Beruflich Dokumente
Kultur Dokumente
Enterprise Architecture
Pallab Saha
National University of Singapore, Singapore
Copyright 2009 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by
any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does
not indicate a claim of ownership by IGI Global of the trademark or registered trademark.
p. cm.
Summary: "This book is a compilation of chapters on government Enterprise architecture with the intention of informing professionals
with different levels of enterprise architecture knowledge"--Provided by publisher.
1. Internet in public administration. 2. Public administration. 3. Management. 4. Information technology. I. Saha, Pallab, 1970-
JF1525.A8A383 2008
351--dc22
2008013117
All work contributed to this book set is original material. The views expressed in this book are those of the authors, but not necessarily of
the publisher.
If a library purchased a print copy of this publication, please go to http://www.igi-global.com/agreement for information on activating
the library's complimentary electronic access to this publication.
List of Reviewers
Foreword . ............................................................................................................................................ xv
Preface . .............................................................................................................................................xviii
Section I
Frameworks and Methodologies
Chapter I
A Methodology for Government Transformation with Enterprise Architecture...................................... 1
Pallab Saha, National University of Singapore, Singapore
Chapter II
A Service-Oriented Reference Architecture for EGovernment............................................................ 30
Marc M. Lankhorst, Telematica Instituut, The Netherlands
Guido I.H.M. Bayens, Novius, The Netherlands
Chapter III
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public
Sector..................................................................................................................................................... 56
Amit Bhagwat, Independent Consultant, UK
Chapter IV
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA).................. 82
Hong Sik Kim, Korea Polytechnique University, Korea
Sungwook Moon, ComponentBasis, Co., Ltd., Korea
Chapter V
Measuring the Benefits of Enterprise Architecture: Knowledge Management Maturity.................... 106
Alan Dyer, EWA, Australia
Section II
Leadership, Governance, and Management
Chapter VI
The Criticality of Transformational Leadership to Advancing United States Government
Enterprise Architecture Adoption........................................................................................................ 130
William S. Boddie, National Defense University, USA
Chapter VII
Adaptive IT Architecture as a Catalyst for Network Capability in Government................................. 149
Jay Ramanathan, The Ohio State University, USA
Rajiv Ramnath, The Ohio State University, USA
Anand Desai, The Ohio State University, USA
Chapter VIII
Design Integrity and Enterprise Architecture Governance.................................................................. 173
Chris Aitken, Queensland Health, Australia
Chapter IX
Policy Mapping: Relating Enterprise Architecture to Policy Goals.................................................... 191
Dwight V. Toavs, National Defense University, USA
Chapter X
Enterprise Architecture Management and its Role in IT Governance and IT Investment
Planning............................................................................................................................................... 208
Klaus D. Niemann, act! Consulting GmbH, Germany
Chapter XI
The GEA: Governance Enterprise Architecture-Framework and Models........................................... 229
Vassilios Peristeras, National University of Ireland, Ireland
Konstantinos Tarabanis, University of Macedonia, Greece
Chapter XII
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private
Cooperation.......................................................................................................................................... 263
Bram Klievink, Delft University of Technology, The Netherlands
Wijnand Derks, Telematica Instituut, The Netherlands
Marijn Janssen, Delft University of Technology, The Netherlands
Section III
Realization and Deployment
Chapter XIII
People-Led Enterprise Architecture..................................................................................................... 285
Neil Fairhead, Fujitsu Services, UK
John Good, Serco Consulting, UK
Chapter XIV
Using Enterprise Architecture to Transform Service Delivery: The U.S. Federal Governments
Human Resources Line of Business.................................................................................................... 307
Timothy Biggert, IBM Global Business Services, USA
Kunal Suryavanshi, IBM Global Business Services, USA
Ryan Kobb, IBM Global Business Services, USA
Chapter XV
Enterprise Architecture as Context and Method for Designing and Implementing
Information Security and Data Privacy Controls in Government Agencies........................................ 340
Scott Bernard, Carnegie Mellon University, USA
Shuyuan Mary Ho, Syracuse University, USA
Chapter XVI
Architecture Based Engineering of Enterprises with Government Involvement................................. 371
John Mo, RMIT University, Australia
Laszlo Nemes, Nemes Consulting, Australia
Chapter XVII
Collaborative Enterprise Architecture for Municipal Environments................................................... 392
Leonidas G. Anthopoulos, Hellenic Ministry of Foreign Affairs, Greece
Chapter XVIII
Government Enterprise Architectures: Enabling the Alignment of Business Processes
and Information Systems .................................................................................................................... 409
Nigel Martin, The Australian National University, Australia
Shirley Gregor, The Australian National University, Australia
Dennis Hart, The Australian National University, Australia
Index.................................................................................................................................................... 472
Detailed Table of Contents
Foreword . ............................................................................................................................................ xv
Preface . .............................................................................................................................................xviii
Section I
Frameworks and Methodologies
Chapter I
A Methodology for Government Transformation with Enterprise Architecture...................................... 1
Pallab Saha, National University of Singapore, Singapore
Countries across the world are pushing their frontiers in Governance in the move to information econ-
omy, and governments play a pivotal role in this transformation. These governments employ modern
information and communication technologies to serve the citizens and businesses better. Raising the
effectiveness and quality of government services is not only a matter of leading edge technologies; it
also involves visionary leadership, clear objectives and sound execution mechanism. The role of Enter-
prise Architecture in shaping E-Government programmes cannot be overstated. Within the context of
Singapores e-government initiative, this chapter describes the Methodology for AGency ENTerprise
Architecture (MAGENTA), a rigorous, disciplined and structured methodology for development of
agency enterprise architectures that enables agencies to align to and fully support the governments
transformation objectives and outcomes. Mechanisms for agencies to align to the overall Government
Enterprise Architecture are detailed. The chapter concludes with a set of recommendations for future
enhancements and research.
Chapter II
A Service-Oriented Reference Architecture for EGovernment............................................................ 30
Marc M. Lankhorst, Telematica Instituut, The Netherlands
Guido I.H.M. Bayens, Novius, The Netherlands
This chapter describes the development and future directions of service-oriented reference architecture
for the Dutch government. The Dutch government has focussed on improving the service level of public
agencies for several years. Electronic services play an important part in this, which requires a concerted
effort across many organizations. A reference architecture has been created in order to guide the many
different programmes and projects. This chapter describes the role of service orientation in e-government,
and the creation, structure, and first results of this reference architecture for e-government. Furthermore,
the chapter looks ahead at future developments in integrated, demand-driven service provisioning in
e-government.
Chapter III
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public
Sector..................................................................................................................................................... 56
Amit Bhagwat, Independent Consultant, UK
This chapter introduces the concept of Beacon Architecture as a formalized and ordered grouping of
architectural elements, describing the constituents, their order, correlation and likely evolution of the
grouping; and illustrating its specific value to the public sector. The first half of the chapter builds up to
the concept, the reasons behind its specific nature, and its value to enterprises, especially in the public
sector. For this, the chapter is split into a number of sections that may be studied separately and that also
build up to introduce Beacon Architecture. The sections may be broadly divided as concepts, historical
overview, illustrative case studies in public sector transformations along with a summary of peculiar
architectural challenges they face, and a cyclical pattern to Architecture Development. After introducing
and elucidating on concept and constituents of Beacon Architecture, the chapter delves into its correla-
tion with architecture concepts in currency and its role in mitigating enterprise architecture challenges
illustrated earlier in the chapter, before concluding on an assessment of future trends.
Chapter IV
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA).................. 82
Hong Sik Kim, Korea Polytechnique University, Korea
Sungwook Moon, ComponentBasis, Co., Ltd., Korea
Quite a good amount of time has been spent seeking appropriate solutions to handle the giant informa-
tion technology expenditure not only in government sectors but also in private sectors all over the world.
Beginning with OMB, which substantially leads the U.S. governmental efforts in ITA/EA area, seems
to be on the right path using process improvement concept in its ITA/EA maturity model (OMB, 2007-
2). EA community still finds it difficult to introduce quality management concept into its business and
practices. This chapter therefore suggests a practical ITA/EA maturity model based on the quality concept
of enterprise information architecture (EIA), which is ROIdriven, practical and based on four-phased
process improvement approach for the EA community. This approach could bring a substantial reduction
in the costs and efforts in the entire ITA/EA area and provide sustainable development environment for
the ITA/EA like the argument of the environmentalists.
Chapter V
Measuring the Benefits of Enterprise Architecture: Knowledge Management Maturity.................... 106
Alan Dyer, EWA, Australia
Enterprise Architecture is the organising logic for business processes and Information Technology infra-
structure, the purpose of which is to create a more effective organisation in the context of the businesss
strategy and goals. However, the ability to measure the effectiveness of any activities initiated under
the guise of Enterprise Architecture is limited, even more so in those organisations, such as government
agencies, that do not recognise financial return on investment. This chapter introduces the concept of
Knowledge Management, linked to the strategic outcomes of Enterprise Architecture and proposes a
maturity model framework for the measurement of Enterprise Architecture implementation. The chapter
aims to provide a basis for discussion of a wider Capability Maturity Profile with architectural frameworks
to help develop and measure the benefits of implementing frameworks and architectures.
Section II
Leadership, Governance, and Management
Chapter VI
The Criticality of Transformational Leadership to Advancing United States Government
Enterprise Architecture Adoption........................................................................................................ 130
William S. Boddie, National Defense University, USA
An effective enterprise architecture capability enables an organization to develop sound enterprise plans,
make informed human, material, and technology resource investment and management decisions, and
optimize key business processes. Despite U.S. Congressional legislation, U.S. Office of Management
and Budget guidance, and U.S. Government Accountability Office reports and recommendations, many
U.S. government leaders struggle in advancing EA adoption in their organizations. U.S. Government
leaders must embrace transformational leadership to advance EA adoption. This chapter presents the
Vision, Integrity, Communication, Inspiration, and Empowerment Transformational Leadership Model
that describes competencies U.S. Government leaders need to advance EA adoption. The chapter also
presents the Transformational Leadership and Enterprise Management Integration Framework that de-
scribes the relationship between transformational leadership and enterprise management functions.
Chapter VII
Adaptive IT Architecture as a Catalyst for Network Capability in Government................................. 149
Jay Ramanathan, The Ohio State University, USA
Rajiv Ramnath, The Ohio State University, USA
Anand Desai, The Ohio State University, USA
Public institutions that are organized in hierarchies find it difficult to address crisis or other unique
requirements that demand networked solutions. This chapter first provides a prescriptive transaction-
based method for achieving such networking organizations with information technologies (IT) and then
discusses how the organization becomes more effective in non-routine responses to citizen requests.
The chapter illustrates how the prescriptive transaction-based enterprise architecture framework was
used for decision-making in a multi-year interdisciplinary industry-university collaboration resulting in
a successful 311 system.
Chapter VIII
Design Integrity and Enterprise Architecture Governance.................................................................. 173
Chris Aitken, Queensland Health, Australia
This chapter describes a design integrity framework for developing models of any entity of interest at
various levels of abstraction. The design integrity framework presented describes and defines contextual,
conceptual, logical and physical model types. The framework also defines a set of alignment attributes
for each model type and explains how these are to be used to demonstrate alignment from initial con-
cept and requirements through to actual physical implementation. These concepts are then applied in
an organisational context to identify the roles necessary to support an EA governance framework and
strong alignment from idea to implementation.
Chapter IX
Policy Mapping: Relating Enterprise Architecture to Policy Goals.................................................... 191
Dwight V. Toavs, National Defense University, USA
Few government executives can explain the enterprise architecture of his or her agency, and it is rare to
find a political executive who is able to explain how their political objectives are furthered by govern-
ment-wide enterprise architecture. This low level of awareness translates to enterprise architecture efforts
that are often undervalued and under funded because the budget priorities of political and functional
executives rarely include enterprise architecture. Not surprisingly, many points of tension exist as the
CIOs and architects work to translate political goals into resources and architectural plans supporting the
agencys programs. This tension, between the rational orientation of enterprise architecture advocated
by the CIO and the political nature of policy goals sought by executives, often puts a CIO at odds with
his or her organizations political and functional executives. This chapter discusses that tension, and
advocates that CIOs and enterprise architects develop a Policy Map to bridge the gap between the
political and the rational perspectives.
Chapter X
Enterprise Architecture Management and its Role in IT Governance and IT Investment
Planning............................................................................................................................................... 208
Klaus D. Niemann, act! Consulting GmbH, Germany
A comprehensive enterprise architecture management has strategic and operative aspects. Strategic tasks
cover the identification of appropriate fields of activity for information technology (IT) investments in
accordance with business strategy and portfolio management. Enterprise architecture management is
cross-linked with other IT management processes and delivers the necessary information for sustainable
governance. The continuous analysis of the IT landscape, the deduction of measures for optimization
and its controlling also belong to the tasks of architecture management. Standards for development and
infrastructures are made, e.g. reference architectures and a book of standards, whose implementation
is overseen by solution architects throughout the operative architecture management.
Chapter XI
The GEA: Governance Enterprise Architecture-Framework and Models........................................... 229
Vassilios Peristeras, National University of Ireland, Ireland
Konstantinos Tarabanis, University of Macedonia, Greece
Departing from the lack of coherent and ready-to-use models and domain descriptions for public admin-
istration, the chapter presents a set of generic models that serves as a top-level, generic and thus reus-
able Enterprise Architecture for the overall public administration domain. This set of models is called
Governance Enterprise Architecture (GEA). GEA has deliberately remained technology independent
and following the Model Driven Architecture approach, GEA constitutes a computationally independent
model for the domain. GEA has been derived from multi-disciplinary influences and insights and identifies
two broad modeling areas, called governance mega-processes: Public Policy Formulation and Service
Provision. These two, together with the object versus process perspective, form a four-cell matrix that
defines four modeling areas for the GEA models. Until now, a large number of services have been mod-
eled using GEA and more recently; an extended modeling effort has started with GEA being chosen for
use by a national EU-country project. GEA can be also used as a knowledge infrastructure for applying
semantic technologies. In this line, it has been used for creating a public administration specialization
of a formal Semantic Web Service ontology, namely WSMO.
Chapter XII
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private
Cooperation.......................................................................................................................................... 263
Bram Klievink, Delft University of Technology, The Netherlands
Wijnand Derks, Telematica Instituut, The Netherlands
Marijn Janssen, Delft University of Technology, The Netherlands
This chapter presents an architecture aimed at supporting the coordination of public and private parties
for creating a one stop shop and the main challenges therein. Public-private service network poses higher
requirements on the architecture of a service network, whereas the variety in systems of the various
organizations and different aims make it more difficult to develop such an architecture. Furthermore, it
is difficult to isolate architectural challenges from governance aspects, as many architectural issues need
to be complemented by governance mechanisms. Architecture and governance cannot be considered in
isolation. Within this setting, a new architecture is created and presented for managing and orchestrating
the interactions among governmental and private organizations.
Section III
Realization and Deployment
Chapter XIII
People-Led Enterprise Architecture..................................................................................................... 285
Neil Fairhead, Fujitsu Services, UK
John Good, Serco Consulting, UK
This chapter provides an approach to Enterprise Architecture that is people-led, as a contrast to being
led by technology or modelling methodology. The chapter identifies the major stakeholders in Enterprise
Architecture and suggests where in the organisation they may be found and how they may be connected
with the Enterprise Architecture. It highlights the roles of stakeholders throughout the process of defin-
ing and implementing an Enterprise Architecture. The view of stakeholders managing the EA effort is
described through the complete lifecycle, from setting the EA mission to sustaining the benefits after
implementation. In proposing the adoption of such an approach, we aim to encourage a more direct link
between Enterprise Architecture, the needs of the stakeholders it serves, and the pubic policy outcomes
it enables.
Chapter XIV
Using Enterprise Architecture to Transform Service Delivery: The U.S. Federal Governments
Human Resources Line of Business.................................................................................................... 307
Timothy Biggert, IBM Global Business Services, USA
Kunal Suryavanshi, IBM Global Business Services, USA
Ryan Kobb, IBM Global Business Services, USA
This chapter provides a case study on how the U.S. Office of Personnel Management has led the establish-
ment of the Human Resources Line of Business (HR LOB). It explains how the HR LOB program has
used enterprise architecture to drive transformation to a new Human Resources service delivery model
across the United States Federal government. The authors propose that the common view and vocabulary
that EA artifacts provide, along with the collaborative governance that took place to create the artifacts,
has produced a solid business foundation for this extensive business transformation effort.
Chapter XV
Enterprise Architecture as Context and Method for Designing and Implementing
Information Security and Data Privacy Controls in Government Agencies........................................ 340
Scott Bernard, Carnegie Mellon University, USA
Shuyuan Mary Ho, Syracuse University, USA
Government agencies are committing an increasing amount of resources to information security and
data privacy solutions in order to meet legal and mission requirements for protecting agency informa-
tion in the face of increasingly sophisticated global threats. Enterprise Architecture (EA) provides an
agency-wide context and method that includes a security sub-architecture which can be used to design
and implement effective controls. EA is scalable, which promotes consistency and alignment in controls
at the enterprise, program, and system levels. EA also can help government agencies improve existing
security and data privacy programs by enabling them to move beyond a system-level perspective and
begin to promote an enterprise-wide view of security and privacy, as well as improve the agility and ef-
fectiveness of lifecycle activities for the development, implementation, and operation of related security
and privacy controls that will assure the confidentiality, integrity, and availability of the agencys data
and information. This chapter presents the EA3 Cube EA methodology and framework, including an
integrated security architecture, that is suitable for use by government agencies for the development of
risk-adjusted security and privacy controls that are designed into the agencys work processes, informa-
tion flows, systems, applications, and network infrastructure.
Chapter XVI
Architecture Based Engineering of Enterprises with Government Involvement................................. 371
John Mo, RMIT University, Australia
Laszlo Nemes, Nemes Consulting, Australia
With a plethora of architectures, modeling techniques and methodologies on offer, it is difficult to decide
how to begin building an enterprise and achieve seamless integration. This difficulty is most noticeable
in consortia that need to deal with government participation. Various government projects have differ-
ent objectives and agenda. In addition, changes in business environment as well as government policies
impose extra conditions onto the project. Failure to comply with the project requirement can lead to loss
of business and sometimes unexpected penalty. The chapter uses three case studies to show various ways
of government involvements in projects. Based on the experiences of these cases, the chapter discusses
how enterprise engineering can help creating and managing the enterprise that can engage government
services successfully.
Chapter XVII
Collaborative Enterprise Architecture for Municipal Environments................................................... 392
Leonidas G. Anthopoulos, Hellenic Ministry of Foreign Affairs, Greece
E-Government evolves according to strategic plans with the coordination of central Governments. This
top-down procedure succeeds in slow but sufficient transformation of public services into e-Government
ones. However, public agencies adapt to e-Government with difficulty, requiring holistic guidance and a
detailed legal framework provided by the Government. The setting up of common Enterprise Architecture
for all public agencies requires careful analysis. Moreover, common Enterprise Architecture could fail
to cover the special needs of small or municipal agencies. This chapter uses data from various major e-
Government strategies, together with their enterprise architectures, in order to introduce a development
model of municipal Enterprise Architecture. The model is based on the experience collected from the
Digital City of Trikala, Greece, and results in Collaborative Enterprise Architecture.
Chapter XVIII
Government Enterprise Architectures: Enabling the Alignment of Business Processes
and Information Systems .................................................................................................................... 409
Nigel Martin, The Australian National University, Australia
Shirley Gregor, The Australian National University, Australia
Dennis Hart, The Australian National University, Australia
This chapter describes the development and use of government enterprise architectures for the framing
and alignment of the core business processes and enabling information systems at the Australian Bureau
of Statistics (ABS) and the Centrelink Social Services agency. The chapter focuses on the construction
and ongoing maintenance of public enterprise architectures that enable the alignment condition. An es-
tablished research model has been used to guide the analysis and explication of the government business
processes, enabling systems and architectures, and the resulting agency alignment. While the discussion
acknowledges the existence of other formal and informal enablers of alignment, this chapter concentrates
on the enterprise architecture enabler. The functionally integrated government business processes and
information systems that are established within the instantiated enterprise architecture are examined.
Index.................................................................................................................................................... 472
xv
Foreword
The reasons one would do architecture for anything are two: a) complexity and b) change.
If the object you are trying to create is simple that is, if, at a glance, you can see it in its entirety,
at the level of definition that is required to create it and if it is not likely to change appreciably over
the period of its existence then, you dont need architecture. You need a tool (a machete) some
material (some grass) some time and then chop down grass build a grass shack.
If, on the other hand, the object you are trying to create so complex that you cannot see it in its entirety
at the level of definition required to create it like an Airbus 380 then forget the machete and grass
and it doesnt make any difference what tools you have, what material you have and how much time
you have, you are not going to be able to create an Airbus 380. In this case, you NEED Architecture
that is, you have to be able to describe the object in order to create it.
If you cant describe the object you are trying to create at the level of definition required to create
it, you cant create it I dont really care how big or small, how simple or complex, what its made
of or what it is a hundred story building, a locomotive, a super computer, an Airbus 380 or an
enterprise.
After you get the Airbus created and the price of oil goes up out of sight and the mobility of the
population increases, and you want to change it to carry more passengers with greater fuel efficiency,
how would you do that? You have to go back to the architectural descriptions that were produced in
order to create it to begin with and that constitutes the baseline for changing it that is, they are the
baseline for changing the object IF they have been maintained to reflect any changes that have been
made to the object instances.
If you want to change the object you have created and no architectural representations exist, then you
have only three options: a) you can just make the changes required like, change the jet turbines to
nuclear engines, add a hundred seats, replace the aluminum surfaces with composites, etc. and then
try it and see if it will still work; or b) you can reverse engineer the architectural representations from the
operating instance like, disassemble the Airbus into its parts, with your micrometers measure every
part to operating clearances, understand how the parts fit together, write it all down and then make the
needed changes; or, c) scrap the existing instantiation and build a new one from scratch. These are the
three possibilities for changing an object once it is created when the architectural representations have
not been retained or maintained or if they were never produced in the first place.
xvi
In short, the reasons you do architecture have to do with complexity and change. Nothing magic is
happening and nothing is happening by accident. The laws of nature are constant and there is no way
to circumvent them.
I would submit that the modern Enterprise is the most complex object yet conceived of by human-
kind. Enterprises are far more complex than Airbus 380s! And an enterprise doesnt have to be all
that big to be extremely complex.
I would observe that very many enterprises, and many of them very large enterprises, already exist.
Where is all the enterprise architecture? I submit, the enterprises that are in existence today typically
were never engineered. There is no enterprise architecture. The enterprises actually were never designed
they simply happened, one grass shack at a time. It is little wonder that enterprises, in general, dont
work very well, are not very efficient and are very difficult to change. The problem comes after you
have several square miles of grass shacks and the external environment changes to require a hundred
story building. One more grass shack is not going to fix the problem.
I have been mixing the metaphor between enterprises and buildings but I hope the point is clear
the two reasons you need architecture for anything are complexity and change and there is not going to
be a substitute for architecture.
I would also observe that public sector enterprises tend to be of the extreme complex variety. In the
public sector, there is a wide variety of products and services. There also potentially is some common
infrastructure to manage like finances, employment, land, administration. The public sector Enterprise
typically decentralizes the products and services and centralizes the infrastructure management. The
political issue tends to be who controls what which adds another dimension to the complexity.
When the environment becomes more demanding, that is the consumers demand more and bet-
ter products and services and the suppliers have less available resources; and in the public sector, the
consumers and the suppliers are basically, one in the same; it creates a very tenuous situation where
something has to change. My opinion is, the issues of enterprise architecture are fundamental to ongo-
ing stability of operation. How else are you going to dramatically improve the delivery of products
and services and accomplish this with only the resources that are presently available? You only have
to read the daily newspapers to find the public sector enterprises that are failing in this regard and not
performing effectively.
In the private sector, the worst possible thing that can happen to an enterprise if it becomes dysfunc-
tional, that is, if it can no longer produce marketable products or services with the available resources,
is that it just goes out of business. In the public sector, when enterprises go dysfunctional, there are all
kinds of problems: political problems, environmental problems, economic problems, emotional problems,
sociological problems, in addition to going out of business!
Advances in Government Enterprise Architecture could not appear at a better time. We need the most
advanced thinking humanly possible at this juncture in history. I have devoted nearly 40 years of my
professional life to the subject of Enterprise Architecture. Tragically, the great preponderance of people
in the world seem to still be searching for the holy grail, the quick fix, the silver bullet, a technologi-
cal panacea. My observation is, actual work is going to have to take place, engineering style of work,
enterprise engineering work. Writing more code is NOT going to fix the problem and I dont care how
much more code is written. The enterprise is going to have to be engineered and the raw material for
doing engineering work is the set of descriptive representations that constitute the architecture for the
object being engineered, in this case, the enterprise, in fact the public sector, government enterprise.
Enterprise architecture may well be the issue of the century. In fact, in 1999, I wrote an article by
that name, Enterprise Architecture: The Issue of the Century in which I argued this case. In this short
foreword, I hope I have convincingly established that enterprise architecture for public sector enterprises
is especially critical.
xvii
It is comforting to know that there are some number of people giving the subject of enterprise archi-
tecture, particularly in its manifestation in the public sector, serious thought. As I mentioned above, we
need all of the good thoughts and energy possible focused on this critical subject.
I appreciate Pallab Sahas effort to pull together this collection of material. I know the time and
effort he has spent will benefit all of us immensely. I have encouraged Pallab before never to give up
to continue his good work. I hope this is only the beginning of a lot more advances in government
enterprise architecture. And, in this simple foreword, I hope I have encouraged concentrated focus on the
enterprise, not simply the systems or the technologies of the enterprise but on THE ENTERPRISE,
the government enterprise in particular.
John A. Zachman
Glendale, California
2008
John A. Zachman is the originator of the Framework for Enterprise Architecture which has received broad accep-
tance around the world as an integrative framework, or periodic table of descriptive representations for enterprises.
John is not only known for this work on enterprise architecture, but is also known for his early contributions to IBMs
Information Strategy methodology (Business Systems Planning) as well as to their executive team planning techniques
(Intensive Planning). He retired from IBM in 1990, having served them for 26 years. He presently is chairman of the
board of Zachman Framework Associates, a worldwide consortium managing conformance to the Zachman Framework
principles. He is chief executive officer of the Zachman Institute for Framework Advancement (ZIFA), an organization
dedicated to advancing the conceptual and implementation states of the art in EA. He also operates his own education
and consulting business, Zachman International (www.ZachmanInternational.com). John serves on the Executive Council
for Information Management and Technology (ECIMT) of the United States Government Accountability Office (GAO).
He is a fellow for the College of Business Administration of the University of North Texas. He serves on the advisory
board for the Data Resource Management Program at the University of Washington and on the advisory board of the
Data Administration Management Association International (DAMA-I) from whom he was awarded the 2002 Lifetime
Achievement Award. He was awarded the 2004 Oakland University, Applied Technology in Business (ATIB), Award for
IS Excellence and Innovation. John has been focusing on EA since 1970 and has written extensively on the subject. He is
the author of the book, The Zachman Framework for Enterprise Architecture: A Primer on Enterprise Engineering and
Manufacturing. He has facilitated innumerable executive team planning sessions. He travels nationally and internation-
ally, teaching and consulting, and is a popular conference speaker, known for his motivating messages on Enterprise
Architecture issues. He has spoken to many thousands of enterprise managers and information professionals on every
continent. In addition to his professional activities, John Zachman serves on the Elder Council of the Church on the Way
(First Foursquare Church of Van Nuys, California), the board of directors of Living Way Ministries, a radio and televi-
sion ministry of the Church on the Way, the presidents cabinet of the Kings College and Seminary, the board of directors
of the Los Angeles Citywide Childrens Christian Choir and on the board of directors of Native Hope International, a
Los Angeles-based ministry to the Native American people. Prior to joining IBM, John served as a line officer in the
U.S. Navy and is a retired commander in the U.S. Naval Reserve. He chaired a panel on Planning, Development and
Maintenance Tools and Methods Integration for the U.S. National Institute of Standards and Technology. He holds a
degree in chemistry from Northwestern University, has taught at Tufts University, has served on the board of councilors
for the School of Library and Information Management at the University of Southern California, as a special advisor
to the School of Library and Information Management at Emporia State University, and on the advisory council to the
School of Library and Information Management at Dominican University.
xviii
Preface
The foundation of anything enduring is its architecture and design, enterprises included. Enterprise archi-
tecture (EA) is an important and evolving discipline that is becoming more discussed and talked about with
every passing day. Nevertheless, to my knowledge, there exists very little guidance that rank high both
on practical relevance and academic rigor. This book, along with my first book Handbook of Enterprise
Systems Architecture in Practice has emerged out of my strong belief that well architected enterprises
consistently perform better. However this aspect has not been well explored and documented.
This is not a general book on EA. There are several books already covering the subject. But the caveat
with current EA literature is that most available materials tend to overly focus on a specific framework
or methodology thus limiting their utility. I have attempted to address some of these issues through my
first book. That one, released in March 2007, has received several accolades and excellent feedback.
Over the past two decades, the largest implementations of EA have occurred in the government sec-
tor. This is natural as typically governments are the largest organizations in almost every country. It is
further characterized by complex federated structures where individual government organizations work
in their respective silos. Often this leads to and amplifies the fragmentation of business processes and
duplication of systems and technologies, creating obstacles in cross agency interoperability. Govern-
ment-wide architecture allows end-to-end business processes, standard technologies, rationalized data
structure and modular e-services that can be assembled as required to deliver e-services. EA is a critical
success factor for all types, scale and intensities of e-government programmes. The key goal of EA in
government organizations is to make them citizen-centered, results-oriented and market-based. However
at this point there are no books addressing this area. There is a very big gap in the current literature,
and this book expects to address the current gap. This is a seminal book that will popularize the term
GOVERNMENT ENTERPRISE ARCHITECTURE and trigger several other publications in the same
subject area. This book, unlike any other available today, aims:
To present and bring forth the current and future developments, issues and trends in EA for Gov-
ernment organizations.
To integrate EA theory and concepts to field-tested methods, practical strategic issues and imple-
mentation challenges in the context of e-government.
To illustrate development methods and the process cycle through case studies and detailed ex-
amples.
To demonstrate the criticality of EA for e-government programmes.
To provide insights into the impact of effective EA on IT governance, IT portfolio management,
IT risks, IT outsourcing and service oriented architecture.
xix
Government CIOs, IT/IS managers, architects, analysts and designers seeking better, quicker and
easier approaches to respond to needs of their internal and external customers.
Line-of-business managers concerned with maximizing business value of IT and business com-
petitiveness.
CTOs of business software companies interested in incorporating EA to differentiate their products
and services and increasing the value proposition to their customers in the government sector.
Consultants and practitioners desirous of new solutions and technologies to improve the productiv-
ity of their government clients.
MIS and IT educators interested in imparting knowledge about this vital discipline.
Researchers looking to uncover and characterize new research problems and programmes.
IT professionals involved with organizational technology strategic planning, technology procure-
ment, management of technology projects, consulting and advising on technology issues and
management of total cost of IT ownership.
Section I: Frameworks and Methodologies focuses on approaches and mechanisms that organiza-
tions in the government use to develop their architecture blueprints. In the past two decades a lot
of effort has been expended by several countries in developing their own frameworks, guidebooks,
toolkits and methodologies. Section I intends to provide a glimpse of these activities.
Section II: Leadership, Governance and Management shows how government agencies and
organizations initiate and sustain their EA practices. Beyond frameworks, methodologies and
artifacts, it takes good leadership, innovative governance and flexible management to sustain EA
programme. Section II shows how these play a role and impact of these on the overall programme
success.
Section III: Realization and Deployment provides insights into how organizations employ EA
to drive their transformation programmes, gain tighter business-IT alignment and realize business
value out of their IT investments. This section consists of descriptions of the adoption of EA in
large and small organizations with insights on key practical challenges they face and how the whole
EA programmes are sustained.
Section I is a collection of chapters describing approaches and methods used by organizations to plan
and develop their EA blueprints.
Chapter I: Countries across the world are pushing their frontiers in governance in the move to infor-
mation economy, and governments play a pivotal role in this transformation. These governments employ
xx
modern information and communication technologies to serve the citizens and businesses better. Raising
the effectiveness and quality of government services is not only a matter of leading edge technologies;
it also involves visionary leadership, clear objectives and sound execution mechanism. The role of
Enterprise Architecture in shaping e-government programmes cannot be overstated. Within the context
of Singapores e-government initiative, this chapter, A Methodology for Government Transformation
with Enterprise Architecture by Pallab Saha of the National University of Singapore describes the
Methodology for AGency ENTerprise Architecture (MAGENTA), a rigorous, disciplined and structured
methodology for development of agency enterprise architectures that enables agencies to align to and
fully support the governments transformation objectives and outcomes. Mechanisms for agencies to
align to the overall government enterprise architecture are detailed. The chapter concludes with a set of
recommendations for future enhancements and research.
Chapter II: A Service-Oriented Reference Architecture for E-Government by Marc Lankhorst
of the Telematica Instituut, Netherlands and Guido Bayens of Novius Business and Information
Management, The Netherlands describes the development and future directions of service-oriented
reference architecture for the Dutch government. The Dutch government has focused on improving
the service level of public agencies for several years. Electronic services play an important part in this,
which requires a concerted effort across many organizations. A reference architecture has been created
in order to guide the many different programmes and projects. This chapter describes the role of service
orientation in e-government, and the creation, structure, and first results of this reference architecture
for e-government. Furthermore, the chapter looks ahead at future developments in integrated, demand-
driven service provisioning in e-government.
Chapter III: Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the
Public Sector by Amit Bhagwat introduces the concept of Beacon Architecture as a formalized and
ordered grouping of architectural elements, describing the constituents, their order, correlation and
likely evolution of the grouping; and illustrating its specific value to the public sector. The first half of
the chapter builds up to the concept, the reasons behind its specific nature, and its value to enterprises,
especially in the public sector. For this, the chapter is split into a number of sections that may be studied
separately and that also build up to introduce Beacon Architecture. The sections may be broadly divided
as concepts, historical overview, illustrative case studies in public sector transformations along with a
summary of peculiar architectural challenges they face, and a cyclical pattern to architecture develop-
ment. After introducing and elucidating on concept and constituents of Beacon Architecture, the chapter
delves into its correlation with architecture concepts in currency and its role in mitigating enterprise
architecture challenges with examples and illustrations from the British Government, before concluding
on an assessment of future trends.
Chapter IV: Quite a good amount of time has been spent seeking appropriate solutions to handle
the giant information technology expenditure not only in government sectors but also in private sectors
all over the world. Beginning with OMB, which substantially leads the U.S. governmental efforts in
ITA/EA area, seems to be on the right path using process improvement concept in its ITA/EA maturity
model (OMB, 2007-2). EA community still finds it difficult to introduce quality management concept
into its business and practices. This chapter, Maturity Model Based on Quality Concept of Enterprise
Information Architecture, by Hong Sik Kim of the Korea Polytechnique University and Sungwook
Moon of Component Basis Inc., South Korea therefore suggests a practical ITA/EA maturity model
based on the quality concept of enterprise information architecture (EIA), which is ROIdriven, practical
and based on four-phased process improvement approach for the EA community. This approach could
bring a substantial reduction in the costs and efforts in the entire ITA/EA area and provide sustainable
development environment for the ITA/EA like the argument of the environmentalists.
xxi
Chapter V: Enterprise architecture is the organising logic for business processes and Information
Technology infrastructure, the purpose of which is to create a more effective organisation in the context
of the businesss strategy and goals. However, the ability to measure the effectiveness of any activities
initiated under the guise of enterprise architecture is limited, even more so in those organisations, such
as government agencies, that do not recognise financial return on investment. This chapter, Measuring
the Benefits of Enterprise Architecture: Knowledge Management Maturity by Alan Dyer of the Aus-
tralian Defence Force Academy, University of New South Wales, Australia introduces the concept
of Knowledge Management, linked to the strategic outcomes of Enterprise Architecture and proposes a
maturity model framework for the measurement of enterprise architecture implementation. The chapter
aims to provide a basis for discussion of a wider capability maturity profile with architectural frameworks
to help develop and measure the benefits of implementing frameworks and architectures.
Section II of the book comprises of chapters that are useful in instituting and sustaining the EA practice
within the government organizations.
Chapter VI: An effective enterprise architecture capability enables an organization to develop sound
enterprise plans, make informed human, material, and technology resource investment and management
decisions, and optimize key business processes. Despite U.S. Congressional legislation, U.S. Office of
Management and Budget guidance, and U.S. Government Accountability Office reports and recommen-
dations, many U.S. government leaders struggle in advancing EA adoption in their organizations. U.S.
Government leaders must embrace transformational leadership to advance EA adoption. This chapter,
The Criticality of Transformational Leadership to Advancing the United States Government Enterprise
Architecture Adoption by William Boddie of the National Defense University, United States of America
presents the Vision, Integrity, Communication, Inspiration, and Empowerment Transformational Leadership
Model that describes competencies U.S. Government leaders need to advance EA adoption. The chapter
also presents the Transformational Leadership and Enterprise Management Integration Framework that
describes the relationship between transformational leadership and enterprise management functions.
Chapter VII: Public institutions that are organized in hierarchies find it difficult to address crisis or
other unique requirements that demand networked solutions. This chapter, Adaptive IT Architecture as
a Catalyst for Network Capability in Government by Jay Ramanathan, Rajiv Ramnath and Anand
Desai of the Ohio State University, United States of America first provides a prescriptive transaction-
based method for achieving such networking organizations with information technologies (IT) and then
discusses how the organization becomes more effective in non-routine responses to citizen requests.
The chapter illustrates how the prescriptive transaction-based enterprise architecture framework was
used for decision-making in a multi-year interdisciplinary industry-university collaboration resulting in
a successful 311 system.
Chapter VIII: Design Integrity and Enterprise Architecture Governance by Chris Aitken describes
a design integrity framework for developing models of any entity of interest at various levels of abstrac-
tion. The design integrity framework presented describes and defines contextual, conceptual, logical
and physical model types. The framework also defines a set of alignment attributes for each model type
and explains how these are to be used to demonstrate alignment from initial concept and requirements
through to actual physical implementation. These concepts are then applied in an organisational context
to identify the roles necessary to support an EA governance framework and strong alignment from idea
to implementation.
xxii
Chapter IX: Few government executives can explain the enterprise architecture of his or her agency,
and it is rare to find a political executive who is able to explain how their political objectives are fur-
thered by government-wide enterprise architecture. This low level of awareness translates to enterprise
architecture efforts that are often undervalued and under funded because the budget priorities of political
and functional executives rarely include enterprise architecture. Not surprisingly, many points of tension
exist as the CIOs and architects work to translate political goals into resources and architectural plans
supporting the agencys programs. This tension, between the rational orientation of enterprise architecture
advocated by the CIO and the political nature of policy goals sought by executives, often puts a CIO at
odds with his or her organizations political and functional executives. This chapter, Policy Mapping:
Relating Enterprise Architecture to Policy Goals by Dwight Toavs of the National Defense University,
United States of America discusses that tension, and advocates that CIOs and enterprise architects
develop a policy map to bridge the gap between the political and the rational perspectives.
Chapter X: A comprehensive enterprise architecture management has strategic and operative aspects.
Strategic tasks cover the identification of appropriate fields of activity for information technology (IT)
investments in accordance with business strategy and portfolio management. This chapter, Enterprise
Architecture Management and its Role in IT Governance and IT Investment Planning by Klaus Niemann
of ACT! Consulting, Germany shows how enterprise architecture management is cross-linked with
other IT management processes and delivers the necessary information for sustainable governance. The
continuous analysis of the IT landscape, the deduction of measures for optimization and its controlling
also belong to the tasks of architecture management. Standards for development and infrastructures
are made, e.g. reference architectures and a book of standards, whose implementation is overseen by
solution architects throughout the operative architecture management.
Chapter XI: Departing from the lack of coherent and ready-to-use models and domain descriptions
for public administration, this chapter, The GEA: Governance Enterprise Architecture-Framework and
Models by Vassilios Peristeras of the National University of Ireland, Ireland and Konstantinos Tara-
banis of the University of Macedonia, Greece presents a set of generic models that serves as a top-level,
generic and thus reusable Enterprise Architecture for the overall public administration domain. This set of
models is called Governance Enterprise Architecture (GEA). GEA has deliberately remained technology
independent and following the model driven architecture approach, GEA constitutes a computationally
independent model for the domain. GEA has been derived from multi-disciplinary influences and insights
and identifies two broad modeling areas, called governance mega-processes: Public Policy Formulation
and Service Provision. These two, together with the object versus process perspective, form a four-cell
matrix that defines four modeling areas for the GEA models. Until now, a large number of services have
been modeled using GEA and more recently; an extended modeling effort has started with GEA being
chosen for use by a national EU-country project. GEA can be also used as a knowledge infrastructure
for applying semantic technologies. In this line, it has been used for creating a public administration
specialization of a formal Semantic Web Service ontology, namely WSMO.
Chapter XII: Enterprise Architecture and Governance Challenges for Orchestrating Public-Pri-
vate Cooperation by Bram Klievink, Wijnand Derks and Marijn Janssen of the Delft University of
Technology, Netherlands presents an architecture aimed at supporting the coordination of public and
private parties for creating a one stop shop and the main challenges therein. Public-private service net-
work poses higher requirements on the architecture of a service network, whereas the variety in systems
of the various organizations and different aims make it more difficult to develop such an architecture.
Furthermore, it is difficult to isolate architectural challenges from governance aspects, as many architec-
tural issues need to be complemented by governance mechanisms. Architecture and governance cannot
xxiii
be considered in isolation. Within this setting, a new architecture is created and presented for managing
and orchestrating the interactions among governmental and private organizations.
Section III provides insights into how organizations employ EA to drive their transformation programmes,
gain tighter business-IT alignment and realize business value out of their IT investments.
Chapter XIII: People-Led Enterprise Architecture by Neil Fairhead of Fujitsu Services and John
Good of SERCO Consulting, United Kingdom provides an approach to enterprise architecture that is
people-led, as a contrast to being led by technology or modelling methodology. The chapter identifies the
major stakeholders in enterprise architecture and suggests where in the organisation they may be found
and how they may be connected with the enterprise architecture. It highlights the roles of stakeholders
throughout the process of defining and implementing an enterprise architecture. The view of stakehold-
ers managing the EA effort is described through the complete lifecycle, from setting the EA mission to
sustaining the benefits after implementation. In proposing the adoption of such an approach, we aim to
encourage a more direct link between enterprise architecture, the needs of the stakeholders it serves,
and the pubic policy outcomes it enables.
Chapter XIV: Using Enterprise Architecture to Transform Service Delivery: The U.S. Federal
Governments Human Resource Line of Business by Timothy Biggert, Kunal Suryavanshi and Ryan
Kobb of IBM Global Business Services, United States of America provides a case study on how the
U.S. Office of Personnel Management has led the establishment of the Human Resources Line of Business
(HR LOB). It explains how the HR LOB program has used enterprise architecture to drive transforma-
tion to a new Human Resources service delivery model across the United States Federal government.
The authors propose that the common view and vocabulary that EA artifacts provide, along with the
collaborative governance that took place to create the artifacts, has produced a solid business foundation
for this extensive business transformation effort.
Chapter XV: Government agencies are committing an increasing amount of resources to informa-
tion security and data privacy solutions in order to meet legal and mission requirements for protecting
agency information in the face of increasingly sophisticated global threats. Enterprise architecture (EA)
provides an agency-wide context and method that includes a security sub-architecture which can be
used to design and implement effective controls. EA is scalable, which promotes consistency and align-
ment in controls at the enterprise, program, and system levels. EA also can help government agencies
improve existing security and data privacy programs by enabling them to move beyond a system-level
perspective and begin to promote an enterprise-wide view of security and privacy, as well as improve
the agility and effectiveness of lifecycle activities for the development, implementation, and operation
of related security and privacy controls that will assure the confidentiality, integrity, and availability
of the agencys data and information. This chapter, Enterprise Architecture as Context and Method for
Designing and Implementing Information Security and Data Privacy Controls in Government Agencies
by Scott Bernard of the Carnegie Mellon University and Shuyuan Mary Ho of Syracuse Univer-
sity, United States of America presents the EA3 Cube EA methodology and framework, including an
integrated security architecture, that is suitable for use by government agencies for the development of
risk-adjusted security and privacy controls that are designed into the agencys work processes, informa-
tion flows, systems, applications, and network infrastructure.
xxiv
Chapter XVI: With a plethora of architectures, modeling techniques and methodologies on offer, it is
difficult to decide how to begin building an enterprise and achieve seamless integration. This difficulty
is most noticeable in consortia that need to deal with government participation. Various government
projects have different objectives and agenda. In addition, changes in business environment as well
as government policies impose extra conditions onto the project. Failure to comply with the project
requirement can lead to loss of business and sometimes unexpected penalty. The chapter, Architecture
Based Engineering of Enterprises with Government Involvement by Laszlo Nemes and John Mo of the
RMIT University, Australia uses three case studies to show various ways of government involvements
in projects. Based on the experiences of these cases, the chapter discusses how enterprise engineering
can help creating and managing the enterprise that can engage government services successfully.
Chapter XVII: E-government evolves according to strategic plans with the coordination of central
governments. This top-down procedure succeeds in slow but sufficient transformation of public services
into e-government ones. However, public agencies adapt to e-government with difficulty, requiring ho-
listic guidance and a detailed legal framework provided by the government. The setting up of common
enterprise architecture for all public agencies requires careful analysis. Moreover, common enterprise
architecture could fail to cover the special needs of small or municipal agencies. This chapter, Collab-
orative Enterprise Architecture for Municipal Environments by Leonidas Anthopoulos of the Hellenic
Ministry of Foreign Affairs, Greece uses data from various major e-Government strategies, together
with their enterprise architectures, in order to introduce a development model of municipal Enterprise
Architecture. The model is based on the experience collected from the Digital City of Trikala, Greece,
and results in Collaborative Enterprise Architecture.
Chapter XVIII: Government Enterprise Architectures: Enabling the Alignment of Business Pro-
cesses and Information Systems by Nigel Martin, Shirley Gregor and Dennis Hart of the Australian
National University, Australia describes the development and use of government enterprise architec-
tures for the framing and alignment of the core business processes and enabling information systems
at the Australian Bureau of Statistics (ABS) and the Centrelink Social Services agency. The chapter
focuses on the construction and ongoing maintenance of public enterprise architectures that enable the
alignment condition. An established research model has been used to guide the analysis and explication
of the government business processes, enabling systems and architectures, and the resulting agency
alignment. While the discussion acknowledges the existence of other formal and informal enablers of
alignment, this chapter concentrates on the enterprise architecture enabler. The functionally integrated
government business processes and information systems that are established within the instantiated
enterprise architecture are examined.
In conclusion, I hope that this book makes its contribution to the evolving discipline of EA, which
is only going to gain importance in organizations. I would like to invite readers to share their comments
about the book in addition to their success stories that may well spawn of future editions of this book.
Acknowledgment
Representing both industry and academia points of view, they provided excellent review comments
that improved the overall submission quality. An important part of this book are the chapter authors. I
appreciate their excellent contributions and want to thank them for assisting me in the review process.
xxvi
This book would not have become a reality without the support of my mother Shrimati Anima Saha.
I thank Neeta, my wife for her support, patience and love while this book was written. A special word of
love goes to our adorable daughter Anushka (now a toddler and ready to go to the kindergarten). Above
all, I would like to dedicate this book to my father Late Shri Jagatbandhu Saha.
Chapter I
A Methodology for Government
Transformation with Enterprise
Architecture
Pallab Saha
National University of Singapore, Singapore
Abstract
Countries across the world are pushing their frontiers in governance in the move to information econ-
omy, and governments play a pivotal role in this transformation. These governments employ modern
information and communication technologies to serve the citizens and businesses better. Raising the
effectiveness and quality of government services is not only a matter of leading edge technologies; it
also involves visionary leadership, clear objectives and sound execution mechanism. The role of Enter-
prise Architecture in shaping E-Government programmes cannot be overstated. Within the context of
Singapores e-government initiative, this chapter describes the Methodology for AGency ENTerprise
Architecture (MAGENTA), a rigorous, disciplined and structured methodology for development of
agency enterprise architectures that enables agencies to align to and fully support the governments
transformation objectives and outcomes. Mechanisms for agencies to align to the overall Government
Enterprise Architecture are detailed. The chapter concludes with a set of recommendations for future
enhancements and research.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Methodology for Government Transformation with Enterprise Architecture
A Methodology for Government Transformation with Enterprise Architecture
A Methodology for Government Transformation with Enterprise Architecture
A Methodology for Government Transformation with Enterprise Architecture
All stage models represent e-government moved or are in the process of moving into the
capability and maturity. Though not mandatory, higher echelons of capability and maturity. None-
countries usually traverse the stages in a gradual theless, a survey of e-government literature reveals
and phased manner leveraging on the points several challenges e-government programmes
learned at each stage as they navigate. Stage mod- face. The primary challenges are grouped into:
els are an excellent way to design, implement and (1) information and data, (2) information tech-
evaluate e-government programmes. For instance nology, (3) organizational and managerial, (4)
the Office of E-Government, Department of the legal and regulatory, and (5) institutional and
Premier and Cabinet, Government of Western environmental challenges (Gil-Garcia and Pardo,
Australia uses the Gartners four stage model and 2005). While a full discussion on strategies needed
has linked its e-government goals to the stage to address these challenges is outside the scope
model (Government of Western Australia, 2004). of this chapter, the strong linkages between the
This is depicted in Figure 1. challenges and key imperatives (discussed later)
There are several instances of successful e- are clearly evident.
government programmes where the countries have
A Methodology for Government Transformation with Enterprise Architecture
Figure 1. Achieving goals of e-government (Government of Western Australia, 2004) (reproduced with
permission)
A Methodology for Government Transformation with Enterprise Architecture
A Methodology for Government Transformation with Enterprise Architecture
Governance, policy and legislative frame- each.Table 3 shows how countries are using EA
work, as a strategy to deal with and address e-govern-
Collation and collaboration. ment challenges. Several other e-government
programmes and the role of EA are presented in
A review of current literature reveals the the remaining chapters of this book.
criticality and centrality of EA to e-government It is amply evident from Table 2 and 3 that
programmes. Several countries across the world EA is critical to e-government and countries
have anchored a significant portion of their e- have recognised this. As discussed in the earlier
government programme around a strong EA section, countries usually traverse the stages
programme. Table 2 presents a summarised and of e-government capability and maturity in a
representative list of countries and their e-govern- gradual and phased manner leveraging on the
ment programmes along with the role EA plays in points learned at each stage as they navigate. In
Table 3. Role of EA in addressing e-government challenges (Adapted and extended from Gil-Garcia &
Pardo, 2005)
Category Challenge Role of EA in Addressing Challenge(s)
Information Architecture (IA) within EA mandates
development and compliance to common data standards.
Usually such standards are captured as data principles /
Information and data quality policies and data definition and usage requirements. Mapping
Information and Data
Dynamic information needs to applications and business processes allows for complete
visibility and control through the data lifecycle. Such practices
take care of issues pertaining to inaccuracies, inconsistencies
and incompleteness of data and derived information.
Usability Technology Architecture (TA) and Application Architecture
Security (AA) require common technical and application standards.
Technological incompatibility Architectural qualities are addressed through non-functional
Technology Technology complexity requirements. Issues pertaining to incompatibility, complexity
Technical skills and and newness are addressed by a set of relevant principles and
experience common standards. Agencies can use TA and AA to steer their
Technology newness technology acquisition initiatives.
Most governments are known to have established a separate
Programme Management Office (PMO) to manage the EA
Project size and scope initiative (e.g. FEA PMO in the United States, AGIMO in
Managers attitude and Australia, IDA in Singapore). Challenges in this category
behaviour are addressed by the PMO. Transition management is a core
Organizational and Stakeholder diversity activity in EA Management and directly addresses some of
Managerial Lack of alignment the challenges. Some of the challenges are also addressed
Multiple and conflicting goals by governance practices. These include standard project
Resistance to change management methodology, senior executive oversight, formal
Turf and conflicts compliance process, business leadership in project teams,
enterprise levels process owners among others (Ross, Weill
and Robertson, 2006).
Restrictive laws and Challenges pertaining to these categories are best addressed
regulations by good architecture governance and management. Every
Legal and Regulatory Annual budget cycles architecture framework (e.g. FEAF, DODAF, and TOGAF)
Intergovernmental places high importance to architecture governance. Designing
relationships architecture governance is a core activity in the development
Privacy concerns of EA. Useful governance practices include infrastructure
Institutional and Autonomy of agencies renewal funding, IT steering committee, structures, centralized
Environmental Policy and political pressures funding for enterprise applications and portfolio management
Environmental context (Ross, Weill and Robertson, 2006).
A Methodology for Government Transformation with Enterprise Architecture
much the same way organizations also graduate 2. Standardized technology architecture: In
through the various stages of EA maturity (Ross, this stage organizations convert some local
Weill and Robertson, 2006). applications into shared infrastructure. The
key driving factor in this stage is technol-
Architecture Maturity Model ogy standardization leading to reduction
of technology diversity. It is typical in this
In 2006, Ross, Weill and Robertson developed a stage for organizations to consolidate and
four stage EA maturity model. These four stages standardize hardware. Organizations also
are briefly described as follows and Table 4 dis- initiate the reduction of software applications
cusses the meaning of the four stages within the and systems performing similar functions.
context of government. This stage is usually characterised by quick
cost savings and ease of adoption.
1. Business silos architecture: A stage where 3. Optimized core architecture: Organiza-
business units and functions within the tions move from local view of data, applica-
organization operate to maximize their in- tions and technology to an enterprise view
dividual business unit and functional needs. in this stage. It involves elimination of data
IT systems and applications developed and redundancies and more disciplined reduc-
deployed in this stage tend to be one-off tion of application and technology overlaps.
localised solutions that cannot integrate By the end of this stage organizations tend
with one another, thus creating fragmented to cleanly differentiate between enterprise
business processes and all associated dif- level data, applications and technology that
ficulties. are shared versus localised data, applications
A Methodology for Government Transformation with Enterprise Architecture
10
A Methodology for Government Transformation with Enterprise Architecture
Standardised Technology
Business Modularity
E-Government
Explanation of the Mapping*
Optimized Core
Maturity Stages
Business Silos
In this stage agencies typically post simple, limited and static in-
formation through their websites. With information dissemination
1. Web presence + as the key focus area, the communication is primarily one-way.
This is the point where almost all agencies still operate in their
silos and the characteristics described in Figure 5 are evident.
This stage provides for simple interaction between agencies and
their users. The communication here is two-way and there are
2. Interaction + +
a few common technology standards and applications, though
within the agency rather than at a cross-agency level.
This phase allows users to conduct complete online transactions
(including e-commerce and e-business transactions). This neces-
sitates some level of data standardization to support cross-agency
3. Transaction ++ +
transactions. Nonetheless, the primary objective being common
technology standards across the agencies, supported by some
degree of common data and applications.
Here the focus is to shift from mere process automation to
integration across government agencies. Integration involves
both vertical (governments in different levels) and horizontal
4. Transformation + ++ (different departments and locations). Here citizens, businesses
and governments are presented a single unified and harmonized
face. This calls for high degree of collaboration and cooperation
amongst the agencies.
This stage requires more of a political transformation and does
5. E-democracy Not Applicable
not directly map to any architecture maturity stage.
1. Mapping means the architectural maturity needed as enabler to achieve a specific e-government maturity level.
2. ++ represents strong mapping and + represents weak mapping.
3. Only the relevant stages are mapped. It is assumed that the earlier stages are already achieved.
the need for well designed, reliable and scalable ture (SWTA). With individual agencies already
IT infrastructure. To take full benefit of eGAP having in place the basic IT infrastructure, SWTA
I the Singapore public sector needed a coherent was aimed to control technical diversity through
collection of policies, standards and guidelines to the use of common systems and platforms for the
steer government agencies in the design, acquisi- deployment of e-services (Tan and Gan, 2007).
tion, deployment and management of ICT (Tan The underlying premise was that common technol-
and Gan, 2007). ogy could propel interoperability among agencies
The first government-wide architecture pro- and encourage collaboration. SWTA consists of
gramme was the service-wide technical architec- nine technical domains for which policies, stan-
11
A Methodology for Government Transformation with Enterprise Architecture
dards and guidelines have been defined (Tan and move beyond technology and to incorporate
Gan, 2007). data, applications and most importantly business
Widespread adoption of SWTA allowed agen- processes (Tan and Gan, 2007). This is when
cies transition to Standardised Technology level the development of the SGEA was initiated by
in the EA maturity stages (see Table 4). This the Government. Developed by the Ministry of
was in line with the expectation as at that point Finance (MOF) and IDA, SGEA consists of four
eGAP I was the active plan and the key goal was domain architectures, which are manifested in the
to realize Interaction level in the e-government form of structured reference models. These are the
stages (see Tables 5 and 6). Business Reference Model (BRM), Data Refer-
The next obvious move was to realize the ence Model (DRM), Technical Reference Model
Transaction and Transformation levels. There (TRM) and Solutions Reference Model (SRM).
was a recognition that such a move needed an A detailed description of the SGEA is provided
expansion in the scope of the architecture to in Chapter VII: Enterprise Architecture in the
12
A Methodology for Government Transformation with Enterprise Architecture
Singapore Government by Tan Eng Pheng and models there was a realization of the need to have
Gan Wei Boon in the Handbook of Enterprise a structured and well defined methodology for
Systems Architecture in Practice. development of EA. MAGENTA is a multi-phase,
Within the current e-government plan, iGOV iterative and non-linear EA methodology. It is in-
2010, the SGEA is designed to directly support tended to provide all agencies a holistic approach
the enhancing capacity and synergy in the to EA development. It establishes a common
government strategic thrust. This kind of linkage mechanism to manifest an integrated architecture.
between SGEA and iGOV 2010 clearly demon- The need for the development of MAGENTA
strates the criticality of EA for the success of the stemmed from the following reasons:
ensuing e-government programme in Singapore.
Figure 2 shows the chronological evolution and Integration to SGEA and iGOV 2010,
progress of Singapores e-government and EA EA as a discipline is an evolving field,
programmes. resulting in the current body of knowledge
being inconsistent (lack of consensus on EA
definition, terminologies, goals, approaches,
METHODOLOGY FOR AGENCY outputs, outcomes etc.) and incomplete,
ENTERPRISE ARCHITECTURE and
Development in other countries, as briefly
Effective EA programmes are methodology based described in Table 2.
and process-driven. A methodology prescribes
what must be done, when and how the steps link MAGENTA provides a rigorous, disciplined
to one another (Bittler & Kreizman, 2005). EA is and structured approach that is tool and vendor
a process discipline. When institutionalised, EA agnostic. This methodology is intended to guide
leads to execution of an organisations operating agencies develop their own EA. MAGENTA al-
model and tighter alignment to business strategy. lows agencies to effectively transform the business,
With the development of the SGEA reference enable information sharing across departments,
13
A Methodology for Government Transformation with Enterprise Architecture
divisions and agencies, enhances managements Steps: Activities performed in the phase
ability to deliver effective and timely services and shown both in graphical and detailed tabular
improve operational efficiencies in a disciplined form. Each step is numbered for easy refer-
manner through the effective use of Information ence. Each step makes reference to a Phase
and Communication Technologies (ICT). The Tool and Phase Example as appropriate.
methodology has the following objectives: Every step also identifies the role responsible
for performing the step.
To provide step-by-step guidance to develop Phase tools: Templates, guidelines and
and implement an agency-level EA. pointers that are useful in executing a specific
To focus agency efforts on the development step of the phase.
and management of their EA, rather than on Phase examples: Illustrations of outputs
framework related issues. that are produced as a result of executing
To create a common reference point for all a specific step in the phase. The examples
architectural deliverables in terms of scope, are intended to illustrate the outcome of
and level of detail. executing specific step(s).
A common unified approach to EA develop-
ment and improve organisation EA maturity At the core of MAGENTA is government
and capability transformation and it is designed to address the
key questions agencies typically face. These
MAGENTA is a multi-phase methodology questions pertain to and include:
containing extensive figures, charts, tools, tem-
plates, examples, practitioner guidance and FAQs. Business Performance
The graphical view of MAGENTA is depicted in What are our core business processes
Figure 3. MAGENTA takes a practical approach that are critical to the success of the
by directing focus on core business processes of strategy?
an agency. Business processes that are critical to Where can we achieve dramatic im-
the success of the agency by enabling strategic provements?
initiatives are identified as core business pro- What are the key areas where we need
cesses. Each phase of MAGENTA is structured to collaborate with other agencies in
in the following manner: the Government?
What are the key information require-
MAGENTA map: Graphical view of MA- ments to support the core business
GENTA identifying the phase that is being processes?
described. Investment Performance
Objective: The key intent of executing the Which of the core business processes
phase. must receive our IT investments?
Inputs: Items that are required to execute How do we categorise our IT invest-
the phase. Each input contains a reference ments into IT-enabled transforma-
to the step(s) where it is utilised. tion?
Outputs: Items that are produced as a result IT Performance
of executing the phase. Each output contains Which business processes have no IT
reference to the step(s) that are utilised to support and where are we overspend-
produce the specific output. ing?
14
A Methodology for Government Transformation with Enterprise Architecture
Where can we take benefit of common the to-be architecture. A brief overview of the
data, applications and technology? nine phases is provided as follows. The phases
Where do we have redundancies and are numbered for identification purposes and do
overlaps? not represent strict adoption sequence.
What metrics do we need to assess the
programme effectiveness? Phase 1 Establish Enterprise Archi-
tecture Programme: This phase covers
As is evident from Figure 3, MAGENTA takes the activities that agencies must perform to
a two-dimensional approach to EA development. prepare for an impending EA programme.
The vertical dimension captures the various groups Agencies that have just started out on their
of stakeholders separated as tracks. The focus of EA programmes may also find this phase
this dimension is to differentiate the concerns of useful as a checklist of items to be done and
different stakeholders and associate them to the evaluate their progress.
relevant EA development activities. On the other Phase 2 Scan and Analyze Current
hand the horizontal dimension depicts the devel- Business State: This phase is targeted at
opmental progress of EA, supporting both as-is the agencys core business processes from
architectures and their analyses as well as to-be an end-to-end perspective. This phase un-
architectures and their analyses to derive future derstands the current business goals and
architectural initiatives enabling the transition to initiatives with intent to clarify if the core
15
A Methodology for Government Transformation with Enterprise Architecture
business processes are areas of focus for the to support the target business architecture.
agencies. The development of the target IT architecture
Phase 3 Understand Current IT also looks to address the gaps identified in
Architecture: This phase envelops the Analyse Gaps and Derive Opportunities
agencys data, application and technol- phase. While in structure this is similar to
ogy infrastructure. By understanding the Understand Current IT Architecture
overall business processes and governing phase, the focus here is the target point of
business rules adopted by the agencies, the view.
information architecture (IA) captures the Phase 7 Design Architecture Gover-
information of the enterprise including data nance and Management: This is to ensure
sharing and exchange. It also describes the that the architecture programme is success-
specification, development and adoption of fully sustained within the agencies and meets
technologies to support the business require- overall IT governance expectations. As part
ments and agency goals. Finally, the phase of this phase, EA development is seamlessly
also describes approaches and mechanisms integrated to investment management and
for designing solution requirements, speci- system development lifecycle (Armour et.
fying architectural views and viewpoints, al., 2007).
ascertaining system qualities and guiding Phase 8 Document Enterprise Archi-
the assembly of the solution elements that tecture Blueprint & Transition Plan: This
will meet end user needs. phase provides an outline of the documen-
Phase 4 Analyze Gaps and Derive Op- tation needed to capture the agencys EA
portunities: This phase is a compilation of with the intent of describing it thoroughly
the gaps and findings pertaining to business, and clearly. Essential topics in this phase
information, application and technology include guidance for good documentation,
domains and the interdependencies between uses of the agency EA blueprint, structuring
them. The objective of this phase is to ar- and organising the documentation.
ticulate the target EA to address the gaps. Phase 9 Maintain Enterprise Archi-
Phase 5 Develop Target Business Ar- tecture: This provides the activities that
chitecture: This is intended at the agencys are needed to continue and complete the
core business processes and goals from an logical lifecycle of the EA through a series
end-to-end perspective (which may include of feedback mechanisms to keep the agency
cross agency integration). This phase is also EA pertinent.
useful for the purpose of maintaining overall
business-IT alignment of the EA. While In traversing through the various steps in phas-
Scan and Analyse Current Business State es, several artifacts are developed that constitute
phase broadly sets the agencys current busi- the agencys EA. Creation of the EA Blueprint
ness state, this prioritises the core business is done concurrently along with other phases as
processes from a target architecture point the individual artifacts (i.e. the phase outputs) get
of view to address the identified gaps in developed. The complete blueprint based on the
Analyse Gaps and Derive Opportunities principles of IEEE 1471-2000, is a compilation
phase. of artifacts (typically the phase outputs) that are
Phase 6 Develop Target IT Architec- combined together as a single coherent blueprint
ture: This phase aims to develop the data, ap- providing the following distinct advantages:
plication and technical architecture required
16
A Methodology for Government Transformation with Enterprise Architecture
In the absence of a single unified blueprint, and supports the federated governance structure
individual phase outputs may be viewed as at the whole-of-government level, thereby enhanc-
isolated artifacts, ing the overall effectiveness of EA programmes.
The single unified blueprint provides a In adopting MAGENTA, agencies are encour-
central anchor to appropriately reference aged to select the appropriate EA design model.
the relevant phase outputs, Each design model represents the intersection
It is easier to distribute and communicate the of an agencys EA Value Proposition and EA
EA across the agency, fostering collabora- Emphasis.
tion, and These two dimensions define four quad-
It is simpler to maintain the EA throughout rants, each representing an EA design model:
its lifecycle. Technology Standardisation Model, Business
Standardisation Model, Technology Differ-
MAGENTA does not assume a one-size-fits- entiation Model and Business Differentiation
all approach to EA development. Though the Model. The design models, influenced by design
methodology in itself is holistic and generic to priorities of the IT department (Ross, 2006), that
encourage widespread adoption, agencies have typically apply to agencies (equally applicable to
the discretion to design and tailor their EA pro- organisations at large) are shown in Figure 4. The
grammes to suit their business and technology typical distinguishing characteristics of each of
objectives. This kind of flexibility to programme the quadrants are shown in the figure. The choice
design encourages autonomy at the agency-level of an EA design model is a critical decision for an
17
A Methodology for Government Transformation with Enterprise Architecture
agency (organisation). The design model decision respective strategies that set the overall direction.
(or the lack of it) has a profound impact on the These strategies are then executed using formal
rest of the EA programme. Each model places annual and multi-year plans linked to the budget
different demands on the agencys EA programme cycle. This often leads to silo or stovepipe
with respect to its objectives, metrics, scope, functions within and between the agencies. It
intensity, resources, senior management involve- characterises the lowest level of architecture
ment, outcomes and benefits just to name a few. maturity. It is clearly evident that this approach
There have been instances, where agencies have is not suitable to take full benefit of common
included transitioning to a new design model as standards and seek collaboration opportunities
part of their overall EA programme migration with other government agencies (see Table 4).
plan. Such transitions are transformational as it This is an important factor, as collaboration and
entails new way of thinking and behaving, and sharing is a critical success factor in furthering
are disruptive in nature. Government transformation.
A plethora of practices and programmes often
Integrated Enterprise Lifecycle leads to confusion and resentment to anything
Approach with MAGENTA new, EA included. Typical response in such sce-
narios includes furious efforts to measure and
EA in general provides significant business ben- demonstrate the value of EA programmes. It is
efits to all organisations. As a result of years of sus- also typical for EA programmes not to be tightly
tained efforts in adopting IT, government agencies coupled to other relevant management practices.
in developed countries demonstrate high degree The positioning of and linkages to and from EA
of maturity in practices like strategic planning, vis--vis other relevant upstream and downstream
IT strategic planning, technology standardization management practices were finalized following
and data consolidation, enterprise integration, IT careful analyses of current and future practices.
programme management, IT service management, MAGENTA is inherently designed as a strate-
IT portfolio management and system develop- gic alignment tool that allows agencies to realize
ment lifecycle (SDLC) with various degrees of the Integrated Enterprise Lifecycle. Figure 6 shows
scope and intensity. Figure 5 depicts the current the approach taken by MAGENTA for positioning
approach adopted in most agencies where key EA within existing management practices. This
business functions and departments have their approach allows agencies to maintain linkages
18
A Methodology for Government Transformation with Enterprise Architecture
between their respective functional strategies and Integration leads to higher degree of manage-
plans (depicted as dotted line arrows in Figure 6). ment attention and as a consequence greater
However as an enhancement, the EA layer between sustainability of the EA programme, and
corporate strategy and implementation facilitates Facilitation of participation by individual
common standards, requirements, principles and agencies and contribution to overall GEA
effective governance and control. It is intended to is critical to the success of Government
allow agencies to move towards shallower silos transformation.
and seek greater collaboration opportunities both
within and between agencies. This is further Adopting MAGENTA: A Generic EA
described later and portrayed in Figure 7. Methodology
Internally within an agency, linking EA to
other management practices not only ensures Moving forward MAGENTA continues to be
its continuity and sustainability, but also tighter referred by government agencies and adopted as
vertical and horizontal alignment (Armour et. al, needed. MAGENTA has been piloted in one of
2007). Figure 7 is an expanded view of Figure 6, the government agencies. To provide a summa-
and shows the Integrated Enterprise Lifecycle rized view of the agencys EA, Figure 8 shows
approach realizable with MAGENTA. For the the template of a one-page schematic.
Government agencies it is critical to clarify the The template is meant for agencies use to
positioning of EA vis--vis other management derive their respective agency EA schematic.
practices like IT Planning, IT Portfolio Manage- The EA schematic is intended to portray the
ment because: eventual target EA for an agency developing its
EA using MAGENTA and is an effective man-
Almost all EA programmes are primarily agement practice in high maturity organizations
driven by the IT / IS department, (Ross, Weill and Robertson, 2006). The template
EA is often equated to IT Architecture and is organized to provide an easy-to-use tool that
hence relegated as yet another technology can be populated and usage scenarios built by
initiative, answering a few simple questions. Table 7 pro-
19
A Methodology for Government Transformation with Enterprise Architecture
vides the explanation of the layers in the generic This is accomplished through building a
EA schematic (shown in Figure 8). Table 7 is also few critical business scenarios, where such
used to craft the usage scenarios. scenarios do not represent all potential paths
The objectives of the agency specific EA and branches through the generic EA sche-
schematic derived from the generic EA schematic matic, but simply a subset of LOBs, business
(Figure 8) and the scenarios (Table 7) include: functions, data entities, service components
and enterprise systems and applications that
Portrayal of EA core view that can be linked get utilized to realize the scenario(s). The
to subsequent levels, scenarios allow various stakeholders with
Support for agencys target operating model varied responsibilities and organizational
and modular architecture maturity level, roles in the agency to find themselves
Depiction of relationships between domain within the EA. This leads to better under-
architectures (business, information, solu- standing of the influence and impact these
tion and technology architectures) and dif- stakeholders have on the EA and their role
ferent views as shown in Figure 9, in it.
Provision of clear line of sight for various Portrayal of architectural elements (business
usage scenarios as shown in Figure 10. processes, data entities, application services,
20
A Methodology for Government Transformation with Enterprise Architecture
technical services) that can contribute to the A detailed discussion of the agency case study
Government Reference Models as shown in where MAGENTA was piloted is outside the
Figure 11. This aspect is further elaborated scope of this chapter. However the agencys EA
and depicted in Figure 12. addressed several strategic questions like how
21
A Methodology for Government Transformation with Enterprise Architecture
22
A Methodology for Government Transformation with Enterprise Architecture
23
A Methodology for Government Transformation with Enterprise Architecture
24
A Methodology for Government Transformation with Enterprise Architecture
agency goals and objectives (some degree The essence of these imperatives is to drive
of vertical integration) home the point that for successful and effective e-
Continued alignment and ongoing collabora- government, Government leaders must be deeply
tion among the various agencies (horizontal engaged in ICT and related issues. In an era where
integration) countries are focussing on transformation to
Agency participation and contribution to the information and knowledge society this is a criti-
GEA (enabling the federated governance cal success factor. A review of current literature
structure) clearly reveals that EA plays a very critical role in
fulfilling the imperatives. Research conducted at
In 2006, the IBM Center for The Business the John. F. Kennedy School of Government and
of Government published a report discussing the MIT Sloan Centre for Information Systems
the six trends of transforming government Research further corroborate this point.
(Abramson, Breul and Kamensky, 2006). Table MAGENTA is now available to agencies for
8 delineates how EA (and MAGENTA) supports reference and adoption through the government
these trends. intranet. Development and availability of MA-
GENTA for agencies to build their own EA to
drive the e-government programme is the first
FUTURE ENHANCEMENTS AND step. Plausible areas for future enhancements and
RESEARCH research could include:
The full potential of e-government can only be Governance and regulation: In the United
achieved by complete integration of government States, the Clinger-Cohen Act of 1996 was
services across different government agencies cited as one of the reasons for Government
and different levels of government. In 2000, the agencies to develop their EA. While laws
Harvard Policy Group at the John. F. Kennedy and regulations can be useful to initiate the
School of Government published the eight impera- development, it remains to be seen if they
tives in ICT for Government leaders, which are: are really useful in sustaining the interest.
It has been observed that agencies at times
1. Focus on how IT can reshape work and develop their EA just to meet regulatory
public sector strategies, requirements. This defeats the very purpose
2. Use IT for strategic innovation, not just for of developing EA. Thus research on effec-
tactical automation, tiveness of regulation driven EA adoption
3. Use best practices in implementing IT initia- is clearly an area to be worked on.
tives, IT engagement: Leadership is an essential
4. Improve budgeting and financing for promis- ingredient for success in EA and e-govern-
ing IT initiatives, ment (Ross, Weill and Robertson, 2006)
5. Protect privacy and security, and this is amply evident from the eight
6. Form IT related partnerships to stimulate imperatives discussed earlier. Leadership
economic development, includes Legislators, Governors, Budget
7. Use IT to promote equal opportunities and Directors, Agency Heads and CIOs. For
healthy communities, and this to happen agencies need a formal IT
8. Prepare for digital democracy. engagement model, more so because tra-
ditionally e-government is viewed as an IT
initiative that is delegated to the CIO and
25
A Methodology for Government Transformation with Enterprise Architecture
26
A Methodology for Government Transformation with Enterprise Architecture
27
A Methodology for Government Transformation with Enterprise Architecture
28
A Methodology for Government Transformation with Enterprise Architecture
National Association of State CIOs. (2004). Enter- Treasury Board of Canada. (2004). Business
prise Architecture Development Toolkit Version Transformation Enablement Program. Retrieved
3.0. Retrieved June 18, 2007, from http://www. June 18, 2007, from http://www.tbs-sct.gc.ca/btep-
nascio.org/resources/EAresources.cfm. pto/index_e.asp.
Weill, P., & Aral, S. (2006). Generating Premium
Returns on Your IT Investments. MIT Sloan
Management Review, 47(2), 39-48.
29
30
Chapter II
A Service-Oriented Reference
Architecture for EGovernment
Marc M. Lankhorst
Telematica Instituut, The Netherlands
Abstract
This chapter describes the development and future directions of a service-oriented reference architecture
for the Dutch government. For several years now, the Dutch government has put a focus on improving
the service level of public agencies. Electronic services play an important part in this, which requires
a concerted effort across many organizations. A reference architecture has been created in order to
guide the many different programmes and projects. In this chapter, we will describe the role of service
orientation in e-government, and the creation, structure, and first results of this reference architecture
for e-government. Furthermore, we will look ahead at future developments in integrated, demand-driven
service provisioning in e-government.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Service-Oriented Reference Architecture for EGovernment
agencies is needed to avoid asking citizens the manner that, for example, insurance companies
same information over and over again, and to offer theirs. People do not want to stand in line
create greater efficiency and less duplication in in front of a service desk of public agencies, like
back-office processes and systems. municipalities, customs or social security agen-
This requires a concerted effort across many cies. They want to interact quickly, via modern
organizations. Service orientation is an impor- communication channels, and obtain a high and
tant new paradigm that can help to structure and transparent service level. And enterprises would
coordinate this effort both at the level of busi- like to develop a more sophisticated way of co-
ness processes and at the level of the supporting operation and interaction with public institutions
technologies. A service-oriented reference archi- than the traditional paper-based bureaucracy.
tecture for Dutch governmental institutions has These demands and expectations did have a
been created in order to guide the many different modest effect on Dutch governmental institu-
programmes and projects. This reference architec- tions. During the second half of the nineties,
ture comprises the overall structure of the Dutch public bodies were challenged to create their
e-government landscape, and provides a series of own Websites. Less visible was an initiative of
construction principles for e-government. several big agencies in the public domain to set
A reference architecture comprises a set of up a shared network for data exchange. In spite
general construction principles and explanatory of these developments, generally speaking, real
models to help architects in various positions to electronic services from public institutions did
create dedicated architectures for specific business not appear yet.
solutions. Thus, it provides a common ground for Based on an enquiry among 1500 people,
the many architects that are working on the devel- the Dutch citizen panel Citizen@Government
opment of the e-government targets. It is used in (Burger@Overheid in Dutch) has drawn up a
auditing project progress and in setting standards code of conduct for service to citizens (Burger@
for the results that have to be gained. Overheid, 2005) to which public institutions
In this chapter, we will describe the role of should adhere in providing e-government ser-
service orientation in e-government, and the cre- vices. This charter consists of quality standards
ation, structure, and first results of this reference that define the digital relation between citizen
architecture for e-government. Furthermore, we and government (in the fields of information
will look ahead at future developments in inte- exchange, service delivery, and political partici-
grated, demand-driven service provisioning in pation). These standards are formulated as rights
e-government. As such, the Dutch situation may citizens are entitled to, and matching obligations
serve as an example for others of applying the by government bodies. They are in the interest
principles of service-orientation in an e-govern- of both citizen and government and they allow
ment context, and of the benefits and impact of citizens to call their government to account for
service thinking in this situation. the quality of online contacts. Conversely, public
institutions can use the charter to examine the
external quality of their e-government services.
Background Thus, the charter is an instrument to stimulate
the further development of e-government from
Over the last decade, the pressure on public the citizens perspective.
agencies to improve their services has increased This code of conduct lists ten basic principles
sharply. Citizens and enterprises nowadays expect for Dutch public services:
governmental services to be delivered in the same
31
A Service-Oriented Reference Architecture for EGovernment
1. As a citizen, I have the right to choose the These demands from both citizens as com-
channel for doing business with the govern- panies gave birth to a new governmental action
ment. programme, called Different Government
2. As a citizen, I can easily find government (Andere Overheid in Dutch). The goal of this
products and services. programme was to stimulate the transition to a
3. As a citizen, I can easily understand govern- modern, transparent and highly effective way of
ment services, and my rights and obligations governing the Dutch state, provinces and mu-
as a citizen are clear. nicipalities. The main goals of this programme
4. As a citizen, I have a right to accurate, (which has now been subsumed by the Centre
complete, and actual information, and the for Good Governance of the Dutch Ministry of
government provides this proactively, tai- the Interior) are:
lored to my situation.
5. As a citizen, I only have to provide informa- Higher quality of service
tion once. The government tells me what Less red tape and regulations
it knows about me and does not use my A more comprehensive government policy
personal data without my permission. More cross-agency cooperation
6. As a citizen, I can easily find out how the
government operates, and it keeps me in- Several sub-programmes of this action plan
formed about the status of procedures in were developed. One of them was called elec-
which I am involved. tronic government or e-government, which
7. As a citizen, I can trust the reliability of aims for a more comprehensive approach in the
e-government. The government guarantees use of modern information technology support-
digital privacy, secure digital interaction, ing the goals of the Different Government
and careful digital archiving. programme. Some concrete goals of the e-govern-
8. As a citizen, I can easily give feedback to ment programme are:
the government. The government corrects
mistakes, compensates shortcomings, and To have 65% of the most important public
uses complaints to learn from. services available via the Internet by the end
9. As a citizen, I can compare, check and as- of 2007;
sess the performance of public bodies. The To register data that is used by many public
government actively provides the necessary bodies, like data from citizens, companies,
information. buildings, addresses and incomes in a cen-
10. As a citizen, I am empowered to actively tralized manner and provide it to official
look after my interests. The government agencies when necessary and allowed, to
promotes participation and provides the promote reuse and data quality and to prevent
necessary means. asking citizens the same questions over and
over again;
Next to citizens, industry also expects an To provide every citizen and every company
improved service level from government institu- with a unique, electronic identity which will
tions. They would like to have a public service be used for identification and authentication
that produces less red tape, less regulations, less purposes in public, electronic communica-
procedural complexity, and consequently, lower tion.
administrative costs.
32
A Service-Oriented Reference Architecture for EGovernment
Service management
business
architecture
Services
organisation processes
products
information
architecture
employees messages information
applications data exchange
technical
architecture
technical data
network
components storage
33
A Service-Oriented Reference Architecture for EGovernment
serious impact on the final architecture of the Position and Role of the Reference
Dutch e-government, such as programmes for Architecture
the development of national registrations, for e-
security, and for the development and use of open As we stated before, the goal of developing this
standards. The second pillar was formed by the reference architecture was to create a common
influence from several large government agencies, ground for the many, many architects that are
like the national social security agencies and the working on the development of the various ele-
tax and customs administration. Architects from ments of Dutch e-government. The idea is that
these programmes and agencies have had a great architects should have a sound influence on
influence on the emergence of the initial draft of the construction principles of e-government.
the Dutch Government Reference Architecture. From their respective positions in projects and
Creating this reference architecture was a institutions, they could take care of the neces-
non-trivial effort. During the development of sary coherence between the many aspects of the
the architecture, more and more architects from e-government: Websites, data storage, process
different programmes and governmental orga- flow, semantics, data communication, messages,
nizations took part in the discussions about the preferred technology, and so on. Architects assist
mainPosition andprinciples
architectural Role ofand themodels.
Reference
In this Architecture
in setting up e-government projects and business
way,Asa more robust before,
we stated version of
thethegoal
framework was
of developing this reference
solutions, architecture
they was to create
advise programme a
and project
developed, and the first version of the architecture
common ground for the many, many architectsmanagers that are working on the development
about construction principles,ofand
was the
published
variousinelements
May 2006. of Several rounds of
Dutch e-government. The
they idea
play is
a that architects
role in should havetoabusi-
giving instructions
consultation and review
sound influence onhave lead to the current
the construction principlesness
of e-government.
process analysts From
and their respective
software developers.
version 2.0, which
positions was published
in projects in April 2007.
and institutions, they could take care of
Furthermore, thethe necessary
reference coherence
architecture is used in
between the many aspects of the e-government:
At the moment, the architecture is broadly sup- websites,
auditing data
project storage,
progress andprocess flow,
in setting standards
semantics,
ported data communication,
by both architects messages,
and decision makers in preferred technology,
for the results andtoso
that have beon. Architects
gained.
assist e-government
the Dutch in setting up e-government
context. projects and business solutions, they advise programme
and project managers about construction principles, and they play a role in giving
instructions to business process analysts and software developers. Furthermore, the
reference
Figure architecture
2. Reference is used
architecture: in for
Tool auditing project
architects progress
in their andwith
dialogue in setting standards for the
stakeholders
results that have to be gained.
NORA
dia ue
log log
Official, manager
ue dia Developer, engineer
e dialo
ogu gue
dial Architect
Governmental
organisation
EDP-auditor Informationmanager
Figure 2. Reference architecture: tool for architects in their dialogue with stakeholders.
As Figure 2 shows, the idea of a reference architecture is that this set of construction
34
principles and explanatory models helps architects in various positions to create
dedicated architectures for specific business solutions. In this way, one can see a
hierarchical set of architectural frameworks, ranging from international frameworks such
Figure 1. Reference architecture: tool for architects in their dialogue with stakeholders.
As Figure 1 shows, the idea of a reference architecture is that this set of construction principles and
explanatoryReference
A Service-Oriented models helpsArchitecture
architects in various positions to create dedicated architectures for specific
for EGovernment
business solutions. In this way, one can see a hierarchical set of architectural frameworks, ranging from
international frameworks such as the European Interoperability Framework (EIF) (European
Commission, 2004), via national and sectoral reference architectures, down to enterprise architectures
and finally the architectures of individual projects. Just like the Russian matrushka dolls, the smaller
Figure 3.fitting inside the
Hierarchy of larger (Figure 2).
architectures
INTERNATIONAL STANDARDS
PROJECT ARCHITECTURE
35
A Service-Oriented Reference Architecture for EGovernment
efits or the granting of an import permit. For the In the context of cooperating but relatively
purposes of the following discourse, the term autonomous government organizations, service
service will hence cover any contacts between orientation seems particularly attractive. It facili-
citizens or businesses on the one hand and the tates the creation of a federated architecture, in
administration on the other (p. 35). A service which each organization retains a high degree of
concept is also used at a more technical level. autonomy regarding its internal processing, and
SAGAs computational viewpoint introduces a supplies a set of services that can be integrated
multi-layer reference software architecture, which to form a high-level service that is meaning-
permits both the use of software services and the ful to end-users (citizens, companies, and civil
direct use of components. servants).
In the Dutch e-government architecture,
Service Orientation in E-Government service orientation was adopted as the funda-
mental design principle, underlying the entire
The emergence of service-oriented computing architecture. Services are not only used in the
(SOC) and Web services technology, in particular, narrow sense, i.e., the service as a self contained
has aroused enormous interest in the service- software module that performs a certain function,
oriented architecture paradigm (SOA). At first, but in a broad sense: Not only services between
service orientation was seen as a strictly IT-related a governmental body and a citizen or a company
issue. However, a purely technological focus would are regarded from this perspective, but also the
be too limited and would fail to appreciate the way two or more governmental bodies are work-
value of the much more general service concept. ing together, and the cooperation between two or
This essentially simple concept can and should more departments of one institution.
be used not just in software engineering, but also Until recently, SOA was often understood as
at all other levels of an architecture, to achieve a technical issue and focused only on software
ultimate flexibility in both business processes architecture. However, the service concept is much
and their IT support. more broadly applicable than that, which stands to
What makes the service concept so appealing? reason given its original background as a business
First, there is the fact that the service concept is concept. Service orientation is also a very useful
used and understood in the different domains concept to structure the business architecture of an
making up an enterprise. In using the service organization, especially in the networked institu-
concept, the business and IT people have a mutu- tions of e-government. It provides a conceptual
ally understandable language, which facilitates basis for the entire enterprise architecture of an
their communication. Second, service orientation organization (Steen et al., 2005).
has a positive effect on a number of key issues: Service orientation is a concept with wide-
interoperability, agility, cost effectiveness, and ranging implications on more than just a techni-
innovation power. Finally, service orientation cal level. From an organizational perspective,
stimulates new ways of thinking. Traditionally, the fundamental change is that the basic unit for
applications are considered to support a specific management and control is no longer a depart-
business process, which in turn realizes a specific ment with its own IT systems, but rather a much
business service. Service orientation allows us also smaller entity, a business service. Monolithic,
to adopt a bottom-up strategy, where the business department-bound systems will disappear, and
processes are just a mechanism of instantiating former business owners will lose control over
and exploiting the lower-level services to the what they thought was their operation. This
outside world (Steen et al., 2005). decomposition opens up many opportunities for
36
A Service-Oriented Reference Architecture for EGovernment
combining basic services into new, demand- or The various principles are organized in the
event-driven ensembles that really address citi- architectural meta-framework presented previ-
zens needs. However, new management issues ously. Each cell of the architectural framework
arise, such as control responsibility within such is filled with 10 to 20 architectural principles.
multi-party networks of e-government service Every principle is written down as a short state-
providers. ment, which is followed by a more elaborated
An important consequence of service orienta- explanation. Finally every principle has a status
tion for the Dutch reference architecture discussed identification. Some principles could be derived
in this chapter, was that the chosen meta-frame- immediately from legislation; these principles
work had to be adjusted, which lead the final are called de jure principles. The next type is
version as shown in Figure 1. This adjusted meta- called e-government principles. These should
framework was used to develop a coherent set of be adopted by as many governmental bodies as
construction principles for e-government. possible, because they are the basis for coopera-
tion and interoperability. Some people plead for
Principles and Building Blocks putting these principles in a formal statute to
make them more compelling. A final type of
The Dutch Government Reference Architecture principles is called recommendations. These
consists of two main types of content: architectural are principles that only affect the internal ar-
principles and high-level designs of e-government chitecture of a governmental body. This type of
building blocks. The principles and models of principles is seen as advisory, and the reference
this reference architecture have been drawn up in architecture in this respect serves as a body of
consultation with many architects from different knowledge for architects. In the appendix to this
Thestructureoftheoverallarchitecture,withacitizenfacinglefthandside,thevariousgovernment
programmes and governmental organizations.
institutionsandagenciesinthemiddle,andsharedinformationregistriesontheright,isreflectedinthe
designoftheindividualorganizationsinthemiddle.Thisisofcoursederivedfromthecommonthree
tierarchitecturalpatternofpresentation,businesslogic,anddata.
Figure 4. Overview of Dutch e-government reference architecture (Bayens et al., 2007)
integrated dutch
governmental
website
persons
ministry
companies
www.overheid.nl
province
buildings
municipality
domains
tax adresses
cars
company social security
Data exchange
pensions
healthcare
Incomes
additional: 00
etc.
Hierarchy of service buses
Figure 1. Overview of Dutch e-government reference architecture (Bayens et al., 2007).
Inthesameway,additionaloverviewmapsweredevelopedformorespecificareasofthemostgeneral
overviewmapinordertogivesomemoredetailofunderlayingstructures.Error!Referencesourcenot
37
found.showsanexample:ThispictureshowsthedesignofahierarchicalcompositionofEuropean,
Dutch,andsectoralservicebuses,partiallybasedonalreadyexistingbuses,butbroughttogetherand
A Service-Oriented Reference Architecture for EGovernment
chapter, some of the main principles are listed from the common three-tier architectural pattern
Thestructureoftheoverallarchitecture,withacitizenfacinglefthandside,thevariousgovernment
according to the cells within the meta-framework of presentation, business logic, and data.
institutionsandagenciesinthemiddle,andsharedinformationregistriesontheright,isreflectedinthe
in which they fit. In the same way, additional overview maps
designoftheindividualorganizationsinthemiddle.Thisisofcoursederivedfromthecommonthree
But principles alone are not enough to make an were developed for more specific areas of the most
tierarchitecturalpatternofpresentation,businesslogic,anddata.
architecture usable. Guidance in applying these general overview map in order to give some more
principles and concrete high-level designs of archi- detail of under laying structures. Figure 5 shows
integrated dutch
tectural components, the so-calledgovernmental
e-government an example: This picture shows the design of a
website
building blocks, are also indispensable. hierarchical composition of European, Dutch, and
One of the first steps in the development of sectoral service buses, partially based on already
the architecture was, therefore, to develop high- existing buses, but brought together and persons com-
ministry
level models of the most important e-govern- pleted in an overall infrastructure architecture. companies
www.overheid.nl
ment components. In these so-called overview Today, several partiesprovince are developing networks
buildings
maps, relevant items like national information and service buses, based on this relatively simple
registries, a network infrastructure, the various architectural design.municipality domains
EU countries Legend
International
Logic function / Bus
networks and
service busses Transport function / Network
EU
TESTA
Webservices
-Routing
-Translation NATIONAL
Messages
-Security SERVICE
BUS Files
-.....
