
Product Collection Windows development tool (CENTURA), Computer assisted coding system
Class (CAC)
Input Quality Assurance Natural software system, PL1 system, SAS DB, CENTURA, Clipper DB
Derivation SAS DB, Lotus Notes DB
Aggregation Generalized survey imputation processor (GENIMP), Generalized survey
estimation facility (GENEST), SAS DB
Macro-edit, analysis SAS OLAP tool, SAS Assist tool
Derivation Data Collect, Capture, Load Lotus 123, MS Excel, Lotus Notes DB, Forecasting-Analysis-Modeling
Collection Class Environment (FAME)
Estimates compilation Forecasting-Analysis-Modeling Environment (FAME), MODIS Online
Visualisation and Analysis System (MOVAS)
Macro-edit Forecasting-Analysis-Modeling Environment (FAME), Lotus 123, MS
Excel
Index Survey Class Data Capture CENTURA, XML, Lotus Notes DB, Constellar Hub collection system,
Laptop computers
Input Quality Assurance CENTURA, Lotus Notes DB
Input Index compilation CENTURA
Index-edit, analysis CENTURA, SQL OLAP
Household Survey Data Capture OMR scanner, BLAISE, HS Office Management system
Class
Input Quality Assurance IPS, BLAISE, Procedural Language for Edit, Amend and Tabulation system
(PLEAT), SAS DB
Derivation IPS, PLEAT, SAS DB
Weighting and Tabulation HS Facility
Edit, analysis SAS DB

428
Government Enterprise Architectures

mechanisms are non-synchronized and tend to architectures can enable the alignment of core
work in different time frames and cycles, transit- agency business processes with corporate infor-
ing between alignment, change and re-alignment, mation systems. In earlier sections of the chapter,
as business circumstances evolve (Gregor, Hart the cases identified the presence of these two
& Martin, 2007; Martin, 2005; Venkatraman, primary and integrated architectural components
Henderson & Oldach, 1993). within the agencies. Architectural drawings and
descriptive documents from both agencies allowed
the analysis and construction of the process-sys-
ALIGNING BUSINESS PROCESSES tem maps that show the linkages and points of
AND INFORMATION SYSTEMS integration (see Tables 3 and 4).
USING ARCHITECTURE The process-system mappings represented
in the tables show that the agencies have taken
The purpose of this chapter was to illustrate how the opportunity to develop accurate depictions
the development and deployment of enterprise of the process and systems relationships that are

Table 4. Centrelink process-systems analysis (Source: Commonwealth of Australia, 2003b, 2007d;


Martin, 2005; Treadwell, 2003)
Major Business Business Sub-Processes Information Systems/Information Technology
Processes
Service Delivery Client Registration
Management Client Identification
Relationship Client Notification
Management Client Referral IBM OS/390 Mainframe, OS/390 MQ, ISIS M204, DB2, SAS, Teradata,
Change Review (Clients) SQL, Data Warehouse, Novell Directories, Security Management
Management Review (Information) Security Access Management System/Access Control Facility 2
Information (SAMS/ACF2), EDGE Legislative Decision Support Software,
Management Centrelink On-Line (COL) Java and MS.Net e-Business systems.
Customer Service Centre, Call Centre, User Assurance Facility.
Service Delivery Payments (Clients)
Management Planning (Information)
Information
Management

Service Delivery Client Assessment Unix Sun Solaris Services, Unix MQ, ISIS Adaptor Forte services,
Management Client Enquiry Novell Directories, Security Management SAMS/ACF2, EDGE
Relationship Planning (Clients) Legislative Decision Support Software, COL e-Business systems.
Management Customer Service Centre, Call Centre, User Assurance Facility.
Change
Management
Information
Management

Governance Planning SAP Infolink, SAS, Brio tools, Superstar systems, Cognos systems.
Review (incl. Audit) Customer Service Centre, Call Centre.
Payments (and Procurement)
Staff Capability Planning (Staff) SAP Infolink, SAS, Brio tools, Superstar systems, Cognos systems,
UML. Customer Service Centre, Call Centre.
Payments (and Remuneration) SAP Infolink, Data Warehouse
Review (Organization and SAP Infolink, SAS, Brio tools, Superstar systems, Cognos systems.
Staffing) Customer Service Centre, Call Centre.

429
Government Enterprise Architectures

directed at delivering government outputs and enabled critical client registration processes in
outcomes. Earlier in the chapter, it was highlighted support of over 6.5 million agency customers.
that the Business Process Taxonomy (ABS) and The important outcome from this alignment
augmented Zachman framework (Centrelink) analysis is the close coupling of the working pro-
were primary artifacts for the enablement of cesses and systems within the agency architecture
process-system alignment. Notably, these artifacts and formative frameworks. The cases demonstrate
reflected several critical process-system relation- that the integration of business processes and
ships in both organizations, as illustrated in the information systems under the architectural um-
aforementioned tables. brella allows the agencies to collect and process
Examples of these relationships drawn from the data, publish information, and deliver critical
ABS architecture shows that the Business survey government social services. These public sector
process was integrated with a Generalized Survey organizations illustrate how the development and
Imputation Processor (GENIMP) system in order maintenance of the architecture can enable the
to create and maintain a complete client data set fusion of the business and technical parts of the
for forward statistics processing. Similarly, the agency. The result is the functional integration of
ABS integrated the BLAISE computer assisted the business processes and information systems
interview software systems into the Business and within the architecture frame (see Figure 8).
Household survey processes so as to improve
data provider management and input quality
for forward processing and statistical products Future Research
publication. Within the Centrelink architecture, Opportunities
the agencys Income Security Integrated System
(ISIS) enabled the client pension and benefits Future research opportunities to investigate and
payment processes, resulting in over 10 million examine enterprise architecture enabled align-
payments each year; while in a further example, ment include studies of private sector architecture
the Centrelink On-Line (COL) e-Business system users, the alignment of other business and tech-

Figure 8. Functional integration of business processes and information systems

enterpriSe architectUre

Functional integration
business information Systems
architecture architecture

Business Applications
Model

business
Business
Processes
Information outputs
Systems
and
outcomes

Business Security
Frameworks

Business Infrastructure
Governance

430
Government Enterprise Architectures

nology artifacts, the measurement, quantification tion provide opportunities to create and maintain
and maturity of business process and technology close alignment conditions. It is important to make
systems alignment and integration, other social an early determination of what business processes
alignment enablers, and the physical architecting are critical for achieving the agency mission. If
and design processes. parts of the business and/or information systems
components and their relationships are missing,
ongoing business process-systems alignment is
CONCLUSION less likely to be achieved. Third, architects should
recognize that the social enablers of alignment are
In concluding this chapter, we would stress that very important. Close business and information
alignment is very much more than a theoretical systems communications, planning, and manage-
concept. Alignment is a dynamic and ubiquitous ment support provide the interpersonal facilitation
construct that drives organizational performance, mechanisms of the alignment condition. Finally,
particularly with respect to the public sector out- while the architecture provides a formal and highly
comes and outputs required of government. While visible means of linking and integrating business
the government agencys enterprise architecture and information systems within public organiza-
is not a panacea for all the corporate alignment tions, it remains one of many corporate alignment
ills, it does deliver intrinsic value in the creation, mechanisms. Architects should not underestimate
binding and ongoing relationships support of the the importance of other alignment mechanisms,
business and its technical systems. It could also such as audit and executive review, balanced score
be argued that an architecture provides a con- cards, and administrative governance measures,
solidated depiction of public organizations that in drawing together the business processes and
supports the early and deliberate concentration supporting information systems.
on important business issues and performance, In closing, we would contend that establish-
enunciates the information systems and technol- ing and maintaining a public sector enterprise
ogy governance arrangements, unifies and shares architecture is a long and winding journey with
corporate information and data with the operating no final destination. The constant evolution of
business units, and allows the measured reuse business and information systems drives organi-
and efficient replication of business and technical zational and technological change, particularly in
systems artifacts. Each of these attributes serves those government agencies that directly serve the
to combine and align the public agencies business community. However, the architecture journey is
and technical systems. a necessary one if organizations are to success-
The cases presented in this chapter provide fully integrate and align all of their functions,
a number of important lessons for enterprise and deliver the desired outcomes and outputs of
architects. First, the origins of an architecting government.
framework are not necessarily as important as im-
plementing a structured architecture method and
set of procedures. Whether an organization uses REFERENCES
an internally developed or commercially available
architecture framework is generally less critical Alavi, M., & Yoo, Y. (1995). Productivity gains of
than the institution of an architecting method that BPR: Achieving success where others have failed.
suits the workings of the public agency. Second, Information Systems Management, 4, 43-47.
architectures that are reflective of the business and
Burgelman, R.A. (1983). A Process Model of
information systems components of the organiza-
Internal Corporate Venturing in the Diversified

431
Government Enterprise Architectures

Major Firm. Administrative Science Quarterly, Commonwealth of Australia. (2003a). Annual


28, 223-244. Report 2002-2003 (pp. 195). Canberra, Australia:
Centrelink Publishing.
Burgelman, R.A. (1994). Fading Memories: A
Process Theory of Strategic Business Exit in Commonwealth of Australia. (2003b). Transform-
Dynamic Environments. Administrative Science ing Government: Achievements in e-Government
Quarterly, 39, 24-56. (pp. 22-24, 54-56). Canberra, Australia: The Na-
tional Office for the Information Economy.
Chan, Y.E. (2002). Why havent we mastered
Alignment? The importance of the Informal Or- Commonwealth of Australia. (2005a). Annual Re-
ganization structure, MIS Quarterly Executive, port 2004-2005 (pp. 102, 129, 153-155). Canberra,
1 (2), 97-112. Australia: Centrelink Publishing.
Chan, Y.E., Huff, S.L., Copeland, D.G., & Barclay, Commonwealth of Australia. (2005b). Cor-
D.W. (1997) Business Strategy, Information Sys- porate Plan (pp. 1-18). Canberra, Australia:
tems Strategy, and Strategic Alignment. Informa- Australian Bureau of Statistics Publish-
tion Systems Research, 8 (2), 125-150. ing. Retrieved August 7, 2006, from http://
www.abs.gov.au/Websitedbs/D3310114.nsf/
Chang, RY. (1994). Improve processes, reengi-
51c9a3d36edfd0dfca256acb00118404/b1042c4e
neer them, or both? Training and Development,
e5af9c71ca256a46008278d9!OpenDocument
48 (3), 54-58.
Commonwealth of Australia. (2005c). Forward
Commonwealth of Australia. (1997). The Format
Work Program 2005-2006 to 2007-2008 (pp. 1-17).
of Portfolio Budget Statements. Canberra, Austra-
Canberra, Australia: Australian Bureau of Statis-
lia: Australian Government Publishing Service.
tics Publishing. Retrieved October 25, 2006, from
Commonwealth of Australia. (2000). Annual http://www.ausstats.abs.gov.au/ausstats/free.
Report 1999-2000, Technology Services Divi- nsf/0/B0812C31E3C00733CA257013000B5019/
sion Benchmarking (pp. 52). Canberra, Austra- $ F i l e / 1 0 0 6 0 _ 2 0 0 5 % 2 0 -
lia: Australian Bureau of Statistics Publishing. %2006%20to%202007%20-08.pdf
Retrieved February 12, 2004, from http://
Commonwealth of Australia. (2005d). Trans-
www.ausstats.abs.gov.au/ausstats/free.nsf/0/
forming Government: Enhancing Productivity
4ECE004BACFCECABCA256C0E007F3C1F/
Volume 2 (pp. 7-12, 41-45). Canberra, Australia:
$File/10010_1999-00.pdf
The Australian Government Information Man-
Commonwealth of Australia. (2001). Annual agement Office.
Report 2000-2001, Performance Information,
Commonwealth of Australia. (2006a). Annual
Cost Effective Inputs (pp. 80). Canberra, Aus-
Report 2005-2006 (pp. 166-220). Canberra, Aus-
tralia: Australian Bureau of Statistics Publish-
tralia: Australian Bureau of Statistics Publish-
ing. Retrieved April 20, 2004, from http://
ing. Retrieved February 15, 2007, from http://
www.ausstats.abs.gov.au/ausstats/free.nsf/0/
www.ausstats.abs.gov.au/ausstats/subscriber.
D9E50335A060BDDDCA256C540006B320/
nsf/0/0407DA584588E138CA25720300182FBA/
$File/10010_2000-01.pdf
$File/10010_2005-06.pdf
Commonwealth of Australia. (2002). Annual Re-
Commonwealth of Australia. (2006b). Annual
port 2001-2002 (pp. 22-33). Canberra, Australia:
Report 2005-2006 (pp. 9-10, 110-112, 199). Can-
Centrelink Publishing.
berra, Australia: Centrelink Publishing.

432
Government Enterprise Architectures

Commonwealth of Australia. (2006c). Business Deming, W. (Ed.) (1986) Out of the Crisis. Cam-
Plan 2006-2007 (pp. 23). Canberra, Australia: bridge, MA: MIT Press.
Centrelink Publishing. Retrieved February 15,
Drucker, P.F. (Ed.) (1954). The Practice of Man-
2007, from http://www.centrelink.gov.au/In-
agement. New York: Harper and Row Editors.
ternet/Internet.nsf/filestores/co055_0607/$file/
co055_0607en.pdf Drucker, P.F. (Ed.) (1980). Managing in Turbulent
Times First Edition. New York: Harper and Row
Commonwealth of Australia. (2006d). Excel-
Editors.
lence in e-Government Awards 2006 (pp. 22-25).
Canberra, Australia: The Australian Government Earl, M.J. (Ed.) (1989). Management Strategies
Information Management Office. for Information Technology, New York: Prentice
Hall.
Commonwealth of Australia. (2007a). A Guide
to Australian Government Payments September Feurer. R., Chaharbaghi, K., Weber, M., & Wargin,
2007. Canberra, Australia: Centrelink Publish- J. (2000) Aligning Strategies, Processes, and IT:
ing. Retrieved April 20, 2007, from http://www. A Case Study. Information Systems Management
centrelink.gov.au/Internet/Internet.nsf/filestores/ 17 (1), 23-34.
co029_0707/$file/co029_0707en.pdf
Gadd, K.W., & Oakland, J.S. (1995). Discontinu-
Commonwealth of Australia. (2007b). Applica- ous change in a total quality environment. D2D
tion of the Outputs and Outcomes Framework, Lt.: A case study. Business Process Reengineering
The Auditor-General Audit Report No.23, 2007. and Management Journal 1 (2), 7-27.
Canberra, Australia: The Australian National
Gibson, R. (1994). Global information technol-
Audit Office.
ogy architectures. Journal of Global Information
Commonwealth of Australia. (2007c). Centrelink Management 2 (1), 28-38.
Facts and Figures 2007. Retrieved April 20, 2007,
Gordon, J.R., & Gordon, S.R. (2000). Structuring
from http://www.centrelink.gov.au/Internet/In-
the Interaction between IT and Business Units.
ternet.nsf/about_us/facts.htm
Information Systems Management 17 (1), 7-16.
Commonwealth of Australia (2007d), Core Busi-
Gregor, S.D., Hart, D.N., & Martin, N.J. (2007).
ness Processes, Centrelink. Retrieved April 20,
Enterprise Architectures: Enablers of Business
2007, from http://www.centrelink.gov.au/Inter-
Strategy and IS/IT Alignment in Government.
net/Internet.nsf/about_us/strategic_directions.
Information Technology and People 20 (2), 96-
htm
120.
Croteau, A-M., Solomon, S., Raymond, L., &
Grover, V., Teng, J.T.C., & Fiedler, K. (1993). Busi-
Bergeron, F. (2001). Organizational and Techno-
ness process re-design: an integrated planning
logical Infrastructures Alignment. Proceedings
framework. OMEGA: The International Journal
of the Thirty-Fourth Annual Hawaii International
of Management Science 21, 4, 433-447.
Conference on System Sciences, 3-6 January (pp.
234-242). New York: IEEE Press. Hammer, M. (1990). Reengineering work: Dont
automate, obliterate. Harvard Business Review
Davenport, T.H., & Short, J.E. (1990). The new
July/August, 104-112.
industrial engineering: Information technology
and business process redesign. Sloan Manage- Hammer, M., & Champy, J. (1993). Reengineer-
ment Review 31 (4), 11-27. ing the Corporation: A Manifesto for Business
Revolution. New York: Harper Business.

433
Government Enterprise Architectures

Harrington, H.J. (1991). Business Process Im- tures in Australian Government. Unpublished
provement. New York: McGraw Hill. doctoral dissertation, The Australian National
University.
Henderson, J., & Sifonis, J. (1988). Understanding
the Value of IS Planning: Understanding Martin, N.J., & Gregor, S.D. (2005). Requirements
Consistency, Validity and IS Markets, MIS Engineering: A case of developing and managing
Quarterly 12 (2), 187-200. quality software systems in the public sector. In C.
Wohlin, and A. Aybuke, (Ed.), Engineering and
Henderson, J.C., & Venkatraman, N. (1993).
Managing Software Requirements (pp. 353-372).
Strategic Alignment: Leveraging Information
Springer-Verlag, Berlin.
Technology for transforming organizations. IBM
Systems Journal 32 (1), 4-16. Martin, N.J., & Gregor, S.D. (2006). ICT Gov-
ernance: Frameworks for managing Australian
Horovitz, J. (1984). New Perspectives on Strategic
E-Government. Journal of E-Government 2 (3),
Management. Journal of Business Strategy,
19-49.
Winter, 19-33.
Martin, N.J., Gregor, S.D., & Hart, D.N. (2005).
Information Technology Governance Institute.
The Social Dimension of IS/IT Alignment: Six
(2003). Board Briefing on IT Governance, Second
Case Studies of Public Sector Organizations.
Edition, Rolling Meadows, IL: ITGI Press.
Australian Accounting Review 15 (3), 28-38.
International Standards Organization. (2000). ISO
McAdam, R., & Donaghy, J. (1999). Business
15704 Industrial Automation Systems Require-
Process re-engineering in the public sector: A
ments for Enterprise Reference Architectures and
study of staff perceptions and critical success
Methodologies. Vienna, Austria: ISO.
factors. Business Process Management Journal
Johnson, S.J. (1993). Re-engineering: what 5 (1), 33-49.
works, what doesnt? Retail Business Review 61
McDavid, D.W. (1999). A Standard for Business
(5), 28-30.
Architecture Description. IBM Systems Journal
Johnston, H.R., & Carrico, SR. (1988). Developing 38 (1), 12-31.
capabilities to use information strategically. MIS
Miles, M.B., & Huberman, A.M. (1997). Qualita-
Quarterly 12 (1), 37-50.
tive Data Analysis An Expanded Case Book 2nd
Kettinger, W.J., & Grover, V. (1995). Toward a Edition, Thousand Oaks: Sage Publications.
theory of Business Process Change Management.
Murray, R.J., & Trefts, D.E. (2000). The IT Im-
Journal of Management Information Systems 12
perative in Business Transformation. Information
(1), 9-30.
Systems Management 17 (1), 17-22.
Leith, SA. (1994). Critical success factors for
Palmer, J. (2003, March). IT Enterprise Architec-
re-engineering business processes. National
ture at the ABS. Paper presented at the Australian
Productivity Review 13 (4), 559-568.
Government Information Management Office
Lloyd, P.T., & Galambos, G.M. (1999). Technical (AGIMO) Seminar, Enterprise Architecture:
Reference Architectures. IBM Systems Journal Integrating Business and Technology Across the
38 (1), 51-75. Australian Public Service, Canberra, Australia.
Retrieved February 12, 2004, from http://www.
Martin, N.J. (2005). Business Strategy and IS/
agimo.gov.au/practice/delivery/events/2003/
IT Alignment: A study of Enterprise Architec-
ent_arch

434
Government Enterprise Architectures

Parasuraman, A., Zeithaml, V.A., & Berry, L.L. Sowa, J.F., & Zachman J.A. (1992). Extending
(1985). A conceptual model of service quality and formalizing the framework for Information
and its implications for future research. Journal Systems Architecture. IBM Systems Journal 31,
of Marketing 49 (4), 41-50. 590-616.
Porter, M.E. (1980). Competitive Strategy: Tech- Spewak, S.H., & Hill, S.C. (1993). Enterprise
niques for analyzing Industry and Competitors. Architecture Planning: Developing a Blueprint
New York: Free Press. for Data, Applications and Technology, New
York: John Wiley and Sons.
Porter, M.E. (1981). The Contributions of
Industrial Organization to Strategic Management. Targowski, A. (1990). The Architecture and
The Academy of Management Review 6 (4), 609- Planning of Enterprise-Wide Information Man-
620. agement Systems, Harrisburg, PA: Idea Group
Publishing.
Porter, M.E. (1991). Towards a Dynamic Theory
of Strategy. Strategic Management Journal 12, The Economist. (Ed.). (1991). The Good Statistics
95-117. Guide, July 320 (7723), 88.
Pyburn, P. (1983). Linking the MIS Plan with The Economist. (Ed.). (1993). The Good Statistics
Corporate Strategy: An Exploratory Study. MIS Guide, November 328 (7828), 65.
Quarterly 7 (2), 1-14.
The Open Group. (2006). The Open Group Archi-
Raghunathan, B., & Raghunathan, T.S. (1989). tecture Framework Version 8.1.1. Boston, MA:
MIS Steering Committees: Their Effect on The Open Group.
Information Systems Planning. Journal of
Treadwell, J. (2003, March). Centrelink, Capa-
Information Systems, Spring, 104-116.
bilities, and Connections. Paper presented at the
Reich, B.H, & Benbasat, I. (1996). Measuring Australian Government Information Management
linkages between Business and IT Objectives. Office (AGIMO) Seminar, Enterprise Archi-
MIS Quarterly 20 (1), 55-81. tecture: Integrating Business and Technology
Across the Australian Public Service, Canberra,
Reich, B.H, & Benbasat, I. (2000). Factors that
Australia. Retrieved February 12, 2004, from
influence the Social Dimension of Alignment
http://www.agimo.gov.au/practice/delivery/
between Business and Information Technology
events/2003/ent_arch
Objectives. MIS Quarterly 24 (1), 81-113.
Venkatraman, N., Henderson, J.C., & Oldach.
Sabherwal, R., & Chan, Y.E. (2001). Alignment
S. (1993). Continuous Strategic Alignment: Ex-
between Business and Information Systems
ploiting Information Technology Capabilities for
Strategies: A Study of Prospectors, Analyzers,
Competitive Success. European Management
and Defenders. Information Systems Research
Journal 11 (2), 139-149.
12 (1), 11-33.
Zachman, J.A. (1987). A framework for Informa-
Smith, B. (1994). Business Process Re-engineer-
tion Systems Architecture. IBM Systems Journal
ing: more than a buzzword, Human Resources
26, 276-292.
Focus 7 (1), 17-18.

435
Government Enterprise Architectures

Appendix A Enterprise Architecture Study Questions Guide

Indicative questions that were used in the semi-structured and unstructured case interviews are outlined
as follows:

Section 1. Enterprise Architecture Frameworks and Methods

Do you use Enterprise Architecture in your organization? If so, can you outline the framework or method
used to build the architecture? What resources are used to implement the Enterprise Architecture?

What structures (eg, business, applications, infrastructure) are inherent in the architecture?

Can you please describe the artifacts (eg, systems, specific models, processes, plans, services) that
comprise the architecture?

In your experience, what parts of the architecture work well and what parts work not so well? Why?

Section 2. Architecture Structure and Components

Please describe your IS/IT/IM environment and the various components (eg, staffing, governance,
hardware, software, capabilities, technologies, toolsets, languages, modeling languages).

Can you describe some of the development/design activities, business processes and procedures used
to develop your organization and guide its operations?

Do you use any specific systems development and/or project management methods for developing in-
formation systems or executing projects?

Does the systems development method consider the lifecycle aspects of the system?

Are data dictionaries or electronic glossaries available for use within your organization?

Is it possible to describe or graphically depict the organizational structure?

Section 3. Social Dimensions of Alignment

Does the management team support you and the work you do?

What type of management support do you get for the business strategy execution, information systems
infrastructure proposals and Enterprise Architecture?

What management support mechanisms are in place?

436
Government Enterprise Architectures

Does your organization have a strategic plan? If so, how is the plan compiled ?

Does your organization have a corporate business plan? If so, how is the plan compiled ?

Are you aware of your organizations business/corporate/enterprise strategies and objectives?

How would you characterize the business planning style (eg, top-down, bottom-up, collegiate, decen-
tralized) in your organization?

What business planning communications are in place for business strategy and information systems
planning activities within the agency? Do you communicate with external stakeholders or parties? If
so, how?

Section 4. Alignment Methods and Alignment

How do you achieve alignment? Do things like strategic planning, business modeling, and non-execu-
tive/executive reviews help alignment? How?

What other organizational mechanisms help alignment?

Do you think Enterprise Architecture helps alignment? How?

Would you consider that your organizational information systems help you deliver your business strate-
gies? If yes, to what extent do they assist you?

Would you consider that your organizational information systems help you address external business
drivers? If yes, to what extent do they assist you?

Do you meet your annual outputs, in terms of performance, reliability and service level agreement
targets, using the organizational information systems?

Would you say that the business outputs would be negatively impacted if there was less (or a poorer)
fit between information systems infrastructure and business strategy? Please provide reasons for your
answer?

437
438

Compilation of References

Abramson, M.A., Breul, J.D., & Kamensky, J.M. Allan, K. (1994). Speech act classification and defini-
(2006). Six Trends Transforming Government. IBM tion. In R. Asher (Ed.), Encyclopedia of Language
Center for The Business of Government Report. Re- and Linguistics (Vol. 8, pp. 4124- 4127): Oxford:
trieved September 7, 2007, from http://www.busines- Pergamon Press.
sofgovernment.org/pdfs/SixTrends.pdf.
Allega, P.J. (2005); Architecture framework debates
Accenture (2005) Leadership in Customer Service: are irrelevant; Gartner report G00127331, 07 Jun
New Expectations, New Experiences. The Govern- 2005.
ment Executive Series, Accenture, April 2005. Re-
Allega, P.J. (2005); Enterprise Architecture will
trieved May 25th, 2006, from http://www.accenture.
never realize a return on investment; Gartner report
com/NR/rdonlyres/F45CE4C8-9330-4450-BB4A-
G00128285, 24 Jun 2005.
AF4E265C88D4/0/leadership_cust.pdf) .
Alting van Geusau-Ghosh, S., Zeef, P, Toorn, H. van,
Adams, Jonathan; Koushik, Srinivas; Vasudeva, Guru;
& Visch, E. (2006). Globaal Ontwerp Persoonlijke
and Galambos George. (2001). Patterns for E-Business:
Internet Pagina, version 1.2. The Hague, The Nether-
A Strategy for Reuse. Mc Pr Llc, ISBN: 1931182027.
lands: Stichting ICTU. Retrieved July 17, 2007, from
Adigun M. O., & Biyela D. P. (2003) Modelling and http://www.e-overheid.nl/data/files/PIP/Globaal_Ont-
Enterprise for re-Engineering: A Case Study. In the werp_versie_1[1].2.pdf.pdf
2003 annual research conference of the South Afri-
Ambite, Jos Luis; Giuliano, Genevieve; Gordon, Pe-
can institute of computer scientists and information
ter; Decker, Stefan; Harth, Andreas; Jassar, Karanbir;
technologists on Enablement through technology
Pan, Qisheng; and Wang, LanLan. (2005). Argos: An
(SAICSIT 2003), ACM.
Ontology and Web Service Composition Infrastructure
Agha, Gul, A. (2002) . Adaptive Middleware. Com- for Goods Movement Analysis, Information Sciences
munications of the ACM, 45(6). Institute School of Policy, Planning, and Development,
Digital Gov. Website.
Agranoff, R. and McGuire, M. (2001). Big questions
in public network management research. Journal of Ambler, S. W. (2002). Agile Modeling: Effective
Public Administration Theory and Research 11(3), Practices for Extreme Programming and the Unified
295326. Process. New York, New York: John Wiley & Sons.

Alexander, C; Ishikawa, S., Silverstein, M., Jacobson, American Customer Satisfaction Index (ACSI), e-
M., Fiksdahl-King, I., and Angel, S. (1977). A pattern Government Satisfaction Index (2005) Number of
Language. Oxford University Press. e-GOV sites measuring satisfaction surges, satisfac-
tion growth stalls. March 15, 2005. Retrieved May
Alfred Tat-Hei. (July/August 2002). Reinventing Local
25th, 2006, from
Government and the E-government initiative. Public
Administration Review, 62(4): 434-444.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Compilation of References

Anderson, Ross (2001). Security Engineering: A Embedded and Real-Time Computing Systems and
Guide to Building Dependable Distributed Systems. Applications, Hong Kong, China.
New York: Wiley.
ATHENA Project. (2005). D.A6.1, Specification of a
Ankolekar, V. (2003). Application Development Basic Architecture Reference Model.
Technology & Tools: Vulnerabilities & Threat
Austin, J. L. (1962). How to do things with Words.
Management with Secure Programming Practices, a
Cambridge, MA: Harvard University Press.
defense in-depth approach. GIAC Security Essentials
Certification (GSEC) Practical Assignment, Version Austria (2006). Administration on the Net An ABC
1.4b, Option 1. 10 November 2003. Guide to E-Government in Austria. Vienna, Austria:
Oesterreichische Computer Gesellschaft. Retrieved
Anthopoulos L., Siozos P., & Tsoukalas I. A. (2007)
July 17, 2007, from http://www.cio.gv.at/egovernment/
Applying Participatory Design and Collaboration in
umbrella/Administration_on_the_Net.zip.
Digital Public Services for discovering and re-design-
ing e-Government services. Government Information Babb, J. (2006). Signification and Information Systems
Quarterly, Volume 24, Issue 2, April 2007, Pages Security Policies: a Semiotic Analysis and Case Study.
353-376, ElSevier. Virginia Commonwealth University School of Busi-
ness, Department of Information Systems.
Anthopoulos, L., & Manos A. (2005) e-Government
beyond e-administration. The evolution of municipal Bace, R., Mell, P. (?). NIST-SP800-31 Intrusion Detec-
area environments could establish a digital framework tion Systems. NIST Special Publication on Intrusion
of confidence for citizens. In the 5th European Confer- Detection Systems.
ence on e-Government, (ECEG 2005) University of
Antwerp, Belgium, 16-17 June 2005. Bach, K., & Harnish, R. M. (1979). Linguistic Com-
munication and Speech Acts. Cambridge MA: MIT
Anthopoulos, L., & Tsoukalas, I.A. (2005) The imple- Press.
mentation model of a Digital City. The case study of
the first Digital City in Greece: e-Trikala. Journal of Barker, W. (June 2004). NIST Special Publication
e-Government, Vol.2, Issue 2, 2005. Haworth Press, 800-60 Volume 1: Guide for Mapping Types of Infor-
Inc., University of Southern California, Center for mation and Information Systems to Security Catego-
Digital Government. ries. National Institute of Standards and Technology.
Computer Security Division.
Arens, Yigal; and Rosenbloom, Paul. (2002). Respond-
ing to the Unexpected, USC/Information Sciences Barnett W., Presley A., Johnson M., & Loles D.H.
Institute, NSF Workshop. (1994); An Architecture for the Virtual Enterprise;
1994 IEEE International Conference on Systems,
Armour Dr. F., Kaisler Dr. S., Getter J., & Pippin D. Man, and Cybernetics, 1 (pp. 506-511)
(2003); A UML-driven Enterprise Architecture case
study; Proceedings of the 36th Hawaii International Battle, S., Bernstein, A., Boley, H., Grosof, B., Grun-
Conference on System Sciences (HICSS) 2003. inger, M., Hull, R., et al. (2005). Semantic Web Services
Framework (SWSF).
Armour, F. J., Emery, C., Houk, J., Kaisler, S. H., &
Kirk, J.S. (2007). The Integrated Enterprise Lifecycle: Bauer, Johannes M. (2004). Harnessing the Swarm:
Enterprise Architecture, Investment Management and Communications Policy in an Era of Ubiquitous Net-
System Development. In Saha, P. (Ed.). Handbook of works and Disruptive Technologies. Communications
Enterprise Systems Architecture in Practice. Hershey, & Strategies, 54, 2nd quarter.
PA: IGI Global Information Science Reference. Baum, C., & Di Maio, A. (2000). Gartners Four Phases
Arora, A., Ramnath, R., Ertin, E., Sinha, P. (2005). of E-Government Model. Gartner Group Research
ExScal: Elements of an Extreme Scale Wireless Sen- Note. Retrieved June 15, 2007, from http://aln.hha.
sor Network, 11th IEEE International Conference on dk/IFI/Hdi/2001/ITstrat/Download/Gartner_eGov-
ernment.pdf.

439
Compilation of References

Bayens, G.I.H.M. (2006). E-Government in The Betz, C. T. (2006). Architecture and Patterns for IT
Netherlands: An Architectural Approach, Via Nova Service Management, Resource Planning, and Gov-
Architectura, October 9, 2006. Retrieved July 17, 2007, ernance: Making Shoes for the Cobblers Children.
from http://www.via-nova-architectura.org. San Francisco, CA: Morgan Kaufmann.

Bayens, G.I.H.M., et al. (2007). Nederlandse Overheid Bevir, M., & Rhodes, R. A. W. (2001). A Decentered
Referentie Architectuur (NORA) v. 2.0. The Hague, Theory of Governance (Working Paper 2001-10).
The Netherlands: Stichting ICTU. Retrieved July 17, Berkeley: Institute of Governmental Studies, Uni-
2007, from http://www.e-overheid.nl/atlas/referen- versity of California.
tiearchitectuur/
Bittler, R.S., & Kreizman, G. (2005). Gartner Enter-
B-dossier (2007). B-dossier project Website. Enschede, prise Architecture Process: Evolution 2005. Gartner
The Netherlands: Telematica Instituut. Retrieved July Group Research Note, G00130849. Retrieved July 27,
17, 2007, from http://www.b-dossier.nl. 2007, from http://www.gartner.com/research/spot-
light/asset_50080.jsp.
Beck, K. (1999). Extreme Programming Explained:
Embrace Change. Boston: Addison-Wesley Profes- Booch, G., Rumbaugh, J., and Jacobson I. (1999). The
sional. Unified Modeling Language User Guide. New York,
NY: Addison-Wesley Object Technology Series.
Bernard, S, A. (2005). An Introduction To Enterprise
Architecture: Second Edition. Bloomington, Indiana: Borins, Sandford. (2006). The Challenge of Innovating
AuthorHouse. in Government (2nd ed.). Retrieved 5 June 2007 from
IBM Center for the Business of Government Web
Bernard, S. (2001). Evaluating Clinger-Cohen Com-
site: http://www.businessofgovernment.org/pdfs/Bo-
pliance in Federal Agency Chief Information Officer
rinsReprint.pdf
Positions. Doctoral Dissertation, Virginia Polytechnic
Institute and State University, Blacksburg, VA. Bos, H. (2005). De ICT-strategie van de Gemeente
The Hague (2001-2007). Utrecht, The Netherlands:
Bernard, S. A. (2004). An introduction to enterprise
Informatiehuis. Retrieved July 17, 2007, from
architecture. Bloomington, IN: AuthorHouse.
http://www.egem.nl/projecten/voorhoedegemeen-
Bernard, S. A. (2004). Enterprise Architecture Man- ten/kennisconferentie2006/documenten/Evaluatie%
agement Maturity (EAMM) Enterprise Architecture 20Haagse%20aanpak%20door%20Informatiehuis.
Development, Documentation and Measurement. pdf?searchterm=None
Lecture notes for the enterprise architecture course
Bovens, M.; and Zouridis, S. (2002). From Street-Level
sponsored by Korea IT Industry Promotion Agency,
to System-Level Bureaucracies. Public Administration
Seoul, Korea.
Review 62(2): 174-184.
Berners-Lee, T., Hendler, J., & Lassila, O. (2001).
Bozeman, B., and Straussman, J.D. (1990). Public
The Semantic Web. SCIENTIFIC AMERICAN, May
management strategies: Guidelines for managerial
2001.
effectiveness. San Francisco, CA: Jossey-Bass, Inc.
Bernus, P., & Nemes, L. (1996). A framework to
BPMI. Business Process Management Initiative,
define a generic enterprise reference architecture and
www.BPMI.org.
methodology. Computer Integrated Manufacturing
Systems, 9(3), 179-191. Brahim Medjahed, Abdelmounaam Rezgui, Athman
Bouguettaya, & Ouzzani, M. (2003). Infrastructure
Bernus, P., Nemes, L., & Schmidt, G, (Eds.). (2003).
for E-Government Web Services. IEEE Internet
Handbook on Enterprise Architecture. Berlin :
Computing, 7(1), 58-65.
Springer.