38
A Service-Oriented Reference Architecture for EGovernment
National e-government portal for citizens, To unify these descriptions and facilitate the
where each citizen can have his/her person- exchange of architectural knowledge and the
alized my government page integration of the various building block designs,
National e-government portal for compa- we propose to use a standardized language for
nies enterprise architecture modelling called Archi-
National call centre for the Dutch public Mate (Lankhorst et al., 2005). This language
sector focuses specifically on high-level modelling and
Unique personal number to facilitate the inter-domain relations. With this language, we
exchange of information and the integration are able to model both the global structure within
of services across government agencies each domain, showing the main elements and
Unique number for companies and institu- their dependencies, and the relations between
tions the domains, in a way that is easy to understand
National authentication service, with dif- for non-experts. The language is rapidly gain-
ferent levels of security and corresponding ing acceptance in the Netherlands and abroad,
means for authentication and architects from several Dutch governmental
New smartcard-based national identity card, institutions already use it as their standard mod-
which contains biometrical data elling technique.
National repository for all public services ArchiMate distinguishes itself from many
and products other languages by its well defined metamodel,
Mechanism providing and handling Web set of concepts and, most importantly, its rela-
forms tions. Furthermore, the enterprise-level scope
National infrastructure for the exchange of of ArchiMate is wider than that of languages
messages and services like UML and BPMN, which focus on a more
detailed description of specific domains such as
This type of standard components of e-govern- software and business processes. ArchiMates
ment will play a more and more dominant role in level of abstraction simplifies the construction
the development of comprehensive e-government of integrated models, where most languages ap-
solutions, especially across agencies. They will pear to persuade architects to detailed modelling.
help to overcome interoperability problems and Although detailed modelling of most aspects also
increase transparency and efficiency in the Dutch can be performed in ArchiMate, using ArchiMate
public sector. as an umbrella language, from which links can
be made to detailed models in languages such as
Modelling the Architecture UML or BPMN, is most useful.
ArchiMate is strongly service-oriented, not
The high-level descriptions of e-government just for describing software architectures but
building blocks presented in the previous sections across the entire enterprise architecture domain.
need to be formalized and detailed before they This makes it very well suited for modelling the
can become the basis for any real implementa- service-oriented government reference archi-
tion. These more detailed models are currently tecture at hand. Service orientation leads to a
not part of the reference architecture itself, but layered view of enterprise architecture models,
such descriptions are made within individual where the service concept is one of the main
projects that focus on the realization of these linking pins between the different layers. In this
building blocks. context, the ArchiMate language distinguishes
three main layers:
39
A Service-Oriented Reference Architecture for EGovernment
1. The business layer offers products and as follows. For a more detailed description please
services to external customers, which are refer to (Lankhorst et al., 2005).
realized in the organization by business The main structural concept at the business
processes (performed by business actors or layer is the business actor, an entity that performs
roles). behaviour such as business processes or func-
2. The application layer supports the business tions. Business actors may be individual persons
layer with application services, which are (e.g. customers or employees), but also groups of
realized by (software) application compo- people and resources that have a permanent (or at
nents. least long-term) status within the organizations.
3. The technology layer offers infrastruc- To each actor business roles can be assigned,
tural services (e.g., processing, storage, which in turn signify responsibility for one or
and communication services) needed to more business processes, which may manipulate
run applications, realized by computation business objects. The externally visible behaviour
and communication
modelling devices, and
the service-oriented system reference
government of a business process is
architecture at modelled by the concept
hand. Service
software. business service,
orientation leads to a layered view of enterprise architecture models, where the service which represents a unit of
concept is one of the main linking pins between functionality
the different thatlayers.
is meaningful
In this from the point
context, the of
A common abstract metamodel lies behind
ArchiMate language distinguishes three main layers: the view of the environment. Not shown in the figure
modelling
1. The concepts
business at all threeoffers
layer layers,products
comprising is thatto
and services services
external cancustomers,
be grouped which
to formare(financial
(abstract) concepts for structure, behaviour, or information)
realized in the organization by business processes (performed by business actors products, together with a contract
or
and information,
roles). and a separation is made that specifies the associated characteristics, rights
between internal and external concepts. In and requirements.
2. The application layer supports the business layer with application services, which are
Figure 6, we see this
realized structure ofapplication
by (software) the metamodel components. The main structural concept for the application
reflected in the set of application layer concepts
3. The technology layer offers infrastructural services layer (Figure(e.g.,6)processing,
is the application
storage, component.
and
and the relevant relations between
communication services)them, whichtowerun applications,
needed This conceptrealized
can be used to model any structural
by computation and
have used in the example models in the remainder
communication devices, and system software. entity in the application layer: not just (reusable)
of this chapter. The
A common structure
abstract of this part
metamodel liesofbehind
the thesoftware
modelling components
concepts that can
at all be part
three of one or
layers,
metamodel is representative for the entire lan-
comprising (abstract) concepts for structure, behaviour, and information, andsoftware
more applications, but also complete a
guage and is largely
separation repeated
is made in theinternal
between business and applications
and external or information
concepts. In Figuresystems.
6, we see Behaviour
this
structure
technology of the
layers. The metamodel
most importantreflected in the set in
modelling ofthe
application
applicationlayerlayerconcepts and thein a way
can be described
relevant
concepts relations
at each between
of the three layersthem, which we have
are explained thatused in the
is very example
similar modelslayer
to business in thebehaviour.
remainder of this chapter. The structure of this part of the metamodel is representative for
the entire language and is largely repeated in the business and technology layers. The
most important modelling concepts at each of the three layers are explained below. For a
Figure 6. Application layer concepts in ArchiMate
more detailed description please refer to (Lankhorst et al., 2005).
Information Behaviour Structure
Realisation Composition
Usage
flow
triggering
We make a distinction between the externally or the use of interfaces by roles, components or
visible behaviour of application components in collaborations. The composition relation indicates
terms of application services, and the internal that an element consists of a number of other ele-
behaviour, application functions, that realize ments, i.e., the lifecycles of the contained objects
these services. Services are offered through the are tied to that of their container. The aggregation
application interfaces of an application compo- relation is used to group a number of elements
nent. Data objects are used in the same way as within another element, but the grouped elements
data objects (or object types) in well-known data continue to have an independent lifecycle. The
modelling approaches, most notably the class assignment relation links behaviour elements
concept from UML. with structure elements (e.g. roles, components)
The main structural concept for the technology that perform this behaviour, roles with actors
layer is the node. This concept is used to model that fulfil them, or artefacts that are deployed
structural entities in the technology layer. Nodes on nodes. The realization relation links a logical
come in two flavours: device and system soft- entity with a more concrete entity that realizes
ware. A device models a physical computational it, e.g. a service that is realized by an application
resource, on which artefacts may be deployed function. The specialization relation indicates
for execution. System software represents the that an object is a specialization of another object.
software environment for specific types of compo- Temporal or causal relations between processes,
nents and data objects. An infrastructure interface function, interactions and events are modelled
is the (logical) location where the infrastructural with the triggering relation. The flow relation
services offered by a node can be accessed by describes the flow of information between ele-
other nodes or by application components from ments. Finally, an association models a relation
the application layer. An artefact is a physical between objects that is not covered by another,
piece of information that is used or produced in a more specific relation.
software development process, or by deployment Many of these concepts and relations have been
and operation of a system. A network models a inspired by existing standards. For instance, the
physical communication medium between two or application component, node and device concepts
more devices. In the technology layer, the central and relations such as composition, association,
behavioural concept is the infrastructure service. and specialization originate from UML, while
We do not model the internal behaviour of infra- the process and event concepts and the trigger-
structure components such as routers or database ing relation are used in most business process
servers; that would add a level of detail that is not modelling languages.
useful at the enterprise level of abstraction.
Next to the concepts to model the business, Example: Personal Internet Page
application, and technology layers of an enterprise,
we also need to model the different relations The Dutch government has decided that each
between these concepts. To this end, ArchiMate citizen should become a personal Internet
provides several types of relations. The access page (PIP) called MijnOverheid.nl (translated:
of information elements, e.g. business or data MyGovernment.nl). Citizens and businesses
objects, by behaviour elements, e.g. processes, can use this portal to view their personal data,
functions or interactions, is modelled with the submit corrections or changes, receive personal-
access relation. The usage relation models the use ized information, and manage their affairs with
of structure or behaviour elements, e.g. the use of government in one place. Similar initiatives can
services by processes, functions or interactions, be seen in other countries, such as Denmarks
Borger.dk and Singapores My.eCitizen.
41
A Service-Oriented Reference Architecture for EGovernment
The PIP will serve both citizens and govern- agencies, this personal page makes it easier to
ment. For citizens, it will be easier to find relevant reach more citizens with e-government services
services, availability is 7x24, information can be and it will provide economies of scale (build once
tailored to personal preferences, information is & implement for all agencies).
reused across agencies, and they can get insight The PIP thus serves as an intelligent integra-
in their personal files and dossiers at these various tor:
agencies from one point of entry. For government
Governmental services
First Results
42Firstresults in applying the Dutch Government Reference Architecture are encouraging.
Many institutions have adopted the architecture as an important guideline in their own
architectural practice and are aligning their developments with it. Sector-specific
A Service-Oriented Reference Architecture for EGovernment
It finds and displays e-government ser- common infrastructural facilities, such as service
vices buses, shared Internet portals, authentication
Government agencies retain autonomy and services, and basic information registries. To
responsibility for their services this end, the reference architecture also provides
Services retain the identity of the govern- a set of over 200 relevant technology standards,
ment agency which are put into context by the set of the 130
architectural principles. This combination of
Importantly, the PIP will not provide integra- standards and principles for applying them puts
tion between (the services of) different agencies; it a step beyond comparable initiatives like SAGA
this is left as a responsibility to these organiza- (Germany, 2007) and others. In this way the
tions themselves. On the other hand, if two or architectural guidelines and the interoperability
more agencies combine their services, the PIP framework are intelligently combined.
will support the dissemination of this combined Several important elements of this are already
service to citizens and companies. operational. A central authentication facility,
A first-level decomposition of the core services DigiD, has been developed and is currently
and data sources of the PIP is shown in Figure 7, used by many governmental institutions and
which is based on (Ghosh, 2006, p. 20). Each of more than 5 million citizens, for example to file
the services specified in this model can of course their electronic tax returns. Basic information
be described in much more detail, providing in- registries are being formed and the first of these
formation about the functions that realize these are already operational.
services, the components that implement these
functions, the way data is used by these functions,
etc. Space limitations prevent us from showing Future Developments
the full detail of these designs.
As we can already see in this figure, the PIP Notwithstanding the important developments in
provides a collection of services that may also Dutch e-government outlined in the previous sec-
be relevant outside the context of the PIP itself. tions, recent research has unveiled that only some
Providing these services as building blocks to 16% of Dutch citizens perceive an improvement
various government agencies for inclusion in their in the quality of service provisioning by Dutch
own e-government solutions could be a next step public bodies over the last few years, despite
after deployment of the PIP itself to citizens. the fact that about 76% of the population has
visited governmental Websites (Burger@Over-
First Results heid, 2006). Apparently, there is still a large gap
between governmental service offerings and the
First results in applying the Dutch Government actual demand of citizens and enterprises.
Reference Architecture are encouraging. Many A main cause of this gap appears to be that
institutions have adopted the architecture as an most e-government services have been designed
important guideline in their own architectural inside-out, based on the current structure,
practice and are aligning their developments with organization, and products of the various gov-
it. Sector-specific architectures, in e.g. education, ernmental institutions, resulting in a fragmented
social security, and healthcare, are being aligned and ill-coordinated patchwork of services. For a
with and based on the reference architecture. single event, a citizen has to deal with many par-
Even more importantly, the reference architecture tial solutions by several organizations that hardly
serves to coordinate the development of a set of communicate with each other. This problem also
43
A Service-Oriented Reference Architecture for EGovernment
holds for civil servants, who need to cooperate Policy: The mission on political subjects,
with their colleagues in different institutions, but such as environment, health-care, taxes
are seldom provided with adequate means to do so. etc., which forms the basis for legislation
To really serve the needs of citizens, government and regulation
e-services should be centred on the actual citizen Legislation: National and local laws and
demand. Such a demand driven e-government regulations that are implemented in accor-
requires an integrated approach of both technical dance with policies
and organizational issues. Service: The (governmental) services that
Although the reference architecture outlined enable citizens to comply to legislation,
before is an important step towards better inte- exercise their rights, or obtain government
grated e-government, much more needs to be done products and benefits
to achieve truly citizen-centred services. This Process: The activities and transactions
longer-term development of demand-driven e- performed by the provisioning organizations
government is the focus of a major Dutch research to realize these services
project B-dossier (B-dossier, 2007), comprising Information: Personal and public infor-
9 partners from government, private sector, and mation that is involved in or required for
science. In this project, we have identified require- transactions, such as the personal name and
ments and designed a service architecture to make address of the requestor, or general informa-
the next step towards this demand-driven perspec- tion about a new law
tive, in which both citizens and civil servants
needs for better integration are addressed. Furthermore, two core issues appeared in every
one of the studies we have consulted: a need for
Requirements Analysis more transparency in how the government oper-
ates, and a need for more control. Both of these
To identify the requirements, we have studied issues hold for citizens as well as for the civil
multiple visions of different stakeholders on servants involved. A further analysis revealed that
future egovernment. These included the Dutch these issues of transparency and control applied
citizen panel Citizen@Government (Burger@ to four main problem categories: fragmentation
Overheid, 2005), the local government of the city of services across many different organizations,
of The Hague (Bos, 2005), a consultancy firm compatibility of service demand and supply, qual-
HEC (Mettau, 2005), and various intra-govern- ity of these services, and their accessibility.
mental projects and studies. Furthermore, visions In our view, the development of a modern,
such as one-stop government (Wimmer, 2002) service oriented e-government transcends the
and virtual agencies (Fountain, 2001) have traditional way of organizing governmental
influenced this analysis. Several user studies are processes. In the paper age, it was accepted
carried out within the project itself, to evaluate that one had to go from one to the other agency
and refine these ideas. to collect different services or products. In the
The requirements analysis unveiled the domi- electronic service society, citizens and companies
nant problems that citizens and civil servants are expect a one-stop shopping way of doing business
facing. To capture these problems and the associ- with governmental institutions. So new technol-
ated requirements on e-government services, we ogy enables new forms of service provision, and
have defined a multi-dimensional framework. The people simply want to have this. In the years to
first dimension of this framework is what we call come, governmental institutions have to rearrange
the governmental service provisioning chain: their basic functions. This is a tough assignment
44
A Service-Oriented Reference Architecture for EGovernment
for senior management and politicians. Most of within the context of the reference architecture
them have to give up a certain independent role described before, and existing and emerging
in the public marketplace. They have to innovate, technological solutions have been mapped onto
cooperate, merge, harmonize, reallocate functions that architecture (Lankhorst & Derks, 2007). In
and sometimes even discontinue their services. the next sections, we will describe in more detail
In many instances, legislation has to be adapted which services we need to fulfil the requirements
to make these changes possible. All this can be we have identified.
a painful process, with some managers gaining
power and others losing. This is not just a matter of Fragmentation
optimizing IT or business process redesign. This
is giving birth to a new type of public service. First of all, we identified the fragmentation prob-
lem, where citizens and civil servants perceive
From Requirements to Services scattered service provisioning. There is no single
counter where all information or services are
Service orientation can be part of the solution. available. Instead, information and services are
Since the citizens needs and demands are seldom scattered around multiple governmental depart-
served by a single government agency, combining ments and sometimes private parties as well.
and integrating services across organizational This requires a substantial effort from citizen and
boundaries and sharing the necessary informa- civil servant to gather all required information
tion to deliver these services are key ingredients and services. A particular problem for citizens
of demand-driven e-government. is that personal data such as address, marital
At a high level, these requirements can (at least status, income, and social security number, are
partially) be met by an architecture that provides administrated by each department separately. This
at least the following elements: fragmented administration results in repeated
questions to citizens to fill out forms with informa-
Integrated, demand-driven e-government tion that is already known to other governmental
services, created from sub-services deliv- departments. This is perceived as highly frus-
ered by the various government organiza- trating. Another problem with the ever growing
tions involved complexity of legislation and regulation is that
Cross-organizational choreography of citizens loose track of relevant developments,
sub-services and -processes, to realize these which causes them to miss opportunities, e.g.
integrated end-user services with respect to social security benefits.
A virtual shared information space, an Of course, one step necessary to take is to
infrastructure for exchanging information present the various governmental services in an
between organizations and with citizens integrated way. An example of such a presentation
A federated identity management infrastruc- service is the Personal Internet Page described
ture for safely accessing this information previously. However, this does not solve the
End-user applications with which to access problem of integrating services across agencies.
all of the aforementioned To alleviate this problem of scattered service
provisioning and be able to deliver integrated
However, this is just a high-level layering of demand-driven services, we introduce process
generic elements that provides no clues to its integration services that are capable of orchestrat-
realization. To this end, a detailed functional ing fragmented processes. To resolve the lack of an
architecture has been developed, which fits integrated view, we introduce directory services,
45
A Service-Oriented Reference Architecture for EGovernment
46
A Service-Oriented Reference Architecture for EGovernment
47
A Service-Oriented Reference Architecture for EGovernment
Process
Presentation
integration
48
21
A Service-Oriented Reference Architecture for EGovernment
Integrated
demand-driven service
Process coordination
Interpreting Step-by-step
Composing services Process status
Logging
service request plans processand history
execution
Sub-service of
service provider
Notification Transaction Status information
service
Figure 9. Process orchestration.
service service
If we look in more detail at the sub-service delivered by an individual service provider,
we see that this sub-service may consist of at least three other services: a transaction
service for information access, Figure 9. Process
a service orchestration.
that provides status information, and a service
If we look in more detail at the sub-service delivered
that notifies the user of changes. These services are realized by an individual
using several service provider,
internal
we see that this sub-service may consist of at least three other
functions for internal process orchestration, authentication & authorization, access to services: a transaction
service
Figure 10.for
information, information
Realization access, a service
of sub-services
notification, etc., but of thatproviders
service
also using providesservices
external status information,
for authenticating and a service
and
that
authorizing users, and possibly services of other service providers as well.internal
notifies the user of changes. These services are realized using several
functions for internal process orchestration, authentication Sub-service of
& authorization, access to
service provider
information, notification, etc., but alsoTransaction
using external services for authenticating
Status information Notification and
service service service
authorizing users, and possibly services of other service providers as well.
Sub-service of
service provider
Transaction Status information Notification
serviceProviding service service
sub-service
Providing
sub-service
Users at
Authentication Authorisation rules
with Authentic
Information access Dossiers
Maintain Process status
service provider Parties to
service providerservice provider information
with service provider status information and history
be notified
22
49
22
A Service-Oriented Reference Architecture for EGovernment
If we look in more detail at the sub-service Commercial service providers such as financial
delivered by an individual service provider, we intermediaries might also be interested in provid-
see that this sub-service may consist of at least ing such an integration solution to their clients to
three other services: a transaction service for help them deal with government services.
information access, a service that provides status
information, and a service that notifies the user
of changes. These services are realized using Future Research Directions
several internal functions for internal process
orchestration, authentication & authorization, The Dutch Government Reference Architecture
access to information, notification, etc., but also that we have described on the previous pages is an
using external services for authenticating and important and growing influence on e-government
authorizing users, and possibly services of other developments in the Netherlands. Creating such
service providers as well. an overarching document has served not only to
This shows just a small part of the overall structure and organize the various developments
service architecture. Different elements of this are in this field, but also to bring together the archi-
worked out in much more detail in (Lankhorst & tects and developers of e-government solutions
Derks, 2006; Lankhorst & Derks, 2007). across many different institutions. As such, it
To realize the services identified here, we need is a milestone in the creation of a unified vision
a broad complement of technologies. Although on e-government in the Netherlands and it may
in most areas, the necessary technologies are serve as an example for other countries of the
starting to become available, there are still some way in which both the architecture itself and its
important gaps to be covered. Especially in inter- development process may be organized.
organizational coordination of processes, a light- At the moment, many government institutions
weight, easily configurable orchestration solution are assessing their compliance with the reference
is needed that is able to cope with different types architecture by investigating what the status
of services being combined, possibly from legacy and usage of the various architecture principles
systems that do not provide a clean Web service is within their own organizations. Although no
interface. Although the technology now exists to quantitative data are available yet, the general
perform intra-organizational process orchestra- impression is that about one third of the principles
tion, the different implementations of standards are already used in most organizations, one third
like BPEL by different vendors show that the are in the process of being employed, and the rest
necessary level of maturity for inter-organiza- are still being considered. Many organizations
tional orchestration has not yet been reached. And have explicitly stated that it is their policy to strive
a process orchestration language alone will not for compliance, so these number are expected to
suffice. Mechanisms for automated service-level improve in the near future.
agreements and e-contracting are also needed, and In the next years, the development of e-govern-
on top of that, a governance structure is necessary ment will carry on and accelerate. The availability
that coordinates the organizational policies and of national registers on persons, addresses, com-
actions towards the common goal of integrated panies, buildings, wages, pensions and the like
service provision. will create a great opportunity for almost every
This type of integrative functionality could governmental body to drastically redesign their
become part of a future version of the Personal service processes. It will create opportunities
Internet Page that was outlined in Sect. 1.4.5, for pro-active services, quicker responses, less
although this is currently not being planned. mistakes and less fraud. Projects are carried out
50
A Service-Oriented Reference Architecture for EGovernment
to harmonize data definitions, to integrate net- just on their exchange format. This may require
works, to develop sectoral and national service harmonization of legislation, with all the lengthy
buses, to harmonize meta-data, to set up a national procedures this entails.
governmental call centre and to develop many, Finally, the needs of citizens are not contained
many more electronic services. And beyond this, within the sometimes artificial boundaries of what
the perspective of cross-border integration in a are considered public institutions, and private
European context beckons. organizations would of course like to benefit from
However, much work still needs to be done public infrastructural services such as the national
on the demand side. Truly citizen-centred egov- authentication service described previously. On
ernment requires close cooperation between the the other hand, citizens are fearful of misuse of
various agencies involved to keep up with citizens their personal data if the government opens up
permanently evolving expectations, questions and these services to private use, and rightly so, as
needs. The coordination of business processes many incidents with e.g. identity theft illustrate.
across organizations, including the governance This private use of public infrastructures is there-
of these processes, is a difficult issue. As we fore not just a technical or organizational issue, but
have outlined, a service-oriented view on process requires policy makers to come up with a balanced
orchestration can be an important step forward. solution, weighing privacy, ease-of-use, economic
However, especially in the case of autonomous advantages, and many other issues.
organizations, it is very hard to orchestrate a
cross-organizational business process that realizes
a unified service to the citizen. Redistribution of Acknowledgment
tasks and responsibilities among organizations
might become necessary, but this can be a painful Part of this chapter results from the B-dossier
process for the people involved. project (http://b-dossier.telin.nl) of the Telematica
A second important problem is the integration Instituut, a combined research initiative with part-
of information between organizations. Many dif- ners from government and academia, comprising
ferent organizations use the same or very similar the Dutch Tax and Customs Administration, the
data, in many cases because of slightly different Municipality of The Hague, SVB, UWV, ING,
definitions in the regulations that are the basis ICTU, the University of Twente, and Delft Uni-
of their service. Removal of these duplications versity of Technology. The project aims to bring
would result in a considerable improvement in about truly integrated, demand-driven electronic
both efficiency and data quality. However, each services from government institutions to citizens
of these organizations uses its own formats and and companies.
concepts, and the shared infrastructure for in-
formation exchange we have described has yet
to be created. The national registries outlined References
in previous sections are an important step in
this direction, but not all data can (or should) be Alting van Geusau-Ghosh, S., Zeef, P, Toorn, H.
standardized and centralized. Although interoper- van, & Visch, E. (2006). Globaal Ontwerp Per-
ability at a technical level is achievable, as has been soonlijke Internet Pagina, version 1.2. The Hague,
shown in numerous practical examples, semantic The Netherlands: Stichting ICTU. Retrieved July
interoperability is much harder to accomplish, 17, 2007, from http://www.e-overheid.nl/data/
because it requires organizations to agree on the files/PIP/Globaal_Ontwerp_versie_1[1].2.pdf.
meaning of the various concepts they use and not pdf
51
A Service-Oriented Reference Architecture for EGovernment
Austria (2006). Administration on the Net An Derks, W.L.A., & Lankhorst, M.M. (2006).
ABC Guide to E-Government in Austria. Vienna, Definitie en conceptualisatie van het Bdossier.
Austria: Oesterreichische Computer Gesellschaft. Technical Report TI/RS/2006/013. Enschede, The
Retrieved July 17, 2007, from http://www.cio. Netherlands: Telematica Instituut. Retrieved July
gv.at/egovernment/umbrella/Administration_ 17, 2007, from https://doc.telin.nl/dscgi/ds.py/
on_the_Net.zip. Get/File-61820
Bayens, G.I.H.M. (2006). E-Government in The Dool, F. van den, Keller, W.J., Wagenaar, R. &
Netherlands: An Architectural Approach, Via Hinfelaar, J.A.F. (2002) Architectuur elektroni-
Nova Architectura, October 9, 2006. Retrieved sche overheid. Samenhang en Samenwerking.
July 17, 2007, from http://www.via-nova-archi- Zoetermeer, The Netherlands: Verdonck Klooster
tectura.org. & Associates. Retrieved July 17, 2007, from http://
www.e-overheid.nl/data/files/architectuur/archi-
Bayens, G.I.H.M., et al. (2007). Nederlandse
tectuurelektronischeoverheid.pdf.
Overheid Referentie Architectuur (NORA) v. 2.0.
The Hague, The Netherlands: Stichting ICTU. European Commission (2004). European In-
Retrieved July 17, 2007, from http://www.e-over- teroperability Framework for Pan-European
heid.nl/atlas/referentiearchitectuur/ e-Government Services, version 1.0. Retrieved
July 17, 2007, from http://ec.europa.eu/idabc/serv-
B-dossier (2007). B-dossier project Website.
lets/Doc?id=19529.
Enschede, The Netherlands: Telematica Insti-
tuut. Retrieved July 17, 2007, from http://www. Fountain, J.E. (2001). Building the Virtual State
b-dossier.nl. Information Technology and Institutional
Change. Washington, DC: Brookings Institu-
Bos, H. (2005). De ICT-strategie van de Gemeente
tion Press.
The Hague (2001-2007). Utrecht, The Nether-
lands: Informatiehuis. Retrieved July 17, 2007, Germany (2007). Standards und Architekturen
from http://www.egem.nl/projecten/voorhoede- fr E-Government-Anwendungen (SAGA 3.0).
gemeenten/kennisconferentie2006/documenten/ Berlin: Koordinierungs- und Beratungsstelle der
Evaluatie%20Haagse%20aanpak%20door%20In Bundesregierung fr Informationstechnik in der
formatiehuis.pdf?searchterm=None Bundesverwaltung. Retrieved July 17, 2007, from
http://www.kbst.bund.de/saga.
Burger@Overheid (2005). BurgerServiceCode,
versie 2.1. The Hague, The Netherlands: Burger@ Ghosh, S. (2006). PIP Architectuur white paper,
Overheid.nl. Retrieved July 17, 2007, from http:// version 0.3. Stichting ICTU, The Hague, The Neth-
www.burger.overheid.nl/files/burgerservice- erlands. Retrieved July 17, 2007, from http://www.
code_nl.pdf e-overheid.nl/data/files/PIP/PIP%20architectuur
%20whitepaper%20v0.3%20concept.pdf
Burger@Overheid (2006). Evaluatieonderzoek
2006. The Hague, The Netherlands: Burger@ Hong Kong (2007). The HKSARG Interoperability
Overheid.nl. Retrieved July 17, 2007, from Framework. Version: 5.1. Hong Kong: Govern-
http://www.burger.overheid.nl/files/b@o_evalu- ment of the Hong Kong Special Administrative Re-
atieonderzoek_bop_2006.pdf gion, Office of the Government Chief Information
Officer. Retrieved July 17, 2007, from http://www.
Denmark (2006). Architecture for e-Govern-
ogcio.gov.hk/eng/infra/download/s18.pdf
ment in Denmark. Offentlig Information Online.
Retrieved July 17, 2007, from http://www.oio.
dk/arkitektur/eng.
52
A Service-Oriented Reference Architecture for EGovernment
Hoven, J. van den, Wagenaar, R., Daskapan, S., of Amsterdam, Department of Accountancy &
Manders, N. Kenny, S. & Eldin, A.A. (2005), Information Management.
Managing Identity, Privacy & Profiles. Technical
Mettau, P. (2005). mijnoverheid.nl Publieke
Report TI/RS/2005/101, Enschede, The Nether-
Dienstverlening in de toekomst. The Hague: Het
lands: Telematica Instituut. Retrieved July 17,
Expertise Centrum.
2007, from https://doc.telin.nl/dscgi/ds.py/Get/
File-52040/TUD_sotas.pdf Steen, M.W.A., Lankhorst, M.M., Doest, H. ter,
Strating, P., & Iacob, M.-E. (2005). Service-Ori-
ITU (1995), Open Distributed Processing - Refer-
ented Enterprise Architecture. In Z. Stojanovic
ence Model - Part 3: Architecture, ITU Recom-
and A. Dahanayake (Eds.), Service-Oriented
mendation X.903 | ISO/IEC 10746-3. Geneva,
Software System Engineering: Challenges and
Switzerland: International Telecommunication
Practices, Hershey, PA: IDEA Group.
Union.
The Open Group (2006). The Open Group Ar-
Janssen, M., Gortmaker, J., & Wagenaar, R.
chitectural Framework (TOGAF) Version 8.1.1
(2006). Web Service Orchestration in Public
Enterprise Edition. Reading, UK: The Open
Administration: Challenges, Roles, and Growth
Group. Retrieved July 17, 2007, from http://www.
Stages. Information Systems Management, Spring
opengroup.org/togaf/.
2006, pp. 4455.
UK (2005). e-Government Interoperability
Lankhorst, M.M. & Derks, W.L.A. (2006).
Framework Version 6.1. London: Cabinet Office.
B-dossier architectuur. Technical Report TI/
Retrieved July 17, 2007, from http://www.gov-
RS/2006/014, Enschede, The Netherlands: Tele-
talk.gov.uk/schemasstandards/egif_document.
matica Instituut. Retrieved July 17, 2007, from
asp?docnum=949
https://doc.telin.nl/dscgi/ds.py/Get/File-61826
US (2007). Federal Enterprise Architecture.
Lankhorst, M.M. & Derks, W.L.A. (2007).
Washington, DC: Office of Management and
Towards a Service-Oriented Architecture for
Budget. Retrieved July 17, 2007, from http://www.
Demand-Driven e-Government. 11th IEEE Inter-
whitehouse.gov/omb/egov/a-1-fea.html.
national EDOC Conference (EDOC 2007). Los
Alamitos, CA: IEEE Computer Society. Wimmer, M.A. (2002). Integrated Service Model-
ling for One-Stop Government. Electronic Mar-
Lankhorst, M.M., et al. (2005). Enterprise Archi-
kets, special issue on eGovernment, 12(3):18.
tecture at Work Modelling, Communication,
and Analysis. Berlin: Springer-Verlag. Zachman, J.A. (1987). A Framework for Informa-
tion Systems Architecture. IBM Systems Journal,
Maes, R. (1999). A Generic Framework for Infor-
26(3):276292.
mation Management, PrimaVera Working Paper
99-03, Amsterdam, The Netherlands: University
53
A Service-Oriented Reference Architecture for EGovernment
This appendix gives an overview of main architectural principles of the Dutch Government Reference
Architecture, sorted by the cells of the architectural meta-framework (Figure 1).
Organization
Business Services
Processes
54
A Service-Oriented Reference Architecture for EGovernment
Both workflow software and (unattended) applications controlled by business process management
software.
Front office channels can be coupled at local, sectoral and national level.
Information Exchange
Technical Components
The choice of technical components is left to individual organizations (subsidiarity), provided that
they support the relevant standards and requirements regarding security and availability.
Systems critical to the service delivery have to be highly reliable.
Data Storage
Network Architecture
55
56
Chapter III
Role of Beacon Architecture in
Mitigating Enterprise
Architecture Challenges of the
Public Sector
Amit Bhagwat
Independent Consultant, UK
Abstract
This chapter introduces the concept of Beacon Architecture as a formalized and ordered grouping of
architectural elements, describing the constituents, their order, correlation and likely evolution of the
grouping; and illustrating its specific value to the public sector. The first half of the chapter builds up to
the concept, the reasons behind its specific nature, and its value to enterprises, especially in the public
sector. For this, the chapter is split into a number of sections that may be studied separately and that also
build up to introduce Beacon Architecture. The sections may be broadly divided as concepts, historical
overview, illustrative case studies in public sector transformations along with a summary of peculiar
architectural challenges they face, and a cyclical pattern to Architecture Development. After introducing
and elucidating on concept and constituents of Beacon Architecture, the chapter delves into its correla-
tion with architecture concepts in currency and its role in mitigating enterprise architecture challenges
illustrated earlier in the chapter, before concluding on an assessment of future trends.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
57
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
Any collection of organizations that has a common Architecture of a thing, at a given point in time,
set of goals and/or a single bottom line is its structural and functional organization, itself
decomposable as organization of components
The immediate, implicit, and, to many of us interacting through defined interfaces, recursively
obvious, logical progression from this is that En- composed of smaller components.
terprise Architecture, which needs context of an
enterprise, can only be as defined, robust, coherent Thus combining the two definitions, of Ar-
and serviceable, as the enterprise itself is. Turning chitecture and Enterprise, Architecture of an
the statement on its head, an enterprise can be Enterprise is:
explored for its definition, robustness, coherence
and serviceability, while exploring/defining its The (usually recursive) structural and functional
Enterprise Architecture. composition of components of a collection of
Practically all enterprises are in a certain level organizations, where the organizations have a
of flux, which creates its coupled field in context common set of (essentially functional) goals
of their architecture. The private sector though,
usually has either a clear enough domain of op- This definition therefore puts structure as a
eration (e.g. specific sets of financial services, function-enabler and as such its subservient, while
goods manufactured, etc) or, in case of diversi- placing clear emphasis on functional objectives
fied/multi-domain groups of organizations, the of the enterprise and of its constituents that are
practical prudence, often imposed by the variety geared to meeting objectives (or a coherent related
of domain-specific regulatory regimes that differ- set of them) of the enterprise.
ent organizations within the group operate under,
makes the group to be treated as a collection of
enterprises, rather than a single enterprise. The Aspects of Enterprise
private sector, being self-sustained and usually Architecture
competitive, also tends to prefer individuals with
experience and proven ability in the domain. Enterprises are rarely static, either structurally
Whereas achievements through individual abil- or functionally. When an enterprise transforms/
ity may not be a safe strategy for success of an evolves, it can involve changes that may be su-
enterprise, it certainly serves better than where perficial or that may fundamentally change the
the leaders may lack domain expertise, vision and structural and functional composition/interrela-
proven ability, and may all too often owe their tion of components that make up the Enterprise.
position to caprice of a higher political master. The latter are referred to as Architecturally
It is here, that results through definition rather Significant Changes. Structured transformation
than heroics, and thus the concept of architecture, techniques analyze and mitigate such changes
assume additional significance in the public prior to changes that build on the changed archi-
sector, over and above that elsewhere. Deriving tecture. For example, in the software/systems
58
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
maintains
currency and
effectiveness of owns
assists effectiveness of
influences
E AS tra te g y E AR o a d m a p
enab les
59
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
E ATra n s fo rm a tio n E AR o a d m a p
E AD e fin itio n
E n te rp ris e S tra te g y
of EA and is a precursor to successful EA tering its functional, and thus often structural,
transformations. composition, including adding to or refactoring
EA Roadmap, i.e. a staged, temporal descrip- its capabilities. This can only be achieved if a
tion of how EA might transform to meet EA body, often within the enterprise, understands
strategy, is enabled by EA definition and EA its architecture, and is thus able to plan and
strategy, and owned by EA Governance. oversee the architecturally significant aspects of
EA transformation, i.e. a clearly defined transformation of the enterprise, around which
step in taking EA from an existing/initial the rest of the transformation might happen.
state (often referred to as baseline state) to a Transformation needs governance, and intelligent
desired state (often referred to as target state), active governance, in turn, implies efforts into
in line with the EA strategy, is enabled by the definition, strategy and roadmap.
EA strategy, roadmap and governance. In a vast majority of successfully governed
enterprise architectures, a distinct group of el-
These relationships are pictorially represented ders, called Enterprise Architects in EA-aware
in Figure 1. The concepts thus form a dependency organizations, owns and oversees the enterprise
Web as depicted in Figure 2. architecture, including its transformation. These
individuals, apart from well developed analyti-
cal, lateral and linear thinking skills, need to be
Transforming Enterprise experts in at least one of the relevant subjects, but
Architecture with sufficient knowledge of other subjects that
relate to their expertise subject, to be able to be
We have surmised so far that transforming an circumspective thinkers and effective generalists,
enterprise might (and usually does) involve al- holding the bigger picture together.
60
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
61
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
lysts (including systems analysts, when systems frameworks that have broadened, yet made pre-
happen to be part of the problem space), they are cise, the definition of architecture concepts, with
an important and necessary addition, now widely Enterprise Architecture concepts following one
accepted in the IT industry/function. step behind (The Open Group, 2006) and eventu-
Over the last few decades, the increased scope, ally forming an integral part of the Architecture
complexity and increasing importance of infor- Framework.
mation and of reliable information processing in Whereas an exhaustive commentary on all EA
everyday life have also helped institutionalize frameworks created so far may prove a candidate
concepts such as object-oriented programming for a book-series, I think I may be pardoned
(and further, object-oriented analysis and design), delving briefly into some of the better and wider
component-based development, service-oriented known frameworks.
architecture, etc that, as far as the underlying logic The development of concepts of Enterprise
goes, may have been applies in history, but were not Architecture may be likened to that of a snow-
formalized as such; while importance of avoiding flake. While groups of water molecules/icicles
the divorce between business and IT, where the are formed (and at times broken down) and are
latter enables the former, has been highlighted by in motion through air continuing through chains
approaches such Convergent Engineering (and of molecular interactions, a flake is recognized
further, Convergent Architecture) only when it gather sufficient mass to begin to
The lessons, whether on architecting systems, precipitate and holds the critical mass until it
the business, the human organization, or the En- has precipitated. It is generally believed that
terprise as a whole with all that it is made of, have such phenomenon occurred through efforts of
been learnt the hard way, often without learning John Zachman in IBM in the 1980s. Whereas
from others mistakes and usually with the IT far from complete and with scope for differing
function an enabler taking the lead. Further, interpretation, his framework was a widely noted
they have been learnt best where challenges of and fairly comprehensive attempt at blueprinting
the environment have necessitated their learning an enterprise through a two-dimensional schema
for survival of the organization and discharge of around communication interrogatives (what, how,
critical responsibilities that it is tasked. where, who, when, why) and stakeholder groups
This explains why in institutions relying (visionary, owner, designer, builder, implementer,
on public money and operating in democratic worker). Whereas both the interrogatives and
societies, where, at least in theory, the budget stakeholder classification are open to interpreta-
managers can always be held accountable by tion, the classification scheme has provided useful
the population, greater effort has been spared in basis for further development of EA concepts e.g.
developing architecture concepts and organizing architecture views depending on viewpoints
them in frameworks. The best example is the followed, layers of abstraction, and building blocks
defense industry, where most solutions are novel an omnipresent term in modern day architecture
- meant to be one step ahead of the adversary, frameworks (CIO Council, 1999).
huge level of secrecy exists with far less scope for A number of development methods existed
fair competition across a large number of merited and were being minted, when standards such
suppliers, where solutions are not necessarily as ISO/IEC TR 14252:1996 began appearing to
routinely testable in their entirety, and yet where, assist a number of roles such as consumers,
in principle, failure is not an option. systems integrators, application developer, etc in
The lessons learnt have resulted in develop- construction of information processing systems.
ment of gradually sophisticated architecture The temporal path of context, then principles, then
62
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
definition of key architecture elements, then trans- it is conceivable that Beacon Architecture may
formational planning, was formalized in Spewaks be referred in future versions of TOGAF.
Enterprise Architecture Planning methodology, The Command, Control, Computers, Com-
among other places. EAP and Zachman were in munications (C4), Intelligence, Surveillance, and
turn useful sources for the Federal Enterprise Reconnaissance (ISR) framework (C4ISR) suc-
Architecture Framework by the Federal CIO ceeded TAFIM as DoD EA framework and was
council; while the Federal Enterprise Architecture in turn supplanted by the more comprehensive
Practice Guide endeavored to formalize architec- DoDAF in October 2003. C4ISR provided key
ture transformation approaches in a variety of IS abstractions and organization through its views,
lifecycle scenarios (CIO Council, 1999). and useful EA principles, while leaving the EA
In the meanwhile, Technical Architecture transformational approach to methodology of
Framework for Information Management individual organization and directing its focus
(TAFIM) was being developed under US DoD on going into great detail on work products. The
(Department of Defense, 2007). TAFIM was of- name C4ISR is also interesting in being one of
ficially withdrawn in January 2000, where its jour- the very few attempts at trying to be descriptive
ney into the Open community began through The and explicit, while in reality allowing initiatives
Open Group Architecture Framework (TOGAF) to opt-out of the framework and return to the wild
contributed extensively in its early stages by the on the pretext that scope of the initiative could not
US Defense Information Systems Agency (DISA). be completely covered by the four Cs, I, S & R.
In particular, the TOGAF Technical Reference DoDAF, while it retains the views concepts
Model (TRM) was largely derived from TAFIM, from C4ISR, is really a compendium for every-
and the TOGAF Architecture Development thing currently followed by various US defense
Method (ADM) was originally based on parts bodies with commentary on their rationale and
of TAFIM. The Reference Models aspect of the interrelation. Whereas it has many useful sec-
amorphous concept of Reference Architecture was tions around principles and transformational
thus first widely seen formalized in the defense approaches, its collection nature is a testimony
pedigree of Architecture Frameworks. to the fact that the US DoD is not an Enterprise,
The ADM and TOGAF reference models have and so when asked to provide a consistent and
grown in maturity version on version, though it reformed approach (CCA, 1996) to Informa-
has only been in major version 8 where TOGAF tion Technology Management, the best that the
has assumed the suffix of Enterprise Edition. It DoD can hope to come up with is a collection of
also has fairly well defined role-based responsi- everything, thus providing standards for most
bilities and governance description. It provides a scenarios and a fair amount of useful wisdom, but
continuum of Reference Models (skeletal models no consistency across organizations and different
that should be instantiated and detailed to be scenarios, other than that they shall all follow
valuable in a typical enterprise), supplemented pertinent standards set for them. The desperation
with Standards Information Base and Platform with which DoD has periodically moved on with
Taxonomy, with a wider and expanding Resource its architecture frameworks and has ended up
Base provided as additional support. By the very with DoDAF (Department of Defense, 2007) a
nature of its contents, the level of organization di- collection of approaches followed within different
minishes from the ADM section to the Continuum organizations, is an excellent illustration of the
section, with the Resource Base section serving need for the elements that have been defined and
simply as a receptacle. Given the evolutionary linked together in a logical order under Beacon
path followed by TOGAF and its open nature, Architecture, later in this chapter.
63
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
There too are initiatives within defense col- people and are not bound by the kind of secrecy
laborators of the US to produce aligned architec- inherent in defense and other security establish-
ture frameworks, including the UK MoDAF (with ments2.
6 rather than 4 views), and various international These are not full-fledged case studies, nor
synchronization efforts, including the IDEAS illustrative examples of Beacon Architecture in
group. Whereas such synchronization efforts practice; rather these serve as Illustrations by
allow sharing of vocabulary and proven useful Absence by citing situations common to the Public
concepts, they do not give rationale, nor coher- Sector that constituents of Beacon Architecture
ence and common purpose, to the organizations can address.
involved.
Transformation by Redistributing
Responsibilities
Public Sector
Transformations On 8th June 2001, the Department of Work and
Pensions (DWP) came into being by combining
Unfortunately, the public sector, that is so often the employment part of Department of Education
far closely bound to tactical interests of political and Employment (DfEE) with the Department
leadership, does not always have the liberty of of Social Security. The department has a grand,
presenting itself as a domain of matured successful albeit too amorphous to be enterprise-specific,
enterprises that know precisely their long term purpose of To promote opportunity and indepen-
objectives and are geared to following a fairly dence for all through modern, customer-focused
well-defined roadmap, while continually making services. The department has never been able to
themselves efficient. satisfactorily understand, let alone explain, how
In greater part of a decade that I have spent can it promote opportunity by divorcing itself
assisting a number of public sector institutions (or from Education, with the result that the Employ-
privatized near-monopolies that used to be public ment segment of the department, referred to as
sector institutions and still have a one-to-one Jobcentre Plus, has never quite aligned itself to
governance by the government through specific the rest of the department (which largely deals
regulatory mechanism) in the UK, examples of with Social Security) nor quite detached itself
these institutions being constantly defined, refined from the remainder of the old DfEE (later called
and then, as a retrograde move, redefined, have Department of Education and Skills).
abounded, despite the period having been under In short, the DWP is not an enterprise. Its
the stewardship of a single prime minister1 and constituents have tried to cope with the politically
a single ruling party with comfortable majority imposed tactical change by trying to consider
behind it. A longer review of public sector organi- each of the services (such as Jobcentre Plus, The
zations in the UK, or, for that matter, most places Pension Service, The Child Support Agency, etc)
in the world, will show a far uncertain picture as a separate enterprise, making them just about
in terms of existence, let alone clear objective workable, but unable to leverage on integrating
definition, strategy and roadmap, of a public common functions (such as payment processing,
sector institution. identity management, portfolio management, etc
Following are three examples cited from the - becomes plainly evident to its customers who
relatively stable British socio-political scene, subscribe to more than one of these services).
considering three among the highest resourced In fact, although clearly imprudent in terms of
departments that are quite accessible to ordinary effectiveness of the department, budgeting and
64
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
running transformational programs at individual years of their continuous residence in the UK,
constituent unit level has been about the only way with many other whimsical get-out caveats that
of dealing with the disparate scene and reacting can indefinitely prolong this period) are however
to future political whim. not entitled to such social security and are liable
In theory, it is possible to create cloned com- to be deported if they are unable to make posi-
ponents to design and build common services and tive economic contribution within a fairly rigid
then give ownership of such cloned components occupation regime. Whereas the UK has a right
to independent business units (e.g. architecting to decide its immigration pattern, it is against
and building an identity management framework basic principles of democratic taxation for the
that can then be independently deployed and man- people by the people to collect national insur-
aged within two business units, with the option ance from foreigners not yet granted permanent
of regular synchronization of data and a common residence who do not have social security and
intuitive experience to the end user). However, who are liable to be deported should they fail to
independent political leadership of various busi- be economically contributing in a specific way.
ness units makes allocation and accountability Further, a wider accountability of where money
for such common budget, or even desire to do goes from the individual pots (income tax and
so, difficult. national insurance) in necessary if two separate
pots are to be maintained.
Transformation by Grouping The UK Inland Revenue never managed either
Responsibilities Together to separately account for expenditure out of the
two pots or to explain the rationale behind its
On 18th April 2005, the Her Majestys Revenue and separate National Insurance regime. It is therefore
Customs (HMRC) came into being by merging the counterproductive to add to the chaos through
Inland Revenue (IR) and Her Majestys Customs further merger, when individual constituents of
and Excise (HMCE). The stated purpose of the the HMRC have not yet defined their own busi-
merger was straightforward and admirable to ness and when the merged business is actually
reduce administrative overhead and to leverage expected to be two businesses running side by
on mutual infrastructure/facilities. side collecting very different types of revenues
The UK though, like many other regions the perhaps using separate floors of the same build-
world over, lacks a simple logical revenue sys- ing with a single receptionist which really did
tem. To consider just the direct tax taken out of not need merger.
salary, there are at least two headings income
tax and national insurance. Each heading follows Transformation by Creating New
its own distinct mathematical rules. In theory, Capabilities
Income Tax represents contribution made by a
UK resident to overall governance, security and The National Health Service (NHS) in the UK
commonly used facilities, whereas the national established the National Program for IT (NPfIT)
insurance is meant to be just that a premium in October 2002 to move towards standardized
paid into a common insurance pot to serve should electronic care record for each patient, thus creat-
someone lose means of livelihood or meet with ing a unified patient identity accessible across ~
an incapacitating situation requiring livelihood 30000 general practitioners and 300 hospitals.
at least part-supported by the state. Non-Euro- The program however was never architecture-
pean foreign nationals not yet given permanent centric and far less emphasis was laid on defining
residence in the UK (i.e. for at least the first five and explaining to the end user the exact nature of
65
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
the care record or associated data-relevance and Lack of definition of the enterprise as a set
protection safeguards. The program introduced of organizations with a well-defined, specific
additional level of abstraction, unaccountability (as opposed to such generic objectives as
and confusion to the governance structure by in- To promote opportunity and independence
troducing the concept of Local Service Providers for all through modern, customer-focused
(LSPs) for regions of England, where each LSP services) durable set of common objec-
provided exactly the same services in potentially tives/purpose
very different ways, thus creating maintenance, Lack of well defined, coherent business
migration and enhancement issues from the very architecture
near future, in what is, at least notionally, a unified Lack of long-term business strategy
National Health Service. Systems Transformation Lack of a transformational roadmap
was planned without considering underlying Lack of enterprise patterning to leverage on
Architectural Transformation, establishing an commonalities among sister functions/en-
architectural pattern and considering possibility terprises
of a robust single or cloned solution to address Lack of clear BAU (business-as-usual) and
exactly identical needs across different regions. transformational governance
Governance structure lacked as its key facets
explicit architectural governance or end-user I conducted a simple non-exhaustive exercise
(clinicians and patients) requirements and expec- of how various responsibilities associated with the
tations management. erstwhile UK DfEE have moved across depart-
Contractual independence and use of multiple ments between 1988 and 2007, and how related
providers for providing exactly the same services departments have changed. The exercise is, as
in different regions failed to manage risk, as sec- stated, not exhaustive, but even to the extent that
ondary/indirect providers for separate regions hap- it has been completed, it shows a myriad of func-
pened to be the same organizations and thus risked tion-transfers, where the only palpable motives
multiple regions together, while a long chain of in most transformations appear to be political,
contractual obligations left organizations involved to give a Secretary of State (a politician in the
without a clear view of requirements (particu- upper echelons of the government typically in
larly non-functional requirements that are largely charge of a department) greater or lesser power
solved by the architecture) and architecture, and and a unified budget to go with it. The results are
without palpable accountability that could be used shown in Figure 3, which illustrate how functional
constructively to deliver the program. The pro- cohesion can be compromised and considering
gram cost has inflated many-folds with functional the smallest atomic function (e.g. Employment)
delivery still hard to predict and non-functional as a separate enterprise, though often imprudent,
robustness completely unproven. can end up being the most straightforward and
organizationally durable way of dealing with the
situation.
Enterprise Architecture
Challenges peculiar to the
Public Sector Progression through the
Architecture Development
Our exemplified discussion about the public Cycle
sector reveals many characteristic challenges
including: Now lets step back to what a generic enterprise
might want to do having decided on an archi-
66
Amit Bhagwat: Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
Split()
Reorganisation(00) Home Office (a.k.a. Department of Security, Crime, Narcotics, Counter-terrorism, Prisons )
Department of Department Of Transfer of Employment Transfer of Skills WorkPermits Homeland Sentensing, Probation, Prisons,
Health Social Security Function Import Function UK Security Reoffending
Split (00)
Deparment of
Justice
Department of Children Department of Innovation,
Schools and Families Universities and Skills
Figure 3: Considering distribution of Education, Employment and related functions in the British Government between 1988 and 2007
67
Figure 3. Considering distribution of education, employment and related functions in the British gov-
Amit Bhagwat: Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
68
Target State (Envisioned) of
Envisioning Enterprise
Analyse change to
Business Architecture
Execute change based on
architectural change ...
yes
No No
Need further No
analysis?
Configuration
Control
Oversee
69
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
70
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
1. Identifies, classifies, gives ability rating to, leading to another political entity coming to power
studies trends of and forecasts pattern of and reversing changes made by its predecessor.
a. Skills available in the society A clear and detailed Business Beacon drawn
b. Professional needs of the society by the highest executive body (the cabinet, in case
c. Members of the society in the role of of the UK) and attested by the highest legislative
single/multiple/versatile (doing one role body (the parliament, in case of the UK), among
but capable of another) /able (possibly other things, gives the enterprise in question a
doing one role but trainable on another) clear enough mandate and executive powers to
professionals subsume all such functions as are necessary to
2. Establishes a matrix of potential skill-role- discharge its role efficiently.
individual match based on An example of what can happen in the absence
a. Experience of such Business Beacon may be elaborated by
b. Ability citing the difficulties of timely role-skill match
c. Motivation in the medical profession, largely controlled by
3. Facilitates liaison across the government in the UK. In the UK, the NHS,
a. Professionals (including prospective under the Department of Health (DoH), is ulti-
professionals) mately an almost exclusive employer of all but a
b. Seekers of professional abilities (a.k.a. few senior clinicians / specialists. The jobs include
the marketplace) both relatively moderate-skilled jobs such as those
c. Providers of professional training (in- of junior/auxiliary nurses and high-ability jobs,
cluding senior professionals needing including those that are or are becoming highly-
apprentices) skilled (such as medical registrars on their way
4. Promotes value of equality of opportunities, to becoming recognized specialist consultants).
while preserving human dignity, whereby At the high-end, the specialties are a sophisti-
a. Individuals in the society achieve sta- cated set of skills. The compartmentalization of
tion in life based entirely on responsibilities and the notion of higher ability
i. Ability = more self-reliance, means that Jobcentre Plus
ii. Motivation attracts customers and employers focusing on
iii. Experience moderate skills, and, in turn, is unable to build
b. All humans living in the society, profile of high-end skills / high-ability skill-sets.
including foreigners resident in the The NHS itself is administration-centric with
society with due mandate, are treated managers, often of very average ability, manag-
with respect and courtesy due to every ing clinicians of greater ability. It therefore has
human even poorer capability in skills measurement.
The DfES that looks after education and skills,
If an enterprise is able to set its Business couples loosely with Jobcentre Plus and practically
Beacon with at least this clarity, there will be a not at all with the DoH. Since the UK clearly has
realistic possibility of moving in the right direction far fewer medical graduates than an inefficient-
and moving forward at all, rather than periodi- yet-effective NHS would need, a section of the
cally going in circles. The latter syndrome is of Home Office the department identified in public
particular significance in public sector institutions perception exclusively with Crime and that has a
in democratic societies, where a lack of Business suitably negative attitude towards its interlocutors
Beacons can make the institutions inherently in- steps in to grant visas to foreign medical gradu-
efficient, thus set in anti-incumbency sentiment, ates, to work and settle in the UK. Having done
71
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
that, none of the departments are responsible for Business Architecture Strategy
welfare of these foreigners legally immigrating
and even invited into the UK. Many of them (and The business architecture strategy, i.e. long-term
even British medical graduates) struggle to find vision of functional (and, based on that, structural)
jobs, not because their skills are not needed, but organization of the business, should ideally emerge
because no one is in charge of matching high-abil- out of the exercise of defining Organizational
ity clinical skill needs with available resources, Architecture and Business Beacon. Alternatively,
integrating unmet needs with foreign resourcing should a body of Business Architects be commis-
and ensuring welfare of those foreigners as equal sioned to come up with the BA Strategy, they would
members of the society, even in the case of errors need to ensure that Organizational Architecture
in resource matching. and Business Beacon exercises are satisfactorily
The situation is further complicated by the fact performed. It is also at this point that priority
that most departments, due to historical feudal (including that of interactions with environment
reasons and despite the moderate demographic of the enterprise) and dependency (including that
and geographic size of the UK, operate at at least on elements of environment of the enterprise)
three levels: should be palpable and formally laid out.
Architecture Infrastructure Capability En-
The union (called the nation elsewhere in gineering Practice Definition
the world) Before moving any further with architecture
The nations such as England, Scotland, etc artifacts and ideally even as the BA Strategy is
(called states/provinces elsewhere in the being formulated, the enterprise should test its Ar-
world, except that in the UK the legislative chitecture Infrastructure capability. Architecture
power of each Nation is vastly different, is requirement-driven, involves careful manage-
overlapping and inconsistent) ment of assets, is subject to controlled change
The counties and involves management of transformations
(projects). We therefore need capabilities for:
with the NHS adding a fourth concept, that of
region, between the nation (e.g. England) and 1. Requirement Management
county. a. Plan
Such inconsistencies can be minimized and b. Dependency Mapping
definition, reason of existence and achievements c. Compositional Mapping (a requirement
of a public-sector enterprise can be positively being subsidiary to another)
influenced by a clear-enough Business Beacon, d. Quantification and Parameterization
approved and committed to by the highest set of (including sizing and prioritization)
stakeholders. e. Traceability
The phrase Environmental Position has been f. Articulation (including through mod-
used in the first paragraph of this section to mean els, charts and multimedia)
positioning with respect to other agencies / busi- g. Project Management Integration
ness partners and peers (which may mean similar 2. Configuration Management
function in another country/state etc in case of the a. Plan
public sector, or a similar business in the market b. Asset Library
place in case of the corporate sector). c. Version Control
d. Configuration Inventory and Audit
e. Collaborative artifact development
support
72
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
f. Project Management Integration happen to meet the strategy. The roadmap there-
3. Change Management fore gives a sense of sequence, goes deeper into
a. Plan milestone states & transformational steps, and
b. Impact Metrics leads to resource planning and definition of trans-
c. Project Management Integration formations (projects/programs). It is preferable
to have the Roadmap nailed to specific calendar
These capabilities are collectively referred to dates, particularly given that external stimuli and
as Engineering/Support Capabilities and should collaborators expectations from the enterprise
be articulated through Engineering Practice may be associated with specific calendar dates.
definition. In recent times, many matured inter- It is however possible to leave the roadmap at a
connected tools are available to automate and sequence of initiatives stage, if the utilization
better control and audit these capabilities. Build- model of resourcing is practicable and followed
ing and successfully testing such infrastructure (i.e. where initiatives are slotted on the calendar to
would give additional assurance and stability to utilize available resources, rather than resources
progressing towards the Beacon. Only after the are made available for calendar-bound initiatives),
Engineering Practice is defined and preferably the provided that external stimuli are not expected to
associated infrastructure is established and tested, invalidate key transformational states when these
should development of the Beacon Architecture states are reached at a different calendar date.
continue through a detailed Roadmap. Business Architecture Contingency Plan
Regarding the establishment and testing of the This is really an integral part of a matured
Engineering Capability, it is often argued that tools Business Architecture Roadmap. The roadmap
are transformation enablers and organizations should take into account probable, possible and
should not be shackled to a particular choice of ideally, every plausible scenario along the roadmap
these when what is really important is managing and create a sequence Web, including contingency
the transformation. Whereas there is merit in this transformations and associated transitional mile-
argument and an organization need not be obses- stones that would not need to happen in a happy
sive about a particular set of tools they being day scenario, thus giving robustness to the BA
means towards an end organizations should Roadmap. This is a lot easier with Requirement
nonetheless invest in proving their Engineering Characterization Capabilities built as part of the
Capability, thus proving and beginning to insti- engineering capabilities, as that allows consider-
tutionalize the Engineering Practice Definition, ing which requirements are optional or might be
rather than keeping it in the form of an unproven de-prioritized with least business impact. Ad-
thesis. The organization should then be open to ditional contingency measures may exist in the
changing its infrastructure, including engineering form of contingency resources, either available,
practice enablers, in a structured, evaluated, risk- or acquirable from stakeholders.
mitigated and change-managed way, as defined in
its Change Management Practice Definition (part Operational and Developmental
of Engineering Practice Definition). Alternatives Analysis
73
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
evaluate, compare and contrast various alterna- inputs are pertinent in long-term progression of
tives, followed by setting out an enabler roadmap the Enterprise and can form part of the Beacon
(more specifically, an Information Systems Archi- Architecture.
tecture Roadmap interlinking Information with
Applications) tying in with the BA Roadmap. This Enterprise Governance, and
process also involves considering each business Correlation to Architectural
alternative and contingency point to evaluate Governance and Transformation
whether the Information Systems evolution path
will need to change to react to different business An aspect of Enterprise definition is Enterprise
situations. Arguably, the Information Systems Governance Definition. While those defining the
roadmap is less detailed and may give a set of Enterprise would inevitably define its Architecture
solutions applicable under a variety of BA road- (alternatively, enterprise may be defined while
map and contingency scenarios. defining its architecture), it is imperative that
Further enablers (such as technology enabling Architectural Governance is formally defined,
the Information Systems) follow similar treatment. with due influence on Enterprise Governance,
However, given the nature of changes in the tech- to keep the enterprise on its chosen path. Fur-
nology sector and role of technology as enabler of ther, whereas vision and strategic thinking are
enabler (enabler of Information Systems) rather important qualities of all leaders, Architectural
than goal, the deliberations on technology should governance should incorporate qualities of both
remain generic at continuously exploring and a good Enterprise Architect (a relevant special-
observing proven technologies and considering ist with sufficient generalist skills and aptitude
their deployments in emerging Information Sys- to collaborate with peers and hold the enterprise
tems scenarios. The Beacon Architecture should together) and a good leader. It is important to detail
therefore confine to the processes necessary for both the governance mechanisms, and qualities
evaluating and keeping abreast with changing & expertise expected of key governance roles, as
technologies so as to deploy a safe, efficient and part of the Beacon.
affordable solution that is available at modest tim- The Beacon should then elaborate on definition
escales, rather than predicting long-distance target and governance of transformations (projects/pro-
technologies (and further, associated brands). grams) to tie in with the Roadmap.
Figure 5 diagrammatically represents constitu-
Information Systems Patterns and ents of Beacon Architecture, also giving a sense
Frameworks of dependency and recommended sequence.
74
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
In fo rm a tio n S ys te m s
P a tte rn s a n d Fram e w o rks
B u s in e s s B e a con
Op e ra tio n a l a n d D eve lo p m en ta l
Arch ite ctu re In fras tru ctu re C a p a b ility
E n g in e e rin g P ra ctice D e finition Alte rn a tive s An a lys is
of architecture coupled with a set of principles ate Transition Architectures may be defined to
governing the overall direction. In this latter sense, control the change and validate it at intermedi-
Beacon Architecture is an elaborated Reference ate states expected during the transformation
Architecture, with specific meaning and mandat- by spanning the transformation across multiple
ing an essential set of formalized information, to ADM cycles.
be considered adequate. Its principal merit is in The Roadmap in Beacon Architecture defines
clearly defining what the Enterprise(s) considered at least the Target states of Business Architecture
is (are) and how the Enterprise should transform Transformations and potentially also some of the
vis--vis its objectives and operational model; Transition states. It may provide similar treatment
while the usual deliverables of typical CIO/CTO on Information Systems Architecture, which en-
Reference Architectures in terms of Services ables the Business Architecture, but is less likely
Framework, Systems management principles, etc to be fully elaborated/constraining on transition
can be useful inclusions. states of IS Architecture further down the line;
Beacon, Target and Transition are all to be its function being that of a Beacon and not of an
Architectures. As explained in context of the administrative impediment. For this reason too,
Architecture Development Cycle, Target Archi- whereas it may present possible scenarios of
tecture is a to-be architecture state anticipated out technological evolution, it is unlikely to rigidly
of a transformation. If the architectural change state Technology Architecture states during and
is so significant as to consider it imprudent to be as a result of future transformations.
undertaken in a single ADM cycle, intermedi-
75
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
76
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
should definitely not be looked at by the rest of The latter may also involve unified develop-
the organization as those brainbox technologists ment and separate operational deployment, where
who keep talking Latin. On the other hand, if we the IT/IS functions clearly see similarity and
are hoping to get a sizable collection of thinking emergence of patterns in what is expected of them,
minds, and more importantly, a team that can read- but are asked to manage their systems separately
ily structure, understand, appreciate and realize and often with changing business organization, by
its function, then there is a high likelihood that the business owners. In general, the public sector
the IT/IS function might take the lead. In fact, is likely to take lead in demonstrating these two
whereas I am not at liberty to divulge specifics aspects alongside a formalized and repeatable
the metrics leading to the conclusions being approach to Information Systems Patterns and
confidential I feel at liberty to point out that Frameworks (for which the public sector has both
there has been evidence in functions/enterprises the time and justification of budget constraints, be-
within UK government departments I have worked ing less keen to substitute money for time than the
with, to indicate that those functions/enterprises corporate sector). This may be considered the first
that have, high up in their ranks, people with the generation of Beacon Architecture Evolution.
Enterprise Architect qualities (who, given history The key role of Business Architect, with
of last three decades, predominantly come from the characteristics of an Enterprise Architect, is still
IT/IS function) the function/enterprise head in maturing. Many aspects of Beacon Architecture
one case, tend to be better performing enterprises that depend on this role will mature with this role.
with something of their Beacon Architecture (as Organizational Architecture and Governance
we have defined it here) already defined. aspects would be most volatile, while also be-
Taking this cue, whereas we may not be able ing resistant to structure and controlled-change.
to mandate appointment of individuals with Therefore the remaining aspects will be demon-
Enterprise Architect characteristics in visionary strably formalized first, the contingency plan
or function-leading roles nor revolutionize the developing as constituent of the Roadmap:
education system to identify and develop these
abilities in the very near future, we can definitely Business beacon
get those functions where such individuals tend to Business architecture strategy
exist in higher concentration to define themselves Business architecture roadmap
clearly and perform well, thus creating example Business architecture contingency plan
for other functions and the larger organization/
enterprise to follow. Here, the corporate sector, perhaps motivated
In this respect, although steps involved in by market pressures and competitor evaluation,
defining the Beacon Architecture have definite is likely to take the lead. This may be considered
temporal relevance/dependency, it is possible the second generation (or second phase of the first
that those steps that can be demonstrated within generation if you like, as these developments can
the IT/IS function may get demonstrated and happen independent of the first generation/phase)
institutionalized first. of Beacon Architecture evolution.
This means that in the near term we would Periodic synchronization of ideas across
see greater evidence of: the Corporate and Public sector may then help
establish all aspects from Business Beacon to
Architecture infrastructure capability en- Information Systems Patterns & Frameworks in
gineering practice definition proper order, and connect them. The dependent
Operational and developmental alternatives aspects will then fine tune with aspects that
analysis
77
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
they depend on, thus improving the Beacon and reorganizing administration to redistribute
Architecture. The synchronization between the patronage, continues. In fact, modern advent of
Corporate and Public sector is not the easiest to mass communication has put additional pressure
realize, given tendency of practitioners in respec- on top executives to be seen to be decisive and in
tive sectors and even domains therein (such as control, while really trying out hopeful permuta-
financial services domain) to stick together and tions. To take example of the very important and
do things their own way. Once again, consultants, conspicuously underperforming British Home
often branded IT-related consultants, who work Office, we observe that in its early days, in the first
independently and have sufficient recognition 10 years under the stable and effective premier-
(or at least curiosity to check others work) right ship of William Pitt the Younger (i.e. ~1783-1793),
across the business spectrum, will be key to the there were just four Home Secretaries, the first
synchronization process. resigning within a week of taking office and thus
The principal impediments to creation of really not to be counted as an enterprise leader,
effective and durable enterprises lack of vi- while the fourth continuing his service beyond
sionary ability, lack of consensus on means (and the 10 years. In the 10 years that the last British
sometimes also ends) and, often, also a lack of Prime Minister, Tony Blair, was in office, with
acceptable level of sincerity among enterprise comfortable majority behind him, once again,
leaders, will be the principal stumbling blocks in four Home Secretaries served. In this case though,
the process of defining optimized Organizational they all left office sincerely attempting to lead
Architecture. the organization and after being demonstrated
There is hope on this front though. Looking not to be in sound control, or fully following the
at those who set out public-sector objectives in definition and interfacing of the organization they
the UK over the last 100 years or so, we see pal- commanded; while each, in his turn, performed
pable improvement in the maturity level of the reorganizations within the department, without
enterprise leaders (the politicians), perhaps as a demonstrable success and often with visible fail-
result of increased maturity of those who appoint ures highlighted by the media. The last of these
them (the electorate). About 100 years ago, it was a Home Secretaries, John Reid, ended up leading
norm for people of the ruling classes, irrespective three separate key departments of the govern-
of their ability, to rule with strong prejudices set ment Heath, Defense and the Home Office, is
by the establishment they grew-up in. Later, as three years, with clearly no time to understand,
the labour movement took roots, the governments let alone contribute to rational definition of, the
alternated between regimes that were, by present organization that he was asked to lead.
day standards, extreme left or right winged. Like Apart from challenges to definition and gov-
a dampening pendulum however, the swings have ernance of enterprises, caused by politics (which
reduced in their span in successive elections, also exists, to a degree, in the corporate sector), a
where today it is realistic for all candidate leaders greater challenge is posed by governance by non-
to share objectives of progressive welfarism, thus professionals. This latter challenge too exists in
not necessarily setting about undoing everything the corporate sector, but manifests more vividly in
that previous government tried to do. the public sector, particularly where elevation to
The means to the end however are not yet leadership position is a direct outcome of admin-
agreed on and are definitely not effective, which- istrative seniority. Further, in such circumstances,
ever political faction is in power, while the practice senior administrators tend to address risk to their
of the higher executive dispensing privileges position caused by their lack of professional and
to their subordinates based on political loyalty, analytical expertise, by delegating responsibili-
78
Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
ties usually in a supplier chain mode to other ary improvement in social maturity fostering
administrators, where no individual administrator organizational maturity. In both cases, being able
takes blame for failure. to observe and communicate with the rest of the
The example of the UK NHS National Program fast-shrinking world will be important.
for IT (NPfIT) cited earlier, illustrates this point. The evolutionary path that I foresee being
Whereas the program has been variously scoped taken for development and institutionalization
and re-scoped throughout, its basic objective has of Beacon Architecture is depicted in Figure 6.
involved a functionally simple, yet architecturally Attaching a timeline to this will need further
substantial problem - that of creating a unified observation of future developments.
patient care record mechanism that would cope
with typical non-functional requirements (volume,
performance, security, availability, etc) of medical References
service of a medium-sized nation. The fact that this
problem, relatively simple to solve for a group of Booch, G., Rumbaugh, J., and Jacobson I. (1999).
professionals who design systems robust enough The Unified Modeling Language User Guide.
to address non-functional requirements (various New York, NY: Addison-Wesley Object Technol-
IT architecture specialties) and who can rationally ogy Series.
decide needs of the patient care record (clinicians
CCA. (1996). Clinger-Cohen Act of 1996: In-
and business analysts), has snowballed into one
formation Technology Management Reform,
of the worlds most expensive, yet uncertain and
Public Law 104-106, Fiscal Year 1996 Defense
non-functionally unproven transformational pro-
Authorization Act.
gram, can directly trace its roots to the number of
senior roles of administrators and multiple levels CIO Council. (1999). Federal Enterprise Ar-
of delegation involved in running the program, chitecture Framework, Version 1.1. Retrieved
where few relevant professionals can be seen February 20, 2008 from http://www.whitehouse.
playing key visionary or executive roles. gov/omb/egov/a-1-fea.html
Of course, it is tantamount to fortune-telling
Department of Defense. (2007). The Department
gazing into a crystal ball, to try to guess how and
of Defense Architecture Framework Version 1.0.
when will the Organizational Architecture aspect
The Department of Defense. Retrieved February
of Beacon Architecture become the norm; though
20, 2008 from http://www.defenselink.mil/cio-
when that happens, it will help fine-tune other
nii/docs/DoDAF_Volume_I.pdf DoDAF 1.5
aspects of Beacon Architecture and define the last
aspect that of prudent Enterprise Governance, Maier, M.W. Emery, D. and Hilliard, R. (2001).
and correlation to Architectural Governance and Software Architecture: Introducing IEEE Stan-
Transformation, thus taking Beacon Architecture dard 1471, IEEE Computer. April 2001, Vol.
into its fourth generation. 34-4, 107-109.
The fastest scenario is one of a strong and
The Open Group. (2006). The Open Group Ar-
popular leader of a significant enterprise happen-
chitecture Framework Enterprise Edition Ver-
ing to possess the Enterprise Architect qualities, or
sion 8.1.1. The Open Group Architecture Forum.
at least recognize them and provide environment
Retrieved February 20, 2008 from http://www.
conducive to their application, thus providing
theopengroup.org/
demonstrable examples for others to follow. The
slowest scenario would be of ongoing evolution-
79
80
Amit Bhagwat: Role of Beacon Architecture in Mitigating Enterprise Architecture Challenges of the Public Sector
First Generation: Public Sector G : Architecture Infrastructure Capability G : Operational and Developmental G : Information Systems Patterns
Driven: Cost-focussed Engineering Practice Definition Alternatives Analysis and Frameworks
Third Generation: Sector G : Business G : Business Architecture G : Business Architecture G : Business Architecture
Cross-bread and aspect Beacon Strategy Roadmap Contingency Plan
refinement, Information
Systems Patterns and G : Architecture Infrastructure Capability G : Operational and Developmental G : Information Systems Patterns
Frameworks realignment Engineering Practice Definition Alternatives Analysis and Frameworks
81
82
Chapter IV
Maturity Model Based on
Quality Concept of Enterprise
Information Architecture (EIA)
Hong Sik Kim
Korea Polytechnique University, Korea
Sungwook Moon
ComponentBasis, Co., Ltd., Korea
Abstract
Quite a good amount of time has been spent seeking appropriate solutions to handle the giant informa-
tion technology expenditure not only in government sectors but also in private sectors all over the world.
Beginning with OMB, which substantially leads the U.S. governmental efforts in ITA/EA area, seems to
be on the right path using process improvement concept in its ITA/EA maturity model (OMB, 2007_2). EA
community still finds it difficult to introduce quality management concept into its business and practices.
Therefore in this chapter, we would like to suggest a more practical ITA/EA maturity model based on the
quality concept of enterprise information architecture (EIA), which is ROIdriven, practical and based
on four-phased process improvement approach for the EA community. We hope that this approach could
bring a substantial reduction in the costs and efforts in the entire ITA/EA area and provide sustainable
development environment for the ITA/EA like the argument of the environmentalists.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
Analog
Convergence Digital Era
Era
Knowledge
Post Paradigm Shift
Information
Industrial Change Management Society
Society
83
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
In this chapter we suggest a practical ap- provide its clear definition and practical directions
proach based on quality concept for the maturity to obtain appropriate ROI in the reality. We un-
model of the ITA/EA with some exploration to derstand the meaning of enterprise, but when the
the unforeseen complexity of the future society. concept of architecture is added to it, we would
That is the EIAMM (Enterprise Information need more explanation to figure out the combined
Architecture Maturity Model). Furthermore, we meaning. Without proper interpretation, it would
strongly recommend that organizations should be difficult to understand that the architecture is
borrow experiences and knowledge of the infor- mostly related to information technology related
mation systems development, software engineer- things. Here we review some of EA definitions.
ing, enterprise-wide total quality management Furthermore the only guide of the huge ITA/EA
(TQM), and incremental process improvement program, the maturity model of ITA/EA, seems
techniques to get really practical results through to be in the early stages of development without
the implementation of the EIA. Especially, it is its clear definition. If we dont have a proper
obvious that organizations will need to adopt definition, we will not be able to produce the ap-
highly sophisticated quality control (QC) circle propriate quality and maturity model of ITA/EA.
or Kaizen (Japanese for improvement) concept Therefore we will suggest a desirable definition
to continuously improve the entire enterprise in- of ITA/EA, review its status within an enterprise,
formation systems like manufacturing industries. and provide a practical solution for the maturity
Here we also suggest the conceptual outlines of model of ITA/EA, actually EIA in this chapter.
EIA Maturity Model that is based on the practi-
cal cases of Boeings process improvement using Definitions of Enterprise
capability maturity model integration (CMMI) of Architecture
Software Engineering Institute (SEI).
At the following background section, we are Wikipedia (2007) defines enterprise architecture
going to review some enterprise architecture defi- is the description of the current and/or future struc-
nitions and compare the scopes of EA and EIA for ture and behavior of an organizations processes,
our proposed EIA maturity model. In addition, we information systems, personnel and organiza-
address some worldwide TQM models for better tional sub-units, aligned with the organizations
positioning of the ITA/EA within an enterprise. core goals and strategic direction. Although often
For the main thrust of this chapter, we will present associated strictly with information technology, it
a newly proposed EIA Maturity Model. After a relates more broadly to the practice of the business
brief description about future research, we will optimization in that it addresses business archi-
conclude this chapter. tecture, performance management, organizational
structure and as well.
Clinger-Cohen act (DoD, 2006) defines IT Ar-
BACKGROUND chitecture as The term `information technology
architecture, with respect to an executive agency,
The term of enterprise architecture (EA) is broadly means an integrated framework for evolving or
used in the IT architecture areas worldwide. But it maintaining existing information technology and
would be very hard for people to imagine that it is acquiring new information technology to achieve
related with information technology architecture the agencys strategic goals and information re-
(ITA). EA also seems to have very ambiguous sources management goals.
meaning for both IT and non IT people to un- In TOGAF, the Open Group (2003) defines
derstand, because the EA community could not that there are four types of architecture that are
84
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
commonly accepted as subsets of overall enter- Ross et al. (2006) describes it that The enter-
prise architecture: prise architecture is the organization logic for busi-
ness processes and IT infrastructure, reflecting
Business architecture: This defines the the integration and standardization requirements
business strategy, governance, organization, of the companys operating model (where the op-
and key business processes. erating model is defined as the necessary level of
Data/information architecture: This de- business process integration and standardization
scribes the structure of an organizations for delivering goods and services to customers).
logical and physical data assets and data The enterprise architecture provides a long-term
management resources. view of a companys processes, systems, and
Application (systems) architecture: This technologies so that individual projects can build
kind of architecture provides a blueprint capabilities not just fulfill immediate needs.
for the individual application systems to Finally, IFEADs Schekkerman (2005) states
be deployed, their interactions, and their that Enterprise architecture is about under-
relationships to the core business processes standing all of the different elements that go to
of the organization. make up the enterprise and how those elements
Information technology (IT) architecture: interrelate. An enterprise in this context is any
The software infrastructure intended to collection of organizations that has a common set
support the deployment of core, mission- of goals/principles and/or single bottom line. In
critical applications. This type of software that sense, an enterprise can be a whole corpora-
is sometimes referred to as middleware, tion, a division of a corporation, a government
and the architecture as a technical archi- organization, a single department, or a network
tecture. of geographically distant organizations linked
together by common objectives. Elements in this
OMB (2007_1) addresses the EA from the context are all the elements that enclose the areas
federal point of view. The Federal Enterprise of people, processes, business and technology. In
Architecture (FEA) consists of a set of inter- that sense, examples of elements are: strategies,
related reference models designed to facilitate business drivers, principles, stakeholders, units,
cross-agency analysis and the identification of locations, budget, domains, functions, processes,
duplicative investments, gaps and opportunities services, information, communications, applica-
for collaboration within and across agencies. tions, systems, infrastructure, etc.
Collectively, the reference models comprise a Though there are various definitions of
framework for describing important elements enterprise architecture as above, we still have
of the FEA in a common and consistent way. difficulties in understanding what the enterprise
Through the use of this common framework and architecture really is. In spite of the definitions as
vocabulary, IT portfolios can be better managed above, the EA community tends to think that EA
and leveraged across the federal government. is about the IT areas in the enterprise. But we will
Microsofts Platt (2007) states that Enterprise need to make clear that enterprise architecture is
architecture is a conceptual blueprint that defines actually a framework of an enterprise for the vari-
the structure and operation of an organization. The ous purposes. One of the EA communities, alEA
intent of enterprise architecture is to determine (Association of Enterprise Architects) has recently
how an organization can most effectively achieve announced that it is not recommendable for the EA
its current and future objectives. community to use EA term solely except using EA
85
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
with other modifiers because of its ambiguity. If for the IT area. From the view point of architec-
we do not have even consensus in the definition of tural quality, total quality management (TQM)
the EA and standard EA maturity model, then we models are suitable for the enterprise architecture.
may have to unnecessarily give great pains to the We will look over several TQM models here;
EA communities. When organizations practicing MBNQA (Malcolm Baldrige National Quality
EA cannot find a positive way to produce reason- Award of U.S.A), EFQM (European Foundation
able ROI, eventually the entire EA industry may for Quality Management) Excellence Award and
lose its momentum like previous giant programs JQA (Japan Quality Award). Table 1 shows the
that were doomed to fail. comparison of the major segments of the TQM
frameworks.
Enterprise Architecture and Total IT-related area in MBNQA (Table 1): Among
Quality Management Models the components of MBNQA model, IT area is
directly shown in the section 4.2 Management of
Enterprise architecture encompasses the whole Information, Information Technology, and Knowl-
architectural aspects of an enterprise. It is not just edge. But it is still a relatively small portion of the
entire organizations components. The contents of
each category in the MBNQA framework seem
Table 1. Comparison of major segments for the to be a lot different from IT perspective based
TQM frameworks on the EA concept we have used, that consists of
business architecture, data architecture, service
architecture, technical architecture, and security
MBNQA (U.S.A) EFQM/EQA (Europe) JQA (Japan)
architecture.
P: Preface: Organizational 1. Leadership 1.0 Management Vision
Profile and Leadership IT-related area in EFQM/EQA (Table 1): From
P1:Description/
P2:Challenges the components, we can also find IT related areas
1. Leadership 2. Policy and Strategy 2.0 Understanding of as in the sections 4d. Technology is managed and
1.1 Senior Leadership Customers and Market
1.2 Governance and and Action Taken 4e. Information and Knowledge are managed.
Social Responsibilities
2. Strategic Planning 3. People 3.0 Strategic Planning and
IT related area in JQA (Table 1): One of the
2.1 Strategy Development
2.2 Strategy Deployment
Development eight high-level categories, 6.0 Information
4. Measurement, Analysis, 4. Partnerships and 4.0 Human Resource Sharing and Utilization, is directly allocated to
and Knowledge Resources Development and
Management 4d. Technology is Learning Environment the IT-related area. JQA model gives a relatively
4.2 Management of managed.
Information, 4e. Information and larger portion to the IT area than MBNQA and
Information Knowledge are
Technology, and managed
EFQM. JQA also directly uses the word enterprise
Knowledge
in the section 7.0 Results of Enterprise Activi-
5. Workforce Focus 5. Processes 5.0 Process Management
5.1 Workforce engagement ties. In this context, the meaning of enterprise
5.2 Workforce environment
6. Process Management
seems to imply the entirety of a company or an
6. Customer Results 6.0 Information Sharing
6.1 Work Systems Design and Utilization organization.
6.2 Work Processes
Management and Among three TQM models, MBNQA was the
Improvement
7. Results 7. People Results 7.0 Results of Enterprise
first model pursuing the excellence initiated by
7.1 Products and Service
Outcomes
Activities
the NIST (National Institute of Standards and
8. Society Results 8.0 Customer Satisfaction
7.2 Customer-Focused
Outcomes
Technology, U.S.A). As MBNQA showed great
7.3 Financial and Market
Outcomes
9. Key Performance success for the economy of the U.S.A, EQA and
Results
7.4 Workforce-Focused JQA followed the way of MBNQA to learn the new
Outcomes
7.5 Process Effectiveness competitive scheme known as the management
Outcomes
7.6 Leadership Outcomes text book. All three models are very similar to
86
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
each other. We can see the relationship between Considering the above, if we still want to
the enterprise and the IT area through the detailed use the term EA, we, in the first place, need to
description of section 4.2 Management of Infor- define the scope of enterprise by utilizing the
mation, Information Technology, and Knowledge above well-known TQM national models and
in the MBNQA TQM model. then define the scope of the IT area and necessary
In the section 4.2, applicants are supposed components in order to correctly describe the
to answer the question how do you manage term EA. Otherwise, It would be recommendable
your information, information technology, and to find other appropriate terms rather than using
organizational knowledge? The companies ap- EA, like enterprise information architecture or
plying MBNQA also should describe how they enterprise information technology architecture,
ensures the quality and availability of needed etc, which will clearly convey to stakeholders a
data, information, software, and hardware for right scope of IT area framework that we are go-
their workforce, suppliers, partners, collabora- ing to handle out of enterprise framework. This
tors, and customers direction will lead us to the correct domain of the
The detail of this category directly says about work we are going to handle. In line therewith,
the information areas in the enterprise and we we here divide enterprise architecture into three
may write about the more specific information main areas which are IT related area, non - IT area
for ITA/EA as an answer to these questions. and interface area between those two areas. With
With this approach, we can avoid any confusion this basic concept of the EA, we discuss further
in positioning the ITA/EA within the enterprise developments towards the direction, maturity
concept. path - EIA maturity model from which we will
be able to get the practical benefits.
Architecture
(Essential Framework)
Segment
Function
Functional
Segment Architecture
Architecture
Segment
Function
87
Function
Figure 2. Proposed scope of the enterprise architecture.
Maturity
Figure 3 shows the proposed detail description of Model Based
the enterprise on Quality
architecture Concept
defined in this of Enterprise Information Architecture (EIA)
chapter. Each segment of the segment architecture is adopted from the first level categories
of the MBNQA. In OMB case, completion, use, and results are categorized as segment archi-
tecture. These segment architectures are supposed to be determined in accordance with the
need of the enterprise. And the other facets show the general functions of the enterprise like
the line of business and the hierarchy of the enterprise. The terminology Architecture used
Figurethe
in the figure represents 3. Proposed detail
current fashion, description
a kind of enterprise
of buzz word. Figure 2 shows the proposed scope of the
With this kind of proposal
for the enterprise architecture,
architecture we can clearly show a framework of the enterprise architecture
desirable enterprise architecture which has three
and its components from the three important perspectives.
aspects (segment architectures, functional archi-
Architecture
Segment Function
tectures, and segment functions). The concept of
(Essential Framework)
Line of Business C
this enterprise architecture shows the essential
Line of Business B framework of an enterprise and provides a mile-
Line of Business A
stone to the specific decision of the enterprise at
Customer and Market Focus SA
Information Management SA
Process Management SA
a glance.
Strategic Planning SA
Workforce Focus SA
Functional
Architecture
Leadership SA
Architecture
Segment
tion of the enterprise architecture defined in this
chapter. Each segment of the segment architecture
is adopted from the first level categories of the
* Segment Architectures
from MBNQA MBNQA. In OMB case, completion, use, and
Function Architecture
results are categorized
(Essential Framework) SegmentasFunction
segment architecture.
Figure 3. Proposed detail description of enterprise architecture.
These segment architecturesLine of Business C are supposed to be
Line of Business B
determined inLineaccordance of Business A
with the need of the
enterprise. And the other facets show the general
EIA(Information SA)
8 functions of the enterprise like the line Functional of business ELA(Leadership SA)
ERA(Result SA)
ENTERPRISE ARCHITECTURE Architecture
and the hierarchy of the enterprise. The terminol-
Segment
Architecture
ogy Architecture used in the figure represents Segment
With the above relationship for the enterprise
the current fashion, a kind of buzz word. With
and its information management, we can further
this kind of proposal for the enterprise architec-
* Segment Architectures
develop the scope of the ITA/EA/EIA step by from MBNQA
ture, we can clearly show a framework of the
step through the four consecutive figures (from Function
enterprise architecture and its components from
Figure 4. Proposed scope of enterprise information architecture.
Figure 2 to Figure 5) as follows. This approach
Figure 4 showsthe three important
the proposed scope of theperspectives.
enterprise information architecture. We replace the
could help the ITA/EA community to overcome information management segment architecture
Figure 4 shows the with the EIA within
proposed scope the of
enterprise
the architecture.
the complexities of the information resources Here we can conclude that the enterprise architecture currently applied in the EA community
is equivalent toenterprise
the area of theinformation architecture.
EIA in this chapter. We replace
With this approach using TQM model, we
management. are going to show that there can be other segment architectures besides the EIA like enter-
prise results architecture, enterprise process management architecture, etc.
But existing enterprise architects may not be interested in other enterprise segment architec-
tures because they are not their domain areas for the job. Then it would be very important
that enterprise architects understand the status and position of ITA/EA or EIA within the en-
Figure 4. Proposed scope of enterprise informa- Figure
terprise. With this 5. Proposed
clear scope of the EIA, scope ofarchitects
enterprise segment andarchitec-
relevant stakeholders can
tion architecture better respond tures of EIA of the ITA/EA or EIA. Unclear scope of the ITA/EA or
to the requirements
EIA will only prevent the enterprise from utilizing the beneficial side of the ITA/EA or EIA.
Architecture Architecture
(Essential Framework) Segment Function (Essential Framework) Segment Function
EIA
EWA(Workforce Focus SA)
ESA(Strategic Planning SA
ECA(Customer Focus SA)
Functional PA
ELA(Leadership SA)
Functional
ELA(Leadership SA)
ERA(Result SA)
ERA(Result SA)
Architecture Architecture
BA
Segment Segment
Architecture Architecture DA
Segment Segment
AA
TA
Figure 4. Proposed scope of enterprise information architecture. Figure 5. Proposed scope of segment architectures of EIA.
Figure 4 shows the proposed scope of the enterprise information architecture. We replace the
information management segment architecture with the EIA within the enterprise architecture.
Here we can conclude that the enterprise architecture currently applied in the EA community 9
is equivalent to88
the area of the EIA in this chapter. With this approach using TQM model, we
are going to show that there can be other segment architectures besides the EIA like enter-
prise results architecture, enterprise process management architecture, etc.
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
the information management segment architecture to find a definition to cover an overall and basic
with the EIA within the enterprise architecture. framework of an enterprise so that we may see its
Here we can conclude that the enterprise archi- status at a glance including IT area. This should
tecture currently applied in the EA community is have broader concept than EA community has
equivalent to the area of the EIA in this chapter. thought it would have. For such purpose, we
With this approach using TQM model, we are would like to take the information area out of
going to show that there can be other segment the enterprise architecture, which is enterprise
architectures besides the EIA like enterprise information architecture, and this will lead us
results architecture, enterprise process manage- to clearly see the differences between the EIA
ment architecture, etc. (Enterprise Information Architecture-IT related
But existing enterprise architects may not be in- area) and the EA (Enterprise Architecture-total).
terested in other enterprise segment architectures In this sense, enterprise architecture should prob-
because they are not their domain areas for the job. ably provide overall management and evaluation
Then it would be very important that enterprise function to the enterprise like a TQM model and
architects understand the status and position of EIA does the similar function to the information
ITA/EA or EIA within the enterprise. With this technology area of the enterprise.
clear scope of the EIA, enterprise architects and
relevant stakeholders can better respond to the Definition of Enterprise Information
requirements of the ITA/EA or EIA. Unclear Architecture
scope of the ITA/EA or EIA will only prevent
the enterprise from utilizing the beneficial side Here, we would like to suggest a better term and
of the ITA/EA or EIA. definition of EA in this chapter, namely EIA
Figure 5 shows the proposed scope of the seg- rather than the ambiguous EA. Our definition of
ment architectures of the EIA. These general terms EA is An essential architectural framework for
in the existing EA are performance architecture an enterprise to make a better decision about the
(PA), business architecture (BA), data architecture future activities of its own. The definition of
(DA), application architecture (AA), technology EIA is the essential framework for an enterprise
architecture (TA), and security architecture (SEA) to effectively invest for and manage information
within the EIA. From this point of view, it is very technology resources to satisfy its goals and
clear to distinguish the scope of the EA and the objectives.