440
Compilation of References

Breul, J.D. (2006). What is Transformation?. In M.A. C4ISR Architecture Framework (Version 2.0) (1997);
Abramson, J.D. Breul, & J.M. Kamensky (Eds.), Six C4ISR Architectures Working Group (USA) ; Depart-
Trends Transforming Government (p. 7). Retrieved ment of Defense (USA)
16 April 2007 from IBM Center for the Business of
Cabinet Office (2005), Transformational Government,
Government Web site: http://www.businessofgovern-
Enabled by IT. Retrieved 31st July 2007 from http://
ment.org/pdfs/SixTrends.pdf
www.cio.gov.uk/documents/pdf/transgov/transgov-
Breul, J.D., & Morales, A. (2007, June). 2007-2008 strategy.pdf
Research Announcement: Providing Cutting Edge
Cabinet Office (2007), Chief Technology Officer
Knowledge to Government Leaders. Retrieved 16
Council. Retrieved 31st July 2007 from http://www.
July 2007 from IBM Center for Business of Govern-
cio.gov.uk/chief_technology_officer/index.asp
ment Web site: http://www.businessofgovernment.
org/pdfs/Research_Announcement_07.pdf Cap Gemini Ernst & Young (2003) Online availabil-
ity of public services. How is Europe progressing?
Browne, A., & Wildavsky, A. (1984). Should Evolution
Information Society DG, 2003.
become Implementation: Pressman and Wildavsky.
CCA. (1996). Clinger-Cohen Act of 1996: Information
Bruce, E. (2005, 21-22 February). Linking Enterprise
Technology Management Reform, Public Law 104-106,
Architectures between Multiple Government Agencies
Fiscal Year 1996 Defense Authorization Act.
The NZ Experience. Paper presented at the Confer-
ence in Enterprise Architecture for Government, Center for Information Technology, National Institutes
Canberra, Australia. of Health Canadian Trusted Computer Product Evalu-
ation Criteria (CTCPEC). Accessed from http://www.
BSI DISC. (1998). The TickIT Guide A Guide to
alw.nih.gov/Security/FIRST/papers/criteria/ctcpec1.
Software Quality Management System, Consturction
ps.
and Certification to ISO 9001.
Checkland, P. (1981). Systems Thinking, Systems
Burger@Overheid (2005). BurgerServiceCode, versie
Practice. Chichester: Wiley.
2.1. The Hague, The Netherlands: Burger@Overheid.
nl. Retrieved July 17, 2007, from http://www.burger. Chen, D., Vallespir, B., & Doumeingts, G. (1997).
overheid.nl/files/burgerservicecode_nl.pdf GRAI integrated methodology and its mapping onto
generic enterprise reference architecture and method-
Burger@Overheid (2006). Evaluatieonderzoek 2006.
ology. Computers in Industry, 33, 387-394.
The Hague, The Netherlands: Burger@Overheid.nl.
Retrieved July 17, 2007, from http://www.burger.over- Chief Information Officer (CIO) Council (2001) A Prac-
heid.nl/files/b@o_evaluatieonderzoek_bop_2006. tical Guide to Federal Enterprise Architecture, version
pdf 1.0, February 2001. Retrieved May 25th, 2006, from
http://www.gao.gov/bestpractices/bpeaguide.pdf
Burk, R.R. (2006, 21-22 February). Enterprise Gov-
ernance: Defining the Long Term Vision. Paper pre- Child, J. (1972). Organizations, Structure, Environ-
sented at the Conference in Enterprise Architecture ment, and Performance: The Role of Strategic Choice.
for Government, Canberra, Australia. Sociology, 6 1-22.
BuyIT Best Practice Network & Shared Services Ad- Chrissis, B. M., Konrad, M., & Shrum, S. (2007).
visory Group. (2006). Shared Services in the Public CMMI Guidelines for Process Integration and
Sector: Vision. Retrieved 27 April 2007 from BuyIT Product Improvement. 2nd Ed. Addison-Wesley.
Best Practice Network Web site: http://www.buyitnet.
org/Best_Practice_Guidelines/SharedServicesPub- CIO Council. (1999). Federal Enterprise Architecture
Sect/docs/G1%20Vision.pdf Framework, Version 1.1. Retrieved February 20, 2008
from http://www.whitehouse.gov/omb/egov/a-1-fea.
html

441
Compilation of References

Claudio Masolo, Stefano Borgo, Aldo Gangemi, Ni- Defence Architecture Framework Resources (CD)
cola Guarino, & Oltramari, A. (2003). WonderWeb: (Version 1.0) (2005); Australian Government, Depart-
Deliverable D1.8, Ontology Library (IST Project ment of Defence (Chief Information Officer Group)
2001-33052).
Deloitte and Touch (2001). The Citizen as Customer.
Clements, P. et. al. (2003). Software Architecture in CMA Management, 74(10), 58.
Practice, (2nd ed.) New York, NY: Addison Wesley.
Demchenko, Y., Gommans, L., De Laat, C., Ouden-
CMG. Capacity Management Group aarde, B., Tokmakoff, A., Snijders, M., et al. (2005).
Security Architecture for Open Collaborative Environ-
Collison C., & Parcell G. (2005); KM Self-Assess-
ment. Paper presented at the European Grid Conference
ment; Retrieved 01/04/2007 from Learning to Fly
- EGC 2005, Amsterdam, The Netherlands.
Website (http://www.chriscollison.com/l2f/whatiskm.
html#assessment) Deming W. E. (1982). Out of the Crisis, Cambridge,
MA: MIT Press.
Commission on Federal Paperwork. (1977). Informa-
tion resources management: A report of the com- Denmark (2006). Architecture for e-Government in
mission on federal paperwork. Washington, D.C.: Denmark. Offentlig Information Online. Retrieved
Government Printing Office. July 17, 2007, from http://www.oio.dk/arkitektur/
eng.
CommonCriteria.org (2005) Common Criteria for In-
formation Technology Security Evaluation (CCITSE). Department of Defense Directive 5200.28-STD (De-
Accessed from http://www.commoncriteriaportal. cember 1985) Trusted Computer System Evaluation
org/public/consumer/index.php?menu=2. Criteria (TCSEC). Accessed from http://www.boran.
com/security/tcsec.html.
Computer Systems Laboratory of the National In-
stitute of Standards and Technology. (1993). FIPS Department of Defense. (2007). The Department of
Publication 183. Defense Architecture Framework Version 1.0. The
Department of Defense. Retrieved February 20,
COPS 03-1. http://www.cops.usdoj.gov/txt/fact_
2008 from http://www.defenselink.mil/cio-nii/docs/
sheets/e01060007.txt
DoDAF_Volume_I.pdf DoDAF 1.5
Cross, Cross, S. et al. (2002). SEI Independent Research
Derks, W.L.A., & Lankhorst, M.M. (2006). Definitie
and Development Projects, TECHNICAL REPORT
en conceptualisatie van het Bdossier. Technical
CMU/SEI-2002-TR-023 ESC-TR-2002-023.
Report TI/RS/2006/013. Enschede, The Netherlands:
CSIRT Services. Carnegie Mellon University. (2002). Telematica Instituut. Retrieved July 17, 2007, from
Software Engineering Institute. CERT Coordination https://doc.telin.nl/dscgi/ds.py/Get/File-61820
Center. Stelvio bv, The Netherlands; PRESECURE
Desai, Anand. (2005). Special Issue: Adaptive Com-
Consulting GmbH, Germany. Accessed July 2002
plex Systems. CACM 49(5).
from http://www.cert.org/csirts/services.html.
Devadoss, P., Pan, S., & Huang, J. (2002) Structura-
D. Apostolou, L. Stojanovic, T. Pariente Lobo, &
tional analysis of e-Government initiatives: a case
Thoenssen, B. (2005). Towards a Semantically-Driven
study of SCO. Decision Support Systems, vol. 34, p.
Software Engineering Environment for eGovernment.
253-269, ElSevier.
In (Vol. 3416, pp. 157 168): LNAI.
DGI. (2003). Deutscher Corporate Governance Kodex.
DAML. www.daml.org. The DARPA Agent Markup
Retrieved May 21, 2003 from http://www.corporate-
Language (DAML).
governance-code.de/ger/kodex/index.html.
Davenport, T. H. (1992). Process innovation: Reengi-
Dietz, J. L. G., & Mulder, J. B. F. (1998). Organisational
neering work through information technology. Boston,
transformation requires constructional knowledge of
MA: Harvard Business School Press.

442
Compilation of References

business systems. Paper presented at the 31st Annual Government. D121Services and process models
HICCS. functional specifications, 2002. Retrieved August
15th, 2007, from http://www.egov-project.org/egov-
Digtalgovernment. Government agencies affiliated
site/eGOV_D121.zip.
with dg.o, are known as the Digital Government
Consortium. Member agencies often partner with NSF Elliman, T., Irani, Z., & Jackson, P. (2007). Establish-
research performers and the private sector to leverage ing a framework for eGovernment research: project
information technology research and identify financial VIEGO. Transforming Government: People, Process
resources to help build the Digital Government of the and Policy, 1(4), 364-376.
21st Century. www.digitalgovernment.org
Emery, G.R. (2003, July 21). It aint easy getting to
DIP Project. (2004). D9.3 e-Government ontology. green: Most agencies making progress but manage-
ment goals yet to be achieved. WashingtonTechnology.
DoD. (2006). Department of Defense Chief Information
Retrieved Oct 25, 2007 from http://www.washington-
Officer Desk Reference. Vol.1 Foundation Documents.
technology.com/print/18_8/21225-1.html
United States Department of Defense,
EquaTerra & International Public Management As-
Donaldson, L. (1999). The Normal Science of Struc-
sociation for Human Resources [IPMA-HR]. (2006,
tural Contingency Theory, in S.R.
June). Human Resources Transformation in Public
Donnelly, M. (April 2000). An Introduction to LDAP. Sector Organizations. Retrieved 2 May2007 from
Obtained from http://www.ldapman.org/articles/in- the IPMA-HR Web site: http://www.ipma-hr.org/pdf/
tro_to_ldap.html. TransformationWhitePaper.pdf

Dool, F. van den, Keller, W.J., Wagenaar, R. & Eriksson, H; and Penker, M. (2000). Business Model-
Hinfelaar, J.A.F. (2002) Architectuur elektronische ing with UML: Business Patterns at Work. New York,
overheid. Samenhang en Samenwerking. Zoetermeer, NY: John Wiley.
The Netherlands: Verdonck Klooster & Associates.
European Commission (2002) eEurope 2005: An
Retrieved July 17, 2007, from http://www.e-overheid.
information society for all. European Commission
nl/data/files/architectuur/architectuurelektronische-
- COM 263, 2002. Retrieved August 15th, 2007, from
overheid.pdf.
http://europa.eu.int/eeurope
Doumeingts G., Ducq Y., Vallespir B., & Kleinhans
European Commission (2004). European Interoper-
S., (2000). Production management and enterprise
ability Framework for Pan-European e-Government
modelling. Computers in Industry, 42, 245-263.
Services, version 1.0. Retrieved July 17, 2007, from
Drazin, Robert; and Van de Van, Andrew H. (1985). http://ec.europa.eu/idabc/servlets/Doc?id=19529.
Alternative Forms of Fit in Contingency Theory. Ad-
Fayyad, Usama; and Uthurusamy, Ramasamy. (2002).
ministrative Science Quarterly, 30, 514-539.
Into Evolving Data Mining Solutions for Insights.
Duttaroy A. (2005); Five Ms of Meta Data; DM Review CACM, 45,(8).
(http://www.dmreview.com) April 2005.
Federal Enterprise Architecture (FEA) Working Group
EA Shared Interest Group. (2005). Advancing Enter- (2002) E-Gov Enterprise Architecture Guidance
prise Architecture Maturity, version 2.0. American Common Reference model. (July 25, 2002). Retrieved
Council for Technology/Industry Advisory Council. August 15th, 2007, from http://www.feapmo.gov/re-
sources/E-Gov_Guidance_Final_Draft_v2.0.pdf
EFQM. (2006). The EFQM Excellence Award, In-
formation Brochure for 2006, Version 2. European Federal Enterprise Architecture (FEA) Working
Foundation for Quality Management. Group (2005) Enabling Citizen-Centered Electronic
Government. 2005-2006 FEA-PMO Action Plan.
eGov Consortium (2002) IST Project 2000 28471. Retrieved August 15th, 2007, from www.whitehouse.
An Integrated Platform for Realising One-Stop

443
Compilation of References

gov/omb/egov/documents/2005_FEA_PMO_Ac- Computer Security Division - Information Technol-


tion_Plan_FINAL.pdf ogy Laboratory - National Institute of Standards and
Technology.
Federal Information Processing Standards Publica-
tion 199. (February 2004).Standards for Security Friedman, T.L. (2005). The world is flat: A brief his-
Categorization of Federal Information and Informa- tory of the twenty-first century. New York, NY: Farrar,
tion Systems. National Institute for Standards and Straus and Giroux
Technology, Computer Security Division.
Furlong G. (2001); Knowledge management and the
Federal Trade Commission. (June 1998). Privacy competitive edge; University of Greenwich Business
Online: A Report to Congress. Chapter 3: Fair Infor- School; 2001, revised May 2003.
mation Practice Principals. Accessed July 2006, from
Gabbar, H.A., Shimada Y., & Suzuki K., (2002).
http://www3.ftc.gov/reports/privacy3/priv-23a.pdf.
Computer-aided plant enterprise modelling environ-
Federal Trade Commission. (May 2000). Privacy ment (CAPE-ModE) design initiatives. Computers
Online: Fair Information Practices in the Electronic in Industry, 47, 25-37.
Marketplace: A Report to Congress. Accessed July
Gamma, E., R.; Helm, R. Johnson; Vlissides, J. (1995).
2006, from http://www.ftc.gov/reports/privacy2000/
Design Patterns, Elements of Reuseable Object Ori-
privacy2000.pdf.
ented Software. New York, NY: Addison Wesley.
Fensel D., C. Bussler, & Maedche, A. (2002). Semantic
Gant, J., & Gant, D. (2002) Web portal functionality
Web Enabled Web Services. Paper presented at the
and State Government E-service. In the proceedings
ISWC 2002.
of the 35th Hawaii international conference on system
Firstgov. To facilitate efforts to transform the Federal sciences (IEEE 2002).
Government to one that is citizen-centered, results-
GAO. (2003). A Framework for Assessing and Improv-
oriented, and market-based, the Office of Management
ing Enterprise Architecture Management, version 1.1.
and Budget (OMB) is developing the Federal Enterprise
United States General Accounting Office.
Architecture (FEA), a business-based framework for
Government-wide improvement. www.firstgov.gov. German Federal Government (2003). BundOnline
2005. 2003 Implementation Plan. Retrieved May 25th,
FISMA Implementation Project. (2003). National
2005, from http://www.bunde.de
Institute for Standards and Technology, Computer Se-
curity Division. Accessed July 2006, from http://csrc. Germany (2007). Standards und Architekturen fr
nist.gov/sec-cert/ca-proj-phases.html. E-Government-Anwendungen (SAGA 3.0). Berlin:
Koordinierungs- und Beratungsstelle der Bundesr-
Flinders, M. (2005). The Politics of Public-Private
egierung fr Informationstechnik in der Bundesver-
Partnerships. The British Journal of Politics and
waltung. Retrieved July 17, 2007, from http://www.
International Relations (BJPIR), 7, 215-239.
kbst.bund.de/saga.
Fountain, J.E. (2001). Building the Virtual State
Ghosh, S. (2006). PIP Architectuur white paper, ver-
Information Technology and Institutional Change.
sion 0.3. Stichting ICTU, The Hague, The Netherlands.
Washington, DC: Brookings Institution Press.
Retrieved July 17, 2007, from http://www.e-overheid.
Fowler, M. (1997). Analysis Patterns: Addison-Wesley. nl/data/files/PIP/PIP%20architectuur%20whitepaper
New Performance Framework Measures Public Value %20v0.3%20concept.pdf
of IT, Research Note, 8 July 2003 2003).
Gil-Garcia, J.R., & Pardo, T.A. (2005). E-Government
Frankel, S., Kent, K., Lewkowski, R., Orebaugh, A., success factors: mapping practical tools to theoreti-
Ritchey, R., & Sharma, S. (December 2005). NIST- cal foundations. Government Information Quarterly,
SP800-77 Guide to IPsec VPNs - Recommendations 22(2), 187-216.
of the National Institute of Standards and Technology.

444
Compilation of References

Godart, C. Saliou H., & Bignon, J.C. (2001) Asyn- tional Conference on Electronic Commerce Edited by:
chronous Coordination of Virtual Teams in Creative Marijn Janssen, Henk G. Sol, and Ren W. Wagenaar.
Applications (co-design or co-engineering): Require- Copyright ACM 1-58113-930-6/04/10.
ments and Design Criteria. IEEE.
Governance and Performance: New Perspectives
Goldkuhl, G. (1996). Generic business frameworks Washington, DC: Georgetown University Press pp.
and action modeling. Paper presented at the 1st In- 263-291.
ternational Workshop on Communications Modeling
Government of British Columbia (2004). e-Govern-
- The Language/Action Perspective.
ment Plan. Office of the Chief Information Officer,
Goldstein, H (2005) Who Killed the Virtual Case Ministry of Management Services. Retrieved June 18,
File?, IEEE Spectrum September 2005, http://www. 2007, from www.cio.gov.bc.ca/ebc/egovplan20041215.
spectrum.ieee.org/print/1455 pdf.

Good, J (2004) Defining an Architecture Roadmap Government of Ontario, Office of the Premier (2006).
that talks to the Enterprise Culture, EA Conference Description of the role of the Treasury Board / Man-
Europe 2004, London, IRM UK Ltd agement Board of Cabinet. Retrieved 30th July 2007,
from http://www.premier.gov.on.ca/team/Committee.
Good, J and Fairhead, N (2007) Getting started in
asp?Team=2
Enterprise Architecture EA Conference Europe 2007,
London, IRM UK Ltd (copyright Serco Consulting, Government of Western Australia (2004). e-Gov-
used with permission) ernment Strategy for the Western Australian Public
Sector. Office of e-Government, Department of the
Gore, A. (1993). Creating a government that works
Premier and Cabinet. Retrieved June 18, 2007, from
better and costs less: The report of the national per-
http://www.egov.dpc.wa.gov.au/documents/e-govern-
formance review. New York, NY: Penguin Books.
ment_strategy.doc.
Gortmaker, J. (2008). Designing a Reference Archi-
Grance, T. et. al. (January 2004). NIST Special Publi-
tecture for the Accountable & Adaptive Orchestration
cation 800-61: Computer Security Incident Handling
of Public Service Networks. Unpublished doctoral
Guide: Recommendations of the National Institute of
dissertation (forthcoming). Delft University of Tech-
Standards and Technology.
nology.
Grance, T. et. al. (October 2003). NIST Special
Gortmaker, J., & Janssen, M. (2004). Business Process
Publication 800-64: Security Considerations in the
Orchestration in e-Government: A Gap Analysis.
Information System Development Life Cycle: Rec-
International Resources Management Association
ommendations of the National Institute of Standards
(IRMA).
and Technology.
Gortmaker, J., & Janssen, M. (2007). Automating Gov-
Gregor, S., Hart, D., & Martin, N. (2007). Enterprise
ernmental Cross-Agency Processes Using Web Service
architectures: enables of business strategy and IS/IT
Orchestration: A Gap Analysis. In L. Al-Hakim (Ed.),
alignment in government. Information Technology &
Global E-Government: Theory, Applications and
People, 20(2), 96-120.
Benchmarking. Hershey: Idea Group Publishing.
Gresov, C. (1989). Exploring Fit and Misfit with Mul-
Gortmaker, J., Janssen, M., & Wagenaar, R. W. (2005).
tiple Contingencies. Administrative Science Quarterly
Accountability of Electronic Cross-Agency Service-
34, 431-453.
Delivery Processes. EGOV2005, 4th International
Conference on Electronic Government, 49-56. Groenlund, A. (1997). Public Computer Systems A
New Focus for Information Systems Research. Infor-
Gortmaker, Jeffrey; Janssen, Marijn; and Wagenaar,
mation Infrastructure and Policy, 6, 47-65.
Ren W. (2004). The Advantages of Web Service
Orchestration in Perspective. ICEC04, Sixth Interna-