EIA with their segments architectures. Therefore, Previously, we defined the enterprise as what
for this reason, we propose that EIA be used as a has comprehensive domain areas not just for the
better terminology to handle the complexities of information technology areas. Therefore with
information management in the enterprise instead enterprise architecture, we will have to deal with
of the enterprise architecture. With this in mind, entire enterprise domain areas like factories, ma-
we are going to explore the main topic of this terials, machineries, and all kinds of technologies
chapter, the maturity model of EIA. directly. We usually, however, deal with things
only relevant to the information systems and
Enterprise Information Architecture: technologies within the so-called EA in reality.
Concept and Maturity Model So it will be a little bit more practical to use EIA
rather than EA in order to avoid any confusion
For a better and more practical definition of derived from the terminology EA.
enterprise architecture, it would be necessary
89
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
90
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
Table 2. Levels of proposed EIA maturity model that overlap and do not consistently measure the
goodness, the impact and the completeness of
Level Description Remark
enterprise architectures can be confusing and very
Level 5: EIA process improvement activities Creative and
Continuous should be continuously executed continuous
frustrating to the staffs of agencies and depart-
Improvement yearly through the formal improvement of ments that are trying to use them to improve EA
organization of the entire enterprise EIA over the whole maturity. (EA Shared Interest Group, 2005)
and include the incentive rewarding enterprise
system for the EIA program Here we introduce a practical EIA maturity
Level 4: Enterprise initiates standardization Effective and
model (EIAMM) as an experimental case from
Standardizing of EIA and official EIA process efficient the initial level to the continuous improvement
Enterprise-wide improvement activities should be standardization of
level. The key point of EIA maturity model is
applied to the entire enterprise EIA
trying to focus on the practical benefits based on
Level 3: Enterprise deploys formal EIA Introducing EIA
Deploying EIA improvement program based on the solutions to the the findings of actual solutions in real enterprise
Solutions EIA solutions elicited for the whole major parts of the environment through incremental process im-
enterprise incrementally enterprise
provement supported by highly sophisticated IT
Level 2: Enterprise needs EIA and finds out Finding practical
project management and process management.
Finding EIA practical solutions through EIA pilot IT
Solutions project using process improvement management
methods solution EIA Maturity Model Level 1
Level 1: No necessary of EIA and lack of IT No control of IT
Initial investment management investment
This level includes every enterprise without any
solution for the EIA.
Establish
Training &
Education
Perform EIA
Process
Assessment
Improvement Phases
Develop EIA Refine Institutionalize
Develop EIA EIA Solution EIA EIA
Action Plan Solution Pilot Project Solution Solution
91
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
tion technology areas, and EIA maturity model why we focus on the satisfaction of stakeholders is
from the perspectives of maturity concept. One that it will secure their commitment and lead them
of the differences could be the ROI-oriented ap- to managing the complex IT investment including
proach to the EIA implementation. EIA maturity the reduction of total costs of the IT investments,
model level 2 pursues early stage benefits from enhancing the efficiency, effectiveness, and reus-
the initiatives of the EIA like finding problem ability of the IT assets, and the interoperability
solutions in the field. This level also tries to di- between the IT systems, and finally achieving the
vide the process of finding EIA solutions into 4 business goals of the enterprise using IT.
process improvement phases and seriously follow Figure 6 shows the four phased process im-
the process improvement (PI) guideline to get the provement models during the level 2 of EIAMM
EIA solutions. which is the core part of the entire EIAMM. With
At this level, without finding an appropriate this mechanism of process improvement, EIAMM
solution, it is very dangerous to go on further to can access to the practical ITA/EA/EIA and
level 3 because its direction of EIA introduction provide substantial benefits to the stakeholders
may not be verified and approved by the stake- in the real world.
holders at this stage. Finding proper practical
EIA solutions supported by stakeholders will be Phase 1: Develop EIA Solution
a premise to go up to the next level 3. If any EIA
solutions are not practical enough to implement, Within the major problem area, an organization
the enterprise will have to hold going on further assigns its personnel to develop a solution for
and spend more time and efforts until finding EIA 3 months and manage this process as a formal
solutions to be good enough for the real world. project. If the solution is satisfactory to the
Maturity in EIAMM means that an enterprise organization, then go to the next process Pilot
should follow a right direction which can lead to project to see whether the solution is good enough
building a good foundation of the EIA and which in reality or not.
will solve the problem of the enterprise through
the introduction of the EIA. In another perspec- Phase 2: Pilot Project for EIA Solution
tive, the maturity in EIA maturity model includes
a natural way for the enterprise to follow step by Assigned personnel to the pilot project run this
step with enough ROI. One more difference from process as a project for 3 months. And if the final
CMMI maturity concept will be the satisfaction of evaluation of this process is good enough for the
stakeholders with the EIA program. Performing organization, then it goes to the next process
the EIA program in a reasonable way, the visible Refine the solution. If not, it goes back to the
output of EIA will be provided to the stakeholders Phase 1 and Find solution process again.
so that they can be satisfied with the program.
Currently the problem of the so called EA is Phase 3: Refine Proven EIA Solution
that it doesnt secure enough commitments from
the people inside and outside the enterprise and A small team works together to refine the results
that it doesnt clearly explain EA program to its of the previous pilot solution for 3 months. If the
stakeholders. There even seems to be no clear outcome is practical enough in real environment,
definition of the EA, which has raised much then it goes to the next Institutionalize Solution
confusion in performing the EA activities. In this process. If not, the team needs one more refining
ambiguous situation of EA programs, the reason project to get the actual solution.
92
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
Enterprise Enterprise
Business Goals EIA Management
Assessment
Assessment Process EIA
Recommendations Stakeholders
This process is to deploy the proven solution Training and education should be supported
to the organization for 3 months. A team also by the organization and measurement scheme
prepares the deployment plan and incrementally should be established and applied to the entire
executes the plan to the organization. This phase 4 phases of process improvement. Verification
prepares the initial foundation of the standardizing process is needed to check the status of process
of the solution enterprise wide for the EIAMM improvement.
Level 4. Figure 7 shows the development of the EIA
action plan. The EIA action plan is a set of plans;
EIA Training
Improvement
Implementation
Tasks EIA Quality
Review
EIA
Measurements Measurements /
Information
Repository
93
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
Assessment of
EIA Execution /
Enterprise EIA Project
Working EIA
Repository/
Process Asset Finding Gaps /
Library Improvement Recommendation
EIA strategic plan, EIA tactical plan for each pro- EIA Maturity Model Level 3
cesses, EIA operational plan for each action task,
and EIA measurement plan to measure progress. With the ROI-oriented maturity concepts and EIA
Consistent alignment of EIA enterprise goals and solutions obtained from the EIA maturity model
objectives (strategic plan) to implement tactical level 2 activities, the next step is the deploying
& operational plans is the key. of the EIA solutions to the entire enterprise. Our
maturity concept could be said to adopt a bot-
EIA MM
EIA Governance, Enterprise Goals and Objectives
EIA Process Asset
Standardized Solution Asset, Current EIA Process
EIA Asset Standardization Capabilities
Process Asset Repository
Preparing EIA
EIA Standardization
Standardization Plan
94
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
tom up approach. However, we also try to apply order to effectively and efficiently deploy the EIA
the top down approach together at the level 3 solutions to the enterprise.
(Figure 9). For example, enterprise headquarter At this level, the enterprise may need standard-
may continue to support good investment into izing mechanism (Figure 8), process improvement
the EIA with belief including enterprise-wide techniques, and tailoring guidelines with various
education, training and the planning of better IT resources like Web EIA repository, EIA tools
strategies with various supporting resources in and techniques. These must be supported from
Verify Recommending
Establish Continuous Operating the Continuous
Improvement Enterprise wide
Improvement EIA Improvement EIA
Against Improvements
Plan Management System
Metrics Baseline Areas
Repository
5 Establish Continuous
Improvement EIA
Operating the Continuous
Improvement EIA
Verify
Improvement Against
Recommending
Enterprise wide
Plan Management System Metrics Baseline Improvements Areas
EIA MM Asset
Preparing EIA
EIA Standardization Plan
EIA
4 Verifying the Effectiveness / Efficiency
Standardization of EIA Solution Standardization
System
Finding Gaps / Tailoring the Standards for Different EIA Solution
EIA Process
Preparing EIA Solution
Assets Deployment Plan
Standards &
Working Perform EIA Process Establish Training & Education
Assessment Improvement Phases
Repository
2 Develop EIA Action Plan Develop
EIA Solution
EIA Solution
Pilot Project
Refine EIA
Solution
Institutionalize
EIA Solution
EIA Working
Solutions Establish Verify improvement
Metrics Baseline against Metric Baseline
95
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
the top management. In this sense, these kinds of EIA Maturity Model Level 4
top down approach must be applied with bottom
up at the same time. At this level, the enterprise may achieve remark-
We may also need certain kinds of change able improvement of the EIA practice and figure
management as new technologies and concepts out transparent relationship between the practi-
always require some sort of innovation and cal EIA standardization and the business goal.
improvement in the organization. We need ever Therefore enterprise-wide EIA standardizing
evolving strategic planning, execution, evalua- systems are a very important identifier of this
tion, and feedback in order to get better results. level. Among those standardizing EIA systems,
We need to assess all the EIA activities during there are many practical EIA solutions in the
level 3, to find gaps and improve the areas until fields; tailoring the standards for different EIA
the business goal is met. solution needed (tailoring guideline), institu-
tionalizing PDCA (Plan-Do-Check-Act) cycle
Table 3. Major processes of proposed EIA ma- to improve the enterprise-wide EIA program,
turity model and establishing practical EIA measurements
processes (Figure 10).
Level Description Remark
Level 5: Establishing formal system of Continuous
Continuously EIA process improvement team improvements of
EIA Maturity Model Level 5
Improving EIA in local organization the EIA solutions
Measuring continuous improve to be made
ments effectiveness and
At this level 5, every organization in the enter-
efficiency prise may establish a formal EIA process im-
Providing incentive rewards to
the every organization in the provement team or one with other names of the
enterprise enterprise architecture in order to continuously
Level 4: Standardizing the practical EIA Establishing
Enterprise-wide solutions in the field practical EIA improve the EIA system through the measure-
standardization Tailoring the standards for standardization ments of the effectiveness and efficiency of the
different EIA solution needed System
(tailoring guideline) EIA program. Another key feature of this level
Institutionalizing P-D-C-A cycle 5 is to invest appropriate overhead and resources
to improve the standardization
enterprise-wide. for the continuous improvement activities of the
Establishing Practical EIA EIA program all the time like the QC circle, six-
measurements
Processes sigma and enterprise-wide TQM activities in the
Level 3: Preparing enterprise deployment Assessment of the manufacturing industries (Figure 11).
Deploying EIA planning EIA executions/Fi
Solutions Constructing formal EIA nding gaps/ The most important concepts behind of the
infrastructure Improving major EIAMM are natural, cycling, continuing, sustain-
Implementing the EIA processes of EIA
deployment plan life cycle able, and self survival idea in any enterprises.
Managing the EIA life cycle There is a brief overview of these concepts that
Assessment system
implemented to evaluate the all the 5 levels connect each other through the
EIA status or project EIA repository and standardization mechanism
Level 2: Verify the benefit of the solution Finding practical
Finding EIA Find EIA solution to solve EIA solution for (Figure 12). And these concepts also apply to an
Solutions business problems 1 year and with overview diagram for the role of the EIAMM
Execute EIA pilot project 4-phased process
Tuning the results of pilot improvement within an enterprise as the alternative solution
project mechanism for the business and IT alignment
Preparing the practical EIA
solutions problems (Figure 13 and 14).
Level 1: No necessary of EIA and lack of No control of IT
Initial IT investment management investment
96
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
Major Processes of the EIA Maturity guideline being different from other approaches,
Models EIA community may try a practical EIA approach
and verify whether it is good or not.
The Basic Characteristics of EIA Finally, EIA maturity model could provide a
Maturity Model basis to find out the ROI-oriented maturity criteria
to verify and validate the EIA program and proj-
This is one of the experimental drafts of the EIA ects in the real world. Further description of the
maturity model to find out a real practical approach quality of EIA will be mostly dependent on the
among various trials in the ITA and EA world. various concepts of this EIA maturity model.
At the same time, on account of the various
reasons, there is no practical standard definition The Comparison between EIAMM
existing in this community and furthermore it and CMMI
is too difficult to define the quality of the EIA
(or EA) in this situation. Even with huge invest- The basic differences between enterprise infor-
ments in the EIA, we may still have difficulties in mation architecture maturity model (EIAMM)
figuring out the ROI of the EIA projects without and CMMI show different perspectives for the
appropriate quality criteria. Therefore, based on maturity development. From the view of the
this EIA maturity model which is a more practical CMMI, it provides step by step approaches to
institutionalize from the low level key processes
97
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
to the higher level key processes. Although we At level 3, the enterprise will experience
need to verify the effectiveness and efficiency of more or less benefits through the distribution of
the activities which CMMI introduces to an enter- the EIA solutions and draw the proved solutions
prise, it seems to be difficult to prove the return with the best practices based on the realities of
on CMMI investment because there is not such enterprises. We focus on the standardization of
a function in this model. We may need to invest the enterprise-wide EIA solutions at level 4 and
in creating new verifiable processes for this. And construction of continuous improvement systems
this may be another burden to the modern CEOs for the EIA at level 5.
trying the CMMI. The scheme of the EIAMM is to try to provide
For the EIAMM, we put the self-verification real and practical solutions to the Enterprise-wide
processes into level 2 as Finding EIA Solution. stakeholders even at level 2 and to guide the en-
Here the solution means actionable and concrete terprise to the right way from the very beginning
solutions for specific problems in the real world of the EIA, which is so difficult and complex in
that could provide tangible and intangible benefits nature. Therefore, the core level of the EIAMM
to the customers of the EIA. It is also designed would be the level 2. This means that it could be
to aim at the practical support of the business a kind of waste to spend the limited resources
including complex IT environment. Once we find and efforts in the wrong direction without clear
out an appropriate solution through the 4-phased solution.
process improvement method, then we distribute
the EIA solution to the rest of the organization for EIA Maturity Model for Enterprise
the improvement of quality and the enhancement Business and Enterprise IT
of productivity during the level 3 Deploying EIA Alignment
Solutions. This could enable the enterprises to
avoid unnecessary trial-and-errors, and achieve Basically the modern management of an enterprise
the least beneficial results with positive expecta- always has the most difficult alignment problems
tion for the new changes. (Table 4) between its business and IT area. ITA/EA is sup-
EIA Governance
/slaoG dna ,sevitcejbO ,sdeeN ygolonhceT noitamrofnI esirpretnE
noitarepO niamoD ygolonhceT noitamrofnI esirpretnE
/ slaoGdna ,evitcejbO ,sdeeN ssenisuB esirpretnE
Level 2
EIA Solution
Development
Level 5 Level 3
EIAMM Life
Continuously Enterprise wide
Cycle
Improving Deployment of
Management
EIA EIA Solution
Level 4
Standardization of Proven
EIA Solutions
98
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
Figure 14. EIAMM for enterprise business and enterprise IT alignmentwithin enterprise architecture
Enterprise Architecture (EA) Governance
EIA Governance
Level 2
EIA Solution
Development
Level 5 Level 3
EIAMM Life
Continuously Enterprise wide
Cycle
Improving Deployment of
Management
EIA EIA Solution
Level 4
Standardization of Proven
EIA Solutions
posed to provide the alignment function to the areas) according to the continuous improvement
enterprise including online EA Web repository. In strategy, EIAMM by the Figure 14.
this chapter, we suggest a theoretical proposition
that the alignment between business and IT could Quality of EIA
be achieved if we appropriately use the EIAMM as
an intermediary interface tool. EIAMM actually Quality areas are basically well established in
should reflect the enterprise business needs and its various industries and coverage perspectives
related IT needs as well. Therefore if EIAMM is including quality control (QC), quality assurance
positioned in the middle of the two and provides (QA), quality management (QM), quality man-
its smooth communication to the enterprise like agement systems (QMS) (BSI DISC, 1998) and
Figure 13, we expect that aging alignment prob- total quality management (TQM). The definition
lems could be solved and that enterprise architect of the quality varies from industry to industry,
serves its role better to the enterprise. from scholar to scholar, and from perspective to
In this point of view, Figure 14 clearly shows perspective. The quality in new budding indus-
the differences between EA and EIA with the tries like software engineering often follows the
EIAMM for enterprise business and enterprise proven way of quality management from matured
IT alignment within EA. The biggest difference industries like manufacturing. The best practices
is that EA will govern the entire enterprise and in the EIA could be considered as one of the
EIA will coordinate the alignment problem be- quality concept.
tween business and IT (not other technology or
99
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
However, the concept ranging from EIA pro- In addition to the QRM concept, we may in-
grams to projects and products may extremely troduce a quality checking function to the major
vary depending on the definition of the quality mile stones of EIA program. The milestones are
and the definition of the EIA. Therefore the as- at the end of the major components and basically
sumption of the EIA quality largely depends on the common components of the EIA can be an
the EIA maturity model described above to deal appropriate EIA framework, as-is view of EIA,
with the quality area. And it seems that other to-be view of EIA, transformation from as-is view
important focus on the definition of the EIA to to-be view, management of the EIA information
quality should reflect the concept of the qual- which are standard management procedures for the
ity reference model (QRM) including CMMI, EIA information including the storing, changing
SPICE, ISO 9001, TickIT, and MBNQA (Malcolm and representing of the EIA information.
Baldrige National Quality Awards). Also JQA The initial steps toward the quality of the
(Japanese Quality Awards) and Deming Awards EIA are to establish the verification procedures
in Japan, EQA (European Quality Awards) of of the five reference models of the EIA and the
EFQM (European Organization for Quality)and consistency checking procedures between them.
EC (European Commission) in Europe and QMA And finally we can validate that the final results
(Quality Management Awards) in Korea are well of the EIA activities meet the goals of the objec-
known in the world. tives for the pertinent EIA program or project.
There should be some quality management Final validation should include finding a practi-
function within the EIA maturity model like cal solution to solve the problems of the current
QRM aligning with other 5 reference Models enterprise.
(PRM, BRM, DRM, SRM, and TRM of FEA) We can also apply process improvement tech-
initiated by the Federal Enterprise Architecture niques to the EIA program in order to early find
activities and other functions. Examples of QRM out the practical benefits from the EIA program.
might be CMMI, SPICE, ISO 9001/TickIT, or a Basically using EIA and process improvement
specific quality model for a target organization. together may be one of the ways of realizing
If the QRM is not proper enough to handle the substantial benefits from the EIA program. If
EIA quality, it may be improved to a more suit- we apply the process improvement concept of
able shape for the EIA QRM. the CMMI to the assessment of the as-is view of
Also, one of the direct customers of the QRM a target organization or system, we can find out
should be the CIO (Chief Information Officer) of more accurate information of the current status
the organization as CIO has lots of interests in in terms of maturity concept.
the quality status for the Information Systems There are big processes for transformation
managed by IT people. Qualified stakeholders from current EIA views to future EIA views. If
can also find out the quality status of the EIA we manage these processes with process improve-
program at anytime through the QRM. At the ment concepts of CMMI or some other quality
same time, management from IT people and cus- scheme, the quality status of the projects will
tomers may want to know the quality status and be consistently secured at the intended maturity
practical work forces too. So like other reference level at least. Later we can adjust and improve the
models, a column for the QRM may be provided outcome at reasonable time continuously. This
to accommodate the quality area from high level process should be dealt with like a project. Then
to detailed level besides the 5 reference models this process will secure minimum quality status
(PRM, BRM, DRM, SRM and TRM). according to the QRM specified.
100
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
And other things left for the quality will be the quality of the entire work. First, we revise the
how quality status for the jobs processed will be milestone for the quality; the usual processes are
verified or validated and fixed before going to next review, inspection, verification and validation
stage. The big jobs may be current EIA views, depending on the degree of requirement of the
future EIA views, and enterprise information quality and putting them into places with well
architecture repository (EIAR) and securing the known procedures for these activities. Then all
quality of the resulting artifacts from this model components appearing on the EIA seem to be
or small architecture may be very important for theoretically secured by the above descriptions.
101
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
Last thing we will check about the quality is architecture program. On the other hand, the five
the process improvement and integration. It can rating scale similar to the maturity phases of the
be managed by adding these elements into QRM. CMMI is applied to the assessment of the seg-
Therefore QRM should handle all the process ment architectures for the Completion, Use,
improvement matters like CMMI for the major and Results area.
processes including if necessary, the addition Here we can see much diversified approaches
of specific processes and while the other five to the application of the maturity models under an
reference models (PRM, CRM, DRM, SRM, enterprise. OMB uses an overall process improve-
and TRM) should be under quality control, the ment model-3 rating scale, 3 different general
quality related results should be reflected as a maturity model in the segment architectures of
part of the QRM. three scoring area for the quarterly EA assess-
ment, and 6 maturity models for Completion
capability scoring area including performance
FUTURE TRENDS AND RESEARCH architecture, business architecture, data archi-
tecture (or information architecture), application
More practical process improvement techniques, architecture, technology architecture, transition
methods, and tools with accurate maturity mod- strategy, four maturity models for Use capabil-
els are expected to be available through a lot of ity scoring area including EA governance and EA
experience with various maturity models. What program management, EA change management
is important will be that EIA industry finally and EA deployment, collaboration and reuse, and
has to ensure more practical ROI to successfully CPIC(Capital Planning and Investment Control)
perform the transition activities through the ma- integration, four maturity models for Results
turity models of the process improvement for the capability scoring area including cost savings
unforeseen future. and cost avoidance, performance improvement,
The process improvement strategic efforts measuring EA program value, Internet protocol
of FEA maturity model initiated actively by the version 6 (IPv6) OMB creates and applies total
OMBs Federal Enterprise Architecture Program 18 different kinds of maturity model of its own
EA Assessment Framework 2.2 (OMB, 2007_2) version to manage its EA activities.
provide representative examples of the new trends In case of OMB maturity model, we find
seeking practical EA maturity model to find out that there is a clear trend of diversified maturity
the substantial ROI in the EIA industry. In the models used in an enterprise (Federal Enterprise)
FEAP EAAF 2.2 (Federal Enterprise Assessment to handle complexities of its EA.
Program EA Assessment Framework 2.2), OMB Other trend in OMB case is that the concept
provides two different types of process assessment of segment architecture was introduced. The
and improvement framework. One of the process purpose of development of segment architectures
assessment types is three rating scale (Table 6) for is to promote and accelerate a substantial reduc-
the agencys overall performance for annual EA tion in IT project implementation cost, as legacy
assessment process. The other process assessment IT applications are redesigned and replaced. The
type is five rating scale for the agencys quarterly use of segment architectures will also eliminate
EA performance review. enterprise-wide data duplication and the neces-
The three scale rating of annual assessment sity of reconciling the differences that occur
process is based on the five rating scale self assess- when the same data is collected and stored by
ment by the agencies and provides a comprehen- multiple stove-piped processes. From the OMB
sive review of the state of an agencys enterprise case, segment architecture seems to be other
102
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
representation for the target architecture focused own ITA/EA. Coming over the 21st century, a
on obtaining the practical ROI and early benefits. lot of countries have made laws and regulations
Therefore this is other obvious trend for the EA that force every governmental organization to
maturity model of OMB towards the practical establish infrastructures and processes to man-
ROI focusing on the segment architectures of age its information resources effectively and
target architecture and various kinds of process efficiently. And a galactic amount of budgets is
improvements technique. invested in the ITA/EA programs all over the
For our research proposal, we have found world every year.
that common area between EIAMM and FEAP But from the past experiences of AD/Cycle
EAAF 2.2 is focusing on practical ROI from the Architecture program, we learned a valuable les-
EA investments. But the differences between son that only the products and thoughts making
them would be that EIAMM has a standardization a practical contribution in giant programs could
scheme, 4 phased process improvement processes, be served for future stage. And one of those
and general application guideline regardless of products having outlived the AD/Cycle Program
the enterprise properties. We would like to study is still playing a major role in the ITA/EA market
further research, apply our model in real enterprise as shown in the example of System Architect of
architecture programs, and analyze the results to Telelogic, but all the other major products and
see what the critical success factors (CSFs) for vendors did not outlive because they were not
the application of EIA maturity model are. practical enough for the business and technologi-
Table 7 shows some prospective trend and cal environment and hardly gave benefits to their
insights of ITA/EA maturity model through the clients. To avoid the precedent of the AD/Cycle,
comparison between EIAMM 1.0 and EAAF 2.2. ITA/EA programs should be executed in a way of
However EAAF of OMB represents the current effectiveness and efficiency from the start.
practice of Federal Enterprise Government area For that reason, many governmental organiza-
and EIAMM is a theoretical proposal for the tions and standard bodies have proposed several
improvement of the ITA/EA practice. Therefore maturity models to assess ITA/EA maturity dur-
we need to consider this as a research purpose ing the establishment and operation of the relevant
with certain degree of limitation. programs. The benefits, however, of the ITA/EA
and the effectiveness of the maturity models are
still questionable because the models have difficul-
CONCLUSION ties in application and they are still immature to
measure the economic indexes such as ROI except
Since the final decade of the last century, every a few cases. So we need a new approach to assess
organization, which has suffered from the han- the ITA/EA maturity model from a quality and
dling of a deluge of information generated from economical efficiency view.
business activities, has been interested in the In this chapter, firstly we reviewed a number
ITA/EA. Beginning with Zachmans enterprise ar- of definitions of enterprise architecture and sug-
chitecture framework (Zachman, 1987), a number gested a new definition of Enterprise Information
of enterprise architecture frameworks have been Architecture to stress that our maturity model
introduced. Especially in public sectors, United focused on the information technology area of an
States federal governmental organizations have enterprise. And we explored several worldwide
sought to obtain strategic advantages through the total quality management (TQM) models which
successful establishment and operation of their have relations in their framework with information
103
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
area, and discussed the possibilities of applying DoD. (2006). Department of Defense Chief In-
the techniques that those models can contribute formation Officer Desk Reference. Vol.1 Foun-
to the ITA/EA maturity model. dation Documents. United States Department of
In the proposal section of a new EIA maturity Defense,
model, we adopted two major schemes of process
EA Shared Interest Group. (2005). Advancing
improvement area. One was the maturity level
Enterprise Architecture Maturity, version 2.0.
scheme of SEIs CMMI. We classified the matu-
American Council for Technology/Industry Ad-
rity level of the model in five steps, and specified
visory Council.
characteristics and processes for each level. The
other was the four-phased process improvement EFQM. (2006). The EFQM Excellence Award,
scheme of Boeing. Its practical approach for the Information Brochure for 2006, Version 2. Euro-
process improvement gave us an inspiration to pean Foundation for Quality Management.
devise a mechanism to improve the ITA/EA
GAO. (2003). A Framework for Assessing and
processes and assess the progress and quality of
Improving Enterprise Architecture Management,
them. In order to find the future direction of the
version 1.1. United States General Accounting
ITA/EA maturity model, we definitely need to
Office.
take a process improvement way using four-phased
process improvement, accumulate the resultant so- Hall, M. (2005). Building and Enterprise Archi-
lutions and improvement experiences as enterprise tecture Website and Repository. Lecture notes
assets with the standardization mechanism in an for the enterprise architecture course sponsored
enterprise, and use those capabilities to achieve by Korea IT Industry Promotion Agency, Seoul,
operational, tactical and strategic business goals. Korea.
We hope the proposed EIA maturity model will
Japan Quality Award Committee. (2000). Japan
be an incremental and practical approach to as-
Quality Award Award Criteria: Innovation and
sess the accurate maturity level and make sure
Creation for Competitiveness 2000 Ed. Japan
the effectiveness of ITA/EA.
Quality Award Committee. Tokyo.
NASCIO. (2003). NASCIO Enterprise Architec-
REFERENCES ture Maturity Model, Version 1.3. National As-
sociation of State Chief Information Officers.
Bernard, S. A. (2004). Enterprise Architecture
NIA. (2006). Government Information Technol-
Management Maturity (EAMM) Enterprise
ogy Architecture-Maturity Model, Version 1.0
Architecture Development, Documentation and
(Draft). National Information Society Agency.
Measurement. Lecture notes for the enterprise
Korea.
architecture course sponsored by Korea IT In-
dustry Promotion Agency, Seoul, Korea. NIST. (2007). Baldrige National Quality Pro-
gram. NIST. Technology Administration. Depart-
BSI DISC. (1998). The TickIT Guide A Guide to
ment of Commerce.
Software Quality Management System, Consturc-
tion and Certification to ISO 9001. OMB. (2007_1). FEA Consolidated Reference
Model Document, Version 2.2. Office of Manage-
Chrissis, B. M., Konrad, M., & Shrum, S. (2007).
ment and Budget.
CMMI Guidelines for Process Integration
and Product Improvement. 2nd Ed. Addison-
Wesley.
104
Maturity Model Based on Quality Concept of Enterprise Information Architecture (EIA)
105
106
Chapter V
Measuring the Benefits of
Enterprise Architecture:
Knowledge Management Maturity
Alan Dyer
EWA, Australia
Abstract
Enterprise Architecture is the organising logic for business processes and Information Technology infra-
structure, the purpose of which is to create a more effective organisation in the context of the businesss
strategy and goals. However, the ability to measure the effectiveness of any activities initiated under
the guise of Enterprise Architecture is limited, even more so in those organisations, such as government
agencies, that do not recognise financial return on investment. In this chapter the author introduces the
concept of Knowledge Management, linked to the strategic outcomes of Enterprise Architecture and
proposes a maturity model framework for the measurement of Enterprise Architecture implementation.
The aim of this chapter is to provide a basis for discussion of a wider Capability Maturity Profile with
architectural frameworks to help develop and measure the benefits of implementing frameworks and
architectures.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Measuring the Benefits of Enterprise Architecture
But Enterprise Architecture is not just a tool for architecture as a business strategy tool and how
use in a financially competitive world; it is a tool the architecture extends beyond design to the
that can help improve the efficiency of organisa- operation of the enterprise.
tions that do not measure success by the financial
bottom line. Government agencies represent
just that environment and those who make the EA frameworks
critical, strategic, decisions within the enterprise
must understand the level of improvement; they What is Enterprise Architecture?
must be able to measure such changes in their
enterprise. The seed for enterprise architecture can be traced
During this chapter I will provide some as far back as 1987, when Zachman (1987) provided
background by briefly discussing the concept a framework for information systems architecture
of Enterprise Architecture and its link to deci- (ISA). The first shoots, however, didnt really
sion-making. One aspect of decision-making is appear until Sowa and Zachmans paper (1992)
Knowledge Management, a concept that I will which extended the 1987 framework.
then explore and briefly discuss the measurement The extended Zachman framework is based
of such. This discussion is not intended to be an on a matrix of entities which can be used to
authoritative tome on Knowledge Management, describe particular perspectives and relation-
the discipline is still too young for such a case to ships. The columns represent the what, how,
be presented; however, the introduction and link- where, who, when and why, and the rows
age of the concept will allow for future research represent models such as scope, enterprise
into the ideas presented. model, system model, technology model,
A previous concept for evaluating Knowledge components, and functioning systems. Even
Management Projects exists, and I will use this at that early stage, the ISA was not seen as the
to develop a Knowledge Management Maturity enterprise architecture, but as an information
Model such that it can be used as part of an systems architecture.
architectural view enhancing the design and The identification of such architectures with
operation of the enterprise. Finally, I will discuss enterprise was not seen until Barnett et al (1994)
how a maturity model can be used in the context used the term Enterprise Architectures in their
of an architecture. paper on architecture for the virtual enterprise. In
These discussions are intended to show how there, the authors described enterprise architecture
the strategic audience (Chief Information Officers, as a blueprint or picture which assists in the
Business Analysts, Managers, etc.) can use ma- design of an enterprise; a blueprint that considers
turity models to determine if new approaches are three issues: what activities are performed, how
achieving the desired aims. But, such discussions activities are performed and how the enterprise
are not the sole purview of the strategic decision- should be constructed. However, the authors
makers. Academics and professionals can use took a business modelling approach and did not
maturity models for insights into processes and appear to have the full range of perspectives that
knowledge transfer. Technologists will be more Zachman (with Sowa) had suggested.
interested in some of the maturity offshoots, but Study into this new field continued and Ber-
will still benefit from the strategic understanding nus and Nemes (1996) identified the emergence
of what their tools should support. of a number of enterprise reference frameworks,
Ultimately, this chapter is intended to engender including the Purdue enterprise reference archi-
further discussion on the evolution of enterprise tecture, the GRAI integrated methodology, Com-
107
Measuring the Benefits of Enterprise Architecture
puter Integrated Manufacturing Open Systems of individual frameworks is outside of the scope
Architecture (CIM-OSA) and Toronto Virtual of this chapter; the referenced papers provide
Enterprise (TOVE). These Australian research- descriptions in great detail.
ers produced the generic enterprise reference The proliferation and evolution of frameworks
architecture methodology (GERAM) to describe presupposes a large degree of research and work,
the different types of architecture that were ap- but, as the literature review reveals, most of this
pearing. GERAM was not a framework within work has only scratched the surface.
itself, although the authors described it as being Wikipedia3, to some extent, maps some of
applicable to potentially all types of enterprise. the evolving thinking about EA, with an earlier
Even by this stage, enterprise architecture definition of [a] comprehensive framework used
was not a common theme; Bernus et al (1996) to manage and align an organizations structure,
noted keywords such as enterprise integration, processes, information, operations and projects
reference architecture, enterprise engineering with the organizations overall strategy (No-
methodology, and enterprise modelling but vember 2005) and then a revised definition that
not enterprise architecture. encapsulates the current essence: [e]nterprise
During the mid-1990s, Zachman produced architecture is the practice of applying a com-
three relatively short papers (1996; 1997; 1997a) prehensive and rigorous method for describing a
which re-introduced the work done previously current and/or future structure and behaviour for
on ISA. It was at this point that Zachman (1996) an organizations processes, information systems,
introduced the concept of EA by remarking on personnel and organizational sub-units, so that
his original framework: it was clear that it they align with the organizations core goals and
should have been referred to as a Framework for strategic direction (October 2006).
Enterprise Architecture. Schekkerman (2006) provides an overview of
These latter papers did not change the original existing architectures and quotes some definitions
framework, but did clarify the context and pro- (notably from the Open Group, US Federal CIO
vided a stepping stone for further work. Council and the former Meta Group Inc.). He
Chen et al (1997) used enterprise architec- doesnt provide a succinct definition of his own,
ture (inter alia) as a key word for their paper on but does define various elements that make up
mapping the GRAI integrated methodology onto the phrase Enterprise Architecture (including
GERAM. This is not the only instance of map- architecture, elements and enterprise).
ping onto the GERAM, Noran also mapped the From here we can deduce that an Enterprise Ar-
Zachman and C4ISR frameworks (2003; 2005). chitecture is the structure of people, processes,
The theme of mapping these diverse frameworks business and technology, their interrelationships
shows the underlying commonality, at least in and the principles and guidelines governing their
purpose if not in method. design and evolution over time; in the context of
Since the inception of EA, the frameworks a collection of organisations with a common set
have proliferated. According to Gartner (Allega, of goals/principles or a single bottom line.
2005) and The Institute for Enterprise Architec- Finally, the most recent succinct definition has
ture Developments (IFEAD)1 there are at least come from Ross et al (2006), who state that En-
nine architectural frameworks (although not all terprise Architecture is the organizing logic for
of these have been blessed with the title of En- business processes and IT infrastructure reflecting
terprise, they can be linked to EA).2 Many of the integration and standardization requirements
these frameworks are not in competition, but are of the companys operating model.
evolutions or variations on a theme. A description
108
Measuring the Benefits of Enterprise Architecture
EA and the Enterprise man, 1997), and a means of describing the look
and feel (Lapkin, 2004). Lapkins pattern-based
Enterprise Architecture is less than a decade old approach is by no means unique; other authors
and the concepts and underlying knowledge ap- have expounded on mechanisms to ease the burden
pear to be maturing, including the generation of on enterprises, such as the language described
standards such as ISO15704:1998 (Requirements by Jonkers et al (2003), the Universal/Unified
for Enterprise Reference Architecture and Meth- Modelling Language (UML) approach taken by
odologies), preEN/ISO19440:2003 (Enterprise Armour et al (2002), and the viewpoint oriented
Integration - Constructs for Enterprise Modelling) approach taken by Steen et al (2004).
& 19439:2003 (Enterprise Integration - Frame- As such, EA is only an enabler to enterprise
work for Enterprise Modelling). efficiency and enterprises must consider which
Earlier papers (Chen et al, 1997; Allega, framework to adopt. The process of developing
2005; Bernus et al, 1996; Schekkerman, 2004) architecture (including the tools and training
concentrated on the mechanisms (the industrial required) is an investment by an enterprise; each
aspects) of EA but do not detail how much benefit enterprise, thus, must consider how much to invest
an organisation can gain from implementation. in building the architecture, how much to invest in
Part of this issue, and certainly outside the scope ensuring implementation or compliance and how
of those documents, is that each implementation much to invest in maintaining the architecture.
of a framework or architecture is highly depen-
dent on the enterprise context. While the authors Architectural Returns
could describe a general framework, they could
not describe how each element of the framework The return on any investment is an important
affects individual businesses, especially as each consideration for the enterprise. Gartner authors
business may operate in a different environment (Lopez, 2002; Allega, 2005a) have noted that
(e.g. some may be in a financial environment, some the traditional accounting method of Return on
may be political and others may be traditional Investment4 is not valid when measuring EA.
trade-based). This perspective was reinforced Lopez suggests that Return on Assets5 (ROA)
by Schulman (2004) who noted that frameworks should be used, while Allega notes that the ap-
should be matched to the organisation. plication of EA is where the benefits lie, not in
The number of available frameworks and the the architecture itself. Allegas paper, while not
need to match generic frameworks to the organisa- providing any real insights into how returns can
tion leads to the premise that no single framework be measured, notes that predicting the results of
is fully complete (Schulman, 2004). As such, any EA is not feasible unlike the predictability of
chosen Architecture will have to be developed a traditional investments in the enterprise. Unfortu-
process discussed by Lapkin (2004). In doing so, nately, Lopez links the ROA approach only to IT
the advice of Allega (2005) should be heeded in asset productivity, and not enterprise productivity
that proponents should not become entangled in as a whole.
taxonomical debates and should concentrate on Saha (2004) provided some insight into a
what is important, especially as taxonomical real options approach, which is not so much a
classifications appear to evolve or change about means of evaluating EA, but as a way of looking
every 15 months. at investments in the architecture. This approach
Enterprise Architecture is not an end unto looks at the options (defer, explore/pilot, scale,
itself, in that it is a tool for dealing with the com- compound, growth) and maps these to the condi-
plexities and dynamics of the Enterprise (Zach- tions for viability and risks. These elements may
109
Measuring the Benefits of Enterprise Architecture
give some insight in how to judge the value of the maturity models, forming a Capability Maturity
architecture in the context of the enterprise. Saha Profile (CMP), would enable the necessary level
acknowledges that [a]ssessing the value of EA of granularity.
initiatives is imprecise and still evolving. Under Thus, the CMP is an important mechanism to
current understanding, the benefits appear to be measure the progress of evolution of the imple-
intangible. mentations resulting from the architecture. The
The literature reviewed thus far suggests that CMP is not a measure of the architecture itself;
EA is still hard to describe, especially in enter- but of those elements that are described by the
prise-specific terms, and even harder to measure. architecture.
While frameworks exist to build architectures, A profile addressing maturity of capability is
these frameworks do little to describe the benefits not a common feature amongst the architectural
and costs, unless tailored by experts within the frameworks previously discussed and further
enterprise; even then the overall value may be study is required to validate any benefits, as well
indeterminate. That EA is being accepted is not as which facets are suitable for inclusion. However,
being contested, but EA is still evolving (Schek- the CMP has been considered in the past, albeit
kerman, 2004). in a very limited form.
Quantifying architectural benefits using finan- The C4ISR Architectural Framework initially
cial measures may be hard enough, but quantifying considered a CMP, but this artefact was not includ-
these benefits in organisations that do not rely on ed in the published version (C4ISR Architecture
the financial position as the ultimate measure of Framework, 1997). Reference to this consideration
success (such as Government agencies) is even can be found in the Department of Defence Archi-
more difficult. Moore (2005) highlights the dif- tectural Framework (DoDAF) Deskbook (2003),
ferent drivers for the government; the ability to which notes that the Capability Maturity
relieve budget pressures remains key. Whereas Profile can aid in the transition from an As-Is to
commercial organisations can find solace in the a To-Be architecture (p 2-106), measuring
cold hard bottom line, government departments the rate of progress of change and evolution. The
rely on public perception of the efficiency of DoDAF itself did not include a CMP.
service within the nominated budgets. The Australian incarnation of the DoDAF (the
A measure that highlights efficiency rather Defence Architecture Framework - DAF), how-
than one that depends on financial metrics is thus ever, did include the CMP as a Common View
necessary to ensure that the implementation of (DAF Resources CD, 2005). The DAF noted the
the architecture is providing benefit. Maturity Capability Maturity Profile aids in describing
models are one mechanism to provide this mea- the transition from the current state (as-is) to a
sure. Maturity models also have added benefit of mature state (to-be) of an architecture. The CV-3
identifying a progression from the current state supports other products by providing a roadmap or
to the desired state when the maturity model is profile of the areas that need to change to achieve
properly tailored to the enterprise. a mature capability. The DAF version of the
Enterprise Architectures, though, cover CMP was a direct replica of what was suggested
many facets of an organisation. Technology, for the C4ISR Architecture Framework (C4ISR
decision-making, information and capability are Architecture Framework, 1997).
four examples of such facets. A single maturity Unfortunately, the DAF description of the
model would not be able to cover all the facets CMP does not put the same emphasis on tailoring
effectively, and an aggregated view may hide op- and adapting the CMP to meet the needs of the
portunities for further improvement. A suite of architecture. Whereas the C4ISR AF product (as
110
Measuring the Benefits of Enterprise Architecture
described in the DoDAF) provides example cat- Paulzen & Perc, 2002). KM encompasses much
egories to demonstrate the view, the DAF provides more than the technological processes to support
the same categories as absolutes (termed informa- business outcomes; the people, organisation and
tion system components). While these components processes, and content are critical facets (Paulzen
are useful at the technology level, they add little & Perc, 2002). Some of these basic processes
to understanding the enterprise. To this end, the include creating, storing and retrieving, trans-
DAF CMP provides little benefit in measuring ferring and applying knowledge (Kankanhalli
the effects of the overall architecture. & Tan 2004).
A generic CMP could look at the many facets KM differs from Information Management
of an architectural particularly those that address (IM) in that KM aids the creation of innovative
business processes, behaviours, and operating knowledge, the application of knowledge to in-
models. An integral part of business execution crease value, and results in actions that reflect
is decision-making and the results of deci- changes in human behaviour. IM, however, is an
sion making can be seen in the behaviours and important enabler for KM and the links between
outputs of processes. Decision-making is built Data Information Knowledge are important
on a foundation of knowledge; knowledge is an aspects of KM; employees routinely transform
important base for processes and decisions. As knowledge into information and information into
such, the ability for the organisations knowledge knowledge (Furlong, 2001). Information Tech-
management to influence the business execution nology (IT) is a related enabler, IT can be used
is one of those facets that should be measured as to enforce rules or to empower knowledge and
the enterprise evolves. information processes; however, the emphasis on
IT should not be technology for technologys sake,
but a supporting mechanism for work practices
Knowledge Management and (Furlong, 2001).
current measurement of KM IT and IM are not the only enablers for KM;
others include business strategy, leadership is-
An Explanation of Knowledge sues, cultural concerns, content management,
Management organisational structure, technology and inno-
vation (Furlong, 2001). The knowledge workers
Formalised approaches to managing knowledge have specialised skills and intellect, albeit they
are recent phenomena, although these approaches may be recognised through different perspectives;
are influenced by several, more traditional, disci- these skills directly influence the organisations
plines. As such, definitions for Knowledge Man- growth and competitiveness. Competitiveness
agement (KM) are only now emerging and can in a government context goes beyond the fiscal
hardly be called mature. KM is about managing management and into the realm of being more
knowledge processes to support both business capable than the adversary (however so defined);
processes and organisational knowledge bases; the concept of business is different between the
connecting intellectual assets and business growth government and commercial worlds although the
(Furlong, 2001; Paulzen & Perc, 2002). underlying lessons and processes may have more
As well as emerging definitions, the character than just a passing similarity.
of KM is also developing. Knowledge is a ubiq- Managing knowledge, itself, is not new, but
uitous entity that is applicable in new environ- as a discipline KM is a young, growing, field that
ments and a catalyst (in that knowledge is not a can assist organisations to improve their business
direct agent or end result of itself) (Furlong, 2001; processes and increase competitiveness. However,
111
Measuring the Benefits of Enterprise Architecture
KM depends on expressing many underlying con- ability, maintainability and migrate-ability (shared
structs within the organisation and understand- across different environments through sharing,
ing the connectivity, not just from a technology interoperating and porting) (Duttaroy, 2005).
sense, but also from a social and value network The facets of KM that can be measured are
context. This level of understanding implies a numerous (Metainnovation, 2004; Kankanhalli &
fresh look at the business architectures, a better Tan, 2004; Furlong, 2001; Martin, 2006; Rober-
understanding of how the different perspectives ston, 2003; Standards Australia AS:5037, 2005);
and views are connected. Table 1 identifies broad areas; the headings have
been taken from the Australian Standard.
Measuring KM Knowledge audits should measure the role of
structure; technology experience, perceptions,
KM is a strategic initiative and that measurement requirements; the impact of culture; the nature
is necessary to understand success and failure of process management; sources of innovation;
(Metainnovation, 2004). Knowledge Management models of communication; strategy; and percep-
can be measured in a variety of ways; success indi- tions of the current KM initiative (Furlong, 2001).
cators can be artefact-, activity-, cultural- (behav- Many mechanisms exist to measure KM, or the
ioural-), and intellect-centred; another perspective impacts of KM initiatives. Some that have been
on these elements identifies the number of new discovered through the literature include (from
claims, rate of generation, quality of claims and (Kankanhalli & Tan, 2004; Roberston, 2003),
impact of the knowledge (Standards Australia, etc):
2005) (Metainnovation, 2004). Likewise, meta-
data (an enabler to knowledge management) House of Quality (development of a metrics
should be checked for meaning, maturity (in terms matrix to find correlations and focus priori-
of consistency and enduring integrity), manage-
112
Measuring the Benefits of Enterprise Architecture
ties on those elements that will have the best Measuring Knowledge Management, like KM
effect) itself, is a maturing discipline and appears to cur-
Balanced Scorecard (a tool to translate high- rently be soft around the edges. Techniques exist
level strategies to real targets) to subjectively measure the effect that knowledge
American Productivity Center bench- has on an organisation; the ability to confidently
marking approach (a process classification objectively measure such effects (and hence, con-
framework that can be used to benchmark fidently enhance business processes) are yet to be
and assess impact on business processes) fully developed. Most of the techniques hinge on
Skandia Navigator (a series of metrics in five scorecards to quantify the activity levels of an
focus areas which could be considered as an organisation, a means to indicate an organisations
extension of the Balanced Scorecard) knowledge management maturity level.
Intellectual Capital index (an extension to
the Skandia metric) Maturity Models
Intangible Assets Monitor (largely focussed
on the financial perspective of intellectual A maturity model is a means of simplifying the
capital and reputation groups the indica- description of an organisations level of devel-
tors {e.g growth, renewal, efficiency and opment, and the stages of development that an
stability/risk} into three distinct categories organisation can be expected to pass through
{external structure, internal structure and as part of its continuous improvement strategy
individuals competence}) (Weerdmeester et al, 2003). Models are simple,
Knowledge Capital Valuation techniques with a limited number of maturity levels which
such as: have certain requirements. The levels themselves
Market value to book value, form a continuous progression (from an initial level
Tobins Q, to a perfect ideal), in that an organisation has
Calculated intangible value, to pass through them sequentially (Weerdmeester
Baruch Levs knowledge capital valu- et al, 2003). Essentially, maturity models are
ation, designed to be easy to understand and use, thus
Paul Strassmanns knowledge capital suitable for presentation to the higher-level deci-
valuation, sion-makers in an organisation (Marco, 2002).
Measuring intellectual assets, and A well known maturity model is the Software
Accounting methods for measuring Engineering Institutes Capability Maturity
intellectual capital. Model (CMM), which has 6 levels (not performed,
performed informally, planned and tracked, well-
These techniques are designed for use in the defined, quantitatively controlled, continuously
commercial world and are not easily tailored, if improving) and 5 orthogonal concepts (consistent,
at all, for use within the non-commercial (e.g. repeatable, transferable, quantitative and qualita-
Government) environment where costs and re- tive) (Marco, 2002). Some additional models, of
sources are measured in dimensions other than which many are extensions, or variations of the
the dollar. The use of techniques is somewhat CMM, are (Weerdmeester et al, 2003; Mohanty
hindered by a lack of consistency of vocabulary; & Chand, 2005; Paulzen & Perc, 2002):
although most of the techniques overlap in their
approach to measures and metrics (Kankanhalli The Knowledge Management Framework
& Tan, 2004). Assessment Exercise which uses a five level
knowledge journey covering key areas
113
Measuring the Benefits of Enterprise Architecture
of knowledge management (awareness and use, store, distribute and evaluate), manage-
commitment, strategy, culture, external ment areas and assessments; with the under-
focus, incentives, IT, maintenance and pro- standing that knowledge processes can be
tection, ongoing assessment, organisations, improved by enhancing the corresponding
and using and applying knowledge). The management structures. The KPQM assess-
key areas of KM can also be defined though ment structure places process attributes in a
people, process, content and technology. matrix of maturity stage versus organisation/
The Quality Management Maturity Grid people/technology; each process attribute
with 5 stages across six measurement can be described through activity-specific
categories (management understanding or activity-independent practices.
and attitude, information quality organisa-
tion status, information quality problem The maturity of Information Management
handling, cost of information quality as (as an enabler to KM) practices is also an im-
percent of revenue, information quality portant aspect of any KM System; management
improvement actions, and summation of of information is most effective when data and
company information quality posture). information is treated as assets (Ladley, 2002).
The Siemens Knowledge Management Again, a variety of models, the key principals of
Maturity Model which defines five levels which parallel those of any capability maturity
of maturity across key areas (strategy, model, are available, with corresponding levels
knowledge goals, environment, partner- (operate, consolidate, integrate, optimise, in-
ships, staff, competencies, cooperation, novate or reporting, analysing, predicting,
culture, leadership, support, knowledge operationalising, active warehousing) that may
structures, knowledge forms, technology, work across types of activity (primarily batch with
infrastructure, processes, roles, organisa- pre-defined queries, increase in ad hoc queries,
tion). However the model is applied across analytical model grows, continuous updates and
four perspectives (time horizon, knowledge, time sensitive queries gain importance, event
actor, rules) leading to eight key distinctions based triggering takes hold). Hybrids are also
(strategic, operative, external, internal, available such as those suggested by Ladley
people, technology, informal, formal). which aligns levels of maturity (transactions,
The KMM Model from Infosys Technologies reporting, analysing, predictive, operationalise,
which uses five levels of maturity. These collaborative, closed loop, foresight) with the
levels can be applied across people, process DIKX hierarchy (in this case data, information,
and technology and have defined key result knowledge, action) (Ladley, 2002).
areas.
TATA consultancy services provide another
five level maturity model addressing the Linking KM to Enterprise
three basic pillars of capability (people, Architecture
process, technology).
The Knowledge Process Quality Model Knowledge and knowledge management do not
(KPQM) is based around the dimensions of currently have an explicit link to Enterprise Ar-
maturity stages, knowledge activities (those chitecture or to any of the previously mentioned
business activities in which the handling architectural frameworks. The indirect linkages
of knowledge is of particular importance; can be found by examined the purposes of the
characterised by the types identify, generate, Enterprise Architecture and understanding the
114
Measuring the Benefits of Enterprise Architecture
nature of the enterprises. EA should document Nothing in the literature easily distinguishes
business processes and organisational knowledge the importance of decision-making, knowledge
bases, while KM should manage the knowledge management or enterprise architecture between
processes that support these. Certainly, an indi- commercial and government interests. However,
rect link was noted earlier in this chapter where government interests do not have financial share-
I stated that KM depends on expressing many holders to please; the implementation of policy
underlying constructs within the organisation and depends on the strength of their decision making.
understanding the connectivity, not just from a In this sense, there is little difference between
technology sense, but also from a social and value the non-profit and profit based organisations, as
network context. Additionally, the Australian these decisions affect the operating capital (public
Standard (Standards Australia AS:5037, 2005) ac- perception or operating budget). While the im-
knowledges two principal benefits of undertaking portance of decision making may be no less, the
knowledge management: to improve productivity outcomes of decisions in the government sector are
and organisational efficiency, and to promote more visible than that of the commercial sector.
innovation. Enterprise Architecture is the frame Knowledge Management is an integral sup-
within which those benefits can be elicited. port activity for decision-making, along with the
Snyman et al (2004) looked to Drucker in not- information held with in the intellectual capital and
ing that the knowledge and knowledge workers enterprise environment (Vandegriff, 2006). Cer-
are the most valuable assets for enterprises in tainly, KM helps connect the intellectual assets and
this modern day. An appropriate fit between the business growth (Furlong, 2001; Paulzen & Perc,
overall strategy and an organisations knowledge 2002). An Enterprise Knowledge Architecture
management is critical. From an architectural (as a form of Information Systems Architecture)
viewpoint, business processes are (or should be) permits integration of knowledge management
an extension of the flow of information through systems (including necessary processes) into a
the organisation; determining this flow of infor- knowledge network (Iyer et al, 2006).
mation will enable strategists to assess the flow Enterprise Architecture and Knowledge Man-
and exchange of knowledge. agement are very closely tied to the enterprises
The understanding and expression of the strategy. Ultimately, Zachman makes a direct link
enterprise vision and strategy remains a critical between EA and KM; Enterprise Knowledge
function of ensuring the enterprise can be suc- Management is very, very closely tied to, if not the
cessful. Enterprise content management, which same as, Enterprise Architecture Management
takes place in a collaborative environment and (Zachman, undated). The upshot of Zachmans
supported by enabling technology and tools, is thoughts is that the expression of the architecture
essential to create an organisation that is trans- is an expression of the underlying management
parent, extended and intelligent (Klein, 2005). knowledge of the organisation. The measurement
Although Klein takes a low-level perspective of the effectiveness of Knowledge Management is
on Enterprise Architecture (equating EA with an indirect measurement on the effectiveness of
data or information management), the linkages the use of knowledge within the organisation.
between the strategy and the need to manage
content remain valid. This is particularly so for
those organisations who measure their assets in A KM Maturity Model
the content and services they provide, rather than
the direct financial equation of the products of In the previous section, I noted that KM is a concept
commercial entities. that assists human decision-making; improve-
115
Measuring the Benefits of Enterprise Architecture
ments in KM maturity indicate an improvement expertise to exercise the Maturity Model for full
in the feedback from the system, and a greater effect would not persist within a department;
understanding of the overall business (including let alone across Government. For these reasons,
strategies). KM can be measured through arte- the previously listed Maturity Models would
facts, activity, intellect, behaviours or maturity; not be suitable for implementation in a living
although, techniques to extract useful metrics are Architecture.
still being evolved. To this end, I am proposing a framework for
The hard measures (such as those advocated a persistent maturity model to form one leg of
through the Australian Standard (Standards Aus- the CMP. Rather than commence this work from
tralia AS:5037, 2005), require careful selection scratch, I have decided to build on the work of
and presentation to ensure integrity of meaning. Iftikhar et al (2003) from their paper Develop-
A measure of the rate of production of artefacts ing an Instrument for Knowledge Management
(for instance) means nothing in isolation; causal Project Evaluation, in which the authors devel-
factors (such as changes in the environment and oped an instrument of evaluation for knowledge
rates of knowledge error) must also be consid- projects.
ered. In the context of EA, partial measures will
be open to interpretation and the flow-on effect The Knowledge Management
of creating the architecture may not be directly Maturity Model framework
visible or attributable to any improvements in the
measures until well after the fact. In addition, such Iftikhar et al (2003) noted that [e]valuation is
measures may need to be seasonally adjusted; important [] to determine whether the organisa-
a process that may not be possible if the informa- tions investment pays off in terms of demonstrable
tion is not available, especially through lack of performance improvements. In many domains,
historical collection. however, changes in performance are difficult
Maturity Models have the benefit of providing to measure because of uncontrollable factors that
a snapshot of the organisation at a particular exist within the larger organisational context.
point in time. Such models can be subjective, the (p57) The authors defined a series of questions
data provided depending on the interpretation of that can be applied to a knowledge project. The
the questions by the respondent. However, the questions are divided into four key categories,
design of a Maturity Model is intended to be static each with significant sub-categories:
throughout the life of the initiative (however that
may be described) and comparisons at various Organisational Environment. Sub-categories
points in time should be valid. include Social Aspects, Culture, Incentives
In the previous section I noted a number of and Trust Issues.
existing Maturity Models that could be used, Technical and Managerial Support. Sub-
but these either provide a limited overview (the categories include Organisational structure
categories are too aggregated to be useful), or are and Awareness and Commitment.
proprietary and require resources (both financially Strategy and Goals for KM Projects. Iftikhar
and time) to tailor and complete. Certainly, the et al did not list any particular sub-categories
CMM is extremely complex and requires a degree for this section.
of training to complete properly. However, (from Utilisation of Knowledge and Technology.
my own observations) the nature of Government Sub-categories include Information Tech-
staffing precludes the widespread employment of nology, Maintenance and Protection, and
highly specialised personnel, and the necessary Using and Applying Knowledge.
116
Measuring the Benefits of Enterprise Architecture
Iftikhar et al (2003) noted the importance of a Iftikhar et al (2003) note that [k]nowledge sharing
knowledge friendly atmosphere for business to and willingness to take the time to help others is
succeed. based on trust and confidence (p58). Trust and
confidence is often built on personal relationships,
Social Aspects but these factors can be enhanced by using the
architecture to formalise the interactions that are
Knowledge is not just a technical artefact but is necessary in the development of trust. Common
part of the social environment within which it knowledge of processes, outcomes and commu-
is used. In the knowledge realm organisational nication methods will help build the trust and
culture and interpersonal communications have confidence that is needed.
an important role to play in the non-technical
information system. (Iftikhar et al, 2003). Technical and Managerial Support
Internodal communication is an important
element within any enterprise architecture. At the KM initiatives can be started based strictly on
technical or information level, this communica- the availability of new technology. However, if the
tion may exist from system to system, technology managerial support is missing even a successful
to technology; however, within an enterprise project might fail when it comes to utilisation
architecture, the nodes are more likely to include of the system in the long run (Iftikhar et al,
personal communications. 2003, p59). Architectural frameworks may not
necessarily show the support (both technical and
managerial) needed to ensure success, but they can
117
Measuring the Benefits of Enterprise Architecture
formalise the mechanisms for support as shown the linkages between knowledge and technology.
in the next two paragraphs. The form will depend Importantly, any measurement of the architecture
on the architectural framework chosen. should show if the tools exist to properly support
decision making in the organisation. Iftikhar et
Organisational Structure al (2003) had noted the important relationship
between collecting and extracting information
The command and control (C2) structure is an and the need to turn that which is collected into
essential view in the frameworks evolved from knowledge.
the C4ISR AF. Sowa & Zachman (1992) had not
specifically identified a C2 hierarchy in his model, Information Technology
but such a wireframe would sit comfortably at the
intersection of System Model and People. When Technology provides the tools necessary to sup-
discussing the resultant organisational structure, port the KM processes. The Architecture should
the term maturity may be misleading as some of highlight the range of tools or technology needed,
the elements reflect business choices rather than and promote their effective use.
growth. As an example, an organisation may
decide to not have a full-time Chief Knowledge Maintenance and Protection
Officer, but instead to ensure the role is spread
across other staff. Like any physical asset, data, information and
knowledge (and the tools and processes that ma-
Awareness and Commitment nipulate them) must be maintained, otherwise the
resultant deterioration will render them worthless
Effective use of the workforce depends on the (Iftikhar et al, 2003). The development of the
awareness that can be built by the ability for architecture allows the important aspects of the
business functions to link and share information organisation to be documented along with the
(Iftikhar et al, 2003). The developed architecture needs of the organisation; facilitating processes
documents the linkages, through processes and to ensure protection and maintenance.
information, between the business functions.
Using and Applying Knowledge
Strategy and Goals for KM Projects
Collecting information and exploiting it to produce
The relationship between EA and strategy has knowledge is of no avail if these products are
been previously discussed and architecture should not used in an effective manner. Amongst other
clearly demonstrate linkages between strategies things, the role of the architecture is to document
and goals. In addition, the architecture will help processes to ensure that such knowledge is used
identify current gaps and act as an initiator for efficiently and effectively.
various projects (through the as-is and to-be
representations). Quality
118
Measuring the Benefits of Enterprise Architecture
ment. The architecture documents the processes will reduce the relevance and hence the accep-
within the backdrop of the organisation. As such, tance and utility.
any maturity model reflecting the organisation
should also include a section on quality. To
some extent, these elements are covered within Using the KM-MM in an EA
the previous elements; but explicit statement of the context
elements will help clarity and understanding.
Despite the level of work to reach an effective
Tailoring the Model maturity model, the model is not an end within
itself and is a tool to support the processes of the
The following table (Table 2) summarises the link enterprise as well as supporting the development
between the instrument of evaluation mooted by of the Architecture. Like all tools, it will only
Iftikhar et al (2003) and a KM Maturity Model be effective when used in the right manner and
Framework. Naturally, the associated maturity context. Four broad uses of this maturity model
levels or stages (not listed in this table) must be exist in the context of EA: identifying the baseline
tailored for each organisations; failure to do so (as-is), identifying the goal (to-be), identifying
Social Aspects
All employees are ready and willing to give advice or help on This area identifies the extent that employees give advice or
request, from anyone else in the company. help, on request from anyone else in the company.
Informal networks across the organisation are encouraged. This area identifies the effect and support of informal net-
works within the organisation
Multi-disciplinary teams are formed and managed. This area identifies how multi-disciplinary team are recog-
nised within the organisation.
Staff is rotated to spread best practice and ideas, or the natural This area identifies how the organisation utilises staff move-
internal staff turnover is actively capitalised upon in this ments to spread best practice and ideas.
regard.
This area identifies the organisations approach to com-
Social Aspects
119
Measuring the Benefits of Enterprise Architecture
Table 2. continued
Sub Category
Culture
Failure is not stigmatised, rather it is seen as an opportunity This area identifies the organisations approach to failure.
to learn.
Recording and sharing knowledge is routine and second nature This area identifies the organisations approach to recording
to promote continuous knowledge exchange. and sharing knowledge.
Looking for the best practice or work that can be re-used is a This area identifies the organisations approach to re-use of
natural, standard process. work and practices.
Knowledge sharing is seen as a strength, knowledge hoarding This area identifies the organisations approach to knowledge
as a weakness. hoarding and sharing.
Time is allowed for creative thinking. This area identifies the organisations approach to creative
Culture
thinking.
Employees are encouraged to learn more and develop them- This area identifies the organisations approach to employee
selves. development.
There are no restrictions on access to information unless it is This area identifies the organisations approach to access to
confidential or personal. information (allowing for privacy or confidentiality provi-
sions).
A common language exists for exchanging and clarifying The area identifies the ability of the organisation to use a
information to people with different backgrounds. common language for exchanging and clarifying informa-
tion to people with different backgrounds.
Efforts are made to combine the ideas of different cultures This area identifies the organisations efforts to combine the
within the organisation. idea of different cultures within the organisation.
Incentives
Good KM behaviour (e.g. sharing, reusing etc.) is actively This area identifies how the organisation promotes good KM
promoted on a day-to-day basis. behaviour.
Bad KM behaviour (e.g. hoarding, not using best practices This area identifies how the organisation deals with bad KM
etc.) is actively discouraged. behaviour (e.g. hoarding, not using best practices etc.).
Incentives
Good KM behaviour is monitored and built into the appraisal This area identifies how the organisation monitors the KM
system. behaviours of the organisations personnel.
Individuals are visibly rewarded for teamwork, knowledge This area identifies how the organisation rewards good KM
sharing and re-use, and re-use of knowledge. behaviour (e.g. teamwork, knowledge sharing and re-use,
and re-use of knowledge).
Training and development programs in KM behaviour and This area identifies the KM training and development pro-
procedure are encouraged from point of recruitment onwards grams within the organisation.
Trust Issues
People are engaged in decisions that directly affect them. This area identifies how the organisation engages personnel
in decision-making.
Explanation is given about why decisions are made the way This area identifies how the organisation explains decisions
they are. to personnel.
Trust Issues
Expectations from the employees after changes are stated This area identifies how well the organisation communicates
clearly. changes in expectations.
Work groups see themselves as interdependent with others Work groups see themselves as interdependent with others
outside their team. outside their team.
When it comes to problem solving, groups and/or individuals This area identifies how groups and/or individuals regard
regard themselves as part of a larger, integrated entity. themselves, in relation to a larger, integrated entity.
People are genuinely interested in helping one another to This area identifies how personnel are interested in helping
develop new capacities for decision making. develop new capacities for decision making.
120
Measuring the Benefits of Enterprise Architecture
Table 2. continued
Sub Category
There are different personality types within the organisation There are different personality types within the organisation
that allow people to cluster into groups of compatible types. that allow people to cluster into groups of compatible types.
Usage issues (e.g. experts willingness to use databases or This area identifies how well the management understands
share their knowledge) are understood by management. usage issues (e.g. experts willingness to use databases or
share their knowledge).
Organisational Structure
Formal networks exist to facilitate dissemination of knowledge This area identifies the use of networks to facilitate dissemi-
effectively. nation of knowledge.
A flexible, well-structured, up-to-date knowledge map exists to This area identifies the use of knowledge maps within the
Organisational Structure
121
Measuring the Benefits of Enterprise Architecture
Table 2. continued
Sub Category
plan.
There are defined responsibilities and a budget set for KM This area identifies how responsibilities are defined and bud-
initiatives. gets are set for KM initiatives.
KM principles are set (e.g., definitions of key knowledge and The area identifies if KM principles are set.
guidelines for knowledge creation and management).
There is clear ownership of KM initiatives, either by the busi- This area identifies the ownership of KM initiatives, either
ness unit or the whole business. by the business unit or the whole business.
There is a program of initiatives in progress to improve KM. This area identifies if a program of KM initiatives exist.
There is a close relationship between the strategic program and This area identifies the relationship between the strategic
the learning program within the organisation. program and the learning program.
Information Technology
People use existing IT effectively as normal working practice. This area identifies how staff use the existing IT.
IT is leading edge and is fully supported. This area identifies the currency of the IT.
Technology is a key enabler in ensuring that the right informa- This area identifies how the technology enables the passage
tion is available to the right people at the right time. of information throughout the organisation. This area does
not include technologys role in creating or storing informa-
Information Technology
tion.
IT makes the search for information easier. This area identifies how IT assists searching for information.
IT allows effective communication across boundaries and time This area identifies how IT eases communications across
zones. boundaries and time zones.
Process tools and technologies are related to KM. This area identifies how process tools and technologies are
related to KM.
There is investment in infrastructure development to support This area identifies how investment for groupware and col-
groupware and collaborative computing tools. laborative computing tools is managed.
Information is used to make sense of changes in the environ- This area identifies how information is used to make sense
ment, create new knowledge and/or make decision about a of the environment, create new knowledge and/or make
course of action. decisions.
Maintenance and Protection
There are regular reviews to delete out of date information and This area identifies the frequency of reviews of corporate
ensure regular updates from designated information owners. information.
Maintenance and Protection
Effective cataloguing and archiving procedures are in place for This area identifies the organisations approach to catalogu-
document management, whether held electronically or not. ing and document management.
Key information to be protected, such as customer informa- This area identifies how key information might be protected
tion, is identified and measures are in place to ensure it stays in if key employees leave.
the company should key employees leave.
Intellectual assets are legally protected. This area identifies how intellectual assets are protected.
There are complete IT security procedures in place (backup, This area identifies the organisations attitudes to security
recovery etc). practices.
Regulatory and compliance requirements are clearly published This area identifies the organisations approach to regulatory
and understood; they are monitored to ensure compliance. and compliance requirements.
122
Measuring the Benefits of Enterprise Architecture
Table 2. continued
Sub Category
Quality
This area identifies the organisations ability to use quality
measurements as a management tool
This area identifies the visibility of quality within the
organisation
This area identifies how the organisation deals with prob-
lems.
Quality
Knowledge Management
This area is a single statement that sums up the organisa-
tions approach to KM
Knowledge
the road to reaching the goal, and measuring of the profile; further models should be developed
progress. to ensure a full Capability Maturity Profile.
Additionally, I had noted that KM is a strategic
Working out the As-Is initiative and that measurement is necessary to
understand success and failure. Measuring prog-
As previously discussed, the primary role of the ress is to understand the difference between the
CMP is to highlight those elements that need to origin and the current situation. To this end, the
change in order to achieve an appropriately mature maturity model can be used to form a snapshot of
capability. Knowledge Management is only one leg the current position. The appropriate levels should
123
Measuring the Benefits of Enterprise Architecture
124
Measuring the Benefits of Enterprise Architecture
EA and KM are important for all manner of Armour Dr. F., Kaisler Dr. S., Getter J., & Pippin
Enterprises; the imperative for governments is D. (2003); A UML-driven Enterprise Architec-
borne by the visibility of the results of decision- ture case study; Proceedings of the 36th Hawaii
making. International Conference on System Sciences
While neither EA nor KM provide explicit (HICSS) 2003.
references to each other, the indirect linkages
Barnett, W., Presley A., Johnson M., & Loles D.H.
can be seen through the commonality of purpose.
(1994); An Architecture for the Virtual Enterprise;
Both disciplines respond to the overall strategy of
1994 IEEE International Conference on Systems,
the organisation, and both rely on structure and
Man, and Cybernetics, 1 (pp. 506-511)
information flows.
But neither EA or KM are an end, each are a Bernus, P. & Nemes, L (1996); A framework to
means to ensure the goals and strategies of the define a generic enterprise reference architecture
enterprise are achieved. To ensure that investment and methodology; Computer Integrated Manufac-
in EA is warranted, the effect that the architecture turing Systems, Vol 9, No3 pp 179-191, 1996.
has on business outcomes must be measured. The
C4ISR Architecture Framework (Version 2.0)
management of knowledge is one such facet that
(1997); C4ISR Architectures Working Group
can be measured.
(USA) ; Department of Defense (USA)
But knowledge management maturity is a
versatile tool within any architecture. The KM Chen, D., Vallespir, B., & Doumeingts, G. (1997);
maturity level form part of the as-is baseline, GRAI integrated methodology and its mapping
and the desired levels of maturity form part of onto generic enterprise reference architecture
the to-be goal. As important is the role that the and methodology; Computers in Industry, Vol
determination of tailored maturity levels plays 33 (1997), pp 387-394.
in the discovery of important aspects of the ar-
Collison, C., & Parcell G. (2005); KM Self-As-
chitecture. Finally, a maturity model can act as
sessment; Retrieved 01/04/2007 from Learn-
a road map and monitoring tool.
ing to Fly Website (http://www.chriscollison.
Further study is required to validate the
com/l2f/whatiskm.html#assessment)
maturity model and to confirm the usefulness
as a means of measuring the effect creating the Defence Architecture Framework Resources
architecture has on enterprises. In addition, a full (CD) (Version 1.0) (2005); Australian Govern-
Capability Maturity Profile should be developed ment, Department of Defence (Chief Information
to be added as a useful perspective to architec- Officer Group)
tural frameworks. These studies will only serve
DoD Architecture Framework Deskbook (Final
to enhance the utility of EA.
Draft) (Version 1.0) (2003); DoD Architecture
Framework Working Group; Department of
Defense (USA)
References
Duttaroy, A. (2005); Five Ms of Meta Data;
Allega, P.J. (2005); Architecture framework de- DM Review (http://www.dmreview.com) April
bates are irrelevant; Gartner report G00127331, 2005.
07 Jun 2005.
Federal EA Framework (V 1.1) (1999); CIO
Allega, P.J. (2005a); Enterprise Architecture will Council (USA)
never realize a return on investment; Gartner
report G00128285, 24 Jun 2005.
125
Measuring the Benefits of Enterprise Architecture
Furlong, G. (2001); Knowledge management and Lopez, J. (2002); Return on Enterprise Architec-
the competitive edge; University of Greenwich ture: Measure it in Asset Productivity; Gartner
Business School; 2001, revised May 2003. Report: RPT-0702-0119, 19 July 2002
Iftikhar, Z., Eriksson, I.V., & Dickson, G.W. Marco, D. (2002); Meta Data & Knowledge
(2003); Developing an Instrument for Knowledge Management: Capability Maturity Model; DM
Management Project Evaluation; Electronic Review (http://www.dmreview.com) August/Sep-
Journal of Knowledge Management, Vol1, Issue tember/October/November 2002.
1, 2003, pp55-62
Martin, P. (2006); Measuring KM-Based improve-
Iyer, B., Shankaranarayanan G., & Wyner, G. ments in decision-making; personal communica-
(2006); Process Coordination Requirements: tion through the ACTKM forum (http://www.
Implications for the design of Knowledge Manage- actKM.org) March 2006.
ment Systems; The Journal of Computer Informa-
Metainnovation (2004); KM Concepts Module 8:
tion Systems; Volume 46, Issue 5; 2006
Metrics; Retrieved May 2006 from Metainnova-
Jonkers, H., van Buuren, R., Arbab, F., de Boer F., tion KM Concepts course (www.metainnovation.
Bonsangue M., Bosma, H., ter Doest, H., Groe- com)
newegen L., Scholten J.G., Hoppenbrouwers S.,
Mohanty, S., & Chand, M. (2005); 5iKM3
Iacob M., Janssen W., Lankhorst M., van Leeuwen
Knowledge Management Maturity Model; TATA
D., Proper E., Stam A., van der Torre L., & van
Consultancy Services 2005.
Zanten G.V. (2003); Towards an Language for
Coherent Enterprise Architecture Descriptions; Moore, A. (2005); What makes government dif-
Proceedings of the Seventh IEEE International ferent?; KM World Vol 14 Issue 6; Jun 2005
Enterprise Distributed Object Computing Confer-
Noran, O. (2003); A systematic evaluation of the
ence (EDOC) 2003.
C4ISR AF using ISO1504 Annex A (GERAM);
Kankanhalli, A., & Tan, B.C.Y. (2004); A review Computers in Industry vol 56 (2005) pp 407-
of Metrics for Knowledge Management Systems 427.
and Knowledge Management Initiatives; Proceed-
Noran, O. (2005); An analysis of the Zachman
ings of the 37th Hawaii International Conference
framework of enterprise architecture from the
on System Sciences 2004.
GERAM perspective; Annual Reviews in Control
Klein, J; ECM best practices for the Enlightened Vol 27 (2003) pp 163-183.
Enterprise, KM World; Vol 14, Issue5, May
Paulzen ,O., & Perc, P. (2002); A maturity model for
2005
quality improvement in knowledge management;
Ladley, J. (2002); Beyond the Data Warehouse: Proceedings of the 13th Australasian Conference
Information Management Maturity; DM Review on Information Systems (ACIS 2002).
(http://www.dmreview.com) August 2002.
Robertson, J. (2003); Metrics for knowledge
Lapkin, A. (2004); A users guide to architectural management and content management; Step Two
patterns; Gartner Report G00124049, 22 October Designs (www.steptwo.com.au) February 2003,
2004 accessed May 2006.
Lapkin, A. (2004); Architecture Frameworks: Ross, J.W., Weill, P., & Robertson, D.C. (2006);
How to Choose; Gartner Report G00124230, 19 Enterprise as strategy: creating a foundation
November 2004 for business execution; Harvard Business School
Publishing; 2006.
126
Measuring the Benefits of Enterprise Architecture
Rosser, B. (2002); Architectural styles and En- Vandegriff, L.J. (2006); Unified approach to agile
terprise Architecture; Gartner report AV-17-4384, knowledge-based enterprise decision support;
13 August 2002. VINE Vol 36, Issue 2; 2006)
Saha, P. (2004); A real options perspective to Weerdmeester, R., Pocterra, C., & Hefke, M.
Enterprise Architecture as an investment activity; (2003); Thematic Network/Roadmap: Knowledge
(accessed 24 Aug 05 through The Open Group Management Maturity Model; Information Soci-
Architecture Forum http://www.opengroup.org/ eties Technology Programme, June 2003.
architecture).
Zachman, J.; The Physics of Knowledge Man-
Schekkerman, J. (2004); Enterprise Architecture agement; undated, retrieved 29 Apr 2007 from
Validation; Institute for Enterprise Architecture http://www.zifa.com
Developments, August 2004.
Zachman, J.A (1987); A Framework for Informa-
Schekkerman, J. (2004); Trends in Enterprise tion Systems Architecture; IBM Systems Journal,
Architecture: How are organizations progress- Vol 29, No 3, 1987
ing?; Institute for Enterprise Architecture Devel-
Zachman, J.A. (1996); Enterprise Architecture
opments, 2004.
and legacy systems. Getting beyond the legacy; ac-
Schekkerman, J. (2006); How to survive in the cessed from Information Engineering Services Pty
jungle of Enterprise Architecture Frameworks: Ltd via http://members.ozemail.com.au/~visible/
Creating or choosing an Enterprise Architecture papers/zachman1.htm on 25/07/2005
Framework; Trafford Publishing; 3rd Edition 2006
Zachman, J.A. (1997); Concepts of the frame-
(First published 2004).
work for enterprise architecture. Background,
Schulman, J. (2004); Architecture Frameworks description and utility; accessed from Information
provide system road maps; Gartner Report Engineering Services Pty Ltd via http://members.
G00125007, 29 November 2004. ozemail.com.au/~visible/papers/zachman3.htm
on 25/07/2005
Snyman, S., & Kruger, CJ; The interdependency
between strategic management and strategic Zachman, J.A. (1997a); The challenge is change:
knowledge management; Journal of Knowledge a management paper; accessed from Information
Management; Vol 8, Issue 1, 2004). Engineering Services Pty Ltd via http://members.
ozemail.com.au/~visible/papers/zachman2.htm
Sowa, J.F., & Zachman, J.A.(1992); Extending
on 25/07/2005
and formalizing the framework for information
systems architecture; IBM Systems Journal, Vol
31, No 3, 1992. Endnotes
Standards Australia (2005); Australian Standard 1
http://www.enterprise-architecture.info/
5037-2005: Knowledge management a guide; 2
The listed frameworks are: Zachman
Standards Australia, September 2005.
Framework; The Open Group Architecture
Steen, M.W.A., Akehurst, D.H., ter Doest H.W.L., Framework (TOGAF); Command, Control,
& Lankhorst M.M.(2004); Supporting Viewpoint- Communications, Computing, Intelligence,
Oriented Enterprise Architecture; Proceedings of Surveillance and Reconnaissance (C4ISR);
the 8th IEEE International Enterprise Distributed Treasury Information Systems Architecture
Object Computing Conference (EDOC) 2004. Framework (TISAF); Federal Enterprise
127
Measuring the Benefits of Enterprise Architecture
5
Architecture Framework (FEAF or FEA); According to Wikipedia, the Return on
Treasury Enterprise Architecture Frame- Assets (ROA) percentage shows how prof-
work (TEAF); Department of Defence Ar- itable a companys assets are in generating
chitecture Framework (DoDAF); Extended revenue. Investopedia (http://www.investo-
Enterprise Architecture (E2A); Object pedia.com/terms/r/returnonassets.asp) notes
Management Groups Model Driven Ar- ROA as a useful indicator of how profitable
chitecture (MDA). The Australian Defence a company is relative to its total assets.
Force (ADF) has adapted the DoDAF to pro- Interestingly, Investopedia notes ROA as
duce the Defence Architecture Framework sometimes being known as ROI.
6
(DAF). http://en.wikipedia.org/wiki/Quality_Man-
3
http://en.wikipedia.org/wiki/Enterprise_ar- agement_Maturity _Grid (accessed 25
chitecture March 2007) but the original source is
4
According to Wikipedia, return on invest- cited as (Crosby, P. (1979); Quality is Free;
ment (ROI) is a calculation used to determine McGraw Hill)
7
whether a proposed investment is wise, and http://en.wikipedia.org/wiki/Observer_ef-
how well it will repay the investor. fect and http://en.wikipedia.org/wiki/Haw-
thorne_effect (accessed 12 Aug 07)
128
Section II
Leadership, Governance, and
Management
130
Chapter VI
The Criticality of
Transformational Leadership to
Advancing United States
Government Enterprise
Architecture Adoption
William S. Boddie
National Defense University, USA
Abstract
An effective enterprise architecture (EA) capability enables an organization to develop sound enterprise
plans, make informed human, materiel, and technology resource investment and management decisions,
and optimize key business processes. Despite U.S. Congressional legislation, U.S. Office of Management
and Budget guidance, and U.S. Government Accountability Office reports and recommendations, many
U.S. government leaders struggle in advancing EA adoption in their organizations. U.S. Government
leaders must embrace transformational leadership to advance EA adoption. The author presents the
Vision, Integrity, Communication, Inspiration, and Empowerment Transformational Leadership Model
that describes competencies U.S. Government leaders need to advance EA adoption. The author also
presents the Transformational Leadership and Enterprise Management Integration Framework that
describes the relationship between transformational leadership and enterprise management functions.
U.S. Government leaders must adopt this framework to realize improved enterprise performance.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
131
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
132
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
Architecture improves the effectiveness examines the extent to which organizations de-
and efficiency of government informa- scribe their current and target architectures and
tion resources: Architecture development describe their plans to transition from the cur-
is an integral part of the capital investment rent to the target architecture. The Use category
process. No IT investment should be made examines the extent to which organizations use
without a business-approved architecture. the EA for enterprise planning, resource invest-
(OMB, 2006, p. 4) ment decision-making, and management. The
Results category examines the extent to which
The OMB (OMB, 2007) also established the organizations realize performance goals as a result
Performance, Business, Service Component, of its EA. OMB (2007a) reported greater govern-
Data, and Technical reference models to enable ment-wide EA adoption in 2007 than it reported
government organizations to develop effective in 2006 and reported increased EA adoption
EA capabilities. The Performance Reference since 2004. Although OMB reported improved
Model enables organizations to anticipate and government-wide EA adoption, the GAO found
measure the impact of organizational inputs to less promising results.
processes, outputs, and enterprise performance
outcomes. The Business Reference Model enables
organizations to identify business functions U.S. General Accounting
used to deliver services to citizens. The Service Office/Government
Component Reference Model enables government Accountability Office and
organizations to describe the services they use
to perform enterprise business functions. The Enterprise Architecture
Technical Reference Model enables organizations
to describe the technical standards upon which The U.S. Government Accountability Office
their technology assets are based. The Data Refer- (GAO) is the U.S. Congress agency for monitor-
ence Model enables organizations to describe the ing and reporting U.S. government organization
data they process to deliver services to citizens. management performance information. The U.S.
These reference models were established to enable
organizations to advance EA capabilities and, by
extension, to use the EA capabilities to improve Table 1. GAO EA Reports (1998-2007)
enterprise performance. Further, OMB developed
U.S. Government organizational Number of reports
an EA Assessment Framework to evaluate orga- enterprise architecture report year by year
nizational EA capabilities.
1998 1
1999 1
Enterprise Architecture Assessment
2000 11
Framework
2001 14
2002 30
The OMB established the Enterprise Architecture
2003 36
Assessment Framework (EAAF) to evaluate
2004 45
government organization EA capabilities and to
2005 32
advance the use of enterprise architecture (EA)
2006 27
across the Federal government (OMB, 2006a, p.
1). The EAAF is based on EA Completion, Use, 2007 24
133
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
Government Accountability Office (GAO) is an and reported that the DoDs EA was incomplete.
independent, nonpartisan agency that works for To influence government-wide EA adoption, the
Congress. GAO is often called the congressional GAO published an EA assessment instrument.
watchdog because it investigates how the federal The GAO (2002a) published an EA assessment
government spends taxpayer dollars (GAO, 2007, framework to evaluate government organizational
para. 1). The GAO was established in 1921 by EA management. The GAO developed a maturity
the Budget and Accounting Act, is independent framework for enterprise architecture manage-
of the executive branch, and investigates how ment and reviewed architecture use in the federal
federal funds are spent. The GAOs name was government, specifically determining agencies
later changed to the Government Accountability development, implementation, and maintenance of
Office (GAO) in 2004 (GAO, 2007a, para. 1). these architectures, and OMBs oversight (p. 1).
The GAO publishes reports of its investigations The framework, titled, the Enterprise Architecture
of government executive branch organizations Management Maturity Framework (EAMMF)
management effectiveness and efficiency. The version 1.0, enabled government organizations to
GAO published numerous reports regarding earn EA management maturity ratings based on a
government-wide EA management. maturity stages 1 through 5. Stage 1 represented
The GAO began evaluating government-wide the least maturity and Stage 5 represented the
EA management in 1998 and, since then, con- greatest maturity. Using its EAMMF version 1.0,
ducted 221 reviews of government organizational the GAO found that only four percent of organiza-
EA programs. Table 1, GAO EA Reports From tions had effective EA management (p. 1).
1998 2007, reports GAOs EA reports in this The GAO (2003) published version 1.1 of the
period. EAMMF framework in 2003 and based the version
The GAO reports consistently found that on the 31 core EA elements found in the Chief
government organizations were significantly Information Officer Council A Practical Guide
challenged in EA management. For example, to Federal Enterprise Architecture (CIO Council,
the GAO found The Customs Service does not 2001). In its 2004 report, the GAO (GAO, 2004b)
have a complete enterprise information systems found the lack of an enterprise architecture as a
architecture to guide and constrain the millions key management weakness in major moderniza-
of dollars that it spends each year to develop and tion programs at a number of federal agencies
acquire new information systems and evolve (p. 1), found little change in overall maturity
existing ones (GAO, 1998, p. 1). In another between 2001 and 2003 (p.1), and found that
example, the GAO found that the Immigration Only 20 of 96 agencies examined had established
and Naturalization Service (INS) struggled in at least the foundation for effective architecture
developing an EA, that the INS EA was incom- management (p.1).
plete, and that the INS lacked a target architecture In its 2006 report, the GAO found that only
(GAO, 2000, p. 1). four of the 27 assessed organizations had ad-
The GAO concluded effective EA manage- vanced to Stage 3 on the EAMMF and reported
ment was critical to improving organizational that no organizations had matured beyond Stage
performance (2002). The GAO (2004a) reported 3. GAOs report title, Leadership Remains Key
that an effective EA was needed to enable the to Establishing and Leveraging Architectures for
Department of Homeland Security to integrate Organizational Transformation, emphasized the
22 previously independent federal agencies. The criticality of strong organizational leadership to
GAO (2006) found that the U.S. Department of advancing government-wide EA management.
Defenses (DoD) EA management was deficient The GAO stated The key to these departments
134
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
and agencies building upon their current status, Anderson (1998) found that transformational
and ultimately realizing the benefits that they cited leaders build leadership organizations and make
architectures providing, is sustained executive positive differences in organizations and in the
leadership, as virtually all the challenges that they lives of others wherever they go. Transformational
reported can be addressed by such leadership leaders climb the heavens, reach beyond the or-
(p. 1). This review of U.S. government-wide EA dinary, the predictable, the average, and chart
adoption leads to a very clear and concerning new territories and possibilities. These leaders
conclusion. reach, motivate, inspire, and pull others below
Despite extensive U.S. government oversight them upward to greater, unseen heights on the
including Congressional legislation, OMB policy way (1998). Egan (as cited in Anderson, 1998)
guidance, and GAOs assessments and recommen- stated, By stimulating, modeling, advocating,
dations, many U.S. Government leaders struggle innovating, and motivating, they [transformational
in advancing EA adoption. It is evident that gov- leaders] mold this culture, to the degree that this is
ernment oversight alone is insufficient to advance possible, to meet both internal and environmental
government-wide EA adoption. U.S. Government needs (p. 48).
leaders must adopt transformational leadership to Transformational leaders achieve the desired
advance EA adoption in their organizations. results through charisma, inspiration, intellectual
stimulation, and individualized consideration.
They use charisma to influence others to high
Transformational Leadership performance levels. They inspire and motivate
their followers by providing meaning and chal-
Leadership is influencing others to action. lenge to the objective (Bass, 1998). This inspiration
Transformational leaders persuade individu- increases team spirit, enthusiasm, and optimism.
als to achieve group goals (Bass, 1990, p. 11). Transformational leaders engage followers in
Transformational leaders enable organizations viewing meaningful attractive visions of the
to realize long-term organizational performance future. Transformational leaders stimulate their
improvement (Bass, 1990). Various researchers followers efforts to be innovative and creative by
found that transformational leaders improve long- questioning assumptions, reframing problems,
term organizational performance. and approaching old situations in new ways (p.
The transformational leader broadens and 5). The transformational leader pays special at-
elevates the interests of their followers and mo- tention to each individual follower. The leaders
tivates followers to consider the greater good individualized consideration helps develop suc-
of others rather than their own self-interests. cessive higher levels of potential.
Transformational leaders inspire and motivate The transformational leader enables organi-
others to do more than the followers originally zations to realize long-term goals and objectives
intended to do or thought possible (Bass, 1998). rather than just immediate results. As a result of
The transformational leader asks followers to a compelling sense of urgency, vision, and strong
transcend their own self-interest for the good of interpersonal communication skills, these leaders
the group, organization, or society; to consider generate a sense of urgency and excitement for the
their longer-term needs to develop themselves, followers and colleagues to contribute richly to
rather than their needs of the moment; and to their environment. Boddie and Newman (2006)
become more aware of what is really important identified vision, communication, inspiration,
(Bass, 1990, p. 53). and empowerment as competencies needed to ad-
vance government-wide EA adoption. The author
135
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
developed the Vision, Integrity, Communication, light bulb will not light. The electrical circuit is
Inspiration, and Empowerment Transformational based on the electrical engineering AND state
Leadership Model to describe the competencies principle. The AND state principle requires that
government leaders need to advance effective each required input element be sufficiently present
EA capabilities. for the circuit to fire. As a result, using the light
switch example, if any required input element is
missing, the light fail to light.
Vision, Integrity, The VICIE Transformational Leadership
Communication, Inspiration, Model requires each input element to be suffi-
and Empowerment ciently present. If a required element is missing,
transformational leadership will not result. Figure
Transformational Leadership Model 1, the Vision, Integrity, Inspiration, Communi-
cation, and Empowerment Leadership Model,
The Vision, Integrity, Communication, Inspiration illustrates this perspective.
and Empowerment (VICIE) Transformational
Leadership Model consists of vision, integrity, Vision
communication, inspiration, and empowerment.