445
Compilation of References

Gronlund, A. (2005). Whats In a Field Exploring the Arlington, VA: PricewaterhouseCoopers Endowment
eGoverment Domain. Paper presented at the 38th Ha- for the Business of Government.
waii International Conference on System Sciences.
Hjort-Madsen, K. (2007). Institutional patterns of
H. Koontz, Donnell, C. O., & Weihreich, H. (1980). enterprise architecture adoption in government.
Management (7th Edition ed.): McGraw Hill. Transforming Government: People, Process and
Policy, 1(4), 333-349.
Hall, M. (2005). Building and Enterprise Architec-
ture Website and Repository. Lecture notes for the Ho, S M. & Caldera, C. (2005). Eight Challenges
enterprise architecture course sponsored by Korea IT Faced By a Defense Contractor: An Interview with
Industry Promotion Agency, Seoul, Korea. a Security Chief. (ISC)2 Newsletter May-June 2005.
Obtained from https://www.isc2.org/cgi-bin/content.
Hall, W.P. (2000). Managing Technical Documentation
cgi?page=766 on July 18, 2006.
for Large Defence Projects: Engineering Corporate
Knowledge. In J.P.T. Mo & L. Nemes (Eds.) Global Ho, S M. (2006). Conceptualizing Security Archi-
Engineering, Manufacturing and Enterprise Networks tecture based on Enterprise Architecture. End-of-
(pp.370-378). Boston: Kluwer Academic Publishers. Coursework Statement. School of Information Studies,
Syracuse University. Obtained from http:// Web.syr.
Hammer, M.; and J. Champy. (1993). Reengineering
edu/~smho/research.htm.
the Corporation: A Manifesto for Business Revolution.
New York, NY: Harper. Ho, S M. (2006). The Mechanism Discovery of Person-
nel Anomaly Detection. ISOneWorld 2006 Doctoral
Harris, S. (2003). CISSP All-In-One Exam Guide,
Symposium, Las Vegas, Nevada, 19-21 April 2006.
Third Edition. McGraw-Hill/Osborne, Emeryville,
CA. ISBN: 0-07-222966-7. Ho, S M. (2008). Towards A Deeper Understanding of
Personnel Anomaly Detection. Encyclopedia of Cyber
Harvard Policy Group on Network Enabled Services
Warfare and Cyber Terrorism. IDEA Publications.
and Government (2000). Eight Imperatives for Leaders
in a Networked World: Guidelines for the 2000 Election Hogwood, B. W., & Gunn, L. A. (1984). Policy Analy-
and Beyond, John F. Kennedy School of Government, sis for the Real World. Oxford: Oxford University
Cambridge, MA. Retrieved June 18, 2007, from www. Press.
ksg.harvard.edu/stratcom/hpg/index.htm.
Holmes, A. (2007). Gov. Perdue knows IT. Government
Hash, J. et. al. (March 2005). NIST Special Publica- Executive. Retrieved August 8, 2007, from http://
tion 800-66: An Introductory Resource Guide for blogs.govexec.com/techinsider/archives/2007/08/
Implementing the Health Insurance Portability and gov_aligns_it_with_government.php
Accountability Act (HIPAA) Security Rule. National
Holowczak, Richard D.; Soon, Ae Chun; Artigas,
Institute of Standards and Technology.
Francisco J.; and Atlurit, Vijayalakshmi. (2003).
Hay, D. (1996). Data Models Patterns. NY: Dorste Customized Geospatial Workflows for E-Government
House Publishing. Services, Proceedings of the IEEE/WIC International
Conference on Web Intelligence, IEEE.
Hepp, M., Leymann, F., Domingue, J., Wahler, A.,
& Fensel, D. (2005, October 18-20). Semantic Busi- Hong Kong (2007). The HKSARG Interoperability
ness Process Management: A Vision Towards Using Framework. Version: 5.1. Hong Kong: Government
Semantic Web Services for Business Process Man- of the Hong Kong Special Administrative Region,
agement. Paper presented at the IEEE ICEBE 2005, Office of the Government Chief Information Officer.
Beijing, China. Retrieved July 17, 2007, from http://www.ogcio.gov.
hk/eng/infra/download/s18.pdf
Hiller, J. & Belanger, F. (2001). Privacy Strategies
for Electronic Government. E-Government Series.

446
Compilation of References

Horn, R. E. (1998). Visual language: Global com- ITU (1995), Open Distributed Processing - Reference
munication for the 21st century. Bainbridge Island, Model - Part 3: Architecture, ITU Recommendation
WA: MacroVu. X.903 | ISO/IEC 10746-3. Geneva, Switzerland: In-
ternational Telecommunication Union.
Hoven, J. van den, Wagenaar, R., Daskapan, S.,
Manders, N. Kenny, S. & Eldin, A.A. (2005), Manag- Iyer B., Shankaranarayanan G., & Wyner G. (2006);
ing Identity, Privacy & Profiles. Technical Report TI/ Process Coordination Requirements: Implications for
RS/2005/101, Enschede, The Netherlands: Telematica the design of Knowledge Management Systems; The
Instituut. Retrieved July 17, 2007, from https://doc. Journal of Computer Information Systems; Volume
telin.nl/dscgi/ds.py/Get/File-52040/TUD_sotas.pdf 46, Issue 5; 2006

Hughes, & Owen E. (1994). Public Management J Ramanathan and R. Ramnath. (2006). Co-engi-
and Administration: an introduction. New York: St. neering Business, Information Use, and Operations
Martins Press. Systems for IT-enabled Adaptation. Book chapter in
Adaptive Technologies and Business Integration:
ICTU. (2007). Flyer NORA v2. Retrieved June, 15,
Social, Managerial and organizational Dimensions,
2007, from http://www.e-overheid.nl/data/files/archi-
Publisher IDEAS.
tectuur/flyer-nora-v2.pdf
Jain, Sanjay; and McLean, Chuck; (2003). Model-
IFIPIFAC Task Force on Architectures for Enterprise
ing and Simulation for Emergency Response, NISY
Integration, (1999). GERAM: Generalised Enterprise
Technical Report, NISTIR 7071.
Reference Architecture and Methodology Version
1.6.3, Annex to ISO WD15704, Requirements for Jansen, W. & Karygiannis, T. NIST Special Publica-
enterprise-reference architectures and methodologies. tion 800-19: Mobile Agent Security. National Institute
March, pub: IFIP and IFAC. of Standards and Technology.

Iftikhar Z., Eriksson I.V., & Dickson G.W. (2003); Janssen, M., & Hjort-Madsen, K. (2007). Analyzing
Developing an Instrument for Knowledge Management Enterprise Architecture in National Governments:
Project Evaluation; Electronic Journal of Knowledge The cases of Denmark and the Netherlands. Paper
Management, Vol1, Issue 1, 2003, pp55-62 presented at the Hawaii International Conference on
System Sciences (HICSS), Hawaii, Big Island.
Infocomm Development Authority of Singapore
(2005). Singapore E-Government 2005. 2005 Report Janssen, M., Gortmaker, J., & Wagenaar, R. (2006).
on Singapore E-Government. Retrieved November Web Service Orchestration in Public Administration:
13, 2007, from www.igov.gov.sg/NR/rdonlyres/ Challenges, Roles, and Growth Stages. Information
C586E52F-176A-44B6-B21E-2DB7E4FA45D1/11228/ Systems Management, Spring 2006, pp. 4455.
2005ReportonSporeeGov.pdf.
Janssen, M., Gortmaker, J., & Wagenaar, R. W. (2006).
Innella, P. (December 2001). An Introduction to IDS. Web Service Orchestration in Public Administration:
SecurityFocus.com. Obtained from http://www.secu- Challenges, Roles, and Growth Stages. Information
rityfocus.com/infocus/1520. Systems Management(Spring 2006), 44-55.

Inter-Agency Benchmarking & Best Practices Council. Janssen, M., Kuk, G., & Wagenaar, R. W. (2008). A
(1996). Government Process Classification Scheme. Survey of Web-based Business Models for e-Govern-
Retrieved Dec. 2001, from http://www.va.gov/feds- ment in the Netherlands. Government Information
best/index.htm Quarterly, 25(2) (forthcoming).

Ishida, T. (2002). Digital City Kyoto. Communications Japan Quality Award Committee. (2000). Japan Qual-
of the ACM, July 2002, vol.45, No.7. ity Award Award Criteria: Innovation and Creation
for Competitiveness 2000 Ed. Japan Quality Award
IT Governance Institute. (2000): Management
Committee. Tokyo.
Guidelines for COBIT. Retreived June 29, 2004 from
http://www.isaca.org

447
Compilation of References

Jiang, H.C., & Mo, J.P.T. (2001). Internet Based http://egovstandards.gov.in/egs/eswg5/ enterprise-
Design System for Globally Distributed Concurrent architecture-working-group-folder/standards-and-
Engineering. Journal of Cybernetics and Systems, architectures-v2.pdf/ download
32(7), 737 754.
Kelly, S.; and Allison. M. A. (1998). The Complexity
Johannesson, P. (2001). A Language/Action based Advantage. New York, NY: McGraw Hill.
Approach to Information Modeling. In Rossi M. &
Kenniscentrum. (2007). NORA 2.0 (Nederlandse
Siau K. (Eds.), Information Modeling in the new Mil-
Overheid Referentie Architectuur): Stichting ICTU.
lenium: IDEA Publishing.
Kettl, D. (2000). The global public management revo-
Johannesson, P., & Wohed, P. (1998). Deontic Speci-
lution: A report on the transformation of governance.
fication Patterns - Generalisation and Classification.
Washington, D.C.: Brookings Institution Press.
Paper presented at the International Conference on
Formal Ontologies in Information Systems, Trento, Kettl, D. (2002). The transformation of governance.
Italy. Baltimore, MD: The Johns Hopkins University
Press.
Jones, S., Hackney, R., & Irani, Z. (2007). Towards
e-government transformation: conceptualising citizen King, C., Dalton, C., and Osmanoglu, T. Security
engagement: A research note. Transforming Govern- Architecture: Design, Deployment & Operations.
ment: People, Process and Policy, 1(2), 145-152. Osborne/McGraw-Hill, Berkeley, CA. ISBN: 0-07-
213385-6. 2001.
Jonkers H., van Buuren R., Arbab F., de Boer F., Bon-
sangue M., Bosma H., ter Doest H., Groenewegen L., Klein J; ECM best practices for the Enlightened En-
Scholten J.G., Hoppenbrouwers S., Iacob M., Janssen terprise, KM World; Vol 14, Issue5, May 2005
W., Lankhorst M., van Leeuwen D., Proper E., Stam A.,
van der Torre L., & van Zanten G.V. (2003); Towards Klijn, Erik-Hans. (1996). Analyzing and Managing
an Language for Coherent Enterprise Architecture Policy Processes in Complex Networks. Administra-
Descriptions; Proceedings of the Seventh IEEE In- tion and Society, 28(1), 90-119.
ternational Enterprise Distributed Object Computing Kling, R. et al. (2001). Transforming Coordination:
Conference (EDOC) 2003. The Promise and Problems of Information Technology
Kankanhalli A., & Tan B.C.Y. (2004); A review of in Coordination. In G. Olson, T. Malone, J.B. Smith.
Metrics for Knowledge Management Systems and The Interdisciplinary Study of Coordination. Mahwah,
Knowledge Management Initiatives; Proceedings of NJ: Lawrence Erlbaum Associates.
the 37th Hawaii International Conference on System Klischewski, R. (2004). Semantic Web for e-Govern-
Sciences 2004. ment - a Research Agenda. AIS SIG SEMIS Newsletter
Kaplan, R. S.; and D. P. Norton. (1996). The Balanced Volume 1, Issue 1.
Scorecard. Boston MA: Harvard. Klischewski, R., & Jeenicke, M. (2004). Semantic
Karygiannis, T. & Owens, L. (November 2002). Web Technologies for Information Management
NIST SP-800-48 Wireless Network Security - 802.11, within e-Government Services. Paper presented at
Bluetooth and Handheld Devices. Recommendations the 37th Hawaii International Conference on System
of the National Institute of Standards and Technology. Sciences.
Computer Security Division - Information Technol- Kosanke, K., Vernadat, F., & Zelm, M. (1999).
ogy Laboratory - National Institute of Standards and CIMOSA: enterprise engineering and integration,
Technology. Computers in Industry, 40, 83-97.
KBSt Publication Series (2003) SAGA: Standards Kramer, J. (2003). The CISA Prep Guide: Mastering
and Architectures for e-government Applications, the Certified Information Systems Auditor Exam.
Version 2.0. Retrieved August 15th, 2007, from

448
Compilation of References

Wiley Publishing, Indianapolis, Indiana. ISBN: 0- Conference (EDOC 2007). Los Alamitos, CA: IEEE
471-25032-5. Computer Society.

Kreizman, G., Baum, C., & Fraga, E. (2003). Gartner Lankhorst, M.M., et al. (2005). Enterprise Architecture
Enterprise Architecture: A Home for E-Government. at Work Modelling, Communication, and Analysis.
Gartner Group Research Note, TU-20-1831. Retrieved Berlin: Springer-Verlag.
June 15, 2007, from http://www.gartner.com/research/
Lapkin A. (2004); A users guide to architectural pat-
spotlight/asset_50080.jsp.
terns; Gartner Report G00124049, 22 October 2004
Kuhn, D. Richard, et. al. (August 2002). NIST Special
Lapkin A. (2004); Architecture Frameworks: How to
Publication 800-46: Security for Telecommuting and
Choose; Gartner Report G00124230, 19 November
Broadband Communications: Recommendations of the
2004
National Institute of Standards and Technology.
Larsen, L.B., & Vesterager, J. (1999, 15-17 March).
Kuhn, D. Richard, et. al. (January 2005). NIST Special
Framework and methodology for creating virtual en-
Publication 800-58: Security Considerations for Voice
terprises - Initial results from the Globeman21 project.
Over IP Systems: Recommendations of the National
Paper presented at the 5th International conference on
Institute of Standards and Technology.
Concurrent Enterprising: The Concurrent Enterprise
Ladley J. (2002); Beyond the Data Warehouse: in Operation. The Hague, the Netherlands.
Information Management Maturity; DM Review
Laurence, P.R. and J.W. Lorsch. (1967). Organization
(http://www.dmreview.com) August 2002.
and Environment (Boston: Division of Research,
Lakoff, G.; and Johnson, M. (1980). Metaphors we live Graduate School of Business Administration, Harvard
by. Chicago, IL: University of Chicago Press. University.

Landsbergen, D. and Wolken, G. (2001). Realizing the Lawrence, T. B., Dyck, B., Maitlis, S., & Mauws,
Promise: Government Information Systems and the M. K. (2006). The underlying structure of continu-
Fourth Generation of Information Technology, Public ous change. MIT Sloan Management Review, (2006,
Administration Review. Summer), 59-66.

Lane, J.-E. (1995). The Public Sector: Concepts, Lawry, P., Albrecht, C., Nunamaker, J., & Lee, J.
Models and Approaches (2nd ed. ed.): Sage Publica- (2002) Evolutionary development and research on
tions. Internet-based collaborative writing tools and proc-
esses to enhance eWriting in an eGovernment setting.
Lankhorst, M. M., & Derks, W. L. A. (2007). Towards
Decision Support Systems, vol. 34, (2002), 229-252,
a Service-Oriented Architecture for Demand-Driven
ElSevier.
e-Government. Paper presented at the 11th IEEE In-
ternational EDOC Conference (EDOC 2007). Layne, K., & Lee, J. (2001). Developing fully func-
tional e-government: a four stage model. Government
Lankhorst, M. M., Derks, W. L. A., Fennema, P., Iacob,
Information Quarterly, 18(2), 122-136.
M. E., & Joosten, S. (2006). B-dossier architectuur.
Enschede: Telematica Instituut. Li, H., & Williams, T.J., (1997). Some extensions to
the Purdue Enterprise Reference Architecture (PERA)
Lankhorst, M.M. & Derks, W.L.A. (2006). B-dos-
- I. Explaining the Purdue architecture and the Purdue
sier architectuur. Technical Report TI/RS/2006/014,
methodology using the axioms of engineering design.
Enschede, The Netherlands: Telematica Instituut.
Computers in Industry, 34, 247-259.
Retrieved July 17, 2007, from https://doc.telin.nl/dscgi/
ds.py/Get/File-61826 Li, H., & Williams, T.J., (2000). The interconnected
chain of enterprises as presented by the Purdue
Lankhorst, M.M. & Derks, W.L.A. (2007). Towards
Enterprise Reference Architecture. Computers in
a Service-Oriented Architecture for Demand-Driven
Industry, 42, 265-274.
e-Government. 11th IEEE International EDOC

449
Compilation of References

Light, Paul C (1999). The Changing Shape of Govern- Maier, M.W. Emery, D. and Hilliard, R. (2001). Soft-
ment The Brookings Institute, Policy Brief # 45 ware Architecture: Introducing IEEE Standard 1471,
IEEE Computer. April 2001, Vol. 34-4, 107-109.
Lind M., & Goldkuhl, G. (2001). Generic Layered
Patterns for Business Modeling. Paper presented at Malladi, S., & Min, K.J., (2005). Decision support
the 6th International Workshop on the Language- models for the selection of Internet access technolo-
Action Perspective on Communication Modeling, gies in rural communities. Telematics and Informatics,
Montreal, Canada. 22, 201219.

Linder, S. H. (1999). Coming to Terms With the Public- Malone, T.; and K. Crowston. (2001). The Interdis-
Private Partnership: A Grammar of Multiple Meanings. ciplinary Study of Coordination. In Coordination
American Behavioral Scientist, 43(1), 35-51. Theory and Collaboration Technology, Gary M.
Olson, Thomas W.
Lohr, Steve and Markoff, John (in press) Windows Is So
Slow, but Why? New York Times; March 27, 2006 Mandelbrot, B. B. (1982). Fractal Geometry of Nature.
New York, NY: W H Freeman.
Longstaff, P.H. (2005). Security, Resilience, and
Communication In Unpredictable Environments Such Mandler, Niemann, von Henning (2007). Serviceori-
as Terrorism, Natural Disasters and Complex Tech- entierte Architekturen: Governance, Compliance und
nology Program for Information Resources Policy, Security. Duesseldorf, Euroforum.
Harvard University.
Marco D. (2002); Meta Data & Knowledge Man-
Lopez, J. (2002); Return on Enterprise Architecture: agement: Capability Maturity Model; DM Review
Measure it in Asset Productivity; Gartner Report: (http://www.dmreview.com) August/September/Oc-
RPT-0702-0119, 19 July 2002 tober/November 2002.

Lowi, T. J. (1979). The End of Liberalism: The Sec- Martin P. (2006); Measuring KM-Based improve-
ond Republic of the United States. New York: W.W. ments in decision-making; personal communication
Norton. through the ACTKM forum (http://www.actKM.org)
March 2006.
Lyons-Burke, Kathy. (October 2000). NIST Special
Publication 800-25: Federal Agency Use of Public Mason, M. (2005). Obtained from www.asisonline.
Key Technology for Digital Signatures and Authen- org/certification/ ppt/CPPPersonnelSecurityTrain-
tication. Federal Public Key Infrastructure Steering ing8-2-01.ppt, July 1, 2006. Lyondell/Equistar Chemi-
Committee. cal Companies.

MacKenzie, C.M., Laskey, K., McCabe, F., Brown, P. Massey, C. (2003). Enterprise assistance: responses
F., & Metz, R. (2006). Reference Model for Service from the public and private sectors. Journal of Small
Oriented Architecture 1.0, OASIS Committee Speci- Business and Enterprise Development, 10(2), 128-
fication. OASIS Open 2005-2006. 135.

Mackenzie, D. (2002). The Science of Surprise - Matthes, F., Wittenburg, A. (2004). Softwarekarten
Can complexity theory help us understand the real zur Visualisierung von Anwendungslandschaften und
consequences of a convoluted event like September. ihren Aspekten Eine Bestandsaufnahme. Retrieved
DISCOVER, 23(2). December 19, 2004, from http://wwwmatthes.in.tum.
de/de/main.htm.
Maes, R. (1999). A Generic Framework for Informa-
tion Management, PrimaVera Working Paper 99-03, Maynard & Ruighaver (2006). What Makes a Good In-
Amsterdam, The Netherlands: University of Am- formation Security Policy: A Preliminary Framework
sterdam, Department of Accountancy & Information For Evaluating Security Policy Quality. Proceedings
Management. of the 5th International Security Conference, Las
Vegas.

450
Compilation of References

McDavid, D.W. (1999). A standard for business ar- Mo, J.P.T., Zhou, M., Anticev, J., Nemes, L., Jones,
chitecture description. IBM Systems Journal, 38 (1), M., Hall, W. (2006). A study on the logistics and per-
12-31. Retrieved 20 April 2007 from IBM Systems formance of a real virtual enterprise. International
Journal Web site: http://www.research.ibm.com/jour- Journal of Business Performance Management, 8(2-
nal/sj/381/mcdavid.html 3), 152-169.

Medjahed, B., Benatallah, B., Bouguettaya, A., Ngu, Mohanty S., & Chand M. (2005); 5iKM3 Knowledge
A. H. H., & Elmagarmid, A. K. (2003). Business-to- Management Maturity Model; TATA Consultancy
business interactions: issues and enabling technolo- Services 2005.
gies. The VLDB Journal The International Journal
Monmonier, M., 2ed. (1996). How to lie with maps.
on Very Large Data Bases, 12(1), 59-85.
Chicago, IL: University of Chicago Press.
Mednikarov, B.K., & Dereliev, P.H. (2004). Structured
Moon, M. Jae. (2002). The Evolution of E-government
description of naval tasks. Information and Security,
among municipalities, Rhetoric or Reality Public Ad-
13, 25-34.
ministration Review (July / August), 62:4: 424-433.
Mendonca, D., Jefferson, T., Harrald, J. (March ,2007).
Moon, M.J. (2002). The evolution of e-government
Collaborative Adhocracies and Mix-and-Match Tech-
among municipalities: rhetoric or reality?. Public
nologies in Emergency Management. Communications
Administration Review, 62(4), 424-433.
of the ACM.
Moore A. (2005); What makes government different?;
Metainnovation (2004); KM Concepts Module 8: Met-
KM World Vol 14 Issue 6; Jun 2005
rics; Retrieved May 2006 from Metainnovation KM
Concepts course (www.metainnovation.com) Morl, G. (2002). A New Mind for Policy Analysis
Westport CT: Praeger.
Mettau, P. (2005). mijnoverheid.nl Publieke Dienst-
verlening in de toekomst. The Hague: Het Expertise Morgan, Gareth (1997) Images of Organisation, 2nd
Centrum. Edition, London. Sage Publications
Mintzberg, H. (1996). Managing Government, Gov- Motta, E., Domingue, J., Cabral, L., & Gaspari, M.
erning Management. Harvard Business Review(May- (2003). IRS II: A Framework and Infrastructure for
June 1996). Semantic Web Services. Paper presented at the 2nd
International Semantic Web Conference.
MIPT. (2004). Responder Knowledge base, National
Technology Emergency Plan for Emergency Response Musgrave, R. A. (1959). The Theory of Public Finance.
to Catastrophic Terrorism, MIPT (National Memo- New York: McGraw-Hill.
rial Institute for the Prevention of Terrorism), April,
www.rkb.mipt.org. . NASCIO. (2003). NASCIO Enterprise Architecture
Maturity Model, Version 1.3. National Association
Missikoff, M. (2002). Harmonise an ontology-based of State Chief Information Officers.
approach for semantic interoperability. ERCIM News,
51, 33-34. Nassar, M., et. al. (June 2006). Intrusion Detection
Methods for VoIP Applications. The Third Annual
Mo, J.P.T., & Menzel, C. (1998). An integrated process VoIP Security Workshop. Accessed June 2006 from
model driven knowledge based system for remote cus- http://www.iptel.org/voipsecurity/
tomer support. Computers in Industry, 37, 171-183.
National Institute of Science and Technology. Federal
Mo, J.P.T., Beckett, R., Nemes, L. (2005, 26-28 Information Processing Standard Publication 1999:
September). Technology Infrastructure for Virtual Standards for Security Categorization of Federal
Organisation of Tooling. Paper presented at Sixth Information and Information Systems.
IFIP Working Conference on Virtual Enterprises
(PRO-VE05). Valencia, Spain.

451
Compilation of References

National Institute of Science and Technology. Special tion power. The Journal of Enterprise Architecture,
Publication 800-37: Guide for the Security Certification 1 (1), 31-40.
and Accreditation of Information Systems.
Niemann, K. (2006). From Enterprise Architecture
National Institute of Science and Technology. Special to IT-Governance. Wiesbaden: Vieweg.
Publication 800-12. An Introduction to Computer
Security: The NIST Handbook. National Institute of Niles, I., & Pease, A. (2001, October 17-19). Towards
Standards and Technology, Technology Administra- a Standard Upper Ontology. Paper presented at the
tion. Published by U.S. Department of Commerce. 2nd International Conference on Formal Ontology
in Information Systems (FOIS-2001), Ogunquit,
National Institute of Science and Technology. Spe-
Maine.
cial Publication 800-53 (Guide for the Selection and
NIMS. National Incident Management System, www.
Specification of Security Controls for Federal Infor-
fema.gov.
mation Systems),
NIST. (2007). Baldrige National Quality Program.
National Institute of Science and Technology. Spe-
NIST. Technology Administration. Department of
cial Publication 53A: Techniques and Procedures for
Commerce.
Verifying the Effectiveness of Security Controls in
Information Systems. Nohria, N. (1992). Is a Network Perspective a Useful
Way of Studying organizations? In N. Nohria and
National Institute of Science and Technology. Spe-
R. G. Eccles (eds.), Networks and organizations:
cial Publication 800-60 (Guide for Mapping Types
Structure, Form and Fit (Boston: Harvard Business
of Information and Information Systems to Security
School Press).
Categorization Levels),
Noran O. (2003); A systematic evaluation of the C4ISR
National Research Council (2004). McGroddy, James
AF using ISO1504 Annex A (GERAM); Computers in
C., and Lin, Herbert S., Editors, A Review of the FBIs
Industry vol 56 (2005) pp 407-427.
Trilogy Information Technology, Committee on the
FBIs Trilogy Information Technology Modernization Noran O. (2005); An analysis of the Zachman frame-
Program, Computer Science and Telecommunications work of enterprise architecture from the GERAM
Board, Division on Engineering and Physical Sciences, perspective; Annual Reviews in Control Vol 27 (2003)
National Research Council of the National Academies, pp 163-183.
. ISBN:0-309-09224-8. Retrieved on August 6 2007
Noran, O. (2005). A systematic evaluation of the C4ISR
from http://www.nap.edu/catalog/10991.html
AF using ISO15704 Annex A (GERAM). Computers
Nemes, L., & Mo, J.P.T., (2004). Collaborative Net- in Industry, 56, 407-427.
works in Australia Challenges and Recommenda-
OToole, Laurence and Meier, Kenneth. (2000). Net-
tions. In L.M. Camarinha-Matos, H. Afsarmanesh
works, Hierarchies, and Management: Modeling the
(Eds.). Collaborative Networked Organizations
nonlinearities, in Heinrich, C. and L. Lynn (eds.).
(pp.97-102). Boston: Kluwer Academic Publishers.
OAG. Open applications group. Uses XML for every
New Zealand, Security in the Government Sector
where to every where integration.
(2002). Obtained from http://www.security.govt.
nz/sigs/html/chapter7.html, June 29, 2006. OASIS: www.oasis-open.org, OASIS (Organization
for the Advancement of Structured Information Stan-
NIA. (2006). Government Information Technology
dards) is a not-for-profit, international consortium that
Architecture-Maturity Model, Version 1.0 (Draft).
drives the development, convergence, and adoption of
National Information Society Agency. Korea.
e-business standards
Niemann, K. (2005). IT Governance and Enterprise
Office of e-Envoy UK. (2002). e-Services Develop-
Architecture - Impact of IT cost reduction on innova-
ment Framework Primer v1.0b. Retrieved Noe 2002,

452
Compilation of References

from http://www.govtalk.gov.uk/documents/eSDF- Organisation for Economic Co-operation and Develop-


primerV1b.pdf ment (OECD) (2001) The Hidden Threat to E-Govern-
ment: Avoiding large government IT failures (Policy
Office of Government Commerce (2005). Managing
brief). Retrieved August 15th, 2007, from http://www.
Successful Projects with PRINCE2 Manual 2005, 4th
oecd.org/dataoecd/19/12/1901677.pdf
Ed. TSO (The Stationery Office).
Ortiz, A., Lario, F., & Ros, L., (1999). Enterprise Inte-
Office of Management and Budget, Federal EA
gration Business Processes Integrated Management:
Program Management Office. Federal Enterprise
a proposal for a methodology to develop Enterprise
Architecture Security and Privacy Profile (version
Integration Programs. Computers in Industry, 40,
1.1). June 2006.
155171.
Office of Management and Budget. (2001, July 18).
OSI. The Open Source Initiative (OSI), a non-profit
Citizen-centered e-government: Developing the action
corporation responsible for the management and pro-
plan. (OMB Memorandum 01-28). Retrieved June 10,
motion of the Open Source Definition (OSD). www.
2007, from http://www.whitehouse.gov/omb/memo-
opensource.org.
randa/m01-28.html
OWL Services Coalition. (2004). OWL-S: Semantic
Office of Management and Budget. (2002, February
Markup for Web Services. Retrieved March 2005,
27). E-government strategy. Retrieved June 10, 2007,
from http://www.daml.org/services/owl-s/1.1/
from http://www.whitehouse.gov/omb/inforeg/egov-
strategy.pdf Page, S. (2003). Entrepreneurial Strategies for Manag-
ing Interagency Collaboration. Journal of Public Ad-
Office of Management and Budget. (2007a, July).
ministration Research and Theory, 13(3), 311-340.
FEA consolidated reference model document version
2.2. Retrieved June 10, 2007, from http://www.white- Pande, P., & Holpp L. (2006) What is Six Sigma?, New
house.gov/omb/egov/documents/FEA_CRM_v22_Fi- York, NY: McGraw-Hill.
nal_July_2007.pdf
Park, J. S. & Ho, S M. (2004). Composite Role-based
Office of Management and Budget. (2007b, July). FEA Monitoring (CRBM) for Countering Insider Threats.
reference model mapping quick guide (FY09 budget Second Symposium on Intelligence and Security In-
preparation). Retrieved June 10, 2007 from http://www. formatics (ISI), Tucson, Arizona, June 2004.
whitehouse.gov/omb/egov/documents/FY09_Ref_
Patankar, A.K., & Sadiga, S., (1995). Enterprise
Model_Mapping_QuickGuide_July_2007.pdf
integration modelling: a review of theory and practice.
OGC: The Open Geospatial Consortium, Inc. (OGC) Computer Integrated Manufacturing Systems, 8(1),
is a non-profit, international, voluntary consensus 21-34.
standards organization that is leading the develop-
Pattinson, M. & Anderson, G. (). Information Risk
ment of standards for geospatial and location based
Management: Some Social-psychological Issues.
services. www.opengeospatial.org.
Paulzen O., & Perc P. (2002); A maturity model for
Oltramari A., Gangemi A., Guarino N., & Masolo
quality improvement in knowledge management;
C. (2002, October 2002). Sweeting ontologies with
Proceedings of the 13th Australasian Conference on
DOLCE. Ontologies and the Semantic Web. Paper
Information Systems (ACIS 2002).
presented at the 13th International Conference, EKAW
2002, Siguenza, Spain. Pavlichev, A., & Garson, G. D. (2004) Digital Gov-
ernment Principles and Best Practices, Chapter 1
OMG: http://www.omg.org.
(The promise of Digital Government), page 2, IDEA
Orange, G., Elliman, T., Kor, A.L., & Tassabehji, R. Group Publishing.
(2007). Local government and social or innovation
value. Transforming Government: People, Process
and Policy, 1(3), 242-254.

453
Compilation of References

Peitgen, H.; Jurgens, H.; and Saupe, D. (1992). Peristeras, V., Tsekos, T., & Tarabanis, K. (2003, 31
Chaos and Fractals: New Frontiers of Science. Berlin: Jul.-2 Aug.). Building Domain Models for the (e-) Gov-
Springer Verlag. ernance System. Paper presented at the International
Conference on Politics and Information Systems:
Peristeras V., & Tarabanis K. (2004). Governance
Technologies and Applications (PISTA 03), Orlando,
Enterprise Architecture (GEA): Domain models for
Florida, USA.
e-Governance. In the 6th international conference on
Electronic commerce (ICEC), ACM. Platt, M. (2007). CIO Definitions Enterprise Architec-
ture. Retrieved August 13, 2007, from http://searchcio.
Peristeras V., & Tarabanis K. (2004a). Advancing the
techtarget.com/sDefinition/0,,sid19_gci1081274,00.
Government Enterprise Architecture - GEA: The Ser-
html
vice Execution Object Model. In R. Traunmuller (Ed.),
Electronic Government, DEXA, 3rd International Plya, G. (1971). How to Solve it: A New Aspect of
Conference EGOV 2004, Zaragoza, Lecture Notes in Mathematical Method. Princeton, NJ: Princeton
Computer Science 3183 (pp. 476-482): Springer. University Press.

Peristeras V., & Tarabanis K. (2004b). The Gover- Pongsiri, N. (2003). Public-Private Partnerships in
nance Enterprise Architecture (GEA) Object Model. Thailand: A Case Study of the Electric Utility Industry.
In M. A. Wimmer (Ed.), Knowledge Management in Public Policy and Administration, 18(3), 69.
Electronic Government, Lecture Notes in Computer
Porter, M. (1985). Competitive Advantage: Creating
Science 3035, (5th IFIP International Working Con-
and Sustaining Superior Performance. New York,
ference, KMGov 2004, Krems, Austria, May 27-29)
NY: The Free Press.
(pp. 101-110): Springer.
Porter, M. E. (1998). Competitive Strategy: Techniques
Peristeras V., & Tarabanis K. (2005, 22-24 April 2005).
For Analyzing Industries And Competitors. New York,
The GEA Generic Process Model for Public Adminis-
NY: Free Press.
tration Service Execution. Paper presented at the 8th
International Conference for Business Information Powel, A., & Picolli, G. (2004) Virtual Teams: A Re-
Systems (8th BIS 2005), Poznan, Poland. view of Current Literature and Directions for Future
Research. The DATA BASE for advances in Information
Peristeras V., & Tarabanis K. (2006, Mar. 27-29).
Systems-Winter 2004, vol 35, No.1. ACM.
Reengineering the public administration modus ope-
randi through the use of reference domain models and Prabandham, S.M. (2007, June). A Case Study in
Semantic Web Service technologies. Paper presented Service Component Reusability and Interoperability:
at the 2006 AAAI Spring Symposium, The Semantic HR LOB Technical Reference Model. Unpublished
Web meets eGovernment (SWEG), Stanford Univer- manuscript.
sity, California, USA.
Prime Ministers Strategy Unit (2004). Strategy
Peristeras V., Goudos S., Vitvar T., Mocan A., & Ta- Survival Guide v2.1. Retrieved 31st July 2007 from
rabanis K. (2006). Towards Semantic Web Services http://www.cabinetoffice.gov.uk/strategy/downloads/
for Public Administration based on the Web Service survivalguide/skills/s_pestle.htm
Modeling Ontology (WSMO) and the Governance
Enterprise Architecture (GEA). Paper presented at Provan, K. G., & Milward, H. B. (2001). Do Networks
the 5th EGOV International Conference, DEXA Really Work? A Framework for Evaluating Public-Sec-
Krakow, Poland. tor Organizational Networks. Public Administration
Review, 61(4), 414-423.
Peristeras, V., & Tarabanis, K. (2000). Towards an
Enterprise Architecture for Public Administration : A Punia, Devendra K.; and Saxena, K. B. C. (March
Top Down Approach. European Journal of Informa- 2004). E-government services and policy track: Man-
tion Systems, 9(Dec. 2000), 252-260. aging inter-organizational workflows in eGovernment

454
Compilation of References

services, Proceedings of the 6th international confer- From Texaco and Star Enterprise. MIS Quarterly,
ence on Electronic commerce. 14(4), 385-403.

Qurashi, R. (2005). Eight Steps for Integrating Security Riggins, F. J., & Mukhopadhyay, T. (1994). Interde-
Into Application Development. MCI NetSec. Published pendent benefits from interorganizational systems:
by ComputerWorld, December 6, 2005. Obtained from opportunities for business partner reengineering.
http://www.computerworld.com/securitytopics/secu- Journal of Management Information Systems, 11(2),
rity/story/0,10801,106805,00.html. 37-57.

R.E. Asher (ed.). (1994). The Encyclopedia of Language Riley, B. T. (2003). e-Government vs. e-Governance
and Linguistics. Oxford: Pergamon. (International Tracking Survey Report, No 4). Ottawa:
Commonwealth Centre for E-Governance.
Ramanathan, J. (1999). Enterprise Integration with
NIIIP Protocols, SME, ASME Autofact Proceed- Robertson J. (2003); Metrics for knowledge manage-
ings. ment and content management; Step Two Designs
(www.steptwo.com.au) February 2003, accessed
Ramanathan, J. (2005). Fractal Architecture for the
May 2006.
Adaptive Complex Enterprise, Communications of
the ACM, May. Rodriquez, E. (2005). Physical Network Security.
Obtained from http://www.skullbox.net/physicalnet-
Ramanathan, J. and Ramnath, Rajiv. (2004) IT Ar-
worksecurity.php, June 29, 2006.
chitecture and the Case for Lean eBusiness Process
Management, Knowledge Supply and Information Rosati, L., Lai, M. E., & Gnoli, C. (2004, 10th Decem-
Logistics in Enterprises and Networked organiza- ber). Faceted Classification for Public Administration.
tions, Fraunhofer-Institute for Software and Systems Paper presented at the Semantic Web Applications
Engineering ISST. and Perspectives (SWAP) - 1st Italian Semantic Web
Workshop, Ancona, Italy.
Ramanathan, J.; and Beswick, R. (2000). Imperative:
Why Process-based Architecture is Essential for Suc- Rosenau, P. V. (1999). Introduction. The Strengths and
cessful Supply-Chain Participation. EAI Journal. Weaknesses of Public-Private Policy Partnerships.
American Behavioral Scientist, 43(1), 10-34.
Ramnath, R. and Desai, A. (2007). City of Columbus,
311 Impact Evaluation, Final Report. Rosetta Net. http://www.rosettanet.org/.