These elements collectively represent the es- Vision is a critical transformational leadership
sence of transformational leadership. The VICIE competency. Transformational leaders articulate a
Transformational Leadership Model functions clear and compelling vision of the future desired
analogous to an electrical circuit. state. Whether the leader is the informal leader
An electrical circuit produces the expected of a group of playground children or the formal
output if the required elements are present. For leader of a very large and complex transnational
example, the typical electrical light switch op- organization, the leader articulates a clear and
erates in an on and off manner. If the required compelling vision of the desired future state. Ozar-
elements are present, the light bulb will light. alli (2003) found that transformational leaders
If any of the required elements are missing the create a dynamic organizational vision that often
vision
communication
inspiration
output
empowerment
required inputs
136
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
137
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
138
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
empowers and enables followers to accomplish anonymously ask questions regarding the trans-
the enterprise goals. They further found that ef- formation program and posted the responses for
fective communication empowers followers to organizational members to review, authored more
align their actions with the organizational goals. organization-wide e-mails, were more visible at
These authors also found that leaders gain respect corporate events, and delivered presentations
through listening to others. Of the 90% of the time relating the criticality of employee activities to
a leader spends communicating, almost half of the transformation. The FCC President and Chief
that time is spent listening to others (Klemmer & Executive Officer stated that:
Snyder, 1972; Nichols, 2004). Darling & Beebe
(2007) found listening and leadership go hand communication is at the heart of building a high-
in hand. Listening, more than speaking, is what performance culture - a culture where people are
leaders do; at least what good leaders should do fully engaged. Communication is vital. Without it,
(p. 81). leaders cannot effect positive change. Our internal
Harris (2007) found that transformational strategy recognizes employees as a primary audi-
leaders provide numerous communication feed- ence and a key conduit to the customer, the media,
back mechanisms such as face-to-face meetings, stakeholders and communities. Our strategic ap-
roundtable discussions, meals with organizational proach to internal communication significantly
staff members where the leader is available to contributes to business results. (p. 23)
talk to employees in a more casual and informal
setting (p. 12). Harris found that transformational Communication is a critical transformational
leaders, in addition to face-to-face meetings, also leadership competency. U.S. government lead-
provided opportunities for organizational mem- ers must communicate effectively to advance
bers to provide feedback in anonymous manners EA adoption. These leaders must also inspire
as some members might be uncomfortable being their organizational members to advance EA
totally frank with the leader. Garrett & Watson adoption.
(2007) studied transformational leadership dur-
ing the Farm Credit Canada (FCC) multi-year Inspiration
cultural transformational program. They reported
that FCCs significant transformational progress Effective leaders inspire followers to meaningful
was based on leaders who were taught to speak performance. Bass and Avolio (as cited in Higgs,
from the heart, listen to other perspectives, be 2003) defined inspiration as encouraging indi-
open and responsive to feedback and encourage viduals to challenge the status quo, to consider
personal and professional growth (p. 21). Garrett problems from new and unique perspectives and
and Watson reported that strong organizational to be innovative and creative (p. 276). Bass (as
leaders focused on delivering clear, consistent cited in Higgs, 2003), defined inspiration as the
messages about strategic enterprise outcomes ability of leaders to provide a clear sense of mis-
and corporation priorities and related individual sion, which leaders in turn convey to members
actions to business outcomes. and develop a sense of loyalty and commitment
FCC tracked key organizational messages, (p. 278). Griffith (2004) found that high school
adopted a multi-challenge approach, and re- principles in large metropolitan area, suburban
duced information overload (Garrett & Watson, school districts who inspired their teachers con-
2007). FCC leaders hosted monthly lunches for sistently realized significant school performance
organizational members, established an online outcomes.
capability in which organizational members could
139
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
Posner and Kouzes (2002) included inspira- leaders to a higher good, and to the people of the
tion as a key aspect in their work The Leadership organization and the significance of their work.
Challenge. Posner and Kouzes believed leaders They model the leader who lives and breathes
needed to describe their dreams and their [leader] passion for others and consequently see their
ability to life others spirits (p. 144). These authors work as serving others. (p. 530)
concluded, Its not necessary to be a famous,
charismatic person to inspire a shared vision. Kerfoot also found that transformational lead-
What is necessary is believing and developing ers establish bonds between themselves and their
the skills to transmit that belief (p. 144). followers based on trust, are passionate about the
An example of inspiring leadership is former vision, unleash potential by inspiring people from
U.S. President Ronald Reagan. Baldini (2007) within, truly love what they do, and care about their
cited Reagan as an example of inspiring leader- followers. Kerfoot found transformational lead-
ship and concluded: ers care about people, reawaken and open hearts,
listen to their followers, and commit to making
Few could rouse audiences as well as President differences in the lives of their followers.
Reagan. Consider his speech in the wake of the Sir Winston Churchill, former English Prime
Challenger disaster when he praised the bravery Minister, is an excellent example of inspirational
of the astronauts but also made it very clear that leadership. Throughout Germanys blitzkrieg
space travel would continue because it was impor- against England in World War II, Churchill in-
tant to our national identity. A more stern Reagan spired England to overcome the onslaught. Long-
lectured the Soviet Union in Berlin by challenging staffe (2005) reported Churchill unquestionably
the Soviet premier: Mr. Gorbachev, tear down communicated vision and encouraged innovation;
this wall. He was reflecting the hopes and dreams he inspired a nation, perhaps the world, with his
of free people everywhere. (para. 3) passion and determination (p. 80). Churchill
would explain the current realities, then inspire
Kerfoot (2001) found that transformational the team by offering them a vision for how things
leaders inspired organizational members to ef- could be, then tell them how to achieve this and
fective long-term action. Kerfoot reported that finally mobilize them into action (p. 80). Long-
transformational leaders: staffe concluded Churchill communicated vision
with passion and determination, inspiring those
instill an intrinsic drive that is fueled by a higher he led by action and example with courage and
purpose, a sense of mission, and a commitment to integrity (p. 83).
a vast array of possibilities. Inspiring leadership Transformational leaders inspire their follow-
unleashes creativity, enthusiasm, and passion that ers to performance excellence. U.S. government
motivational leadership cannot. The passion an leaders must inspire their members to advance
inspirational leader has is authentic, and surges EA adoption. These leaders must also empower
throughout the organization. These leaders truly their members to advance EA adoption.
believe that their role is to serve the people and
to enable them to reach their innate potential. Empowerment
When people are inspired, they feel the fire of
passion that will drive them intrinsically and Transformational leaders empower their organi-
independently to achieve the right thing. People zational members to realize extraordinary accom-
in an inspired organization feel passionate about plishments. These leaders empower organizational
the values and purposes, the commitment of the members with power, information, knowledge
140
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
and rewards (Raelin, 2004, p. 7). Raelin (2004) ronments, and have greater job performance (Sujan
found that transformational leaders share key in- et al. (1994), as cited in Ahearn et al., 2005).
formation with organizational members, dialogue Transformational leaders encourage collabo-
openly with these members, encourage members ration with organizational members to realize
to challenge leadership decisions without adverse enterprise performance effectiveness outcomes.
repercussions, and empower members to make Collaborative leadership emphasizes consensus
understandable mistakes. Raelin (2004) also building through engaging diverse individuals in
found that transformational leaders encourage dialogue and in building relationships by facilitat-
participative management, establish decentral- ing communication, nurturance, inspiration, and
ized organizational structures, and emphasize the mobilization of teams (Bryson & Crosby,
employee development. Herb Kelleher, former 1992; Chrislip & Larson, 1994, as cited in Fis-
Southwest Airlines CEO, reflected (as cited by chback, Smerz, Findlay, Williams, & Cox, 2007,
Raelin, 2004) that he hopes that when people p. 30). Transformational leaders energize and
think back about their time at work, they say focus people through and across organizational
that Southwest Airlines was one of the finest boundaries (Avery, 1999, as cited in Fischback et
experience they ever had; that it helped them al. 2007). Rogers, Pace, & Wilson (2002) studied
grow beyond anything they though possible (p. 21 remarkable organizational transformational
8). Gilbert Fairhold, Perspectives on Leadership experiences and found that empowering em-
author (as cited by Raelin, 2004), found that ployees was critical to effective organizational
people feel empowered when they are thinking transformation. Rogers et al. (2002) found that
contributors, not just physical extensions of the employee empowerment was critical to contact
managers capacities, ideas and creativity (p. 9). lens maker Wesley Jessens dramatic transfor-
Other researchers reported similar findings. mation. Wesley Jessens leaders empowered
Empowered employees have greater authority organizational members with critical informa-
and responsibility for their work that they would tion and delegated decision-making to the lowest
in more traditionally designed organizations organizational levels. As a result, Wesley Jessen
(Conger & Kanungo, 1988, as cited in Ahearne, transformed a $40 million annual loss into profit
Mathiew, & Rapp, 2005, p. 945.) Organizational in the first month of the new CEOs leadership
member empowerment is an important driver of and maintained profits in each subsequent quarter
organizational effectiveness (p. 945.) Transfor- (Rogers et al. 2002).
mational leaders create organizational cultures Empowered employees have freedom to
that increase employees self-efficacy and control, choose, think and respond, as appropriate, to
eviscerate conditions that foster feelings power- communication from others in the organization
lessness, and are as flexible as circumstances allow (Darling, 2005, as cited in Darling & Beebe, 2007,
(Ahearn et al. 2005). Transformational leaders p. 85). These authors found that Empowered
empower organizational members by delegating employees are fundamental to facilitating an
responsibility down the hierarchy so as to give entrepreneurial spirit throughout a developing
employees increased decision-making authority organizational setting (p. 85).
in respect to the execution of their primary work Transformational leaders empower organi-
tasks (Leach, Wall, & Jackson, 2003, as cited zational members to accomplish organizational
in Ahearn et al. 2005, p. 946.). Individuals with goals. U.S. government leaders must empower
higher self-efficacy levels produce greater effort, their members in their organizations to advance
are better able to manage challenging work envi- EA adoption. U.S. Government leaders must adopt
141
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
the VICIE Transformational Leadership Model of Homeland Security, and the U.S. Government
to advance EA adoption. Accountability Office. The model also resonated
The author presented the VICIE Transfor- greatly with these audiences. Further, the U.S.
mational Leadership Model at 12 conferences National Defense University (NDU) incorporated
in 2006 and 2007 including the 17th Information the VICIE Transformational Leadership Model
Resources Management Association International into the curriculum in five of its academic pro-
Conference in 2006, the ArchitectureGOV 2007 grams and the model was presented to over 400
Conference, and the 2007 Human Resources Gov- NDU students in 2006 and 2007. The model also
ernment 2007 Conference. The model resonated resonated greatly with the students.
greatly with these audiences. The author also The VICIE Transformational Leadership
presented the model to various U.S. Government Model describes the competencies needed to
organizations in 2006 and 2007 including the U.S. advance EA adoption. In addition to understand-
Defense Intelligence Agency, U.S. Army Under- ing these competencies, U.S. Government leaders
secretary for Financial Management, U.S. Army must understand how EA is situated within the
Chief of Staff for Intelligence, U.S. Department context of enterprise management. The author
transformational leadership
governance
enterprise architecture
portfolio management
project
operations and Support (as-is) business implementation operations and Support (to-be)
management
case
time
Strategy
goals
resources
goals Strategy
142
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
143
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
determine organizational culture. And a manage- universal functions that go across all of DOL and
ment culture that puts a strong emphasis on per- are starting to use the EA process in making IT
formance is one that promotes responsibility and investments. Weve used enterprise architecture
accountability (para. 5). Chao (2007a) stated that in our unified DOL technology infrastructure. The
Leaders advance and defend the interests of their EA helps identify the redundancies. (Mosquera,
organization and their colleagues. So executives 2005, para. 14)
need to be articulate, both in written and in oral
presentations. Thats why skillful communication The DOL performance outcomes were quan-
is absolutely essential to career advancement and tified in its Presidents Management Agenda
becoming a leader (para. 24). scorecard results.
Chao (2007a) cited vision, integrity, commu- The Presidents Management Agenda (PMA)
nication, inspiration, and empowerment as key is a key instrument through which government
leadership competencies. She further observed organizational performance is measured. The U.S.
that everyone can become a better leader through Executive Office of the President established the
practice and stated learning how to be an ef- PMA in 2001 to improve the management of
fective leader is not easy. In fact, its one of the the Federal government. It focuses on five areas
hardest things Ive had to learn in life. And, its of management weakness across the government
a never ending process (para. 28). Tom Weisner, where improvements and the most progress can be
former DOL Chief Information Officer (CIO), made (OMB, 2007c, para. 1). The PMA desired
(as cited in Mosquera, 2005), stated, Theres outcome is improved government performance in
always been leadership and commitment from Human Capital, Competitive Sourcing, Financial
the secretary [Elaine Chao] herself, throughout Performance, Expanded Electronic Government
the senior management and through the entire (which includes EA), and Budget and Performance
department in trying to achieve success in the Integration management (OMB, 2007c). OMB
five PMA areas (para. 16). evaluates each government organization in each
The DOL implemented governance as a area quarterly and assigns a color-coded rating
critical performance enabler. Wiesner (as cited in of Green, Yellow, or Red for each area. A Green
Mosquera, 2005) reported that strong governance rating represents success in meeting the evaluative
contributed to the DOLs performance outcomes area criteria, Yellow represents mixed results, and
and stated, It starts from the management review Red represents unsatisfactory performance.
board level, and the agency heads within the de- The DOL earned Green ratings in each evalu-
partment drill down to our technical review board, ation area in the June, 2005, report and earned
which is made up of senior IT representatives all Green ratings in subsequent reports through
from DOL agencies, and then we spin into the March, 2007. DOL Assistant Secretary for Man-
various subcommittees on capital planning and agement and former DOL CIO Patrick Pizzella
investment, enterprise architecture and security (as cited in Miller, 2005), stated, We got to green
(para. 18). Wiesner further stated: on human capital first and the rest just fell into
place. Human capital impacts every other agenda
Higher than that is a matter of using what youve item, and you can connect the dots (para. 11).
developed in terms of everyday management of Pizzella (as cited in Miller, 2005), further stated
your programs, business processes and IT invest- that Chao emphasized the criticality of leadership
ments. We have a strong governance process to throughout the department and reported Chao
address the EA requirements of the department. held monthly meetings on nothing but manage-
Weve developed an enterprise architecture for ment issues. In four years, she missed only one
144
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
meetingon Sept. 11, 2001 (para. 14). The legislation, OMB guidance, and GAO reports
DOL was the single government organization and recommendations, many U.S. government
to earn Green in all five PMA evaluative areas leaders struggle in advancing EA adoption and,
until the December, 2006, report, when the State as a result, miss opportunities to significantly
Department also earned Green ratings in all five improve their organizations performance. Trans-
evaluative areas (OMB, 2007c). OMB Deputy formational leaders enable their organizations to
Director for Management Clay Johnson (as cited realize long-term enterprise performance goals.
in Miller, 2005), stated, The Department of Labor These leaders establish and encourage shared
is the leader, the best, per the PMA scorecard. . visions, have extraordinary integrity, are strong
. . They are the first and only department ... to communicators, inspire others to excellent perfor-
have installed all the management disciplines and mance, and empower followers. The U.S. DOL,
habits which the president established as priorities by embracing transformational leadership and by
back in 2001 (para. 9). Johnson further reported adopting the Transformational Leadership and
that Chao made the PMA a department-wide pri- Enterprise Management Integration Framework
ority and had tremendous follow-through with elements, realized dramatic and unprecedented
her deputy and assistant secretaries (as cited in performance outcomes. Other U.S. government
Miller, 2005, para. 13). leaders must also embrace transformational lead-
Under Chaos leadership, the DOL realized ership to advance EA adoption and must also adopt
additional significant performance outcomes. The this framework to realize dramatically improved
DOL earned six consecutive clean financial audit long-term performance.
opinions through 2006, four U.S. Presidents Qual-
ity Awards through 2005, and an unprecedented
four consecutive years as the number one ranked REFERENCES
U.S. government organization on George Mason
Universitys annual government performance Ahearne, M., Mathiew, J., & Rapp, A. (2005).
report. The DOL was one of only four govern- To empower or not to empower your sales force?
ment organizations to earn Stage 3 on the GAO An empirical examination of the influence of
2006 EAMMF assessment report (GAO, 2006) leadership empowerment behavior on customer
and was one of only six government agencies to satisfaction and performance. Journal of Applied
earn the highest scores on OMBs 2007 EA as- Psychology, 90(5), 945-955.
sessment (FCW, 2007). Given the performance
Anderson, T. D. (1998). Transforming leadership
outcomes the DOL realized from adopting the
(2nd ed.). Boca Raton, Florida: CRP Press, LLC.
Transformational leadership and Enterprise
Management Integration Framework, other U.S. Baldini, J. (2007). How to master professional
Government leaders must also embrace trans- speaking. Retrieved on June 1, 2007, from http://
formational leadership to advance EA adoption www.cio.com/article/print/104611.
and must adopt the framework to improve their
Bass, B. M. (1990). Bass & stodgills handbook of
organizations performance.
leadership, theory, research, and managerial ap-
plications (3rd ed.). New York: The Free Press.
Conclusion Bass, B. M. (1998). Transformational leadership.
Mahwah, New Jersey: Lawrence Erlbaum As-
Many U.S. government leaders struggle in ad- sociates, Publishers.
vancing EA adoption. Despite U.S. Congressional
145
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
Banutu-Gomez, M. B. (2006). Great leaders know Garrett, K., & Watson, C. (2007). Defining the
that all change must start both at the top and the role of strategic comms at farm credit Canada.
bottom: The whole system must change. The Strategic Communication Management, 11(2),
Business Review, Cambridge, 6(1), 157-161. 20-23.
Boddie, W. S., & and Newman, E. M. (2006). Gorman, B. (2007). Building the buzz, the brand
Stan Boddie and Matt Newman defining effec- and the business at Motorola. Strategic Commu-
tive leadership. Retrieved on June 1, 2007, from nication Management, 11(4), 24-27.
http://www.gcn.com/cgi-bin/udt/im.display.
Griffith, J. (2004). Relation of principal transfor-
printable?client.id=gcn_daily&story.id=41598
mational leadership to school staff job satisfaction,
Chao, E. L. (2007). Speeches by secretary Elaine l. staff turnover, and school performance. Journal
Chao. Retrieved on June 1, 2007, from http://www. of Educational Administration, 42(3), 333-355.
dol.gov/_sec/media/speeches/20070130_Summit.
Harris, S. (2007). Supporting leaders through
htm
change. Strategic Communication Management,
Chao, E. L. (2007a). Speeches by secretary Elaine 11(4), 12.
l. Chao. Retrieved on June 1, 2007, from http://
Higgs, M.(2003).How can we make sense of lead-
www.dol.gov/_sec/media/speeches/20070503_
ership in the 21st century? Leadership & Orga-
APA.htm
nizational Development Journal,24(5/6),273.
Chief Information Officers Council (2001). A
Kerfoot, K. (2001). On leadership: From motiva-
practical guide to federal enterprise architecture.
tion to inspiration leadership. Pediatric Nursing,
Version 1.0. Washington, DC.
27(5), 530-531.
Darling, J. R., & Beebe, S. A. (2007). Effective
Kotter, J. P. (1995). Leading change: Why trans-
entrepreneurial communication in organiza-
formation efforts fail. Harvard Business Review,
tional development: Achieving excellent based on
73(2), 59-67.
leadership strategies and values. Organizational
Development Journal, 25(1), 76-93. Longstaffe, C. (2005). Winston Churchill, a leader
from history or an inspiration for the future. Indus-
FCW (2007). OMB rates agency EAs higher
trial and Commercial Training, 37(2/3), 80-83.
than ever. Retrieved on July 15, 2007, from
http://www.fcw.com/article103177-07-09-07- Miller, J. (2005). PMA yields turnaround at mis-
Web&printLayout managed agencies. Retrieved October 15, 2007,
from http://www.gcn.com/cgi-bin/udt/im.display.
Fischbach, L. M., Smerz, C., Findlay, C. W., &
printable?client.id=gcn&story.id=36519
Cox, a. (2007). Co-CEOs: A new leadership
paradigm for social service agencies. Families Mosquera, M. (2005). Tom Wiesner: Labors
in Society, 88(1), 30-34. e-gov guide. Retrieved October 15, 2005, from
http://www.gcn.com/cgi-bin/udt/im.display.
Forrester, D. P. (2006). The governments new
printable?client.id=gcn&story.id=36769
breed of change agents, leading the war on ter-
ror. Retrieved on June 1, 2007, from http://www. Osaralli, N. (2003). Effects of transformational
governmentchangeagents.com/documents/Gov- leadership on empowerment and team effective-
ernmentChangeAgents.com_WhitePaper.pdf ness. Leadership & Organization Development
Journal, 24(5/6), 335-344.
146
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
Posner, B. Z., & Kouzes, J. M. (2002). The lead- U.S. General Accounting Office (2002). Infor-
ership challenge (3rd ed.). San Francisco, CA: mation Technology: OMB Leadership Critical
Jossey-Bass Inc. to Making Needed Enterprise Architecture and
E-government ProgressGAO-02-389T. Retrieved
Raelin, J. (2004). The bottom line of leaderful
on June 1, 2007, from http://www.gao.gov/new.
practice. Ivey Business Journal Online, Jan/Feb,
items/d02389t.pdf
1-9.
U.S. General Accounting Office (2002a). Enter-
Rogers, P., Pace, S., & Wilson, P. (2002). Mak-
prise architecture use across the federal govern-
ing change stick. European Business Journal.
ment can be improved. Retrieved June 1, 2007,
14(1), 2-7.
from http://www.gao.gov/new.items/d026.pdf
Simmons-Welburn, J. & Welburn, W. (2006).
U.S. General Accounting Office (2003). A frame-
Leadership Lessons in a Climate of Social
work for assessing and improving enterprise
Transformation, Libraries and the Academy,
architecture management. Retrieved June 1, 2007,
6(4), 467-470.
from http://www.gao.gov/new.items/d03584g.
Stephenson, C.(2004).Rebuilding trust: The inte- pdf
gral role of leadership in fostering values, honesty
U.S. General Accounting Office (GAO) (2004). In-
and vision. Ivey Business Journal Online,1.
formation technology: The federal enterprise ar-
Udechukwu, I. I. (2007). Integrity: The courage chitecture and agencies enterprise architectures
to meet the demands of reality. Journal of Ap- are still maturing. Retrieved June 1, 2007, from
plied Management and Entrepreneurship, Fort http://www.gao.gov/new.items/d04798t.pdf
Lauderdale 12(2), 106-107.
U.S. General Accounting Office (2004a). Leader-
U.S. Congress (1996). Public Law 104-106, 110 ship remains key to agencies making progress
Stat. 186. on enterprise architecture efforts. Retrieved
June 1, 2007, from http://www.gao.gov/new.
U.S. General Accounting Office (1998). Customs
items/d0440.pdf
Service Modernization: Architecture Must Be
Complete and Enforced to Effectively Build and U.S. Government Accountability Office (2004b).
Maintain SystemsAIMD-98-70. Retrieved on June Homeland Security: Efforts Under Way to De-
1, 2007, from http://www.gao.gov/archive/1998/ velop Enterprise Architecture, but Much Work
ai98070.pdf RemainsGAO-04-777 Retrieved on June 1, 2007,
from http://www.gao.gov/new.items/d04777.pdf
U.S. General Accounting Office (2000). Informa-
tion Technology: INS Needs to Better Manage U.S. Government Accountability Office (2006).
the Development of Its Enterprise Architec- Leadership remains key to establishing and lever-
tureAIMD-00-212. Retrieved on June 1, 2007, aging architectures for organizational transforma-
from http://www.gao.gov/archive/2000/ai00212. tion. Retrieved June 1, 2007, from http://www.
pdf gao.gov/new.items/d06831.pdf
U.S. General Accounting Office (2001). DLA U.S. Government Accountability Office (2007).
should strengthen business systems modern- The GAO: An introduction. Retrieved on June 1,
ization architecture and investment activities. 2007, from http://www.gao.gov/about/history/in-
Retrieved June 1, 2007, from http://www.gao. troduction.htm
gov/new.items/d01631.pdf
147
The Criticality of Transformational Leadership to Advancing United States Government Enterprise
U.S. Government Accountability Office (2007a). U.S. Office of Management and Budget (2007a).
GAOs name change and other provisions of the Results of FY 2007 federal enterprise architec-
GAO human capital reform act of 2004. Retrieved ture assessment. Retrieved July 28, 2007, from
on June 1, 2007, from http://www.gao.gov/about/ http://www.whitehouse.gov/omb/egov/docu-
namechange.html ments/2007_EA_Assessment_Results_Sum-
mary.pdf
U.S. Office of Management and Budget (2005).
FDA uses ea to standardize and save with con- U.S. Office of Management and Budget (2007b).
solidation effort. Retrieved June 1, 2007, from OMBs mission. Retrieved June 1, 2007, from
http://www.whitehouse.gov/omb/egov/docu- http://www.whitehouse.gov/omb/organization/
ments/FDA_FINAL.pdf role.html
U.S. Office of Management and Budget (2006). U.S. Office of Management and Budget (2007c).
FEA practice guidance. Retrieved June 1, 2007, Presidents management agenda. Retrieved June
from http://www.whitehouse.gov/omb/egov/docu- 1, 2007, from http://www.whitehouse.gov/omb/
ments/FEA_Practice_Guidance.pdf budintegration/pma_index.html
U.S. Office of Management and Budget (2006a). U.S. Senate Governmental Affairs Committee
Federal enterprise Architecture program EA as- (1994). Computer chaos: Billions wasted buying
sessment framework version 2.1 Retrieved June federal computer systems. Investigative report of
1, 2007, from http://www.whitehouse.gov/omb/ Senator William S. Cohen. Retrieved June 1, 2007,
egov/documents/OMB_EA_Assessment_Frame- from https://acc.dau.mil/CommunityBrowser.
work_v21_Final.pdf aspx?id=22163
U.S. Office of Management and Budget (2007). Zablow, R. J. (2006). Creating and sustaining
FEA consolidated reference model document an ethical workplace. Risk Management, 53(9),
version 2.2. Retrieved July 15, 2007, from http:// 26-29.
www.whitehouse.gov/omb/egov/documents/
FEA_CRM_v22_Final_July_2007.pdf
148
149
Chapter VII
Adaptive IT Architecture as a
Catalyst for Network Capability
in Government
Jay Ramanathan
The Ohio State University, USA
Rajiv Ramnath
The Ohio State University, USA
Anand Desai
The Ohio State University, USA
Abstract
Public institutions that are organized in hierarchies find it difficult to address crisis or other unique
requirements that demand networked solutions. This chapter first provides a prescriptive transaction-
based method for achieving such networking organizations with information technologies (IT) and then
discusses how the organization becomes more effective in non-routine responses to citizen requests.
We illustrate how the prescriptive transaction-based enterprise architecture1 framework2 was used for
decision-making in a multi-year interdisciplinary industry-university collaboration resulting in a suc-
cessful 311 system.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Adaptive IT Architecture as a Catalyst for Network Capability in Government
Requests, which are the defining characteristics Operations dimension aligns costs and
performance
of crises. Hence the underlying ACE framework Infrastructure use dimension provides
offers a Requirements-Execution-Delivery based services for transactions
execution of
prescription for planning and execution of a strat- requests transactions deliverables
egy through the alignment dimensions where IT
plays a catalyst role in building networks that cut Dynamic use of
services within
across organizational silos. We illustrate how the transactions
ACE-based analysis also succeeds in justifying
the networking and the prioritization in complex
organizations. Infrastructure agents - Actual resources and components .
These include both organizations and systems . These
are the silos made of hierarchies , static models etc.
Figure 1: ACE architecture framework for Building Network Capability on Existing Silos.
151
Adaptive IT Architecture as a Catalyst for Network Capability in Government
enable hierarchical public enterprises are not tures (SOA) within which existing applications can
built to adapt to each request. Geared currently be treated as agents and components providing
towards optimizing repetitive routine requests, specific WebServices that is accessed within con-
these systems assume predictability and process texts [Gortmaker et al 2004]. With these advances
stability. This assumption has commonly led to in place, services of agents (human services and
redundant yet distinctly separate organization application services) can be invoked dynamically
and IT elements. The presence of organization by a logical workflow layer to deliver on the
and IT silos makes coordination and information requirements of a Request [WFMC]. Thus, with
sharing difficult [Malone and Crowston 2001]. workflow and SOA, IT has evolved from being
This arrangement has proved effective for simple merely a mechanism in a programmers produc-
requests. However, the environment of public en- tivity tool-kit into an electronic Business Process
terprises is increasingly more dynamic and often Management (eBPM) which is a logical business
turbulent [Salmela and Spil 2002; Thietart and modeling and execution tool [BPMI, Ramanathan
Forgues 1995]. Large bureaucratic organizational 2099, Ramanthan and Ramnath 2004]. Along
systems based on stable models are not designed with dynamic binding of Requests to services,
to be nimble and become effective in the presence execution-level monitoring and accountability of
of rapidly changing environments. It is our conten- service and resource utilization is now possible.
tion that it is possible to create organization-IT Thus upon completion of a response to a Request,
alignment that yields effective performance even performance-related measurements task span
under dynamic uncertain conditions. time, resource time used, quality incidents. - can
be readily captured electronically.
Relationships Between organization Pat-
terns and Technology Patterns: Organization Patterns for Enterprise Architectures: En-
theorists contingency theorists in particular terprise architectures are typically considered to
argue that organization performance is a function have high-level definitions of the processes, data,
of the fit between organizational patterns, their applications, and technology needed to support the
environment, internal processes and technology business. However, there are several challenges
[Child 1972; Donaldson 1999]. Organizations that with current approaches. The links among busi-
adopt the pattern or forms that best fit the relevant ness planning, organizational patterns and imple-
combination of task, technology, and environment mented software architecture is often missing.
are likely to perform at a high level. While the Thus, high-level plans often flounder for lack of
connection between organization patterns and en- a clear connection to actual system development
vironment has been studied extensively [Laurence guided by a detailed strategy implementation
and Lorsch 1967; Drazin and Van de Van 1985], plan [Cross 2002].
research is needed to examine how interactions More generally, as the world becomes de-
between organization and technology patterns mand-driven and linear models become obsolete9,
affect performance [Gresov 1989]. we look to principles from Complexity theory
As characterized previously, IT must in the to reassure us that complex behaviors can
near future support the networking of public or- result from a small number of simple recursively
ganizations so they can embrace externally-driven applied patterns [Peitgen et al 1992]. Others have
variation and non-routine Requests. Recent IT shown [Kelly and Allison 1998] many complex
technological advances [Agha 2002, Anderson enterprises are composed of nested organizations
2001, Bauer 2004, DAML8, Digtalgovernment] that are similar in structure; exhibiting self-
now allow us to build Service-Oriented Architec- similarity. The study of patterns itself has had a
152
Adaptive IT Architecture as a Catalyst for Network Capability in Government
153
Adaptive IT Architecture as a Catalyst for Network Capability in Government
Page 7 of 25
154
Adaptive IT Architecture as a Catalyst for Network Capability in Government
roles based on the requirements of a specific the customer-provider agents so that the transac-
Request. And, tion can complete successfully with a satisfactory
Infrastructure roles pattern: Identifies the deliverable. The transaction captures both the
prototypical agent service or service clusters service roles needed for response and the result-
required to service and execute each Request ing execution performance. That is, the same
and RED type. In addition, these roles allow pattern structure is used both for planning and
dynamic assignment, if needed, to achieve execution. Finally, note that at the milestones R, E,
delayed binding between the RED trans- D contributing performance to the corresponding
action and the underlying infrastructure dimensions are as follows:
(agents that are either internal or external RED execution begins with the Request from
to the organization). the customer (a citizen, a government official, or
any entity that can make a demand of the system).
The concepts, patterns and their relation- The arrows from the transaction execution of
ships are in Figure 2 and discussed in detail as Figure 2 B, illustrates the relationship between
follows. the RED execution and the ACE dimensions or
perspectives. We see the performance contribution
Dimension: The dimensions illustrated in starting from the infrastructure use dimension
Figure 2 B structures the organizations planning and working outward. We next see how the scale
and execution value-chain of stakeholders. The and scope of planning and execution interest in
performance of each dimension is aligned with RED performance is different in each dimension
(represented as ) neighboring dimensions. This to meet the needs of its specific stakeholders:
alignment is also external-environment-focused.
The forces identified on the organization in Figure Strategy: The external environment that
2 A as in [Porter 98] are addressed by structuring encourages or discourages the growth of
the organizations internal stakeholders and what certain types of Requests is monitored and
they need to achieve effective responses and cus- trends identified from the organizations
tomer satisfaction for each Request. That is: strategic perspective.
Infrastructure services and use and Request Business: The value provided by collections
satisfaction Operations performance of groups of Request types and instances is of interest
of requests Business value Strategy satis- from the perspective of creating value and
faction. determining investments.
This alignment (similar to the balanced
scorecard [Kaplan and Norton 1996]) along the
internal value-chain between the customer-and- Table 1.
provider organizations of the public enterprise is RED Transaction Milestones 1. Dimensions
as required by contingency theory. This align- Requirements negotiated between the Operations
ment is also enabled through the performance of customer and provider and identification Dimension
of service capacity to be used, costs, and
each and every Request by the RED transaction response time
discussed next. Execution results in value creation for the Strategy
customer measured through customer satis- Dimension
faction and related quality assurance
RED Analysis12 Pattern: Strategy is devised
Delivery in the customers environment Business
for each Request type originating from the external resulting in cost accounting and value to the Dimension and
dimension using the RED pattern for analysis. The organization, performance feedback to the Infrastructure
infrastructure Dimension
RED structure guides the interactions between
155
Adaptive IT Architecture as a Catalyst for Network Capability in Government
Infrastructure use: The roles needed to Triage implements policies by which agents
service each RED transaction type are within the organization are assigned to
identified. These roles are assigned actual RED roles and prioritizes Requests. Since
shared or dedicated resources such as people, this makes it is possible to delay the assign-
IT components etc. Upon assignment, the ment of roles till the RED execution, there
RED transaction executes to complete the is flexibility in determining which agents
response. Note that the roles have associ- are engaged. This flexible scheduling abil-
ated operating-level agreements (or OLAs) ity allows for the flexible use of existing
required to successfully complete the RED resources.
transaction and service-level agreements (or The agents can be from different organiza-
SLAs) that are of interest to the stakeholders tions and yet be assigned to the roles of
in the different dimensions13. The stakehold- a RED to form a temporary coalition to
ers in the infrastructure dimension must complete the transaction. For example, the
ensure value is provided to operations. roles may be supplied by departments or
Operations: The performance of each spe- agencies across political jurisdictions such
cific type of Request and all its instances is as the corporate municipal boundaries, and
of interest to the department (team, group) across geographic communities such as
and its director (leader). The operational neighborhoods and precincts.
stakeholders ensure value is provided to RED transactions that network across
business. boundaries can be audited (for example, to
identify cost implications) providing insights
Finally, a RED transaction step can initiate into questions such as: How often do non-
other RED transactions at any time. Note also that routine Requests involve multiple boundar-
while delivery completes the response transaction, ies? (Note, while this can be implemented
there can be a variety of reasons why transactions [Holowczak 2003], such information is dif-
do not complete. (This is due to various reasons ficult to obtain with current IT systems.)
lack of capacity, customer dissatisfaction etc.
We will not address such issues here due to limi- Infrastructure Roles Pattern: This final pat-
tations of space.) tern focuses on the individual and shared agents
in the infrastructure that perform potentially
Triage pattern: This pattern is a fundamental multiple roles within multiple REDs. To ensure
dynamic interaction pattern between the incom- quality of service (i.e. meet OLAs) that in turn
ing non-routine Requests and the infrastructure ensures RED SLAs, each service or cluster of
needed for servicing that Request. While it pro- services is treated as a whole and monitored as
vides the customer with a single interface into it is used within the specific REDs. The result
the organization, it also handles the assignment of the monitoring is a precise measure of use,
of initial resources for execution and provides the quality delivered and feedback for improvement
networking capability. of agents and the overall infrastructure.
The arrival of a Request causes the triage Together the patterns provide flexibility to
organization (examples of triage pattern include assemble response systems that network across
the help desk, customer support center) to first organizations and agencies. For example, the
understand requirements, clarify the Request and delayed binding of RED roles to the underlying
apply rules to assign initial resources to RED roles. infrastructure at triage provides dynamic capa-
In this context it is important to note: bility. Within a larger crisis-management context
156
Adaptive IT Architecture as a Catalyst for Network Capability in Government
implementing a series of IT improvements. However, the rate of IT solution deployment slow
when, for example, tax revenues declined. The City used our team to help develop a strate
plan to guide the IT implementation. We next illustrate how the ACE framework informed
architecture team as they developed the DOT strategy.
Figure 3. The ACE framework products needed for a dynamic networked enterprise
Figure 3: The ACE framework products needed for a dynamic networked enterprise.
[Arens 2002, NIMS]), the interaction with actual Ohio and 15th largest in the country. Population
infrastructure agents required to address the needs growth has been facilitated by a liberal annexa-
ACE TEAM AND WORK PRODUCTS: The ACE architecture team made up of IT architects
of an incoming Request is determined by policies
customer facing account managerstion policy the City services over 200 square
govern by using the patterns to create the enterprise-spec
implemented at triage. These policies can begin miles
architecture representation and work products of territory. An expanding
(Figure 3) throughservice
followingarea and
steps:
with the rules determining
1.
which Requests should a growing population have combined
Catalog external Request types and performance targets to reflect the strategy to place
be handled first and whoperspective.
should handle them. stress on existing response systems. The current
Current customer2. relationship
Catalog ofmanagement Mayorfor
service roles needed has instituted
each a covenant
RED type, identifythatSLA includes
performance targets.
and enterprise systems Consolidate
have simple customer-
and prioritize across Requests, from strategic value,bebusiness
a guiding principle that technology will a key value and
specified priorities to determine
investmentwhenperspectives
a Request (aligning
tool to achieve
with 1). city objectives, namely improving
should be handled. In3. such systems there is also service responses.
Plan the agents and their availability and capability To this end, theroles
to fill City and
consoli-
meet SLA
a tendency to mark Requests as critical or high. dated its IT operations under
performance objectives - a business process perspective (aligning with a Department of 2).
Requests with lower 4.priorities or secondary Re-
Execute responses driven by triage rules to bind the needed RED rolesato available age
Technology (DOT) and began implementing
quests are typically not entered
services because
to meetthey are (aligning
OLAs series of
withIT improvements.
3). However, the rate of
unlikely to be addressed
5. anyway. Policies should IT solution deployment
Identify services used for each transactions (aligning with slowed when, 4).for example,
also be designed, for6.example, to create
Continuous a learn-
improvement -tax
for revenues
each RED declined.
monitorThe City used
service our team feedback and u
performance
ing environment or even thatbuildtoaninform
organizations to help develop
the next improvement cycle. a strategic plan to guide the IT
capacity. implementation. We next illustrate how the ACE
The work products identified in Figure framework informed
3 were the architecture
created based on team as they
a series of interviews of
various department directors and developed team members the DOTbystrategy.
the ACE Architecture teams. The A
The Citys Strategic
architecture team consolidated and prioritized across all the citys RED transactions using
Technology Plan
work products for decision making. ACE team how
We show and Work
these products: Thesteps
prescriptive ACEapplied to the c
architecture team made up of IT architects and
The illustrative case used here is based on the customer facing account managers govern by us-
City of Columbus which serves as the state capi- ing the patterns to create the enterprise-specific
tal of Ohio. As a result of significant population architecture representation and work products
growth, the City is now the most populous in (Figure 3) through following steps:
157
Adaptive IT Architecture as a Catalyst for Network Capability in Government
1. Catalog external Request types and per- use that to inform the next improvement
formance targets to reflect the strategy cycle.
perspective.
2. Catalog of service roles needed for each RED The work products identified in Figure 3 were
type, identify SLA performance targets. created based on a series of interviews of the vari-
Consolidate and prioritize across Requests, ous department directors and team members by the
from strategic value, business value and ACE Architecture teams. The ACE architecture
investment perspectives (aligning with 1). team consolidated and prioritized across all the
3. Plan the agents and their availability and citys RED transactions using the work products
capability to fill roles and meet SLA per- for decision making. We show how these prescrip-
formance objectives - a business process tive steps applied to the city. The responses were
perspective (aligning with 2). captured in spread sheets as illustrated in Figure
4. Execute responses driven by triage rules to 4. The types of work products aligning the ACE
bind the needed RED roles to available agent dimensions within the city are discussed next.
services to meet OLAs (aligning with 3).
5. Identify services used for each transactions 1. Request types and performance targets; Page 12 of 25
(aligning with 4). strategy Dimension: As with many orga-
6. Continuous improvement - for each RED nizations, the city had already defined its
monitor service performance feedback and strategy - primary citizen Request types
The responses were captured in spread sheets as illustrated in Figure 4. The types of work
Figure 4. At-a-glance workaligning
products product the
spreadsheets and sample
ACE dimensions responses
within corresponding
the city to Figure
are discussed next. 3
Business dimension 2: Catalog of RED transactions; Priorities and Performance, Roles, SLAs for each service type
Requirements Execution Delivery
Throughput
Request type FTE used (Service Roles (Service Roles (Service Roles Business value Priority
SLA
Forces: competition, used) used) used)
economics, substitutes,
compliance Roles used: Legal, CRM, Website
Complaints 10 per day 3 Administration => Medium Medium
posting
Operations dimension
Environment and 3: Catalog of Infrastructure (ORG & IT) Services, OLAs, Availability
strategy REDs - where used,
Resource type Total volume used Availbility OLA
role, priority of use
Complaints|CRM|high
<Server> 70% 30% Response time
All|Mail|very high
Agent IT
services Services
Figure 4: At-a-glance work product spreadsheets and sample responses corresponding to Figure 3.
1: REQUEST TYPES AND PERFORMANCE TARGETS; STRATEGY DIMENSION: As with many
158
organizations, the city had already defined its strategy - primary citizen Request types handled
by its departments. With each type there were numbers and targets which were stated as
Uimprovements. Here the Ucould be a positive or negative number. For example, weed
Adaptive IT Architecture as a Catalyst for Network Capability in Government
handled by its departments. With each type Within the business process dimension,
there were numbers and targets which were the objective is to manage agent OLAs to
stated as improvements. Here the achieve the performance SLAs at each RED
could be a positive or negative number. For milestone (e.g. 10 per day for complaints).
example, weed abatement target was a 4. Triage: Request classification, role as-
negative number that implied a reduction signment, RED execution perspective:
was desirable to control undesirable ele- As in Figure 4, the as-is RED types overall
ments, but might need additional service execution performance towards each
capacity and investment to accomplish it. dimension is identified. Also each REDs
The catalog of Request types is identified roles, sub-REDs and needs were explicitly
in the strategy/environment dimension. captured and related to the value to business.
2. Catalog of RED transactions; Priorities Flexibility in role assignment is identified.
and Performance, Roles, SLAs for each 5. Service Monitoring and Continuous Im-
service type; business Dimension: This provement: RED transaction execution
planning step created the logical RED struc- metrics; an improvement perpective:
tures that relate the Request types initiated Since the basic goal of an IT strategic plan
in the environment to the responding roles is to develop a precise road map that takes
and desired performance within providers the city from as-is to to-be with a prioritized
enterprise. As in the business dimension of set of projects, we needed to take individual
Figure 4, for the complaint Request type, department work products and consolidate
the RED milestone and Roles specifics (i.e. and prioritize across all departments. This
CRM, administration etc.) and business was accomplished by the ACE team as fol-
value are all identified. lows.
3. Catalog of Infrastructure (IT) Services,
Availability and OLAs; operations Di- Analysis and Decision-making leading
mension: Using the output of step 2, this to 311 Implementation: As mentioned before,
step takes the perspective of each agent and the ACE architecture team was composed of
service and determines where it is used by selected business analysts, system architects, and
specifically identifying the RED roles sat- departmental directors. The use of the strategic
isfied. For example from the perspective of IT planning process is illustrated in Figure 5.
the CRM service, it is use in the complaint The primary role of the ACE team is to develop
transaction but it also used in many others. the application portfolio for investments through
R ED Application
Perform ance delivery
159
Adaptive IT Architecture as a Catalyst for Network Capability in Government
160
Adaptive IT Architecture as a Catalyst for Network Capability in Government
management at the City of Columbus. Part of the (This is the expected result of traceability
funding for the 311 Project was obtained from the due to capturing of metrics). .
Department of Justice via a grant. As a require-
ment of the Federal grant, an impact evaluation Approach to Indirect impact: In addition to
on crises-management had to be conducted. evaluating the direct impact of 311, we believed
that a very important benefit of 311 would be as
Evaluation Approach an integrative capability for creating effective
informal networks within the City. We decided to
Approach to Direct Impact: Three areas of investigate this integrative capability through the
direct 311 impact on crises management were specific lens of emergency and crisis management.
identified using guidelines from the Office of In particular, we sought to evaluate whether and
Community Oriented Policing Services outlined how a 311 system, its stakeholders and its support-
in [COPS03-1]. These are listed as follows, in ing services architecture would serve as a catalyst
order of importance: for creating network competencies for delivering
critical, non-routine services. As described in
Workload reduction of public-safety-related [Mendonca 2007] non-routine response requires
departments and divisions: The impact of emergent improvisation by dynamically created
311 in enabling departments and divisions in adhocracies. Thus, we were looking for how
the first line of support with respect to safety 311 may catalyze competencies such as:
(Department of Public Safety, Department
of Health) to improve their performance Activation: i.e. enlisting participation in
by taking away the distraction of handling networks;
non-emergency requests and thus allowing Framing: influencing the operating rules,
them to focus on emergency operations. prevailing values, and norms while altering
(Note that this ties to the Triage pattern the
enables different policies to be designed Perceptions of the participants, in response
and applied.) to emergent phenomena;
Information clearing-house: The ability Mobilizing: developing a view of the stra-
for 311 to serve as an information clear- tegic whole and an ability to develop and
ing-house, i.e. as a unified contact and achieve a set of common objectives based
information dissemination point to assist on this whole; and
in the management of crises. (This ties to Synthesizing: creating the environment
the requirements gathering for each Request for interaction among network participants
and then information sharing.) by blending perceptions [Agranoff 2001].
Community Policing: The ability of 311 Instead of legal authority as the factor that
to provide data to pinpoint trends (such as binds actors, we wished to see if managers
trends in crime, or population demograph- now rely on trust when managing across
ics), detection of unanticipated events (such silos.
as the prototypical Baltimore example of
the detection of a West Nile virus outbreak Tool used: Both structured interviews and col-
from increasing bird deaths) and the ability lected data were used in our evaluation. We used
to identify correlations among trends (such information collected by 311 in terms of addresses
as the correlation of vacant homes to crime) mapped to GIS coordinates for each Request. We
is important in order to anticipate crises. correlated these records with either existing data
161
Adaptive IT Architecture as a Catalyst for Network Capability in Government
available through census tract or publicly available The Department of Public Safety was asked
demographic data indexed by zip code. the following specific questions:
The interviews consisted of questions asked
in a setting intended to encourage discussion 1. Has there been a reduction in 911 overtime
rather than precise answers. Certain questions or budget during this past year?
were repeated in order to elicit a broader range 2. Has there been an increased ability for 911
of answers. All departments were asked the fol- operators to take on additional calls because
lowing questions: there are less non-emergency calls?
1. Have you heard of the Citys ColumbuStat The following Departments were inter-
311 system? viewed:
2. In a few words, could you describe it to
us? 3. Public Safety
3. What is your evaluation of 311? 4. Health
4. How are your Dept.s processes and roles 5. Public Service
integrated with 311? 6. Public Utilities
5. Give examples of how 311 data has benefited 7. Community Relations
or could have benefited your organiza- 8. Recreation and Parks
tion? 9. Department of Development
6. What additional features should exist or
what additional data can be collected in 311 We summarize as follows the direct, indirect,
to assist in the execution and improvement and potential impact.
of your processes?
7. What change management or cultural as- Evaluation of Direct and Indirect
pects have needed addressing because of Impact
311?
8. How has 311 been integrated into your Overall the evaluation concluded that the City
departments systems, especially its work- of Columbus has established a successful 311
order system? program, and that the 311 call-center is now an
9. How have you incorporated 311 into your established asset of the City. The 311 system has
Crisis Management and Disaster Recovery successfully transitioned from a technology proj-
plans? ect in the Department of Technology (DoT) to a
10. What other benefits do you see from 311? service-delivery asset managed by the business
11. What integration issues do you see with specifically the Department of Public Service
311 and existing systems in your organiza- (DPS). The specifics are as follows.
tion?
12. Has your knowledge about the operations and Evaluation of direct impact: The City
capabilities of other departments increased has begun to make progress in integrating 311
over the past year? In what manner? more deeply into the Citys day-to-day business
13. In what manner, other than 311, does your processes, and making it a key source of data
Dept. get citizen Requests for service? How in measuring and managing the Citys service
many such Requests do you get? delivery. In particular, DPS and DoT are work-
ing towards:
162
Adaptive IT Architecture as a Catalyst for Network Capability in Government
1. Safety related cost and workload reduction: to deal with special needs in particular
Leveraging 311 to reduce costs and person- needs of crises management: This is being
nel workloads in City departments that have done by extending the capabilities of 311 (for
a direct responsibility for public safety: In example, by moving to a 24x7 operation)
stead of calling 911, residents are being en- and by adding the necessary variation points
couraged to route non-emergency calls to within the 311 processes and competencies
311. Additional service Request types have and its organizational architecture to (a)
been added to suitably characterize these deal with areas of citizen concern such
calls within 311, so they may be tracked as health and safety where specialized
appropriately. expertise needs to be made available and (b)
2. Information clearing house: 311 is being develop flexibility and extensibility in the
utilized as clearing-house for resident- software, as well as the personnel, needed
relevant information. Processes have been to handle the ad-hoc information intake and
established to be able to rapidly update the dissemination that will be the requirement
311 knowledge-base and also to quickly get during a crisis.
new information to 311 operators at short 7. Integrating it with Crisis-Management Plan-
notice. ning: Once (6) has been addressed, DoT and
3. Maintaining high-level support for 311: DPS plan to actively promote the use of 311
Continuing to remind the Mayor and key in crisis-management through incorpora-
stakeholders of the City of 311 and ensuring tion into the Citywide crises-management,
sufficient DoT representation in all strategic business continuity and disaster-recovery
and any City-wide or cross-Departmental plans.
operational planning and execution. 8. Phase-out of other access to City services:
4. Raising awareness among users and stake- As 311 became established; the diverse call-
holders: Marketing it both with residents centers within the City have been merged
and internally within the City. The desire into 311 and eliminated. Listings of several
is to make sure 311 stays front and center of direct-access numbers from Government
stakeholders consciousness, and being able section of the telephone directory (the Blue
to confirm 311 penetration by incorporating Pages) have been removed and replaced by
systematic feedback mechanisms into the 311. The phasing-out of additional direct
awareness raising process. lines is in the planning stages.
5. Integrating 311 into internal Departmental 9. Building a data warehouse: The City plans
business processes: The work-order systems to create a data warehouse with 311 data
used by Departments and Divisions are being integrated with data from other call centers.
integrated with 311. A range of integration This data warehouse is an essential enabler
architectures must be designed to deal with for data-driven community policing initia-
the different paradigms by which work is tives.
allocated in different departments. A next 10. E-Gov: In the recent E-Government initia-
step will be to integrate 311 data into the tive, 311 has been identified as a foundational
performance reporting systems within each component. The E-Government initiative
department. has been prioritized by citizen-facing re-
6. Extending the capabilities of 311: The capa- quirements, which will mean that 311 will
bilities within the technical and organiza- become the point of support and assistance
tional architecture of 311 need to be extended for the electronic services delivered.
163
Adaptive IT Architecture as a Catalyst for Network Capability in Government
Generally speaking, 311 has had a positive im- currently no ad-hoc capability in 311, such
pact. All the personnel we interviewed were aware as support for online collaboration, and for
of it and encouraging with respect to its continued emergent processes. Thus, new information
and expanded use. For example, the Department to be disseminated is typically supplied
of Health expressed interest in using 311s after- through email to the call center coordinator
hours capability to extend availability of services. to be broadcast to all call center operators.
311 has helped to understand operations of other Use and support of 311 for continuous
departments in cross-over areas (such as rodent improvement in Departmental processes,
control between Health and Public Service, and including those implemented within the 311
in cross-departmental business continuity discus- system. Use of 311 metrics in continuous
sions). Interviewees have also stated that 311 has improvement: We were unable to discover
helped to systematize internal processes. what Departmental processes existed for
Issues highlighted with 311 were generally continuous improvement. However, 311
concrete and backed by considered and thought- metrics were extensively used for continuous
ful opinion. For example, Health had (a) not pro- improvement in certain departments (Public
ceeded to transfer their after-hours call center to Service and Public Utilities), but not yet in
311 because it was not currently available 24x7 others (Health).
and (b) had not transferred its normal call center Change in support of City value systems for
operations to 311 either, because of concerns that increased inter-Departmental collaboration
regular 311 operators would not be able to dissemi- as a result of 311: All the interviewed Depart-
nate health-related information because of their ments that already collaborated prior to 311
lack of medical expertise. Certain departments, and stated that they continued to do so. Few
for instance, Health and Utilities continue to use departments reported that this had changed
their separate lines. A 311 call is transferred to at a Department leadership level due to 311.
these lines, which remain active and are directly However, knowledge may be spreading at
called by service requestors. the operational levels within the City. For
Our evaluation is summarized as follows: example, Department of Public Utilities
reported that staffs knowledge of other
10. The general impression of 311 is good. 311 departments had increased due to 311.
is seen overall as a success, and is now an Changes in relationships and linkages across
established asset of the City. departments attributable to 311: Depart-
11. Progressing beyond its non-emergency call ments that typically collaborated prior to 311
center focus to evolve into an integral part (such as Health, Safety and Public Service)
of a crises-management process remains a reported a better understanding of others
challenge. processes and constraints after 311.
Increased internal collaboration within
Evaluation Indirect Impact of 311: As Departments due to 311: This was reported
aforementioned, the indirect impact of 311 was by the Department of Public Service only.
evaluated through structured interviews and the Changes in City and Departmental opera-
discussions generated during the sessions. Our tional plans after 311: The Department of
evaluation is as follows: Public Service was the only Department
reporting changes in such plans after 311.
Capability of 311 and its service architecture Use of increased visibility of intra- and
of being used in an ad-hoc manner: There is interdepartmental processes for exposing
164
Adaptive IT Architecture as a Catalyst for Network Capability in Government
and resolving accountability and coordina- 311 data into the performance reporting
tion issues within City Government: The systems within each department.
Department of Public Services reported 15. Develop the necessary capability within the
increased accountability due to visibility in 311 technical architecture, variation points
the assignment of City personnel to service within the 311 processes, and competencies
Requests. within an organizational architecture to deal
An increased ability to re-purpose resources, with the specialized areas of citizen concern
such as call-handlers and responders for such as health, safety and neighborhood
example, 911 operators switching to 311, and services. Develop the flexibility and exten-
City staff being made available for activities sibility needed to handle ad-hoc information
associated with emergency response: There intake and dissemination into 311. Establish
was discussion around this topic, but no a Disaster Recovery Plan for 311.
concrete action has been reported. 16. Integration with Crisis-Management Plan-
Enablement of more appropriately tailored ning: Once (4) has been addressed, actively
responses to crises due to 311: We were look to promote the use of 311 in crisis-man-
unable to evaluate this, although it was agement, by incorporation into the City-wide
anecdotally claimed that 311 was used to crises-management, business continuity and
tailor a response to ice storms. disaster-recovery plans.
17. Data warehouse: Create a data warehouse
Our major recommendations: with 311 data integrated with data from other
call centers. This data warehouse is an es-
12. Maintain high-level support for 311: Con- sential enabler for data-driven community
tinue to remind the Mayor and key stake- policing analysis and initiatives [Fayyad et
holders of the City of 311. Ensure sufficient al 02].
DoT representation in all strategic and any
City-wide or cross-Departmental opera-
tional planning and execution.14 Conclusion
13. Raise awareness: Actively continue to
market it both with citizens and showcase We identify the contributions from the perspec-
it internally within the City, to make sure tives of the city and from the underlying meth-
it stays front and center of stakeholders odology which is widely applicable.
consciousness. Note that while marketing
and publicity campaigns to date have man- Case Contributions: We illustrate through
aged to a lot with very little, a big failing is two projects that while crises-management gives
that they do not appear to have incorporated the environmental context to building network
systematic feedback mechanisms into the capability, a 311 system and its associated orga-
process. nizations, processes and IT components serves as
14. Integrate 311 into the internal processes of an adaptive foundation for capability development.
City Departments and Divisions: Integrate As in e-Government literature [NIMS; Punia et
311 into internal Departmental work-order al , Governance, FirstGov] the implemented 311
systems. Note that a range of integration systems played the expected roles within public
architectures must be designed to deal with safety, as follows:
the mismatches in paradigms of the 311
system and the work-order system. Integrate
165
Adaptive IT Architecture as a Catalyst for Network Capability in Government
166
Adaptive IT Architecture as a Catalyst for Network Capability in Government
the architecture team with the methodology for Agha, Gul, A. (2002) . Adaptive Middleware.
decision-making which leads to systems such Communications of the ACM, 45(6).
as 311 for triaging Requests. Furthermore, by
Arens, Yigal; and Rosenbloom, Paul. (2002).
building the 311 system to adapt to the needs of
Responding to the Unexpected, USC/Information
each Request, we build in adaptability needed for
Sciences Institute, NSF Workshop.
crisis-management type scenarios.
In summary, we believe that using triage data Ambite, Jos Luis; Giuliano, Genevieve; Gordon,
and simulation techniques [Jain 2003] to provide Peter; Decker, Stefan; Harth, Andreas; Jassar,
information needed for decision-making [Page Karanbir; Pan, Qisheng; and Wang, LanLan.
2003], and very effective crisis and overall IT- (2005). Argos: An Ontology and Web Service
enabled capability [Scholl 2003]. Composition Infrastructure for Goods Movement
Analysis, Information Sciences Institute School
of Policy, Planning, and Development, Digital
Acknowledgment Gov. Website.
Anderson, Ross (2001). Security Engineering:
We wish to acknowledge the many valuable con-
A Guide to Building Dependable Distributed
tributions from Gary Gavin, Jeff Clause, and Paul
Systems.New York: Wiley.
Carlson from the City of Columbus; Joe Bolinger,
Brett Gerke, David Landsbergen, Kelly Yakovich BPMI. Business Process Management Initiative,
and other participants of Center for Enterprise www.BPMI.org.
Transformation and Innovation.
Bauer, Johannes M. (2004). Harnessing the
Swarm: Communications Policy in an Era of Ubiq-
uitous Networks and Disruptive Technologies.
References
Communications & Strategies, 54, 2nd quarter.
Agranoff, R. and McGuire, M. (2001). Big ques- Bovens, M.; and Zouridis, S. (2002). From Street-
tions in public network management research. Level to System-Level Bureaucracies. Public
Journal of Public Administration Theory and Administration Review 62(2): 174-184.
Research 11(3), 295326.
Clements, P. et. al. (2003). Software Architecture
Alexander, C; Ishikawa, S., Silverstein, M., Jacob- in Practice, (2nd ed.) New York, NY: Addison
son, M., Fiksdahl-King, I., and Angel, S. (1977). Wesley.
A pattern Language. Oxford University Press.
CMG. Capacity Management Group
Arora, A., Ramnath, R., Ertin, E., Sinha, P. (2005).
Cross, Cross, S. et al. (2002). SEI Independent
ExScal: Elements of an Extreme Scale Wireless
Research and Development Projects, TECHNI-
Sensor Network, 11th IEEE International Con-
CAL REPORT CMU/SEI-2002-TR-023 ESC-
ference on Embedded and Real-Time Computing
TR-2002-023.
Systems and Applications, Hong Kong, China.
Child, J. (1972). Organizations, Structure, Envi-
Adams, Jonathan; Koushik, Srinivas; Vasudeva,
ronment, and Performance: The Role of Strategic
Guru; and Galambos George. (2001). Patterns for
Choice. Sociology, 6 1-22.
E-Business: A Strategy for Reuse. Mc Pr Llc,
ISBN: 1931182027. COPS 03-1. http://www.cops.usdoj.gov/txt/fact_
sheets/e01060007.txt
167
Adaptive IT Architecture as a Catalyst for Network Capability in Government
168
Adaptive IT Architecture as a Catalyst for Network Capability in Government
Kelly, S.; and Allison. M. A. (1998). The Complex- Mandelbrot, B. B. (1982). Fractal Geometry of
ity Advantage. New York, NY: McGraw Hill. Nature. New York, NY: W H Freeman.
Kling, R. et al. (2001). Transforming Coordina- MIPT. (2004). Responder Knowledge base,
tion: The Promise and Problems of Information National Technology Emergency Plan for Emer-
Technology in Coordination. In G. Olson, T. gency Response to Catastrophic Terrorism, MIPT
Malone, J.B. Smith. The Interdisciplinary Study (National Memorial Institute for the Prevention
of Coordination. Mahwah, NJ: Lawrence Erlbaum of Terrorism), April, www.rkb.mipt.org. .
Associates.
Moon, M. Jae. (2002). The Evolution of E-govern-
Warmer, Kleppe A, J.; and Bast, W. (2003). MDA ment among municipalities, Rhetoric or Reality
Explained: The Model Driven Architecture-- Public Administration Review (July / August),
Practice and Promise. New York, NY: Addison- 62:4: 424-433.
Wesley.
Morl, G. (2002). A New Mind for Policy Analysis
Lakoff, G.; and Johnson, M. (1980). Metaphors Westport CT: Praeger.
we live by. Chicago, IL: University of Chicago
NIMS. National Incident Management System,
Press.
www.fema.gov.
Laurence, P.R. and J.W. Lorsch. (1967). Orga-
OAG. Open applications group. Uses XML for
nization and Environment (Boston: Division of
every where to every where integration.
Research, Graduate School of Business Admin-
istration, Harvard University. OASIS: www.oasis-open.org, OASIS (Organiza-
tion for the Advancement of Structured Informa-
Landsbergen, D. and Wolken, G. (2001). Realizing
tion Standards) is a not-for-profit, international
the Promise: Government Information Systems
consortium that drives the development, conver-
and the Fourth Generation of Information Tech-
gence, and adoption of e-business standards
nology, Public Administration Review.
OGC: The Open Geospatial Consortium, Inc.
Longstaff, P.H. (2005). Security, Resilience,
(OGC) is a non-profit, international, voluntary
and Communication In Unpredictable Environ-
consensus standards organization that is leading
ments Such as Terrorism, Natural Disasters and
the development of standards for geospatial and
Complex Technology Program for Information
location based services. www.opengeospatial.
Resources Policy, Harvard University.
org.
Mackenzie, D. (2002). The Science of Surprise
OMG: http://www.omg.org.
- Can complexity theory help us understand the
real consequences of a convoluted event like OSI. The Open Source Initiative (OSI), a non-profit
September. DISCOVER, 23(2). corporation responsible for the management and
promotion of the Open Source Definition (OSD).
Mendonca, D., Jefferson, T., Harrald, J. (March
www.opensource.org.
,2007). Collaborative Adhocracies and Mix-and-
Match Technologies in Emergency Management. Nohria, N. (1992). Is a Network Perspective a
Communications of the ACM. Useful Way of Studying organizations? In N.
Nohria and R. G. Eccles (eds.), Networks and
Malone, T.; and K. Crowston. (2001). The Interdis-
organizations: Structure, Form and Fit (Boston:
ciplinary Study of Coordination. In Coordination
Harvard Business School Press).
Theory and Collaboration Technology, Gary M.
Olson, Thomas W.
169
Adaptive IT Architecture as a Catalyst for Network Capability in Government
OToole, Laurence and Meier, Kenneth. (2000). chapter in Adaptive Technologies and Business
Networks, Hierarchies, and Management: Mod- Integration: Social, Managerial and organizational
eling the nonlinearities, in Heinrich, C. and L. Dimensions, Publisher IDEAS.
Lynn (eds.).
Ramnath, R., Landsbergen, D. (May, 2005) IT-
Page, S. (2003). Entrepreneurial Strategies for enabled sense-and-respond strategies in complex
Managing Interagency Collaboration. Journal public organizations. Communications of the
of Public Administration Research and Theory, ACM, 48(5).
13(3), 311-340.
Ramnath, R. and Desai, A. (2007). City of Colum-
Peitgen, H.; Jurgens, H.; and Saupe, D. (1992). bus, 311 Impact Evaluation, Final Report.
Chaos and Fractals: New Frontiers of Science.
Rosetta Net. http://www.rosettanet.org/.
Berlin: Springer Verlag.
Scholl, H.J. (2003). E-government: A special case
Porter, M. E. (1998). Competitive Strategy: Tech-
of IT-enabled Business Process Change, Chapter
niques For Analyzing Industries And Competitors.
presented at the 36th Hawaiian Conference of
New York, NY: Free Press.
Systems Sciences, Hawaii.
Punia, Devendra K.; and Saxena, K. B. C. (March
Schwartz, Peter. (2003). Inevitable Surprises:
2004). E-government services and policy track:
Thinking Ahead in a Time of Turbulence. New
Managing inter-organizational workflows in
York: Gotham Books.
eGovernment services, Proceedings of the 6th
international conference on Electronic com- SCOR. http://wwwsupply-chain.org.
merce.
Teisman, G. and E.H. Klijn. (2002). Partnership
Ramanathan, J. (1999). Enterprise Integration Arrangements: Governmental Rhetoric or Gov-
with NIIIP Protocols, SME, ASME Autofact ernance Scheme? Public Administration Review,
Proceedings. 62(2), 197-205.
Ramanathan, J.; and Beswick, R. (2000). Impera- Thitart, R.A. and B. Forgues. (1995). Chaos
tive: Why Process-based Architecture is Essential Theory and Organization Science, 6(1):19-31.
for Successful Supply-Chain Participation. EAI
Salmela, H.; and Spil, T.A.M. (2002). Dynamic and
Journal.
emergent information systems strategy formula-
Ramanathan, J. (2005). Fractal Architecture for tion and implementation. International Journal
the Adaptive Complex Enterprise, Communica- of Information Management, 22, 441-460.
tions of the ACM, May.
Williamson, O. E. (1975). Markets and Hierar-
Ramanathan, J. and Ramnath, Rajiv. (2004) IT chies. New York: The Free Press.
Architecture and the Case for Lean eBusiness
Winograd, T. and Flores F. (1987). Understanding
Process Management, Knowledge Supply and
Computers and Cognition - A New Foundation
Information Logistics in Enterprises and Net-
for Design. Reading: Addison Wesley.
worked organizations, Fraunhofer-Institute for
Software and Systems Engineering ISST. TOGAF. http://www.opengroup.org/architecture/
togaf8-doc/arch/.
J Ramanathan and R. Ramnath. (2006). Co-engi-
neering Business, Information Use, and Opera- W3C. www.w3c.org. (August 2003). WSA, Web
tions Systems for IT-enabled Adaptation. Book Services Architecture. W3C working Draft 8.
WfMC. www.wfmc.org.
170
Adaptive IT Architecture as a Catalyst for Network Capability in Government
171
Adaptive IT Architecture as a Catalyst for Network Capability in Government
is given by Alexander (2002). Here we will improvement and measurement [Burk 1994;
use the term to mean a problem solving Demming, 1982; Jones, 2003; Kaplan 1996;
template. In complexity theory [Mandelbrot, Porter, 1998]. ACE uses customer-provider
1982], it also refers to a recursively-applied transactions that are fractals (recursive pat-
structure. terns applied in different scales) to allow
11
We use the term roles to refer to the pro- dynamic non-linear interactions between a
totypical service description that has to be non-routine Request and the resources and
delivered by any agent that performs the services used in satisfying that Request.
role. RED transaction is similar to and maps to
12
The main concept consists of the primary the concept of a transaction as discussed in
RED transaction pattern between a cus- the transactions costs literature [Williamson
tomer and provider organization. This pat- 1975] and nested transactions in Speech
tern is quite ubiquitous and is proposed in the Act Theory [Winograd 1987; Lackoff and
Speech Act Theory [Winograd, 1987]; the Johnson 1980].
13
Plan-Source-Make-Deliver process pattern Note that the agreements can be formal or
between customers and suppliers in any Sup- informal.
14
plyChain pattern [SCOR]; the Rosetta Net Perhaps 311 data could be made available
[Rosetta] for Request and delivery exchange; to candidates during mayoral campaigns.
and lastly the basis for approaches to process
172
173
Chapter VIII
Design Integrity and Enterprise
Architecture Governance
Chris Aitken
Queensland Health, Australia
Abstract
This chapter describes a design integrity framework for developing models of any entity of interest at
various levels of abstraction. The design integrity framework presented describes and defines contextual,
conceptual, logical and physical model types. The framework also defines a set of alignment attributes
for each model type and explains how these are to be used to demonstrate alignment from initial con-
cept and requirements through to actual physical implementation. These concepts are then applied in
an organisational context to identify the roles necessary to support an EA governance framework and
strong alignment from idea to implementation.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Design Integrity and Enterprise Architecture Governance
minor technology-based modifications through to the enterprise architect to be confident that the
wholesale changes where the enterprise is transi- transition from current to future states occurs as
tioned to become something entirely new. intended, within any system development meth-
The requirement for change inevitably means odology (eg. Agile, XP, Waterfall) he or she must
that consideration has to be given to design integ- be sure that the necessary governance roles and
rity. Whenever we are concerned with the align- responsibilities within the enterprise have been
ment between an initial idea and the way in which identified and exercised. The second half of the
it is implemented we are dealing with the issue of chapter applies the framework in an organisational
design integrity. In a change driven environment, context, identifies governance roles and illustrates
design integrity assists us to understand whether why and at what point they are required in the
the changes undertaken are required and whether process of enterprise architecture.
they have been implemented as intended. Further-
more, such an approach reinforces modularity of
design allowing incremental change or partition- Design Integrity
ing of change initiatives in a manner that is more
likely to achieve the overall objective or outcomes. Design integrity needs to be understood at both
Clearly, design integrity is closely related to the the level of individual enterprise components
concept of governance. Governance is the ability to as well as at the broader level of the enterprise
control change within an enterprise. In this respect transition from current to future state. Enterprise
design integrity is a key enabler of governance. architectural design integrity addresses the fol-
Within the day-to-day practice of enterprise ar- lowing questions:
chitecture this relationship between governance
and design integrity is arguably even closer. Does the design of an entity satisfy a set of
This is particularly true in environments which initial requirements?
employ agile system development methodologies
(Ambler 2002, Beck 1999). Such methodologies This question relates to whether the design is
involve short iterative cycles of development and the right one given the context, constraints and
modelling, and are more likely to be successful requirements of the entity in question. It is possible
where there is attention to maintaining design to design a solution that delivers a desired outcome
integrity. A common misconception is that such but does not do so in a way that is consistent with
approaches to system development do not require the restrictions in which the component must be
high levels of rigor in modelling. This chapter will operated. For example, an application that provides
argue that in fact upfront effort in developing a the desired output but does so in a way that does
set of well referenced models greatly assists rapid not comply with legislative requirements. There-
development methodologies. fore, design integrity must assess the alignment
This chapter describes a framework for design between the requirements of the broader context
and modelling integrity. Although the framework and the characteristics of a given design.
is generic enough to be applied to the design of
any entity of interest, throughout this chapter Does a given design contain all the relevant
the framework will be applied in the context of elements of an entity?
government agencies. The framework provides
a means for describing the measures for ensuring This question highlights the need to ensure
design integrity from an initial idea through to that a design is complete. The design must ad-
its actual physical implementation. In order for equately represent all the specified aspects of
174
Design Integrity and Enterprise Architecture Governance
the entity of interest. To have integrity a design Only by considering design integrity at each
must completely represent the entity of interest. of the levels addressed by the questions listed
Alternatively, a design must be limited to only before is it possible to assess the degree to which
include those aspects that are considered to be an implemented entity is consistent with what was
in scope for the entity. This problem is at the originally intended. The following section sets
heart of the all too common phenomenon of sys- out an initial framework of definitions designed
tems or applications which provide functionality, to assist the enterprise architect to understand
typically paid for by the user, that is never used. the magnitude of a given change, which of the
Completeness however, does not necessarily mean aspects of design integrity are affected, and how
that all aspects must be represented to the same the implications might best be represented.
level of detail.
Design Integrity from Idea to
Is a given design consistent with the desired Implementation
approach or strategy?
The process of undertaking enterprise architec-
A design must also be able to be assessed for ture inevitably requires that there be some level
conformance to intent. It is possible to develop a of abstraction from physical reality. Within the
design that meets external requirements, repre- discipline of enterprise architecture, levels of
sents all aspects of the entity, but does not repre- abstraction are typically managed through the
sent the desired approach or design strategy. For development and use of models. For example,
example, it is possible that a given outcome might a value chain model might provide a high level
equally be achieved via a stand alone application overview of a set of processes, which in turn might
or by adopting a Service Oriented Architecture be the subject of more detailed process models.
(SOA) based solution involving the orchestration The use of a model enables the enterprise architect
of multiple services. However, the two approaches to represent ideas, concepts and their respective
represent fundamentally different approaches in relationships and explore the inter-dependencies
design. Therefore, design integrity must also ad- and the impact of changes to both concepts and
dress the degree to which a design can be said to their relationships.
reflect a particular desired approach to meeting Enterprise architects frequently refer to the
an initial set of requirements. terms physical, logical and conceptual models to
represent ideas at increasing levels of abstraction.
Has the design been implemented as in- By aligning models across levels of abstraction
tended? the architect is able to represent the same entity
in a way that is suitable for a variety of audi-
Design integrity also refers to the need to ences and types of analysis. A similar need for
ensure that designs and changes to designs at a alignment across levels of abstraction is evident
conceptual or logical level are accurately trans- in the discipline of Science. Table 1 illustrates
lated into physical implementation. Without a a compelling comparison of similar hierarchies
way to measure and assess this alignment it is not of abstraction found within both the positivist
possible to determine whether a given physical scientific method and the discipline of enterprise
implementation is consistent with a given design. architecture. What the comparison suggests is
Again, the design of an SOA solution can look that the need for design integrity is similar both
great on paper, only to be let down through poor for the scientist designing and conducting experi-
implementation and inconsistent adherence to ments as it is for the enterprise architect attempt-
SOA design principles.
175
Design Integrity and Enterprise Architecture Governance
ing to model and ultimately effect change in an This lack of specificity significantly limits
enterprise. In order for the scientist to be able to the architects ability to claim that the ideas or
claim that a given experiment either proves or concepts as they are modelled have in fact been
disproves a theory or hypothesis, the scientist implemented as intended or that a given logical
must be able to demonstrate alignment between design accurately reflects the original idea or
theoretical constructs, the variables representing intent. Furthermore, a not uncommon scenario
the constructs, and the measures used to measure in the authors experience is for two analysts to
change in the variables of interest. Similarly, an independently model a solution component (eg.
architect must be able to demonstrate that the a process model, a use case model) only to find
ideas contained in conceptual level models are that they are not able to be meaningfully brought
also reflected the associated logical models, and together or compared due to differences in detail,
are ultimately translated into physical level models scope or abstraction.
and implementation. A similar comparison be- Clearly, what is required is a framework which
tween the disciplines of mathematics and science defines model types and characteristics which
was famously popularised by Plya (1971) who enables the practitioner to reference lower level
suggested that although they might differ in how detailed models within higher level conceptual
they are outwardly described, the two disciplines or contextual ones. In this way the more abstract
resemble each other in the problem solving pro- models provide a frame of reference for the more
cesses they employ (ie. how practitioners think detailed models. Such a framework would greatly
about things). The framework presented in this assist developers in agile system development
chapter is a further extension of this idea. environments by allowing them to model or even
To achieve design integrity requires that the implement different solution components at dif-
terms conceptual model, logical model and ferent rates and provide some certainty that the
physical model be unambiguously defined. end product will work as in tended and remain
However, although the terms conceptual, logical true to the original concept.
and physical are frequently used within the field The comparison in Table 1 also suggests a
of enterprise architecture they are not always used definitional framework for the terms contextual,
or defined in a consistent fashion. The concepts conceptual, logical, and physical. The fol-
appear most well developed in the area of data lowing sections present a suggested framework
modelling (Tsichritzis & Klug, 1978). However, of model types to represent the various levels of
even here there are plenty of examples of a lack of abstraction.
consistent application (Simsion, 2006). Often the
terms conceptual model, logical model or high
level model are used interchangeably to mean a The Design Integrity
model with some level of abstraction. Framework
Hypothesis or theory Contextual model framework also draws heavily on ideas found in
Construct Conceptual model the following EA frameworks:
Variable Logical model
Measure Physical model Zachman framework (Zachman, 2005)
Generalised enterprise reference architec-
176
Design Integrity and Enterprise Architecture Governance
ture (Bernus, Nemes & Schmidt, 2003) contextual, conceptual, logical and physical
EA cube (Bernard, 2005). and a defined set of alignment attributes.
In the following sections each model type is
In order for the architect to achieve alignment described and a set of criteria provided to assist
from idea to implementation each model or level the practitioner in identifying the category to
of abstraction needs to be appropriately referenced which a given model belongs, and for determining
in relationship to the other levels. The framework the characteristics required of a model of a given
presented here provides definitions of each model type. It is not uncommon to encounter models
type, purpose, and relationship to other models which include characteristics of two or more of
or levels of abstraction. The framework also de- the types listed here. In these cases it is usually
scribes features of the models at each level that beneficial to deconstruct the model into two or
are required to ensure design integrity. more separate models. For example, implementa-
The framework can be applied to the design tion details might be included in a logical process
of any entity. Where the entity is an enterprise model for reasons of expediency. However, such
the model types and levels of abstraction ap- an approach means that changes in the physical
proximately correspond with the rows of the implementation model of the process (eg. work
Zachman Framework (Sowa & Zachman, 1992). instruction) are also likely to require re-work of
Furthermore, the columns of the Zachman the logical level process model (eg. procedure).
Framework suggest at least six domains in which Furthermore, such an approach does not promote
the modelling framework might be applied (ie. logical model re-use.
data, process, roles, business rules, logistics and Although consistent modelling notation is
events). Similar to the Zachman Framework the important, the most important aspect of the fol-
framework presented here is recursive and can lowing framework is that subordinate models
equally be applied to any given cell within the clearly reference themselves within their super
Zachman Framework. However, there are some ordinate or parent model type. The alignment
important differences. Firstly, whereas the cells in between models is top down as it is typically not
the Zachman Framework are loosely vertically possible to deduce a higher order model from a
related, the purpose of the design integrity frame- lower level one. This approach promotes model-
work is to provide a means of achieving strong ling modularity which means that components of
vertical alignment by referencing lower cells in a given entity or solution are able to be developed
those with higher levels of abstraction. Secondy, relatively independently of one another while
although both frameworks represent the concepts still achieving consistency and overall integrity.
contextual, conceptual, logical and physical For example, once a conceptual level model has
as rows, these concepts are differently defined in been developed it provides a frame of reference
each framework. This means that the cell contents for lower level logical models, allowing the pos-
are likely to differ between frameworks. Zach- sibility of them being developed by different
man claims to have derived the rows or views design teams, or at different iterations of an agile
within his framework from careful observation system development process. The following sec-
of design practices in other design and engineer- tions define each model type and provide a listing
ing domains. The rows or model types in the of modelling criteria which help distinguish one
framework presented in this chapter are derived model type from another.
by applying a set of strict definitions to the terms
177
Design Integrity and Enterprise Architecture Governance
178
Design Integrity and Enterprise Architecture Governance
Modelling criteria: A conceptual model will Does not introduce new constructs;
have the following characteristics: Provides a state specific description of logi-
cal components; and
Defines the domain of constructs and their Does not include implementation detail (eg.
relationships that specify the make up of the technology descriptions).
entity;
Is independent of state such that both current
and future state logical level descriptions Physical model
can be mapped to it; (Implementation)
Does not describe the entitys environment
or context; Purpose: To describe an actual physical imple-
Does not include state based descriptions; mentation and measures for a given logical de-
and scription. The physical model is the critical link
References a single parent contextual between abstract design and the real world.
model.
Description: A physical model is implementa-
tion and state specific. It describes the way in which
Logical model (Design) a given logical model will be or is implemented.
A physical model translates logical components
Purpose: To describe a design through the ap- into specific physical components, and provides
plication of entity constructs to particular states a comprehensive listing of all required physical
(ie. current or future state). A logical model components that make up the implemented entity
translates conceptual level constructs into logical (ie. a bill of materials).
components. The model selects and arranges these
components according to design principles. Modelling criteria: A physical model will
have the following characteristics:
Description: A logical model represents a
particular design strategy and the associated con- Includes implementation specific detail (eg.
figuration of logical components and relationships make, version, condition etc);
between them. A logical model is independent Does not include physical components that
of any physical implementation. A logical data cannot be mapped to a logical model com-
model (Tsichritzis & Klug, 1978) is an example of ponent; and
a logical level model. Changes in a logical model References a single (state specific) logical
will require change to the physical models which model.
may reference it. Changes at the logical level will
represent changes to the components for which
physical implementation will be required. Implementing Design Integrity
Modelling criteria: A logical model will have The previous section outlined model type defini-
the following characteristics: tions for a design integrity framework. The model
types within the framework can be used to repre-
References a single conceptual level model sent any entity at any of four levels of abstraction.
and represents all constructs within that In this section we will identify types of attributes
model; associated with each model type that are required
179
Design Integrity and Enterprise Architecture Governance
A contextual level model must contain an attri- The first alignment attribute type documented
bute or attributes that provide a description of the in a logical model are the logical components of
goal or purpose of the entity of interest (ie. the which it is comprised. Each logical component of
black box entity). Such goal alignment attributes the model must reference at least one construct
are typically referred to as the mission or vi- within the parent conceptual level model. The
sion when applied in an organisational context. full specification of any logical component also
However, it is important that the goal alignment includes a description of implementation criteria.
attribute does not describe anything internal to These criteria (eg. performance criteria) describe
the entity (eg. internal processes, roles, strategies). in an implementation neutral way, the criteria any
A contextual model must also specify a complete given physical component must satisfy to be said
listing of requirements. This alignment attribute to implement the logical level design. For example,
type includes outcomes the entity must achieve in a logical model where the design principle of
or provide, constraints within which it must be efficiency has been applied the implementation
implemented, or other externally driven speci- criteria for logical components might include a cost
fications. The listing of requirements is derived criteria. This would most likely be a comparative
from consideration of each external entity and measure in terms of throughput or other relevant
the requirements of the relationship between it characteristic of the model. The development of
and the entity of interest. Together both the goal the implementation criteria requires careful con-
and requirements alignment attribute types when sideration to ensure that there is not a mismatch
180
Design Integrity and Enterprise Architecture Governance
later on between the demands of the logical design The second alignment attribute type that a
and the ability of the physical implementation to physical model should include are measures.
support it. Each measure documented within the model must
The logical level models are primarily con- reference one or more of the design principles
cerned with design. Therefore, the second align- and associated assertions in the parent logical
ment attribute type to be documented within a model. The alignment between measures and
logical model are a set of design principles and an design principles is discussed further in the fol-
associated set of assertions. The design principles lowing section.
indicate the design approach or design strategy
to be adopted (eg. the principle of modularity of
design, the principle of re-use of components, or Using the design integrity
the principle of limiting unnecessary variation). framework
Each design principle should reference one or more
objectives within the parent conceptual model. This section briefly outlines how the design
This provides the level of justification for adopting integrity framework covered in previous sec-
a given design principle. Each principle should also tions might be used within the broader process
be associated with one or more assertions. The of enterprise architecture. A well aligned set
assertions are statements which can be answered of models that translate a set of requirements
affirmatively if a given principle has been applied through to physical implementation represents a
to a given model. For example, an assertion for thorough description and decomposition of a given
the principle of modularity of design might be entity. A fully specified set of models allows the
that components should be able to be replaced by enterprise architect to powerfully demonstrate
alternative components without compromising the that they have correctly understood the business
operation of the entity. Alternatively, the design context, concepts and requirements. Such a set
principle of maximising performance speed ap- also allows the architect to describe the design
plied to a logical data model could be evidenced strategy or approach adopted with respect to
by the assertion that the model represented the business concepts, and how this strategy will be
minimum number of logical data table lookups translated into a tangible implementation.
required per logical transaction. Figure 1 illustrates the capacity of the de-
sign integrity framework to provide a means to
reference and align models of varying levels of
Physical model abstraction. This allows the enterprise architect
to possibly compartmentalise the development
The physical components within a physical level of lower order models. For example, in Figure 1
model provide the first alignment attribute type. several implementation models (eg. Physical 1 (b))
The full specification of the physical components might be evaluated against the implementation
documented in the model must include an exact criteria and design assertions in a higher order
description of the technology to be implemented logical model (eg. Logical 1 (b)). Figure 1 also
(eg. brand, model, version etc). Each physical com- highlights the ability of the framework to capture
ponent must reference one or more of the logical and reference changes in logical design between
level components in the parent logical model, and current and future states of an entity with refer-
satisfy the implementation criteria documented ence to a single conceptual parent model.
in the relevant logical component.
181
Design Integrity and Enterprise Architecture Governance
182
Design Integrity and Enterprise Architecture Governance
183
Design Integrity and Enterprise Architecture Governance
within the alignment attribute type framework Figure 2. Gap analysis across levels of abstrac-
outlined previously, the measures in the physi- tion
cal model are designed to measure application
of design principles or strategies. They therefore
provide a means to evaluate the effect of changes
in design. However, their ability to provide this
measure is dependent on their construct validity.
Construct validity is a concept borrowed from the
social sciences. It describes the ability of a measure
to reflect changes in a concept or construct. Con-
struct validity is usually determined through the
application of explicit logical argument regarding
what is understood about the mechanisms thought
to underpin the construct, and the comparison (or
correlation) of the measure with other measures
also thought to be related to the construct. Usu-
ally for logical design models this determination
is readily made with respect to design principles.
However, there may be occasions where the re-
lationship between selected physical measures
and the relevant design principle may need to be
tested and evaluated before including it in the
physical model.
At the physical level measures are concerned
with determining whether individual physical
components meet or exceed the implementation
criteria specified in the parent logical model
components.
Gap analysis
184
Design Integrity and Enterprise Architecture Governance
Therefore, it is recommended that a thorough gap levels of abstraction. Changes at the contextual
analysis is conducted. or conceptual levels will typically represent large
Gaps at the contextual, conceptual, logical or wholesale changes to the purpose or constructs
physical levels should be resolved before moving by which the entity of interest is represented or
to actual implementation. A gap at the contextual identified. Within the government agency context
level may mean that there is a mismatch in scope these changes are typical of machinery of govern-
between the contextual level requirements and ment changes where whole departments may be
conceptual model. This suggests that there are ex- created, abandoned or merged. Conceptual level
ternal entities and relationships that the conceptual changes are represented by those situations in
model does not address. In this situation either which functionality is moved from one agency
the contextual level model external entities need to another to better meet the needs of the public.
to be deemed out of scope by the project sponsor Contextual level changes represent those situa-
(or similar role) or the conceptual model needs tions where the agency acquires new customers
to be revised to satisfy the additional contextual and an associated set of new requirements. The
level requirements. Alternatively, there may be consequences of these changes can be mapped to
conceptual constructs which do not map to any current logical level and associated physical level
contextual level requirements. This suggests pos- models. From this mapping the extent of any gaps
sible missing external entities in the contextual can be identified. This analysis then allows some
model or unnecessary constructs within the con- understanding of the consequences of the changes
ceptual model. Finally there may be conceptual in terms of physical implementation (eg. costs,
level objectives which do not relate to the entity training, personnel, information systems).
goal. This suggests that there is a mismatch be- Changes at the logical level will represent
tween the overall purpose of the entity and the changes in design strategy or approach. Again,
conceptual model thought to support it. the impact of these changes can be understood by
A gap at the conceptual level means that there determining the ability of existing physical models
are conceptual constructs or objectives for which to support the design change, and identifying and
there are no logical level components or design quantifying the gaps where the current physical
principles. Or alternatively logical level compo- model is unable to support or accommodate the
nents or design principles which do not relate to any change. The design level change can also be as-
conceptual level construct or objective. This situ- sessed in terms of its ability to support the con-
ation suggests either an incomplete logical model, ceptual level objectives and the entitys context
or unnecessary logical level components. level purpose. From the perspective of an indi-
A gap at the physical level suggests that either vidual government agency, logical level change
the implementation contains physical components is typical of internal re-structuring initiatives.
that are not specified in the design, or that the Here the requirements and overall functionally
physical implementation will be incomplete. are likely to remain the same whereas the internal
configuration of resources, roles and processes
are likely to change significantly to align with a
Impact analysis new strategic approach.
The design integrity framework also allows for
Impact analysis is concerned with understanding a more holistic understanding of the consequences
the consequences of change. The design integrity of changes at the physical implementation level.
framework presented in this chapter allows im- Using the measures in the physical model, changes
pact analysis to be conducted at each of the four at this level can be assessed in terms of their
185
Design Integrity and Enterprise Architecture Governance
overall impact on the entity goal and objectives. The Enterprise Architecture
Changes at this level usually reflect changes in Steering Committee
technology or personnel.
Most government agencies that have an enterprise
architecture program will have a committee or
Governance roles board which oversees the implementation of the
program and its initiatives. The level of influence
This section adds to the design integrity frame- the committee has will vary depending on the
work by introducing a set of governance roles. This maturity of the organisation and its enterprise
section does not provide a complete enterprise architecture program. In a mature enterprise the
architecture governance framework, however it committee will include its most senior executive
does provide a description of the key roles and managers. In less mature organisations the com-
the levels at which these are important within the mittee is likely to sit within the IT section and be
overall governance process and across levels of chaired by the CIO or CTO. Irrespective of the level
abstraction. For a comprehensive treatment of IT of maturity every enterprise architecture program
governance frameworks and approaches the reader will require such a committee as it forms the point
is referred to Weill & Ross (2004) and Betz (2006). of accountability for program decision making.
Each role described here has a unique contribu- Most committees of this type soon discover that it
tion to the governance over the implementation of is not possible to exercise all aspects of enterprise
the models within the framework. The roles are architecture governance. This is particularly so
described at a conceptual level (ie. do not include at the contextual and conceptual levels where the
design or implementation detail). Therefore, in decision making typically has nothing to do with
reality there may be many positions within a given technology. Most committees require instead that
organisation which might fulfil these roles. Table evidence be provided of verification by business
3 illustrates the alignment between role and level representatives of contextual or conceptual issues.
of abstraction or model type. It also highlights the The discussion in the following sections assumes
key model attributes that each role is responsible the existence of a committee such as the Enterprise
to define or approve. Table 3 provides the enter- Architecture Steering Committee or similar.
prise architect with a conceptual framework for
categorising actual roles and stakeholders for a
given context.
186
Design Integrity and Enterprise Architecture Governance
187
Design Integrity and Enterprise Architecture Governance
Responsibilities: To approve the objectives All too often this results in siloed initiatives that
and constructs as documented within the con- are not well designed to support the wider context
ceptual level model. or purpose they are intended to achieve.
The designer role will determine from the
Actor: Any position which has the ability to logical and physical level models, a program of
initiate change to the entity of interest in response work to be completed to transition the entity from
to changes in purpose or requirements. current to future state. The Enterprise Architec-
In practice this role is usually fulfilled by a ture Steering Committee oversees and monitors
senior position within an organisation. Nonethe- progress with this program of work.
less, any position can potentially fulfil this role
where the position is responsible for defining the
scope and objectives of the entity of interest. The Implementer
development of objectives and definition of the
constructs may in reality fall to the enterprise ar- Purpose: To instantiate the physical model.
chitect working in collaboration with the sponsor.