Ramnath, R., Landsbergen, D. (May, 2005) IT-enabled Ross, J. (2003). Creating a strategic IT architecture
sense-and-respond strategies in complex public orga- competency: Learning in stage. MISQ Quarterly
nizations. Communications of the ACM, 48(5). Executive, 2(1), 31-43.

Reding, V. (2005) i2010: The European Commissions Ross, J.W. (2006). Design Priorities for the IT Unit of
new programme to boost competitiveness in the ICT the Future. MIT Sloan CISR Research Briefings, 4(3D).
sector. European Committees press releases. Re- Retrieved September 7, 2007, from http://mitsloan.mit.
trieved August 15th, 2007, from http://europa.eu.int/rap- edu/cisr/papers.php.
id/pressReleasesAction.do?reference=SPEECH/05/
Ross, J.W., Weill, P., & Robertson, D.C. (2006). Enter-
format=HTML&aged=0&language=EN&guiLang
prise Architecture as Strategy. Boston, MA: Harvard
uage=en)
Business School Press.
Rhodes, R. A. W. (1997). Understanding Governance:
Ross, R. et. al. (February 2005). NIST Special Pub-
Open University Press.
lication 800-53: Recommended Security Controls
Richardson, L., Jackson, B. M., & Dickson, G. (1990). for Federal Information Systems. National Institute
A Principle-Based Enterprise Architecture: Lessons of Standards and Technology, Computer Security
Division.

455
Compilation of References

Ross, R.. et. al. (May 2002). NIST Special Publication Schekkerman J. (2004); Trends in Enterprise Archi-
800-37: Guide for the Security Certification and Ac- tecture: How are organizations progressing?; Institute
creditation of Federal Information Systems. National for Enterprise Architecture Developments, 2004.
Institute of Standards and Technology, Computer
Schekkerman J. (2006); How to survive in the jungle
Security Division.
of Enterprise Architecture Frameworks: Creating
Rosser B. (2002); Architectural styles and Enterprise or choosing an Enterprise Architecture Framework;
Architecture; Gartner report AV-17-4384, 13 August Trafford Publishing; 3rd Edition 2006 (First published
2002. 2004).

Sackett, P., Rose, T., & Adamson, V. (2003). The Schekkerman, J. (2005). Trends in Enterprise Archi-
importance of business process clarification within tecture 2005: How are Organizations Progressing?
the virtual enterprise. Journal of Small Business and 1st Ed. Institute for Enterprise Architecture Develop-
Enterprise Development, 10(3), 298-305. ments (IFEAD).

Saha, P. (2004); A real options perspective to Enterprise Scholl, H.J. (2003). E-government: A special case of
Architecture as an investment activity; (accessed 24 IT-enabled Business Process Change, Chapter pre-
Aug 05 through The Open Group Architecture Forum sented at the 36th Hawaiian Conference of Systems
http://www.opengroup.org/architecture). Sciences, Hawaii.

Saha, P. (2006). A Real Options Perspective to Enter- Schubert, P., & Hausler, U. (2001) e-Government meets
prise Architecture as an Investment Activity. Journal e-Business: A Portal Site for Startup Companies in
of Enterprise Architecture, 2(3), 32-52. Switzerland. In the 34th International Conference on
System Sciences (IEEE 2001)
Saha, P. (2007a). A Synergistic Assessment of the
Federal Enterprise Architecture Framework against Schulman J. (2004); Architecture Frameworks provide
GERAM (ISO 15704:2000). In Saha, P. (Ed.). Hand- system road maps; Gartner Report G00125007, 29
book of Enterprise Systems Architecture in Practice. November 2004.
Hershey, PA: IGI Global Information Science Refer-
Schwartz, Peter. (2003). Inevitable Surprises: Thinking
ence.
Ahead in a Time of Turbulence. New York: Gotham
Saha, P. (Ed.). (2007b). Handbook of Enterprise Books.
Systems Architecture in Practice. Hershey, PA: IGI
SCOR. http://wwwsupply-chain.org.
Global Information Science Reference.
Searle, J. R. (1969). Speech Acts. An Essay in the
Sairamesh, J., Lee, A., & Anania, L. (2004). Informa-
Philosophy of Language. London: Cambridge Uni-
tion Cities. Communications of the ACM February
versity Press.
2004, vol. 47, No.2.
Searle, J. R. (1975). A taxonomy of illocutionary acts. In
Salmela, H.; and Spil, T.A.M. (2002). Dynamic and
Gunderson K. (Ed.), Language, Mind and Knowledge.
emergent information systems strategy formulation
Minneapolis: University of Minesota.
and implementation. International Journal of Infor-
mation Management, 22, 441-460. Semantic Interoperability Community of Practice
(SICoP). (2005). Introducing Semantic Technologies
SAP. (2000). R/3 System SAP Solution Map. Retrieved
and the Vision of the Semantic Web, White Paper
Dec. 2000, from www.sap.com
Series Module 1.
Schekkerman J. (2004); Enterprise Architecture
Semy, S. K., Pulvermacher, M. K., & Obrst, L. J. (2004).
Validation; Institute for Enterprise Architecture De-
Toward the Use of an Upper Ontology for U.S. Gov-
velopments, August 2004.
ernment and U.S. Military Domains: An Evaluation
(No. 04B0000063): The MITRE Corporation.

456
Compilation of References

Shankararaman, V., & Lee, B.S. (1994). Knowl- Spears, J. (2006). Defining Information Security.
edge-Based Safety Training System (KBSTS) - A The Pennsylvania State University, Smeal College of
Prototype Implementation. Computers in Industry, Business. 5th Security Conference 2006. Las Vegas,
25, 145-157. Nevada.

Shen, H., Wall, B., Zaremba, M., Chen, Y., & Browne, Spewak, S. H. (1992). Enterprise architecture plan-
J. (2004). Integration of business modelling methods ning: Developing a blueprint for data, applications,
for enterprise information system analysis and user and technology. New York, NY: Wiley.
requirements gathering. Computers in Industry, 54,
Springer, L.M. (n.d.). Retirement Systems Moderniza-
307-323.
tion. Retrieved 1 August 2007 from the OPM Web
Shinonome, M., Hashimoto, H., Fuse, A., & Mo, J.P.T. site: http://www.opm.gov/rsm/index.asp
(1998). Development of an information technology
Sproull, L. & Patterson, J., (2004). Making Information
infrastructure for extended enterprise. In J. Mills &
Cities Livable. Communications of the ACM February
F. Kimura (Eds.). Information Infrastructure Systems
2004, vol. 49, No.2.
for Manufacturing (pp.353-364). Boston: Kluwer
Academic Publishers. Standards Australia (2005); Australian Standard 5037-
2005: Knowledge management a guide; Standards
Siegel, Lloyd H. (2006). Lessons Learned, Dept of Vet-
Australia, September 2005.
erans Affairs, Physical Security Assessment Program.
Federal Facility Council. Physical Security & Hazard State of Arkansas (2004). Personnel Security. Office
Mitigation Committee, March 14th, 2006. Obtained of Information Technology. Document Number SS-
from www.va.gov/facmgt, June 29, 2006. 70-007. February 2004.
Simsion, G. (2006). Conceptual, Logical, Physical: Steen M.W.A., Akehurst D.H., ter Doest H.W.L., &
Clearing the Confusion. The Data Administration Lankhorst M.M.(2004); Supporting Viewpoint-Ori-
Newsletter, No. 36. Robert S. Seiner. ented Enterprise Architecture; Proceedings of the
8th IEEE International Enterprise Distributed Object
Sinha, Rajiv. (March 2001) A Security Checklist for
Computing Conference (EDOC) 2004.
Oracle 9i. Oracle White Papers. Accessed June 2006
from http://www.oracle.com/technology/deploy/secu- Steen, M.W.A., Lankhorst, M.M., Doest, H. ter,
rity/oracle9i/pdf/9i_checklist.pdf. Strating, P., & Iacob, M.-E. (2005). Service-Oriented
Enterprise Architecture. In Z. Stojanovic and A. Da-
Snouffer, R., et. al. (June 2001). NIST Special Publica-
hanayake (Eds.), Service-Oriented Software System
tion 800-29: A Comparison of the Security Require-
Engineering: Challenges and Practices, Hershey, PA:
ments for Cryptographic Modules in FIPS 140-1 AND
IDEA Group.
FIPS 140-2.
Stevenson, D.A. (1996, April). Positioning Enterprise
Snyman S., & Kruger CJ; The interdependency be-
Architecture. In D.A. Stevenson, Component Based
tween strategic management and strategic knowledge
Enterprise Architecture. Dissertation presented to the
management; Journal of Knowledge Management;
Department of Information Systems, University of
Vol 8, Issue 1, 2004).
Cape Town, South Africa. Retrieved 10 August 2007
Sowa J.F., & Zachman J.A.(1992); Extending and from the IS World Net Web site: http://users.iafrica.
formalizing the framework for information systems com/o/om/omisditd/denniss/text/eapositn.html
architecture; IBM Systems Journal, Vol 31, No 3,
Stoneburner, G., et. al. (July 2002). NIST Special
1992.
Publication 800-30: Risk Management Guide for In-
Sowa, F. J. (2000) Levels of Representation. Knowl- formation Technology Systems: Recommendations of
edge Representation. Logical, philosophical and the National Institute of Standards and Technology.
computational foundations (pp. 188-189).Brooks/Cole
Thomson Learning.

457
Compilation of References

Sulin, B.A., Lang, K.R., & Whinston. A.B. (1997). tion. Reading, UK: The Open Group. Retrieved July
Enterprise decision support using Intranet technology. 17, 2007, from http://www.opengroup.org/togaf/.
Decision Support Systems, 20, 99-134.
The Open Group. (1995-2005). Single Sign-On. Ob-
Swanson, M. (November 2001). NIST Special Pub- tained from http://www.opengroup.org/security/sso/.
lication 800-26: Security Self-Assessment Guide for
The Open Group. (2006). The Open Group Architec-
Information Technology Systems. National Institute
ture Framework Enterprise Edition Version 8.1.1. The
of Standards and Technology, Computer Security
Open Group Architecture Forum. Retrieved February
Division.
20, 2008 from http://www.theopengroup.org/
Swanson, M. et. al. (June 2002). NIST Special Publica-
The World Bank (2003). Retrieved June 18, 2007, from
tion 800-34: Contingency Planning Guide for Informa-
http://Web.worldbank.org/WBSITE/EXTERNAL/
tion Technology Systems: Recommendations of the
TOPICS/EXTINFORMATIONANDCOMMUNI-
National Institute of Standards and Technology.
CATIONANDTECHNOLOGIES/EXTEGOVERN-
Tambouris, E. (2001). An Integrated Platform for MENT/contentMDK:20507153~menuPK:702592~p
Realising One-Stop Government: The eGOV proj- agePK:148956~piPK:216618~theSitePK:702586,00.
ect. Paper presented at the E-Government Workshop html.
within DEXA01.
The World Bank. (1992). Governance and Develop-
Tambouris, E., Kavadias, G., & Spanos, E. (2004). The ment. Washington: World Bank.
Governmental Markup Language (GovML). Journal
Thitart, R.A. and B. Forgues. (1995). Chaos Theory
of E-Government, vol. 1 (2).
and Organization Science, 6(1):19-31.
Tan, E.P., & Gan, W.B. (2007). Enterprise Archi-
Toavs, D. (2004). Pixelating policy: Issue transforma-
tecture in Singapore Government. In Saha, P. (Ed.).
tion in real and virtual worlds. (Doctoral dissertation,
Handbook of Enterprise Systems Architecture in
Virginia Polytechnic Institute and State University,
Practice. Hershey, PA: IGI Global Information Sci-
2004). Retrieved June 10, 2007, from http://scholar.lib.
ence Reference.
vt.edu/theses/available/etd-12222004-094635/
Tapscott, D., & Caston, A. (1994). Paradigm Shift :
TopQuadrant. (2005a). FEA Reference Models Ontolo-
The New Promise of Information Technology.
gies v.1.1. Retrieved 16 Mar., 2006, from http://www.
Tarabanis, K., Peristeras, V., & Fragidis, G. (2001, June topquadrant.com/documents/TQFEARMO.pdf
2001). Building an Enterprise Architecture for Public
Tracy, M. et. al. (September 2002). NIST Special Pub-
Administration: A High Level Data Model for Strategic
lication 800-44: Guidelines on Securing Public Web
Planning. Paper presented at the 9th European Confer-
Servers: Recommendations of the National Institute
ence on Information Systems, Bled, Slovenia.
of Standards and Technology.
Tat-Kei Ho, A. (2002). Reinventing Local Governments
Tracy, M. et. al. (September 2002). NIST Special
and e-Government Initiative. Public Administration
Publication 800-45: Guidelines on Electronic Mail
Review, July/August 2002, Vol. 62, No. 4., Blackwell
Security: Recommendations of the National Institute
Synergy.
of Standards and Technology.
Teisman, G. and E.H. Klijn. (2002). Partnership Ar-
Treasury Board Secretariat, Government of Canada
rangements: Governmental Rhetoric or Governance
(2001). Canadas Report on Portals, August 10,
Scheme? Public Administration Review, 62(2), 197-
2001.
205.
Treasury Board Secretariat, Government of Canada
The Open Group (2006). The Open Group Architectur-
(2006). Service Oriented Architecture Strategy. Re-
al Framework (TOGAF) Version 8.1.1 Enterprise Edi-
trieved May 25th, 2006, from http://www.tbs-sct.gc.ca/
cio-dpi/Webapps/architecture/sd-eo/sd-eo_e.pdf)

458
Compilation of References

Tsichritzis, D., & Klug, A. (Eds.). (1978). The ANSI/ United States Congress (1996) Public Law 191-104
XWSPARC DBMS framework report of the study Health Information Portability and Accountability
group on database management systems. Information Act of 1996. Accessed from http://fr Webgate.access.
Systems, 3(3), 173-191. gpo.gov/cgi-bin/getdoc.cgi?dbname=104_cong_pub-
lic_laws&docid=f:publ191.104.
U.S. General Accounting Office (2003). Information
Technology: A Framework for Assessing and Improv- United States Congress (2002) Public Law 204-107
ing Enterprise Architecture Management (Version 1.1), Sarbanes-Oxley Act of 2002. Accessed from Accessed
GAO-03-584G, April 1, 2003. Retrieved 3rd August from http://fr Webgate.access.gpo.gov/cgi-bin/get-
2007 from http://www.gao.gov/new.items/d03584g. doc.cgi?dbname=107_cong_public_laws&docid=f:
pdf publ204.107.

U.S. General Accounting Office. (2002). Homeland United States Congress (2002) Public Law 347-107
security: Proposal for cabinet agency has merit, Federal Information Security Management Act of
but implementation will be pivotal to success. (GAO 2002. http://fr Webgate.access.gpo.gov/cgi-bin/get-
Publication No. GAO-02-886T). Washington, D.C. doc.cgi?dbname=107_cong_public_laws&docid=f:
Retrieved June 9, 2007, from http://www.gao.gov/new. publ347.107.
items/d02886t.pdf
United States Department of Justice System Devel-
UK (2005). e-Government Interoperability Frame- opment Life Cycle Guidance Document. (2003). The
work Version 6.1. London: Cabinet Office. Retrieved Department of Justice Information Resource Manage-
July 17, 2007, from http://www.govtalk.gov.uk/sche- ment, January 2003. Obtained from http://www.usdoj.
masstandards/egif_document.asp?docnum=949 gov/jmd/irm/lifecycle/table.htm.

UK Cabinet Office (2000). e-Government, a strategic United States Federal Enterprise Architecture Pro-
framework for public services in the information age. gramme Management Office (2006). FEA Consoli-
Retrieved May 25th, 2006, from dated Reference Model, Version 2.0. Retrieved June
18, 2007, from http://www.whitehouse.gov/omb/egov/
UK Cabinet Office, Office of the e-Envoy (2002) e-
a-1-fea.html.
Government Interoperability Framework (e-GIF). Part
two: Technical Policies and Specifications. Retrieved United States House of Representatives Government
August 15th, 2007, from http://www.govtalk.gov.uk/ Reform Committee (February 2005) Federal Computer
documents/e-GIF4Pt2_2002-04-25.pdf Security Report Card for 2003 2004. Accessed from
http://reform.house.gov/UploadedFiles/Computer%20
UK Chief Information Officers Council (UK CIO)
Security%20Report%20card%202%20years.pdf.
(2005) Enterprise Architecture for UK Government.
An overview of the process and deliverables for Re- United States. Executive Office of the President.
lease 1. Retrieved August 15th, 2007, from http://www. Office of Management and Budget [OMB]. (2005,
cio.gov.uk/documents/cto/pdf/enterprise_architec- November). The Data Reference Model Version 2.0.
ture_uk.pdf Retrieved 10 August 2007 from the OMB E-Gov
Web site: http://www.whitehouse.gov/omb/egov/docu-
United Kingdom, Department of Trade and Industry
ments/DRM_2_0_Final.pdf
(June 1991) Information Technology System Evalu-
ation Criteria (IITSEC). Accessed from http://nsi. United States. Executive Office of the President.
org/Library/Compsec/eurooran.txt. Office of Management and Budget [OMB]. Federal
Enterprise Architecture Program Management Office
United Nations and American Society for Public Ad-
[FEAPMO]. (2006, December). FEA Practice Guid-
ministration (2001). Global Survey of E-Government,
ance. Retrieved 22 October 2007 from the OMB E-Gov
Retrieved June 15, 2007, from http://www.unpan.
Web site: http://www.whitehouse.gov/omb/egov/docu-
org/egovernment2.asp.
ments/FEA_Practice_Guidance.pdf