However, the sponsors approval of the objectives Responsibilities: To provide or report
and constructs should probably be presented to measures as defined in the physical model. To
the Enterprise Architecture Steering Committee ensure that physical components selected meet
prior to design work commencing. the relevant logical component implementation
criteria.
188
Design Integrity and Enterprise Architecture Governance
is likely to be a joint collaboration between the ologies for undertaking enterprise architecture
enterprise architect and the relevant project based on experiment and observation, and easier
managers. integration or collaboration with disciplines such
While it is common to have a Program Delivery as organisational psychology.
Committee or Board to oversee the coordination The final section in this chapter has attempted
and implementation of a portfolio of projects, it is to identify the organisational roles required to
the role of the Enterprise Architecture Steering implement the framework. The roles are discussed
Committee to see that the hand-off between en- with reference to contemporary enterprises and
terprise architect and project manager occurs and government agencies in particular. By defining
to track project completion in order to determine governance roles for each level of abstraction the
the status of transition. The implementer role has framework provides a means for realising strong
responsibility for providing the measurements alignment between layers necessary to ensure ac-
as specified in the physical model which allow curate translation from idea to implementation.
implementation to be tracked, and verification
that the logical model and its design principles
has been accurately implemented. References
189
Design Integrity and Enterprise Architecture Governance
Pande, P., & Holpp L. (2006) What is Six Sigma?, Weill, P., & Ross, J. (2004). IT Governance: How
New York, NY: McGraw-Hill. Top Performers Manage IT Decision Rights for
Superior Results. Boston, Massachusetts: Harvard
Plya, G. (1971). How to Solve it: A New Aspect of
Business School Press.
Mathematical Method. Princeton, NJ: Princeton
University Press. Zachman, J. A. (2005). The Zachman Frame-
work for Enterprise Architecture: A Primer for
Porter, M. (1985). Competitive Advantage: Creat-
Enterprise Engineering and Manufacturing.
ing and Sustaining Superior Performance. New
Zachman International, www.ZachmanInterna-
York, NY: The Free Press.
tional.com.
Simsion, G. (2006). Conceptual, Logical, Physi-
cal: Clearing the Confusion. The Data Adminis-
tration Newsletter, No. 36. Robert S. Seiner.
Endnotes
The Open Group, The Open Group Architecture
Framework. (2006) , Version 8.1.1, Enterprise
1
Definition: an image, idea, or theory, esp. a
Edition. complex one formed from a number of sim-
pler elements. Random House Unabridged
Tsichritzis, D., & Klug, A. (Eds.). (1978). The
Dictionary.
ANSI/XWSPARC DBMS framework report of the
2
This term is defined in the following sec-
study group on database management systems.
tion.
Information Systems, 3(3), 173-191. 3
In this discussion the word performance is
used in its most general sense.
4
Coloured elements represent potential gaps
in the logic of the models
190
191
Chapter IX
Policy Mapping:
Relating Enterprise
Architecture to Policy Goals
Dwight V. Toavs
National Defense University, USA
Abstract
Few government executives can explain the enterprise architecture of his or her agency, and it is rare to
find a political executive who is able to explain how their political objectives are furthered by a govern-
ment-wide enterprise architecture (Holmes, 2007). This low level of awareness translates to enterprise
architecture efforts that are often undervalued and under funded because the budget priorities of political
and functional executives rarely include enterprise architecture. Unsurprisingly, many points of tension
exist as the CIOs and architects work to translate political goals into resources and architectural plans
supporting the agencys programs. This tension, between the rational orientation of enterprise archi-
tecture advocated by the CIO and the political nature of policy goals sought by executives, often puts a
CIO at odds with his or her organizations political and functional executives. This chapter discusses
that tension, and advocates that CIOs and enterprise architects develop a Policy Map to bridge the
gap between the political and the rational perspectives. A policy map provides the Purpose Reference
Model missing from present architecture models and policies, and visually portrays and communicates
key relationships between policy goals and functional programs on the one hand, and the enterprise
architecture and its implementing IT initiatives on the other hand. A well-crafted Policy Map is a visual
reference for aligning resources, effort, architecture, and the policy goals of political executives.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Policy Mapping
192
Policy Mapping
address societal problems and achieve politically and Straussman, 1990). Simultaneously these
defined societal goals. As a result the public typi- organizations are expected to apply their capa-
cally sees the political face of the government bilities and resources in a rational and objective
organization, such as when they need assistance manner to perform their missions, be they to
in recovering from a disaster; when they seek to rescue the victims of disasters, to restore some
qualify for some entitlement program; or when semblance of public order in the affected com-
they are dissatisfied with the actions or decisions of munities, or to stimulate the economic recovery
an agency and seek to affix blame. Never far from of the area. A failure to live up to this model of
this political view of government organizations citizens expectations results in harsh criti-
are issues of competence and trust; of political cism. Critiques of government organizations in
promises and citizens hopes and dreams; and of the wake of the September 11, 2001 attacks on
our individual and collective ideas for a desirable New York and Washington, D.C. demonstrate
and democratic society. the imprint of political authority on government
Functional executives, managers, IT profes- organizations, and the need to affix blame when
sionals and enterprise architects see the inter- things go wrong. Comptroller General of the
nal face of the organization and thus view the U.S. David Walker (GAO, 2002) noted that the
government organization quite differently. These government organizations under scrutiny had
professionals constitute the rational face of gov- been established in a very different era to solve
ernment as they perform the assigned missions a rather different set of societal problems. Upon
and seek to achieve the goals of their agencies. the logic of this argument legislators justified
From this rational perspective, the organization the need to create the Department of Homeland
is a purposeful entity with people and processes Security (DHS) in response to this new societal
designed to carry out the assigned mission, imple- need. The DHS new composite form aggregated
ment policies, and deliver desired results. Action capabilities from twenty-two previously existing
oriented, this view of government organizations is government agencies to address the homeland
focused on the rationality and objectivity needed security threat. Yet when Hurricane Katrina dev-
to produce organizational results efficiently and astated the Gulf coast of the U.S. in August 2005,
effectively. The government organization, from the inadequate response from the Department of
this point of view, is an instrumental organization. Homeland Security brought an immediate and
As one would expect, this face is turned inward blistering critique.
on the organization, and focuses on managerial Government organizations, departments,
concerns such as acquiring resources and creating agencies, or bureaus, are assigned responsibility
organizational results through its money, people, for implementing the policy pronouncements of
processes, techniques, and technologies. political leaders, policies which may be either
The paradox of governmental organizations substantive or procedural in nature. Substantive
arises from these seemingly contradictory states, policies outline the what of public policy, the
where the organization is simultaneously a politi- goals and challenges in society that are being ad-
cal entity and yet is an objectively rational entity. dressed. Implementation or procedural policies
Government organizations are creatures of the provide the how of public policy, and focus on
political system, brought into being by political translating political goals into organizational re-
processes, and intended to solve societal problems sponsibilities and guidance to organizational lead-
that have been defined through the political pro- ers and functional experts. Policies are translated
cess. In this way government organizations bear into the functional programs and the resources
the deep imprint of political authority (Bozeman used by managers to create desired organiza-
193
Policy Mapping
tional outcomes. CIOs marshal the organizations integral IT support (Toavs, 2004). Early research
information technology (IT) resources and ca- in information systems focused on technical
pabilities to support these functional programs. or systems architecture approaches (Zachman,
Organizational effectiveness, and a programs 1987). Eventually functional stove-piping, cost,
ability to deliver results can thus be evaluated and duplication in program support arrangements
from two very different points of view, one of led to demands for increased use of organization-
them substantive in nature and the other focused wide information technology (Sowa & Zachman,
on procedural concerns. Political executives in 1992) to promote efficiency and effectiveness in
government departments and agencies typically organizations (Gore, 1993). By the mid-1990s
focus on political utility, that is, the ability of process reengineering was a new skill requirement
the organization and its programs to achieve the in IT organizations (Hammer & Champy, 1994),
substantive and politically desired goals of the and new approaches to managing information
administration to which they owe allegiance. focused on innovation (Davenport, 1992) and
Career executives and managers of functional improving the processes central to functional
operations in organizations, on the other hand, programs. Additional efficiency and productivity
are focused on rational goals and the procedural gains could be achieved, it was believed, by craft-
concerns necessary to achieve results attentive ing an enterprise-wide architecture for holistic
to cost, schedule, performance and reliability management of an organizations information
concerns the focus of contemporary manage- systems (Spewak, 1993). Building on these efforts,
ment. And while each of these perspectives is advocates of enterprise architectures convinced
equally valid, it should be emphasized that they political leaders that architectures could deliver
originate from and are justified in vastly different additional efficiency and effectiveness gains
terms. The challenge comes in trying to rectify by eliminating arbitrary program boundaries,
the differing perspectives where the enterprise stovepipes, and organizational barriers. In 1996
architecture is concerned. all these innovations became agency requirements
by their inclusion in the Information Technology
Management Reform Act of 1996, later renamed
ENTERPRISE ARCHITECTURE the Clinger-Cohen Act of 1996, Public Law 104-
ENTERS GOVERNMENT 106, in honor of its legislative sponsors. This
substantive policy required agencies to implement
Information technology was introduced into the enterprise architectures; they proceeded with
US Federal government through two venues, caution as little in the way of implementation
first as number-crunchers for agency financial or procedural policy guidance was available or
managers, and later to support functionally-ori- provided to agencies.
ented programs. Functional programs initially The notion of enterprise architecture in
acquired their own unique IT support systems, government was positively advanced by the
a process that simultaneously grew increasingly government reform initiatives launched by the
expensive and opaque to congressional overseers Bush administration in 2001. Rather than pursu-
(Commission on Federal Paperwork, 1977). As ing management reforms based on a legislative
information technology became increasingly agenda or on the recommendations of an expert
ubiquitous it was obvious that the tipping point commission, the Bush administration intended to
was approaching; by approximately 1986, agency implement a management reform agenda within
programs were so reliant on information technol- the framework of existing legislation and policy.
ogy they could no longer function without their Electronic government was envisioned as the
194
Policy Mapping
delivery mechanism, and enterprise architectures rent FEA Reference Model is shown at Figure 1
established the conceptual framework for efficient (OMB, 2007b).
and effective service delivery. (Toavs, 2004, p. The notion of enterprise architecture is a
299). The administrations e-government efforts relatively recent innovation in thinking about
began with an interagency task force (OMB, organizations and government functions. Viewing
2001) of knowledgeable individuals drawn from a an entire sovereign government as an enterprise,
wide representation of agencies. As the e-govern- that is, the concept of a government-wide archi-
ment strategy evolved and candidate initiatives tecture is even more recent, and arises principally
identified, it became apparent that significant from the literature of disciplines associated with
redundancies existed. In addition to the obvious information technology, business, and man-
redundancies across agencies, existing enterprise agement. Enterprise architecture concepts and
architecture efforts made few if any provisions practices are motivated primarily by the search
for inter-agency activities such as resource shar- for lower costs and additional profits through
ing or information transfer (OMB, 2002). These increased business efficiency and effectiveness.
insights led to developing an overarching Federal Traditionally the study of government organiza-
Enterprise Architecture (FEA) to which each of tions was informed by older and well established
the agency enterprise architectures would relate. disciplinary perspectives such as organizational
As noted in the Federal Enterprise Architecture theory, political theory, and public administration.
home page, development of the FEA began in These traditional voices are notably absent from
early 2002 and refinement of the architectural con- the discussion of enterprise architecture. Public
cepts, guidance and tools continues today (OMB, administration and political science, the principal
2007a). The development and evolution of both disciplines focusing on government, have largely
substantive and procedural policies for the Federal ignored the potent effects of information technol-
Enterprise Architecture and its implementation in ogy (Toavs, 2004, p. 36) and enterprise and gov-
agencies has continued as conceptual knowledge ernment-wide architectures. Rather, researchers
and practical experience have advanced. The cur- in these disciplines appear to have narrowed their
195
Policy Mapping
investigations to less-technical treatments such as Your policy map is a visual depiction of your
transforming government via e-government. Top- organizations charter - what your organization is
ics such as the underlying structure or architecture charged with doing and why. It should show politi-
of the organization and its information-technology cal goals and expectations on the one hand, and
enabled capabilities are not often researched and the relationships to parts of the agencys rational
consequently not well understood in many parts enterprise architecture and implementation plans,
of academia that study organizations. For example thus describing the connection between purpose,
a text search conducted in July 2007 for the term rationale, and instrument. A policy map such as
enterprise architecture in the database of Public this provides a number of instant benefits: first,
Administration Review articles for the past seven and foremost, a policy map is explicit, giving
and one-half years (2000 to the present) resulted reality to substantive legislation and procedural
in only two articles; the search term e-govern- policies; secondly, a policy map is visual, giving
ment yielded thirty-two citations for the same memorable form, texture, and color to the agencys
time period. Anecdotal evidence suggests that mission; thirdly, a policy map is descriptive of
mid-level program managers in government are reality, showing what the agency does and why;
aware of the concept of enterprise architecture; and fourthly a policy map identifies important
however even they often lack an understanding relationships thus allowing individuals to locate
of the operational impacts of architecture con- themselves and relate their contributions to the
cepts on their programs and on the agencys IT organizations overall effort. Placed in a public
infrastructure. This uneven level of knowledge area, a policy map quickly becomes a conversation
about enterprise architecture by political leaders, magnet as members of the organization inform
functional experts and managers, and academic themselves and their colleagues about the enter-
researchers suggests that the traditional commu- prise architecture; about the functional programs
nications methods lack effectiveness and could the architecture supports; about government and
benefit from new approaches. organizational policies; and about the political
goals they work to support.
The Missing Link: The Purpose Readers will note the continued use of the term
Reference Model policy map rather than the term purpose refer-
ence model. Using the latter term is tempting,
A policy map is intended to help inform and edu- however, terms are typically abbreviated in daily
cate executives, stakeholders, managers, and tech- usage and the FEA reference model already has
nical professionals about the agencys assigned a PRM the Performance Reference Model. A
mission, its authority to perform that mission on policy map is intended to be used at the level of
behalf of citizens, and its political goals all in a department, an agency, or at sub-agency level,
relation to the rational instruments that transform not at the national level (the U.S. Constitution
mission statements into tangible outcomes. The eloquently describes the purpose of the Federal
policy map is essentially a purpose reference government), therefore the term policy map is
model. This may sound a bit brash to some, but preferred and used throughout. The policy map
in modern IT-enabled organizations the enterprise is intended to answer three key questions:
architecture is nothing if not a depiction of how
the organization intends to conduct business. What is the central purpose of this organi-
Missing, and typically assumed to be under- zation, i.e., what is its charter, and where is
stood by all, is an articulation of what your agency that charter found?
is doing and why it is engaged in that activity.
196
Policy Mapping
What substantive programs is the organiza- and deliberation required to convey the precise
tion charged with managing, and what is the idea and nothing more.
authority for those programs? portfolio In any communication, knowing your audience
Who are the key stakeholders and who are and knowing the message you want to convey are
the programs clients? essential to your success. Most CIOs and techni-
cal professionals working with architectures are
Answers to these questions should clearly comfortable with the objectivity, rational logic,
define and describe the mission and goals of the and language used in information systems and
organization, identify its authority to pursue these enterprise architectures. They are, very likely,
activities on behalf of the countys citizens (and notably less comfortable in political and policy
the limits of this authority) and authorize the use contexts characterized by politics, political co-
of public funds to pay for these activities, and alition building, subjectivity, tradeoffs, compro-
identify the stakeholders and program clients in mise, and negotiation. This is not to fault their
order to better the understand the priorities of experience, dedication, or education, but simply
various mission and program components. to point out that the political side of government
organizations uses a skill set and vocabulary
POLICY MAPPING: WHY, WHAT, quite different from that with which most CIOs
AND HOW and enterprise architects are familiar.
The second half of this chapter focuses on the why, Why Create a Policy Map?
what, and how of policy maps. First, a few reasons
why one might want to consider a policy map are Chief Information Officers and enterprise archi-
examined in light of the earlier discussion of the tects in government organizations are confronted
two organizational faces. This discussion exam- with at least a quartet of fundamental challenges,
ines several arguments for a policy map from a each of which has the potential for clashes between
CIOs or enterprise architects point of view. Simi- the rational approach of the enterprise architecture
larly, a few reasons why political executives might and the political orientation of the organizations
find a policy map useful are examined. Secondly political executives. First and foremost is the
this discussion defines and describes a policy map, continual challenge of estimating, justifying,
examining its attributes and the what of a policy and finally acquiring resources. Secondly, CIOs
map. Reasons that visual approaches like policy must communicate with diverse constituencies to
mapping are considered effective approaches to convince them of the usefulness of the enterprise
communicating are discussed. Then thirdly the architecture and supporting IT projects. Third,
how to of a policy map is addressed. Here, I must CIOs must demonstrate performance in their own
be candid. Ive not had the opportunity to craft organizations while simultaneously identifying
a true policy map in real-world circumstances. I the contribution IT makes to individual programs
have however, used many of Horns (1998) visual and to the organizations overall outcomes. And
language techniques to communicate in a variety fourth, the CIO is challenged to create agile and
of other venues, and have experienced the chal- adaptation tolerant capabilities in the face of
lenges of trying to convey technical concepts changing circumstances. Lets examine these
such as enterprise architecture to government challenges in more detail.
executives. The preeminent challenge one faces in The first challenge, acquiring and justifying
creating a policy map is the considerable thought resources, is an ever-present concern given the
annual budget cycle of most governments. CIOs
197
Policy Mapping
and their staffs typically work across at least political executives in the agency should better
three fiscal years as they plan, implement and understand EA activities and be able to explain
operate IT capabilities for their agencies. The how their enterprise architecture contributes to
present years budget is being executed through achieving political goals.
its projects and daily operations, even as next A third fundamental challenge facing the CIO
years budget request is being estimated, justi- is to demonstrate that the enterprise architecture
fied, defended and prioritized. Simultaneously, positively contributes to organizational perfor-
planning is underway for projects and operations mance and to achieving desired organizational
in the out-years, long-lead time infrastructure outcomes. Simultaneously the CIO must demon-
items, and consolidation projects identified in strate that his or her organization is performing
the architecture. A policy map can help sustain effectively. While it is imperative that the CIO
a concerted focus on the goals, and keep the assist functional programs in improving their
multitude of necessary conversations focused outcomes by innovative uses of information
on achieving desired organizational outcomes technology, that of itself is not enough; the IT
rather than becoming jargon-filled discussions organization itself must demonstrate the desired
about technical details. When reprioritization level of performance, and demonstrate innovative
of effort and resources occurs, as it typically approaches to implementing the architecture and
does in projects of this nature, the policy map boosting the effectiveness and efficiency of the
can help focus attention toward those projects organizations programs. Again, the policy map
that contribute most to achieving both political can be effective by keeping all parties focused
goals and desired organizational performance on and working toward producing the desired
and outcomes. outcomes. Despite the different roles of orga-
Secondly, CIOs have a responsibility to in- nizational components, they all face the single
form as well as educate organizational members imperative of working together to achieve the
about the role of information technology and desired outcomes a condition called strategic
the enterprise architecture in achieving desired alignment.
organizational performance and outcomes. Since The need to become agile and adaptation tol-
the CIOs and architects activities cut across all erant, the fourth challenge, is a new requirement
internal organizational units, they are expected for 21st century organizations as they encounter a
to understand each of the agencys functional variety of challenges such as globalization (Fried-
programs and the role and contribution of infor- man, 2005). While government organizations
mation technology in each program. They should are more indirectly affected by global economic
be able to discuss the enterprise architecture, change than are their business counterparts, they
and its supporting IT projects, with people at all face a parallel challenge of global political reform
levels of the organization, helping individuals (Kettl, 2000) that challenges their relevancy and
understand the relationship of their individual viability. Developing organizational capabilities
efforts to organizational effectiveness. As a that are agile and adaptable are the usual responses
result of the CIO and architects policy mapping to these external forces of change. Frequently over-
activities, IT professionals should increase their looked as a source of turbulence in government
understanding of architecture implementation organizations, however, are the election cycles that
and supporting IT projects. Functional and pro- go hand-in-hand with political executives time-
gram executives should more clearly understand limited tenure. Frequent executive turnovers are
how the architecture provides more effective a significant source of organizational turbulence.
and efficient IT support for their programs. And Agility and adaptation to a new leader or a new
198
Policy Mapping
leadership team are important qualities for CIOs organizational adaptability and agility, a signifi-
and program executives. Policy maps can help ease cant asset to leaders involved in organizational
the steep learning curve facing new executives change (Lawrence, Dyck, Maitlis, & Mauws,
by identifying essential relationships between 2006). Knowledge of the structural and informa-
political goals and organizational actions. By tional attributes and relationships displayed on
familiarizing new executives with the policy map policy maps can assist in creating and evaluating
CIOs and program executives can demonstrate sophisticated scenarios of organizational change.
their support for their new political bosses. And given that todays organizations were crafted
The previous paragraphs have suggested some in another era to address a different set of chal-
of the contributions a policy map can make from lenges, significant opportunities exist to reshape
the CIOs point of view. From that perspective, a todays organizations to new purposes.
policy map can provide a resource focus; inform As CIOs address each of the challenges noted
and educate members of the organization; sup- before, resource acquisition, communication, per-
port efforts to achieve alignment for performance formance, and agility, they carry out an implicit
improvement; and promote agility and adapta- translation in which they relate the context and
tion in the face of external as well as internal technologies of functional programs and processes
organizational turbulence. As generically listed to the priorities and information needs of political
before, these benefits seem rather similar to the executives. Skillful and successful CIOs perform
capabilities and insights political executives might this implicit mental mapping and translation in
desire of their organizational decision environ- real time as they address their audiences concerns.
ments. In other words, a policy map may serve to Individuals less aware of organizational politics
not only convey the logic, approach, and intent of or less skilled at addressing issues in executive
the rationally focused enterprise architecture, but contexts, typically watch in awe as functional con-
may also serve broader politically oriented goals cerns, political issues, and technological details are
of the organizations leaders. Political executives addressed with seeming ease by seasoned CIOs.
certainly need to understand the challenges of Such performances demonstrate that his or her
resource acquisition, allocation, and prioritiza- success is not accidental. Rather, successful CIOs
tion in their agency and be able to relate resource have taken the time and effort to understand the
requests to the goals and missions addressed. political or functional executives interests, and
Informing, educating and communicating are have mentally mapped the relationships between
leadership functions supported by policy mapping, the executives interests and the CIOs knowledge
however much of political executives efforts in of enterprise architecture and IT projects. He
this regard might be expected to focus on external or she has already created a mental policy map
stakeholders and key players in political processes. representing the CIOs tacit knowledge of the
Influence plays large in political environments, relationships between executive and CIO envi-
and policy maps provide strong visual illustrations ronments. In order to make this knowledge more
of the desired to-be state articulated by the widely available and useable, CIOs and enterprise
architecture, all intended to positively influence architects need to create explicit and visual policy
stakeholders. Intended performance improve- maps, incorporating and displaying the wisdom of
ments incorporated into the enterprise architecture their implicit mental policy maps. Such policy
can be depicted in relationship to the organizations maps should become a component of the agencys
mission, goals and political agenda. Lastly, well enterprise architecture, be a standard feature of
developed policy maps used in conjunction with the organizations architecture presentation, and
an enterprise architecture can be used to create be converted to poster-sized hallway displays.
199
Policy Mapping
When included as part of the EA, a policy map insights for functional programs and processes,
has the potential to help all interested parties and highlights the usefulness of EA efforts for
understand the translation of political goals into political, functional, and technical executives.
agency implementation actions enabled by infor- The notion of a policy map is, of course, meta-
mation technology. phoric. And to truly understand it, if the metaphor
is a useful one, the attributes or entailments of
A Policy Map Shows Relationships the metaphors source domain (the map) should
transfer to the metaphors target domain (the
What exactly is a policy map? At its simplest, a policy map) and help explain the nature of the
policy map is and does what any map does it target domain (Horn, 1998, p. 113). To illustrate the
depicts and describes relationships. A geospa- entailments of a map, Mark Monmoniers How
tial map of the Mid-Atlantic region of the US, to Lie With Maps (1996) is recommended. In a
for example, shows the relationship between witty yet brutally truthful volume, Monmonier
Washington, D.C. and Philadelphia expressed discusses maps and mapping as well as the ways
in terms of distance and direction. Depending in which maps both portray and distort reality.
upon its properties, this map might also display Since we desire to portray the intersection of a
terrain, hydrographic information, transportation rational enterprise architecture with the reality
systems, and points of tourist interest. Similarly, of political executives, we need to be able to deal
a policy map for an e-government application with both distortion and reality, as we understand
in the U.S. Federal government might show the and perceive them. Maps have three basic at-
relationship between the citizen-centered services tributes: scale, projection, and symbolism. Each
goals of the Presidents Management Agenda and element is a source of distortion. As a group, they
the Recreation One-Stop e-government initiative. describe the essence of the maps possibilities and
It might show, for example the Department of limitations. No one can use maps or make maps
Interior as the lead egovernment agency for this safely and effectively without understanding
initiative and list each of the agencies collaborating map scales, map projections, and map symbols.
to make Recreation One-Stop a successful egov- (Monmonier, 1996, p. 5).
ernment initiative. It could depict how Recreation Transforming the attributes of a map scale,
One-Stop is integrated into the departments projection, and symbolism into their counter-
architecture framework, and depending upon parts in a policy map completes the metaphor and
the level of detail desired, might show OMBs lends some needed definition to the concept of a
egovernment and security policies and how the policy map. First, the attribute of scale focuses
policies are implemented in the initiative. By on describing the ratio of reality to representa-
creating a policy map, one creates a line-of-sight tion. Inherent in determining scale is the question
between the political goals that are sought (the of what are the boundaries of the reality being
ends), and the processes and delivery mechanisms represented? Does this policy map represent
within the architecture that are designed to deliver the enterprise architecture for the entire agency,
citizen services (the means). Within an enterprise or does it represent the architecture of a single
architecture, a policy map brings together the functional program? Scale, in a policy map, iden-
policies, procedures, and guidance that provide tifies the portion of the enterprise architecture
justification and rationale for the enterprise ar- represented in that particular map. One might
chitecture and its implementing initiatives. In address the scale issue by representing only the
articulating policies and creating a clear view of top-most portion of the enterprise architecture,
accountability, a policy map provides significant that part associated with the performance refer-
200
Policy Mapping
ence model. Scale can be indicated by a short are likely to be interested in both the PRM and
descriptive sentence: This policy map depicts the BRM, with the BRM receiving perhaps greater
relationship of political goals and policy initiatives scrutiny due to its relation to program activities
to the agencys performance reference model. as shown in Figure 2.
While two other methods of stating the scale ex- Symbolism, the third map attribute, is the
ist, ratios and graphs, they are less appropriate system of map symbols, the mechanisms for
for policy maps. encoding information on a map. Maps typically
Projection, the second attribute of a map, is the use three geometric symbols points, lines, and
means by which the planets three-dimensional areas which can then be varied by size, shape,
surface is converted into a flat two-dimensional graytone value, texture, orientation, and hue
plane. This notion is analogous to the notion of (Monmonier, 1996, pp. 18-22). Most of use are
perspective used in the information systems quite familiar with the typical map conventions:
architecture framework (Sowa & Zachman, 1992, points on maps typically denote towns or places
p. 601), Bernards EA Framework (2004, p. 38), of interest, with the size of the point providing an
or the hierarchical set of five reference models indication of the size of the town; lines typically
that comprise the Federal Enterprise Architecture denote roads, railroads, streams and rivers; size
(OMB, 2007b) shown as Figure 1. Using the FEA and hue (color) are added to provide a descrip-
reference models for example, the projection of a tive dimension to line symbols; and area symbols
policy map might incorporate the Performance typically suggest contiguous areas, such as in-
Reference Model (PRM) or the Business Refer- corporated cities, parks, or specially designated
ence Model (BRM), the two most likely policy map areas. Descriptive richness is then added to map
projections used to construct policy maps for use symbols by using size, hue, and texture. As shown
with political executives. Functional executives on Figure 2, lines are used to show relationships
Symbolism, the third map attribute, is the system of map symbols, the mechanisms for encoding 201
information on a map. Maps typically use three geometric symbols points, lines, and areas
which can then be varied by size, shape, graytone value, texture, orientation, and hue
(Monmonier, 1996, pp. 18-22). Most of use are quite familiar with the typical map conventions:
Policy Mapping
between political goals shown as the perfor- keep discussions focused while surfacing vari-
mance initiative Getting to Green (Emery, ous points of view, and to produce creative and
2003) and the PRM portion of the enterprise non-intuitive approaches to persistent challenges.
architecture. Here the policy map illustrates the The few research efforts into the effects of visual
linkage between a political initiative and the language show interestingly positive results. Horn
relevant portion of the enterprise architecture, reports (1998, p. 234) a study conducted at the
the Performance Reference Model. In the same Wharton School of Business found that visual
manner, the goal of creating a consolidated reser- language aids decision making; makes a better
vation system for Recreation One-Stop is shown impression; shortens meetings; promotes group
as a process related to a portion of the Business consensus; and is persuasive.
Reference Model. A side annotation could have
listed the two IT projects planned for next year Crafting Your Policy Map
that will enable the process to deliver the desired
outcome a consolidated reservations capability. Earlier we described successful CIOs as hav-
A note of cautionary is in order. It is important to ing an implicit mental model that allows her or
remember that when creating policy maps, the map him to (seemingly) effortlessly and effectively
characteristics just described are not part of the address the challenges and concerns of the po-
enterprise architecture, but can be overlaid on a litical executives with whom they are dealing.
portion of the architecture to show the underlying Expertise, experience, judgment, and timing are
relationships. In all cases, however, ensure you all hallmarks of effective performance. Crafting
craft your enterprise architectures in accordance and presenting a policy map that defines and il-
with extant guidance. lustrates the relationships between an enterprise
In summarizing the discussion of what consti- architecture and political goals and objectives
tutes a policy map, it is important to emphasize requires a stage-worthy performance. Know the
that a policy map is a means to communicate. context, the environment, and the message you
Policy mapping uses visual depictions of relation- are delivering; know your lines and responses to
ships to aid communication between groups that the likely questions; and practice your delivery
have very different vocabularies, despite sharing until it becomes natural. Practice sessions with
a common language. Visual language combines an audience are especially valuable, as their ques-
words, images and shapes to communicate through tions provide important clues to topics or concepts
four general types of visual devices: 1) icons requiring greater clarity.
are a simple graphic with a fixed meaning (e.g., Constructing a policy map is not difficult.
toolbar icons on Microsoft Office applications); Todays office environment provides the tools one
2) concept diagrams use a simple to moderately might need for crafting a policy map, especially if
complex graphic and a sentence or two to convey using the concepts of visual language. Graphics
a single concept; 3) an information graphic, typi- or presentation programs, such as PowerPoint can
cally a page-sized illustration, combines images, be effectively employed to create the content for
shapes and text into a complete communication a policy map, and newer versions of MS Word
unit; and 4) an information mural that can range provide most of the same capabilities. Clip art can
from poster to wall-sized and contains one or used to create any needed images, shapes can be
more information graphics (Horn, 1998, pp. 55- constructed through the drawing features of both
64). Visual language approaches have been used Word and PowerPoint, and text capabilities are
effectively to provide visibility into complex native to both applications. Icons have been devel-
issues, to illuminate cross-boundary issues, to oped for many physical items and for some com-
202
Policy Mapping
monly used concepts. A remaining challenge is is the abstract thinking and contextual creativity to
the lack of useful graphic representations of more extract essential ideas and relationships, and then
complex conceptual constructs, those notions synthesize and present them a coherent manner.
that do not yet have a defined visible form. Some A notional policy map for Getting to Green is
conceptual constructs have been given generally shown at Figure 3.
recognizable form, such as the lighted bulb over To summarize, a policy map expresses the
a persons head to indicate an idea, or getting an relationships between political goals and agendas
idea, or a sudden new awareness. In some places and the enterprise architecture. It is intended to
this notion has been turned into an icon, using bridge the gap between political goals and ideas
just the outline of a bulb to represent the idea. and rational organizational planning. In form it
Other concepts, however, are a bit more difficult is intended to be context dependent and visual,
to visualize. Consider, for example, the concept and like its geographical counterpart, has the at-
of federalism which is important in egovernment tributes of scale, projection, and symbolism. Scale
applications and which may figure prominently in refers to the portion of the enterprise architecture
some enterprise architectures. Federalism is an represented in the policy map. Projection, or
agreement by which a central and superior state perspective, indicates the viewpoint within the
with prescribed powers is created from several hierarchy of architecture reference models. And
states which retain limited powers in their own symbolism is concerned with the presentation
right. This concept is particularly interesting be- of information content. Policy maps can be cre-
cause it contains two sets of paradoxes, the first ated with standard office software suites using
in the notions of sovereignty and dependency; visual language constructs (images, shapes, and
and the second in the notions of exclusivity and text) and communication units (icon, concept
inclusivity. These complexities notwithstanding, diagram, information graphic, and information
the preeminent challenge to creating a policy map poster and mural).
203
Policy Mapping
204
Policy Mapping
First, from a performance management point of can benefit greatly from policy mapping. In these
view, outlining the relationship of political goals instances policy maps should be created at each
to architecture components and IT initiatives level of government to ensure end-to-end compat-
may help organizations to better define program ibility. Policy mapping could be especially useful
success, a difficult proposition to describe in to e-government efforts in the fields of health care,
objective terms. The tough question, what does housing, and welfare.
success look like? is brought more clearly into Policy maps provide an opportunity to educate
focus when policy ends are viewed in concert with professionals within the IT organizations, func-
the process-based means and the policy ideas that tional programs, and within the political layers
energize government activities. of agencies. It is becoming increasingly impor-
The effort invested in crafting a policy map tant that all professionals understand enterprise
may help relocate the organizations effectiveness architecture and how it both affects and benefits
vs efficiency debate into a more productive venue. political initiatives, functional programs, and the
Whereas enterprise architectures in business or- CIOs office. A creative and enlightening policy
ganizations have a primary concern efficiency map enlarged to the size of an information poster
enterprise architectures in government organiza- or information mural could provide a hallway
tions have several simultaneous and sometimes conversation focus that benefits all members of
conflicting drivers. For example, US Federal an organization.
acquisition policies are crafted to promote not And lastly, communication with executives
only efficiency, but to also simultaneously cre- is enhanced when policy maps provide a point
ate a level playing field for those offering goods of reference around which to array architectural
and services to the government. Small business and functional initiatives. Policy maps provide
set-asides and programs to give preferences to essential references to overarching goals, creat-
minority and women-owned businesses are driven ing a point of departure for discussing decisions,
by concerns over equity, not efficiency. Success, tradeoffs, and implementation planning.
as noted previously, may mean promoting such
societally desirable programs at the expense of
efficiency. CONCLUSION
Cross-agency collaboration can be both eased
and enhanced through the use of policy map- This chapter has posited the idea of creating policy
ping. Most political goals cannot be achieved maps to help bridge the gap between the politically
by a single organization operating in an agency- oriented face of government typified by political
centric manner. The need for multi-agency executives, and the rational face of government as
collaboration, essential for achieving effective typified by the organizations Chief Information
outcomes is more easily seen when looking at Officer, its enterprise architect, and its enterprise
the big picture provided by a policy map. Even architecture. A policy map in concept allows one
the most parochial executive must at some point to stretch a string from the political goals and
admit that the broad policy objectives can only agendas through the enterprise architecture to
be achieved by collaborative effort. The lessons the implementation and the organizations desired
of Hurricane Katrina and the rebuilding of New outcomes. This concept is an extension of the
Orleans provide useful examples. practice of ensuring requirements traceability,
Federalism, collaboration that extends verti- the extension being into the goals and agenda
cally to link national endeavors with sub-national items of political leaders.
and local endeavors serving the same purpose,
205
Policy Mapping
Many, while acknowledging the positive ben- commission on federal paperwork. Washington,
efits of policy maps, may be tempted to forego D.C.: Government Printing Office.
the investment in time and research needed to
Bozeman, B., and Straussman, J.D. (1990).
develop useful policy maps. A variety of excuses
Public management strategies: Guidelines for
will be presented, including all of the following:
managerial effectiveness. San Francisco, CA:
a) we assume that the policy environment is
Jossey-Bass, Inc.
static and will remain so; b) we assume political
executives will embrace the architecture because Davenport, T. H. (1992). Process innovation:
it is required by statute; c) we assume the archi- Reengineering work through information tech-
tecture will be funded because it is required; and nology. Boston, MA: Harvard Business School
d) we hope that someone else will recognize the Press.
importance of the architecture and take steps
Emery, G.R. (2003, July 21). It aint easy getting
to get the necessary resources to develop and
to green: Most agencies making progress but
implement it. Rather, CIOs and architects might
management goals yet to be achieved. Wash-
do well to view policy as being nearly as dynamic
ingtonTechnology. Retrieved Oct 25, 2007 from
as information technology, and with a similarly
http://www.washingtontechnology.com/print/18_
short product cycle.
8/21225-1.html
As this is written in the fall of 2007, intense
political maneuvering is already underway for Office of Management and Budget. (2001, July
the election that will be held in 12 months. The 18). Citizen-centered e-government: Develop-
political cycle for the 2008 election in the US is ing the action plan. (OMB Memorandum 01-28).
well underway. Between mid-November 2008 and Retrieved June 10, 2007, from http://www.white-
the end of June 2009 a sea change will occur at house.gov/omb/memoranda/m01-28.html
the top of most Federal agencies. A new crop of
Office of Management and Budget. (2002, Febru-
political executives, full of energy and ideas on
ary 27). E-government strategy. Retrieved June
what is broken and what needs fixing will replace
10, 2007, from http://www.whitehouse.gov/omb/
todays political executives. As the CIO or architect
inforeg/egovstrategy.pdf
you will eventually prepare a series of informa-
tion briefs and position papers for the new crop of Office of Management and Budget. (2007a, July).
political executives. Consider developing a policy FEA consolidated reference model document
map to demonstrate how the work youve been version 2.2. Retrieved June 10, 2007, from http://
doing will help achieve the political goals your www.whitehouse.gov/omb/egov/documents/
new executives have pledged to support. FEA_CRM_v22_Final_July_2007.pdf
Office of Management and Budget. (2007b,
July). FEA reference model mapping quick guide
REFERENCES
(FY09 budget preparation). Retrieved June 10,
2007 from http://www.whitehouse.gov/omb/egov/
Bernard, S. A. (2004). An introduction to en-
documents/FY09_Ref_Model_Mapping_Quick-
terprise architecture. Bloomington, IN: Autho-
Guide_July_2007.pdf
rHouse.
Friedman, T.L. (2005). The world is flat: A brief
Commission on Federal Paperwork. (1977). Infor-
history of the twenty-first century. New York,
mation resources management: A report of the
NY: Farrar, Straus and Giroux
206
Policy Mapping
207
208
Chapter X
Enterprise Architecture
Management and its Role in IT
Governance and IT
Investment Planning
Klaus D. Niemann
act! Consulting GmbH, Germany
Abstract
A comprehensive enterprise architecture management has strategic and operative aspects. Strategic tasks
cover the identification of appropriate fields of activity for information technology (IT) investments in
accordance with business strategy and portfolio management. Enterprise architecture management is
cross-linked with other IT management processes and delivers the necessary information for a sustainable
governance. The continuous analysis of the IT landscape, the deduction of measures for optimization
and its controlling also belong to the tasks of architecture management. Standards for development and
infrastructures are made, e.g. reference architectures and a book of standards, whose implementation
is overseen by solution architects throughout the operative architecture management.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
Could the actual model not serve as the basis Enterprise architecture (see Figure 1) is a struc-
for a target-oriented evaluation with which tured and coordinated collection of plans for the
weaknesses in the grown IT landscape can design of the IT-landscape of a company,
be identified? (s. section 5.2, Figure 8)
Could this as-is model not also serve a better Which represent in various details and
controlling of a companys IT investments? views,
(s. section 5.2, Figure 9) Focused on special groups of interest (e.g.
Could there be standards and guidelines for managers, planners, clients, designers)
transformation processes evolving from the Different aspects of IT-systems (e.g. data,
business which guarantee an efficient devel- functions, interfaces, platforms, networks)
opment, maintanance, and safe operations? And their embedding within the system (e.g.
(s. section 5.3.1) goals, strategies, business processes)
Finally: is it not possible to cross-link the In past, present, and future specifications
work of solution architects with planning (Niemann, 2006).
tasks more tightly? (s. section 5.4)
Enterprise architecture management combines
By dealing with these questions this chapter all those processes, methods, tools, and respon-
tries to show approaches for the development of sibilities which are necessary to make things
a more comprehensive enterprise architecture work, to ensure that IT-systems do just what they
management must do cost-efficient, smoothly, and elegantly.
Simply said: architecture management is a process
resulting in enterprise architecture.
Enterprise architecture management is the
instrument with which to run the household: to cul-
209
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
tivate application- and infrastructure landscapes, and documentation of the area we want to travel
maintain and improve the value of existing assets, in. This would be the enterprise architecture which
seamlessly integrate new components, adjust consists of elements of existing models: business
everything and make it work. Housekeeping is process models, organization models, IT-product
in high demand when budgets for new prospects lists, IT infrastructure catalogues, and the like.
decrease! As soon as we have the maps for our travel
This continuous analysis of application- and area we want information on places of interest,
infrastructure portfolios belongs to the tasks hotels, road conditions. Likewise, an enterprise
of an enterprise architect. For this the ongoing architecture displays its true value if not only
maintenance of the enterprise architecture model seen as a static picture but if actively used for
is indispensable. On this basis weaknesses can be analyses and as the management information
identified and potentials for optimization detected, system of the CIO.
then measures can be taken and incorporated into The analysis of our maps is followed by the
change processes. For an enterprise architect this planning of the route. The analysis of enterprise
means to focus his work on these requirements architecture, too, must be followed by the de-
and consider enterprise architecture as a means velopment of planning scenarios which address
of IT-governance. In this context enterprise ar- detected weaknesses and show problem solutions.
chitecture The to-be image and transformation planning
are then incorporated into the project portfolio
Must generate transparency and be under- and program management to realize the strategic
stood by the management; be the RADAR plan. Within the implementation of the transfor-
of the Chief Information Officer (CIO) and mation plan enterprise architecture functions as
a management information system, a governance instrument.
Must be analytically useable and derive new An initial version of the enterprise architecture
information from known facts, must react emerges from a project with a duration of 3-6
on new demands, be flexible and, better still, months and must then be imported into an on-
actively prepare for changes, going architecture management process.
Must open perspectives on the future; may An enterprise architecture designed for im-
not only be a static representation of the mediate use in the context of an IT-governance
actual state, but must be the basis for sce- program thus originates from a cycle of docu-
narios and plans for the to-be,
Must be realizable and operatively effective,
and with methods, organisation forms and Figure 2. The enterprise archi-tecture cycle
architecture management tools strongly
support the tranformation of strategy into
operative reality,
Must be measurable and binding and an
effective basis for the controlling and moni-
toring of strategic IT-measures (Niemann,
2005).
210
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
mentation, analysis, planning, imple-mentation, Tools and their integration into the tool-
and control (see Figure 2). box,
An enterprise architect focuses on the con- Procedural methods and responsibilities,
tinuous devel-opment and optimization of the Key figures and controlling.
application- and infrastruc-ture landscape ori-
ented at the business strategy. On the one hand Architecture management has both an opera-
architecture management as an enabling process tive and a strategic dimension. Documentation,
sup-ports the demand processes of order- and analysis, and planning of enterprise architecture
portfolio man-agement. On the other hand, as a on a strategic level must result in measures which
governance instrument it has standardizing and are to be operatively implemented into projects
controlling effects on the supply processes of or line functions.
project-, program-, and service management. Here, too, architecture man-agement must give
Architecture management is responsible for support, e.g. develop reference archi-tectures in
the planning, development, use, and maintenance the fields of ap-plication- and system archi-tecture,
of enterprise architecture. It organizes associated monitor their use and implementation, ac-tively
processes, controls and monitors the development. help, get things started.
Therewith architecture management describes
procedures for the close interlocking of business, IT Governance
IT-applications, and IT-infrastructure.
Architecture management is concerned Searching for definitions of the term Corporate
with: Governance, we find (e.g. in Germanys Corporate
Governance Code) (DGI, 2003) that corporate
The strategic processes for documentation, governance contains essential legal directives to
analysis, and planning of enterprise archi- the direction and supervision of listed companies
tecture and defines international and national standards of
The operative processes for the consistent good and responsible business management. The
implementation of enterprise architecture, board of directors is responsible for the appropri-
the conformity check against reference ate risk management of the enterprise Furtherand
architectures, and defined infrastructure develops the strategic alignment of the business
shopping carts, and provides for its implementation.
The definition of documentation proce- Good and responsible management, strategic
dures, focus of the company and its implementation, ap-
Analysis- and planning methods, propriate risk management and controlling: the
Evaluation procedures, top managers of our companies are committed to
211
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
these principles. Facing this list which IT-manager are they going to do to meet these requirements?
would not react enthusiastically if asked for his The first action will probably be an analysis of the
contribution to the realization of these principles? current status to generate a detailed list, e.g., of
And surely he would indicate that information is the distribution of costs across the departments,
the key to success of the corporate governance or of the series of operations, or to thoroughly
program, that all kinds of management need trans- understand the distribution of costs across the
parency, that each implementation of strategies distribution channels. The figures for this analysis
needs a clearly defined course of action developed are obtained from the information systems of the
on the basis of all pieces of information, that risk company. IT-systems will likely play an important
management and controlling can not be realized role in the controlling of the measures derived
in the dark but only in the light of a transparent from the analysis.
basis of information. And he would finish his Thus IT plays a significant role in corporate
remarks by adding that it is no other than IT governance issues. This is often demonstrated by
which, with the help of its information systems, legal specifications such as the Sarbanes Oxley
produces the light without which no controlling, Act, Section 404 which make high demands
navigation, monitoring or correction of course on internal company controlling and therefore
would be possible. on the IT. But what about governance of the IT
To follow governance principles also means department itself?
to make informed decisions. Governance presup- Lets have a look at another example: The
poses planning, organization, controlling, and management board decrees cost savings which
monitoring in short: management on the basis for the IT department mean a budget decrease of
of comprehensive information. 15%. Now our CIO is in a similar situation as his
But what exactly does the IT department do colleague in aforesaid example. Which IT system
to support the other specialist departments in can the CIO use to generate an initial analysis as
their planning-, controlling-, and monitoring a preparation for this strategy? Where do we find
tasks and to contribute to the implementation information on IT applications, IT infrastructure
of corporate governance principles? It delivers components, their dependencies on the business
precisely this comprehensive information: with (organization units and business processes), and
data warehouse systems, business intelligence which in addition to this identifies and makes
suites, management or executive information analyzable the costs, risks, ongoing projects and
systems. The management of the departments available IT staff? Does the IT department deliver
use just these systems to improve the business, the key information for the implementation of
save costs, open new markets, develop or place corporate governance for all other company areas
new products. With the information provided by but has no own tools to develop and control IT
these systems they support good and responsible governance processes?
corporate management, the strategic orientation Where do we find the management information
of the company and its realization, an appropriate system of the CIO? Where is the model which
risk management and controlling. documents IT assets with all their dependencies,
Lets have a look at following example: On the effects, and cross-references in a way that they are
basis of their key figures the board of manage- transparent, analyzable, and can be planned? We
ment finds that one product area does not oper- find the answer to these questions in enterprise
ate profitably. The departmental management is architecture. This is the model which documents
required to reduce costs and increase sales. What and networks all IT assets in the necessary form;
enterprise architecture provides support for analy-
212
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
sis and planning indispensable for an effective tation of an enterprise architecture model and
IT governance. the development of an enterprise architecture
The installation of an IT governance program practice within the company.
asks for measures on three areas of activity: proc- The IT Governance Institute (2000) defines IT
esses, organization, and information (Mandler, government as follows: IT governance is under
Niemann and Henning, 2007). Typical topics of the responsibility of the board of directors and the
these areas are: management and is an integral part of company
management. IT government consists of leader-
Process ship, organization structures and processes which
ensure that IT supports the company strategy and
Networking of IT management processes goals. IT governance ensures that
BusinessIT Alignment
Workflow The expectations on IT are fulfilled,
Result types and templates IT-resources are continuously planned,
Quality Gates controlled, and optimized,
Ways of decision making (monarchic, dual, The performance of IT is measured
feudal, or federal structures) And risks are minimized.
Stakeholders
Use Cases So this is about effectivity, efficiency, and
reliability. To do the right things correctly and
Organziation reliable. Enterprise architecture provides the
necessary overview, the understanding for the
Bodies relation of company goals, business processes,
Roles (task, competence, responsibility) technical requirements, projects, IT applications,
Escalation- and steering committees IT platforms, and IT infrastructure. It intercon-
Communication (acceptency, commitment, nects these elements, demonstrates effects and
perforation) dependencies, documents costs, risks, availabili-
ties, stability, and a lot more attributes.
Information But enterprise architecture can do significantly
more: it can not only document a given situation,
Goals and strategies but also delivers procedures for the analysis of
Focus (scope) weaknesses. Where are the cost drivers in the
Assessment and benchmarks application landscape? Where are redundant
Transparency (dependencies and effects) development technologies? Where the support of
Information model and tool environment business processes is inadequate or redundant?
Weakness analysis (e.g. heterogeneity, com- This as-is analysis is the basis of an effective
plexity, cost drivers, value creation) IT governance process and, as part of corporate
Standards and reference architectures governance, indipensable.
Principles, compliance rules & policies What is the next step after the analysis? It is
Decisions the planning and implementation of measures.
Metrics and KPIs Enterprise architecture helps us plan, it is the
basis for the development of planning scenarios in
All three areas of activity of IT governance which alternative ways of IT application portfolios
are addressed and supported by the implemen- are evaluated. Enterprise architecture therefore
213
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
is a central instrument of any kind of governance On this basis projects are positioned within a
program. How could we lead, direct, and control port-folio, for example (see Figure 4), where the
without knowing where we stand, how the route ex-pected project costs are indicated by the size
looks like and where it leads to? of the symbol, too. The allo-cation of available
budg-ets on projects which are economically and
IT Investment Planning strate-gically important results in a red line
and the assignment of those pro-jects which are
The point of IT investment planning is to direct above/right of this line in the portfolio.
IT budgets onto the right areas, i.e. to ensure the The term IT investment planning used here
effectivity of investments. Finance management has further meaning, though. The IT budget as a
supports IT investment planning by defining, ad- whole covers significantly more than just the part
ministering, and monitoring IT cost centres. From which is available for new projects and controlled
our experience IT investment planning is often purposefully and according to business strategy
equated with project portfolio management, which by the project portfolio management.
- usually annually - balances business require- An examination of the distribution of costs of
ments with the budgets available for the projects. big IT areas helps to find out how big the share of
To this end projects are e.g. evaluated regarding the whole IT budget needed by portfolio manage-
their monetary and strategic importance for the ment is to ensure a target-oriented investment to
business. The monetary importance is derived the benefit of the business.
from the business case of the project, the strate- Figure 5 shows an exemplary distribu-tion.
gic significance is derived from the support this As in recent years for many eco-nomic fields
project provides for the actual business strategy, a significant reduction of new developments as
e.g. an impact on the improvement of the market opposed to main-tenance has been obvious, this
position in relation to the competition. example on development assumes 30% correc-
214
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
Primary Objectives
215
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
An important task of architecture management is business support matrix (see Figure 8), which
to design and cultivate the as-is model of enter- e.g. juxtaposes the main processes of the orga-
prise architecture regarding purposes of analysis nization with the main services provided by the
and planning in a suf-ficiently current status. organization within a matrix (Matthes and Wit-
The analysis of the actual landscape indicates tenberg, 2004; Niemann, 2006). The supporting
potentials for optimization and is thus the basis applications are then entered into the matrix and
of the application portfolio. There are a number may be coloured regarding cost of production or
of figure types for the representation an actual maintenance, availability, compliance or indicat-
model of enterprise architecture. Figure 7, e.g., ing white spots, for example. Often instead of the
shows a so-called cluster map in which applica- main services organization units or locations are
tion systems and their interfaces are graphically juxtaposed with the processes.
presented. Such displays can highlight many The business support matrix offers the pos-
enterprise architecture attributes relevant for sibility to set application systems in direct rela-
analysis, for example in terms of colour. Often tion to supported business processes and their
this is called cartography of enterprise archi- importance for the business, or to services and
tecture (Matthes and Wittenberg, 2004). Costs, their volume share. With this it becomes possible
availabilities, business criticality, and compliance to operationalize the IT support for the business.
can be examples for such at-tributes. For the analysis of enterprise architecture this
Besides cluster maps there are other forms form of representation has been well tried. The
of representation which allow to establish direct placement of application systems within such a
relations to the supported business. A well-known matrix allows the analysis of costs, of the tech-
sample for such a form of representation is the nical coverage regarding gaps or redundancies,
216
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
and to examine interfaces regarding complexity with projects shows that such visualizations are
or heterogeneity. often drawn up according to situation, but rarely
The placement of application systems in a comprehensively across different areas of interest,
structured application landscape is based on ref- and not combined with necessary maintenance
erences between the architectural levels business and adaptation processes.
and application. Application systems support busi- As soon as the objects in our application
ness processes and the handling of products. The landscape are mapped one can begin with the
visualization of a product/process matrix already evaluation regarding costs, redundancies, gaps,
enables some evaluation, but even more can be and breaks. Did we analyze the number of inter-
achieved by a documentation of the application faces, run scenarios? Do we really use the data
landscape in a data bank and/or a special tool for of the application landscape or do we merely look
the modelling of enterprise architectures. at it instead of into it?
Such a documentation of the application land- The representation of the application landscape
scape is an efficient basis for analyses and sets the needs attributes. If the objects within the enterprise
stage for the optimization of existing enterprise architecture have no attributes the analysis of the
architecture. The visualization of the application application landscape will not result in a proper
landscape is also prerequisite for navigation and statement. Costs, strategic impact, dependencies,
communication. In projects, steering committees, performance indicators, efforts, age, capacities
coordination meetings: everywhere a visualiza- all these are sets of information required for a
tion is necessary. Our daily practical experience complete enterprise architecture, and to be able
217
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
to analyze them throughout the references in the tion of the models, and referencing. Sources for
application landscape. the design are existing application portfolios and
An application- and infrastructure landscape sketches of the application landscape.
is not only a sketch or map. It is alive, has attri- When the as-is model is developed in this way
butes, is subject to change, and can provide a lot the coherence becomes visible and a thorough
of useful information. analysis of weaknesses can be made. Such an
This requires a planned development. Which enterprise architecture can, e.g., also present
references do we need? Which evaluations do the context of an IT financial management and
we want to make and with which actuality? How therewith show how the costs for IT support are
often? Which key figures shall be derived thereof aggregated through several levels (see Figure
and how shall they be condensed? How will the 9). Thus the basis for a complex IT investment
application- and infrastructure landape be main- planning is made.
tained and kept up to date? Who is responsible, To use the information on costs for the car-
partaking, coordinating? tography of application landscapes allows, e.g.,
These questions are worth answering, because the identification of hotspots in which high main-
the outcome is the key to the real use of enterprise tanance costs occur regularly. This perspective
architecture. Most companies have models galore (see Figure 10) allows the alignment of IT invest-
but can not use them because they are neither ment procedures with the strategic areas important
aligned nor consolidated; they are semantically for the business: are maintenance investments
and syntactically incompatible and can not be made exactly for those fields of activity which
compared. are presently important?
To design an application landscape by an- Considering that only about 20% of total ap-
swering the aforementioned questions requires a plication costs throughout the complete life cycle
syntactic and semantic alignment, a synchroniza- are spent on the initial development, but 80% on
218
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
cur-rent maintenance and especially inte-gra- implemented. Can portfolio management ensure
tion, this question becomes more important (see that IT investments are made for those fields of
Figure 11) activity which support the strategic direction of
Can we ensure with the help of known and the whole company?
existing mechanisms such as IT portfolio manage- The following situation shall serve as an
ment that IT invest-ments are made in coherence example: the annual evaluation of the project
with the business strategy? portfolio defined n new projects. Each of these
Portfolio management as the interface between projects has calculated its own individual business
business and IT is responsible for the decision case, is conform to the strategy, and was allocated
from which projects the company derives the with a budget. In a grown application landscape
most benefit and which therefore must be we can presume that each of the n projects must
deal with integration issues with other existing
systems. Lets say that the application system ABC
shown in Figure 11 will have to be integrated into
Figure 11. Lifecycle costs of an application m projects (with m <= n), and that each project
system must invest a share of its budget into the integration
with ABC. The investment for the integration of
ABC is thus the result of IABC = Pi (0 < i <= m).
The total investment of all m projects is ensured
by portfolio management. But all these projects
invest parts of their budgets into application ABC
and thereby contribute to the 80% maintenance
and integration costs shown in Figure 11.
219
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
Portfolio management did not assess invest- The Right Support of the Right
ment IABC against system ABC but against the ac- Fields of Activity
tual importance of the m projects for the business.
Therefore investment IABC is only justified through Development of Standards
the business cases of the new projects. But are we
really willing to continuously invest in application As hotspots with high maintenance costs indicate
ABC? Does the application fit into the landscape? to the enterprise architect to examine the compat-
Maybe these investments are necessary because ibility of the technology used in these hotspots with
ABC uses a non-standard technology, resulting other parts of the application- and infrastructure
in higher integration efforts? landcape, hotspots with high development costs
Portfolio management does not question the indicate development tools which are inefficient,
quality of the grown landscape and the conse- e.g. due to a lack of maturity or bad support.
quences for new projects and adaptive mainte- Whenever these hotspots belong to domains
nance resulting from this. Could we not strongly (e.g. cross-points of business processes and prod-
decrease the costs for operation, new projects, ucts) which are business crucial and distinctive
and mainanance by a continuous optimization an enterprise architect is under high pressure to
of the application and infrastructure landscape, act: standards must be established which ensure
and therewith significantly increase the budget efficient and effective activities for development,
for innovation? maintenance, and operations.
We have already looked upon the role of ar- Often standards are generated bottom-up: a
chitecture management in the context of house- book of standards is developed which lists products
keeping. Why is housekeeping so important? In and technologies for development, maintenance,
many economic sectors IT has become a primary and operations. Sometimes we find additional
means of production: banks, insurance companies, information on products, e.g. life cycle attri-
energy brokers, and telecommunication compa- butes, which tell us how long a specific product
nies produce their services and products almost is usually supported. It is even more effective to
exclusively with IT; logistics, transportation and classify products regarding the level of support
trading firms highly depent on IT. they are given by the company. To determine
Thus the grown application- and infrastructure technological cornerstones such levels of sup-
landscape has an immense value for a company port or standard levels are defined for available
and must be taken care of and maintained just or planned components of the book of standards
like real assets and means of production. This (see Figure 12):
facility management for the IT department re-
quires planning and controlling: do we still invest Level A is supported as produc-tion- and
in the proper IT production facilities, or do we development environ-ment.
maintain applications, interfaces and development Level B is supported as produc-tion envi-
technologies for products which are no longer ronment. Standard software systems which
the focus of our business strategy? Do we have require components of B can be oper-ated.
badly adapted or developed IT systems which Integration of standard software into the
disturb smooth business operations or prevent existing land-scape is possible.
the establishment of new systems and thus have Level C is only supported as production en-
a negative impact on the time to market? vironment. Standard software only conform
with level C components can be operated
(perhaps with support of external partners),
220
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
221
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
testing, and operation, as well as skills and proce- development tools, and infrasctructure used in a
dures (e.g. data saving, deployment). Heuristics to project or application system or groups thereof.
fulfill functional and non-functional requirements The existing development lines are examined
and for development costs, dates, and risks also regarding common technology and construction
belong to a reference architecture. principles, and differing criteria.
Usually there are several reference architec- To derive reference architectures from de-
tures for a company. The popular vision of just velopment lines is necessary because reference
the one target or reference architecture for a big architectures need experience values. There is
company could in practice not be realized. The no reference architecture without heuristics! We
requirements on back office systems, mobile dis- need this experience to check architectural drafts
tribution support, Web applications, production and choose the reference architecture appropri-
controlling or dispositive systems are too diverse. ate for a concrete task, and to be warned in time
Also, the business scenarios which serve as the if threshold values, e.g. of transaction rates or
basis for system development differ too much. availiabilities, are exceeded. We also need these
Usually several reference architectures are needed heuristics to assert governance into the operative
because just one can not serve all business areas, environment. Also, conformity checks are based
products, and distribution channels of a complex on experience values.
company. So do not keep open all kinds of options Each reference architecture is tied to an
for development but use an instrument of defined operational scenario, for example mobile sales
reference architectures which is target oriented support, development of Internet portals, back
at the business! office services. A reference architecture describes
A reference architecture delivers construction a technical solution pattern for such an operational
plans for new systems. To define such construc- scenario and defines the principles on which a
tion plans one can fall back on patterns for soft- company builds and supplies application systems
ware development; reference architecture itself which support this operational scenario. From
is a pattern for the design of whole systems. To a technical perspective the term architecture
this belongs the determination of development domain is often used to describe the fields in
technologies to be used and of tokens from the which the construction principles necessary for
shopping cart of system architecture. a specific operational scenario are specified in a
Reference architecture is an extract of the reference architecture.
complex diversity of all thinkable principles for How are operational scenarios identified?
the design of software systems. Thus a reference Many companies do this with a sense of propor-
architecture narrows down the necessary expert tion and good knowledge of the technical incidents
knowledge, limits the heterogeneity of develop- which result in requirements on IT. Often an
ment-, testing- and production environments. organisation chart of the departments is helpful.
Once there is a commitment to its introduction, One procedure for the methodical derivation of
reference architecture provides an important operational scenarios is based on the juxtaposition
contribution to ensure an efficient development of major processes and products of the company.
and supply of applications. In this matrix fields for operational scenarios can
Reference architectures are not developed out be easily defined and analysed.
of the blue but are typically derived from existing Reference architectures and operational sce-
developing lines within the company usually narios are the most effective instruments in terms
while an enterprise architecture is built up. De- of convergence. The step-by-step convergence of
velopment line refers to construction principles, business and IT and the reduction of heterogene-
222
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
ity and complexity require governance extending While examining project specific architec-
to the operational level. The things defined in an ture drafts an architecture board finds gaps
application portfolio are operatively implemented in the builiding of reference architectures
by the use of reference architectures. Operational and orders or initiates the testing of a new
scenarios and their reference architectures gener- development line, which is then, after a pos-
ate the basis for compliance checks. sible modification, included into the number
Usually, with the outlined procedures, ref- of eference architectures.
erence architectures providing the necessary The planning of strategic application port-
heuristics are derived from existing development folios leads to the realization that there are
lines. But reference architectures can not always fields to which no reference architecture can
be de deduced from existing development lines, be applied. In this case, too, the trying out
sometimes new ways have to be found. The of a new development line and its inclusion
standardization of reference architectures must into the number of reference architectures
not slow down innovations. When a reference must be initiated.
architecture does not become obvious, an archi-
tecture planning must be carried out within the Both cases presuppose that there is a depart-
framework of the project or a pilot study. In the ment in charge of the project. Any architectural
context of this architecture planning and based development solely motivated by technology
on sytem requirements and conditions several remains unfocused.
architecture scenarios must be developed and The examples show that reference architec-
evaluated. In these cases new development lines tures play a role in various contexts of architecture
are drawn, assumptions are made and supported management processes:
by prototypes, and pilot projects will be made.
If a new development line proves successful Architects of operative software make use
it will enable the fulfillment of expectations, be- of reference architectures as patterns for
cause a new reference architecture will emerge project work.
from this. Only after a successful implementation Within the framework of evaluating archi-
of at least one system a reference architecture for tecture drafts be it in a project, review,
this operational scenario can be derived, and the or by an architecture board reference
experience with it is then taken into account for architectures serve as a measure. Without
the application portfolio. This is why one should them there would be no reference figures
always refer to experience when developing ref- for the usefulness of architecture drafts.
erence architectures. One needs information on Only a reference architecture which has
volumes, performance, availability, reliability, already proven its value for a defined and
scalability, number of users, and security. To a documented number of requirements, e.g.
certain extent the experience gained out of ones quantity structures, allows us to evaluate
own company can be used, too. Information ex- another architecture draft.
change with other users, architecture management Reference architectures are used in the
days, congress reports, and benchmarking can context of application portfolio planning
be the sources. Yet, for a reference architecture to determine the kind of building for a
heuristics are imperative! lot which is empty or in need of refurbish-
There are other sources for the development ment. Thus the prevalence of reference
of new reference architectures, new technical architectures can already be specified dur-
impulses, and innovation: ing the planning of application portfolios.
223
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
Then requirements e.g. regarding needed tions with many and diverse requirements the
qualifications can be derived, and human enterprise architect in charge is faced with the
resources development and staff planning question which areas he should focus on. Ideally,
are provided with another planning basis. standards are created for exactly those functional
The specification of reference architectures domains which are currently important for the
is accompanied by the determination of com- business strategy, and which then can ensure an
ponents of the shopping cart. The total of efficient development and efficient operations.
all infrastructure components needed for the An example shall clarify this: Let us assume
implementation of reference architectures that a public IT service provider pursues the
is the actual shopping cart for development strategy to gain market leadership in terms of
and production. Development lines no longer providing statistics. The objective is to create a
enforced eventually need further infrastruc- statistics department which later on shall act as a
ture components, but these find production service provider for several public organizations.
support only until the development line is Thus the IT support for the domain of processing
ended. Other infrastructure components statistics becomes very important (see Figure 14
may be supported with the productional and Figure 15). This domain needs standards for
help of external partners. development, maintanance, and operation: the
reference architecture for data collection and
Reference architectures belong to most pow- processing of statistics must be derived from the
erful instruments of enterprise architects: they experience values of existing systems. The book
deliver standard patterns for the controlling of of standards must be maintained and advanced
new developments and maintenance. They are accordingly, and solution architects, project man-
based of efficient development technologies based agers and developers must be made familiar with
of a set of tools reinforced in the infrastructure these standards. The strategy of our IT service
portfolio. They deliver the initial acceleration for provider is to enter a market segment in which
development projects and provide guidance for the the price, i.e. the costs of statistics processing,
solution architects. Also, they define a standard determines the position of a company.
which can be checked on the conformity to the The service provider wants to modify its
architecture. business and be more cost efficient in commod-
ity issues than the competition. Figure 16 shows
Controlling of the Standardization a rating matrix with a positioning of the service
Process providers strategy in the upper left quadrant.
The industry specific mapping of technolo-
The controlling of the standardization process pre- gies to matrix cells within this matrix supports
vents the enterprise architect from slipping into the the development of standards conform with the
role of a policeman enquiring into the conformity business strategy.
with regulations which are inadequately specified, Thus in addition to the bottom-up catalogiza-
communicated, and supported. How can we focus tion and classification the standardization can be
the process of development and maintenance of made top-down.
standards and ensure that the necessary standards For our example Figure 16 repre-sents data
for development, maintenance, and operation are warehouse technologies in the upper left quadrant,
available for precisely those areas in which IT which should be included with high pri-ority into
investments result in a high contribution to the the standardization proc-ess in accordance with
business success? Especially in big IT organisa- the business strategy of the services provider. With
224
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
Figure 14. Diverse systems and technolo-gies Figure 16. Technology standardization priorities
within functional domain (example) based on business strategy
225
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
Figure 17. Big Picture of IT-Management Pro- 1. Architecture Management has identified
cesses an application system with non-standard
architecture, which must be reengineered to
an application system with standard architec-
ture. Architecture Management reports this
to the demand management. This demand
report includes a business case and a rough
architecture scenario.
2. Demand management presents a project
proposal to portfolio management.
3. Porfolio management checks the budget with
IT financial management.
4. IT financial management accepts or denies
the requestd budget.
5. Portfolio management accepts or denies the
housekeeping project.
esses must be categorized and cross-linked into 6. Demand management launches the house-
the big picture (see Figure 17). keeping project.
In this big picture we will find the connection
between architecture management and port-fo- There are exceptional situations, e.g. during
lio management, which allows the enter-prise a merger, when it can make sense to allocate an
architect to initiate housekeeping pro-jects (see independent budget to housekeeping which cov-
Figure 18). ers the consolidation measures. Then it can be
The process (simplified here) is run by fol- regarded as a strategic action for renovation and
lowing steps: optimization rather than being subject to portfolio
226
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
227
Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning
the application- and infrastructure landscape Matthes, F., Wittenburg, A. (2004). Softwarekar-
regarding the technical quality and orientation ten zur Visualisierung von Anwendungslandschaf-
at the business. ten und ihren Aspekten Eine Bestandsaufnahme.
The business oriented and strategy driven Retrieved December 19, 2004, from http://ww-
controlling of architecture requires an all-em- wmatthes.in.tum.de/de/main.htm.
bracing transparency and operationalization.
Niemann, K. (2005). IT Governance and Enter-
Measurability through key performance indi-
prise Architecture - Impact of IT cost reduction
catiors, compliance checks, embedding into IT
on innovation power. The Journal of Enterprise
management processes, and the value oriented
Architecture, 1 (1), 31-40.
optimization of the IT portfolio are the building
blocks of a strategic architecture management Niemann, K. (2006). From Enterprise Architec-
which is business focused. ture to IT-Governance. Wiesbaden: Vieweg.
The short programme is the alignment of IT
the business sectors, and as the freestyle event a
CIO will continuously take over the responsibil-
ity for the process optimization thoughout the ADDITIONAL READING
corporation.
Such a strategic architecture management has Benson, R.J., Bugnitz, T.L., Walton, W.B. (2004):
not in view single project architectures but an From Business Strategy to IT Action. New Jersey,
enterprise architecture which makes transparent N.J.: Wiley.
the connections between objectives, strategies, Keller, Wolfgang (2004): Perfect Order versus the
business processes, IT services, and platforms. Timeless Way of Building, Lecture at the EAI
For informed decisions such a navigational help is Congress sponsored by TU Berlin 2004 (Internet
called for, so that enterprise architecture becomes download from http://www.sysedv.tu-berlin.de,
the information system of a functioning IT gov- December 2004)
ernance. In a comprehensive IT planning process
ensuring an effective use of means architecture Lutchen, M.D. (2004): Managing IT as a Business.
management and portfolio management act com- New Jersey, N.J.: Wiley.
plementary guided by IT governance. Niemann, K. (2007): Enterprise Architecture:
From Business Strategy to IT-Service. SAP Info,
143, 33-35.
References
Pfeifer, A. (2003): Zum Wertbeitrag von Infor-
DGI. (2003). Deutscher Corporate Governance mationstechnologie. Retreived June 24, 2005
Kodex. Retrieved May 21, 2003 from http://www. from http://www.opus-bayern.de/uni-passau/voll-
corporate-governance-code.de/ger/kodex/index. texte/2004/34.
html. Spewak(1992): Enterprise Architecture Planning,
IT Governance Institute. (2000): Management Princeton, 1992
Guidelines for COBIT. Retreived June 29, 2004 Weill, R., Ross, J.W. (2004): IT Governance.
from http://www.isaca.org Boston, Mass.: Harvard Business School Press.
Mandler, Niemann, von Henning (2007). Servi-
ceorientierte Architekturen: Governance, Com-
pliance und Security. Duesseldorf, Euroforum.
228
229
Chapter XI
The GEA:
Governance Enterprise
Architecture-Framework and Models
Vassilios Peristeras
National University of Ireland, Ireland
Konstantinos Tarabanis
University of Macedonia, Greece
Abstract
Departing from the lack of coherent and ready-to-use models and domain descriptions for public admin-
istration, we present here our effort to build a set of generic models that serves as a top-level, generic
and thus reusable Enterprise Architecture for the overall public administration domain. We have called
this set of models Governance Enterprise Architecture (GEA). GEA has deliberately remained technology
independent and following the Model Driven Architecture approach, GEA constitutes a computationally
independent model for the domain. GEA has been derived from multi-disciplinary influences and insights
and identifies two broad modeling areas, called governance mega-processes: Public Policy Formulation
and Service Provision. These two, together with the object versus process perspective, form a four-cell
matrix that defines four modeling areas for the GEA models. To populate these cells with models we use a
challenging metaphor: we model the society - public administration interaction as a discourse to identify
important elements and functions of the governance system. Until now, a large number of services has
been modeled using GEA and more recently, an extended modeling effort has started with GEA being
chosen for use by a national EU-country project. GEA can be also used as a knowledge infrastructure
for applying semantic technologies. In this line, it has been used for creating a public administration
specialization of a formal Semantic Web Service ontology, namely WSMO.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The GEA
230
The GEA
The ability to analyze and document the As an EA can be used to provide and organize
processes performed by each agency and iden- sets of domain models it can also be linked with
tify the information flows has become a key ontological engineering projects where ontologies
feature towards this direction. The discipline of are drafted to express several organizational char-
Enterprise Architecture (e.g. (Zachman, 1987; acteristics. These ontologies could then populate
Zachman & Sowa, 1992)) provides the enabling different perspectives in an EA framework (e.g.
framework in which to integrate process & data actors, data, processes, events). Domain models
models into one enterprise-wide representation. and ontologies are perceived as a key concept
These representations, if built, constitute a valu- for employing semantic technologies (e.g. (Ber-
able asset. They document the current state of ners-Lee, Hendler, & Lassila, 2001; Fensel D.,
the system and can be used in various types of C. Bussler, & Maedche, 2002)). Governmental
organizational development initiatives related to domain models recently attracted a lot of interest
e.g. IT acquisition, information systems develop- in eGovernment research (e.g. (Brahim Medjahed,
ment, Business Process Re-engineering, Total Abdelmounaam Rezgui, Athman Bouguettaya,
Quality Management, Activity Based Costing, & Ouzzani, 2003; Klischewski, 2004; Klisch-
Benchmarking, etc. An Enterprise Architecture ewski & Jeenicke, 2004; Missikoff, 2002; Motta,
(EA) is expected among other things to: Domingue, Cabral, & Gaspari, 2003; Semantic
Interoperability Community of Practice (SICoP),
Serve as a common language for all terms 2005; Tambouris, Kavadias, & Spanos, 2004;
and relations in PA (Klischewski, 2004), Vitvar T., Kerrigan M., Overeem v. A., V., & K.,
Assist decision making, policy formulation 2006)).
and citizen information, Identifying the lack of suitable and ready-to-
Provide common semantics for the develop- use models and domain descriptions for public
ment and representation of life-events and administration, we gradually built a set of ge-
one-stop portals (Tambouris, 2001) neric models that documents the operation of the
Provide the necessary infrastructure to or- system under analysis. We have called this set
ganize collective discussion, effective and of models Governance Enterprise Architecture
efficient action and all the services needed (GEA). GEA is a top-level, generic and thus reus-
to support e-Government (Rosati, Lai, & able Enterprise Architecture (EA) for the overall
Gnoli, 2004). governance domain. We have tried to keep GEA
as technology independent as possible. Follow-
There are already some EA frameworks that ing a Model Driven Architecture approach, we
could be used as a basis for EA development. may say that GEA constitutes the Computational
Among the most famous are the Open Group Independent Model (ATHENA Project, 2005) for
Architecture Framework (TOGAF)1, the Zachman the governance system. In the following parts, we
Framework (Zachman & Sowa, 1992), the C4ISR present an overview of this work.
Architectural Framework (C4ISR Integration We have organized this chapter as follows:
Task Force, 1997), the Enterprise Architecture In part 2 we present the background (literature
Planning (EAP) (Spewak & Steven C. Hill., review). The foundations of GEA are presented
1992), and the Federal Enterprise Architecture in part 3. In part 4, we present an overview of all
Framework (FEAF) (TopQuadrant, 2005b). The the existing GEA models. Part 5 provides conclu-
latter is discussed in more details below as it is sions and future direction of work.
relevant to public administration.
231
The GEA
Three spheres in eGovernance (Gronlund, The results are presented in the table below,
2005) with some additional comments including their
Gartner Government Performance Frame- relationship with our approach (GEA).
work (Gartner, 2003)
Faceted Classification of Public Administra-
tion (Rosati et al., 2004) 3. The Governance Enterprise
SAP Public Sector Solution Map (SAP, Architecture Framework
2000)
Government Process Classification Frame- In this part, we present the GEA framework and
work (Inter-Agency Benchmarking & Best its theoretical foundation.
Practices Council, 1996)
ONTOGOV project service ontology (D. 3.1 Theoretical Foundation
Apostolou, L. Stojanovic, T. Pariente Lobo,
& Thoenssen, 2005) For constructing the GEA framework and populat-
UK Government Common Information ing the GEA models, we followed a multi-disci-
Model (Office of e-Envoy UK, 2002) plinary approach and used theories and concepts
WebDG Ontologies (Brahim Medjahed et from several areas:
al., 2003)
DIP eGovernment Ontology (DIP Project, (a) Public administration and public policy
2004) theory in order to comprehend the domain of
Federal Enterprise Architecture (FEA) interest (e.g. (Bevir & Rhodes, 2001; Hogwood
Ontology (TopQuadrant, 2005a) & Gunn, 1984; Lane, 1995; Rhodes, 1997; Riley,
2003; The World Bank, 1992)). We have used
We rate all the above initiatives based on the fol- these theories to define the governance system,
lowing five criteria: delineate the scope of our initiative and propose
a broad categorization of relevant concepts to
Their relevance to the PA domain: Low be used.
(domain independent), Medium (partly PA
domain specific), high (PA domain spe- (b) Speech Act Theory (e.g. (Searle, 1969))
cific) and Language Action Perspective (LAP) (e.g.
The depth of analysis (e.g. number of con- (Dietz & Mulder, 1998; Goldkuhl, 1996; Johan-
cepts): Low (up to 10), Medium-Low (10-30), nesson, 2001)) has been used to model specific
Medium (30-50), Medium-High (50-100), parts of the domain. We consider the relationship
High (over 100) between public administration and society as
a discourse. This metaphor has been proven a
232
Initiative Relevance Depth Domain Perspective View Relationship-to-GEA
The GEA
Three spheres in High Low S-P-O Conceptual Holistic It provides a top-level categorization of the overall domain, identifying its primary actors and their
eGovernance functions. It is compatible to the GEA overall process model. The functions performed are not
further elaborated.
Gartner High Medium- S-P-O Conceptual Holistic It provides a top-level categorization of the overall governance domain, compatible with the GEA
Government Low overall process model. These categories are further elaborated but in lower levels it becomes clear
Performance that the model constitutes an evaluation and assessment tool and not an attempt to analyze and model
Framework the domain.
Faceted Clas- High Medium- S-O Conceptual Holistic It provides a reference eGov ontology using concepts of the faceted theory. It looks like ongoing
sification Low work that currently provides more details only for the procedure/process concept. The classification
of eGov processes is interesting but lacks clear definitions.
Table 1. Relevant literature review
SAP Public Medium Medium- S Conceptual Process This is a blueprint of generic processes that are executed by every PA agency. The focus is on the
Sector Solution Low service provision but stemming from a rather introvert ERP approach only the supportive and not the
Map operational functions are analyzed.
Government High High S-P Conceptual Process This initiative is quite close to the above. A very detailed organization of all governmental processes
Process Clas- is proposed, but again the focus remains on the supportive functions, then at the policy related func-
sification Frame- tions and excludes the analysis of the operational (service provision) functions
work
ONTOGOV Medium Medium O Technical Holistic It is an attempt to present an OWL-S specialization for the PA service. The PA domain specific se-
mantics introduced are rather limited. The strong point here is the compatibility with a standardized
and well-accepted service description/ontology. The modeling covers only service provision and has
technological emphasis.
UK-GCIM High Low O Conceptual Object This is a pure PA service modeling attempt. It provides an interesting view of the service, but re-
mains at a very high level of description. GEA elaborates on the concepts introduced here.
Web Low Medium- O Technical Holistic The proposed ontology aims at facilitating Web Service composition. It uses the eGovernment do-
DG-Ontologies High main as a test bed and does not provide any type of domain specific conceptual modeling.
DIP-eGov Low High S-O Conceptual Object This is a taxonomy of terms used by PA agencies rather than a reference PA domain description
Ontology model.
USA-FEA High Medium- S-O Conceptual Process This model is the only FEA PA domain specific model that provides an articulated categorization
(Business Refer- High and description for the service provision process (but not for the policy process). It uses a functional
ence Model) approach and roughly follows the ministerial departmentization of government.
USA-FEA (other Low Medium- S-O Technical Holistic With the exception of BRM, all the FEA models are domain independent.
models) High
GEA High Medium S-P-O Conceptual Holistic It is a pure PA modeling effort claiming to be technology independent. It provides a holistic view
for the overall governance system and constructs PA domain models based on two axes: objects and
processes.
233
The GEA
valuable asset both at the initial stage of scoping 3.2 The GEA Framework
and at latter stage when specific models were
developed. Specifically, we used concepts from The GEA Framework is based on a two-dimen-
these disciplines to: sional framework which consists of a vertical and
a horizontal dimension.
Construct the overall object model of the
governance system (part 4.1) In the first, the governance system mega-
Identify the main type of goals performed processes have been included.
by the governance system (part 4.1.3). In the second, we introduce the process
Model the service provision mega-process versus object modelling view.
by distinguishing its informative and per-
formative parts (part 4.6). These two dimensions define a number of cells.
Each cell constitutes a modeling area.
(c) Moreover for specific parts of GEA, we
have employed concepts from fields like: Vertical Dimension: Governance
System Mega-Processes
Organizational theory (e.g. defining the
operational/support layers (H. Koontz, Don- In this dimension, we present the two mega-pro-
nell, & Weihreich, 1980)). cesses of the governance system (see also part
Upper ontologies (e.g. DOLCE, (Claudio 4.2). A mega-process is defined as the aggrega-
Masolo, Stefano Borgo, Aldo Gangemi, tion of all governmental functions, services and
Nicola Guarino, & Oltramari, 2003)) for processes which are related to one of the two main
identifying e.g. the two core dimensions of interaction types that take place in the citizen-state
the GEA framework (process-object). discourse. These are:
Semantic web services (e.g. (Battle et al.,
2005; Hepp, Leymann, Domingue, Wahler, Public Policy Formulation. During this
& Fensel, 2005)) for proposing e.g. a model as mega-process, the demand from society
the PA domain specific service ontology. for state action is identified and political
Deontic modelling and patterns analy- processes such as prioritizing public needs
sis/design (e.g. (Fowler, 1997; Hay, 1996; take place. The main actor is the political
Johannesson & Wohed, 1998; Lind M. & system.
Goldkuhl, 2001; Wieringa & Meyer, 1993)) Service Provision. The production and
for e.g. adding a knowledge layer to an exist- distribution of public services takes place
ing transaction model. in this mega-process. The main actor is the
public administration system.
The models were built in a combined top-down
and bottom-up fashion: for the first, theories and Thus, the GEA framework defines two model-
concepts from the above-mentioned disciplines ing areas, namely the Public Policy Formulation
were used; for the second, a number of real Area and the Service Provision Area (Figure
public administration cases were analyzed and 3-1).
studied. Some administrative areas are still left out of
scope for our analysis:
234
The GEA
Following Montesquieus fundamental sepa- governance system contains both the political and
ration of the three administrative powers, administrative subsystems and the governance EA
our analysis remains at the executive power, refers to models relevant to both mega-processes.
and we deliberately leave out of scope the We use the term government to refer to the ad-
legislative and judiciary powers. ministrative system (public administration). As
We also do not consider here a third a consequence of this, when we mention eGov-
mega-process that has been called Support ernment, we refer to the use of ICTs by public
Services/Operations (see also part 4.2). In administration to facilitate the service provision
this, we group all the supporting functions mega-process. When we use eGovernance, we
to the above two core layers (e.g. logistics, refer to the use of ICTs to facilitate both mega-
financial/taxation services, information and processes. As such governance can be also
human resources management). This sup- perceived as a super concept of government.
portive mega-process has not attracted our This definition remains compatible with common
interest, as it does not acquire significant PA literature, e.g. (Rhodes, 1997).
PA domain specific characteristics, which
means that analysis and modeling performed Horizontal Dimension: Objects and
for the private sector can be easily reused Processes
and transferred with small customization to
the support operations of PA. In the horizontal dimension, we accommodate
the distinction between objects and processes.
It is important to make a clarification with These are fundamental concepts in the upper
regards to the usage of the terms government level ontology and the enterprise architecture
and governance in this chapter. Governance is literature:
used to refer to the aggregation of the two mega-
processes presented above. Thus as examples, the In SUMO (Niles & Pease, 2001), physical
entities may be Objects, or Processes.
235
The GEA
In DOLCE (Claudio Masolo et al., 2003; 3. The GEA object model for public policy for-
Oltramari A., Gangemi A., Guarino N., mulation (Tarabanis, Peristeras, & Fragidis,
& Masolo C., 2002) the most fundamental 2001)
division is between perdurants, entities that 4. The GEA object model for service provision
unfold in time (processes) and endurants, (Peristeras V. & Tarabanis K., 2004a)
entities that are present all at once in time 5. The GEA process model for public policy
(objects). formulation (Vassilios Peristeras, Tsekos,
MITRE discusses the concepts of continu- & Tarabanis, 2003)
ant (process) and occurrent (objects) (Semy, 6. The GEA process model for service provi-
Pulvermacher, & Obrst, 2004). sion (Peristeras V. & Tarabanis K., 2005)
In the Zachman Enterprise Architecture
Framework ((Zachman, 1987; Zachman &
Sowa, 1992)) the WHAT and HOW columns 4. The Governance Enterprise
correspond to objects and processes. Architecture Models
The matrix defined by these two dimensions 4.1 The Overall Object Model for the
is presented in Figure 3.1. Governance System
The four cells correspond to separate modeling
areas. These areas are the following: The core of this model has been basically derived
in a top-down fashion. The basic models entities,
Formulate Public Policy Objects area instances and relationships emerged by employ-
Formulate Public Policy Processes area ing the linguistic metaphor and perceive the
Provide Service Objects area interaction between society and the governance
Provide Service Processes area system as a discourse. Following this metaphor,
we identify a constant dialogue going on between
For each of these areas/cells, we propose society and the governance system.
models. Moreover, we have added two models: During the Public Policy Formulation mega-
one as a top-level representation of all the objects process, society is the initiator of the discourse
and the other for all the processes. These models communicating needs, while the governance
ensure consistency of the framework. system receives this information and processes
Thus developing GEA actually means populat- it to set an agenda for action, as a set of goals to
ing the framework with models. be fulfilled. We classify these goals following a
GEA provides rich semantics for the PA domain Speech Act Theory perspective (Searle, 1969), and
as it currently consists of six models at different propose a taxonomy based on the main types of
levels of analysis. The list below presents the GEA speech acts as proposed by Searle (Searle, 1975).
models that are discussed in the next part. A mechanism (public administration) for imple-
menting these goals is also established during
1. The GEA object model for the overall gov- this mega-process.
ernance system (Peristeras V. & Tarabanis Then, at a second stage a conversation between
K., 2004b) public administration and society takes place.
2. The GEA process model for the overall There, the established mechanism (PA) provides
governance system (Vasilis Peristeras & services to fulfill the goals that were set in the
Tarabanis, 2000) previous stage and thus cover the societal needs.
Using the linguistic metaphor, we may say that
236
The GEA
public services are sentences uttered by PA in to the goals accomplishment. Goals and public
order to perform the necessary changes in the services are again loosely coupled and classified
world (speech acts). in different typologies with an existing but loose
In language, the types of speech acts intended relationship. Thus, in addition to the typology of
by an interlocutor are not identical with the types goal, here we also propose a separate typology
of the sentences uttered to perform these acts. The for public services. All the above are discussed
first is related to What the interlocutor want to do in detail below.
(e.g. to declare something or to direct a behavior), We organize this section as follows. First, we
while the second How the interlocutor tries to present the participating actors (subjects) in the
do it (e.g. by command, statements, questions). model (4.1.1). Then, we introduce the Need
We may say that speech acts and sentences are and Goal objects (4.1.2). In 4.1.3, we present
loosely coupled. This means that speech acts and a typology of governance goals, using the dis-
sentences are classified in different typologies course metaphor. In 4.1.4, the Public Service
with an existing but loose relationship between object is introduced. A public service typology
the various types of acts/sentences. is presented in 4.1.5. We discuss the relationship
In a similar way in the governance-society between Public Service and Goal (4.1.6). Last,
discourse, the types of public services used to the overall model appears in 4.1.7.
perform a goal should not be identified with the
type of the goals they try to fulfill. The goals 4.1.1 The Subject Object
concept presents What the governance system
want to do (e.g. promote social justice), while the We use the object Subject to cover all the participat-
public service represent How PA has decided to ing actors in the Governance-Society interaction.
fulfill the goal (e.g. by providing unemployment At the first level, Subject may consist of Gover-
benefits). Public service is the technical means nance Entities and Societal Entities. Governance
237
The GEA
Entities refer to all entities participating in the ties. The process of defining goals (e.g. issue
governance system. Societal Entities refer to any filtration and agenda setting (Hogwood & Gunn,
actor existing out of the governance system bound- 1984)) is quite complicated in public policy, as
aries that (may) exercise any kind of influence on amongst others things drafting goals is directly
the latter. These two are the main types of actors linked to the ability of realizing them (Browne
that participate in the governance domain. Gov- & Wildavsky, 1984).
ernance Entities may be Public Administration
Entities (e.g. PA agencies) and Political Entities 4.1.3 Typology of Governance Goals
(e.g. Ministers). Societal Entities may be decom-
posed into several types of entities (e.g. Citizens, Regardless of the encountered difficulties, gover-
Businesses and NGOs) (Figure 4-1). nance entities come up with a concrete and usu-
ally long list of goals to pursue. Some examples
4.1.2 The Goal and Need Objects are prevent criminal actions, prevent pollution,
promote exports.
As already presented in the introduction of this Taking into account the large number of all
section, societal entities have needs. Needs are possible goals, a challenging task is to classify
deficits that society feels Governance Entities them. Researchers in public policy and PA theory
as the appropriate actor to address them. These usually address this issue by proposing various
needs are communicated to the governance system classifications (Lane, 1995; Lowi, 1979; Mus-
through the Public Policy Formulation mega-pro- grave, 1959). One of the more common is based
cess. The governance system receives this need, on the functional notion of the public policy field
processes and prioritizes them and sets goals to and administrative function is classified along
be fulfilled. Goals refer to the desired outcome of categories such as transportation, foreign affairs,
the governance action. These governance goals social services, health, etc.
should be ideally set in line with the needs of In order to present more advanced typologies of
the society. governance goals and goal-seeking behaviour, we
Not all needs expressed by societal entities present two types of typologies (Figure 4-3):
are eligible to be handled by governance enti-
238
The GEA
The first is based on the goals functional perform a set of speech acts, which could be also
type. perceived as types of societal behavior.
The second is based on structural char- A speech act implies that by each utterance
acteristics and concepts from Speech Act a speaker not only says something but also does
Theory. certain things: giving information, stating a fact
or hinting an attitude.
Functional Typology Searle identified the following classes of speech
The identification of the top nodes of a functional acts (Searle, 1975):
hierarchy/typology of governance goals is a chal-
lenging exercise. We propose the following three Assertives, statements that may be judged
top nodes: true or false because they aim to describe
a state of affairs in the world.
Safeguard the Social Contract; meaning Directives, attempts by the speaker to get
obtain the peaceful coexistence amongst the addressee to do something.
the members of the society. Commisives commit the speaker to some
Obtain Sustainable Development; meaning future course of action.
direct and streamline the macro-economic Expressives express a psychological state.
development taking into account sustain- Declarations attempt to change the world by
ability concepts (e.g. environment). representing it as having been changed.
Promote the Social Welfare; meaning
enhancing the social cohesion by fighting Austin (Austin, 1962), Vendler (Vendler, 1972),
exclusion and poverty. Alan (Allan, 1994) and Bach (Bach & Harnish,
1979) have also proposed similar or slightly dif-
Structural Typology ferent speech acts categorizations.
Speech Act Theory (SAT) studies the speech Through setting goals, the governance system
acts and is part of pragmatics, which forms part exhibits a particular goal-seeking behavior: not
of linguistics. Pragmatics is about the language only does it says something but also does certain
use. According to this, a speaker uses language to things (acts). The governance goals pertain to
239
The GEA
specific types of governance acts and are the Table 42. Indicative list of certifications
equivalent to the speech acts in SAT. A governance An indicative list of the state information
entity pursues specific goals, and this should be that governance entities certifies
perceived as a type of governance behavior. We The citizen
use a similar to the linguistic typology for clas- Personal data
sifying these governance goals/acts and identify Family status
Health issues
four main types:
Property status
Professional capacity
Declarative Criminal records
Assertive The enterprise
Directive, which is further broken down into Tax and insurance compliance
two categories: Imperative and Optative. Economic situation
Interrogative Environmental conformity
The land and its use
240
The GEA
Public administration uses two types of means circumstances (e.g. not to build without a
to promote these desired states: building permit).
By command, this means by imposing com- The latter category refers to permissive goals.
pulsory the behaviour towards the desired We define as permissive, the goals/acts through
state (Imperative). which governance entities recognize special
By providing incentives, by trying to rights and allow behaviours otherwise prohibited.
persuade society to voluntarily adopt the Through permissive acts, exceptions are activated
behaviour that leads to the desired state in situations where a universal prohibition has
(Optative). been enforced.
241
The GEA
by offering a special bonus to persuade and ment this has become a significant
urge society towards these behaviours (e.g. trend (Yergin & Stanislaw, 1998).
subsidizing investments, providing a grant
for having a third child or for employing Figure 4-4 depicts the various types of Direc-
people previously unemployed). tive goals.
Support: Governance entities support access
to goods and services that are considered as 4.1.3.1.4 Interrogative Goals
vital and for which exclusion is considered Through its interrogative function, the gover-
unacceptable. This may happen by: nance system collects societal needs. Contrary
Directly providing grants and benefits to the declarative and directive goals, this type of
to reduce social exclusion (e.g. unem- acts/goals is directly linked to the Public Policy
ployment benefits) Formulation mega-process and not to that of
Facilitating access to vital services and Service Provision.
goods. This may occur in two ways, Concluding this part, it is important to stress
that is, through: that the governance goals may vary in strength
Internal Production, when gov- and frequency depending on the particular type of
ernance entities offer for free (or governance system in place, e.g. in non-democratic
below the production cost) infra- regimes the interrogative function may become
structure and services that have weak and volatile. Nevertheless, all these goals are
been produced internally (e.g. practically pursued by all contemporary states.
public goods).
Financing: The internal production 4.1.4 The Public Service Object
of services is not always considered
a suitable approach and outsourc- In this part, we introduce the Public Service
ing is preferred. Recently with the object which is considered central in the Service
support of New Public Manage- Provision mega-process.
242
The GEA
There are three main actors that are related 4.1.5 Typology of Public Services
to the public service object. These are (Figure
4-5): Focusing our analysis on the Public Service
object, we have tried to create a typology of
Political entities decide and define the public public services, similar to the typology of goals
services to be provided to society in order presented in previous part.
to address the identified needs. Again the most commonly used classification is
Public administration entities provide (ex- based on the policy field criterion (transportation,
ecute) public services to society. health, education, etc). This classification has the
Societal entities ask for and receive (con- same problems as the functional classification of
sume) public services. goals. To use the linguistic analogy, the functional
categorization of sentences would result in clas-
The relationships between public services sifying the sentences: This is a dog, Do you
and political-societal entities are important in have a dog? and I dont like dogs under the
our analysis. We summarize these relationships same sentences that speak of dogs category.
in Figure 4-6. The model reads: This classification is based on the semantics of the
Societal entities have needs. By collecting, sentence but not on their structural characteristics.
processing and prioritizing these needs, political Similarly, the policy field based classification of
entities set goals (through the Public Policy For- public services is also based on the semantics of
mulation mega-process) to be fulfilled. In order the service e.g. set of services that promote health,
to pursue these goals a set of public services are education, etc.
defined and become available by public admin- Taking a different stance, we emphasize on
istration entities. Societal entities have needs the structural (e.g. process patterns) and not on
and these needs are fulfilled (or covered) by the semantic/functional characteristics of public ser-
provision of public services. vices. We employ again the discourse metaphor.
243
The GEA
244
The GEA
245
The GEA
may include services related to health, education, Table 43. Characteristic types of public service
defence, police, transportation, etc. and governance goals
Production as a generic type of public service Governance Goal Characteristic Type of
cannot be easily depicted using a generic descrip- Public Service
tion. Production as performed by PA is quite Declarative Declaration
similar to production of services by the private Assertive Certification
sector. We can even question whether production Imperative (absolute command) Control
is a straightforward public administration type of Permissive Authorization
public service, or just a private sector function Optative Authorization
that has been historically transferred for several Production Production
reasons to PAs. The similarities with production
in the private sector, regarding the organization of
work, are so apparent that it would be difficult to
affirmative or an interrogative sentence may be
identify significant differences. As a result, well-
used for directive, declarative or another type of
known criteria (e.g. effectiveness, productivity,
Speech Act. An example of the relationship be-
quality) can be transferred from private sector
tween speech act and type of sentence is presented
management with little customisation.
in table 4-4. Although there is a characteristic
type of sentences to utter speech acts of directive
4.1.6 Relationship between
type, other types can be used as well.
GoalsPublic Services
Similarly and despite the characteristic rela-
tionship between the types of governance goals
In the table below, the correspondence is shown
and the types of public services (table 4-3), each
between the types of governance goals and the
type of governance goals can be realized by dif-
characteristic types of public services typically
ferent types of public services.
employed for the implementation of each type of
The choice of the specific public service,
goal. Characteristic here means most common.
through which PA addresses a goal, depends on
Interestingly, the authorization type of public
various factors, such as administrative capacity,
service is employed to fulfill both permissive and
information technology, existing organizational
optative types of goals.
and institutional infrastructure, administrative
In language, there is a many-to-many relation-
culture etc. Thus, in order to meet goals of e.g.
ship between a speech act and a sentence. Differ-
imperative type, PA could alternatively use public
ent types of sentences may be used to perform
services of certification, authorization, control
a specific type of speech act. For example, an
and/or of the production type.
246
The GEA
247
The GEA
Figure 48. The GEA object model for the overall governance system
Table 4-6. The Linguistic Metaphor in modeling This separation of the overall governance
Governance-Society interaction domain was introduced in (Vasilis Peristeras &
Tarabanis, 2000) and has been followed by Gartner
LINGUISTICS GOVERNANCE
in the Gartner Government Performance Frame-
Types of Speech Acts Governance Functions
work. Gartner refers to these three dimensions
- Declaration - Declarative
- Assertive - Assertive as political management, service supply manage-
- Directive - Interrogation ment and support services (Gartner, 2003).
- Commisive - Directive
- Expressive o Imperative During the first mega-process, the gover-
o Optative nance system collects, processes and prioritizes
Sentence Public Service the emerged social needs. It also organizes a
- Statement - Declaration
- Question - Certification
mechanism - public administration - to address
- Command - Authorization these needs. The study of this mega-process is
- Control the research area of political theory and public
- Production
policy literature.
m:m relationship m:m relationship
between Speech Act - between Goals Public In the second mega-process, the established
Sentence Service mechanism (public administration) produces and
delivers services to society.
In the third layer, all the supporting functions
The governance system performs three mega- to the above two core layers are held (e.g. logis-
processes: tics, financial, information and human resources
management).
Public Policy Formulation Putting these three mega-processes together,
Service Provision we depict governance as a system that receives
Support Services
248
The GEA
Figure 49. The GEA overall process model Figure 410. The main actors participating in
Governance
249
The GEA
(may) exercise any kind of influence on the Level 1 refers to strategic plan, what
latter. a Political Entity should do in order to
Need. It is a deficit that society feels Political attain its goals, not how to do it.
Entities as the appropriate actors to address Level 2 describes in detail how a Po-
it. litical Entity implements the strategic
Knowledge. It refers generally to knowl- plan.
edge acquired by Political Entities and Public Service. The Action Plan defines
utilized during Mission and Goal setting Public Services to be executed. These ser-
processes. vices are provided by PA Entities.
Goal. It is a central object in the model. It
refers to the desired outcome of governance 4.4 The Object Model for Service
action. Mission is considered to be at a more Provision (PA Service Model)
abstract level of analysis while goals form
its detailed specification. Goals are consid- This model comes from in-depth analysis of the
ered to describe more concrete and specific Service Provision mega-process. It is of particular
governance objectives, rather than generic importance for eGovernment applications and
expressions of the future of governance implementations as it can serve as the conceptual
system. basis for constructing a PA service ontology. This
Success Criteria. It refers to pre-defined is why we alternatively call it, the PA Service
criteria according to which the achievement Model.
of goals of Political Entities is measured. The model is PA domain-specific but at the
Action Plan. It may be considered in two same time, it remains compatible to generic service
levels: ontologies (e.g. OWL-S and WSMO). The model
250
The GEA
may cover many different (ideally all) application 4.4.2 The Outcome Object and its
areas in PA. This makes it reusable in different Types
cases of public service provision.
It is worth mentioning that a large number of We use the term Outcome to refer to all different
services have been already modeled using this types of results a PA service may have. Public
model for verification purposes. Moreover, the Services produce Outcomes. This is a fundamental
model has been recently adopted by the central assumption in GEA, which can be found also in
PA Unit in an EU member state to be used in an PA models like GCIM (Office of e-Envoy UK,
extended national project. The goal of this project 2002) or in generic service models like OWL-S
is to document in a rigid way a large number of and WSMO.
PA services (>100). We define three types of service Outcome
A detailed presentation of the model fol- (Figure 4-13):
lows.
Output
4.4.1 The Core Objects Effect
Consequence
The Public Service object is placed at the
center of the PA Service Model. The core of the The two first concepts are used similarly but
model consists of three more objects (Figure 4- not identically as in OWL-S Process Model (OWL
12). These are: Services Coalition, 2004), while the third is an
extension added due its particular importance in
Input PA domain.
Outcome In OWL-S, Output is related to the acquisi-
Law tion of information by the client. Accordingly, we
use the same definition and define as PA service
All Public Services are executed according to a Output the acquisition of information related
Law (or Rule) that governs the execution process. to the PA service execution by the client (e.g.
This object provides the execution/control logic citizen, business). This information is currently
for the service provision. embedded in administrative documents, which
Each Public Service uses Input and produces officially present (and document) the decision of
Outcome. The types of input/outcome with their the Service Provider regarding the service asked
characteristics are discussed below. by the client.
251
The GEA
The execution of a service may result in a service execution logic by setting Preconditions
change in the state of the world (e.g. transfer- for service provision.
ring money to an account). This is the Effect of Public services need Input to be executed. Input
the service as defined also in OWL-S. In the PA is information needed to be checked or used in any
domain, the service Effect is the actual permis- way in order for a service to be executed. Evidence
sion, certificate, restriction or punishment the placeholder is the part of Input that contains Piece
citizen is finally entitled with. In cases where of Evidence, that is piece of information that the
administration refuses the provision of a service, service provider should have access to in order to
there is no effect. check the validity of the Preconditions. There is a
Consequence is defined as the forwarding of many-to-many relationship between the evidence
the information related to a service execution placeholders and the pieces of evidence depicting
to parties with an interest in the event. Clients the fact that an evidence placeholder (e.g. ID-
usually are not directly interested in the service Card) usually stores many evidences (e.g. date
consequences. Consequence may be: of birth, surname) and a Piece of Evidence might
be found in numerous different placeholders.
Internal, when the same agency providing the Various types of evidence placeholders ex-
service has to inform its own organization ist. For example, they may be physical (e.g.
and/or information system for the service documents) and electronic (e.g. databases, XML
execution. documents).
External, when information related to the Information that is used by the service for
service execution must be communicated other purposes is not considered evidence and is
to other agencies to ensure information modeled here as Other Input (e.g. the applicants
consistency amongst agencies. address to be used for communicating a docu-
ment/decision).
4.4.3 The Input Object and its In each service, a piece of evidence has a
Relationship with Law Purpose. The evidence purpose is related to
the underlying business logic that explains the
Public services are controlled by Laws (e.g. legisla- reason for which the service provider wants to
tion, administrative decisions). Laws provide the have access to the specific piece of information.
252
The GEA
For example, the purpose of the ID card number 4.4.4 The Public Administration
(evidence) serves for checking and validating the Entity object
identity of the applicant. It is interesting to men-
tion that in different countries, different pieces There are four types of roles that PA agencies
of evidence may serve the same purpose e.g. can acquire during the service execution process.
the Social Security Number and/or the passport These are (Figure 4-15):
number may be used for identification purposes
as alternative to ID-card number. The Evidence Service Provider is the agency that produces
Purpose is a valuable concept in cross-border and provides the service. Sometimes, it
public service provision. makes sense to separate the service pro-
The different types of service Input and ducer (the entity that produces the service)
its relationship with the concepts of Law and from the service distributor (the entity that
Precondition are presented in Figure 4-14. delivers the output of the service).
253
The GEA
Consequence Receiver is a third agency that as the primary server of society. Public ad-
is informed about service execution. ministration is somehow in between society and
Evidence Provider is an agency that provides political system. Its role, presumed by its position,
necessary evidence to the service provider is that of a broker. Its specific function as a
in order to execute the service. broker pertains to two different roles. The first is
Service Collaborator is an agency that linked to and facilitates the upward movement of
participates in service execution process information from society to the Political System.
(workflow). The second role is linked to the implementation
of the Political System will.
4.4.5 Model Overview The model (Figure 4-17) is presented as a
circle starting from the bottom, where the social
The overall PA Service Model is presented in need for collective action triggers and activates
Figure 4-16. the whole system.
A simplified view of the model is also presented
4.5 The Process Model for Public as a UML Interaction Diagram, in Figure 4-18.
Policy Formulation In Figure 4-18, the upper part of the model is
related to the Public Policy Formulation mega-
Societal entities are the ultimate client of the process. Accordingly, the bottom part - which is
governance system. Society has delegated power shaded and discussed in the next part - corresponds
to the Political System, acknowledging the latter to the Service Provision mega-process.
254
The GEA
Figure 417. The GEA process model for public policy formulation
The description of the model follows: structured information that it collects, during the
Everything starts with societal needs to be collection phase. Categorizing this information,
addressed by governance system. These needs translating it to the language of public adminis-
should reach political entities (political system). tration and codifying it are some aspects of this
Generally, society has two ways for communi- administrative processing.
cating needs to the political system: the formal, At the check-in point the processed infor-
bureaucratic channel through public administra- mation reaches political bodies. It is here that we
tion, and a number of alternative channels which usually find supporting offices of political person-
bypass bureaucracy in order to directly reach the nel. They try to filter all the information they feel
political system. These channels may vary from important and transfer it to key people. Informa-
a formal political party or NGO to informal con- tion processing by the political layer though is
versations of political appointees with ordinary different to administrative processing. Since we
citizens. have entered the realm of the political sub-system,
Focusing on the formal administrative chan- choice based on political criteria is enforced. These
nel, the first role of administrative system (PA offices exclude needs as inappropriate (e.g. not
entities) is the collection of societal needs and a compatible with the political agenda) and draft a
whole system should be set up for this purpose. final list of issues to be addressed.
In order for this system to operate effectively, the Then we reach the phase of prioritizing, which
capacity of not only reactively collecting but also is a critical function for the political system. The
proactively sensing societal needs is critical. placement of the Prioritizing step at the head of
After this first step, administrative process- the model emphasizes its importance. The elected
ing follows. This processing is the first attempt political personnel are the main actors in this
by the administrative system to organize un- intensive decision-making process. The output is
255
The GEA
a hierarchically ranked list of political To-Dos, trative subsystem (or the private sector). What
which forms a political Action Plan. PA personnel usually receive from this stage
After that, information starts moving down- is a law or a decree that has to be enforced and
wards. The upward movement was the flow of practically implemented. PA has to organize and
needs towards decision makers; the downward execute what has been decided. The check-out
movement is related to realization of political point is the point, where we pass from the Pub-
decisions. lic Policy Formulation to the Service Provision
The prioritizing phase is followed by the as- mega-process.
signing phase. While the former clearly expresses Society has initially asked for collective ac-
political values, the second deals with technical tion to solve emerged issues/problems and finally
arrangements. At this step the political subsystem receives services that address the initial needs.
delegates its mandate to PA to realize its political Closing the description of this process, we
action plan. Nevertheless, an alternative imple- present some interesting feedback mechanisms
mentation channel exists: the private sector can that could be used to monitor the overall process.
act as an alternative provider of public services These are:
to society.
Through its legislative power, the parliament 1st Control Political Awareness: Checks the
assigns duties to entities (public/private) to realize divergence between what society needs and what
the political action plan. The political will becomes the political system thinks society needs.
a concrete plan, with actors, budget, accountability
and management mechanisms. 2nd Control Administrative Accountability:
At the check-out point, information leaves Checks the divergence between what the politi-
the political realm and returns to the adminis- cal system wants to provide to society and what
256
The GEA
society finally receives from the administrative atomic need eligible to be addressed by PA, to
system. the execution and delivery of the service in the
real world.
3rd Control Political Accountability: Checks To deploy this model, we borrowed concepts
the divergence between the demand from society from Speech Act Theory in order to define two
as received by the political system and the final the informative and performative parts of the
plan that is communicated by the political system service provision process. Specifically we have
to the administrative system for addressing this identified:
demand.
The planning phase, which constitutes the
4th Control Governance Responsiveness: informative part of the citizen-administra-
Checks the divergence between what society has tion conversation: citizens ask the who, why,
asked for and what society receives at the end of what, how, when, where of a service. Actions
the process. included here pertain to discovering the
type of service needed, the type and specific
4.6 The Process Model for Service instance of the service provider, the specific
Provision location where the service is available and
information about the service behaviour.
This model depicts the main steps performed The execution phase, which constitutes the
each time a client (citizen, business) asks for PA performative part of this conversation. Dur-
service execution. That is, it covers the path that ing this phase public administration executes
leads from the conceptualization of a clients the service and provides outcome.
Table 47. The GEA process model for public service provision
257
The GEA
Several GEA defined objects participate in GEA models. Towards this goal, we aim at
the process of PA service execution (part 4.4). A elaborating and applying improvements to
brief description is presented in table 4-7. More the GEA models. This may take the follow-
detailed description can be found in (Peristeras ing directions:
V. & Tarabanis K., 2005).
Bottom-up experience by analyzing and
modelling a great number of real PA services
5. Conclusion / Future Work following the proposed models in order to
identify possible improvements and further
The work presented here constitutes a domain validate them. Although we have modelled
analysis effort for public administration. It has a great number of services for verification
resulted in a set of models that constitute the purposes we are currently applying some of
Governance Enterprise Architecture (GEA). GEA the models to a project run by an EU Member
is a top level, generic and thus reusable enterprise State Administration to document national
architecture for the overall governance system and PA services. We anticipate that this down-
covers its two core mega-processes, namely Public to-earth extended experience will provide
Policy Formulation and Service Provision. further insights to our modelling effort.
These models are valuable and exploitable per Top down insights which may come by study-
se as business modeling constructs can be used ing and putting side by side GEA models
as blueprints for designing and documenting PA and the ever evolving, contemporary public
systems. So for example, when a PA agency de- policy and public administration theory.
cides to provide a new service, the service model Elaborating and extending the discourse
presented in part 4.4 could be used as a template metaphor that we used to model the Society-
to allow the designers of the service discuss and Governance interaction.
decide the various aspects and characteristics of
the service. The same model could be used to Taking the above into consideration, we fore-
document existing services and provide uniform see that at a future time there may be a need for
description/language for cross-agency and reen- developing a second version of the GEA models
gineering projects. This is what has already been to incorporate all the improvements and amend-
planed in a large scale national project in an EU ments.
country. More than 100 public services will be
modeled using the GEA service model. B. We have already started working towards the
We also place emphasis on the potential to use direction of using GEA in order to build a
these models for information systems analysis and full Semantic Web Service based execution
development based on semantic technologies. In environment. This environment is based on
such technological environments, the GEA mod- GEA defined semantics, models and ontolo-
els provide the basic knowledge infrastructure gies. We have combined the formal service
(domain models) to make real the potential of ontology semantics provided by WSMO and
semantic technologies. proposed a WSMO-PA specification as a
Our future work includes mainly two direc- specialization of WSMO for the PA domain.
tions: WSMO-PA uses and builds heavily on GEA
concepts and models. Some related work
A. Further verification/elaboration through that links WSMO and GEA can be found in
real world and extended application of the (Peristeras V., Goudos S., Vitvar T., Mocan
258
The GEA
A., & Tarabanis K., 2006) and (Xia Wang Bevir, M., & Rhodes, R. A. W. (2001). A Decen-
et al., 2007). tered Theory of Governance (Working Paper
2001-10). Berkeley: Institute of Governmental
As a further step, we intent to use this PA Studies, University of California.
Service Ontology (WSMO-PA) in a Semantic
Brahim Medjahed, Abdelmounaam Rezgui,
Web Service execution environment that could
Athman Bouguettaya, & Ouzzani, M. (2003).
be tailored to the PA semantics, practices and
Infrastructure for E-Government Web Services.
special characteristics.
IEEE Internet Computing, 7(1), 58-65.
Last but not least, we try to propose the GEA
reference enterprise architecture and modeling Browne, A., & Wildavsky, A. (1984). Should
perspective to several national and international Evolution become Implementation: Pressman
bodies and work towards the creation of a com- and Wildavsky.
munity of practice that adopts and uses GEA de-
C4ISR Integration Task Force. (1997). C4ISR
scriptions for eGovernance systems development,
Architecture Framework, Version 2.0.
documentation of PA services, re-engineering
projects, etc. In the future this line of work could Claudio Masolo, Stefano Borgo, Aldo Gangemi,
further lead to a standardization activity. Taking Nicola Guarino, & Oltramari, A. (2003). Wonder-
into consideration the complexities of such an Web: Deliverable D1.8, Ontology Library (IST
effort substantial support is sought by important Project 2001-33052).
actors in the eGovernance field, including big
D. Apostolou, L. Stojanovic, T. Pariente Lobo,
information systems and consulting vendors.
& Thoenssen, B. (2005). Towards a Semanti-
cally-Driven Software Engineering Environment
for eGovernment. In (Vol. 3416, pp. 157 168):
References
LNAI.
Allan, K. (1994). Speech act classification and Dietz, J. L. G., & Mulder, J. B. F. (1998). Organi-
definition. In R. Asher (Ed.), Encyclopedia of sational transformation requires constructional
Language and Linguistics (Vol. 8, pp. 4124- 4127): knowledge of business systems. Paper presented
Oxford: Pergamon Press. at the 31st Annual HICCS.
ATHENA Project. (2005). D.A6.1, Specification DIP Project. (2004). D9.3 e-Government ontol-
of a Basic Architecture Reference Model. ogy.
Austin, J. L. (1962). How to do things with Words. Fensel D., C. Bussler, & Maedche, A. (2002).
Cambridge, MA: Harvard University Press. Semantic Web Enabled Web Services. Paper
presented at the ISWC 2002.
Bach, K., & Harnish, R. M. (1979). Linguistic
Communication and Speech Acts. Cambridge Fowler, M. (1997). Analysis Patterns: Addison-
MA: MIT Press. Wesley. New Performance Framework Measures
Public Value of IT, Research Note, 8 July 2003
Battle, S., Bernstein, A., Boley, H., Grosof, B.,
2003).
Gruninger, M., Hull, R., et al. (2005). Semantic
Web Services Framework (SWSF). Goldkuhl, G. (1996). Generic business frame-
works and action modeling. Paper presented at the
Berners-Lee, T., Hendler, J., & Lassila, O. (2001).
1st International Workshop on Communications
The Semantic Web. SCIENTIFIC AMERICAN,
Modeling - The Language/Action Perspective.
May 2001.
259
The GEA
Gronlund, A. (2005). Whats In a Field Explor- at the 37th Hawaii International Conference on
ing the eGoverment Domain. Paper presented System Sciences.
at the 38th Hawaii International Conference on
Lane, J.-E. (1995). The Public Sector: Concepts,
System Sciences.
Models and Approaches (2nd ed. ed.): Sage
H. Koontz, Donnell, C. O., & Weihreich, H. (1980). Publications.
Management (7th Edition ed.): McGraw Hill.
Lind M., & Goldkuhl, G. (2001). Generic Layered
Hay, D. (1996). Data Models Patterns. NY: Dorste Patterns for Business Modeling. Paper presented at
House Publishing. the 6th International Workshop on the Language-
Action Perspective on Communication Modeling,
Hepp, M., Leymann, F., Domingue, J., Wahler,
Montreal, Canada.
A., & Fensel, D. (2005, October 18-20). Semantic
Business Process Management: A Vision Towards Lowi, T. J. (1979). The End of Liberalism: The
Using Semantic Web Services for Business Pro- Second Republic of the United States. New York:
cess Management. Paper presented at the IEEE W.W. Norton.
ICEBE 2005, Beijing, China.
Missikoff, M. (2002). Harmonise an ontology-
Hogwood, B. W., & Gunn, L. A. (1984). Policy based approach for semantic interoperability.
Analysis for the Real World. Oxford: Oxford ERCIM News, 51, 33-34.
University Press.
Motta, E., Domingue, J., Cabral, L., & Gaspari, M.
Hughes, & Owen E. (1994). Public Management (2003). IRS II: A Framework and Infrastructure
and Administration: an introduction. New York: for Semantic Web Services. Paper presented at the
St. Martins Press. 2nd International Semantic Web Conference.
Inter-Agency Benchmarking & Best Practices Musgrave, R. A. (1959). The Theory of Public
Council. (1996). Government Process Clas- Finance. New York: McGraw-Hill.
sification Scheme. Retrieved Dec. 2001, from
Niles, I., & Pease, A. (2001, October 17-19).
http://www.va.gov/fedsbest/index.htm
Towards a Standard Upper Ontology. Paper
Johannesson, P. (2001). A Language/Action based presented at the 2nd International Conference on
Approach to Information Modeling. In Rossi M. Formal Ontology in Information Systems (FOIS-
& Siau K. (Eds.), Information Modeling in the 2001), Ogunquit, Maine.
new Millenium: IDEA Publishing.
Office of e-Envoy UK. (2002). e-Services De-
Johannesson, P., & Wohed, P. (1998). Deontic velopment Framework Primer v1.0b. Retrieved
Specification Patterns - Generalisation and Clas- Noe 2002, from http://www.govtalk.gov.uk/docu-
sification. Paper presented at the International ments/eSDFprimerV1b.pdf
Conference on Formal Ontologies in Information
Oltramari A., Gangemi A., Guarino N., & Masolo
Systems, Trento, Italy.
C. (2002, October 2002). Sweeting ontologies with
Klischewski, R. (2004). Semantic Web for e-Gov- DOLCE. Ontologies and the Semantic Web. Paper
ernment - a Research Agenda. AIS SIG SEMIS presented at the 13th International Conference,
Newsletter Volume 1, Issue 1. EKAW 2002, Siguenza, Spain.
Klischewski, R., & Jeenicke, M. (2004). Semantic OWL Services Coalition. (2004). OWL-S: Se-
Web Technologies for Information Management mantic Markup for Web Services. Retrieved
within e-Government Services. Paper presented March 2005, from http://www.daml.org/services/
owl-s/1.1/
260
The GEA
Peristeras, V., & Tarabanis, K. (2000). Towards an Paper presented at the 2006 AAAI Spring Sym-
Enterprise Architecture for Public Administration posium, The Semantic Web meets eGovernment
: A Top Down Approach. European Journal of (SWEG), Stanford University, California, USA.
Information Systems, 9(Dec. 2000), 252-260.
R.E. Asher (ed.). (1994). The Encyclopedia of
Peristeras, V., Tsekos, T., & Tarabanis, K. (2003, Language and Linguistics. Oxford: Pergamon.
31 Jul.-2 Aug.). Building Domain Models for the
Rhodes, R. A. W. (1997). Understanding Gover-
(e-) Governance System. Paper presented at the
nance: Open University Press.
International Conference on Politics and Infor-
mation Systems: Technologies and Applications Riley, B. T. (2003). e-Government vs. e-Gover-
(PISTA 03), Orlando, Florida, USA. nance (International Tracking Survey Report,
No 4). Ottawa: Commonwealth Centre for E-
Peristeras V., Goudos S., Vitvar T., Mocan A.,
Governance.
& Tarabanis K. (2006). Towards Semantic Web
Services for Public Administration based on the Rosati, L., Lai, M. E., & Gnoli, C. (2004, 10th
Web Service Modeling Ontology (WSMO) and December). Faceted Classification for Public
the Governance Enterprise Architecture (GEA). Administration. Paper presented at the Semantic
Paper presented at the 5th EGOV International Web Applications and Perspectives (SWAP) - 1st
Conference, DEXA Krakow, Poland. Italian Semantic Web Workshop, Ancona, Italy.
Peristeras V., & Tarabanis K. (2004a). Advancing SAP. (2000). R/3 System SAP Solution Map.
the Government Enterprise Architecture - GEA: Retrieved Dec. 2000, from www.sap.com
The Service Execution Object Model. In R. Traun-
Searle, J. R. (1969). Speech Acts. An Essay in the
muller (Ed.), Electronic Government, DEXA, 3rd
Philosophy of Language. London: Cambridge
International Conference EGOV 2004, Zaragoza,
University Press.
Lecture Notes in Computer Science 3183 (pp.
476-482): Springer. Searle, J. R. (1975). A taxonomy of illocutionary
acts. In Gunderson K. (Ed.), Language, Mind
Peristeras V., & Tarabanis K. (2004b). The Gov-
and Knowledge. Minneapolis: University of
ernance Enterprise Architecture (GEA) Object
Minesota.
Model. In M. A. Wimmer (Ed.), Knowledge Man-
agement in Electronic Government, Lecture Notes Semantic Interoperability Community of Practice
in Computer Science 3035, (5th IFIP International (SICoP). (2005). Introducing Semantic Technolo-
Working Conference, KMGov 2004, Krems, Aus- gies and the Vision of the Semantic Web, White
tria, May 27-29) (pp. 101-110): Springer. Paper Series Module 1.
Peristeras V., & Tarabanis K. (2005, 22-24 April Semy, S. K., Pulvermacher, M. K., & Obrst, L.
2005). The GEA Generic Process Model for J. (2004). Toward the Use of an Upper Ontology
Public Administration Service Execution. Paper for U.S. Government and U.S. Military Domains:
presented at the 8th International Conference for An Evaluation (No. 04B0000063): The MITRE
Business Information Systems (8th BIS 2005), Corporation.
Poznan, Poland.
Spewak, S. H., & Steven C. Hill. (1992). Enterprise
Peristeras V., & Tarabanis K. (2006, Mar. 27-29). Architecture Planning: Developing a Blueprint
Reengineering the public administration modus for Data, Applications and Technology: John
operandi through the use of reference domain Wiley & Sons.
models and Semantic Web Service technologies.
261
The GEA
Tambouris, E. (2001). An Integrated Platform Wieringa, R., & Meyer, J. (1993). Applications of
for Realising One-Stop Government: The eGOV Deontic Logic in Computer Science: A Concise
project. Paper presented at the E-Government Overview: Wiley.
Workshop within DEXA01.
The World Bank. (1992). Governance and De-
Tapscott, D., & Caston, A. (1994). Paradigm Shift velopment. Washington: World Bank.
: The New Promise of Information Technology.
Xia Wang, Goudos S., Peristeras V., Vitvar T.,
Tarabanis, K., Peristeras, V., & Fragidis, G. (2001, Mocan A., & Tarabanis K. (2007, 4-10 Jan. ).
June 2001). Building an Enterprise Architecture WSMO-PA: Formal Specification of Public Ad-
for Public Administration: A High Level Data ministration Service Model on Semantic Web
Model for Strategic Planning. Paper presented Service Ontology. Paper presented at the 40th
at the 9th European Conference on Information HICSS, Hawaii.
Systems, Bled, Slovenia.
Yergin, D., & Stanislaw, J. (1998). The Command-
TopQuadrant. (2005a). FEA Reference Models ing Heights: The Battle Between Government and
Ontologies v.1.1. Retrieved 16 Mar., 2006, the Marketplace That is Remaking the Modern
from http://www.topquadrant.com/documents/ World. New York: Simon & Schuster.
TQFEARMO.pdf
Zachman, J. A. (1987). A framework for informa-
TopQuadrant. (2005b). FEA Refererence Model tion systems architecture. IBM Systems Journal,
Ontologies (FEA RMO) v1.1. 26(3).
Vendler, Z. (1972). Res Cogitans: Ithaca: Cornell Zachman, J. A., & Sowa, J. F. (1992). Extending
University Press. and formalizing the framework for information
systems architecture. IBM Systems Journal,
Vitvar T., Kerrigan M., Overeem v. A., V., P., &
31(3).
K., T. (2006, Mar. 27-29). Infrastructure for the
Semantic Pan-European E-government Services.
Paper presented at the AAAI Spring Symposium, Endnote
The Semantic Web meets eGovernment (SWEG),
1
Stanford University, California, USA. http://www.opengroup.org/architecture/
togaf8-doc/arch/
262
263
Chapter XII
Enterprise Architecture and
Governance Challenges for
Orchestrating Public-Private
Cooperation
Bram Klievink
Delft University of Technology, The Netherlands
Wijnand Derks
Telematica Instituut, The Netherlands
Marijn Janssen
Delft University of Technology, The Netherlands
Abstract
The ambition of the Dutch government is to create a demand-driven government by means of effective
use of information and communication technology. This requires not only public, but also private parties
to interact with each other. This is a complex endeavour as private and public organizations have their
own goals, systems and architectures that need to be coordinated. Within this setting, a new architecture
should be created for managing and orchestrating the interactions among governmental and private
organizations. In this chapter we present an architecture aimed at supporting the coordination of public
and private parties for creating a one stop shop and the main challenges therein. We found that a public-
private service network poses higher requirements on the architecture of a service network, whereas the
variety in systems of the various organizations and different aims make it more difficult to develop such
an architecture. Furthermore, it is difficult to isolate architectural challenges from governance aspects,
as many architectural issues need to be complemented by governance mechanisms. Architecture and
governance cannot be considered in isolation.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
264
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
265
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
D utc h G ov ernm ent R eferenc e A rc hitec ture V arious enterpris e a rc hitec tures
Integrated
s erv ic e
266
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
models that are used in the design and realisation of cesses as governance mechanisms involve man-
an enterprises organizational structure, business agement techniques for securing widespread and
processes, information systems, and infrastruc- effective involvement in governance decisions and
ture (Lankhorst, 2005, p. 3). An architecture can their implementation, for example by service level
be descriptive, prescriptive or both. In a descriptive agreements (SLAs). This is especially important
sense an architecture shows the existing relation- in public-private service networks, because were
ships among the elements which can be used to dealing with existing autonomous organizations,
analyze weaknesses and opportunities. In a pre- each with existing decision making structures,
scriptive sense it can be used as a blueprint that processes and systems. Governance should help
needs to be realized within a certain timeframe. to manage the development and practice of an
If both descriptive and prescriptive architectures architecture that coordinates the dependencies
are available, a roadmap from the current to the among public and private organizations.
envisioned future situation can be realized. In this
chapter we take a prescriptive view on EA, as the The Need for Orchestration
objective is to move towards a situation in which
public and private parties cooperate seamlessly. The dominant architectural paradigm is currently
This needs to be complemented by governance the Service Oriented Architecture (SOA). In a
mechanisms to take aspects like differences in SOA, the focus is on services that offer function-
interests and systems into account. ality, thereby uncoupling functionality from the
IT governance represents the framework for technical implementation of the functionality.
decision rights and accountabilities to encourage The focus on services offers a way to align pro-
desirable behaviour in the use of IT resources cesses in public-private service networks, while
(Weill, 2004). In analogy, architecture governance leaving the underlying organizational structures,
can be viewed as the practice and orientation by processes and systems untouched. Demand-driven
which enterprise architectures are managed and service-delivery processes can be composed of
controlled. The governance of architecture is various services at various public or private or-
complicated due to the heterogeneity of network ganizations. Citizens currently select and invoke
partners and their various strategies, interests and services themselves. Consider the following situ-
systems. Each organization might have different ation: first, a citizen searches for information and
strategic objectives, capabilities and resources. selects the appropriate services. Next, the citizen
Moreover, potential partners may have different requests the service at each organization, uses
processes and levels of IT sophistication that the response to request a subsequent service at
needs to be taken into account before services another organization and so on. Finally, the citizen
can be shared. monitors the status, submits reminders, collects
Organizations can make use of three kinds the responses and integrates them. Due to the
of governance mechanisms: (1) decision-making complexities involved in governmental service-
structures, (2) alignment processes and (3) formal delivery, the coordination of the dependencies
communications (Weill & Ross, 2005). Allocat- among the activities and systems of the individual
ing decision-making responsibilities, roles and parties is a major challenge.
organizational committees are part of the deci- The effective coordination of the dependencies
sion-making structures. Reaching effective IT among various organizations with the aim of creat-
governance by formal communications includes ing an integrated service-delivery requires process
two-way communication and a good relationship orchestration, or orchestration for short. Process
between business- and IT people. Alignment pro- orchestration is the goal-oriented coordination by a
267
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
single responsible entity in a cross-organizational ant are determining which organization is overall
process flow (Janssen, Gortmaker, & Wagenaar, responsible for the service and which organization
2006). In the situation described before, the handles the customer interactions. Figure 3 shows
citizen performs the role of orchestrator because a schematic overview of these basic variants of
they select and invoke services themselves. To roles that handle interactions with clients. When
improve service-delivery, the orchestration role considering other design variables, many more
should be performed by the government instead specific variants of orchestration can be derived.
of by the citizen. This should result in a reduction The basic models on the allocation of the primarily
of administrative costs for citizens. role of orchestration are the following:
The transition of this orchestration role from
the citizen to the government is depicted in Figure First-in-chain: The agency that delivers
2. In this figure, the orchestrator role is visual- the service is responsible for the orchestra-
ized by adding a layer on top of the individual tion of the entire chain and returns a single
organizations. The introduction of this role is answer to the user. This can be a different
aimed at reducing the administrative burdens for agency depending on the point of entry in
the citizen, as only one request needs to be made. the service chain;
The orchestrator handles all activities necessary Pass-the-buck: The agency that delivers the
for the coordination of the cross-agency service service shifts the responsibility for (parts
process and returns one answer. Basically, the of) the execution of the process to the agen-
orchestrating process orchestrates the services at cies directly involved in executing the next
various organizations into one single request by process step (or part);
and one single response to the citizen. Director: Agencies in the partnership cre-
The basic concept of orchestration provides ate a separate process orchestration role and
a simplistic view which is useful for explanation allocate this role to one actor. This could be
purposes, but does not capture the full complexity a new organization or any of the organiza-
of reality. There are many orchestration variants tions most qualified to perform this job. The
possible. Essential parts of any orchestration vari- actor fulfilling this role is orchestrating the
C lient
O rc hes trating pr oc es s
C lient
268
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
1. request
A 4. answer Director
B C A B C A B C
cross-agency process; thereby becoming a interest. Strengths include possible financial gains,
specialized director. while weaknesses include possible conflicts of
interests and concerns on privacy.
Previous research on orchestration of electronic Research in the United States and the United
governmental services (e.g. Janssen et al., 2006) Kingdom show the performances of these part-
shows that this is not just a technical challenge, nerships are mixed, often resulting in short-term
governance-related issues should be considered financial gains at the expense of long-term public
as well. In order to successfully orchestrate these costs on accountability, transparency and equal
service delivery processes, agreements need to be access to services (e.g. Flinders, 2005; Rosenau,
made on issues such as lead-times, accountability 1999). The Internet and SOA paradigm might
and information sharing (Gortmaker & Janssen, provide new incentives to come to successful
2007). We elaborate on this research by stressing public-private cooperation. ICT may play a role
the role of agreements and other components of in shaping this cooperation. In the introduction
governance that become even more important we already argued that including private partners
if private organizations are among the service in public services may be necessary to achieve
partners. the vision of a truly integrated, demand-driven
and citizen oriented e-government. Orchestrating
Public-Private Cooperation these public-private service networks is necessary
to come to successful cooperation.
Cooperation between public and private partners An important part of these orchestrations
has a long history. Already back in the 1970s, are agreements, contracts, procedures, etc. that
and again in the 1990s, public-private partner- specify the relationship between the partners in a
ships (PPP) were established to strike a balance service network (Pongsiri, 2003). The downside of
between the entrepreneurial spirit and public strictly formalized relationships is that the service
interest considerations (Linder, 1999). Research network loses some of its flexibility and becomes
on public-private partnerships identifies both more tightly coupled, while a loosely coupled
strengths and weaknesses in the practice of having network would suit the orchestration model best.
private parties execute projects concerning public An important instrument in orchestrating these
269
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
service networks is the Service Level Agreement household care to needing people. Such a project
(SLA), in which agreements on response time, involves both public and private organizations.
management information, availability, etc. are The authors were involved in the design of the
specified at the level of the organizational services. architecture, therefore the type of research can be
This should be specified in such a way that enough labelled action research. We confront our findings
freedom is provided to the participants, but the with the literature and identify specific architec-
main conditions for effective cross-organizational tural and governance challenges for orchestrating
service-delivery are guaranteed. public-private service networks.
The clear allocation of roles, responsibilities Action research or applied case study research
and accountability is another important part of was chosen because this type of research instru-
the governance of orchestrating public-private ment is focused on how to questions (Checkland,
service networks. Who takes the initiatives in 1981). This enabled the investigation of the design
case of failure? How are decisions made and and development process of the application of the
enforced if they concern more than one organiza- enterprise architecture to this case. The authors
tion? The difference in interests might complicate were involved in designing the architecture for
these kinds of decisions. Governmental agencies demand-driven e-government. In addition, the
have a primary (social) responsibility towards case study aspect came from the interviewing
the public, whereas private organizations have a of a number of key persons from different or-
primary (economic) allegiance towards manage- ganizations and disciplines to identify the main
ment, owners, and stakeholders (Rosenau, 1999). challenges.
The aforementioned public-private partnerships
were mainly aimed at increasing public services
efficiency by introducing the entrepreneurial spirit CASE: AN ARCHITECTURE FOR
of private organizations. However, this may lead INTEGRATED SERVICE DELIVERY
to democratic, public and political costs, like
privacy and public responsibilities on failures The motivation for the development of the architec-
of private parties (Flinders, 2005; Rosenau, ture stems from the observation by several larger
1999). The clear allocation of responsibilities and governmental institutions and private parties in the
roles and introducing other types of governance Netherlands that cooperation is necessary to meet
mechanisms may help to avoid the occurrence of the demands of citizens and enterprises, in order
these negative aspects. Clear responsibilities, in to bring about a truly demand-oriented e-govern-
combination with SLAs creates a setting in which ment (Lankhorst & Derks, 2007). This resulted
trust can develop between partners. in the B-dossier project (http://www.b-dossier.
nl), a joint research initiative with partners from
government, academia and business. The project
RESEARCH APPROACH aims at establishing requirements and solutions for
public-private service networks. In this setting a
In this chapter we present enterprise architecture generic functional architecture and a demonstrator
guidelines for integrated service delivery and have been developed. Both the architecture and
identify the main architectural and governance the generic end-user interface were applied to the
challenges therein. Based on the literature survey case study in the Netherlands.
in the previous section, a case study in the Dutch Part of social security facilities in the Neth-
public sector was conducted. This case concerned erlands is the household care. People can apply
the design of an architecture for the allocation of for this facility in case they cannot take care of
270
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
their household themselves. In these cases, these is entitled to, based on the degree of dis-
persons apply for a personal budget, which can ability.
be used to buy the necessary care. This has the Social Insurance Bank (SVB): SVB pro-
advantage that people can choose the care they vides (among others) services to holders
need themselves, but this comes at the cost of of a personal budget to relieve them from
considerable administrative overhead. In the administrative overhead. SVB is a large
context of the Social Support Act (abbreviated as organization, with over 4000 employees.
WMO (Wet Maatschappelijke Ondersteuning) in Dutch Tax and Customs Administration:
Dutch) the social security facility of household The tax office provides income details on
care has been decentralized by the government which the budget is based.
from the national level to the municipal level. Care providers: Organizations offering
This act combines several laws on care entitle- household care.
ments. As a part of this law, municipalities have
become responsible for providing their citizens Generic Process
with appropriate services to support them. In
our case we investigate the application of our In order to research how a demand-driven elec-
architecture to a new portal initiated by the City tronic portal could be realized in the WMO case,
of The Hague to facilitate the WMO. The City a prototype of such a portal was developed by
of Hague sees public-private service networks Residentie.Net and was branded WMO-portal.
as a powerful means to provide demand-driven, A typical process consists of the following main
integral services to citizens. This is demon- steps.
strated by her initiative to start Residentie.Net,
an internet portal for citizens of The Hague that 1. Application: If a client thinks he/she may
connects citizens to public and private services be entitled to household care, the client can
in one portal. This portal supports citizens of The apply for this care him/herself, using the
Hague in acquiring and managing their personal WMO-portal. The portal features a process
budget for household care. The following public plan that consists of a number of sequential
and private stakeholders are involved: steps;
2. Check entitlement: One of these steps is
City of The Hague: The Hague is the seat the application for household care. Part of
of the Dutch Parliament and serves as the the application form is a field with the cli-
International City of Peace and Justice. ents income. This data can be provided by
As a municipality it is responsible for the the Dutch Tax Office. Whether the client is
implementation of the WMO, including entitled to care, is decided by the Centre for
household care. Care Entitlement (CIZ);
Residentie.Net: Residentie.net is a public- 3. Contract: If the application is accepted,
private partnership creating a digital portal the client can search for a household care
for the community of The Hague. The mis- provider. Once a provider is selected, a for-
sion of Residentie.Net is to connect citizens mal contract will be made using a template
of The Hague to public and private parties provided by the portal. Both the client and
to encourage use of public and private facili- the provider can sign the contract digitally,
ties. from their computers;
Centre for Care Entitlement (CIZ): This 4. Receive and consume care: Household
institute decides how much care somebody care is provided for the period and amount
of care the client is entitled to;
271
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
5. Manage budget: During the period the the Archimate language, which is an architecture
household care is effective, the client can description language derived from several other
manage his/her budget in the portal. The languages and shows the dependencies between
SVB can help the client in administrative architectural layers (Lankhorst, 2005).
overhead. Figure 5 shows that services and functions
related to authentication and authorisation are
The main steps of this process are schemati- seen as part of the shared infrastructure, and
cally shown in Figure 4. The client passes through are delivered by separate providers. Those third
the individual steps in the process that is facili- party organizations are shown in the left block
tated by the portal. The actors presented in the (shared infrastructure). The delivery of sub-
previous paragraph are also shown; the City of services, adapting these services to the clients
The Hague is overall responsible, Residentie.NET question and the integration of information from
offers the portal and the other organizations are several sources all are examples of functions that
shown in the lower layer, each offering services are executed by the service providers involved in
that are part of the overall process. It is clear that the cross-agency process. These service providers
this case suits our description of service-delivery are the organizations that provide (parts) of the
by a network of public and private organizations, service-delivery. Integrating all required services
thereby illustrating the fragmentation. and the supply of user information is done by an
application, which in turn may be provided by
The Architecture a third-party. This is shown in the upper part of
Figure 5 and may be seen as the core functionality
The enterprise architecture for demand-driven of a demand-driven architecture, and therefore
e-government was applied to the WMO case in under the direct responsibility and supervision
a functional architecture specific for this case, of the client (Lankhorst et al., 2006, p. 55).
the functional architecture was developed in the The architecture supports the generic process
B-dossier project (Lankhorst, Derks, Fennema, of the user, which starts when the user logs-on
Iacob, & Joosten, 2006). Figure 5 provides an and is authorized. The user can browse and/or
overview of the most important services and func- search the directory of services and information
tions of the architecture. This figure is drawn in and create and update a step-by-step plan. The
T h e H a g u e (re s p o n s ib le )
W M O -p o rt a l R e s id e n t ie . N e t
C lient
C hec k S et up R e c e iv e M anage
A p p lic a t io n
e n t it le m e n t c o n t ra c t c a re budget
T ax
C IZ C a re p ro v id e r SVB
A d m in is t ra t io n
A c to r e x e c u tin g th e p ro c e s s
272
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
Figure 5. An overview of the service architecture blueprint (Lankhorst & Derks, 2007; Lankhorst et al.,
2006, p. 55)
In te g ra te d d e m a n d -
d rive n s e rvice
user can also configure and manage the applica- Solving the Fragmentation of
tion, for example to authorize access to his file. In Services Across Many Different
these steps, various application services are used, Organizations
like those for authentication and authorization
(Lankhorst et al., 2006, p. 53). Process orchestration. End-users are faced with
The functional architecture is based on the the fact that services are dispersed over multiple
service-oriented architecture paradigm and con- organizations. End-users need support for the
sists of a set of requirements and guidelines for an management of scattered service provisioning.
architecture for public-private service networks. The proposed solution to this fragmentation fol-
These guidelines are divided into four categories: lows the lines of the B-dossier functional archi-
(1) fragmentation, (2) compatibility, (3) quality tecture (Lankhorst et al., 2006). This means that
and (4) access. Those requirements are derived the basic infrastructure of all service providers (in
from the enterprise architecture and translated this case the City of The Hague, CIZ, SVB and the
to the case at hand. For a full list of guidelines Dutch Tax and Customs Administration) remains
and requirements we refer to Lankhorst and in place. Residentie.Net plays a central position;
Derks (2007). We limit our description to those it provides a broker function that facilitates the
requirements that proved to be challenges in the operation of the public-private service network. As
public-private service network we investigated. such, Residentie.Net provides a generic orchestra-
tion service that is able to execute the step-by-step
plans. In this application, The Hague provides the
273
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
step-by-step plan to Residentie.Net, in such a way to Residentie.Nets access control. The client
that its users can orchestrate the process. controls access to his/her data stored at different
Single identity. End-users and employees have service providers from Residentie.Net. In addition,
different accounts at different service providers. the client can authorize other users and service
Users and entities are registered in different ways providers to view data.
at different registries. There is a need for managing
these identities in order to create a uniform identity. Compatibility of Service Demand
In the case, each service provider is allowed to and Supply
maintain its own registration of identities, in order
to provide maximum flexibility. When a service Translation support. Terminology used by ser-
provider exchanges data, the identity service at vice providers and end-users is often idiomatic.
each provider generates pseudonyms for the keys This increases the chance of errors in the service
of the data items, such that third parties cannot provisioning process. In the case, the translation
easily combine data. This way, the privacy of of terminology is performed by the service pro-
users is guaranteed. viders that interact with the client. They address
Single authentication. End-users and employ- the target group in their own terminology. The
ees have to authenticate themselves for most of the generic architecture foresees in a translation
service providers separately and each organiza- service to facilitate the necessary interoperability
tion has its own facility and user administration. on syntactic, semantic and organizational levels
Therefore, a single sign-on facility is desirable for (Lankhorst et al., 2006). However, this has not
true integrated service delivery. A single sing-on been implemented yet.
is created by accepting the authentication at one of
the service provider by the other service provid- Quality of Services
ers in the service network. This means that users
that are authenticated at Residentie.Net are also Choice of services. In many cases, service pro-
authenticated (indirectly) at The Hague. Similarly, viders are pre-selected by some party. Often, the
authentication of employees by SVB is accepted reason for this is not regulation, but operational
by Residentie.Net. efficiency. Therefore, end-users should have the
Single authorization. Exchange of information freedom to select and execute services they find
among service providers is often cumbersome. most suitable. In the WMO case, a directory of
Either service providers cannot access the in- household caretakers is maintained, which al-
formation of the client such that the client needs lows a client to select one of those caretakers. A
to provide the same information over and over client may also decide to choose another service
again, or information is exchanged without the provider.
consent of the owner. Each service provider has
its own access control infrastructure, including Accessibility of Services
policy enforcement, decision, administration and
information points (Demchenko et al., 2005). Each Access. Service provisioning in our case study
of the service providers has a policy enforcement involves many providers, many services and much
point that controls the transaction service on the data. This requires access control and consis-
end-users records. At Residentie.Net there is an tency preservation. In the WMO case, access to
integral transaction service that has access to the the records of a client is controlled by the client
transaction services of the other service provid- his/herself through Residentie.Nets authorization
ers. The integral transaction service is allocated services, and by the service providers through
274
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
275
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
lenges for such a plug-and-play architecture. For accessible, but this doesnt solve the fact legacy
this case, the most notable challenges are resolv- systems are involved.
ing a lack of standardization, coping with legacy The ability of a system to adapt to the number of
systems and designing a scalable architecture. partners involved, the volume of data and transac-
The involvement of different service providers tions, etc. is referred to as scalability (Medjahed,
deals with a lack of standardization among various Benatallah, Bouguettaya, Ngu, & Elmagarmid,
service partners. Technologies like Web Services 2003). The demand-driven architecture is very
can solve technical problems of interoperability, high-level (as shown in Figure 5) and has only
but terminology used by service providers and been specified to a few cases. Since the architec-
end-users is often incompatible. This increases ture deals with a number of partners, the service
the chance of errors in the service provisioning networks are complex. Scaling the architecture to
process. In addition, incompatibility may result include more services or a wider variety of service
in inefficiency at the service providers side. The providers increases this complexity even more.
architecture should be able to translate service Service oriented architectures are better at this
providers and end-users terminology. The chal- than traditional architectures are, but scalability
lenge of overcoming incompatibilities grows as remains a challenge nonetheless.
more different organizations are included in the The architectural challenges cannot be re-
service networks. solved without governance of the architecture. The
Coping with legacy systems is another interop- success of a plug-and-play architecture depends
erability challenge. As the number of partners on the compliance to governance mechanisms and
grows, so does the number of legacy systems principles. Especially accountabilities and respon-
involved in the cross-agency process. Standard- sibilities need to be clearly allocated to partners
ized interfaces can help in making legacy systems in the service networks. In the case, the overall
D utc h G ov ernm ent R eferenc e A rc hitec ture V arious enterpris e arc hitec tures
Integrated
s erv ic e
276
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
277
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
guarantee these public values. The exact role and mechanism. In the Netherlands this means that
responsibilities of each of the partners (public and organizations would like adopt the governmen-
private) should be specified to facilitate public- tal citizen service number (abbreviated as BSN
private cooperation. (Burger Service Nummer) in Dutch), rather than
On the issue of privacy, the case shows con- introducing their own identification within each
cerns by public organizations for sharing pri- service provider. The citizen service number can
vacy sensitive information with private partners. be viewed as one of the building blocks of the
Citizens expect their government to handle their enterprise architecture. Private parties also like
confidential information with care. This requires to adopt this BSN, but it is still unclear if this is
agreements on what information is shared among going to be allowed. Thus, using a single identity
partners, and these agreements should be trans- may be blocked if private parties are involved.
parent in order to demonstrate that information is In line with the adoption of BSN, governmental
shared only if necessary for the provision of the parties as well as private parties favour a global
service. A citizen should have a (last) say in what authentication service for citizens over federated
information is shared with private partners. authentication. A challenge service providers face
with federated authentication is insufficient trust
Developing Trust Between Partners of authentication by third parties. Both govern-
ment and private parties would like to adopt the
Differences in interest may occur between public global authentication service DigiD that is of-
and private organizations, for example a conflict fered by the Dutch government.
of interest; Business is in the business of selling A problem with the current global authentica-
us as much as it possibly can, says Mintzberg tion facility is that private parties are not allowed
(1996, p. 77). The objective is making a profit, to use it. Another problem regarding a global au-
while governments use public money to achieve thentication service are concerns on availability,
public goals. Another example is transparency; for example, the fear to become too dependent on
businesses may want to disclose the least possible the central authentication service for its service
information in order to keep or gain a competitive provisioning. Therefore, despite the preference
advantage. Public organizations on the other hand for global authentication, federated authentication
must be transparent. These types of conflicts of is still present in some organizations and single
interests cannot always be avoided; they have to authentication remains a challenge.
be dealt with (Flinders, 2005; Rosenau, 1999). The considerations not to trust authentication
This calls for a mechanism to govern coopera- services of third parties are also seen in the context
tion between public and private partners, in order of authorizations. Organizations are generally
to cope with conflicts of interests. One way to reluctant to trust authorization services by other
achieve this is by reducing conflict potential, parties, for example because of the responsibility
allowing partners to develop trust relationships. public institutions have with respect to citizens
In the case, we found a number of examples that privacy. Security is extremely important in order
stress the importance of trust between partners, to enable the service network to build relations
both public and private. based on trust. This requires a security mecha-
One of those examples derives from the ar- nism, for example in authentication and autho-
chitectural challenge of creating a single identity. rization services, certification and verification
Service providers appear to be biased towards functionality.
the adoption of a global customer identification
278
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
279
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
is a challenge (Gortmaker, Janssen, & Wagenaar, ture and clear interfaces with the partners. This
2005). In complex orchestrations, it is necessary is visualized in Figure 6 by providing a platform
to specify who is accountable for failures like that allows for plugging in partners. Besides the
exceeding lead-times. This also extends to deter- technical implementation, it is a challenge is to
mining which partner can provide accountability determine governance principles and conditions
information to stakeholders or clients, if requested. to add and remove partners to the network. For
It should be specified who takes the lead and who example, an intuitively appealing governance
is responsible for monitoring the cross-agency mechanism is that one partner must not be removed
process and the quality of the services provided. before there is a suitable replacement. This may
These accountability issues and the allocation of be contradictory to a private partners interest,
responsibilities in a cross-agency process have thus calls for governance.
to be dealt with before an orchestration becomes
effective (Gortmaker & Janssen, 2004). Orchestrating Over Multiple
Maintaining transparency and accountability Channels
while including private partners, increases the
challenge. A focus on efficient public service Many organizations have implemented a multi-
delivery by public-private service networks, may channel strategy, or are considering to implement
lead to costs on democracy and equity (Flinders, one. Channels like the Website, the telephone and
2005; Rosenau, 1999). Central to democratic a counter desk require synchronisation of infor-
governance is the ability to hold public officials mation across channels. For service networks,
and government responsible for public services this means that not only various organizations
(Rosenau, 1999). Therefore, the governance of need to be taken into account, but also the vari-
public-private service networks should also be ous channels at the organizations. Orchestrating
held responsible for the performance of these across channels is a challenge that adds to the
networks. However, there is some evidence in complexity.
our case that the costs for public-private service
networks are in large parts or even completely
paid by the public partners. In the literature it is FUTURE TRENDS AND RESEARCH
even argued that this goes for responsibility as
well; if public-private service networks fail, the In order to realize demand-oriented e-government,
democratic costs are paid for by government services related to governmental processes are
(Flinders, 2005; Rosenau, 1999). It is therefore more and more executed by private organiza-
necessary to clearly allocate responsibilities in tions and these private organizations need to be
a public-private service network. This can for included in the service-delivery process. This
example be done by assigning orchestration roles stresses the importance of further expanding the
(Janssen et al., 2006). knowledge about developing and using enterprise
architectures for public-private service networks.
Flexibility The developed architecture deals with some of
the challenges and further research is necessary
Networks are not static and will likely change over to deal with them all.
time. Consequently, flexibility is necessary to add Since public-private service networks are
new partners to the network and remove existing rarely static, private providers will likely come and
partners without letting the service network fail. go. Takeovers, bankruptcies, changing strategies
This requires at least a loosely coupled architec- and specialization may lead to new providers of
280
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
certain services or to the disappearance of some among the two areas and how they can strengthen
providers. It may even lead to the disappearance each other is still scarce.
of all providers. Therefore, governments must be Since we have only studied one case, albeit
able to fill this void, even if it is very unlikely to extensively, this researchs main purpose was
happen, in order to warrant the continuation of to identify typical challenges in a public-private
public services. The versatility in providers of service delivery architecture and governance.
(partial) services requires the enterprise archi- Our findings call for additional research in this
tecture to be flexible and adaptive; partners must field to rise to the challenges identified here and
be able to plug-in to the network and play. The to further develop and test the architectural and
creation of a flexible and adaptive plug-and-play governance principles of public-private service
architecture requires further research. networks.
Orchestration of public-private networks be-
comes more and more important and influences
public sector efficiency and effectiveness. Orches- CONCLUSION
tration has gained limited attention by research-
ers. There is a lack of theory concerning which Cooperation by different partners in government
orchestration arrangement is the best for which and the private sector makes it increasingly dif-
situation, especially concerning the specificities of ficult to design an architecture for integrated
public-private cooperation. Moreover, orchestra- service delivery. Many challenges need to be
tion has had a central focus, which does not match bridged and some of them require trade-offs to
the layered or even decentralized nature of the be made. A uniform way of dealing with those
investigated public service network. These issues challenges does not exist yet. In our case study,
are addressed by an ongoing research programme the main elements of the service network were
at the Delft University of Technology that focuses outlined by an architecture. Architecture needs
on the orchestrations of complex public-private to be complemented by governance mechanisms
service networks. We need more insights into the to help communicate it to the various organiza-
requirements on public-private service networks, tions and to ensure that it will be used. Even the
which coordination mechanisms are able to meet division of challenges in architectural and gover-
the complexity of such networks and what type of nance challenges proved to be difficult, because
architecture fits these complex networks. the architecture cannot do without governance,
Although enterprise architecture is a single and vice versa.
research area, it is more and more interwoven Orchestration is viewed as the management of
with governance, which gives rise to the future the dependencies among public and private orga-
research direction architectural governance. nizations with clear allocation of responsibilities.
Architecture and architectural descriptions needs Our case study showed that taking the view of
to be governed by rules, where governance can one stakeholder, that is a too narrow view as each
be supported by architecture as an instrument for organization orchestrates its own activities and
communicating the current situation, potential various orchestration roles might be located to
future situations and the long term vision. Our different organizations. More layered or decentral-
case study demonstrated the interplay between ized forms of orchestration are subject of further
governance principles guiding the development of study by the authors. The architecture presented
the architecture and we conclude that architecture in this chapter is a step in the right direction, but
and governance should be considered simultane- still many challenges need to be bridged.
ously. Research investigating the dependencies
281
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
282
Enterprise Architecture and Governance Challenges for Orchestrating Public-Private Cooperation
283
Section III
Realization and Deployment
285
Chapter XIII
People-Led Enterprise
Architecture
Neil Fairhead
Fujitsu Services, UK
John Good
Serco Consulting, UK
Abstract
This chapter provides an approach to Enterprise Architecture that is people-led, as a contrast to being
led by technology or modelling methodology. It identifies the major stakeholders in Enterprise Architec-
ture and suggests where in the organisation they may be found and how they may be connected with the
Enterprise Architecture. It highlights the roles of stakeholders throughout the process of defining and
implementing an Enterprise Architecture. The view of stakeholders managing the EA effort is described
through the complete lifecycle, from setting the EA mission to sustaining the benefits after implementation.
In proposing the adoption of such an approach, we aim to encourage a more direct link between Enter-
prise Architecture, the needs of the stakeholders it serves, and the pubic policy outcomes it enables.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
People-Led Enterprise Architecture
sations and that this requires leadership by key is necessary, that it is possible and that it will
stakeholders. A key conclusion is that identifying, happen again and again. In short, People have
engaging and gaining real commitment by relevant to lead the change if they want other people to
groups of stakeholders is a critical success factor follow it.
for an enterprise architecture team. However, there are still many government
organisations where enterprise architecture is led
by a choice of method or framework, or a desire to
Background model the enterprise, before an understanding of
the problem, from the problem owners perspec-
Over recent years there has been an increasing tive, is obtained. Coupled with a typically long
focus in Government and the wider public sector distance from the determination of public policy
on technology and transformation. For example, and the delivery of public services to the chief
the UK Government published Transformational architect (if one even exists), enterprise architec-
Government Enabled by Technology (Cabinet ture has a long way to go to realise its potential
Office, 2005) as a key strategy for the reform in the public sector.
of public service provision and managing the This chapter, based on our experience of do-
relationship between citizens, organisations and ing enterprise architecture in the public sector,
Government. However, while technology does describes how enterprise architects can deliver
enable transformation, it does not cause it. People an approach in which people lead, and technol-
have to decide what transformation is needed and ogy enables, real business transformation. We
why. They have to think through all the steps which propose a both/and world not an either/or
lead from current situation to desired state and one. Both people and technology are necessary
build the plans to implement those steps. but the sequence is important. There are still far
People have to communicate to everybody too many large change programmes which come
impacted by the proposed change that the change close to failure because the people affected were
not involved early enough and so are not com-
mitted. It is not the technology that successfully
Figure 1. delivers transformation, it is people using the
technology. Beginning enterprise architecture
B usiness O utcom es with this simple recognition and ensuring that
people are at the centre of the architecture the
big picture of change is a strong first step towards
successful transformation.
S takeholders This approach, and therefore this chapter, is
as much about choices and values as it is about
specific techniques. Enterprise architecture is
about change. Change is driven by a need to
E nterprise A ssets improve the business outcomes. The current
outcomes are not satisfactory or are not sustain-
able. Stakeholders in these outcomes, i.e. people,
O rg a n isa tio n s
IT S yste m s
In fo rm a tion
P ro ce sse s
286
People-Led Enterprise Architecture
architecture. Hence the key link between the The stakeholders of the enterprise architecture
target outcomes and the enterprise architecture function provide the guidance and direction for the
is the stakeholder. Enterprise architecture must function to ensure that it is focused on the highest
therefore be people-led and people-focused to value priorities, that the architecture is developed
make a lasting and positive impact. in the most efficient and effective manner and that
the resulting products are fit for purpose and use.
Which People - Know your Understanding who needs what from enterprise
Stakeholders architecture, and why, is a critical step in ensur-
ing that the enterprise architecture gets used and
Architecture is about change, which means that so delivers real value. In this way we can ensure
it is about people. It is often stated that people do that stakeholders are active team members who
not like change. This is not necessarily true but are inside the EA process. (Further, committee
it is certain that they hate having change forced experience indicates that progress is best made
upon them without their understanding and in- with the top-level management team supported by
volvement. Done well, enterprise architecture can an architecture team composed of a small number
help ensure that change is actively adopted. As of full-time professionals dedicated to the task.
the U.S. General Accounting Office (2003, p. 2 National Research Council (2004).)
- our emphasis) states, Enterprise Architectures
provide: What Do We Need From
Stakeholders?
to people at all organisational levels an explicit,
common, and meaningful structural frame of refer- Stakeholders have a variety of contributions to
ence that allows an understanding of (1) what the make. Understanding clearly what we need from
enterprise does; (2) when, where, how, and why them is a first step to ensuring that we have the right
it does it; and (3) what it uses to do it. ones. The following items are typically important
to the success of enterprise architecture.
Recognising that communication is part of
the service that EA delivers, and that the value of 1. The first thing we need from stakeholders
any service is measured by the recipients, leads is direction in targeting the highest value
us naturally to placing stakeholders at the centre and most important issues as perceived
of our approach to developing, implementing by the business stakeholders. Developing
and maintaining an organisations enterprise enterprise architecture has significant cost
architecture. In this people-led approach, stake- since it requires high calibre, multi-talented
holders become subjects not objects. Stakeholder people. Most organizations find this type
management is no longer about how the enterprise of individual both valuable and scarce so
architecture function sells to or manages it is essential that we make the best use of
stakeholders but rather about identifying who them. But what is that best use? Enterprise
has real and significant needs that the enterprise architects need to get clear guidance on the
architecture approach can help to meet, and how priorities for improvement and the value
the EA function delivers to those stakeholders. they will deliver from people involved in
We must ensure that stakeholders actively man- all business functions. By ensuring that all
age the process rather than being passive players architecture work is focused on supporting
responding to the EA specialists. It is a team high value improvements, we can ensure
approach.
287
People-Led Enterprise Architecture
Table 1.
Focus on Value
The value of EA is related to its impact on the total, net, present, probable, realised value of the changes that it is
guiding. To improve this we need to focus on:
1. The highest 2. How to achieve 3. Delivering that 4. While identifying, 5. And ensuring that
potential value them at minimum value as soon reducing and the processes by
changes cost as possible managing the risks which the benefits
will be harvested
are in place.
that we are maximising the value of what chitecture was built without the involvement
we do. of the key people who can make it happen.
2. Stakeholders need to provide real business If there is no adequate intent to implement
insight into the business opportunities, then the architects are wasting their time
challenges and constraints in the specific and the organisation is wasting valuable
areas that have been prioritised. While resources.
good architects have an understanding of For example, when helping a government
the business, this is no substitute for being department to design its enterprise archi-
immersed on a daily basis. This insight can tecture function we went to visit another
often require the involvement of stakehold- organisation. We were very impressed by
ers with management responsibility for the their knowledge, their models and their
subject area. They will be leading the people tools. Then we asked who is using this?
most directly impacted as well as carrying The silence was eloquent. The lack of intent
the responsibility for achieving the business to implement was obvious. The value of all
improvements and harvesting the benefits. their efforts was questionable.
3. Architects need to ensure implementation 5. However, even when an architecture is
plans are realistic by getting user contribu- implemented, built out through changes to
tions. We need to avoid the situation where processes and systems and people, that is
the architecture has been developed but not the end. To quote Winston Churchill,
cannot be implemented because it is con- it is perhaps the end of the beginning. The
sidered too theoretical and does not respond success of the architecture depends on it
to operational realities. We need to involve having a sustained impact and delivering
stakeholders who understand the day-to-day continuing improvement. This requires
details, including history, attitudes, skills commitment at all levels rather than mere
and capabilities. In this way, the architecture acquiescence. Help in building this ongoing
will demonstrate understanding and can be commitment is another key contribution that
made tangible to the people whose activities we need from our stakeholders. They can
will be changed. ensure that we build commitment through
4. The fourth contribution needed from stake- responding to deep felt needs.
holders is building the intent to implement. 6. To be effective, we need our stakeholders
As we look at architecture work, how often to generate respect and to show it publicly.
do we see examples that were never imple- (This could be construed as a statement
mented? This often occurs because the ar- of the obvious but experience shows that
288
People-Led Enterprise Architecture
many EA functions are not respected, often things happen. Typically they are important line-
being considered ivory tower theorists who of-business and programme managers, however
are disconnected from business realities.) having authority, visible respect and owning a
However, we cannot just demand respect, priority task are also attributes of other key staff
we need to earn respect, delivering value and influencers who can link EA to business
by significantly helping key stakeholders plans, strategies and budgets.
who themselves are respected through the Customer stakeholders are focused on achiev-
organisation. ing significant business improvements and driving
any required changes. Typically therefore, they are
Stakeholder Roles managing many moving parts in order to achieve
specific, tangible and compelling improvements
Looking at the contribution that we need from in the performance of their areas. They need
our stakeholders leads to the recognition that enterprise architecture to provide structure, to
we can segment our stakeholders into different simplify where there is complexity and to ensure
groups. This will make it easier to identify the a consistent common understanding of what needs
set of stakeholders required for success and make to change, how and why. However, they are not
it easier to explain their roles and associated re- necessarily familiar with enterprise architecture
sponsibilities and contributions to them. There (which tends to come from within the IT or-
are three main segments; Customer, Builder ganisation) nor do they always understand how
and User stakeholders. Each of these has clearly enterprise architecture can deliver this service.
different roles. Note that this segmentation is by Hence, a key part of obtaining their agreement to
role so one person may be in more than one seg- becoming a stakeholder is making tangible to them
ment but different contributions are required in the contribution that enterprise architecture can
each role. This is a pattern that is regularly seen make. We need to show them that we can help to
in government where the same people or even increase their probability of success in ways for
group may have two quite different roles. (For which they are willing to pay. Only then are .they
example, from the Canadian Province of Ontario, likely to contribute their own time and involvement
Treasury Board/Management Board of Cabinet in developing the EA. Without that insight, they
is a joint committee of Cabinet established under will probably remain outside the process whose
the Treasury Board Act and Management Board of value will be severely diminished.
Cabinet Act. In its capacity as Treasury Board, it Builder stakeholders: They will create ar-
sets policy direction as the architect and manager chitectural artefacts. They are not necessarily
of the governments fiscal plan, makes ongoing located in a formal architecture function, but
decisions about operating and capital expenditures they are using architectural methods and creating
and ensures consistency and coordination. In its architectural products. For example, they may be
capacity as Management Board, it sets policy business analysts inside an operating division,
direction as the governments employer and modelling processes and designing improvements.
makes decisions about the governments people, Bring them into the architecture community and
land, buildings, technology and information. share both deliverables and best practices and
(Government of Ontario, 2006).) broaden the knowledge base being applied to
Customer stakeholders: They need the output developing the enterprise architecture. Note that
of EA to achieve bigger business ends. Here you they may also be outside the organisation too as
will find the sponsors, people with the need and partners working with your organisation together
the authority, both positional and personal, to make (for example, to create a shared service for a
289
People-Led Enterprise Architecture
single point of contact for citizens), or they may thinking about the users, their needs and wants
be vendors (for example, an outsourced service and how to help make them more productive.
provider).
Builder stakeholders are also valuable because Balancing the Needs of our
of the network they have. Often they are embedded Stakeholders
in the organisation in a way that the enterprise
architecture function is not, since it often resides By now it should be obvious that the needs and
in the IT function. The aim is to create a virtual contributions of our stakeholders can vary consid-
team which uses the same basic approach, fol- erably. This fact alone justifies spending time and
lows the same standards and contributes products thought on segmenting them and understanding
to a single, logical, repository of architectural those differences rather than just treating them as
information. In this way enterprise architecture a homogenous group. In addition, a key challenge
can help to simplify the complexity of a large of developing enterprise architecture is finding
organisation and make it easier for knowledge solutions that meet all their needs. There is no
and information to flow across the silos that still point in planning an architecture that perfectly
often form barriers to change. meets the requirements of one vertical in the
User stakeholders: They will use the products organisation if it causes problems in another.
of enterprise architecture in the implementation of There is no point in designing an architecture
change, be it to processes, to systems, to business which perfectly meets the needs of the Customer
relationships or to people and their goals, skills stakeholders if we do not have the ability to build
and performance. This group typically includes it. Similarly there is no point on developing a new
a rich variety of people, for example: enterprise architecture if the User stakeholders do
not take it and implement it. We do not merely need
Business improvement directors looking to knowledge of our stakeholders and a relationship
change key performance indicators who will with them, we also need a mechanism for resolving
need the business view products. all their different requirements and capabilities
Programme and project managers and their to the benefit of the organisation as a whole. The
solution designers who will use the archi- following diagram (Good and Fairhead, 2007)
tecture to drive change. shows how we can approach this.
Planners, such as an IT strategist looking This diagram shows the different types of
to simplify an organisations application stakeholder, gives examples of each and the
portfolio who will clearly need the products primary community that they represent. It also
of the information systems view of the en- shows the forum in which these differences can
terprise architecture. be resolved and a common direction provided
Corporate compliance manager concerned to the enterprise architecture development. This
about privacy who will need outputs from forum is the Enterprise Architecture Governance
the data/information view. Board. It is the core team of Executives, across
all the functions of the organisation who drive
User stakeholders are significant because if the the enterprise architecture function and focus it
products of enterprise architecture do not get used on the areas of highest value to the enterprise.
then they have no value. It is not the architecture The Board sets priorities for enterprise architec-
itself that is important but its use, and user stake- ture work, approves key architecture guidelines,
holders have enormous influence on that. From standards and products, oversees the quality
the beginning, enterprise architects need to be assurance of enterprise architecture work and is
290
People-Led Enterprise Architecture
Figure 2.
S ta k e h old e r R o le s
C u sto m e rs U se rs
(N e e d R e su lts) (U tilise E A P ro du cts)
B u ild e rs
(C re a te E A P ro du cts)
B u sin e ss M g t B u sin e ss M g t
B usiness A nalysts
E nterprise A rchitects
IT M a n a g e m e nt IT M a n a g e m e nt
D om ain A rchitects
S olutions A rchitects
E xte rn a l Infrastructure A rchitects E xte rn a l
S trategic S uppliers
A rch ite ctu re C o m m u n ity
O th e r O th e r
E n te rp rise A rch ite ctu re G o ve rn an ce
B o a rd
B u sin e ss C o m m u n ity P ro je ct & C h an ge C o m m u n ity
S o u rc e : S e rc o C o ns u ltin g
the point of escalation for issues concerning the Where is the cost and poor quality of infor-
implementation of architecture products. The mation causing a problem?
Customer members are responsible for ensur- Who is hurt by the time and cost of develop-
ing both business buy-in and business priorities ment and change of business systems?
and guidance. Who has big change strategies and pro-
grammes impacting many people, processes
How Do You Find Your Customer and systems?
Stakeholders? - Who has a Need? o How do you know if the projects and
programmes will/are achieving the tar-
Building the base of stakeholders is one of the get improvements? If you do not, what
most important tasks in enterprise architecture. problem does that cause, to whom?
Identifying potential Customer stakeholders is the o How do you ensure that your pro-
first step. We suggest that the following questions grammes and projects complement and
will guide the search. The initial objective is to enhance the value of each other rather
build a sufficient base to get started and to ensure than conflict and confuse? If you can-
that we are focused on the most important issues, not, what problem does that cause, to
not to be exhaustive. whom?
291
People-Led Enterprise Architecture
ture, and not all of them need be, or often are, in 2. A mission of service: for the function not
the line-management of the Chief Architect. It is the organizational unit. Enterprise Archi-
highly beneficial that this be done in a coherent, tecture can be viewed as a profession, like
consistent and coordinated manner. To achieve engineering. Professions typically have
this we recommend that all the builders be seen as a number of key characteristics such as
members of a virtual team who work together to agreement on the purpose of the profession,
create the single overall architecture that reflects its mission of service. It highlights that the
the organisation as a whole while delivering to enterprise architecture does something re-
the individual business units within. ally valuable - and places value on you, the
Even though we are now focused down on the architect. The mission of service typically
Builder stakeholders, the architects themselves, also highlights the principles that you live
they are in many places and may not consider by (e.g., as demonstrated by the Hippocratic
themselves architects. These include the IT func- Oath);
tion (including centralised, decentralised or 3. Agreed common methods and tools: Hav-
outsourced), major change programmes and line- ing a common set of methods, standards,
of-business delivery units. Within each category formats and tools will make it much easier
there may be many instances (e.g. line-of-business to share information across all the differ-
units). In short, the virtual team will be much ent groups involved in creating enterprise
larger than you originally expect. architecture components and bringing them
It is valuable to carry out a reasonably com- together to create a single overall architec-
prehensive search for builders for two reasons. ture. A key part of creating a community is
First, you will have a broader influence and, as involving all the different teams in agreeing
the coordination improves, a bigger resource the standards and choosing the tools;
base. Second, the other architects will carry on 4. A sense of community: A community is
doing their job. Doing so in isolation increases made up of people, not organisational units.
the possibility of duplication of effort and may Ensuring that people want to work together
result in incompatible approaches that are only requires trust. Share the success. Be gener-
discovered at the implementation phase. As we ous - it will multiply and come back. Make
know, any rectification gets more costly the later sure people know of successes and that you
it is done. are promoting other peoples success.
In summary, People-Led Enterprise Architec-
ture ignores organisational boundaries to create How Do You Find Your User
the community. Obviously this means working Stakeholders - Meeting the Needs of
relatively closely across organisational boundar- the Implementers
ies which can be problematical. Four key things
can help: The third group are equally important and much
more diffuse the users of your architecture.
1. The Enterprise Architecture Governance Reaching them is a classic marketing exercise.
Board: Should represent, at a senior level, They need to be identified, segmented, understood
most of the organisational units involved. and communicated with. We need to think about
They can provide a remit that prescribes what we can do to make it easier for them:
this collaborative approach as well as defin-
ing the constraints within which it must be 1. To recognise that the deliverables of archi-
carried out (e.g., no transfer of budget); tecture can help them do their jobs better;
292
People-Led Enterprise Architecture
2. To know that appropriate deliverables may defined by each team in accordance with the
exist (i.e. it is worth looking for them); requirements of, and to meet the concerns of, the
3. To find those appropriate deliverables (or be relevant stakeholders. We have used a typical set
reasonably sure that they do not exist); of viewpoint names that have common currency
4. To retrieve the deliverables; in EA to illustrate the point.)
5. To give access to the builders to get a deeper
understanding of the deliverables if neces- Signing Up Your Stakeholders
sary;
6. To use the deliverables in the daily execution Of course at this point we have merely described
of their jobs. how you identify the stakeholders that you need,
which is not the same as getting them committed
Thinking about how our deliverables can be and signed up. Two elements are crucial to this.
used helps to both identify prospective users and First, do you have a heavy-weight sponsor? One
ways of segmenting them. In particular, it can be who believes that having an enterprise architecture
helpful to start with considering the typical users is important? Who really cares - and why?
of that major portion of the EA deliverables, the Again going back to U.S. Government experi-
major architectural viewpoints that are typically ence, the General Accounting Office reports that
defined. (It is not the purpose of this chapter to making IT investments without putting them
define the EA deliverables, as these should be into the context of architecture often results in
Table 2.
Architecture Typical Users
Viewpoint (examples, not exhaustive)
Performance Programme managers focused on outcomes not just outputs
Management Information Office focused on measuring and reporting
performance
Business Line managers focused on improving their processes
Business analysts focused on designing and implementing improved
processes
Human Resources focused on people, skills, training
Organisational development focused on how people and responsibilities
should be structured and organised
M&A focused on acquiring new high value capabilities or disposing of
existing non-core activities
Application / Developers building or maintaining applications
Service ICT financial management focused on overall lifecycle costs and their
reduction
Shared service centres working to maximise the return on their investment
through reuse of functionality
Line managers looking to improve the productivity of their people through
using applications and services already available
Information / Marketing management focused on what do we know about our customers?
Data Risk managers focused on being able to identify and measure key risks
Compliance managers focused on being able to prove the efficacy of key
controls
Technology Operations managers focused on simplifying the infrastructure that they run
to make it easier to manage, identifying single points of failure to reduce risk
or finding consolidation opportunities to reduce costs
Procurement looking to reduce licenses or increase buying power
Legal focused on ensuring that all software is legitimate
293
People-Led Enterprise Architecture
systems with requirements that are not clearly Of the contribution that enterprise architec-
and succinctly derived from business objectives, ture can make;
processes and targeted improvements as well as Of the risks of not having an architecture.
unnecessary repetition of functionality and com-
ponents which can result in excessive complexity Stakeholder Management Principles
and lifecycle costs.
Examples include the FBI Trilogy program One of the attractive components of TOGAF1 is
of which the National Research Council (2004) the structured approach it applies to principles. We
report stated: the FBI must first and as a matter suggest that this can be applied by the enterprise
of its highest priority in its IT efforts formulate architecture team to its stakeholders as follows.
an enterprise architecture. (page 3). When a You will need your sponsor to step forwards
key part of the programme, the Virtual Case and personally request other stakeholders to take
File (VCF), was cancelled in March 2005 after part, i.e. to get stakeholders first have a stakeholder.
costing $170 million it was described in IEEEs Any enterprise architecture needs a senior spon-
Spectrum journal as follows: This cavalier sor who understands the difference the structured
approach to software development would prove approach can make and is willing to press the
fatal to the VCF. Today, many organizations case to their peers. This case is based on the
rely on a blueprintknown in IT parlance as an contribution that enterprise architecture can make
enterprise architectureto guide hardware and to helping senior executives to achieve tangible,
software investment decisions.......The problem significant and compelling improvements. That
was, the FBI didnt have such a blueprint, ... contribution includes:
(Goldstein, 2005)
The key step in signing up stakeholders is Addressing complexity. Complexity slows
making them aware: diagnosis (whats happening), slows design
Table 3.
Name Stakeholder Roles
Statement The role of every identified stakeholder will be defined in terms of both what
they require from the enterprise architecture and what they will contribute to
the enterprise architecture.
Rationale Reasons for implementing the principle
Three types of role can be stakeholders in the enterprise architecture func-
tion, those who have a need for the enterprise architecture in order to achieve
bigger business objectives (Customers), those who will build enterprise
architecture products (Builders) and those who will consume the enter-
prise architecture products in their job (Users). Knowing why a role is a
stakeholder will make the enterprise architecture function more responsive
to the stakeholders requirements
Enable tuning of information flows to match individual stakeholders role,
e.g. meetings will have a narrower, more effective scope
Focus stakeholders on the contribution expected from them (i.e. being a
stakeholder implies responsibilities as well as rights.)
Impact of not implementing the principle
Overlapping responsibilities leading to confusion or discord
Implications Need to make very clear what the different roles are (and why), the selection
criteria, the authority of and the contributions expected from each role.
Need to identify the key stakeholders and gain their agreement to being a
stakeholder
Need to maintain regular communications with the stakeholder community
294
People-Led Enterprise Architecture
(whats got to change), slows development tively little continuity of decision makers
and slows implementation. Unnecessary with concomitant difficulty in recreating
complexity also adds cost and risk. As the how and why decisions were taken. This
CTO of Microsoft, Ray Ozzie wrote Com- causes two problems. First we can waste
plexity kills. It sucks the life out of develop- time and resources recreating information
ers, it makes products difficult to plan, build that has already been captured because the
and test, it introduces security challenges, people who knew the information have
and it causes end-user and administrator moved. Second, we fail to learn from pre-
frustration. (Lohr, 2006) vious work, whether successes or failures,
The enterprise architecture will provide because we do not remember how that work
knowledge and tools to identify where how was approached. Enterprise architecture
and why complexity can be taken out of the can make a very useful contribution to the
infrastructure and processes (including ICT) corporate memory provided that we set out
hence helping to identify unnecessary dupli- to do so and hence plan to capture relevant
cation of function, information and effort as information and hold it in our architecture
well as ensuring that differences in methods repository for use by our stakeholders.
reflect real differences in requirements not
just preferences. Remember: Stakeholder Management = stake-
Addressing uncertainty. Uncertainty can holders managing EA
stem from changes in needs, changes in pri-
orities and surprises (changes not predicted).
The objective is to think through the sources Realising the Architecture,
of uncertainty, plan how to respond to pos- from a People-Led Point of
sible alternatives fast (as opposed to planning View
for just one alternative) and recognise that
a change is arriving in advance so we have Essential to the people-led objective in realising
enough time to implement the necessary the architecture are motivated, skilled and in-
actions in response. formed senior stakeholders with a demonstrated
Providing corporate memory. In large or- consensus on the objectives and purpose of the
ganisations, including governments, there is architecture. The architecture team then has the
constant movement of people. In particular, responsibility to motivate, skill and inform the
high calibre personnel who are expected to participants to deliver the right things for the
achieve high rank and authority are often business.
moved relatively swiftly to give them a As enterprise architects, we have to continu-
broad experience as well as enabling them ously ensure that we are undertaking our work in
to climb fast in organisations with many response to a clear customer requirement, using
layers. In addition, in many commercial tools, methods and products that our stakeholders
organisations the ranks of middle manage- can understand and use, to a plan that fits with their
ment have been significantly reduced over own plans (from strategic enterprise objectives
the last two decades. For example the US through to tactical departmental ones).
Federal Government reduced its middle To provide a framework for describing our ap-
management ranks by over 20% (from proach to implementation, we have used a simple
161,000 to 126,000) between 1993 and 1998 5-step method as follows:
(Light, 1999). As a result there can be rela-
295
People-Led Enterprise Architecture
1. Identify the purpose for the architecture To achieve maximum value from investments in IT
(WHY) services and the efficient and effective delivery of
2. Develop a focused architecture framework change programmes through the design of optimal
that will serve as a means for people to enterprise and solution architectures.
deliver the value set out in the purpose
(WHAT) In the first there is no sense of why the EA
3. Develop a migration path and associated should exist, other than to be created for itself. In
plan of activities (HOW) the second, we understand the purpose to which
4. Implement the architecture approach the enterprise architecture is to be put and can
5. Review, measure success and revise. see in this the influence of customer stakeholders
(in this case the purchasers of IT services and the
The formulation of a complete and rigorous sponsors of change programmes).
method is not our purpose here, and we encourage In order to understand the needs of the stake-
the use of a more robust method as appropriate (e.g., holders you first have to identify them (see the
such as TOGAF ). However, we do commend Stakeholder Roles section). Stakeholders are
the people-led messages in each of the 5-steps be always working and operating in a particular
applied to whichever method you choose. context, defined by the drivers of change they face.
Such drivers include competitive pressures, cus-
Identify the Purpose tomer preferences, and other political, economic,
social, technological, legal or environmental,
At this initial step, we identify the purpose of PESTLE (Prime Ministers Strategy Unit, 2004),
the architecture. Without a clear and agreed un- external drivers. As people, they choose a response
derstanding of this purpose, we will not be able to those drivers that will (it is hoped) effect an
to provide focus and measure success. From our improvement in their situation. This response
people-led perspective, the main objective here is expressed variously as a requirement, resolu-
is to align ourselves with the motivations of our tion of an issue, realisation of an opportunity or
customer stakeholders and so provide a motiva- acceptance of a constraint. Together these will
tion for all stakeholders for engagement in the form the stakeholder concerns that will drive our
enterprise architecture. mission statement.
We have often observed a mission statement
for the enterprise architecture derived from a
definition of enterprise architecture itself, rather
Figure 3.
than from the purpose to which a customer wishes
enterprise architecture to be put. Compare the
D river
following types of mission statement:
296
People-Led Enterprise Architecture
The output of this exercise can be captured in to the delivery of the vision. It is useful to
a simple matrix with four items as follows (Good think of this in three parts:
and Fairhead, 2007): A first clause describing the core, cus-
tomer stakeholder focused, outcome-
Vision statement. A broad picture of what the based purpose;
future will be like. This statement need not A second clause describing how to
be constrained to the enterprise architecture. achieve motivated, informed and
It is often wise to paint a broad vision for skilled customers, builders and users,
the enterprise from the perspective of the and
stakeholders in the enterprise architecture. A third relating to the nature of the
This will then capture something of the ambi- resulting EA itself.
tions of the stakeholders, rather than of the Goals. For each element of the mission
enterprise architecture. It is useful to com- statement, a defined set of goals that will
plete the sentence A world in which... to contribute to the achievement of the mission.
get the right sense of a visionary outcome! There may be many goals, but around 3 to
Mission statement. A statement of the contri- 4 per clause in the Mission statement will
bution that enterprise architecture will make
297
People-Led Enterprise Architecture
be sufficient (any more will be difficult to prise architecture, users and builders may not be
track and manage); familiar with the artefacts and how to use them.