459
Compilation of References

United States. Executive Office of the President. Office GoLearn Web site: http://www.golearn.gov/MaestroC/
of Management and Budget [OMB]. (2006, December). index.cfm?room=welcome&roomaction=about
Expanding E-Government: Making a Difference for
United States. Office of Personnel Management [OPM].
the American People Using Information Technology.
Human Resources Line of Business [HR LOB]. (2006,
Retrieved 30 April 2007 from the OMB E-Gov Web
January). HR LOB Business Reference Model version
site: http://www.whitehouse.gov/omb/egov/documents/
2. Retrieved 23 April 2007 from the OPM HR LOB
expanding_egov_2006.pdf
Web site: http://www.opm.gov/egov/documents/archi-
United States. Executive Office of the President. Office tecture/BRM_Report_V2.pdf
of Management and Budget [OMB]. (2007, February).
United States. Office of Personnel Management [OPM].
Report to Congress on the Benefits of the E-Govern-
Human Resources Line of Business [HR LOB]. (2006,
ment Initiatives. Retrieved 16 May 2007 from the
February). HR LOB Data Model version 1. Retrieved
OMB E-Gov Web site: http://www.whitehouse.gov/
23 April 2007 from the OPM HR LOB Web site:
omb/egov/documents/FY07_Benefits_Report.pdf
http://www.opm.gov/egov/documents/architecture/
United States. Executive Office of the President. Office HRLOB_DM.pdf
of Management and Budget [OMB]. (2007, July). FEA
United States. Office of Personnel Management
Consolidated Reference Model Document Version
[OPM]. Human Resources Line of Business [HR LOB].
2.2. Retrieved 16 July 2007 from the OMB E-Gov
(2006, June). HR LOB Performance Model version 1.
Web site: http://www.whitehouse.gov/omb/egov/docu-
Retrieved 23 April 2007 from the OPM HR LOB Web
ments/FEA_CRM_v22_Final_July_2007.pdf
site: http://www.opm.gov/egov/documents/architec-
United States. Executive Office of the President. ture/HRLOB_PM_6.30.06.pdf
Office of Management and Budget [OMB]. (n.d.a).
United States. Office of Personnel Management [OPM].
E-Gov Background. Retrieved 8 May 2007 from
Human Resources Line of Business [HR LOB]. (2006,
the OMB E-Gov Web site: http://www.whitehouse.
September). HR LOB Target Requirements for Shared
gov/omb/egov/g-1-background.html
Service Centers version 2.0. Retrieved 23 April 2007
United States. Executive Office of the President. Office from the OPM HR LOB Web site: http://www.opm.
of Management and Budget [OMB]. (n.d.b) Federal gov/egov/documents/requirements/Reqv2.pdf
Enterprise Architecture. Retrieved 22 May 2007 from
United States. Office of Personnel Management [OPM].
the OMB E-Gov Web site: http://www.whitehouse.
Human Resources Line of Business [HR LOB]. (2006,
gov/omb/egov/a-1-fea.html
September). HR LOB Service Component Model
United States. General Accounting Office [GAO]. version 1. Retrieved 23 April 2007 from the OPM
(2003, November). Information Technology: Leader- HR LOB Web site: http://www.opm.gov/egov/docu-
ship Remains Key to Agencies Making Progress on ments/architecture/HRLOBSCMv1.pdf
Enterprise Architecture Efforts. Retrieved 10 October
United States. Office of Personnel Management [OPM].
2007 from the GAO Web site: http://www.gao.gov/new.
Human Resources Line of Business [HR LOB]. (2007,
items/d0440.pdf
September). HR LOB Service Component Model ver-
United States. Office of Personnel Management [OPM]. sion 2. Retrieved 15 November 2007 from the OPM
(n.d.). Human Capital Assessment and Accountability HR LOB Web site: http://www.opm.gov/egov/docu-
Framework [HCAAF]. Retrieved 18 May 2007 from ments/architecture/HRLOBSCMv2.pdf
the OPM Web site: http://www.opm.gov/hcaaf_re-
United States. Office of Personnel Management [OPM].
source_center/2-2.asp
Human Resources Line of Business [HR LOB]. (n.d.).
United States. Office of Personnel Management [OPM]. HR LOB Benefits and Accomplishments. Retrieved
GoLearn. (n.d.) The Office of Personnel Managements 30 May 2007 from the OPM HR LOB Web site: http://
GoLearn Program. Retrieved 24 October 2007 from the www.opm.gov/egov/HR_LOB/benefits/

460
Compilation of References

US (2007). Federal Enterprise Architecture. Wash- Warmer, Kleppe A, J.; and Bast, W. (2003). MDA
ington, DC: Office of Management and Budget. Re- Explained: The Model Driven Architecture--Practice
trieved July 17, 2007, from http://www.whitehouse. and Promise. New York, NY: Addison-Wesley.
gov/omb/egov/a-1-fea.html.
Weerdmeester R., Pocterra C., & Hefke M. (2003);
US Federal Government (2002) e-Government Strat- Thematic Network/Roadmap: Knowledge Manage-
egy: Simplified Delivery of Services to Citizens. Ex- ment Maturity Model; Information Societies Technol-
ecutive Office of the President, Office of Management ogy Programme, June 2003.
and Budget, US Federal Government February 2002.
Weill, P. (2004). Dont Just Lead, Govern: How Top-
Retrieved May 25th, 2006, from http://www.firstgov.
Performing Firms Govern IT. MIS Quarterly Execu-
gov/Topics/Includes/Reference/egov_strategy.pdf
tive, 3(1), 1-17.
Van den Berg, R.J., & Tolle, M. (2000). Assessing
Weill, P., & Ross, J. (2004). IT Governance: How Top
Ability to Execute in Virtual Enterprises. In J.P.T. Mo
Performers Manage IT Decision Rights for Superior
& L. Nemes (Eds.) Global Engineering, Manufactur-
Results. Boston, Massachusetts: Harvard Business
ing and Enterprise Networks (pp.370-378). Boston:
School Press.
Kluwer Academic Publishers.
Weill, P., & Ross, J. (2005). A Matrixed Approach to
Vandegriff L.J. (2006); Unified approach to agile
Designing IT Governance. MIT Sloan Management
knowledge-based enterprise decision support; VINE
Review, 46(2), 26-34.
Vol 36, Issue 2; 2006)
Wesley, Addison (2003). XML Data Management.
Vendler, Z. (1972). Res Cogitans: Ithaca: Cornell Native XML and XML-enabled Database Systems.
University Press. Pearson Education Inc., Boston,U.S.A.

Vernadat, F.B. (2002). Enterprise Modelling and Weston, R.H. (1999). Reconfigurable, component-
Integration (EMI): Current Status and Research based systems and the role of enterprise engineering
Perspectives. Annual Reviews in Control, 26, 15-25. concepts, Computers in Industry, 40, 321-343.

Vitvar T., Kerrigan M., Overeem v. A., V., P., & K., WfMC. www.wfmc.org.
T. (2006, Mar. 27-29). Infrastructure for the Seman- Widmayer, P. (1999). Building Digital Metropolis:
tic Pan-European E-government Services. Paper Chicagos Future Networks. IT Professional Volume
presented at the AAAI Spring Symposium, The Se- 1, Issue 4, July-Aug. 1999, p. 40 46. IEEE.
mantic Web meets eGovernment (SWEG), Stanford
Wiedman, B. (2005). Database Security (Common-
University, California, USA.
Sense Principles.) GovernmentSecurity.org Network
Vu, J. (2004). Process Improvement Journey. Lecture Security Resources. Obtained from http://www.gov-
notes for the CMMI course sponsored by Korea IT ernmentsecurity.org/articles/DatabaseSecurityCom-
Industry Promotion Agency, Seoul, Korea. mon-sensePrinciples.php.

W3C. www.w3c.org. (August 2003). WSA, Web Ser- Wieringa, R., & Meyer, J. (1993). Applications of
vices Architecture. W3C working Draft 8. Deontic Logic in Computer Science: A Concise
Overview: Wiley.
Wack, J., et. al. (January 2002). NIST Special Publi-
cation 800-41: Guidelines on Firewalls and Firewall Williams, T.J. (1994). The Purdue Enterprise Refer-
Policy: Recommendations of the National Institute of ence Architecture, Computers in Industry, 24(2-3),
Standards and Technology. 141-158.

Wack, J., et. al. (October 2003). NIST Special Publica- Williams, T.J., Bernus, P., Brosvic, J., Chen, D.,
tion 800-42: Guideline on Network Security Testing: Doumeingts, G., Nemes, L., Nevins, J.L., Vallespir, B.,
Recommendations of the National Institute of Stan- Vlietstra, J., & Zoetekouw, D. (1994). Architectures for
dards and Technology.

461
Compilation of References

integrating manufacturing activities and enterprises. Zachman J.; The Physics of Knowledge Management;
Computers in Industry, 24, 111-139. undated, retrieved 29 Apr 2007 from http://www.
zifa.com
Williamson, O. E. (1975). Markets and Hierarchies.
New York: The Free Press. Zachman J.A. (1996); Enterprise Architecture and
legacy systems. Getting beyond the legacy; accessed
Wilson, M., Zafra, D., Pitcher, S., Tressler, J., Ippolito,
from Information Engineering Services Pty Ltd via
J. (1998). NIST Special Publication 800-16: Informa-
http://members.ozemail.com.au/~visible/papers/zach-
tion Technology Security Training Requirements:
man1.htm on 25/07/2005
A Role- and Performance- Based Model. National
Institute of Standards and Technology, Computer Zachman J.A. (1997); Concepts of the framework for
Security Division. enterprise architecture. Background, description
and utility; accessed from Information Engineering
Wimmer, M., & Traunmuller, R. (2000) Trends
Services Pty Ltd via http://members.ozemail.com.
in Electronic Government: Managing Distributed
au/~visible/papers/zachman3.htm on 25/07/2005
Knowledge. In the 11th International Workshop on
Database and Expert Systems Applications (IEEE, Zachman J.A. (1997); The challenge is change: a
DEXA00) management paper; accessed from Information
Engineering Services Pty Ltd via http://members.
Wimmer, M.A. (2002). Integrated Service Modelling
ozemail.com.au/~visible/papers/zachman2.htm on
for One-Stop Government. Electronic Markets, special
25/07/2005
issue on eGovernment, 12(3):18.
Zachman, J. A. (1987), A Framework for Information
Winograd, T. and Flores F. (1987). Understanding Systems Architecture. IBM Systems Journal, 26(3),
Computers and Cognition - A New Foundation for 276-292.
Design. Reading: Addison Wesley.
Zachman, J. A. (2005). The Zachman Framework
Wortmann, J.C., Hegge, H.M.H., & Rolefes, S. (2000). for Enterprise Architecture: A Primer for Enterprise
Embedding enterprise software in extended enterprise Engineering and Manufacturing. Zach man
models. Computers in Industry, 42, 231-243. International, www.ZachmanInternational.com.
Zachman, J. A., & Sowa, J. F. (1992). Extending and
Wu, R.C.Y. (2007). Enterprise integration in e-gov- formalizing the framework for information systems
ernment. Transforming Government: People, Process architecture. IBM Systems Journal, 31(3).
and Policy, 1(1), 89-99.
Zwegers, A., Tolle, M., & Vesterager, J., (2003). VE-
Xia Wang, Goudos S., Peristeras V., Vitvar T., Mocan RAM: Virtual Enterprise Reference Architecture and
A., & Tarabanis K. (2007, 4-10 Jan. ). WSMO-PA: Methodology. In I. Karvonen, R. Van den Berg, P.
Formal Specification of Public Administration Service Bernus, Y. Fukuda, M. Hannus, I. Hartel, J. Vesterager.
Model on Semantic Web Service Ontology. Paper VTT Symposium 224 (pp.17-38), Helsinki, Finland.
presented at the 40th HICSS, Hawaii.

Yergin, D., & Stanislaw, J. (1998). The Commanding


Heights: The Battle Between Government and the
Marketplace That is Remaking the Modern World.
New York: Simon & Schuster.

462
463

About the Contributors

Pallab Saha is currently a member of the faculty with the National University of Singapore (NUS).
His current research and consulting interests include Enterprise Architecture, IT Governance, and Busi-
ness Process Management. He has published several research papers in these areas. Pallab is an active
researcher in the area of Enterprise Architecture and has published his first book titled Handbook of
Enterprise Systems Architecture in Practice in March 2007. Dr. Saha also leads the Information Sys-
tems Management research group within NUSInstitute of Systems Science. Dr. Saha teaches courses
in Enterprise Architecture, IT Governance and Business Process Management at the post-graduate
and senior executive levels (including CIOs). His current consulting engagements are in Enterprise
Architecture for Singapore Government agencies. He has provided consulting and advisory services to
Infocomm Development Authority of Singapore, Intellectual Property Office of Singapore, CPF Board,
and Great Eastern Life Assurance among others. Dr. Saha is the primary author of the Enterprise Ar-
chitecture Methodology and Toolkit for the Government of Singapore. He is also a contributing author
of the Enterprise Architecture Management Guide being developed by the International Association of
Enterprise Architects (a|EA) and is a frequently invited speaker at international and local conferences
on Enterprise architecture and IT governance (including keynote sessions). Prior to academia, he was
instrumental in managing Baxters environmental health and safety offshore development centre in
Bangalore as Head of Projects and Development. He has worked on engagements in several Fortune
100 organizations in various capacities. Pallab received his Ph.D in 1999 from the Indian Institute of
Science, Bangalore. His Ph.D dissertation was awarded the best thesis in the department. His Ph.D.
proposal was selected as one of the top five in India and received a special research grant for the same.
Earlier he completed an M.B.A in Information Systems and prior to that gained a B.Sc. in Electronic
Sciences from Bangalore University. He can be contacted at pallab@nus.edu.sg.

***

Chris Aitken holds a PhD in psychophysiology and has worked with a variety of government
agencies over the last 15 years in both clinical and IM & ICT roles. During the last 6 years he has held a
number of IM & ICT related positions and is currently Manager Enterprise Architecture and Information
Management in Queensland Health in Australia. Chris clinical applied research background means
that he brings a combination of a strong human service delivery perspective and a keen logical rigour to
his approach to enterprise architecture and IM & ICT implementation. Chris current interests include
topics as varied as; the development of an abstract enterprise meta-model, IM & ICT policy and standards
development, and the integration of IM & ICT strategic planning with enterprise architecture.

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
About the Contributors

Leonidas G. Anthopoulos was born in Trikala, Greece in 1974. He graduated (1996) and he got his
PHD in the e-Government area (2005) from the Department of Informatics of the Aristotle University
of Thessaloniki (AUTh). He is an Expert Counselor in e-Government and e-Diplomacy of the Hellenic
Ministry of Foreign Affairs, while he has worked for many organizations such as the Greek Ministry
of Education, the Research Committee (AUTh), the Information Society S.A. (Ministry of Interior of
Greece) etc. He has published several works for international journals, magazines and conferences and
his research interests concern e-Government, Information Society aspects and social networks.

Guido Bayens, MSc, MBAis a principal consultant at Novius Business & Information Management.
He is also the head of the architecture team at ICTU and responsible for theDutch government refer-
ence architecture. Guido studied sociology in Utrecht andattained a Master of Business Administration
degree at Henley. From 2001 2005 he was responsible for the business and ICT architecture of UWV,
the national Dutch Social Security agency. His vision on the possibilities of business architecture is
based on almost 20 years of management experience in environments where fundamental changes of
strategic policy were to be made.

Scott Bernard has over twenty years of experience in information technology management including
work in the academic, federal, military, and private sectors. He is currently the Deputy CIO and Chief
Enterprise Architect. at the Federal Railroad Administration in Washington DC. He also serves on the
faculty of the School of Information Studies at Syracuse University and is a lecturer at the School of
Computer Science at Carnegie Mellon University. Dr. Bernard wrote a textbook on Enterprise Archi-
tecture in 2004 and is the Chief Editor of the Journal of Enterprise Architecture.

Amit Bhagwat has worked on Enterprise-wide IT transformation programs through two decades.
Amit has served as strategist, leader, mentor, manager and auditor for Enterprise Architecture and
Systems Engineering practices in enterprises leading in the world / Europe in their sector. He serves
on the British Computer Society Elite (Effective Leadership in Information Technology) group. Among
the very small number of IBM-Rational accredited instructors to educate IBM and premier-partner staff
consultants, Amit is also TOGAF-8 accredited and contributes to Ethics Workgroup of AOGEA. Amit
has written widely on Requirement-Project-Process Management, Analysis, Design, Visual Modeling
Concepts and Estimation Techniques, with 17 publications, including an oft-quoted cover feature for
The Rational Edge, to his credit. In 2007, Amit led Enterprise Architecture Maturity Appraisal for one
of the largest British government departments and advised CTOs of two multinational institutions, both
leaders in their field in the UK.

Timothy Biggert has led the Human Resources Line of Business enterprise architecture team since
June 2004. In that role, he has guided his team in the development of the HR LOB EA artifacts and
target requirements. He is now working with HR LOB Program stakeholders to benchmark existing
practices and help define the Federal HR enterprise of the future. Tim is an IBM-certified Senior Manag-
ing Consultant with IBMs Global Business Services (GBS) Public Sector Human Capital Management
consulting practice. Over the course of his 19 years working for the worlds largest consulting firm, Tim
has led teams in many different project areas including human capital strategy, enterprise architecture,
business transformation, organization change, project management, education development and delivery,
methodology creation and implementation, and application development. He has worked on a broad

464
About the Contributors

range of business environments including federal, state, and local government, education, aerospace,
retail, manufacturing, distribution and logistics, financial services, banking, life sciences, pharmaceuti-
cal, agriculture, utility and telecommunications. He has a Masters Degree in Business Administration
from the University of Minnesota.

William S. Boddie serves as the Professor of Systems Management at the U.S. National Defense
University (NDU) Information Resources Management (IRM) College. Dr. Boddie has nearly 30 years
experience leading and managing information technology (IT) environments for public, private, and
non-profit-sector organizations. Dr. Boddie specializes in organizational leadership, enterprise perfor-
mance effectiveness, enterprise architecture, and program and project management and is the NDU
IRM College Professor of the Year for 2006 2007. Further, Dr. Boddie developed and delivered the
Business Information Technology Leadership Certificate Program, a continuing education program,
to various Washington DC colleges since 1999.

Anand Desai is Professor in the John Glenn School of Public Affairs at the Ohio State University.His
research interests include performance measurement and evaluation in the public sector and the use of
policy modeling to support public sector decision-making.

Wijnand Derks (1973) is scientific researcher at Telematica Instituut since 2005. Previously, he
worked at the research department of the largest Dutch telecom company KPN Telecom (1997-2001)
and the faculty of computer science at University of Twente (2001-2005). In the past ten years he worked
on several fundamental and applied research projects in national and international context in the do-
mains of scaleable database- and transaction technology, enterprise architecture and cross-enterprise
workflow management. His prime interests involve the development and application of fundamentally
new ICT solutions in the industry. Within Telematica Institute he develops new application concepts for
demand-driven and integral electronic service provisioning in the context of public-private partnerships.
In addition, he is involved in the research program Software for Service where ICT-users, ICT-suppliers
and research parties jointly to develop novel business models and ICT-based applications.

Alan Dyer has many years experience with organisational decision-making, from a variety of per-
spectives (including as a consumer, provider and developer); the majority of these experiences
were gained through the Australian Defence Forces. Alan has been directly involved in information
and knowledge management in the form of technology, projects or abstract application of principles
for the last 17 years. Alans current studies include post-graduate research in Enterprise Architecture,
building upon a B.Sc. (Maths and CompSci) and an M.Sc.(IT). Alan is currently employed by EWA-
Australia (http://www.ewa-australia.com).

Neil Fairhead, in a 30 year career in information technology has worked as an enterprise architect
and technology strategist with a number of major organizations including the Canada Post, the Canadian
Imperial Bank of Commerce, the British Home Office and a major British bank. He also brings service
management experience to bear following several years at Microsoft where he helped to introduce ITIL.
His IT experience includes systems engineering at IBM, office and distributed systems at Digital (DEC),
information engineering at James Martin Associates and he is currently focused on structured managed
service offerings at Fujitsu Services. He has studied at Cambridge, Manchester Business School and,

465
About the Contributors

post-experience, at Harvard Business School. He is a certified management consultant and a Fellow of


the Institute of Service Management as well as being TOGAF certified.