Success Factors. For each goal, a definition A useful principle is that architecture models
of the things that have to be done, and done come with people. This proposes that if a user
well, to assure success. It is important here or builder needs a model, it is always delivered
to focus on only those things that are critical, in person by an architect who can explain the
so as to provide for management attention model and its use, assist the user to use it and
in the high priority areas. provide ongoing assurance to ensure that the best
value is obtained from the product. With a wider
This model is motivated mainly by the cus- perspective, this engagement also ensures that
tomer stakeholders, and provides for linkages to updates are captured to enrich the model for the
user and builder stakeholder concerns. In order to next user and that the models remain relevant as
reflect this purpose back and provide motivation the architecture implementation progresses.
for its delivery for the people involved, we would
expect these goals to be translated into perfor- Plan
mance objectives agreed in the performance ap-
praisal and development plans of each stakeholder, The people-led objective in planning is to ensure
be they customers, builders and/or users. that we are informed about our stakeholder needs
and take them into account in planning our work.
Develop Architecture Framework We then use our plan to inform our stakeholders
of what we will do. This is crucial to obtaining
The people-led objective in developing our EA their support and involvement. Clearly this stage
framework and methodology is to develop stake- is also about good planning, but a plan is worth
holders who are skilled to use the architecture to nothing if it is not relevant to those it serves and
best effect. For the customer stakeholders, this is communicated to those it affects.
not so much of an issue, but for the users it means The key factors in our approach to planning
defining what they will have to be able to do to are direction and balance.
carry out their responsibilities, and for the builders
it is about enabling them to deliver Direction
The people-led approach starts with the users.
What architecture views do they need, and what As noted previously, the focal point in giving
services have to be provided by the EA team to direction is the EA Governance Board. In par-
enable this use? Once you know what the users ticular they will need to choose between different
need, you can look to off-the-shelf frameworks opportunities for applying the limited enterprise
and methods to adopt and adapt. In short, if you architecture function resources. While there will
cannot identify a user with a need, dont develop be ongoing enterprise architecture services (e.g.,
the architecture artefact or the service that goes management of policy and standards, management
with it. of architecture change) major enhancements will
Consideration should be given to creating an be delivered via projects focused on supporting
architecture service that defines how each archi- specific business requirements.
tecture product is created, used and maintained. Projects will mostly be initiated by senior
These services will be a lifeline for users and sponsors with whom the enterprise architects
builders in the wider architecture community. In should engage to agree their contribution through
the initial stages of developing and using enter- jointly defining a Statement of Architecture
298
People-Led Enterprise Architecture
Work. A request to develop such a Statement 5. The products to be developed have been fully
would be assigned to either the core enterprise identified and provision for their lifetime
or appropriate domain architecture teams. The management beyond the initial project has
nominated architect should ensure that the State- been identified. This is crucial as typically
ment responds to the specific requirements of the these products will define and impact the
project, but also wider concerns from any parent architecture for a period some time after
Change Programme (which typically exist to drive the project has ended;
the achievement of the most strategic goals and 6. There is a plan for the inclusion of the EA
will be concerned that the results of many projects Governance Board at the appropriate key
are cohesive in that context) and other enterprise milestones to provide review and assurance
architecture stakeholders. on the architecture products developed.
Once agreed, the Statement should be submit-
ted to the EA Governance Board for review and Balance
approval. The criteria to be applied to reviewing
the Statement would be expected to include: When the enterprise and the domain architecture
teams create the overall plan for developing and
1. The Statement is compliant and has been implementing the architecture, there needs to
approved by the project/programme and be balance between the local requirements of
architecture team management; projects and the broader requirements of wider
2. The Statement considers the direct needs of stakeholders. This is an architecture for people
the programme/project and also the wider to use, rather than for compliance with a compre-
concerns of other related stakeholders. These hensive classification or taxonomy.
would be expected to include related gov- In general terms we therefore propose that a
ernance boards (e.g., an IT or information broad architecture view is developed that models
security committee), standards bodies (e.g., the current and target enterprise at a high, but
involvement in related inter-Governmental specific, level. This initial view serves to provide
or industry standards groups), departmen- context for all the detailed work that follows, and
tal steering groups (in related functions of helps us identify overlaps and gaps in the com-
the enterprise, including in IT), business pleted architecture description. It enables usage
partners (e.g., in the case of ministry or as it allows the users to see where, in navigation
departmental collaboration), architecture terms, they are in the architecture at any point.
user groups (e.g., there may be a corporate For each of the prioritised purposes we then
data model or business process special in- drill down to provide complete pictures that
terest group) and product vendors (perhaps meet the business needs of a particular pro-
through membership of a user group); gramme, project or other group of stakeholders.
3. The work proposed is commensurate with the We do not drill down in each interrogative dimen-
objectives, timescales, risks and resources sion separately (e.g., by completing a standalone
of the programme/project and architecture data architecture) as this is of little use without
team; the context of the related models in other dimen-
4. All related impacts have been identified and sions. Typically we achieve this by managing two
there are no remaining assumptions (having sets of models: a series of composite models that
all been signed-off by an owner or reflected meet the needs of the users, and a series of atomic
in the project risk register where they have
been mitigated);
299
People-Led Enterprise Architecture
models that meet the needs of the architects to are engaged with and the people-factors in change
ensure cohesion and completeness across all the dealt with.
composites. This requires the enterprise architecture
We balance this pragmatic development with programme to have an explicit understanding of
periodic reviews, where we identify gaps and over- the culture, people, communications and how-
laps and resolve these, validating the relationships things-get-done-around-here, as much as the
between the elements, to improve the coverage, more procedural and structural elements of the
cohesiveness and standardisation of the architec- organisation such as governance and manage-
ture. These exercises are not just academic, but ment structures, delegated authorities, approvals
also assist in identifying opportunities for further processes, management processes etc.
value (e.g., by identifying overlaps in application The enterprise architecture programme should
functionality that may be rationalised). therefore formulate explicit strategies for how it
It is often useful to represent this balance be- will engage with the organisation to ensure the
tween short-term project implementation-focused definition, delivery and implementation of the
delivery and longer-term strategic development architecture.
using two-track planning, where tactical delivery
is tracked on one plan, and the achievement of Using and Enhancing Existing
strategic milestones on another. In this way, when Governance and Management
there is a preponderance of tactical requirements Approach
(as there always is!) the architect can demonstrate
the risk to strategic milestones and make the case The stakeholders we have identified will already
for retaining some effort in the plan for furthering know and be accustomed to their existing gover-
strategic goals as well as supporting immediate nance and management. We should not seek to
delivery. burden them with new modes of governance and
Further, such a two-track plan helps the EA management, but rather inject appropriate ele-
Governance Board as it enables two checks; 1) ments into the existing approach. The following
is the project proposed in line with the strategy are examples of this approach:
and 2) is the strategy being furthered in as best a
way as possible by the project. This later check is Enhancing the review criteria of existing
often the more difficult, as it suggests the ability OGC Gateway reviews (as defined by UK
to amend the scope of the project to ensure that Government) to include review criteria from
strategic benefits are delivered, which may not the enterprise architecture function (e.g., for
have the immediate approval of a project sponsor compliance with corporate data or technol-
focused on short-term benefit. ogy standards);
Providing architecture input into issue reso-
Implementation, Realising the lution processes to bring a comprehensive
Architecture view of the impact of alternative resolution
tactics for consideration by the stakehold-
The people-led implementation approach looks ers;
for the most value from the least impact on the Provide alignment between the service
people. This is not to say that we shy away from management metrics of IT services with
change, major change can be achieved without the performance indicators of the customer
negative impact provided that the stakeholders stakeholders.
300
People-Led Enterprise Architecture
It is important in all these examples to identify Using and enhancing existing programme and
unique and compelling criteria for the enterprise project delivery and management methodologies
architect that cannot be adopted by any other role. and frameworks.
Often this is in the enterprise architects view The same argument is applied to the work of
across the enterprise in terms of breadth (i.e., takes the enterprise architect with the solutions delivery
a view across many business domains) and time change programmes of the enterprise. The intro-
(i.e., balances short and long-term thinking). duction of new processes and techniques can be
Table 5.
Start-Up Feasibility Initiation Delivery Closure
Strategic
Critical business change projects delivering major elements of the enterprise architecture
Provide the Core EA team Core EA Core EA team Core EA team
project team works with team provides reviews and works with
with access to project team to certification certifies that project sponsor
the repository develop architec- that project is the design is to review EA and
Core EA team ture products compliant with compliant with EA contribution
provides advice Core EA team EA and/or terms EA and/or terms for review
on what informa- develops request of EA waiver of EA waiver Core EA team
tion may be most for waiver if Core EA team prepares RFC
relevant required and identifies content to EA content
works through for loading into or process if
EA Governance the repository justified by post
Board to get ap- project review
proval
Standard
Important, domain-based, projects, building on major EA elements.
Provide project Domain or Domain or Domain or Domain or
team with access infrastructure infrastructure infrastructure infrastructure
to repository team works with team provides team reviews team works with
Domain or infra- project team to certification and certifies that project sponsor
structure team develop architec- that project is the design is to review EA and
provides advice ture products compliant with compliant with EA contribution
on what informa- Domain or infra- EA and/or terms EA and/or terms for review
tion may be most structure team of EA waiver of EA waiver Domain or infra-
relevant develops request Domain or infra- structure team
for waiver if structure team prepares RFC
required and identifies content to EA content
works through for loading into or process if
EA Governance the repository justified by post
Board to get ap- project review
proval
Minor
Smaller projects with no material impact on the enterprise architecture
Provide access Domain or Domain team n/a n/a
to repository to infrastructure provides certifi-
project team team provides cation that proj-
ad-hoc support ect is compliant
on request by with EA
project team (no
waiver should
be required by a
minor project)
301
People-Led Enterprise Architecture
disconcerting for some people. The involvement Providing common tools and processes for
of the enterprise architect can benefit all stake- the delivery and management of project ar-
holder types (from the programme perspective) tefacts, and a repository service that outlives
as follows: the project to serve as corporate memory of
the project and the solution;
The programme customers may benefit Enhancing the requirements management
from an improved value opportunity as process by linking requirements to the
the architect identifies cross-programme relevant architecture views describing the
opportunities for re-use, sharing solution solution to enable change impact assessment
elements and simplification of systems and and configuration control (e.g., in release
processes; management).
The programme builders may benefit from
reduced cost and risk if they re-use exist- In these and any other examples, we suggest
ing enterprise architecture assets (such as keeping the enterprise architects own methods
a corporate process model) and this in turn and techniques hidden from the stakeholders
prompts the re-use of existing solution build- as far as possible. Exposure to architecture-
ing blocks; speak alienates stakeholders, sets barriers to
The users of the programme deliverables may communication and can create the impression of
benefit from a more cohesive and consistent architecture for architecture sake.
systems architecture that maximises the in-
vestments in systems and therefore in their Work with the Culture
own training, and reduces complexity.
There are many sources of guidance as to the pat-
It is useful for the programme and project terns of enterprise architecture to adopt that are
managers to be able to define the architects re- based on the nature of the problem to be solved,
sponsibilities to them, and their obligations back the business sector or the in-vogue technology
to the architects, and the enterprise architecture. paradigm of the day amongst others. Our people-
The following table of definitions and modes of led approach suggests that an examination of the
engagement (Good & Fairhead, 2007) provides culture of the enterprise, that is, of the way the
examples as the basis for developing such an people work with each other, communicate and
engagement model between project types and organise themselves and are led and managed,
project phases: will provide the driving influence both to how to
In addition, there are general techniques that go about implementing the enterprise architecture
would be shared between projects and enterprise and what sort of architecture to adopt.
architects. Again, we recommend adopting and Table 6 represents a simplified view of three
enhancing the standard practices where possible. cultural metaphors for enterprises, selected for
For example refer to Table 5. their contrasting suggestions as to the how and
what of an enterprise architecture.
Re-use of the PRINCE2 (OGC, 2005) prod- (This table is derived from the results of a
uct quality review technique for the enter- workshop run by the author (Good, 2004) which
prise architects reviews of the architecture itself was inspired by the writings of Morgan
artefacts produced by the project (assuming (1986) and the BBCs Leadership Programme
a PRINCE2 working environment);
302
People-Led Enterprise Architecture
Table 6.
How to do What EA to
Type of organisation Indicators of this type Examples of this type EA consider
Process-driven Strategy by structured Back-office processing-unit Decree Process-centric
analysis (e.g., processing benefits Centralised Centralised
Management focus on claims). Formalised Integrated
process Operational service-delivery
Decision-making by agencies
numbers
Systematisation of
work
Organic Strategy follows Vision Policy Unit Visions Federated
Leadership not man- Charitable Organisation Standards Standards-based
agement Overarching government Project-focus Interoperable
Consensus-based deci- departments that set the context
sion-making around a for delivery via various agencies
shared direction School
Focus on working
together
Networked Strategy by gut-feel Research department Subversively Localised
Leadership focus on Scientific or product R&D Networking Distributed
having conversations University By-Example Low-level
Autonomous and local
decision making
Ideas driven by the
people network
Table 7.
Stakeholder Customer Builder User
Key Criteria Did it deliver value? Did we do it well? Was it useful?
Example Questions Did the EA enable the Were our own processes Am I able to access and
preferred business outcomes? effective and efficient? Were use the EA?
Is the EA resilient to other we more productive? Does the EA enhance
business scenarios? What is the level of customer productivity?
Is it easier to judge which satisfaction in our work? Is the enterprise easier
investments to make? to understand, more
accurately?
303
People-Led Enterprise Architecture
To reinforce the people-led approach to enter- Periodic repository reviews will present op-
prise architecture, we suggest organising the terms portunities to measure how up-to-date the
of reference for the quality assurance reviews products are (against review and archival
carried out according to our three stakeholder dates), how used the products are, where
groups. This form of review ensures that the demand lies (e.g., by capturing search cri-
findings are directly relevant to our stakeholders teria) and therefore measure the usefulness
and engages them in addressing their issues and of the architecture.
concerns. This is in contrast to other approaches,
defined by the step in the process (e.g., define
purpose, or create plan), architecture view (e.g., Sustaining the Effort, Being
performance, business, information etc) or other ready for the Future
based on the structure of the architecture itself
which can often appear introverted (EA review In this section we look forward, to how we can
for EA) and meaningless for stakeholders. anticipate and prepare for the future demands
Of particular importance is the linking of User our stakeholders will place upon us. Much of
quality criteria to Customer criteria. For example, the work we need to do on an ongoing basis is
if a business/systems analyst on a major change described previously. We need to plan, execute,
programme is able to quickly and consistently review and revise our approach and architecture
gain access to information regarding the business on a continuous basis. We need to ensure that
processes in the enterprise and the applications our architecture governance is embedded in our
that support them, then there should be a link to day-to-day procedures and practices.
reducing the cost and risk of the programmes in When looking to the future and planning our
which the customer stakeholders are investing. future capability, we ask slightly different ques-
Opportunities for measurement can take many tions of ourselves, our customers and our users.
forms and the following should be considered as The following pragmatic questionsn (Table 8) can
good candidates: be asked, reflecting that we often have a view of
the specific changes planned by the organisation
At any enterprise architecture review of a over the next 18 months or so, but only a strategic
project, the use of a shared checklist to mea- view for the longer term after that (Good and
sure common objectives and criteria such as Fairhead, 2007).
compliance, product quality and error rates, Using the quality assessment matrix presented
customer satisfaction, resource deployment, previously (Table 7) you can assess your capabil-
timeliness of delivery will build up a picture ity maturity in a way that is innately tuned to the
relating to the engagement of the architec- needs of the stakeholders. Within each stakeholder
ture team with the project, usefulness of the assessment, maturity is driven by the following
architecture products and the effectiveness factors:
of the architectural processes;
Periodic EA plan reviews will enable wider Repeatability: The extent to which the
measures such as stakeholder engagement requirements of the stakeholders are met
and communication, success in hitting on an ongoing basis, not just in one-off
strategic milestones, resource utilisation project delivery;
and deployment, risk mitigation success to Resilience: The extent to which the capabil-
be measured; ity is flexible and adaptable to changes in
circumstances;
304
People-Led Enterprise Architecture
Table 8.
Optimisation. A m I getting the most out of what I m currently doing?
Positioning.
Is my vision right?
Now 18 months 3 years 5 years
305
People-Led Enterprise Architecture
approach, not least through the explicit recognition Light, Paul C (1999). The Changing Shape of
of the enterprise culture. Government The Brookings Institute, Policy
Finally, we have suggested that a people-led Brief # 45
approach to quality assessment would be one that
Lohr, Steve and Markoff, John (in press) Windows
would engage more directly with all our stakehold-
Is So Slow, but Why? New York Times; March
ers, by being tuned to their original requirements
27, 2006
and needs as we should have identified them at
the start of the enterprise architecture process. Morgan, Gareth (1997) Images of Organisation,
This in turn will lead us to plan the enhancement 2nd Edition, London. Sage Publications
of the enterprise architecture capability in line
National Research Council (2004). McGroddy,
with our stakeholders needs and better serve
James C., and Lin, Herbert S., Editors, A Review
them over time.
of the FBIs Trilogy Information Technology,
Committee on the FBIs Trilogy Information
Technology Modernization Program, Computer
References
Science and Telecommunications Board, Division
on Engineering and Physical Sciences, National
Cabinet Office (2005), Transformational Govern-
Research Council of the National Academies, .
ment, Enabled by IT. Retrieved 31st July 2007 from
ISBN:0-309-09224-8. Retrieved on August 6 2007
http://www.cio.gov.uk/documents/pdf/transgov/
from http://www.nap.edu/catalog/10991.html
transgov-strategy.pdf
Office of Government Commerce (2005). Manag-
Cabinet Office (2007), Chief Technology Officer
ing Successful Projects with PRINCE2 Manual
Council. Retrieved 31st July 2007 from http://www.
2005, 4th Ed. TSO (The Stationery Office).
cio.gov.uk/chief_technology_officer/index.asp
Prime Ministers Strategy Unit (2004). Strategy
Goldstein, H (2005) Who Killed the Virtual Case
Survival Guide v2.1. Retrieved 31st July 2007 from
File?, IEEE Spectrum September 2005, http://
http://www.cabinetoffice.gov.uk/strategy/down-
www.spectrum.ieee.org/print/1455
loads/survivalguide/skills/s_pestle.htm
Good, J (2004) Defining an Architecture Roadmap
U.S. General Accounting Office (2003). Informa-
that talks to the Enterprise Culture, EA Confer-
tion Technology: A Framework for Assessing and
ence Europe 2004, London, IRM UK Ltd
Improving Enterprise Architecture Management
Good, J and Fairhead, N (2007) Getting started in (Version 1.1), GAO-03-584G, April 1, 2003.
Enterprise Architecture EA Conference Europe Retrieved 3rd August 2007 from http://www.gao.
2007, London, IRM UK Ltd (copyright Serco gov/new.items/d03584g.pdf
Consulting, used with permission)
Government of Ontario, Office of the Premier
(2006). Description of the role of the Treasury Endnote
Board / Management Board of Cabinet. Retrieved
1
30th July 2007, from http://www.premier.gov. TOGAF is a trademark of The Open Group
on.ca/team/Committee.asp?Team=2 in the US and other countries
306
307
Chapter XIV
Using Enterprise Architecture to
Transform Service Delivery:
The U.S. Federal Governments
Human Resources Line
of Business
Timothy Biggert
IBM Global Business Services, USA
Kunal Suryavanshi
IBM Global Business Services, USA
Ryan Kobb
IBM Global Business Services, USA
Abstract
This chapter provides a case study on how the U.S. Office of Personnel Management has led the estab-
lishment of the Human Resources Line of Business (HR LOB). It explains how the HR LOB program has
used enterprise architecture to drive transformation to a new Human Resources service delivery model
across the United States Federal government. The authors propose that the common view and vocabulary
that EA artifacts provide, along with the collaborative governance that took place to create the artifacts,
has produced a solid business foundation for this extensive business transformation effort.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Using Enterprise Architecture to Transform Service Delivery
308
Using Enterprise Architecture to Transform Service Delivery
outsource functions to other companies located In his February 2002 budget submission to
on the other side of the planet. Congress, the President of the United Statespro-
Fueled by technology, the pace of change posed his strategy for achieving this shift to a
is in fact accelerating. According to McDavid customer focus. The President stated that our
(1999): success depends on agencies working as a team
Technological innovations give rise to across traditional boundaries to better serve the
increased opportunities: new ways to do old American people, focusing on citizens rather
things better and whole new things to do. These than individual agency needs (OMB, n.d.a, The
opportunities give rise to business innovations, President Urges Agencies to Work Together sec-
and companies move in to take over new niches tion). According to OMB (n.d.a) the Presidents
and sub-niches. These changes in the way of do- Management Agenda proposes that this can be
ing business create new ideas and expectations accomplished through expanding electronic gov-
of even better, more innovative performance on ernment or E-Government which leverages
the part of technology. In turn, pressure is put advances in technology to:
on technology providers to support still more
new and innovative forms of business behavior. Make it easy for citizens and businesses to
(Purpose of a business system architecture sec- interact with the government
tion, para. 7) Save taxpayer dollars
Expectations about innovation do not stop with Streamline citizen-to-government commu-
business; the public expects innovation to thrive nications
throughout government as well. Polling data from
the Pew Foundation, for example, show that over The United States Government has been a par-
40 million Americans went online to look at Fed- ticular beneficiary of information technology:
eral, State and local government policies and over
20 million used the Internet to send their views to The United States Government continues to
governments about those policies. This and similar be one of the largest users and acquirers of data,
data show that if the U.S. Government can har- information and supporting technology systems
ness the power of technology, it will be meeting in the world, by investing approximately $65
expectations of an increasingly wired citizenry billion annually on Information Technology (IT).
(Office of Management and Budget [OMB], n.d.a, The Federal Government has made improvements
What the Public Expects section). but continues to strive to be the worlds leader in
According to the U.S. Office of Management managing technology and information to achieve
and Budget (OMB), the goal of the United States the greatest gains of productivity, service and
Government is to be the best manager, innovator, results (OMB, 2006, December, p. 1).
and user of information, services, and informa- The E-Government Act of 2002, signed by the
tion systems in the world There continue to be President on December 17, 2002 and made effec-
great opportunities to apply existing and emerg- tive on April 17, 2003, codified 24 E-Government
ing business best practices to government to initiatives into legislation. The initiatives have
achieve increases in productivity and delivery of already achieved tangible progress. Following are
services and information. We remain focused on just some of the benefits OMB (2007, February)
the customer instead of our traditional approach reported to Congress in the second annual Report
of focusing on departments and agencies (OMB, to Congress on the Benefits of the E-Government
2006, December, p.1). Initiatives.
309
Using Enterprise Architecture to Transform Service Delivery
310
Using Enterprise Architecture to Transform Service Delivery
to $90 per employee (an annual savings of data and processes. It has the potential to produce
almost $11 million) while the Environmental cost savings of hundreds of millions of dollars.
Protection Agency has reduced the cost from At the onset, OPM convened a task force com-
$270 to $90 per employee for its staff of prised of 24 Federal agencies to chart the vision
18,000 (an annual savings of approximately and goals for the HR Line of Business. The vision
$3.2 million). of the HR LOB is government-wide, modern,
Recruitment One-Stop. Each month, over cost-effective, standardized, and interoperable
100,000 resumes are created on USAJobs. HR solutions providing common, core function-
gov, the branded Web site of Recruitment ality to support the strategic management of
One-Stop (the Federal online recruitment human capital and addressing duplicative HR
service). USAJobs.gov receives over 240,000 systems and processes. The goals of the HR
visits daily from job seekers looking for LOB program include:
information regarding career opportunities
with the United States Government. Improved Government-wide Strategic Man-
agement of Human Capital
Working across traditional government agency Operational Efficiencies
boundaries to achieve business benefits of this Cost Savings / Avoidance
magnitude requires a common view that spans Improved Customer Service
government boundaries, a view that enables cross-
agency conversation, debate, and collaboration. Two dimensions that underlie the HR LOB
This common view is achieved through enterprise vision are standardization and common solutions.
architecture. Recognizing this, OMB commis- Standardization implies that solutions are to be
sioned the Federal Enterprise Architecture developed through a set of common and repeatable
(FEA) Program on February 6, 2002. The FEA processes and tools. This standardization will be
Program provides specifications for building a a basis for government-wide common solutions
comprehensive business-driven blueprint of the that not only provide economies of scale, but also
entire United States Government. address measurable business improvements. En-
In 2004, OMB appointed the U.S. Office terprise architecture has provided the means for
of Personnel Management (OPM) to lead five making tough decisions around standardization
of the 24 E-Gov initiatives. That appointment and common solutions.
constituted a White House challenge to OPM: The concepts of standardization and common
assume a key role in supporting the transforma- solutions will in large part be operationalized
tion of the United States Government with 1.8 by the introduction of HR shared services. A
million employees deployed across multiple dis- small number of agencies have been identified to
parate agencies into an efficient, cost-effective, deliver HR services to other agencies via shared
performance-driven business. OPM is meeting service centers (SSCs). Additionally, private
that goal through its Human Resources Line of sector providers will also deliver HR services to
Business (HR LOB) an initiative that is creat- Federal agencies. Over time, this will enhance
ing a modern, standardized, and interoperable competitive market forces in the HR Line of Busi-
HR function throughout the Federal government. ness, supporting another tenet of the Presidents
Up to now, each Federal agency has handled its Management Agenda.
own HR operations, resulting in duplication and Shared services is traditionally defined as an
waste across hundreds of agency locations. The operational model in which services are delivered
HR LOB program is driving consolidation of HR by business entities that are internal to an organiza-
311
Using Enterprise Architecture to Transform Service Delivery
tion but operate independently shared service transform the HR function throughout the United
centers (SSCs). SSCs operate as a business and States Government. The next section of this
have dedicated resources to provide well-defined, chapter, ENTERPRISE ARCHITECTURE,
process-based or knowledge-based services for describes how the HR LOB EA helped achieve
more than one unit of a company (division, busi- the vision of standardization of HR processes
ness unit, or agency). SSCs are fully responsible across the Federal HR function.
for managing costs, quality, and timeliness of
services. The concept of shared services is not
new; the private sector embraced it ten to fifteen ENTERPRISE ARCHITECTURE
years ago. It is just now gaining momentum in
the public sector. The Human Resources Line of Business Pro-
The HR LOB Concept of Operations states gram established enterprise architecture (EA) as
that these HR shared service centers will take a one important means of achieving the vision and
phased approach to delivering HR services. At a objectives of the program. EA provides the com-
minimum, all SSCs will offer the same common mon view and vocabulary across 24 United States
core functionality. The solutions that operate at Federal agencies that enables dialog, debate, and
these SSCs will be evaluated and recommended collaboration around standardization, common
by a multi-agency steering committee that stresses solutions, and the new shared services-based HR
scalability, interoperability, and portability. Agen- delivery model.
cies will select SSCs on a competitive basis and Over the course of four years, various work-
have choices; they can shop around for the SSCs groups were convened to build out the models.
that best meet their needs. The shared service Each workgroup was comprised of government
centers will leverage plug and play architecture human resources professionals representing the
concepts. human resources point of view of the HR LOB
In his report on innovation in government, member agencies. The HR LOB approach to
Borins (2006) of the University of Toronto reports EA was based on a fundamental tenet that would
that, interestingly, frontline staff and middle drive the multi-year effort: EA deliverables
managers are the most frequent initiators of public would comply with OMBs Federal Enterprise
management innovation (p.5). The results of his Architecture guidelines and, more important,
study also reveal that innovative organizations would provide real business value to agencies.
draw ideas from people at all levels (p.5). Borins The objective was to produce artifacts that were
conclusions are quite consistent with the HR both compliant and useful.
LOB Program experience: collaboration is key. The United States General Accountability
Since 2004, over 400 participants from 24 Federal Office (2003, November) reports that there are
agencies have collaborated to produce the busi- seven EA frameworks in use at various agencies
ness and technical architectures that define this across the United States Federal government. The
new HR service delivery approach. The HR LOB frameworks in most widespread use are:
program is a model for leveraging cross-govern-
ment expertise and collaboration to develop an Federal Enterprise Architecture Framework
enterprise architecture that standardizes business (FEAF) - 61 agencies
processes, data, performance measures, business Federal Enterprise Architecture Program
services, and technical infrastructure. Management Office (FEAPMO) Reference
The Human Resources Line of Business is Models - 56 agencies
using enterprise architecture to innovate and Zachman Framework - 36 agencies
312
Using Enterprise Architecture to Transform Service Delivery
Other frameworks in use, albeit less popular, view. This provides for discovering duplication
include: of processes, services and /or systems and for
recognizing best of breed that are recommended
Treasury Enterprise Architecture Frame- for use across the government.
work (TEAF) And although the framework may be specific to
National Institute of Standards and Technol- the U.S. Federal government, the modeling meth-
ogy Framework (NIST framework) ods that underlie the framework are not uncom-
Command, Control, Communications, mon. FEA Practice Guidance, published by the
Computers, Intelligence, Surveillance, and FEAPMO (2006, December), states that Segment
Reconnaissance (C4ISR) Framework architecture work products are developed using
Department of Defense Architecture Frame- standard formats and content Standard work
work (DoDAF) product content and formats promote collabora-
tion and reuse by facilitating the reconciliation
The Office of Management and Budget of segment architecture work products with the
strongly encouraged the various lines of business agency EA and relevant cross-agency initiatives
to develop their segment architectures using a found in the Federal Transition Framework
common framework, the FEAPMO Reference (section 2, p.8).
Models. The rationale behind this is simple: the The program facilitated the development
lines of business have been established to con- and validation of all five models put forward by
solidate services across the government, reducing FEAPMO Reference Model guidelines (Figure
or eliminating duplicative services and systems. 1.).
Having a common framework allows for the seg- These models are described in more detail in
ment architectures to roll up to a government-wide the pages that follow.
Figure 1.
1. T he HR LOB Business Reference Model p rovides an end-
to-end v ie w of t he h um an r esources p rocesses th at tak e place
in departm ents and ag encies a cross the U nited S tate s
G overnm ent.
313
Using Enterprise Architecture to Transform Service Delivery
314
Using Enterprise Architecture to Transform Service Delivery
Box 1.
Using EA to drive workforce analytics
the U.S. Department of Health & Human Services
Just after the HR LOB Business Reference Model was first published in 2004, the Depart-
ment of Health & Human Services (HHS) leveraged this artifact to make strategic workforce
decisions and build a business case for moving to a new HR operational model.
Using the process framework of the BRM, HHS HR personnel developed an analytical
tool to determine the number of full-time equivalent employees (FTEs) who performed
each HR process and to estimate the percentage of time each FTE spent on each process.
The tool was designed to provide an order of magnitude view of labor costs currently
allocated to each business process. They then made decisions about whether these pro-
cesses would, in the future, be delivered directly by HR personnel, via the Web, or via
a call center. Given these new service delivery methods, they projected future staffing
requirements.
This data became the basis for a business case that projected investment costs versus
cumulative benefits over a ten year period. This business case was used to justify the
new operational model and to provide a basis for planning the deployment of the service
delivery methods.
For HHS, the HR LOB Business Reference Model served as a useful business planning
tool.
3. Staff acquisition
Sustain
4. performance management
5. compensation management
2.
1. hr organization 6. benefits management
Strategy and position
management
8. employee relations
9. labor relations
Separate
10. Separation
management
315
Using Enterprise Architecture to Transform Service Delivery
1.2 C onduc t
E x ternal Sustain
E nv ironm ent 2.1
A dm inis ter 4.1 E s tablis h 4.2 E s tablis h and
A naly s is 4.4 E v aluate
O rganiz ation A genc y Im plem ent 4.3 M anage
P erform anc e
and P os ition P erform anc e P erform anc e E m ploy ee
1.3 D ev elop M anagem ent
M anagem ent M anagem ent M anagem ent S y s tem P erform anc e
HC & HR E ffec tiv enes s
S trategy and P rogram s
S trategies
5.2 A dm inis ter
1.4 E s tablis h 5.1 A dopt 5.3 5.4 M anage
B onus and 5.5 M anage
H R P olic y and C om pens ation A dm inis ter T im e and
A w ards P ay roll
P rac tic es P rogram s P ay or Leav e Labor
P rogram s
1.6 C onduc t 7.1 E s tablis h A genc y 7.2 C onduc t H R 7.3 D ev elop 7.4 Im plem ent 7.6 E v aluate H R
W ork forc e 7.5 M anage
H R D ev elopm ent D ev elopm ent HR HR D ev elopm ent
P lanning HR
M anagem ent N eeds D ev elopm ent D ev elopm ent P rogram
D ev elopm ent
S trategy A s s es s m ent P rogram P rogram E ffec tiv enes s
1.7 C onduc t
S uc c es s ion 8.2 A ddres s 8.5 A dm inis ter 8.6 P artic ipate in 8.7 D eterm ine
8.1 A ddres s 8.3 M anage 8.4 P rov ide
P lanning E m ploy ee E m ploy ee A dm inis trativ e C andidate /
E m ploy ee A dm inis trativ e R eas onable
P erform anc e A s s is tanc e T hird P arty E m ploy ee
M is c onduc t G riev anc es A c c om m odation
P roblem s P rogram P roc eedings S uitability
1.8 M anage
H R B udget 9.3 P artic ipate
9.1 M anage 9.2 M anage
in N egotiated
Labor N egotiated
1.9 P rov ide H R T hird P arty
R elations G riev anc es
P roc eedings
C ons ultativ e
S upport
Separate
1.10 M eas ure 10.1 M anage
and Im prov e E m ploy ee
HR S eparation
P erform anc e
The HR LOB BRM sub-function view appears An activity flow diagram was constructed for
in Figure 3. each process showing activities, roles, and major
The ten sub-functions decompose to a total of inputs and outputs. A precise narrative defini-
45 processes. The HR LOB BRM process view tion was written for each activity and informa-
appears in Figure 3. tion needed to perform the activity (inputs) and
316
Using Enterprise Architecture to Transform Service Delivery
information produced as a result of the activity Most important, it has become a useful man-
(outputs) were also listed. Table 1 below provides agement tool. At the HR LOB program level,
a sample definition for the activity Determine for example, all collaborative work sessions
Qualified / Eligible Applicants. are organized by BRM sub-functions. And
The HR LOB BRM and the work that led to at the agency level, the General Services
it is significant for a number of reasons. Administration has used the BRM to drive
transformation of its hiring processes.
First, the simple structure, along with the
thorough information behind it, provides an The entire HR LOB BRM can be found
easily understood view of HR that could be at the U.S. Office of Personnel Management
developed and validated and subsequently Web site: http://www.opm.gov/egov/documents/
used by HR professionals with no knowl- architecture/#brm
edge of enterprise architecture.
The initiative was the most comprehensive HR LOB Performance Model
collaboration that ever took place regarding
U.S. Federal HR process, and over the course In January 2006, a workgroup convened to develop
of the collaboration HR professionals came the HR LOB Performance Model (PM). The HR
to the realization that there is a large degree LOB PM proposes a common set of performance
of commonality across the government. measures for use throughout the Federal govern-
The HR LOB BRM is a springboard for ment. These performance measures will gauge
process innovation. Workgroup members how effectively government HR resources are
were encouraged to be innovative and cre- used to support agency mission results, support
ate a future view of the human resources the effective management of human capital across
process in the United States government. the government, and provide for effective human
However, since the process is driven by resources service delivery to employees, manag-
legislation and policy, it was quite difficult ers / supervisors, and other HR constituents. A
for them to think outside the current view. total of 49 participants representing 12 agencies
Because of its widespread acceptance since met to develop and validate the HR LOB Perfor-
its introduction, we can expect the BRM to mance Model.
become a starting point, over time, for in- According to FEA guidelines, the PM will
novation. (The BRM does contain kernels ultimately have three main uses:
of innovation. For example, although the
concept of competency management is not 1. Help produce enhanced performance in-
well established in the government, it ap- formation to improve strategic and daily
pears as a thread throughout the model.) decision-making.
The BRM is a basis for the subsequent 2. Improve the alignment and better articulate
models built and thus serves as the integrat- the contribution of inputs to outputs and
ing artifact. The activity inputs and outputs outcomes, thereby creating a clear line of
provided an important starting point for the sight to desired results.
HR LOB Data Model. It provided a structure 3. Identify performance improvement oppor-
for the HR LOB Performance Model. And it tunities that span traditional organizational
established the basis for identifying the HR structures and boundaries.
services that appear in the HR LOB Service
Component Model.
317
Using Enterprise Architecture to Transform Service Delivery
The first version of the HR LOB PM focuses (performance measure) that addresses each
only on the end-to-end processes of the core Busi- of the outcomes and objectives.
ness Reference Model sub-functions Compensa-
tion Management and Benefits Management and For each BRM sub-function (measurement
those BRM activities that result in a personnel grouping), the workgroup identified and defined
action. These areas are the first to be supported a set of performance measures (measurement
by the new shared service centers because they categories). The group was very careful to identify
are highly transactional and administratively pragmatic measures, i.e., measures for which re-
intense. sults data exists and can be collected. To illustrate
FEA guidance describes a hierarchical con- the model, for the sub-function Compensation
struct for the PM that has four levels. Management the workgroup identified a total of
13 performance measures, one of which is named
Measurement area is the broadest area and total compensation as a percentage of agency
is the high-level organizing framework cap- budget. This measurement indicator is defined
turing aspects of performance measures at as follows:
the output level. The HR LOB falls under The PM provides a framework that links
the Management of Government Resources measures to government-wide HR strategic out-
Measurement Area. comes1 as defined by the Office of Personnel
The measurement category level reflects Management and to the strategic objectives
collections within each measurement area of the HR LOB program. These linkages are
describing the attribute or characteristic to important as the government-wide HR strategic
be measured. This aligns with the Lines of outcomes and HR LOB strategic objectives link to
Business. specific agency business objectives. Thus, the PM
The measurement grouping level is a further measures, when implemented, provide tangible
refinement of the measurement category. evidence of agency business results.
The groupings align with the BRM sub- To continue the aforementioned illustration, all
functions. 13 of the measurement indicators that support the
The measurement indicator level defines BRM sub-function Compensation Management
those specific measures identified for the were linked to HR LOB objectives as shown in
specific sub-function. The indicators evalu- table 3 below. This mapping is important because
ate the results of the sub-functions contribu- it provides line of sight between performance
tion to agency business results. According and desired results.
to the FEA guidance, each Measurement The concept of moving highly transactional
Grouping (HR LOB sub-function) should and administratively intense activities to shared
have at least one measurement indicator service centers to reduce costs, increase efficiency
318
Using Enterprise Architecture to Transform Service Delivery
319
Using Enterprise Architecture to Transform Service Delivery
thus, provides a brand new services view that is Tier 0 direct access: Enables the user to
crucial to defining this new line of business. perform an action related to the task or
FEA guidelines provide a hierarchical con- activity without any direct involvement or
struct for the SCM. Service domains appear at guidance from another person (e.g., Web,
the top of the hierarchy. Service domains are IVR)
comprised of service types and service types in Tier 1 call center: Enables the user to speak
turn are comprised of service components. The to a Human Resource generalist who utilizes
service domain Back Office Services, for example, scripts and a knowledge base to respond to
is comprised of five service types: a wide variety of questions and issues
Tier 2 subject matter expert: Interprets
Data management policy to respond to escalated issues and
Human resources questions
Financial management Tier 3 decision maker: Interprets policy
Assets / material management services and has decision-making authority around
Human capital management complex issues, questions and critical
incidents
The HR LOB SCM workgroup, which included
97 participants representing 14 agencies, identi- The service delivery model provides a useful
fied 17 service components under the service planning tool for service providers to understand
type Human Resources (e.g., Pay Administra- the skills, resources, and infrastructure required
tion, Payroll Processing, Benefits Enrollment, at each tier.
Benefits Counseling, Recruiting) and 16 service The SCM and its companion service deliv-
components under the service type Human Capital ery model demonstrate in a very real way how
Management (e.g., Competency Management, enterprise architecture is being used to shape
Workforce Planning, Succession Planning, Staff- HR service delivery for the United States gov-
ing). They also identified 30 service components ernment. Previously, the processes and activities
outside the service types HR and HCM that sup- in the BRM were used as a basis for discussing
port HR processes (e.g., Customer Support, Call services. This was quite useful, but imprecise
Center Management, Knowledge Management, because many of the activities are collaborative
Consultative Support, Project Management). (i.e., both provider and customer have a role in the
The entire HR LOB SCM can be found activity). The SCM provides a common view of
at the U.S. Office of Personnel Management services that will provide the basis for providers
Web site: http://www.opm.gov/egov/documents/ portfolios of services. The narrative definitions
architecture/#scm provide a vocabulary for discussion services. This
The SCM workgroup also constructed a ser- common view and vocabulary around a common
vice delivery model. The workgroup identified set of services will allow providers to more easily
user types: generic customers or constituents differentiate their services from other providers
that might take advantage or use a service. The and will allow customers to compare offerings
group mapped service component to user types across providers.
to identify viable usage instances. For each usage It will also conceivably provide a more solid
instance, the group decided the most appropriate basis for customers and providers to negotiate
delivery mode: service level agreements (SLAs). Since Target
Requirements (described in a subsequent sec-
tion) will be mapped to service components, those
320
Using Enterprise Architecture to Transform Service Delivery
requirements help set expectations between the of what it accomplishes and the resources
customer agency and service provider regard- it needs, there is minimum rippling effect
ing how the provider is expected to meet each when the trade-out occurs.
requirement that is linked to each service being
negotiated. Thus, very specific expectations can Identifying these assets is one step toward
be set. achieving the concepts of reusability and interop-
According to the OPM HR LOB SCM Report erability (pp. 4-5).
(2007): The HR LOB Service Component Model
The HR LOB Common Solution(s) White identifies and defines reusable assets at the busi-
Paper and Concept of Operations (CONOPS), ness services level.
developed by the HR LOB Common Solution and The real value of the SCM is that it promotes the
Target Architecture Workgroup under the multi- concept of reusable asset at the business services
agency HR LOB Task Force in 2004, discussed level. The various lines of business will submit
two dimensions that would be very important to their models to OMB and OMB will consolidate
any Federal line of business: common solutions the models into a consolidated government-wide
and standardization. reference model. This government-wide model
The concept of common solutions is based on will be available to help agencies identify op-
a model that provides a business-driven approach portunities for collaboration and sharing of as-
to deliver standardized, scalable, and portable HR sets. Thus, this EA artifact has real potential to
services across the Federal Government. Shared contribute directly to innovation and cost savings
service centers would be a keystone for common throughout the United States Government.
solutions, producing economies of scale and sup-
porting the four goals of the HR Line of Busi- HR LOB Data Model
ness: reduced cost, better efficiency, improved
customer service, and improved management of In July 2005, a workgroup of 42 participants
human capital. representing 10 agencies convened to launch the
Standardization defines common and repeat- HR LOB Data Model (DM) initiative. Using
able processes that make common solutions the activity inputs and outputs in the Business
possible. Enterprise architecture provides the Reference Model as a starting point, the DM
framework and vocabulary for deciding what is workgroup identified and modeled the data re-
to be standardized. quired to perform the BRM activities.
Two desirable outcomes result from building According to OMB (2005, November) Federal
out these dimensions reusability and interop- Enterprise Architecture guidelines, the DM can
erability. provide value to agencies by:
321
Using Enterprise Architecture to Transform Service Delivery
munications between enterprise and data relationships between data objects. Additionally,
architects about data and data architecture in a definition was written for each data object.
their efforts to support the business/mission A logical data model was also created for
needs of the enterprises that they support. a subset of the above data that is likely to be
Facilitating compliance with require- shared between agencies and shared service
ments for good data architectures. The centers. For this subset of data objects, data ele-
DMs standardization areas provide a foun- ments were identified and defined. The logical
dation for agency data architecture initiatives data model also identified information exchange
to put forth requirements that can result in packages, specific recurring data exchanges be-
increased compatibility between agency tween a shared service center and an agency or
data architectures. (p. 4) a shared service center and a third party. These
information exchange packages lay the ground-
The objectives of the HR LOB DM initiative work for interoperability. They are groupings
were to: of data attributes from various data entities that
come together for a particular business purpose.
Promote common identification, use, and Examples include:
appropriate sharing of HR LOB data and
information across the United States govern- Personnel action
ment. Since existing data structures do not Approved time and attendance
allow for easy data exchange between agen- Thrift savings plan enrollment
cies, shared service centers, and the Office Payroll disbursement
of Personnel Management, this standardized
data structure will facilitate information All of these information exchange packages
sharing. It will also define common data contain data elements from multiple data entities
elements and structures needed to share that are compiled into a single grouping of data
data across BRM processes. that serves a business purpose.
Provide a standard for service providers and This model is important because data sharing
point solutions. It will delineate a vision for is a key element of interoperability. Technology
a standardized version of how the data is components cannot work together unless those
stored and transmitted, providing for the components can send and receive data in a coherent
ability to share information. fashion. The DM provides a view of data and the
Specify future solution design data format. common data definitions that will be the basis for
It will provide a standardized data structure this data sharing. And again, HR professionals
that provides a basis for future detailed de- were recruited to participate in the workgroup
sign documents, including government-wide and business-oriented facilitators worked with
standard reports. the workgroup to build the models. A technical
architect was also assigned to the workgroup to
The HR LOB DM provides two levels of ensure the model was technically viable.
detail. The conceptual data model consists of an The entire HR LOB DM can be found at
entity relationship diagram (ERD) for data that the U.S. Office of Personnel Management Web
supports the entire breadth of the end-to-end hu- site: http://www.opm.gov/egov/documents/
man resources process depicted by the BRM. The architecture/#dm
ERD shows data objects and it names and defines
322
Using Enterprise Architecture to Transform Service Delivery
323
Using Enterprise Architecture to Transform Service Delivery
service components are delivered to user types A consistent and common lexicon for de-
using a delivery structure. The TM shows the scription of interoperability requirements
technology components that enable this service between diverse systems,
delivery, directed by a standards profile. This A means for consistent specification and
business to technology view is called the delivery comparison of system/service architec-
process-action chain. The delivery process-action ture,
chain is not an implementation design or a solu- Support for commonality across systems,
tion specification; rather, it is a traceability and The consistent use of standards, and
linkage structure between the SCM and the TM. Comprehensive identification of information
The concept of process-action chain is illustrated exchange and interface requirements
in Figure 4 (Prabandham, 2007).
The Technical Model will contribute to ef- Over time, HR LOB architects will work
ficiency and cost reduction by enabling interop- with architects across other lines of business to
erability across systems that support the line of compile a government-wide technology model
business. In the absence of a Technical Model, and standards profile with the goal of achieving
systems interfaces are based on ad hoc efforts these objectives on an even broader scale.
leading to rigid information infrastructures,
duplicate efforts, continual reinvention of the HR LOB Enterprise Architecture
wheel, and as many systems with interfaces as
potential partners. According to Prabandham The HR LOB EA was developed in alignment with
(2007) the goal of the TM is to ensure services FEA guidelines and consists of the five models:
components achieve effective levels of reusability Business Reference Model, Performance Model,
and interoperability by promoting: Service Component Model, Data Model, and
Service component
defined in
Service delivery the Scm
delivered to U sing
enabled by
Standards profile
324
Using Enterprise Architecture to Transform Service Delivery
Technical Model. Agencies and shared service cal, strategic business and technical advances has
centers use these models as useful business tools positioned the public sector to transform the way
for business planning, performance measure- it orchestrates the business of government. Can a
ment, and IT investment. The next section of public sector organization truly reinvent itself? Do
this chapter, GOVERNANCE, explains how HR transformation efforts work? If so, what are the
LOB used collaborative governance to develop critical success factors and lessons learned?
an EA necessary to standardize and modernize E-Government. Information technology
HR services delivery. continues to trigger disruptive change in the
U.S. economy. Many business processes can
be incrementally improved but many need to
GOVERNANCE be completely transformed to capture the full
benefits. Areas of interest include: electronic
The dynamics of innovation are enormously com- delivery of information, programs, and services;
plex. Innovation changes continuously, while the web 2.0 and the expansion of social networking,
pace of innovation change accelerates. Innovation blogging, wikis, etc.; electronic communications
is more open, spans virtually all disciplines, is to increase citizen engagement; and the use of
increasingly global, and starts in more places. new cross servicing arrangements. What issues
Understanding the dynamics of innovation is a first occur when the government adopts private sector
step toward exploiting it to make the government practices?
more effective. What approaches to human capital Inter-departmental / Inter-agency Col-
management foster innovation? What manage- laboration. Government lines of business are
ment systems and cultures support a climate that realigning traditional agency boundaries. Areas
accepts innovation? What business processes are of interest include the enhancing of public sec-
conducive to innovation? As increasing economies tor performance or mission-centric operations
of scale and use of IT encourage more partnering, through end-to-end operating models that extend
what approaches foster getting more innovation traditional organizational boundaries and models
from those partners? for effective integration of organizations and
Most governments have been actively reform- processes.
ing their operations for several decades. Initially, Shared Services Beyond the Back Office.
these efforts were relatively straightforward ones The private sector has increased efficiency and
of improving efficiency, reforming management effectiveness through the use of shared services
practices, streamlining program operations, and for many internal operations. Public sector orga-
outsourcing commercial or non-core activities. nizations are increasingly following suit. What
Public sector organizations are now under ever- are the best practices? Which private sector ap-
increasing pressure for more profound changes to proaches work in the public sector and which do
better address growing fiscal pressures, terrorism, not? What governance frameworks are needed
and new requirements of contemporary society. for success (Breul & Morales, 2007)?
Transforming Government. Governments Human Capital Management. A more effec-
at all levels Federal, state, local, and especially tive back office frees up resources to do the more
defense and homeland security organizations are strategic work of HR. Areas of interest include:
challenged to reposition, reinvent, and realign the strategic alignment of human capital with
themselves in light of an increasing demand for a organizational objectives; workforce planning and
more cost effective, citizen-centric, and networked deployment; the recruitment, retention and devel-
government. A combination of economic, politi- opment of talent; results-oriented performance
325
Using Enterprise Architecture to Transform Service Delivery
culture; leadership and knowledge management; The HR LOB governance structure comprises
e-learning; workforce development; workforce of three broad tiers:
security; human resource service delivery mod- Strategy / Policy, Planning and Oversight.
els; accountability; and use of contractors versus The 24-agency MAESC is the primary decision
government employees. making body that sets the strategic direction for
According to Breul (2006), to drive innovation, the HR LOB. The MAESC meets regularly to
governments need more sophisticated strategies take key decisions on human resources strategy,
for governing transformation than they have architecture, and concept of operations that will
generally had to date. This section describes the impact the 1.8 million civilian employees of the
governance strategy employed by the U.S. Office Federal government.
of Personnel Management (OPM) to address The MAESC is co-chaired by the Director of
the challenges incurred in leading the Human HR LOB and the OMB Portfolio Manager for the
Resources Line of Business. e-Government portfolio of Internal Efficiency
OPM is the Managing Partner agency respon- and Effectiveness (IEE). The Strategy / Policy,
sible for the HR LOB. The Office of the HR LOB, Planning and Oversight tier of the HR LOB gov-
a division within OPM, serves as the Program ernance structure also includes the Requirements
Management Office (PMO) for the HR LOB. The Board which is led by OPMs Strategic Human
PMO brings focus and provides momentum for Resources Policy (SHRP) Division. The Require-
the HR LOB. The HR LOB PMO is staffed with ments Board is the ultimate arbiter of the target
senior executive staff personnel steeped in HR requirements for the shared service centers from
services and payroll delivery expertise. These se- an HR policy perspective.
nior Federal managers are supported by IBM con- User Requirements. This tier of the gover-
sultants with expertise in program management, nance structure is comprised of workgroups or
facilitation, change management, and Federal HR sub-committees focused on developing require-
and enterprise architecture principles. ments from the customer or user perspective.
The HR LOB governance was set up in early These sub-committees of HR subject matter
2004 to establish the vision, goals, and objectives experts (SMEs) are typically employees at or be-
of the HR LOB. The Director of the Office of HR tween levels 12 through 15 on the Federal General
LOB, in conjunction with the Heads of OPM and Schedule (level 15 is the highest level) and have
the E-Government Directorate of the Office of been recommended by the MAESC members for
Management and Budget (OMB), invited 22 their specialized HR skills and expertise. The
agencies to join OPM and OMB in a task force User Requirements workgroups have played a
that set the vision and timeline for transformation seminal role in developing HR LOB deliverables.
of the Federal HR function. Some of the notable workgroups under the User
The success of the 2004 HR LOB Task Force Requirements tier are as follows:
in building consensus and acceptance of the vi-
sion and timeline for HR transformation provided Customer Council. This standing council
impetus to the Director of HR LOB to establish, is comprised of members from agencies
in 2005, a permanent governance body of the 24 that are or will receive HR services from
agency coalition. This permanent chartered body, HR service providers and represents the
referred to as the Multi-Agency Executive Strategy voice of the customer. This council also
Committee (MAESC), reports to the Director of plays an important role in evaluating and
OPM and the Director of E-Government and IT selecting public and private sector shared
Reform at OMB. service centers.
326
Using Enterprise Architecture to Transform Service Delivery
Business Reference Model (BRM) Work- deliver those services to customers of the
group. This ad-hoc workgroup developed services.
the first ever government-wide end-to-end
business process mapping of the HR sub- The architecture and requirements workgroups
function. This workgroup comprised of HR met in many sessions over the past four years to
subject matter experts from over 30 agencies establish a body of knowledge that is visionary
defined the ten sub-functions of the HR LOB and evolve-able. When developing these mod-
and mapped out the processes, activities, els, agencies focused on their similarities rather
definitions, and inputs and outputs of the than their differences. The notable feature of all
HR function. the aforementioned workgroups has been their
Target Requirements Workgroups. These dedication to improving Federal HR and their
ad-hoc workgroups developed the detailed passion for standardizing definitions, processes,
business and technical requirements for the and requirements under the HR function.
shared service centers. These workgroups Operations and Delivery. This tier of the
took policy inputs from the Requirements HR LOB governance provided the voice of the
Board and developed detailed requirements provider and was comprised of operationally-
for government-wide delivery of HR func- focused members from the Federal designated
tions. shared service centers and e-Payroll providers.
Service Component Model (SCM) Work- The Shared Service Center Advisory Council
group. This ad-hoc workgroup developed (SSCAC) meets on a regular basis to discuss
standardized definitions for HR services the operational challenges of delivering the HR
and the service delivery channels that and payroll services and other issues related to
Director, OPM
CHCOC Subcommittee on E-Gov Administrator
HR LOB OMB
CHCOC Chair
Mgt Improvement
SC M W or kgr oup
Requirements Program
Workgroups
Information Security
B R M W or kgr oup
Workgroup User
Configuration Requirements
C ustomer C ouncil
Control Board
SSC Advisory
Council / PAC
Operations &
Delivery
Shared Service Shared Service Shared Service Shared Service Shared Service
Center Center Center Center Center
327
Using Enterprise Architecture to Transform Service Delivery
meeting the target requirements established by make tough decisions and then represent
the HR LOB.Figure 5 shows the three tiered HR those decisions to their stakeholders.
LOB governance structure.
The HR LOB organizational structure pro- Governance is critical to the success of any
vided a forum for collaborative governance that EA program. The HR LOB used governance to
led agencies to put aside their differences and achieve stakeholder buy-in from the beginning;
work together to modernize and standardize HR this is one of its key triumphs. The next section
services delivery. This HR LOB model of col- of this chapter, TARGET REQUIREMENTS
laborative governance produced some valuable FOR SHARED SERVICE CENTERS, describes
insights: how the HR LOB EA has been used to drive
implementation by compiling and validating
Perspective. Through asking the HR LOB the solution-level target requirements for shared
governance bodies to review and comment service centers.
on strategic and architectural deliverables,
the HR LOB was able to gain information
and insight from many different points of TARGET REQUIREMENTS FOR
view. This enabled agencies to have a seat SHARED SERVICE CENTERS
at the table in making strategic decisions
and provided OPM with a government-wide The HR LOB EA artifacts were produced with a
perspective to set HR policy. very particular business outcome in mind: the suc-
Buy-in. The model of collaborative gover- cessful adoption of a new shared services-based
nance worked because we involved people HR delivery model. This new delivery model has
who are going to be affected by the vision in been put forward with some very real objectives
defining the vision. People buy into results in mind: reduced costs, increased efficiencies,
when they feel they have been involved in improved customer satisfaction, and enhanced
producing the results. management of human capital throughout the
Change Advocacy. Any governance body government. From the onset, the EA artifacts
will have its skeptics, but there will also be have been used to conceive this new operating
the bright lights that get it. Initiatives must model and in turn advance the program toward
leverage their support and really use them its business objectives. Presented here is an il-
to advocate change. lustration of how the HR LOB leveraged its EA
Education and Outreach. People get to yield business results in alignment with the
smart when they get involved. Encourage vision and goals of the program.
the stakeholders on your governance bod- One of the first real uses of the HR LOB EA
ies and workgroups to take what they learn artifacts involved using the Business Reference
and tell it to others. Provide them with tools Model as a basis for discussing and organizing
(presentations, newsletters, etc.) they can business and technical requirements. While EA
use to do outreach. provides the conceptual framework for standard-
Leadership. The objective is to be collab- izing business processes, data, and services across
orative, but ultimately you are going to ask the government, there existed a need to define
your governance body to make some tough more specific expectations for shared service
decisions and resolve cross-organizational center operations. Government legislation and
issues. The governance body must consist policy is very specific about how certain opera-
of leaders who are willing to step up and tions are conducted, including human resources.
328
Using Enterprise Architecture to Transform Service Delivery
A comprehensive set of business and technical gathered and linked to those activities that will or
requirements was compiled and validated to could be supported by SSCs (2 and 3). Agency-
document SSC operational expectations. only requirements (1) were not included.
According to OPM HR LOB (n.d.), the HR LOB
Target Requirements for Shared Service Centers Development of the Target
represents the first-ever government-wide set of Requirements
detailed business, technical, and data requirements
for human resources. The target requirements The HR LOB Target Requirements for Shared
report provides the detailed requirements outlin- Service Centers (SSCs) is the result of landmark
ing the expectations of shared service centers cross-agency collaboration between hundreds of
(SSC) by describing the role of the SSC in the HR subject matter experts working over a two-
HR process and providing specifications for the year period to define target requirements for
efficient and successful delivery of services and both core and non-core services that may be
solutions. The target requirements also outline offered by HR LOB SSCs. The HR LOB lever-
the expectations the Federal government strives aged a phased approach to the development of
to achieve through the implementation of the HR the requirements by addressing in FY 2005 the
LOB service delivery model (OPM HR LOB, requirements that SSCs will provide (core) to
2006). The HR LOB Target Requirements for agencies, deferring to FY 2006 the development
Shared Service Centers is publicly available on of the requirements that SSCs may provide (non-
the OPM Web site at: http://www.opm.gov/egov/ core) to agencies.
documents/requirements/ According to OPM HR LOB (2006) in Janu-
Scope of the Target Requirements ary 2005 an initiative was launched to define
The HR LOB Business Reference Model business and technical requirements around the
(BRM) provided the overall framework to de- BRM. The HR LOB program designated three
fine the scope of the requirements effort and to highly transactional, administratively intense
develop the target requirements. Every BRM areas to be the focus of this effort. Eighty-eight
activity was scrutinized to determine whether it representatives from 24 agencies validated these
should be supported by a shared service center requirements in a series of work sessions com-
in the future or continue to be performed at the pleted in the second half of 2005 and produced
agency. Each BRM activity was then given one core requirements that specify services and
of the following designations: supporting technology for:
329
Using Enterprise Architecture to Transform Service Delivery
that specify services and supporting technology the requirement; some requirements are more
for activities that fall within the remaining BRM easily understood when the process context is
sub-functions: understood.
Lists policy The ID by which The requirements Policy, Service, Mandatory, SSC, SSC / The BRM
references for requirements are statement Technology, Critical, Useful Agency activities the
each requirement identified Performance requirement
links to
330
Using Enterprise Architecture to Transform Service Delivery
center could produce for each BRM sub-function terms of customer expectations (requirements)
and are not meant to provide design-level detail. for the service. It could be a very important basis
SSCs will be responsible for translating target for negotiation between customer and provider.
requirements into design-level blueprints that A number of benefits could be achieved from
meet customer expectations. The expectation is this mapping:
that this approach was taken to foster innova-
tion among SSCs, to encourage competition, to It will provide detailed content to the SLA
encourage customer involvement, and to decrease and be a very tangible basis for SLA nego-
the need for maintenance over time. (OPM HR tiation.
LOB, 2006, September) It will reduce risk because expectations will
SSC Selection. The target requirements sup- be clarified and thus surprises will, conceiv-
port the evaluation and selection of SSCs at two ably, also be reduced.
levels: at the program level and at the agency level. It will provide a means for delineating basic
At the program level, HR LOB shared service service (defined by those requirements des-
centers ability to deliver the target requirements ignated as SSC only) and premium service
to agencies is part of the criteria to become shared (defined by those requirements designated
service centers. To be selected as an HR LOB SSC, as SSC/agency).
the candidate SSCs provided self-evaluations of It will enable providers to better predict their
their ability to meet the target requirements. SSCs involvement in the whole process and thus be
that do not fully meet the target requirements are better able to project staffing, infrastructure,
subject to ongoing improvement reviews from the and other resource requirements.
HR LOB Customer Council, a group consisting It will afford a real basis for providers to
of customer agencies that ensures that customer price their services.
needs are addressed by the SSCs.
At the agency level, the self-evaluation results The Target Requirements for Shared Ser-
are an important set of criteria supporting an vice Centers serve as a tangible example of how
agencys selection of an SSC to provide services the HR LOB used EA to develop detailed business
to the agency. In defining its future HR operational and technical requirements that will serve as the
model, each agency will identify which services cornerstone for the successful implementation of
to migrate to an SSC and which HR processes to shared services across the Federal government.
retain within the agency. Having identified the The next section of this chapter, LESSONS
scope of services for the SSC, the agency will LEARNED, outlines critical lessons learned
leverage the results of the self-evaluations to while developing the EA for the HR LOB.
identify the appropriate SSCs to compete for its
HR services and to justify its best value selection
of an SSC. LESSONS LEARNED
SCM-Requirements Mapping. Based on
agency and SSC recommendations, the HR LOB is The HR LOB program has taken an innovative
undertaking an initiative to map the requirements approach to make EA a relevant and useful tool
to Service Component Model (SCM) service for conceiving and managing this new line of busi-
components. According to OPM HR LOB (2007, ness. The potential fiscal benefits of the program
September), understanding the collection of re- are staggering; it has the potential to save U.S.
quirements that supports each service component taxpayers many millions of dollars through con-
would help to define that service component in solidation of services and supporting technology
331
Using Enterprise Architecture to Transform Service Delivery
and infrastructure. The business case, however, sionals with a very particular business outcome
is long-term; agencies will not begin to migrate in mind: the successful adoption of a new shared
to service centers until year five of the program services-based HR delivery model. The agen-
and benefits will not begin to accrue for at least cies that provided resources to participate in EA
three years beyond that. workgroups saw the link between these artifacts
Maintaining the momentum of any govern- and the outcome. They knew that, because the
ment program that does not have demonstrable EA artifacts were intended to be the blueprints
short-term benefits can be a struggle, even if the for the new operating model, participating in the
long-term business case is clear. The HR LOB construction of these blueprints gave them an ac-
program continues to exist in part because of tive voice in designing the new model.
the experience and insight of the program man- The artifacts were never meant to be an abstrac-
agement team. Some of that insight is shared tion of a theoretical to-be state but are blueprints
below. for very real impending change. This relevance
motivated solid participation and this participa-
Sponsorship tion resulted in deliverables that reflect a broad
government-wide point of view on an unparalleled
No EA initiative can survive without a credible scale. This broad participation also strengthened
executive sponsor who is willing to visibly and buy-in into a program that had many skeptics at
vocally support it. The HR LOB programs sponsor the inception of the program.
reports directly to the Director of the U.S. Office Lesson learned: Find relevant business rea-
of Personnel Management. The placement of the sons to do EA; make sure people understand the
program at this high level provides the program links between EA and those business outcomes
with a credibility that would not exist had the and involve them in the development of the solution
program been buried in the organization. to increase buy-in and win hearts and minds.
The program director came from the private
sector, bringing his 40+-year career experience Political Correctness
to this directorship. During his tenure, he reached
out to a variety of stakeholders and interests Working with a consortium of 24 diverse govern-
including the Office of Management and Bud- ment agencies to produce defined EA deliverables
get, participating agency HR executives, shared with limited resources in a specific time frame was
services providers, and professional organizations a tremendously complex undertaking. Cultivating
on the relevance of EA to the overall HR LOB their support and soliciting meaningful involve-
transformation effort. This program has made ment required significant resources and more
great progress in four years in large part due to than a little tenacity. It also required a thoughtful
the experienced leadership of this director. approach to communicating certain concepts and
Lesson learned: Engage an executive spon- plans. Although program managers made efforts to
sor who is both capable and willing to take on an communicate as much as possible as frequently as
active leadership role to drive the EA initiative possible, sometimes the messages were necessar-
to succeed. ily shaped by political correctness: certain topics
were understated and certain words were avoided.
Relevance Communication was some times watered down
and messages, at times, became mixed. Com-
The HR LOB EA artifacts (with the exception of munication frequently required a balancing act
the Technical Model) were produced by HR profes- to address disparate concerns. Certainly, candor
332
Using Enterprise Architecture to Transform Service Delivery
Change Management
FUTURE TRENDS AND RESEARCH
The EA efforts of the HR LOB program demon-
strate that business enterprise architecture can A widening resource gap in government has
drive transformation. However, business profes- produced an imperative for challenging any and
sionals can be quite skeptical of EA and claim it all government budgets that do not contribute
is time consuming, irrelevant, and esoteric. Even directly to government services. The issue is
when you can demonstrate true business relevance, global in nature and based on a fundamental
you have to convince your stakeholders. A formal reality: demographics. As nations populations
change management program can help. age, tax bases taper down thereby reducing funds
In the beginning, HR LOB EA efforts did available for government programs. At the same
not have the support they eventually came to time, aging populations have basic health and
have. The HR LOB Business Reference Model welfare needs that increase the need for govern-
was the first of the EA artifacts to be developed ment spending. Costs go up while revenues go
and many BRM workgroup participants told us down. In this climate, administrative budgets are
they attended BRM work sessions because they certainly likely to be reduced. High cost operating
were told to. In some instances, participants told models for administrative services are becoming
subordinates to attend. a phenomenon of the past.
333
Using Enterprise Architecture to Transform Service Delivery
Strateg
Strategy
Strategy
perf.
performance
enhancement
performanc
performance
enhancemen
enhancement
transaction
performance
enhancement
transaction
administratio
administration admin
transactions
administration
334
Using Enterprise Architecture to Transform Service Delivery
cost of a public sector back office in the U.K. is Future of Enterprise Architecture in
estimated to be two and a half times the cost of the U.S. Federal Government
its private sector counterpart, shared services
also has the potential to significantly reduce cost The FEAPMO (2006, December) advocates the
(BuyIT Best Practice Network & Shared Services concept of segment architecture. A segment
Advisory Group, 2006). architecture is a shared vision for business and
The HR Line of Business is looking at IT transformation within a core Mission area or
shared services as a strategy for realizing common service. Segment architectures have
comparable benefits through transforming the been formed around each of the Federal lines
Human Resources function across the United of business, including the HR Line of Business
States government. Agencies currently apply a (section 2, p.9).
majority of their HR resources to administrative Over the years, resource management at the
and transactional work and far fewer resources to individual agency level has resulted in a stove-
performance enhancement and strategic work. If a piped approach to agency business processes,
preponderance of administrative and transactional services and technology. One might surmise
activities were moved to shared service centers, that adding the segment layer opens up an op-
resources that remain at agency HR departments portunity for a whole new layer of stovepipes!
could be shifted to more valuable work. A shared The FEA framework, however, works to prohibit
services-based operating model would have fewer this. Segment architectures roll up to government-
agency HR personnel doing administrative and wide reference models which provide visibility
transactional work, allowing a major shift of across segments and thus serve to identify and
resources to performance enhancement work help manage redundancy. More important, this
and strategy. This new operational model will government-wide perspective helps identify op-
enable agency HR departments to do more with portunities for collaboration and sharing across
less (see figure 6). lines of business. This has the potential for a
Enterprise Architecture proved invaluable fundamental shift in the management of govern-
to devising the new operational model. The HR ment resources in the future.
LOB Service Component Model has identified And just as government-wide reference models
the reusable business services that have been provide a means for consolidating segment archi-
proposed to be candidate shared services. The tectures, segment architectures provide a means
collaboration that took place to build this model for consolidating solution level architectures
provided an objective technique and forum for and the means for identifying opportunities
discussing those services that could become part for cross-agency collaboration and sharing at this
of a providers portfolio of services. The Business level. Figure 7, published by the FEA PMO (2006,
Reference Model, similarly, provides a govern- December), illustrates the relationships between
ment-wide reference for those more value-adding enterprise architecture, segment architecture, and
processes that will remain with the agency HR solution architecture (section 1, p.9).
operations. And the Technical Model provides
a common government-wide abstraction of the Plug and Play: The Future of Shared
technology that will enable these services plus Services
the standards and specifications that will promote
reusability and interoperability at the technical Given funding and time constraints, shared
services level. service providers will not have the luxury to
335
Using Enterprise Architecture to Transform Service Delivery
design and build solutions. Public sector provid- provide these solutions to customers on demand
ers will likely not be appropriated the funds for will be critical to the success or failure of any
these capital outlays; private sector providers shared service provider. Segment architectures
will not have the time or expertise to develop will be the key to identifying these partnerships
new solutions. Providers will likely partner with and defining these solutions for rapid deployment
best of breed providers to link together best of to a providers customer base.
breed composite solutions. The ability to rapidly
Box 2.
Partnering to deliver
the GoLearn model
As part of the E-Training initiative established by the E-Government Act of 2002, the Office of
Personnel Management (OPM) established an online training capability, branded GoLearn. GoLearn
was intended to be a catalyst for transforming the way government manages human capital by
effectively and efficiently implementing solutions that align workforce development with organi-
zational goals, resulting in improved mission attainment (GoLearn, n.d., para.1).
GoLearn provides a learning management system (LMS) with online course content and access
to government-mandated training. To provide for rapidly changing demands of agency training
needs, GoLearn also provides a wide variety of content from multiple vendors and serves as a
contracting vehicle for agencies to obtain training as needed. GoLearn provides the following
highly technical contracting services:
This approach to establishing a portfolio of services is a viable model for creating the best composite
solutions on demand from any number of suppliers in the marketplace.
336
Using Enterprise Architecture to Transform Service Delivery
Conclusion REFERENCES
This chapter demonstrated how the HR LOB Borins, Sandford. (2006). The Challenge of In-
is driving transformation of Federal Human novating in Government (2nd ed.). Retrieved 5
Resources service delivery via enterprise archi- June 2007 from IBM Center for the Business of
tecture. The Office of Management and Budget Government Web site: http://www.businessofgov-
formulated an enterprise architecture strategy for ernment.org/pdfs/BorinsReprint.pdf
the U.S. government to help government agencies
Breul, J.D. (2006). What is Transformation?. In
manage complexity and move toward innova-
M.A. Abramson, J.D. Breul, & J.M. Kamensky
tion and transformation. The HR LOB used this
(Eds.), Six Trends Transforming Government (p.
strategy and developed an enterprise architecture
7). Retrieved 16 April 2007 from IBM Center for
that provides a common, government-wide view
the Business of Government Web site: http://www.
and vocabulary for the HR function a view
businessofgovernment.org/pdfs/SixTrends.pdf
and vocabulary that provide a basis for common,
government-wide solutions that agencies will Breul, J.D., & Morales, A. (2007, June). 2007-
implement to realize the vision and goals of the 2008 Research Announcement: Providing Cut-
Federal governments HR transformation. ting Edge Knowledge to Government Leaders.
Using broad-based collaboration as its fun- Retrieved 16 July 2007 from IBM Center for
damental governance principle, the HR LOB Business of Government Web site: http://www.
program achieved consensus on its enterprise businessofgovernment.org/pdfs/Research_An-
architecture and is using that EA to define shared nouncement_07.pdf
services-based service delivery expectations and
BuyIT Best Practice Network & Shared Services
drive agency transformation to this new opera-
Advisory Group. (2006). Shared Services in the
tional model.
Public Sector: Vision. Retrieved 27 April 2007
from BuyIT Best Practice Network Web site: http://
www.buyitnet.org/Best_Practice_Guidelines/
Thoughts on Future
SharedServicesPubSect/docs/G1%20Vision.pdf
Research
EquaTerra & International Public Management
1. As enterprise architecture programs mature Association for Human Resources [IPMA-HR].
throughout the U.S Federal government, (2006, June). Human Resources Transformation
opportunities may exist to identify services in Public Sector Organizations. Retrieved 2
for reuse that span lines of business. Future May2007 from the IPMA-HR Web site: http://
research could explore how other public www.ipma-hr.org/pdf/TransformationWhitePa-
sector enterprises have leveraged EA across per.pdf
lines of business to realize process improve-
McDavid, D.W. (1999). A standard for business
ments, cost savings, and reuse of assets.
architecture description. IBM Systems Journal,
2. Shared service centers will likely seek to
38 (1), 12-31. Retrieved 20 April 2007 from IBM
partner with other public and/or private
Systems Journal Web site: http://www.research.
sector providers to supply best of breed
ibm.com/journal/sj/381/mcdavid.html
solutions quickly and effectively. Future
research could explore how shared service Prabandham, S.M. (2007, June). A Case Study
centers have used EA to build partnering in Service Component Reusability and Interop-
capability and to manage the multi-provider erability: HR LOB Technical Reference Model.
supply chain. Unpublished manuscript.
337
Using Enterprise Architecture to Transform Service Delivery
Springer, L.M. (n.d.). Retirement Systems Mod- United States. Executive Office of the President.
ernization. Retrieved 1 August 2007 from the Office of Management and Budget [OMB]. (2007,
OPM Web site: http://www.opm.gov/rsm/index. July). FEA Consolidated Reference Model Docu-
asp ment Version 2.2. Retrieved 16 July 2007 from the
OMB E-Gov Web site: http://www.whitehouse.
Stevenson, D.A. (1996, April). Positioning Enter-
gov/omb/egov/documents/FEA_CRM_v22_Fi-
prise Architecture. In D.A. Stevenson, Component
nal_July_2007.pdf
Based Enterprise Architecture. Dissertation pre-
sented to the Department of Information Systems, United States. Executive Office of the President.
University of Cape Town, South Africa. Retrieved Office of Management and Budget [OMB]. (n.d.a).
10 August 2007 from the IS World Net Web site: E-Gov Background. Retrieved 8 May 2007 from
http://users.iafrica.com/o/om/omisditd/denniss/ the OMB E-Gov Web site: http://www.whitehouse.
text/eapositn.html gov/omb/egov/g-1-background.html
United States. Executive Office of the President. United States. Executive Office of the President.
Office of Management and Budget [OMB]. (2005, Office of Management and Budget [OMB]. (n.d.b)
November). The Data Reference Model Version Federal Enterprise Architecture. Retrieved 22
2.0. Retrieved 10 August 2007 from the OMB May 2007 from the OMB E-Gov Web site: http://
E-Gov Web site: http://www.whitehouse.gov/omb/ www.whitehouse.gov/omb/egov/a-1-fea.html
egov/documents/DRM_2_0_Final.pdf
United States. General Accountability Office
United States. Executive Office of the President. [GAO]. (2003, November). Information Technol-
Office of Management and Budget [OMB]. Federal ogy: Leadership Remains Key to Agencies Mak-
Enterprise Architecture Program Management ing Progress on Enterprise Architecture Efforts.
Office [FEAPMO]. (2006, December). FEA Prac- Retrieved 10 October 2007 from the GAO Web
tice Guidance. Retrieved 22 October 2007 from site: http://www.gao.gov/new.items/d0440.pdf
the OMB E-Gov Web site: http://www.whitehouse.
United States. Office of Personnel Management
gov/omb/egov/documents/FEA_Practice_Guid-
[OPM]. GoLearn. (n.d.) The Office of Personnel
ance.pdf
Managements GoLearn Program. Retrieved 24
United States. Executive Office of the President. October 2007 from the GoLearn Web site: http://
Office of Management and Budget [OMB]. (2006, www.golearn.gov/MaestroC/index.cfm?room=w
December). Expanding E-Government: Making elcome&roomaction=about
a Difference for the American People Using In-
United States. Office of Personnel Management
formation Technology. Retrieved 30 April 2007
[OPM]. (n.d.). Human Capital Assessment and
from the OMB E-Gov Web site: http://www.
Accountability Framework [HCAAF]. Retrieved
whitehouse.gov/omb/egov/documents/expand-
18 May 2007 from the OPM Web site: http://www.
ing_egov_2006.pdf
opm.gov/hcaaf_resource_center/2-2.asp
United States. Executive Office of the President.
United States. Office of Personnel Management
Office of Management and Budget [OMB]. (2007,
[OPM]. Human Resources Line of Business [HR
February). Report to Congress on the Benefits of
LOB]. (2006, January). HR LOB Business Refer-
the E-Government Initiatives. Retrieved 16 May
ence Model version 2. Retrieved 23 April 2007
2007 from the OMB E-Gov Web site: http://www.
from the OPM HR LOB Web site: http://www.
whitehouse.gov/omb/egov/documents/FY07_
opm.gov/egov/documents/architecture/BRM_Re-
Benefits_Report.pdf
port_V2.pdf
338
Using Enterprise Architecture to Transform Service Delivery
United States. Office of Personnel Management ponent Model version 1. Retrieved 23 April 2007
[OPM]. Human Resources Line of Business [HR from the OPM HR LOB Web site: http://www.
LOB]. (2006, February). HR LOB Data Model ver- opm.gov/egov/documents/architecture/HRLOB-
sion 1. Retrieved 23 April 2007 from the OPM HR SCMv1.pdf
LOB Web site: http://www.opm.gov/egov/docu-
United States. Office of Personnel Management
ments/architecture/HRLOB_DM.pdf
[OPM]. Human Resources Line of Business
United States. Office of Personnel Management [HR LOB]. (2007, September). HR LOB Service
[OPM]. Human Resources Line of Business [HR Component Model version 2. Retrieved 15 No-
LOB]. (2006, June). HR LOB Performance Model vember 2007 from the OPM HR LOB Web site:
version 1. Retrieved 23 April 2007 from the OPM http://www.opm.gov/egov/documents/architec-
HR LOB Web site: http://www.opm.gov/egov/doc- ture/HRLOBSCMv2.pdf
uments/architecture/HRLOB_PM_6.30.06.pdf
United States. Office of Personnel Management
United States. Office of Personnel Management [OPM]. Human Resources Line of Business [HR
[OPM]. Human Resources Line of Business LOB]. (n.d.). HR LOB Benefits and Accomplish-
[HR LOB]. (2006, September). HR LOB Target ments. Retrieved 30 May 2007 from the OPM
Requirements for Shared Service Centers version HR LOB Web site: http://www.opm.gov/egov/
2.0. Retrieved 23 April 2007 from the OPM HR HR_LOB/benefits/
LOB Web site: http://www.opm.gov/egov/docu-
ments/requirements/Reqv2.pdf
United States. Office of Personnel Management Endnote
[OPM]. Human Resources Line of Business [HR
LOB]. (2006, September). HR LOB Service Com- 1
See Office of Personnel Management [OPM]
(n.d.), for more information on these out-
comes defined in the HCAAF.
339
340
Chapter XV
Enterprise Architecture as
Context and Method for
Designing and Implementing
Information Security and Data
Privacy Controls in
Government Agencies
Scott Bernard
Carnegie Mellon University, USA
Shuyuan Mary Ho
Syracuse University, USA
Abstract
Government agencies are committing an increasing amount of resources to information security and
data privacy solutions in order to meet legal and mission requirements for protecting agency informa-
tion in the face of increasingly sophisticated global threats. Enterprise Architecture (EA) provides an
agency-wide context and method that includes a security sub-architecture which can be used to design
and implement effective controls. EA is scalable, which promotes consistency and alignment in controls
at the enterprise, program, and system levels. EA also can help government agencies improve existing
security and data privacy programs by enabling them to move beyond a system-level perspective and
begin to promote an enterprise-wide view of security and privacy, as well as improve the agility and ef-
fectiveness of lifecycle activities for the development, implementation, and operation of related security
and privacy controls that will assure the confidentiality, integrity, and availability of the agencys data
and information. This chapter presents the EA3 Cube EA methodology and framework, including an
integrated security architecture, that is suitable for use by government agencies for the development of
risk-adjusted security and privacy controls that are designed into the agencys work processes, informa-
tion flows, systems, applications, and network infrastructure.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enterprise Architecture as Context and Method
341
Enterprise Architecture as Context and Method
342
Enterprise Architecture as Context and Method
resource and/or project is not aligned, then its value Decision Support
to the organization will remain in question.
EA provides support for IT resource decision-
Standardized Policy making at the executive, management, and staff
levels of the organization. At the executive level,
EA supports the implementation of standardized EA provides visibility for large IT initiatives and
management policy pertinent to the development supports the determination of strategic alignment.
and utilization of IT and other resources. By At the management level, EA supports design
providing a holistic, hierarchical view of current and configuration management decisions, as well
and future resources, EA supports the establish- as the alignment of IT initiatives with technical
ment of policy for: standards for voice, data, video, and security. At
the staff level, EA supports decisions regarding
Identifying strategic and operational require- operations, maintenance, and the development of
ments IT resources and services.
Determining the strategic alignment of
activities and resources Resource Development
Developing enterprise-wide business and
technology resources EA supports standardized approaches for devel-
Prioritizing the funding of programs and oping IT and other resources. Depending on the
projects scope of the resources involved and the avail-
Overseeing the management of programs able timeframe for development, various system
and projects development lifecycle methods can be used to
Identifying performance metrics for pro- reduce the risk that cost, schedule, or performance
grams and projects parameters may not be met. EA further sup-
Identifying and enforcing standards and ports standardized, proven approaches to project
configuration management management that promote the comprehensive and
effective oversight of ongoing programs and new
Policy documents include those which can be development projects. Finally, EA supports the
categorized as general guidance (e.g., high-level use of a standardized process for selecting and
directives and memos); specific program guidance evaluating investment in IT resources from a
(e.g., plans, and manuals); and detailed process business and financial perspective.
guidance (e.g., standard operating procedures). By
using these hierarchical categories of documents, EA as a Documentation Method
succinct and meaningful policy is established. It
does so in a way that no single policy document References to EA began to emerge in the late
is too long and therefore not too burdensome to 1980s in various management and academic
read. It is also important to understand how the literatures, with an early focus on technical or
various areas of policy are inter-related so that systems architectures and schemas for organiz-
program implementation across the enterprise ing information (Zachman, 1987; Spewak 1992).
is coordinated. EA policies must integrate with The concept of enterprise architecture docu-
other policies in all governance areas, so as to mentation emerged in the early 1990s and has
create an effective overall resource management now evolved to include views of strategic goals,
and oversight capability. business services, information flows, systems
and applications, networks, and the supporting
343
Enterprise Architecture as Context and Method
Lines onetwork
f B usiness Linesnetwork
o f B usiness
network
infrastructure
C 2 network
infrastructure
C
H ighest infrastructure
goals & infrastructure
Updated Strategic O
network O network
Level & V iew initiatives Goals & Initiatives M
M
network
infrastructure network
infrastructure P
1 products &
infrastructure
P
O Improvedinfrastructure
Business O
network N
Services architecture network
Products and Services N
EA Framework
network
infrastructure E management & network
infrastructure E
data &
infrastructure N transition plan Enhancedinfrastructure
Data and N
network T network T
information Information Flows
S
infrastructure S
network 5 network
infrastructure
Systems &
infrastructure Integratedinfrastructure
Systems
network
applications network
and Applications
network
infrastructure network
infrastructure
L ow est networks &
infrastructure Optimizedinfrastructure
Networks
L evel & View infrastructure and Infrastructure
6
multi-level threads (Security/Standards/workforce)
CURRENT 3 FUTURE 4
ARCHITECTURE ARCHITECTURE
344
Enterprise Architecture as Context and Method
ts
en i t h
m s e w rc e s
e ri u
g
: S te rp e s o
n 2 en d r
sio h e a n
F ram ew ork D im ension 3: artifacts e n o f t it i e s
i m s iv
T he docum entation of com ponents at each k D ea ct
o r -a r s a
lev el of the architecture, including all threads e w su b in e s
am a l s
F r r ti c t b u
V e s tin c
d i
lines of business
network
infrastructure
network
initiatives
Technology Business Strategy
high-level strategic goals/initiatives at the top, encompassing all five framework levels that is
business products/services and data/information focused on one or more LOBs can be referred to
flows in the middle, and supporting systems/appli- as a segment of the overall EA.
cations and technology/infrastructure at the bot-
tom. In this way alignment can be also be shown EA Documentation Element 2:
between strategy, information, and technology, EA Components
which aids planning and decision-making.
To lower risk and promote efficient, phased EA components are the changeable processes
implementation methods, the EA framework is and resources that may extend enterprise-wide or
divided into segments of distinct activity, also be contained within a specific line of business.
referred to as Lines of Business (LOBs). For Examples of EA components include strategic
example, each LOB has a complete sub-architec- goals and initiatives; business products and ser-
ture that includes all five hierarchical levels of vices; information flows, knowledge warehouses,
the EA Framework. The LOB therefore can in and data objects; information systems, software
some ways stand alone architecturally within the applications, enterprise resource programs, and
enterprise except that duplication in data, applica- Web sites; voice, data, and video networks; and
tion, and network functions would occur if each supporting infrastructure including buildings,
LOB were truly independent. An architecture server rooms, wiring runs/closets, and capital
345
Enterprise Architecture as Context and Method
network
network
infrastructure
goals &
infrastructure
mission Statement V e rtica l
Strategic
network
goals C o m p o n en ts
initiatives Strategic initiatives
network
infrastructure
products & manufacturing
infrastructure
Financial
network
Services
Services marketing & Sales
network
infrastructure Examples
data &
infrastructure
knowledge warehouse
databases
of EA
information network
& data marts
data interchange Components
network
infrastructure
Systems & information Systems
infrastructure
web Sites
applications network
desktop applications
network
infrastructure C ro ss cu ttin g
intranets & extranets C o m p o n e nts
technology & infrastructure
telecommunications
infrastructure buildings & equipment
equipment. Figure 3 provides examples of vertical level of the framework, which are archived in an
and crosscutting EA components at each level of on-line EA repository to make them useable by
the EA Framework. various EA stakeholders.
The current architecture contains those EA com- The future architecture documents those new or
ponents that currently exist within the enterprise modified EA components that are needed by the
at each level of the framework. This is sometimes enterprise to close an existing performance gap
referred to as the as-is view. The current view or support a new strategic initiative, operational
of the EA serves to create a baseline inventory of requirement, or technology solution.
current resources and activities that is documented As is shown in Figure 4, the future architecture
in a consistent way with the future view of the is driven at both the strategic and tactical levels in
EA so that analysts can see gaps in performance three ways: new directions and goals; changing
between future plans and the current capabilities. business priorities; and emerging technologies.
Having an accurate and comprehensive current The EA cannot reflect these changes in the future
view of EA components is an important refer- architecture unless the enterprises leadership
ence for project planning, asset management, and team provides the changes in strategic direction
investment decision-making. The current view and goals; unless the line of business managers
of the EA is composed of artifacts (documents, and program managers provide the changes in
diagrams, data, spreadsheets, charts, etc.) at each business processes and priorities that are needed
346
Enterprise Architecture as Context and Method
S trategic
(Lead ership T e am ) operating
C a pa b ilitie s Scenarios C a p a b ilitie s
of the new business priorities of the
(M a na gem e nt T ea m )
C u rre n t F u tu re
T a ctical
E n te rp rise program E n te rp rise
emerging technologies
(S u ppo rt T ea m ) plans
to accomplish the new goals; and unless the sup- Management Plans can also be called an EA
port/delivery staff identifies viable technology Transition Strategy or an EA Modernization
and staffing solutions to meet the new business Blueprint.
requirements.
The future architecture should cover planned EA Documentation Element 6:
changes to EA components in the near term Planning Threads
(tactical changes in the next 1-3 years), as well as
changes to EA components that are a result of the EA documentation includes threads of common
implementation of long-term operating scenarios activity that are present in all levels of the frame-
that look 4-10 years into the future. These sce- work. These threads include IT-related security,
narios incorporate different internal and external standards, and workforce considerations.
drivers and can help to identify needed changes in IT Security: Security is most effective when
processes, resources, or technology that translate it is an integral part of the EA management
to future planning assumptions, which in turn program and documentation methodology. A
drive the planning for new EA components. comprehensive IT Security Program includes
internal controls for systems security and data
EA Documentation Element 5: privacy, and within these areas has several focal
EA Management Plan areas including: information, personnel, opera-
tions, and facilities. To be effective, IT security
The EA Management Plan articulates the EA must work at all levels of the EA framework and
program and documentation approach. The EA within all of the EA components.
Management Plan also provides descriptions of IT Standards: One of the most important
current and future views of the architecture, and functions of the EA is that it provides technology-
a sequencing plan for managing the transition to related standards at all levels of the EA framework.
the future business/technology operating envi- The EA should draw on accepted international,
ronment. The EA Management Plan is a living National, and industry standards in order to pro-
document that is essential to realizing the benefits mote the use of non-proprietary solutions in EA
of the EA as a management program. How the components. This in turn enhances the integration
enterprise is going to continually move from the of EA components, as well as better supporting
current architecture to the future architecture is a the switch-out of components when needed.
significant planning and management challenge, IT Workforce: Perhaps the greatest resource
especially if IT resources supporting key business that an enterprise has is people. It is therefore
functions are being replaced or upgraded. EA important to ensure that IT-related staffing, skill,
347
Enterprise Architecture as Context and Method
and training requirements are identified for LOB processes within organizational structure, and
and support service activities at each level of the artificial intelligence in understanding subtleties
EA framework, and appropriate solutions are re- in human languages and motivation. Information
flected in the current and future architectures. security management draws from disciplines of
information systems, organizational science and
psychology. The levels of importance in infor-
Security Architecture mation classification are perceived differently
Concepts among individuals, which affects management
decisions on the granularity of access control and
The term Security Architecture is used in system access privileges within an organization.
this chapter to encompass IT security and data Managing and discerning the obscurity of human
privacy requirements as well as solutions within behavior continues to challenge management
the context of an over-arching enterprise archi- decisions. While the security mechanism and
tecture. The image of security architecture as part infrastructure-building emphasizes information
of an EA is that of a vertical thread that weaves management, information is ultimately handled
its way through all levels of the EA framework. by humans.