John Good is currently a Director at Serco Consulting where he leads the Enterprise Architecture
capability group. He focuses on helping organisations establish Enterprise Architecture teams and
specializes in data and information architecture and the use of enterprise architecture in enabling
major business transformation. His career spans 20 years in information and media technology as
a solutions and enterprise architect, principal technologist and technology strategist. A graduate of
Edinburgh University in Computer and Management Sciences, and a TOGAF certified practitioner,
he trained in information systems with Price Waterhouse before a career with DHL, the BBC and his
current consulting role.

Shirley Gregor heads the National Centre for Information Systems Research in the College of
Business and Economics at the Australian National University. Professor Gregor has led several large
projects in the e-commerce area funded by the private sector and government. Professor Gregor was
inaugural President of the Australasian Association of Information Systems and is Vice-President of
the Australian Council of Professors and Heads of Information Systems. Professor Gregor was made
an Officer of the Order of Australia in the Queens Birthday Honours list in June 2005 for services as
an educator and researcher in the field of information systems and in the development of applications
for electronic commerce in the agribusiness sector.

Dennis Hart is a Senior Lecturer in the College of Business and Economics at the Australian National
University and has research interests in the areas of ownership issues in information systems develop-
ment and information management; Semiotics and information systems. Dr Hart was a former senior
officer in the Royal Australian Navy before commencing a career as an academic. In addition to his
academic activities, Dr Hart also manages and runsa 20 acre vineyard with his partner on a property
near Yass in the state of New South Wales.

Shuyuan Mary Ho is a PhD Candidate at School of Information Studies, Syracuse University. Her
research interests focus on information systems security, which includes information content security,
information security management and computing security. Her dissertation is in the interdisciplinary area
of behavioral anomaly detection for online community. This research is aimed to discover the mechanism
for detecting changes in trustworthiness for countering insider threats. Shuyuan is a CISSP certified by
(ISC)2 and a CISM certified by ISACA. She has acquired a Master in Philosophy in Information Science
and Technology, a Master in Business Administration, and a Bachelor in Computer Science.

Marijn Janssen is director of education of the Systems Engineering, Policy Analysis & Management
Master at the Faculty of Technology, Policy and Management of Delft University of Technology. He is
elected as secretary of the IFIP WP 8.5 working group on Information Systems in Public Administra-
tion. He also teaches courses on middleware architecture, web-information systems and management,
and designing large-scale ICT-infrastructure and services. He conducted several research projects in the
field of e-government, enterprise architecture and orchestration in interorganizational networks. He is
an associate editor of the International Journal of E-Government Research (IJEGR) and International
Journal of E-business Research (IJEBR) and co-chair of the E-government Architecture, Infrastructure

466
About the Contributors

and Interoperability minitrack at the HICSS conference. He serves on several international program
committees and is a program chair of the Annual Conference on Digital Government (dg.o2008). He
published over 100 refereed publications.

Hong Sik Kim is Adjunct Professor of Korea Polytechnic University, Computer Engineering
Department and Secretary of KIITA (Korea Institute of Information Technology Architecture). He had
been involved in the a|EA standardization project (EAMG: Enterprise Architecture Management Guide)
for 2 years as a vice president of a|EA Korean Chapter. He suggested a more practical and sustainable
development strategy to the EA community world wide, especially for area of the quality and maturity
model of EIA in stead of EA. He had experiences to consolidate 21 MIS departments of Hyundai Group
into one mega center as a foundation member of Hyundai Information Technology. And He introduced
company wide QMS (Quality Management System), TickIT scheme (British standard version of ISO
9000-3) and institutionalized the QMS for 6 years. He also had introduced customer satisfaction system
company-wide and executed pilot project of MBNQA (Malcolm Baldridge National Quality Award).

Bram Klievink is research assistant and Ph.D. researcher at Delft University of Technology at
the faculty of Technology, Policy and Management. Bram holds a degree in political science from
the University of Nijmegen (M.Sc, 2006) and a degree in business information systems (2004). His
research focus is on coordination mechanisms for public-private cooperation in electronic government
service-delivery. For this research he participates in two major research projects. One is on creating
demand-driven integrated electronic service-delivery by government and private partners, which aims
at exploring future directions for public services. The other project is on the coordination of multiple
channels operated by government, private parties may be part of these channels.

Marc M. Lankhorst is a senior member of scientific staff at Telematica Instituut where he heads
the institutes expertise group on Service Architectures. His research interests range from enterprise
architecture and business process management to service orientation and model-driven software develop-
ment. In the past, he has managed several multi-party research projects with partners from government,
industry and academia. At the moment, he is responsible for a major project on integrated, demand-
driven egovernment services. Furthermore,he teaches several courses on architecture at universities
and other institutes. Marc holds an MSc in Computer Science from the University of Twente and a PhD
from the University of Groningen in the Netherlands.

Ryan Kobb has provided business performance management and program management leadership
to the IBM team supporting the OPM Office of the Human Resources Line of Business since March
2005. In that role, he helps lead the management of the HR LOB governance structure and provides
support in the areas of enterprise architecture, change management, and communications and outreach.
He is now working to complete the migration planning guidance that agencies will leverage to select
and migrate to a shared service center as well developing a transformation toolkit for agencies as they
prepare for their selection and migration to a shared service center. Ryan is a Senior Consultant in IBMs
Global Business Services (GBS) Public Sector Financial Management Practice. He is IBM-certified
in Earned Value Management and recently has been recognized by Consulting Magazine as one of the
Top 30 Consultants Under the Age of 30.

467
About the Contributors

Nigel Martin is a Lecturer in the College of Business and Economics at the Australian National
University, and has principal research interests in the areas of Enterprise Architecture, Requirements
Engineering, IT Governance, ICT Strategy, Systems Design and Electronic Government. Dr Martin was
a former oil industry manager, and government executive working primarily in the areas of defence,
national security, and law enforcement.

John Mo is a Professor and Discipline Head for Manufacturing and Materials Engineering at the
RMIT University, Melbourne, Australia. Prior to this, John was the Team Leader of the Manufacturing
Systems and Infrastructure Networks research group in the Division of Manufacturing and Infrastruc-
ture Technology of Commonwealth Scientific and Industrial Research Organisation (CSIRO). John
led several large scale international projects involving multi-disciplinary teams in the development of
advanced project collaboration systems for designing one-off facilities such as chemical plants and high
value computer controlled assets. His team of 15 professionals had completed projects on developing
methodologies for risks analysis, critical infrastructure protection modelling, electricity market simula-
tion, wireless communication, fault detection and production scheduling. He also led the National EPC
Network Demonstrator Project and its extension, which were the first EPC implementation conforming
to EPC Global standard. He obtained his PhD from Loughborough University, UK. John is a Fellow
of the Institution of Engineers, Australia.

Sungwook Moon is working as a software consultant at ComponentBasis, Co., Ltd., Korea. He has
experienced dozens of software development projects, and mainly played a role for component-based
development discipline mentoring and software quality assurance. In addition, he has much interest in
software process improvement and software architecture. Since 2003, he has presented his researches
at several conferences such as the European Software Process Improvement and the Korea Society of
Management Information Systems. Recently, he joined in MIS department of University of Seoul as a
PhD candidate to research into service-oriented architecture and enterprise architecture. He obtained
his MS degree in Chemical Engineering from Korea Advanced Institute of Science and Technology in
1998 and his BS degree in Chemical Engineering from Yonsei University in 1996.

Laszlo Nemes was Chief Research Scientist and Science Director in the Division of Manufactur-
ing and Infrastructure Technology of Commonwealth Scientific and Industrial Research Organisation
(CSIRO) Australia. He led a research program with more than 50 staff working on enterprise integra-
tion, machine vision, autonomous robotics, signal diagnostics and process control. In addition, he also
led complex international research teams to complete large, industry related R&D projects in the area of
computer aided design and manufacturing, within the international Intelligent Manufacturing Systems
program. His achievements are hallmarked with six industry related patents; over 100 papers published
internationally, six books/monographs. His major achievement, the development of the Generic En-
terprise Reference Architecture was developed in a team of international experts and was endorsed as
the Annex to ISO enterprise engineering standard. Dr Nemes is a Fellow of the Australian Academy of
Technological Sciences and Engineering, Fellow of the Institution of Engineers, Australia.

Klaus Niemann has more than 25 years experience with the design of complex IT-architectures in the
telecommunication and financial sector. He worked as system designer, software architect, consultant,
project manager and enterprise architect in several positions and for a wide range of clients. Klaus holds

468
About the Contributors

a diploma in computer science from the Technical University of Berlin. In the 80s his main focus was
on distributed systems, telecommunication and banking networks in Europe as well as in the Far East.
In the 90s he worked on the introduction of object orientation to large organizations and then focused
on client/server architectures. He frequently gave professional training sessions, published several
articles and books, and also became a frequent speaker to conferences. He founded ACT! Consulting
in 1998 with special emphasis on enterprise architecture management. He developed the enterprise
architecture framework t-eam (toolbox for enterprise architecture management). Klaus is a member of
the OpenGroups Architecture Forum and works with the International Committee on EA Standards
(Association of Enterprise Architects).

Vassilios Peristeras is a Research Fellow and Adjunct Lecturer at the National University of Ireland,
Galway, Digital Enterprise Research Institute (DERI). He has studied Political Science and holds M.Sc
and PhD in Information Systems. For the last 12 years, he has worked for the Greek National Center for
Public Administration and Decentralization, the United Nations, the Center for Research and Technol-
ogy Hellas (CERTH), the University of Macedonia and as consultant for many governments and private
companies. His main research areas are eGovernment, enterprise architecture and semantic technologies.
He has published more than 40 papers in international conferences and scientific journals.

Jay Ramanathan is the Director of Research at the Collaborative for Enterprise Transformation and
Innovation (or CETI). She is currently engaged in developing programs of industry-focused research,
practice, and education. Particular areas of interest are Adaptive Complex Enterprise Architectures for
Business-IT alignment and management; and business-driven IT innovation.

Rajiv Ramnath is Director of Practice at the Collaborative for Enterprise Transformation and Inno-
vation (CETI) at OSU. His expertise ranges from wireless sensor networking and pervasive computing
to business-IT alignment, enterprise architecture, software engineering, e-Government, collaborative
environments and work-management systems.

Kunal Suryavanshi has led the IBM team supporting the OPM Office of the Human Resources
Line of Business since April 2003. In that role, he provides thought leadership and strategic advice to
the OPM HR LOB leadership team. He was influential in building the coalition of 24 Federal agencies
that crafted the vision, goals, and concept of operations of the HR LOB program and that subsequently
developed the HR LOB target enterprise architecture and requirements for shared service centers. Kunal
is an Associate Partner and IBM-certified strategy consultant in IBMs Global Business Services (GBS)
Federal Strategy and Change Practice. He has led teams in many different project areas including elec-
tronic government strategy, enterprise architecture, business transformation, organization change, project
management, and business case development for Federal IT projects. Kunal has an undergraduate degree
in Civil Engineering from University of Bombay and an MBA from Carnegie Mellon University.

Konstantinos Tarabanis is a Professor at the Department of Business Administration of the University


of Macedonia, Greece and the Director of the Information Systems Laboratory at the same university. He
received an Engineering Diploma in Mechanical Engineering from the National Technical University of
Athens (1983), an M.S. degree in both Mechanical Engineering and Computer Science (1984 and 1988
respectively), and a Ph.D. degree in Computer Science (1991), at Columbia University, New York, NY.

469
About the Contributors

He was a research staff member at the IBM T.J. Watson Research Center 1991-1994 and was employed
by the IBM Corporation as a whole during 1984-1994. In recognition of his research, he was the recipi-
ent of the Anton Philips Best Paper Award at the 1991 IEEE International Conference on Robotics and
Automation. His current research interests include e-government and e-business. In recognition of his
work in the field of e-government, he was the recipient of the Best Paper Award in the e-government
track at the European Conference on Information Systems in 2000. Also in recognition of his work in
the field of e-Business he received the Outstanding Research Paper Award in the 7th Annual Conference
of the International Academy of e-Business in 2007.

Dwight Toavs, PhD, is a Professor of Systems Management at the National Defense Universitys
Information Resources Management College in Washington, D.C. His academic, teaching, and research
interests lie at the intersection of public policy, governance, and information technology in public or-
ganizations. In particular, he is interested in visual techniques and technologies as a means to under-
stand and explain policy topics. He is the creator of PolicyWorld, the first virtual reality depiction of
a contemporary public policy topic, a 3D collaborative virtual environment for exploring information
resources management policies in the US Federal government. His interest in information visualiza-
tion, cognitive mapping, and virtual environments results from the expressive and communicative
potential of these approaches to aid in understanding complex policy and governance issues. He can
be contacted at toavs@ndu.edu.

John A. Zachman is the originator of the Framework for Enterprise Architecture which has re-
ceived broad acceptance around the world as an integrative framework, or periodic table of descriptive
representations for Enterprises. John is not only known for this work on Enterprise Architecture, but is
also known for his early contributions to IBMs Information Strategy methodology (Business Systems
Planning) as well as to their Executive team planning techniques (Intensive Planning). He retired from
IBM in 1990, having served them for 26 years. He presently is Chairman of the Board of Zachman
Framework Associates, a worldwide consortium managing conformance to the Zachman Framework
principles. He is Chief Executive Officer of the Zachman Institute for Framework Advancement (ZIFA),
an organization dedicated to advancing the conceptual and implementation states of the art in Enterprise
Architecture. He also operates his own education and consulting business, Zachman International (www.
ZachmanInternational.com). John serves on the Executive Council for Information Management and
Technology (ECIMT) of the United States Government Accountability Office (GAO). He is a Fellow
for the College of Business Administration of the University of North Texas. He serves on the Advisory
Board for the Data Resource Management Program at the University of Washington and on the Advisory
Board of the Data Administration Management Association International (DAMA-I) from whom he was
awarded the 2002 Lifetime Achievement Award. He was awarded the 2004 Oakland University, Applied
Technology in Business (ATIB), Award for IS Excellence and Innovation. John has been focusing on
Enterprise Architecture since 1970 and has written extensively on the subject. He is the author of the
book, The Zachman Framework for Enterprise Architecture: A Primer on Enterprise Engineering and
Manufacturing. He has facilitated innumerable executive team planning sessions. He travels nation-
ally and internationally, teaching and consulting, and is a popular conference speaker, known for his
motivating messages on Enterprise Architecture issues. He has spoken to many thousands of enterprise
managers and information professionals on every continent. In addition to his professional activities,
John Zachman serves on the Elder Council of the Church on the Way (First Foursquare Church of Van

470
About the Contributors

Nuys, California), the Board of Directors of Living Way Ministries, a radio and television ministry of
the Church on the Way, the Presidents Cabinet of the Kings College and Seminary, the Board of Direc-
tors of the Los Angeles Citywide Childrens Christian Choir and on the Board of Directors of Native
Hope International, a Los Angeles-based ministry to the Native American people. Prior to joining IBM,
John served as a line officer in the United States Navy and is a retired Commander in the U. S. Naval
Reserve. He chaired a panel on Planning, Development and Maintenance Tools and Methods Integra-
tion for the U.S. National Institute of Standards and Technology. He holds a degree in Chemistry from
Northwestern University, has taught at Tufts University, has served on the Board of Councilors for the
School of Library and Information Management at the University of Southern California, as a Special
Advisor to the School of Library and Information Management at Emporia State University, and on the
Advisory Council to the School of Library and Information Management at Dominican University.

471
472

Index

Symbols D
311 system 160 Department of Homeland Security (DHS) 193
design integrity 174
A design integrity, implementing 179
ACE framework 153 design integrity framework 176, 181
ANZAC Ship Alliance (ASA) 377 design integrity framework, and enterprise architec-
ArchiMate 40 ture governance 173190
architecture maturity model 9 Digital City 395
Australian Bureau of Statistics 409, 419 Dutch e-government 34
Dutch government 3055, 263
B
E
Beacon Architecture 5681
e-government 392
C e-government, in Singapore 10
e-government, overview of 3
capability maturity profile (CMP) 110 e-government, stages of 4
Centrelink Social Services Agency 409, 420 E-Government Act of 2002 309
collaborative enterprise architecture, for municipal E-Gov Travel 310
environments 392408 E-Payroll initiative 310
Columbus, Ohio 157 e-Training initiative 310
communication 138 EA cube 345
confidentiality 348 EIA maturity model 90
cooperation, public-private 269 enterprise architecture, and government 194
corporate governance 211 enterprise architecture, and information security
340370
enterprise architecture, as documentation method
343

Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Index

enterprise architecture, aspects of 58 knowledge management, measuring 112


enterprise architecture, challenges to public sector knowledge management maturity model framework
66 116
enterprise architecture, definition of 84
enterprise architecture, linked to KM 114 L
enterprise architecture, measuring benefits of leadership 135
106129
enterprise architecture, patterns for 152 M
enterprise architecture, people-led 285306
enterprise architecture, transforming of 60 MAGENTA 1
enterprise architecture, U.S. government 132 maturity model 113
enterprise architecture adoption, in government
businesses 372 O
enterprise architecture management, and IT gover- operational agility 173
nance 208228
enterprise architecture standards 374 P
enterprise engineering 373
enterprise information architecture, definition of 89 PA Service Model 250
European interoperability framework (EIF) 35 people-led enterprise architecture 285
policy map, and relationships 200
G policy map, why create a 197
policy mapping 191207
GovBenefits.gov 310 policy mapping, challenges 204
governance enterprise architecture (GEA) 229262 public institutions, and hierarchies 149
governance enterprise architecture (GEA), frame-
work 234 R
government, and enterprise architecture 194
government, and IT challenges 151 Recruitment One-Stop 311
government business processes 414 resource alignment 342
government enterprise architecture 409437 S
government enterprise architecture (GEA) 2
government transformation, and MAGENTA 22 SAFECOM 310
Grants.gov 310 security architecture 348
security architecture framework (SAF) 349
H service-oriented computing (SOC) 36
HR LOB performance model 317 service-oriented reference architecture, and Dutch
government 3055
I service delivery, using enterprise architecture
307339
information security 340370 service oriented architecture (SOA) 264
integrated service delivery 270 shared service providers 335
integrity 348 Singapore, e-government programme 10
investment planning 208, 214 speech act theory (SAT) 239
IRS Free File 310 stakeholders 289
ITA/EA area 82 stakeholders, builder 289
IT governance 211 stakeholders, customer 289
stakeholders, user 290
K
knowledge management 111 T
knowledge management, linked to enterprise archi- total quality management (TQM) 86
tecture 114 transformational leaders 135

473
Index

transformational leadership 130148 V


transformational leadership model 136
VICIE model 136
U virtual private networks (VPN) 361

U.S. Government Accountability Office 130 W


U.S. Government enterprise architecture 132
U.S. Office of Management and Budget 130, 309 wireless security 361
U.S. Office of Personnel Management 311

474

Das könnte Ihnen auch gefallen