This image was chosen (as opposed to a separate
dedicated level) because information security is CIA: Confidentiality, Integrity and
most effective when it is integral to the enterprises Availability
strategic initiatives, business services, informa-
tion flows, systems/applications, and technology Confidentiality refers to protecting and preserving
infrastructure. private information, such as corporate data, social
The security architecture includes computing security numbers, and financial transactions, to
security, information content security and infor- the extent that it prevents improper disclosure
mation security management. This scope forms from unauthorized entities. Entities here refer
an information security architecture that can be to both individuals and processes. The mecha-
adopted as part of a larger security program. To nism used to protect information is proper access
explain, IT security and data privacy concepts control over information in storage, and the use
are drawn from disciplines of computer science, of encryption when data is transmitted over un-
information science and technology, engineer- trusted or non-secured networks. Authentication
ing, and business management. The study of through validation of credentials, identification
computing security emphasizes user-based ap- and verification of both people and data, should
proaches to modeling information systems with be incorporated into the access control scheme.
the goal of securing information and dataflow. Proper authorization and granular access control
Information content security draws from a variety should be adopted with the Principle of Least
of disciplines of information science as well as Privileges, to allow applications to have suf-
technology (such as classification, categoriza- ficient rights.
tion, natural language processing, information Integrity of information means to ensure the
retrieval, and information seeking and use, etc.), accuracy and completeness of information in
organizational science and psychology. The study transit (or storage) from unauthorized modifica-
of information content security also emphasizes tion. This includes protecting data from entry
user-based systematic approaches to informa- errors, malicious users, transmission errors, and
tion classification, information content filtering application processing errors. It requires that all
348
Enterprise Architecture as Context and Method
system actions are associated with an individual Availability mainly refers to protecting informa-
user who can be held responsible. It also requires tion systems against Denial of Service attacks.
that applications verify the origin of each mes- It ensures system resiliency and timeliness. The
sage to ensure that a malicious individual (man- best practice for availability is to over-build the
in-the-middle) is unable to insert data into the infrastructure and avoid single points of failure
transaction stream. The concept of non-repudia- within the architecture. Availability also refers
tion is enhanced here. Non-repudiation refers to to the utilization of incident response, disaster
the prevention of individuals to be able to deny recovery and business continuity planning.
receipt or transmission of a message; it also veri-
fies the time of the electronic communications so
that a transaction committed by two parties can Security Architecture
not be repudiated. Furthermore, system auditing Framework
and monitoring should be reinforced to address
the criticality of information integrity. These The Security Architecture Framework (SAF)
two concepts work hand-in-hand to provide presented in this chapter is based on and works to-
chronological records of system activity and to gether with the EA3 Cube Framework (Bernard,
track system usage. Auditing identifies incorrect 2005). This eight-layered security architecture
system configurations, process or procedures provides confidentiality, integrity and availability
while monitoring detects anomalies from a set to assure risk-adjusted levels information security
of normalized system records. and data privacy throughout the enterprise. As
Availability is a characteristic that applies to is shown in Figure 6, the eight layers of the SAF
information assets. An asset should be appro- are: (1) information security governance; (2)
priately resilient, available and accessible by an operations security; (3) personnel security; (4)
authorized entity on a timely basis. The assets information and data flow security; (5) systems
can include property like information, infor- security; (6) application development security;
mation systems (both hardware and software), (7) infrastructure security; and (8) physical se-
network infrastructure, facilities and resources. curity.
Strategic
Security Architecture
IS Initiatives
Governance
Enterprise Architecture
Operations
Security Business
Processes
Personnel
Security
Information
App. Information & Dataflow
Systems
Development & Data Flow
Security
Security Security Systems &
Services
Physical Security
Technology
Infrastructure
Infrastructure Security
349
Enterprise Architecture as Context and Method
Table 1.
EA3 Framework Level SAF/IS Governance Level Concepts & Goals
Business Processes Defines how the security policies and guidelines are used.
Defines which guidelines and policies will govern the flow of information and
Information & Dataflow:
data in the enterprise.
Defines which guidelines, policies and baseline will govern the systems, services,
Systems & Services
and applications.
Defines which guidelines and policies will govern the use and procurement of
Technology Infrastructure
technology infrastructure on which systems, services and applications will reside.
350
Enterprise Architecture as Context and Method
Standards: A standard is a set of rules and Security concepts and goals to the EA3 Framework
regulations that control how information systems, are as follows:
materials, products, services, technologies, and The Operations Security layer of the SAF
management processes, etc. should be developed, also addresses risk management and continuity
managed and operated. For example, ISO IEC of operations/disaster recovery planning for IT
27001 / ISO 17799 are sets of standards governing security and data privacy as follows:
information systems security and secure manage- Risk assessment: Risk assessment is a con-
ment operations, which are developed and agreed tinuous and repeated process. Organizations need
among technical committees with broad support. to identify critical components and resources.
In addition, standards such as FISMA, Sarbanes- Then, assess risk exposure based on the asset
Oxley, HIPAA, NIST, or Gramm-Leach-Biley Act values, probability of risks and threats, and the
have been made compliant, and implemented in likely occurrence of those threats to the resources.
private and public sectors. It is important for organizations to recognize
that the sources of threat can be both internal
Security Architecture Framework and external.
Layer 2: Operations Security Vulnerability Assessment: Organizations
can conduct self-assessments. General imple-
The purpose of the Operations Security Layer mentation phases include:
is to define the enterprises intra-organizational
and operational needs as they interact with and Discovery Phase: This is a review-to-
require access to the enterprise IT services, in discover stage. Security analyzer reviews
order to identify and address security needs at documentations about security policies,
the enterprises organizational level. Activities standards, guidelines, information clas-
involved with, and documents produced in this sification schemes, access control plans,
layer include, but are not limited to, Risk As- and applications/systems security require-
sessment, Authorization Models, Access Control ments.
User Requirements, Business Impact Analysis, Manual Inspection Phase: Compare ex-
and Disaster Recovery & Business Resumption isting systems with what was recorded in
Planning. The relationship of SAF/Operations documentation.
Table 2.
EA3 Framework Level SAF/Operations Security Level Concepts & Goals
Creates security and assurance in the internal operations through the use of
Strategic Initiatives
disaster recovery, etc. and based upon risk assessment analysis, etc.
Business Processes Identifies specific needs of each LOB in the form of risk assessment, etc.
Defines levels of information classification and access control system to address
enterprise specific problems. Plan the information flow during disaster recovery
Information & Dataflow:
and the business continuity stage. Build Security Operations Center (SOC) for
emergency response and incident handlings.
Converts and documents logical information classification and access controls
Systems & Services into system and service controls. Normalize system & service operations and
emergency response centered by the SOC.
Meets standard operational requirements and procedures. Ensure the
Technology Infrastructure workability, testability and redundancy of component systems and devices.
Assess financial liability and continuity of system operations.
351
Enterprise Architecture as Context and Method
352
Enterprise Architecture as Context and Method
Table 3.
EA3 Framework Level SAF/Personnel Security Level Concepts & Goals
353
Enterprise Architecture as Context and Method
Table 3.
EA3 Framework Level SAF/Info-Data Security Level Concepts & Goals
354
Enterprise Architecture as Context and Method
mitment to security best practices for regulatory, viduals who perform the steps. It prevents not only
compliance or legal reasons. Information can be unauthorized users from making modifications,
coarsely classified into four levels: public, internal, but also authorized users from making improper
confidential and restricted. To an organization, modifications - by incorporating the principle of
public information is something that can be re- separation of duty. Other models, such as the
leased to the press and made known to the public Multi-Level Security Model, emphasizes that not
as well as competitors. Internal information is all personnel have approval or need-to-know au-
sensitive, such as physical layout of a workplace, thorization for all information on the system. The
and should remain within the organization. Con- System High Security Model depicts that all users
fidential information should not be disclosed to of a system may have clearance and approval to
the public without proper authorization. It could view systemic information, but not all personnel
be customer or vendor contact information; it can have need-to-know access for domain/application
include the source codes of a software product that information.
is owned by the organization. Restricted informa- Risk controls: Risk controls by nature are
tion is something that is extremely sensitive, such classified into three types: preventive controls,
as payroll, marketing/operations strategy, etc. detective controls, and corrective controls.
Individuals would require need-to-know authori- Preventive controls are steps designed to avoid
zation before accessing restricted information. potential nonconformities, make improvements,
Security models: Security models set prin- and thus mitigate risks. They attempt to prevent
ciples of allowable paths of information flow in a the occurrence of problems by removing their
secure system. These are used to define security causes. Monitoring information access and the
requirements for systems to handle data at dif- security models are examples of preventive con-
ferent sensitivity levels. Data and information trols. Detective controls are used to understand
must not be abused by execution of a process or when something has happened that was meant
by another sub-system. For example, the Bell La- to be prevented. With detective controls, the
Padula Security Model, ensuring confidentiality time required to identify and respond to triggers
through access control rules, was developed by is critical. However, false alarms may happen
David Elliott Bell and Len LaPadula in 1973. It from time to time. Eliminating false positives
prevents write-down access within an informa- (falsely identifying occurrences) and false nega-
tion access matrix. Programs (or processes) with tives (falsely ignoring occurrences) in the control
higher classification level cannot write to another mechanism are critical. Corrective controls are
programs (or processes) with lower classification steps to address existing nonconformities and
level. Quickly after, the Biba Integrity Model make improvements. This refers to fixing errant
assuring information integrity was developed situations based on actual events that have already
by Kenneth J. Biba in 1977. This model prevents occurred. Effectiveness and cost are two important
unauthorized users from making modifications. factors to consider when choosing a type of risk
Subjects cannot read objects of lesser integrity; control. In addition, when circumstances or risks
subjects cannot write to objects of higher integrity. are changed, the associated controls might need
The Clark-Wilson Integrity Model, developed by to be reconfigured so that they are able to handle
David D. Clark and David D. Wilson in 1987, ad- more sophisticated risks. In these situations,
dresses information integrity issues. It promotes another rigorous development and testing cycle
the idea of performing steps in order. Additionally may need to be reconsidered. Regardless whether
it initiates the concept of authenticating the indi- automated or manual controls are implemented,
355
Enterprise Architecture as Context and Method
Table 4.
EA3 Framework Level SAF/Application Security Level Concepts & Goals
Strategic Initiatives Designs and models applications to support and process information flow.
Defines security measures needed to ensure LOB based on Information constraints.
Business Processes
Reinforces the personnel AAA in application systems during development life cycle
Information & Dataflow:
and application logic process flow.
AAA systems based on the personnel security policy should be designed, developed
Systems & Services
and documented into the process flow provided by the systems and services.
Ensures the integrity and maintainability of the newly updated application with
Technology Infrastructure
existing infrastructure.
356
Enterprise Architecture as Context and Method
overflows, SQL injections, and script injection, etc. continuity in contingent scenarios. Second, its
Lack of secure programming practices can have a necessary to eliminate threatening factors, such
cascading impact on application utilization. as identifying entry, data flow, and exit points of
Best practices: The application should specify the application, so that threats to each application
and validate the types of the inputs coming from can be mitigated at a minimum level. Third, a
the network and make sure to call trusted external design review includes reviewing application
resources so that issues like buffer overflow, script documents and interviewing developers and
injection, and SQL injection, etc. can be avoided. business analysts - to not only make sure that all
In addition, each application should be structured requirements are fulfilled, but also to make sure
with good data flow and controls. The principle all logical processes and procedures have fol-
of least privileges should be followed whenever lowed the principles of least privileges. Fourth,
an application accesses database. For example, if a code review should be conducted to ensure that
the application only needs data located in certain no backdoor or unnecessary process (modular
cells in a row, the application should not be given calls) are executed. Fifth, before any application
full privileges to read or modify the table. When a is rolled out to operations, its critical to assess
process has failed, the full description of the failure potential associative risks. This is the time to
should not be given to the end users. Instead, all mitigate, transfer or eliminate risks. Further-
error messages should be logged with exceptions more, the application should be benchmarked
for the system administrator to troubleshoot. with the industrial standards, such as ISO IEC
Simply displaying that the application has failed 27001 / ISO IEC 17799, FISMA, Sarbanes-Ox-
is good enough, which avoids giving potential ley, HIPAA, NIST, or Gramm-Leach-Biley Act.
hackers too much configuration information. Finally, security must be regularly maintained to
Software Development Life Cycle (SDLC): avoid new exploits that cause the applications to
In order to enhance security at the application become vulnerable.
development stage, it is critical to incorporate
security into the software development life Security Architecture Framework
cycle. It starts first at the initial review with the Layer 6: Systems Security
customer, and includes technical requirements.
An important lesson is that the application logi- Systems here refer to the systems that support
cal processes and procedures should be deployed platform services for applications. The purpose
so that the organizations can pursue business
Table 5.
EA3 Framework Level SAF/Systems Security Level Concepts & Goals
Strategic Initiatives Designs and defines security measures and constraints for software systems.
Ensures each security requirement for the software system is implemented
Business Processes
specifically for each LOB.
Prioritizes and controls information granular access during configuration,
Information & Dataflow:
integration and implementation process.
Hardens systems from kernel operating system throughout all system files and
database repository. Tests and evaluates modular security components involved
Systems & Services with systems and services. Compliance and consideration is given to public key
infrastructure and cryptography modules that should be ingrained at all levels
within systems.
Technology Infrastructure Periodically updates versions and patches against known vulnerabilities.
357
Enterprise Architecture as Context and Method
of the Systems Security layer is to protect sen- retina scan, facial recognition, etc.), and posses-
sitive applications and provide granularity of sions (something you have, ex. Smart card, ID card,
access controls to sensitive resources. Activities etc.). User authentication is usually maintained in
involved with, and documents produced in this a directory service. Authorization is the process of
layer include, but are not limited to, user account giving users access rights to computer resources
management & privileges, certificate request based on their permissions and privileges. When
management, password storage & management, the authentication mechanism is verified by the
remote access, authorization models, file system directory services, the access control system either
hardening procedures, patching, and security allows or denies users access.
repositories. The relationship of SAF/Systems Database security: Database security in-
Security concepts and goals to the EA3 Framework volves protecting the database from both internal
are as follows: and external threats. It includes issues of secure
The Systems Security layer of the SAF also system administration, availability, recoverability,
addresses hardening, authentication, authoriza- integrity, reliability and performance. It is im-
tion, database, public key infrastructure, single portant to recognize that each database has some
sign-on, and intrusion detection issues for IT built-in security features, but also has embedded
security and data privacy as follows: vulnerabilities. One critical configuration issue
Platform hardening: Most systems are manu- involves setting up a database server based on
factured and shipped with unnecessary features whether it supplies information to a Web server.
enabled. Platform hardening is a concept for ana- If it does, be sure to configure it in a way that it
lyzing vulnerability of operating kernels that run allows access only from that Web server. Then,
on a host. It also is a methodology of determining disable all anonymous connection to database
what unused ports and services should be closed server. Avoid using default sa account (with sys-
out. For example, a server that is not function- tem administrator privileges) and default values
ing as an email server should disable its SMTP to access a database for every single connection.
service. A database server should disable default If your database server is providing information
user account access. A Web server should use to dynamic applications, do not allow immediate
HTTPS for viewing pages. In addition, a system unauthenticated updates to a database.
should be regularly patched. Passwords and user PKI-enabled applications: Public Key In-
permissions should be periodically checked and frastructure uses certificates as online digital
strengthened. In addition to functioning as a file identities. The authentication takes place when
server, a system also refers to a unit serving a one user signs a message with a private key and
communication purpose, such as a router or a a public key is contained in the certificate. The
switch. Therefore, hardening the platform refers signature is signed on the message and sent over to
to tightening up configurations and controls on a receiver (another user or a server). The receiver
all services and processes while preserving avail- uses the public key to check the signature of the
ability. The network layout should be designed message. Web-based applications that can authen-
and wired to fit the security requirements. ticate users through digital signatures look up the
Authentication and authorization: Authen- directory server for the users attributes. Then, the
tication is the verification of the claimed identity applications check the CRL (Certificate Revoca-
of a user. There are generally three types of au- tion List) issued by a CA (Certificate Authority)
thentication mechanisms: information (something as to whether the user is currently active and
you know, ex. Passwords, secret questions, etc.), trustworthy. Then, this Web-based application
biometrics (something you are, ex. Finger print, authenticates and interacts with the user through
358
Enterprise Architecture as Context and Method
Table 5.
EA3 Framework Level SAF/Infrastructure Security Level Concepts & Goals
Defines security measures for the infrastructure that fits with the security policies and goals of the
Strategic Initiatives
enterprise, and further strengthens the need of the software systems.
Defines how the infrastructure will be used by each LOB and what security concerns exist
Business Processes
regarding those uses.
Defines how the information will flow between LOB and within the enterprise, and where
Information & Dataflow:
infrastructure components need to be placed.
Defines the appropriate countermeasures that will protect and regulate all Systems and Services,
Systems & Services
and ensure that devices are compliant with industrial security standards.
Installs the physical infrastructure components that will partition the network and implements
Technology Infrastructure safeguards to ensure the infrastructure is accessible by the authorized personnel. Implements
confidentiality and integrity checks on the transmitted information.
359
Enterprise Architecture as Context and Method
SSL, and stateful inspections. The relationship of (Corporate Information Security Officer) should
SAF/Infrastructure Security concepts and goals work together to prioritize the information flow
to the EA3 Framework are as follows: and information process so as to ensure that the
The Infrastructure Security layer of the SAF organizational perspective is considered.
also addresses network, testing, broadband, Network-based Intrusion Detection System
wireless, and telecommunications issues for IT (NIDS): NIDS functions as a protocol analyzer
security and data privacy as follows: or a network sniffer. It is like a wire tap device
Network partitioning: Creating logical that eavesdrops on the network. It works in stealth
groups and users/systems which contain the flow mode, like a single-purpose sensor, scanning and
of information to and from these components is analyzing packets at various points on a network.
an important concept in network partitioning. NIDS detects probing, network configuration
These virtual networks prevent sniffing activities vulnerabilities, and monitors attacks to and from
because nodes are not allowed to see each others nodes while having little impact on network traffic.
ports without permission. However, NIDS is very resource intensive because
Firewall security: The firewall provides pe- it logs massive quantities of network activity. It is
rimeter security. With packet filtering, the firewall not easy to analyze traffic in a complex network
examines the source address, destination address, architecture unless one is an experienced security
and types of traffic for every packet, and makes officer. NIDS could not analyze encrypted traffic,
decisions of accept, deny, or discard on each nor can it be applied to complex switched networks.
packet. With stateful inspection, firewall security If there is unusual traffic detected, NIDS cannot
oversees the state of communication sessions at even tell if an attack was successful. It requires
packets level from source to destination. When a further investigation into that specific node or
firewall is appliance-based, it provides high speed device, perhaps with the help of a HIDS. NIDS
of filtering traffic. Very often, it is accompanied can detect known attacks with signatures or pat-
with a load balancer for high availability. When a terns - this is called misuse detection. NIDS can
firewall functions as an application proxy, it relays also create profiles of network usage over a long
point to process and route requests between client period of time in order to detect unusual activ-
and server. It can also incorporate more features ity - this is called anomaly detection. Anomaly
such as user-based authentication, traffic filtering, detection establishes a baseline for normal traf-
content acceleration, and activity logging. fic, then watches for outlier data points. But it
Network security testing: Security testing is requires extensive training to regulate the NIDS
necessary once a network is deployed. Security from frequent false positive alarms.
testing allows for the uncovering of network design Broadband security: Since the broadband
and operational flaws that violate security policy. connection is always active, potential hackers
The degree of consistency between the system can arbitrarily search for victims. A personal
documentation and its implementation must be firewall is one of the solutions that consumers can
assessed. The goal of the network security testing install to protect their broadband connection. A
is to maximize the benefits to the organization as personal firewall blocks unsafe incoming services
a whole. Therefore, it normally requires participa- and unauthorized outgoing services. If stealth
tion and coordination among senior management, mode is enabled, a personal firewall can monitor
security officers, network administrators, and the connection. In addition, secure Web browsers
business managers, so that the security policy can using strong password and patch software are good
be reinforced and applied at the systems level. The tools for enhancing broadband security.
CIO (Corporate Information Officer) and CISO
360
Enterprise Architecture as Context and Method
PKI associated risks: Public Key Infrastruc- telecom infrastructure, with privacy afforded
ture (PKI) has some associated risks. First, PKI by reserved facilities (e.g., private circuits con-
binds the individual to the private/public key pair nected via shared switches), a tunneling protocol
issued by a Certificate Authority, specifically by (e.g, IPsec), or encrypted transmission. A trusted
a Register Authority, using an identity proofing VPN refers to circuits reserved exclusively by the
mechanism. Regardless of how the individual service provider for one customer, to allow them
holds his own private key, there is no biometric private addressing & security policies, routed via
element built in for digital signature. In a law- shared switches. The customer trusts the VPN
suit, no physical or biometric characteristics (or provider to maintain the integrity of circuits
evidence) can be found to link the person who and prevent unauthorized access. A secure VPN
signs a fraudulent claim with his digital signa- encrypts traffic on entering the VPN providers
ture key pair. Second, in addition to PKI, the shared network, then decrypts on exiting. Informa-
electronic process depends on reliable software tion cant be read in transit. It will be rejected if
and hardware. If either software or hardware is changed. The VPN requires that all traffic must be
not dependable, data integrity can be affected, encrypted and authenticated to address integrity
which impedes forensic analysis. Third, the use and confidentiality issues. Some protocols allow
of electronic process with public key technology either authentication or encryption. Although
itself might also have inherent risks. For example, an encrypted network without authentication is
if the PKI-enabled applications are not designed, a little more secure than a clear network, such a
coded or deployed properly, the systems might network is not technically a VPN because it lacks
not function as planned. privacy. Administrators much agree on VPNs
PKI implementation issues: To implement security properties for both ends of every tunnel.
PKI in a large scale, it involves many practical This peer authentication ensures that the data is
issues. The certificate policy and certification sent from the expected host. It also eliminates the
practices need to be specified. What directory possibilities for an attacker to change the security
services does your public key infrastructure intend properties of any part of a VPN, e.g., to either
to serve? How is your public key infrastructure weaken encryption or change shared keys.
interoperable with other public key infrastruc- Concerns in wireless security: Assuring the
tures? What are the requirements for electronic physical security for mobile device access points
commerce applications to be PKI-enabled? How that contain sensitive information is the first step in
do applications take in or send out the certifi- wireless security. Other security concerns include
cates and digitally-signed documents? What are loss of confidentiality through passive eavesdrop-
the publication methods to revoke certificates? ping, loss of availability through jammed wireless
Whose responsibility is it to audit PKI certificate signals, and unauthorized access to network from
transactions? Liability is also a big issue in digi- terminals. Therefore, facilities that provide a wire-
tal signature validation. Whose liability it is to less network need to also have physical access
provide long-term signature validation services? controls such as photo identification or biometrics
Should the organization which provides the to authenticate users. External boundary control
PKI-enabled applications be responsible for the with proper surveillance prevents unauthorized
signature validation, or should the infrastructure wanderers from eavesdropping on network com-
be the ultimate provider for validating signatures munications by using a wireless device that picks
automatically? up the RF emanations, or changing the settings
Virtual Private Networks (VPN): A VPN on the access points. Proper control of the wire-
by definition is a private network on a public less coverage area by limiting signal dispersion
361
Enterprise Architecture as Context and Method
Table 6.
EA3 Framework Level SAF/Physical Security Level Concepts & Goals
prevents the wireless signals from extending tions of wiring used to connect systems and the
beyond the intended coverage area. provisioning of redundancy systems. Physical
measures may be complemented by operations
Security Architecture Framework and personnel security measures, such as the
Layer 8: Physical Security need-to-know principle, which limits physical
access to sensitive information only to appropri-
The purpose of the Physical Security layer is to ate personnel with clearance. In a governmental
construct a secure perimeter physical defense organization, the main physical defenses include
system that safeguards the facility and physical security keys and containers to protect classified
resources for the enterprise. Activities involved information, access control measures, as well as
with, and documents produced in this layer in- security alarm systems to detect unauthorized
clude, but are not limited to, Building & Facility access, and physical barriers to deter, detect and
Security, Physical Access Controls, Network delay unauthorized entry. By setting up security
Operation Centers (NOC) Server Rooms, Wir- perimeters, organizations are able to physically,
ing Closets, and Cable Plants. The relationship psychologically and legally deter intruders.
of SAF/Physical Security concepts and goals to Physical security assessment: Physical
the EA3 Framework are as follows: security can be assessed by evaluating threat sce-
The Physical Security layer of the SAF also narios (x-axis) with business functional elements
addresses access and assessment issues for IT (y1-axis) and site subsystems (y2-axis). There
security and data privacy as follows: are many different types of threat scenarios to
Physical security: Physical security is an es- be considered, such as accidents, contamination,
sential part of information security architecture. natural disasters, cyber attack, power outages,
Physical security refers to data protection against system failure, etc. Threat scenarios must be con-
accidental destruction or modification by forces of sidered in light of the different business functional
nature or by people, against intentional destruc- areas. Business functional elements can include
tion or modification by unauthorized people, an assessment of facility criticality, e.g., mission
and against accidental or intentional disclosure critical area vs. vulnerable area. Once the busi-
to unauthorized people. It encompasses not ness functional areas are identified, its necessary
only the area of system hardware, but also loca- to determine how to properly protect the site and
362
Enterprise Architecture as Context and Method
building subsystems. There are various categories to defend corporate assets may not be sufficient.
to be examined; including site/architectural de- System administrators may still have to read
sign, structural elements, the building envelope, thousand lines of logs everyday in order to under-
utility systems, mechanical systems, plumbing, stand what is going on within their information
electrical and gas systems, information and com- systems, as well as in the corporate networks.
munication systems, etc. Subsystem examination The real problem lies not only in the ineffective
also includes overall operations and maintenance correlation analysis from multiple systems, but
assessment plans. also the complex human social behavior. Whether
organizations are able to protect information se-
curity while also protecting the individuals right
Future Trends to privacy through aggregating and analyzing
problems in both a systems and social context is
Security Architecture Management a real challenge today.
363
Enterprise Architecture as Context and Method
insider threat phenomenon when human behavior by security policy, then information becomes less
and social activities threaten corporate security available to employees. When information exists
in loss of profit, intelligence property, or even on different access-controlled database servers,
corporate credibility. it requires additional steps to gain access. This
creates cumbersome administrative barriers to
Insufficient Balance between information availability. As a result, convenience
Information Availability and Access of access and information availability cannot
Control always go hand-in-hand with confidentiality and
integrity.
Gathering identity-based or role-based informa-
tion in order to monitor an individuals social Human Factors
activities requires a great deal of concern for legal
and privacy issues. The Computer Matching and Security industry emphasis has been on system-
Privacy Protection Acts of 1988 (amending the based, rather than behavior-based information
Privacy Act of 1974) protect records that contain confidentiality issues. Since ARPANET was
private information on individuals. It states; invented in 1969, the government and military
no agency shall disclose any record which is have always taken the lead on inventing infor-
contained in a system of records by any means mation classification schemes and cryptographic
of communication to any person, or to another algorithms. A system-based approach to informa-
agency, except pursuant to a written request by, tion confidentiality is derived from a positivist
or with the prior written consent of, the individual approach. Security mechanisms are developed
to whom the record pertains (Privacy Act of and implemented from the perspectives of system
1974). architect. But in a socially networked environ-
The dilemma of balancing information control ment, it is not sufficient to use a single lens to
with information availability is evident when view a complex issue as insider threats. As the
human rights to privacy and freedom are con- human factor is the weakest linkage in the chain
sidered. Although social engineering is used of security defense (Mitnick and Simon, 2002), a
as a technique to get some level of confidential need to bolster this weak linkage becomes criti-
information or even used to penetrate a site, in- cal. Insider threats require not only system-based
depth approaches that analyze insider threats security analysis, but intensively behavioral-based
through integrating activities of systems as well security analysis.
as humans are not yet fully available. The most so- Understanding and identifying human in-
phisticated threats can occur when an individuals tention and motivation takes both social and
social power and freedom is exercised. While cognitive psychological analysis. Traditional
access control mechanisms are implemented to information systems architects and developers
secure information access, authorized personnel do not have the appropriate training to solve such
will always have excessive privileges to copy or complicated problems when the focus is insider
modify information. This creates the threat of threats. Protecting information has gone beyond
excessive system privileges that can lead to a what programmed, algorithmic analysis can
potential threat from a powerful user. achieve. Cryptography and security models are
On the other hand, when information is clas- fundamental tools for information confidential-
sified and controlled, information becomes less ity, but a behavior-based approach to information
available. When the types of Internet Websites security is the next step in building coordinated
are filtered by a proxy server that is constrained defense mechanisms.
364
Enterprise Architecture as Context and Method
365
Enterprise Architecture as Context and Method
366
Enterprise Architecture as Context and Method
Accessed July 2006, from http://www.ftc.gov/re- Ho, S M. (2006). The Mechanism Discovery of
ports/privacy2000/privacy2000.pdf. Personnel Anomaly Detection. ISOneWorld 2006
Doctoral Symposium, Las Vegas, Nevada, 19-21
FISMA Implementation Project. (2003). National
April 2006.
Institute for Standards and Technology, Computer
Security Division. Accessed July 2006, from Ho, S M. & Caldera, C. (2005). Eight Challenges
http://csrc.nist.gov/sec-cert/ca-proj-phases.html. Faced By a Defense Contractor: An Interview with
a Security Chief. (ISC)2 Newsletter May-June
Frankel, S., Kent, K., Lewkowski, R., Orebaugh,
2005. Obtained from https://www.isc2.org/cgi-
A., Ritchey, R., & Sharma, S. (December 2005).
bin/content.cgi?page=766 on July 18, 2006.
NIST-SP800-77 Guide to IPsec VPNs - Recom-
mendations of the National Institute of Standards Innella, P. (December 2001). An Introduction to
and Technology. Computer Security Division IDS. SecurityFocus.com. Obtained from http://
- Information Technology Laboratory - National www.securityfocus.com/infocus/1520.
Institute of Standards and Technology.
Jansen, W. & Karygiannis, T. NIST Special Pub-
Grance, T. et. al. (October 2003). NIST Special lication 800-19: Mobile Agent Security. National
Publication 800-64: Security Considerations in Institute of Standards and Technology.
the Information System Development Life Cycle:
Karygiannis, T. & Owens, L. (November 2002).
Recommendations of the National Institute of
NIST SP-800-48 Wireless Network Security -
Standards and Technology.
802.11, Bluetooth and Handheld Devices. Recom-
Grance, T. et. al. (January 2004). NIST Special mendations of the National Institute of Standards
Publication 800-61: Computer Security Incident and Technology. Computer Security Division
Handling Guide: Recommendations of the Na- - Information Technology Laboratory - National
tional Institute of Standards and Technology. Institute of Standards and Technology.
Harris, S. (2003). CISSP All-In-One Exam King, C., Dalton, C., and Osmanoglu, T. Security
Guide, Third Edition. McGraw-Hill/Osborne, Architecture: Design, Deployment & Operations.
Emeryville, CA. ISBN: 0-07-222966-7. Osborne/McGraw-Hill, Berkeley, CA. ISBN: 0-
07-213385-6. 2001.
Hash, J. et. al. (March 2005). NIST Special Pub-
lication 800-66: An Introductory Resource Guide Kuhn, D. Richard, et. al. (August 2002). NIST
for Implementing the Health Insurance Portability Special Publication 800-46: Security for Tele-
and Accountability Act (HIPAA) Security Rule. commuting and Broadband Communications:
National Institute of Standards and Technology. Recommendations of the National Institute of
Standards and Technology.
Ho, S M. (2006). Conceptualizing Security Ar-
chitecture based on Enterprise Architecture. End- Kuhn, D. Richard, et. al. (January 2005). NIST
of-Coursework Statement. School of Information Special Publication 800-58: Security Consider-
Studies, Syracuse University. Obtained from ations for Voice Over IP Systems: Recommenda-
http:// Web.syr.edu/~smho/research.htm. tions of the National Institute of Standards and
Technology.
Ho, S M. (2008). Towards A Deeper Understand-
ing of Personnel Anomaly Detection. Encyclo- Kramer, J. (2003). The CISA Prep Guide: Master-
pedia of Cyber Warfare and Cyber Terrorism. ing the Certified Information Systems Auditor
IDEA Publications. Exam. Wiley Publishing, Indianapolis, Indiana.
ISBN: 0-471-25032-5.
367
Enterprise Architecture as Context and Method
Lyons-Burke, Kathy. (October 2000). NIST Spe- National Institute of Science and Technology.
cial Publication 800-25: Federal Agency Use of Special Publication 53A: Techniques and Proce-
Public Key Technology for Digital Signatures and dures for Verifying the Effectiveness of Security
Authentication. Federal Public Key Infrastructure Controls in Information Systems.
Steering Committee.
National Institute of Science and Technology.
Mason, M. (2005). Obtained from www.asison- Special Publication 800-60 (Guide for Mapping
line.org/certification/ ppt/CPPPersonnelSecurity- Types of Information and Information Systems
Training8-2-01.ppt, July 1, 2006. Lyondell/Equi- to Security Categorization Levels),
star Chemical Companies.
Office of Management and Budget, Federal EA
Maynard & Ruighaver (2006). What Makes a Program Management Office. Federal Enterprise
Good Information Security Policy: A Preliminary Architecture Security and Privacy Profile (version
Framework For Evaluating Security Policy Qual- 1.1). June 2006.
ity. Proceedings of the 5th International Security
Park, J. S. & Ho, S M. (2004). Composite Role-
Conference, Las Vegas.
based Monitoring (CRBM) for Countering Insider
Nassar, M., et. al. (June 2006). Intrusion Detec- Threats. Second Symposium on Intelligence and
tion Methods for VoIP Applications. The Third Security Informatics (ISI), Tucson, Arizona,
Annual VoIP Security Workshop. Accessed June June 2004.
2006 from http://www.iptel.org/voipsecurity/
Pattinson, M. & Anderson, G. (). Information
New Zealand, Security in the Government Sector Risk Management: Some Social-psychological
(2002). Obtained from http://www.security.govt. Issues.
nz/sigs/html/chapter7.html, June 29, 2006.
Qurashi, R. (2005). Eight Steps for Integrat-
National Institute of Science and Technology. ing Security Into Application Development.
Federal Information Processing Standard Publica- MCI NetSec. Published by ComputerWorld,
tion 199: Standards for Security Categorization of December 6, 2005. Obtained from http://www.
Federal Information and Information Systems. computerworld.com/securitytopics/security/
story/0,10801,106805,00.html.
National Institute of Science and Technology.
Special Publication 800-37: Guide for the Security Rodriquez, E. (2005). Physical Network Security.
Certification and Accreditation of Information Obtained from http://www.skullbox.net/physical-
Systems. networksecurity.php, June 29, 2006.
National Institute of Science and Technology. Ross, R.. et. al. (May 2002). NIST Special Publica-
Special Publication 800-12. An Introduction tion 800-37: Guide for the Security Certification
to Computer Security: The NIST Handbook. and Accreditation of Federal Information Systems.
National Institute of Standards and Technology, National Institute of Standards and Technology,
Technology Administration. Published by U.S. Computer Security Division.
Department of Commerce.
Ross, R. et. al. (February 2005). NIST Special
National Institute of Science and Technology. Publication 800-53: Recommended Security Con-
Special Publication 800-53 (Guide for the Selec- trols for Federal Information Systems. National
tion and Specification of Security Controls for Institute of Standards and Technology, Computer
Federal Information Systems), Security Division.
368
Enterprise Architecture as Context and Method
Siegel, Lloyd H. (2006). Lessons Learned, Dept The Open Group. (1995-2005). Single Sign-On.
of Veterans Affairs, Physical Security Assess- Obtained from http://www.opengroup.org/secu-
ment Program. Federal Facility Council. Physical rity/sso/.
Security & Hazard Mitigation Committee, March
Tracy, M. et. al. (September 2002). NIST Special
14th, 2006. Obtained from www.va.gov/facmgt,
Publication 800-44: Guidelines on Securing
June 29, 2006.
Public Web Servers: Recommendations of the
Sinha, Rajiv. (March 2001) A Security Checklist National Institute of Standards and Technology.
for Oracle 9i. Oracle White Papers. Accessed June
Tracy, M. et. al. (September 2002). NIST Special
2006 from http://www.oracle.com/technology/de-
Publication 800-45: Guidelines on Electronic
ploy/security/oracle9i/pdf/9i_checklist.pdf.
Mail Security: Recommendations of the National
Snouffer, R., et. al. (June 2001). NIST Special Institute of Standards and Technology.
Publication 800-29: A Comparison of the Security
United Kingdom, Department of Trade and Indus-
Requirements for Cryptographic Modules in FIPS
try (June 1991) Information Technology System
140-1 AND FIPS 140-2.
Evaluation Criteria (IITSEC). Accessed from
Spears, J. (2006). Defining Information Security. http://nsi.org/Library/Compsec/eurooran.txt.
The Pennsylvania State University, Smeal College
United States Congress (1996) Public Law 191-104
of Business. 5th Security Conference 2006. Las
Health Information Portability and Accountability
Vegas, Nevada.
Act of 1996. Accessed from http://fr Webgate.
Spewak, S. and Hill, S. (1992). Enterprise Ar- access.gpo.gov/cgi-bin/getdoc.cgi?dbname=104_
chitecture Planning. Developing a Blueprint for cong_public_laws&docid=f:publ191.104.
Data, Applications and Technology. John Wiley
United States Congress (2002) Public Law 204-
and Sons, Inc. New York. ISBN: 0-471-599859.
107 Sarbanes-Oxley Act of 2002. Accessed from
State of Arkansas (2004). Personnel Security. Accessed from http://fr Webgate.access.gpo.
Office of Information Technology. Document gov/cgi-bin/getdoc.cgi?dbname=107_cong_pub-
Number SS-70-007. February 2004. lic_laws&docid=f:publ204.107.
Stoneburner, G., et. al. (July 2002). NIST Special United States Congress (2002) Public Law
Publication 800-30: Risk Management Guide for 347-107 Federal Information Security Manage-
Information Technology Systems: Recommenda- ment Act of 2002. http://fr Webgate.access.gpo.
tions of the National Institute of Standards and gov/cgi-bin/getdoc.cgi?dbname=107_cong_pub-
Technology. lic_laws&docid=f:publ347.107.
Swanson, M. (November 2001). NIST Special United States Department of Justice System
Publication 800-26: Security Self-Assessment Development Life Cycle Guidance Document.
Guide for Information Technology Systems. (2003). The Department of Justice Information
National Institute of Standards and Technology, Resource Management, January 2003. Obtained
Computer Security Division. from http://www.usdoj.gov/jmd/irm/lifecycle/
table.htm.
Swanson, M. et. al. (June 2002). NIST Special
Publication 800-34: Contingency Planning Guide United States House of Representatives Govern-
for Information Technology Systems: Recom- ment Reform Committee (February 2005) Federal
mendations of the National Institute of Standards Computer Security Report Card for 2003 2004.
and Technology.
369
Enterprise Architecture as Context and Method
370
371
Chapter XVI
Architecture Based Engineering
of Enterprises with Government
Involvement
John Mo
RMIT University, Australia
Laszlo Nemes
Nemes Consulting, Australia
Abstract
With a plethora of architectures, modelling techniques and methodologies on offer, it is difficult to decide
how to begin building an enterprise and achieving seamless integration. This difficulty is most notice-
able in consortia that need to deal with government participation. Various government projects have
different objectives and agenda. In addition, changes in business environment (or) as well as government
policies impose extra conditions onto the project. Failure to comply with the project requirement can
lead to loss of business and sometimes unexpected penalty. We use three case studies to show various
ways of government involvements in our projects. Based on the experiences of these cases, we discuss
how enterprise engineering can help creating and managing the enterprise that can engage government
services successfully
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Architecture Based Engineering of Enterprises with Government Involvement
and many others related to the management of desired outcomes. The concept of the government
the business. They are, arguably, advantages to operating as an enterprise is to include not only
all stakeholders, irrespective of whether they are the systems that support government services,
the customers, staff, suppliers, managers or other but also to understand the management processes
roles related to the company. that may affect the effectiveness of the execution
In this environment, human organisations can of government policies.
become volatile. This is particularly noticeable in The term enterprise refers to an identifiable
government activities because they are principally group of people who have a common vision and
people-oriented services to the public. Govern- mission. An enterprise concerns all aspects of
ment processes are changing to e-Government tasks, activities, events related to this group.
environment but there is still difficulty in cap- Integration of the enterprise activities requires
turing the concept of citizen engagement, which modelling and analysis of the business processes,
is a measure of success of government policies process data and knowledge within the enterprise
(Jones et al, 2007). Government services have a (Shen et al, 2004). A holistic, customer oriented
wide variety of forms and purposes. When people approach in enterprise integration helps companies
look at government services, they only realise the to cater for different requirements and more
public face of the services, that is, the interactive importantly, provides a way to implement a good
portal of government departments. However, there solution for integration (Oritz et al, 1999).
are many other services that a government has to This chapter serves as a guide to the design
provide and the enterprise engineering processes and implementation of government supported
in those services must be handled carefully to enterprises. We discuss the importance of enter-
ensure the best outcome. Orange et al (2007) prise engineering in the design and execution of
investigated the innovation value in government enterprise models to cope with changes. Three
and recognized the importance of a clear vision case studies are used to illustrate the different
for the future. Government funded programmes forms of government services and the impact
for enterprise development are difficult to manage. different enterprise engineering approaches on
Some governments adopting a private sector the outcomes. By comparing these cases, we de-
model for delivering public good services faced velop the view of a new dimension in modelling
with considerable challenges of understanding to cater for change.
organizational dynamics, for which government
agencies were not competent enough to handle
effectively (Massey, 2003). BACKGROUND
Enterprise architecture adoption in govern-
ment businesses is important but there are many Williams et al (1994) summarised architectures
patterns (Hjort-Madsen, 2007). It is difficult to of enterprises as a result of evolution from years
decide which one to adopt since they are emergent, of experimentation and observation. The ulti-
evolving, embedded, fragmented, provisional. Wu mate goal of enterprise integration is to develop
(2007) proposed layering method in the direc- a cohesive environment that can perform busi-
tion of strategy, business, process, service and ness activities in a seamless fashion and to be
information for developing enterprise integra- responsive to the external world in a timely way.
tion in e-government. Gregor et al (2007) used However, the operating conditions of enterprises
enterprise architecture for enabling alignment and more significantly, government environment,
of IS/IT in government. Enterprise architecture are now characterised by frequent changes. The
should enable these services to be delivered to the challenge to management is to establish a structure
372
Architecture Based Engineering of Enterprises with Government Involvement
that can cope with the changing operating condi- and activities that the enterprise should run, and
tions. Success for achieving the goal therefore at the same time, enables a smooth business pro-
demands well-coordinated agility in all internal cess environment for inter-company operations
and external relationships of the enterprise. (Patankar and Sadiga, 1995). It is crucial that
While it is clear that an enterprise exists to an enterprise involving government activities
fulfil a mission, the owners of an enterprise still requires more public accountability than private
have to define their own objectives and establish organisations, should be supported by a systematic
rules and operating parameters that are leading to design methodology that adequately describes the
achieving the mission. Two desires are becoming logistics in the enterprise and helps the manage-
more important in modern enterprise design and ment to develop well defined policy and process
development: across organisational boundaries.
373
Architecture Based Engineering of Enterprises with Government Involvement
To indicate the complexity of the issues, it is et al, 1997). Execution of the decisions would be
worth pointing out that integration of enterprise performed by the physical system at the opera-
subsystems started in the seventies. The initial tional level (Doumeingts et al, 2000).
approaches had failed to deliver the complex Several immediate issues are almost unavoid-
integration of large system as they used different able:
methods for linking various applications. Com-
panies, university, research consortium in Japan, There are too many technologies. It is almost
Europe and the US started addressing the problem impossible for an individual enterprise to
of system integration applying different concepts evaluate every technology and decide which
and using special definitions. The International one best suits the application.
Federation of Information Processing (IFIP) and There are different methods for mapping
the International Federation of Automatic Control architectures one on another.
(IFAC) established a joint Task Force in early Modelling toolbox is large and it is full with
1990s to investigate whether it was possible to variety of products
find common grounds among different schools The enterprise engineer should familiarize
of thoughts on enterprise architectures so that oneself with the nature of the business before
enterprise designers have a common language to it starts working on its integration.
communicate and to cooperate. The IFIP-IFAC
Task Force (1999) invited leading enterprise engi- There are risks in enterprise engineering. En-
neering researchers working together to develop terprises are complex entities that can fail easily if
a unified view of what enterprise engineering they are not designed properly, that is, the rules and
should be. processes are not established to handle changing
The work of the Task Force was based on sev- circumstances. Malladi and Min (2005) used risk
eral enterprise architectures existed at that time. models to assist in the selection of information
The CIMOSA project funded by the European technology infrastructures for rural communities.
ESPRIT research program was the most significant The essence of enterprise engineering is to treat
effort to define an enterprise architecture that had the enterprise as a complex product with a set of
four major views: functions, resources, human principles. Enterprise risks can be minimised by
and finance (Kosanke et al, 1999). CIMOSA applying the science of enterprise engineering to
was particularly useful for discrete manufac- design and make changes to the enterprise.
turing systems where workflow and processes
are highly versatile. PERA, on the other hand, Enterprise Architecture
originated from the study of computer integrated Standards: Path to Solution
manufacturing in the process industries, handled
the management of the enterprise using a phased Government enterprise processes are inherently
development view (Williams, 1994). Through more complicated due to their nature of business.
the top down approach and the visualisation of Mednikarov and Dereliev (2004) attempted to
interconnectivity of phased functions and activi- define naval tasks in structured description to as-
ties, the enterprise architecture could be laid out sist in the development of enterprise architecture.
in advance of the project development stage (Li Bruce (2006) described information linkages for
and Williams, 1997 and 2000). GRAI methodol- multiple government agencies in New Zealand.
ogy took a different approach to segregate the Burk (2006) described the long term vision of the
enterprise as decision centres that were linked enterprise architecture managing US budget. Elli-
by an enterprise wide information system (Chen man et al (2007) were working on an exploratory
374
Architecture Based Engineering of Enterprises with Government Involvement
375
Architecture Based Engineering of Enterprises with Government Involvement
GERAM, an enterprise designer will be able to that visible when people are loaded with other
make informed, less risky decisions on which simultaneous work.
enterprise architecture should be used for his/her Enterprise engineering processes prepare
enterprise. more thorough understanding of the project by
We now have a framework to work on. The three major steps:
next question is how this can be done step by
step? What are the tasks that should go first and Build the AS-IS structure of the enterprise.
how? It is usual that the start of this activity can This requires detailed analysis of the op-
be seen easily but the rest of the project is not eration of functions, relationships in the
376
Architecture Based Engineering of Enterprises with Government Involvement
organisational structures, and the available government related enterprises. These examples
information management systems. To do include: a defence service enterprise, a research
that the enterprise engineer organises focus enterprise and an industry enterprise.
groups addressing each of the areas, but
making it sure that the groups will cooperate Case Study: Product Life Time
with each other. That sort of joint work has Service Enterprise
to be documented with the kind of systems
description methods familiar with the people The ANZAC Ship Alliance (ASA) is an organi-
involved. The range of the tools varies de- zation formed as a virtual enterprise agreement
pending on the technical background of the between Tenix Defence, Saab Systems and the
members of the teams. It can be drawings Australian Government with the aim to provide
with simple labels on the components, or design and implementation of changes to the
sophisticated modelling language (which ANZAC class frigates in service over the life
usually requires technical training for the time of the product. It is an attempt of all parties
participants). This step requires a bottom involved in the creation of the ANZAC fleet to
up approach, analysis detailed solution and provide a stable support environment ensuring that
working upwards to create the bird eye views the ships are always combat ready, fit for purpose
which is needed in later stages. at any given time with the best value outcome.
The next major activity is to define the The Alliance is not a legal company (entity). It
TO-BE state. This is a design phase where is indeed a Virtual Enterprise (VE) as activities
the enterprise engineers together with the span across the three main participants. It draws
management develop the model how the the most suitable resources such as staff and asset
enterprise will operate in the future re- from the member organizations as required for a
engineered state. The teams here work in a particular project.
top down manner creating the overall views The ASA case illustrates a defence related
first and putting detailed information in the enterprise architecture design and develop-
description as the model progresses. ment project in which the Government is a key
After that comes the Migration phase. When component of the enterprise. It shows that when
designing these activities one needs not collaborating with the private sector for support
only consider the logical steps in the change of its asset, the Government needs to participate
process. As most of the time we modify actively in the definition of the enterprise.
existing operations therefore the integra- To engineer the enterprise, we developed
tion system must not bring the enterprise the AS-IS structure using the PERA model and
to halt, or compromise safety and security solicited information through an initial briefing
when making changes. The modification of session with the key executives of the ANZAC Ship
the processes should be implemented in a Alliance (ASA). The AS-IS model served as an
proper time sequence making sure that the important guiding tool for formulating questions
adjustments in the processes make use of and focusing the effort of investigation during
the operation of all the other components. subsequent meetings and process examination.
From this investigation, it was found that due to
To assist in understanding the development and the requirements of the defence materiel acquisi-
implementation of an enterprise architecture, we tion process, there were a number of government
use three case studies to illustrate the process and processes that had to be satisfied before a final
methods and their implications to engineering of decision could be made. These processes formed
377
Architecture Based Engineering of Enterprises with Government Involvement
a series of cascaded life cycles which were inter- enterprise model using PERA. To populate the
connected as shown in Figure 2. ASA model, we used two major instruments:
The concept of a new organisation was evolved questionnaires and interviews. On the basis of the
from a number of meetings with the Defence, both PERA model, the questionnaire was structured
formally and informally, to identify the mission of in 22 parts. Each part examined different aspects
this enterprise and define its structure. This was of the virtual enterprise including the specific
followed by signing of agreement and development objectives of the virtual enterprise in a particular
of management plan for the alliance. The ASA area, the actions that were taken to achieve the
was officially launched with the establishment objectives and the performance indicators that
of ANZAC Ship Alliance Management Office the enterprise adopted. The questionnaire was
(ASAMO) in Perth. These series of actions were distributed to all levels of personnel in the ASA.
modelled as the left hand cycle in Figure 2. In conjunction with the questionnaire, a series of
When the ASAMO was in operation, it started in-depth interviews was conducted with selected
to develop projects that were initiated by the cus- personnel and work groups. The objectives of the
tomer, that is, the Royal Australian Navy. Each interviews were to clarify answers and verify the
project would go through four initial stages of coherence of opinions between different parts of
planning and two stages of completion (middle the enterprise. The ASA had many participants
cycle). from different backgrounds and personal aspira-
For each of the step in the Projects cycle, de- tions. In the process of soliciting commonality,
pending on the expertise and responsibility, the there were contradicting views and deviations
task can be taken up by any of the partners in the from normal practices. The purpose was not to
ASA. The partners will have their own project suppress but rather find a way to deal with these
cycle as shown in the spawned off projects in the non-common issues. The best method was to iso-
right hand cycle. late these views and practices so that the enterprise
Based on the life cycle model in Figure 2, the could work out solutions for them.
enterprise engineering team developed an ASA
Planning
A lliance A gt R OM
A ll
Mgt plan aspects T CE
A SA MO E xecution
Dissolve Wrap up
378
Architecture Based Engineering of Enterprises with Government Involvement
The focus was on how the decision centres is a Manufacturing VE by nature. In the last case
operated within the boundary condition speci- shown in Figure 3(iii), the focus is on managing
fied in that part of the interview, including their the change programme. The VE has no obliga-
objectives (What do you want to achieve?), action tion to effect change if the shareholders refuse to
(What do you do in order to achieve the objec- make changes. It is an arms length situation and
tive?), performance indicator (How do you know hence the VE is a Consultant VE.
you have achieved the objective?). It is important that the members of the ASA
Next, we analysed the AS-IS enterprise model understand what goals they are working towards.
and developed the TO-BE model. The outcome Immediately after this part of the study, the ASA
of the model analysis was crucial to the study of held a series of workshops involving all levels of
the TO-BE enterprise architecture. Activity plans, personnel to define exactly what the organisational
information system design, processes and many objective should be. The result was a clear state-
other aspects of the enterprise were determined ment that confirmed the ASA should be developed
by the organisational objective. Three potential as a Consultant VE.
TO-BE enterprises were identified through this The migration phase was a long process. To
process. In Figure 3(i), the focus was to develop begin with, the ASA searched for an information
change solutions and the success for this action was infrastructure system that could potentially be
measured by the solution successfully designed. used throughout the lifecycle of the enterprise
The Alliance had the responsibility to provide as well as its projects. There were some lessons
design of the changes and hence the nature of the learned, for example, in defining the expectation
VE was a Design VE. In Figure 3(ii), the focus is to between different parts of the consortium. It
ensure that the industry partners (i.e. members of was eventually decided to develop a Web-based
the Alliance) to undertake change for the ANZAC project management system that provided the
ships. The measure of success in this case is the communication and coordination hub among all
occurrence of the solution. The Alliance has the participants (Mo et al, 2006). This was proved
responsibility of making the change and hence it to be vital as a first step towards implementing a
379
Architecture Based Engineering of Enterprises with Government Involvement
Consultant VE with different software platforms sharing on the network and staff could concentrate
used by the partners. on the intellectual works, which could produce
the value-added functions.
A Case Study: A Research The VRIDGE example illustrated the applica-
Enterprise tion of enterprise engineering methodologies to
the design and experimentation of new or future
The Globeman21 project was an international enterprises. The VRIDGE enterprise did not ex-
research project under the Intelligent Manufactur- ist at the time when the project was done but the
ing Systems Program investigating the application outcome of this work laid the foundation for Toyo
of information and communications technologies Engineering to establish enterprise integration
in the 21st century (Larsen and Vesterager, 1999). capabilities that eventually span off as an inde-
Although it was completed eight years ago and pendent enterprise system developing company.
many aspects of it have been published but it is Using the three step enterprise engineering
important that we point out some lessons relevant process, the VRIDGE project team developed
to this topic. The project was funded by several the AS-IS enterprise model of the existing project
Governments including Japan (through Ministry enterprise using PERA architecture.
of International Trade and Industry or MITI), A formal definition was needed to identify
European Commission (through Framework the requirements for the enterprise model of the
Program V or FP5), Australia (through Industrial VRIDGE Inc. In order to develop the necessary
Research Alliance Program or IRAP). models, several commercial tools were evaluated.
The Globeman21 project was a large scale It was concluded that no single modelling tool
international project and the results were dis- satisfied all our requirements at this moment, and
seminated through 15 industry demonstrators. hence we used a combination of these tools for
The VRIDGE Demonstrator was initiated by different modelling objectives.
Toyo Engineering (one of Japanese partners) and The KBSI AI0Win, an IDEF0 based modelling
had involvement of partners from Australia, Fin- tool, had been used for business process analysis
land, Denmark, Norway and UK. The objective and model presentation. The FirstSTEP, a user-
of VRIDGE demonstrator project was to study friendly enterprise modelling tool from Interface
how manufacturing systems, integrated with ICT, Technologies, was selected for interactive enter-
could change both the business and life styles prise modelling and simulation. The FirstSTEP
of engineers. By applying the proper informa- had also been used to identify the cross company
tion access and control, the communication in boundary information access and control require-
extended enterprises was more secure than in ments by using its swimming lane presentation.
ordinary companies. We also selected METIS, from NCR, as a core
The VRIDGE Demonstrator hypothesised modelling tool and model repository because of
the pervasive use of information and communi- its flexibility. The ontology based model mapping
cation technologies in the future in such a way facility was developed in METIS environment.
that was unimaginable at the time of the project. According to the PERA methodology, we
It was assumed that all business activities would needed the Enterprise Business Entities (EBE)
be supported by the innovation of ICT through which was fundamental for achieving a shared
more efficient office processing which would understanding of the virtual enterprise. However,
carry out most of the manual works humans had we found that there were quite different views
to do at the time. IT would strongly support the on what would be the business for the VRIDGE
collaboration through information and knowledge Inc. In order to get a common understanding we
380
Architecture Based Engineering of Enterprises with Government Involvement
categorised the business entities according to their exchange standards, communication technologies
lifecycles. We identified three lifecycles closely and application integration platforms.
related to the VRIDGE Inc., as shown in Figure The authors held a series of training session
4. They were: on how to design enterprises using architectures
and conducted workshops with the partners of the
The lifecycle of the VRIDGE Inc. (i.e. pro- project as well as including other Globeman21
ducer of the XFU Plant), participants to determine the future vision and
The lifecycle of the XFU Plant (i.e. product mission of the hypothetical company in the mid
of the VRIDGE Inc.), of 21st century. The TO-BE enterprise architec-
The lifecycle of Xylene as a product (i.e. ture that would overcome the constraints was
product of the XFU Plant). developed and new business processes that could
connect clients, employees and organisations flex-
The identification of these three lifecycles ibly on the network were defined (Shinonome et
helped us to achieve a common understanding of al, 1998). Part of this work was the definition for
the business process of the VRIDGE Inc. where enterprise policies:
the product lifecycle was embedded. It was in this
business process (enterprise lifecycle) where we Information policies:
identified the product related activities (product Secure, authenticated information
lifecycle), and further identified the information exchange
access and control requirements of the product Use of minimal distributed database
lifecycle. The AS-IS model showed a lot of con- Use of open communication network
straints by the technology at the time, particularly (Internet, ISDN/telephone)
on the availability of Internet, bandwidth, data Operation policies (plant engineering proj-
ect):
381
Architecture Based Engineering of Enterprises with Government Involvement
382
Architecture Based Engineering of Enterprises with Government Involvement
383
Architecture Based Engineering of Enterprises with Government Involvement
due to changes in government or its policies. The development, thus reduces the cost for not making
development is often one off and does not repeat too many mistakes. The final result is that techni-
in other governments (e.g. local government). The cal and financial risks will be minimized.
migration from manual paper based process to
latest ICT based enterprise is clear. Hence, enter- An Example: Virtual Enterprise of
prise engineering approach, especially referencing SMEs
to the use of specific enterprise architectures, is
particularly relevant. The moral of the example The Australian government strongly encouraged
is that visionary research will show the way for SMEs to be competitive on the world market
384
Architecture Based Engineering of Enterprises with Government Involvement
without being protected by tariffs. There was an structural issues. The design of the enterprise is
important demonstrator project to show that small a crucial step towards successful operation. The
toolmakers, which usually compete for orders, enterprise engineering design of RELINK is based
could successfully cooperate when the job is too on the Virtual Enterprise Reference Architecture
big, or when the deadline is too short for any one (VERA) (Zwegers et al, 2003), which defines three
participant. Government involvement in this case entities, the network entity, the VE entity and the
has been predominantly an industry support role product entity (Figure 9).
in which the work will be continued after the Each of these three entities is represented by
project. Intermediate reporting is essential on a a life cycle describing possible phases. An entity
quarterly basis. can be operating from identification to decommis-
The RELINK initiative demonstrated the sion. The important characteristic of VERA is the
methodologies and systems that would enable changes of architecture requirements in different
small firms in the tooling and automotive indus- phases of the virtual enterprise. Conceptually,
try to participate with medium and large firms there are 3 architectures: Information Systems,
in turnkey projects as part of a broader supply Manufacturing Equipment and Human and Or-
chain. Globalisation has forced companies to ganisational architectures. Information systems
work together in a new arrangement known as and manufacturing equipment architectures rep-
virtual enterprise. The characteristics of virtual resent automation of information and materials
enterprises are flexible, dynamic with minimal or flows. Human and organisational architecture
sometimes no contractual agreements among the sits between the two architectures and serves as
partners. A virtual enterprise can be created and the operating centre of the virtual enterprise. It
disbanded in very short time frames. Interaction at is essential that a balance is required to ensure
organizational, technical, social and commercial all three architectures are running in supporting
levels give rise to emergent properties that have each other rather than one moving too far ahead
specific technical, communications and infra- (or behind). Individual companies may vary the
385
Architecture Based Engineering of Enterprises with Government Involvement
balancing point (known as extent of automa- to quickly align their objectives and informa-
tion) but in a virtual enterprise, collaborative tion systems with the amalgamated business
partners must find a common acceptable extent processes with their partners, otherwise, the VE
of automation. might suffer from not having integrated support
Development of the AS-IS scenario was not of effective decision-making and informed ac-
a straight-forward task. Although the general tions. Without the right information at the right
understanding of the industry was that there was time, delays and more seriously costly mistakes
no cooperation across the board, several larger could occur. The question was: how could this
companies claimed that they were working with ability be assessed while the VE was still in the
groups of small companies to bid for new jobs. Network entity. VERA enables modelling the
After a series of industry visits, it was concluded relationship between the changes of ICT require-
that these groups were basically sub-contracting ments to the maturity of the virtual enterprise,
arrangements and the relationships normally i.e. the life cycle phases in VERA. This led to
ended when the job was done. There was no sign the development of the RELINK Communica-
of knowledge sharing and accumulation, between tion Framework (RCF) by Mo et al (2005). The
the parties. Communication and data exchange RCF defined the technology levels that guided the
between partners in these circumstances were industry partners in RELINK to quickly establish
largely through meetings and paper transfer. ICT alignment by identifying the technologies
This situation was primarily classified as the and possibly commercial products that could be
Network entity. acquired immediately.
VERA provided a clear migration path for this The RELINK case study illustrated an impor-
tooling industry virtual enterprise. The TO-BE tant aspect for government enterprise architecture
scenario would logically be the Virtual Enterprise designer. SMEs do not have tremendous ICT re-
entity. For a virtual enterprise to succeed: sources. If there is a need for SMEs to work with
the government enterprise in a new system, the
All partners in the virtual enterprise, irre- ability of the SMEs to cope with the new technol-
spective of its size, must communicate with ogy level is vital to the success of the new project.
the same protocol at the enterprise level; The costs involved, irrespective of who is going
A unified (or standard) information and to pay, must be taken into account.
physical architecture must be agreed by all The RELINK case illustrates an industry
partners in the virtual enterprise; virtual enterprise in which government plays
Irrespective of the level of ICT employed a monitoring role (with progress report and
by individual toolmakers, the intermedi- participation requirements). The Enterprise Ar-
ate layer of functions must be fulfilled by chitecture has to be both incentive to small busi-
alternative technologies; ness as well as return to government in terms
The information and physical architectures of SME engagement rate. We demonstrated that
must be in place in all entities (network, enterprise engineering could facilitate a simulta-
VE and product) and in all phases of the neous harmony of competition and cooperation
virtual entities. The architectures will vary of networked enterprises which the government
in content. had visibility on its formation, requirements,
tasks and processes.
The migration from AS-IS to TO-BE scenario
in RELINK required the ability of the companies
386
Architecture Based Engineering of Enterprises with Government Involvement
e.g.
ASA
G eneric
enterprise
architecture
(V E R A )
e.g.
V R ID G E
e.g.
R E LIN K
T im e
P roject E nterprise E nterprise
start design execution
387
Architecture Based Engineering of Enterprises with Government Involvement
is vital that enterprises operating in such agile ture, irrespective of whether the new enterprise
business environments can adapt to new, un- is evolved from an existing system or from a
foreseeable circumstances quickly. The use of completely new venture:
integration methodologies alone is not enough
as they require time consuming modelling done Increased complexity requires collaboration
by iterations. By the time the models are ready between a large numbers of participants.
the environment has changed, so the original Increase of cooperating partners is a quan-
mission goals which were the starting points of titative issue until certain size. There is a
our re-engineering activities should be changed point when the partners are just too many to
before we have finished designs. Hence, we need handle in the established ways as complexity
a new dimension in enterprise engineering to be demands different methods.
ready for managing these changes. Ever shortening delivery time requires opti-
Virtual enterprises are commonly project misation across entire network. Companies
oriented collaborations from a network of people have to realise, that their best performance
or organizations that have worked together in the (local optimum) does not necessarily deliver
past, and have some common, generally tacit the biggest profit for the venture. (This
understandings of what work is to be done, and poses a question when managers are paid
how they can do it together. The use of VERA in according to the share price of their local
the RELINK case study illustrated an important operation.) There is a need for holistic view
point: VERA was specifically developed for the of the networked business. People say chang-
application of virtual enterprise. Enterprises ing technology is easy; changing human
that involve interaction between government perception is difficult.
and SMEs are by nature virtual enterprises with Business imperatives mutate the networks
ambiguous goals. Starting with a close enough often and quickly. There are cases when not
enterprise architecture would make the job a the company objectives change the priorities
lot easier. In a generic sense, the engineering in the network but in the contrary: the global
of any specific government related enterprise business environment forces the network
architecture can be done in a stepwise fashion to change its priorities and companies just
as shown in Figure 10. have to adapt to the changes if they would
At the start, when the consortium receives gov- like to remain part of the network.
ernment participation, the consortium will use the
generic enterprise architecture specified by VERA Enterprise engineering will help organisa-
as a basis to form a default virtual enterprise. The tions to overcome these problems by a number
enterprise design engineers from all partners will of ways. An enterprise model is a computational
work together to assess what the current system is representation of the structure, activities,
and design the virtual enterprise that is most suit- processes, information, resources, people,
able for supporting the project at hand (TO-BE). behaviour, goals and constraints of an enterprise.
The design of specific enterprise architecture is It is necessary that shareable representation
iterative but with the help of modelling tools and of knowledge be available that minimizes
mutually agreed processes, the virtual enterprise ambiguity and maximizes understanding and
will be able to move to the TO-BE state by careful precision in communication. The creation of
management of the changes. such a representation should eliminate much of
The following factors must be considered when the programming required.
developing a new, dynamic enterprise architec-
388
Architecture Based Engineering of Enterprises with Government Involvement
389
Architecture Based Engineering of Enterprises with Government Involvement
WD15704, Requirements for enterprise-reference Mednikarov, B.K., & Dereliev, P.H. (2004).
architectures and methodologies. March, pub: Structured description of naval tasks. Information
IFIP and IFAC. and Security, 13, 25-34.
Jiang, H.C., & Mo, J.P.T. (2001). Internet Based Mo, J.P.T., Beckett, R., Nemes, L. (2005, 26-28
Design System for Globally Distributed Concur- September). Technology Infrastructure for Virtual
rent Engineering. Journal of Cybernetics and Organisation of Tooling. Paper presented at Sixth
Systems, 32(7), 737 754. IFIP Working Conference on Virtual Enterprises
(PRO-VE05). Valencia, Spain.
Jones, S., Hackney, R., & Irani, Z. (2007). Towards
e-government transformation: conceptualising Mo, J.P.T., & Menzel, C. (1998). An integrated
citizen engagement: A research note. Transform- process model driven knowledge based system for
ing Government: People, Process and Policy, remote customer support. Computers in Industry,
1(2), 145-152. 37, 171-183.
Kosanke, K., Vernadat, F., & Zelm, M. (1999). Mo, J.P.T., Zhou, M., Anticev, J., Nemes, L., Jones,
CIMOSA: enterprise engineering and integration, M., Hall, W. (2006). A study on the logistics
Computers in Industry, 40, 83-97. and performance of a real virtual enterprise.
International Journal of Business Performance
Larsen, L.B., & Vesterager, J. (1999, 15-17 March).
Management, 8(2-3), 152-169.
Framework and methodology for creating virtual
enterprises - Initial results from the Globeman21 Nemes, L., & Mo, J.P.T., (2004). Collaborative
project. Paper presented at the 5th International Networks in Australia Challenges and Rec-
conference on Concurrent Enterprising: The ommendations. In L.M. Camarinha-Matos, H.
Concurrent Enterprise in Operation. The Hague, Afsarmanesh (Eds.). Collaborative Networked
the Netherlands. Organizations (pp.97-102). Boston: Kluwer Aca-
demic Publishers.
Li, H., & Williams, T.J., (1997). Some extensions
to the Purdue Enterprise Reference Architecture Noran, O. (2005). A systematic evaluation of the
(PERA) - I. Explaining the Purdue architecture C4ISR AF using ISO15704 Annex A (GERAM).
and the Purdue methodology using the axioms Computers in Industry, 56, 407-427.
of engineering design. Computers in Industry,
Orange, G., Elliman, T., Kor, A.L., & Tassabehji,
34, 247-259.
R. (2007). Local government and social or inno-
Li, H., & Williams, T.J., (2000). The interconnected vation value. Transforming Government: People,
chain of enterprises as presented by the Purdue Process and Policy, 1(3), 242-254.
Enterprise Reference Architecture. Computers
Ortiz, A., Lario, F., & Ros, L., (1999). Enterprise
in Industry, 42, 265-274.
Integration Business Processes Integrated Man-
Malladi, S., & Min, K.J., (2005). Decision sup- agement: a proposal for a methodology to develop
port models for the selection of Internet access Enterprise Integration Programs. Computers in
technologies in rural communities. Telematics Industry, 40, 155171.
and Informatics, 22, 201219.
Patankar, A.K., & Sadiga, S., (1995). Enterprise
Massey, C. (2003). Enterprise assistance: respons- integration modelling: a review of theory and
es from the public and private sectors. Journal practice. Computer Integrated Manufacturing
of Small Business and Enterprise Development, Systems, 8(1), 21-34.
10(2), 128-135.
390
Architecture Based Engineering of Enterprises with Government Involvement
Sackett, P., Rose, T., & Adamson, V. (2003). The Vernadat, F.B. (2002). Enterprise Modelling and
importance of business process clarification Integration (EMI): Current Status and Research
within the virtual enterprise. Journal of Small Perspectives. Annual Reviews in Control, 26,
Business and Enterprise Development, 10(3), 15-25.
298-305.
Weston, R.H. (1999). Reconfigurable, component-
Shankararaman, V., & Lee, B.S. (1994). Knowl- based systems and the role of enterprise
edge-Based Safety Training System (KBSTS) engineering concepts, Computers in Industry,
- A Prototype Implementation. Computers in 40, 321-343.
Industry, 25, 145-157.
Williams, T.J. (1994). The Purdue Enterprise
Shen, H., Wall, B., Zaremba, M., Chen, Y., & Reference Architecture, Computers in Industry,
Browne, J. (2004). Integration of business model- 24(2-3), 141-158.
ling methods for enterprise information system
Williams, T.J., Bernus, P., Brosvic, J., Chen,
analysis and user requirements gathering. Com-
D., Doumeingts, G., Nemes, L., Nevins, J.L.,
puters in Industry, 54, 307-323.
Vallespir, B., Vlietstra, J., & Zoetekouw, D. (1994).
Shinonome, M., Hashimoto, H., Fuse, A., & Mo, Architectures for integrating manufacturing
J.P.T. (1998). Development of an information tech- activities and enterprises. Computers in Industry,
nology infrastructure for extended enterprise. In J. 24, 111-139.
Mills & F. Kimura (Eds.). Information Infrastruc-
Wortmann, J.C., Hegge, H.M.H., & Rolefes,
ture Systems for Manufacturing (pp.353-364).
S. (2000). Embedding enterprise software in
Boston: Kluwer Academic Publishers.
extended enterprise models. Computers in
Sulin, B.A., Lang, K.R., & Whinston. A.B. Industry, 42, 231-243.
(1997). Enterprise decision support using Intranet
Wu, R.C.Y. (2007). Enterprise integration in e-
technology. Decision Support Systems, 20, 99-
government. Transforming Government: People,
134.
Process and Policy, 1(1), 89-99.
Van den Berg, R.J., & Tolle, M. (2000). Assess-
Zwegers, A., Tolle, M., & Vesterager, J., (2003).
ing Ability to Execute in Virtual Enterprises. In
VERAM: Virtual Enterprise Reference Archi-
J.P.T. Mo & L. Nemes (Eds.) Global Engineering,
tecture and Methodology. In I. Karvonen, R. Van
Manufacturing and Enterprise Networks (pp.370-
den Berg, P. Bernus, Y. Fukuda, M. Hannus, I.
378). Boston: Kluwer Academic Publishers.
Hartel, J. Vesterager (Eds.). VTT Symposium 224
(pp.17-38), Helsinki, Finland.
391
392
Chapter XVII
Collaborative Enterprise
Architecture for Municipal
Environments
Leonidas G. Anthopoulos
Hellenic Ministry of Foreign Affairs, Greece
Abstract
E-government evolves according to strategic plans with the coordination of central Governments. This
top-down procedure succeeds in slow but sufficient transformation of public services into e-Government
ones. However, public agencies adapt to e-Government with difficulty, requiring holistic guidance and a
detailed legal framework provided by the Government. The setting up of common Enterprise Architecture
for all public agencies requires careful analysis. Moreover, common Enterprise Architecture could fail
to cover the special needs of small or municipal agencies. The chapter uses data from various major
e-Government strategies, together with their enterprise architectures, in order to introduce a develop-
ment model of municipal Enterprise Architecture. The model is based on the experience collected from
the Digital City of Trikala, central Greece, and results in Collaborative Enterprise Architecture.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Collaborative Enterprise Architecture for Municipal Environments
and market-based public Administration (Federal projects. EA is the bridge that joins strategic
Enterprise Architecture, 2002). Moreover, stra- plans and their implementation (Federal Enter-
tegic plans set the technological standards that prise Architecture (FEA Group), 2005). Moreover,
will be followed during e-Government evolution, according to (Adigun and Biyela, 2003), the EA
such as openness, usability, customization and documents the elements that make up e-Gov-
transparency for public portals (Gant and Gant, ernment in a form that can be understood by its
2002) and interoperability between e-Govern- stakeholders (for example politicians, political
ment systems (UK Cabinet Office, Office of the parties, councils, heads of departments etc.). EA
e-Envoy, 2002). can assist central e-Government supervisors in
Strategic plans are being implemented accord- understanding and combining technical standards
ing to the top-down procedure (Anthopoulos, and political aspects.
Siozos and Tsoukalas, 2007), meaning that Gov- Each strategic plan is now accompanied by a
ernments define the primary targets and assign centrally defined EA that can supply all e-Govern-
their implementation to central authorities, while ment projects with common standards and opera-
e-Government target groups (citizens, enterprises, tion principles. However, central EA has to deal
civil servants) are not involved in the design with problems similar to the ones that central stra-
procedure. Top-down strategic planning defines tegic planning faces (Anthopoulos et. al., 2007):
policies and targets, but not methods and principles smooth transition of the public Agencies from
for e-Government. Information and Communi- traditional procedures to e-Government, change
cation Technology (ICT) vendors have provided acceptance by all target groups, and the treatment
solutions for e-Government and for digital service of individual, local and peripheral needs.
execution that are mainly eCommerce-based The purpose of this chapter is the introduction
applications, transformed and parameterized to of the Collaborative Enterprise Architecture
public Administration methodologies (Lawry, (CEA) that can be applied in local, state or pe-
Albrecht, Nunamaker and Lee, 2002). ripheral governments and Agencies. CEA is the
The application of the strategic plan on the result of: a) the experiences of the strategic plans
public Administration is a difficult procedure, that are being implemented by central Govern-
since various Authorities did not participate in ments, such as those of the US, the UK, Canada,
the top-down strategic planning, they do not Germany and the European Union. All have
know planning extensions and they are not aware followed the top-down planning procedure for
of the upcoming changes. Distributed and local e-Government and they have resulted in specific
authorities require the existence of controlling EAs for the public sector. b) The experiences
procedures and of specific legal frameworks in extracted by the implementation of the metro-
order to adopt changes. Central Agencies defined politan e-Government environment in the Digital
by Governments are assigned strategic planning City of Trikala, central Greece (Anthopoulos
implementation, change management and the and Tsoukalas, 2005), where the bottom-up
application of common technical standards in planning procedure (Anthopoulos et. al., 2007)
separate e-Government projects. was followed. Municipal area environments and
However, central supervision lacks func- individual Agencies can follow the bottom-up
tions (Peristeras and Tarabanis, 2004) that could planning procedure for e-Government, and their
establish common standards for interoperable, implementation model can be common. The re-
usable and accessible e-Government projects. sulting Collaborative Enterprise Architecture
The Enterprise Architecture (EA) is a tool that combines the bottom-up planning method,
can establish standardization in e-Government major EAs and groupware tools.
393
Collaborative Enterprise Architecture for Municipal Environments
In section 2 of this chapter, the background do more with Government than with the e,
of the proposed CEA is given. In section 3 the meaning that e-Government technologies exist,
contribution of this chapter is analyzed. The but their application requires the simplification
main thrust of this chapter is the proposal of the of public services and the modernization of ad-
CEA. The notion begins with the key findings ministrative structure and culture.
from existing e-Government strategies and En- The primary target of e-Government is the
terprise Architectures. All strategies culminate development of an efficient and citizen-centered
in Enterprise Architectures that have common Public Administration that will operate according
features. Then, the implementation model that to business methods and profit both citizens and
can be followed when a local Administration the Public Sector. E-Government projects aim at
wishes to enter the e-Government era is analyzed. cost- and time-minimization of public transac-
In the form of a step-by-step guide, the perspec- tions, at the simplification and the elimination
tives that public Agencies need to consider are of paper production during public services and
analyzed. Major e-Government case studies and at the treatment of corruption in Public Admin-
their experiences have to be combined with local istration.
needs. The implementation procedure is extracted The evolution of e-Government is currently
by the case study performed in the Digital City based in the centralized design and implementa-
of Trikala, Central Greece (e-Trikala), where the tion supervision of Strategic Plans, supported
local Administration decided to move towards the by huge investments in ICT infrastructures.
Information Society: e-Government methods and Governments appear satisfied, since they have
local social needs were analyzed and combined. succeeded in cost and time savings. Moreover,
The result of this initial procedure was the de- Governments consider that the pressure they
velopment of an Enterprise Architecture that can apply for the transformation of Public Administra-
extend national EA and is called the Collaborative tion will in the end achieve the primary targets
Enterprise Architecture (CEA). of e-Government. Enterprise Architecture is a
tool that supports the central implementation
of a Strategic Plan, by setting targets, principles
BACKGROUND and methods that can be followed by all public
Agencies. According to (Chief Information
There are many definitions of e-Government. Officers (CIO), 2001) Enterprise Architecture
Some (Devadoss, Pan, Huang, 2002) refer to the (EA) is a strategic information asset base, which
installation and use of IT systems in Public Ad- defines the mission, the information necessary to
ministration for offering digital public services. perform the mission and the technologies neces-
Others (Wimmer, Traunmuller, 2000) refer to the sary to perform the mission, and the transitional
transformation of Public Administration, which processes for implementing new technologies in
is based on the re-designing and digitization of response to the changing mission needs. EA in-
public transactions. Moreover, e-Government is cludes a baseline architecture, target architecture
related to social participation in policy making and a sequence plan. EA is accompanied with
(Pavlichev, Garson, 2004) and in the improvement a specific framework (CIO, 1999) containing the
of all public transactions, such as procuring and proper procedures that each public Agency has
auctioning methods (Schubert, Hausler, 2001). to follow in order to implement the EA. The EAs
Furthermore, according to the Organization that were investigated for the purposes of this
of Economic Co-operation and Development chapter have many similarities regarding their
(OECD) (OECD, 2001) e-Government has to development procedures, while their missions
have common primary targets.
394
Collaborative Enterprise Architecture for Municipal Environments
The development of e-Government strategic Central Greece (Anthopoulos, 2005), show that
plans is a top-down procedure (Anthopoulos citizens prefer the involvement of public servants
et. al., 2007), meaning that central Governments in digital transactions, while civil servants appear
supervise the design and execution of national reluctant to support the diffusion of e-Govern-
e-Government initiatives. The top-down proce- ment. Different points of views show that neither
dure is defined in detail by means of educational citizens nor civil servants trust e-Government.
methods, where an instructor presents the general The Digital City notion is used for the purposes
concept of a system and proceeds to its subsys- of this chapter. Digital City is defined as the
tems. In e-Government initiatives, the instructor global municipal area information environment,
is the Government usually with the support and focusing on the needs of a city area. The environ-
knowledge of special consultants invited from the ment contains Information and Communication
private sector which plans and monitors multiple Technology (ICT) solutions, but is not designed
projects. Top-down developed e-Government to offer only digital public services or to create
plans contain policies and targets, but not methods digital communities. The primary targets of the
and principles. Information and Telecommunica- Digital City are: a) to offer digital means for sup-
tion Technology (ICT) vendors have provided porting social needs in all daily transactions; b) to
solutions for e-Government and for digital service acclimate the local community to the notion of the
execution that are mainly eCommerce-based Information Society; and c) to collect official and
applications, transformed and parameterized to unofficial information from the local community
Public Administration methodologies. in order to support sustainable growth of small
On the other hand, current centralized design societies (Anthopoulos and Tsoukalas, 2005). The
has specified neither citizen nor civil servant definition extends previous ones by (Sairamesh,
needs. Surveys carried out in the US (Accenture, Lee & Anania, 2004), (Sproull & Patterson, 2004),
2005) (ACSI, 2005) show that citizens evaluate (Widmayer, 1999) and (Ishida, 2002).
digital public services and seem to prefer tradi- In the Digital City of Trikala, [on behalf of the
tional transactions. Citizens expect more from local Administration] e-Government issues were
digital services (Accenture, 2005), while they are investigated (Anthopoulos, Tsoukalas, 2005), and
not confident regarding security and privacy as- the bottom-up planning method was applied.
pects of e-Government transactions. Furthermore, The bottom-up design, too, is defined in detail
surveys carried out in the Digital City of Trikala, by means of educational methods (Anthopoulos
395
Collaborative Enterprise Architecture for Municipal Environments
et. al., 2007), where participants consider e-Gov- data is useful for the introduction of CEA, as it
ernment as a hierarchical system consisting of was used in the e-Trikala case. CEA contains a
multiple elements (sub-systems) that need to be mission statement and an implementation model,
identified, combined and analyzed from multiple which follows a number of perspectives and steps
perspectives in order for the whole system to that can be common for similar cases. CEA also
be realized. Participants (end-users, public offi- contains a logical architecture and some techno-
cials, politicians) share knowledge, and support logical principles that can be followed by local
Administration modernization. A comparison of agencies.
the bottom-up and top-down design methods
is presented in (Table 1). Key Findings from Existing
They start by setting out their expectations E-Government Strategies
with regard to e-Government systems, digital
public services and their simplification, and the A formal definition of public services suggests that
smooth transition from traditional to ICT-based independent public services are legally grounded
procedures. The bottom-up strategic planning business of public organizations in an economi-
was successful for the e-Trikala case, since in a cal sense. They represent the development and
mid-sized Greek town with a development index delivery of products and services of an organized
under national average values, the investment of unit to the public. A public service is referenced to
more than 4 million for a metropolitan e-Gov- a life event or business situation and is analyzed
ernment environment (Anthopoulos and Manos, in multiple steps that are executed according to
2005) was achieved in less than 3 years, and the relevant legal restrictions.
closing of the digital divide with the contribution The US Federal Governments e-Government
of all social groups was performed. E-Trikala action plan (US Federal Government, 2002) aims
can be a case study for similar cases, where local at the transformation of public administration
Agencies, municipal or state Governments wish into a citizen-centered, results-oriented and
to enter the e-Government era. market-based e-Government. Extensive invest-
ment, exceeding $52 billion by the end of 2003,
is being made in e-Government projects. About
MAIN THRUST OF THIS CHAPTER 40,000 Web pages from State Governments and
local authorities are accessible from a one-stop
The main purpose of this chapter is to introduce the e-Government portal called FirstGov (www.
Collaborative Enterprise Architecture (CEA): a firstgov.gov), while the e-Authentication (US
model that can support local Agencies and munici- Federal Government, 2003) platform provides
pal or state Governments in their e-Government secure services and preserves privacy during
projects. The CEA was extracted in the e-Trikala public transactions.
case study, where e-Government Strategies were The US strategic plan is supported by the
analyzed and combined with individual needs. Federal Enterprise Architecture (FEA) (CIO,
The summarized process and the data that were 2001), which was inspired by Zachmans model
used in the e-Trikala case are contained in this (Zachman, 1987), (Sowa, 2000). FEA adopted
section. Initially, the key findings of some major the National Institute of Standards and Technol-
e-Government strategies are presented. This ogy (NIST) model (CIO, 1999), containing the
investigation culminates in a common central following layers: business, information, infor-
e-Government Information System and a com- mation systems, and data and delivery systems
mon procedure for public service execution. This architectures.
396
Collaborative Enterprise Architecture for Municipal Environments
In Europe, member countries have signed the connects existing systems with different data
eEurope Action Plans, describing ways of build- structures and establishes user authentication
ing a favorable environment for all European for all public agencies and civil servants. The e-
citizens to participate in the Information Society. GIF (e-Government Interoperability Framework)
These plans have the power of contract between contains a range of standards for technical data
the member countries, presenting targets for IT exchange formats and protocols, in order to es-
projects. According to the previous eEurope 2005 tablish interoperability between different systems
plan (European Commission, 2002) for instance in British public Administration. By complying
public authorities in all member countries should with the technical standards, all public Agencies
offer digital services by the end of 2005. Recently, access central solutions and principles. British
the European Council adopted the i2010 Strategic Government approved its EA called the cross-
Plan (Reding, 2005), where innovation and Government Enterprise Architecture (xGEA) in
inclusion have become the main priorities for 2005 (UK CIO, 2005), describing the common
an open information space in Europe. European business-led vision and procedures for British
central Agencies did not suggest a specific EA Administration.
for e-Government in member countries. How- Germany has designed and followed the Bun-
ever, e-Europe strategic plans (http://ec.europa. dOnline 2005 strategic plan (German Federal
eu/information_society/eEurope) set out targets Government, 2003) for its Information Society
as defined by the Information Society Directorate framework program, which contained specific
General (http://ec.europa.eu/information_society) targets for e-government. The Bund portal (www.
and approved by the European Council. European bund.de) is the main point of access, where more
Directives support the implementation of e-Eu- than 100 agencies are interconnected and endeav-
rope strategic plans, which are coordinated and our to offer more than 450 different services. The
supervised by the Information Society Directorate German Federal Government wants to make the
General. European member-state national strate- Bund portal the main information platform for its
gies had to adapt to eEurope plans and to their public Administration, and a customer-centered
targets. The UKs Modernizing Government plan and open environment. The German EA is called
(UK Crown, 2000) is one of the major European SAGA Framework (KBSt Publication Series,
e-Government projects that matches the eEu- 2003) and contains centrally selected, common
ropes targets, while German (http://www.bund. solutions and standards for ICT projects in Ger-
de), French (www.service-public.fr) and Italian man Administration. Furthermore, the framework
(http://www.italia.gov.it) plans follow. European presents different perspectives that the ICT archi-
one-stop e-Government portals provide similar tecture designers in public Administration must
procedures to those of FirstGov for the execution follow for e-Government projects.
of public services. The Federal Government of Canada designed
The UKs strategic plan runs under the man- its Government on-Line (GOL) e-Government
agement of the Office of the e-Envoy. Two am- Strategic plan in 1999 (Treasury Board Secre-
bitious programs, UK Online and UK Gateway, tariat, Government of Canada, 2001), aiming at
rooted in the highest level of government. UK the availability of all digital public services by
Online developed the current DirectGov portal 2004. The Canadian strategic plan also aimed at
(http://www.direct.gov.uk), from where public a) spreading Internet use and b) public informa-
services are offered centrally, while the Govern- tion offering via citizen-centered methods. In
ment Gateway (http://www.gateway.gov.uk) is a January 2001 both targets were initially achieved
centrally financed infrastructure solution that and the central e-Government portal was online
397
Collaborative Enterprise Architecture for Municipal Environments
398
Collaborative Enterprise Architecture for Municipal Environments
399
Collaborative Enterprise Architecture for Municipal Environments
Figure 1. A logical view of a common central e-Government system. Arrows show possible paths chosen
by citizens to access public information or services. Workflow systems in the back-office offer content
management and service execution options
400
Collaborative Enterprise Architecture for Municipal Environments
Public Agencies can select between workflow (CIO, 1999) and by (Sowa) and consists of the fol-
or service execution environments to cover their lowing architecture layers placed in the columns
needs. On the other hand, they have to deal with of (Table 3):
all e-Government aspects in order to develop the
proper digital environment. a. The organization architecture, dealing with
the organizations physiognomy and vision,
The Collaborative Enterprise and national EA.
Architecture b. The collaborating architecture that refers
to the cooperating schema of the involved
The bottom-up strategic planning, where participants in the strategic planning and
representatives of e-Government target groups implementation phases. The cooperating
participate in the design and implementation schema contains descriptions about the
procedures, suggests the Collaborative Enterprise collaborating procedure in different stages
Architecture (CEA) notion. The Collaboration (UML rules, connections and data flow),
Enterprise Architecture (CEA) is an information together with groupware systems that es-
plan whereby the strategic e-Government mission tablish the participation.
and the information needed for the missions c. The technical architecture, which contains
performance are defined with the contribution of the technical standards for the development
representatives of all the target groups and they and interoperability of the architectures
meet end-users needs. The enterprise lifecycle subsystems.
is executed with the collaboration of the working d. The data architecture describing physical
group, the involved social parties and experts storages and repositories, file and records
invited from the private and academic sectors. structure, semantics for information ex-
The evaluation of the architectures progress is change, copyright and securing options.
based on end-user satisfaction and acceptance. e. The accessibility architecture that describes
The implementation methodology is described the efficiency of the architecture, since its
in the following subsection and suggests the En- vision and implementation are being evalu-
terprise Lifecycle of the CEA. CEA was inspired ated by members of their target groups.
by the US Federal Enterprise Architecture (FEA)
401
Collaborative Enterprise Architecture for Municipal Environments
402
Collaborative Enterprise Architecture for Municipal Environments
enter the e-Government era. Agency heads and Local needs arise from procedures occurring
politicians are probably not aware of ICT in de- in the Agency or in the City, together with local
tail, but they can understand local and individual conditions (social, economic and demographic
needs, they can diffuse their decisions to the local characteristics, geographical and urban param-
environments, and they must keep a leading eters, cultural and educational networks, trans-
role in the initiative. Heads of agencies need to portation and telecommunication infrastructures,
invite highly-skilled ICT seniors (academics or etc.). Local needs set the priorities for digital public
staff from the private sector) to cooperate with services and e-Government. Their investigation is
representatives from the Agency or from the local based on the contribution of the group members,
societys organized groups. All participants will while social participation may be requested via
comprise the working group for e-Government open dialogue. In e-Trikala the investigation of
transformation. The group will work on political local needs defined the axes of precedence for
targets, exchange ideas, extract local needs, find e-Government: a) Economy and employment,
e-Government solutions for them conforming to b) Improvement of everyday life, c) Educa-
EA architecture, implement these solutions and tion, professional training, life-long learning, and
close the digital divide in the local environment. d) Tourism and culture. All public services that
The whole process will deliver a business plan were implemented according to the above axes
for e-Government. In the case of e-Trikala, the of precedence exceed Administrating activities
working group was structured with representa- and municipal authorities. However, the digital
tives from the Municipality, Academics, people city is a global e-Government environment where
from the private sector and representatives from multiple digital environments are combined for
the organized social groups of the city of Trikala: the improvement of the local communitys life.
educational society (students, teachers and par-
ents), teams working on cultural aspects (cultural C. Financial Perspective: Secure
organizations and local museums), media (local Funding, Re-Use Infrastructures,
newspapers and radio stations), teams of elderly Encourage Private Investments and
citizens and citizens with disabilities and from the Minimize Maintenance Expenses
local market (local chamber of trade, groups of
enterprises involved in local tourism and local E-Government planning demands funding for
production). the implementation and maintenance of infor-
mation systems, software and digital service
B. Business Perspective: Discover the development, diffusion and training activities,
Individual Background and for telecommunication services. The finan-
cial perspective requires the examination of all
The first thing the working group must do is to existing ICT infrastructures and the necessary
define its resources (ICT, human resources who interoperability or updating costs. In the case of
will use e-Government tools), its individual e-Trikala funding was secured by the national
environment (the geographical field of action Information Society Framework Program, from
and the target-groups) and local needs. In the European Framework Programs and from na-
case of e-Trikala, the resources deal with ICT tional resources. The working group also encour-
infrastructures in the town hall and municipal aged ICT companies to offer volunteer support
agencies, and ICT-skilled municipal executives, with pilot projects, testing their technologies and
public buildings, telecommunication vendors and products in Trikala city. Interoperability between
connections over the city. new, legacy and third-party infrastructures was
403
Collaborative Enterprise Architecture for Municipal Environments
built to comply with the national interoperabil- and worst practices from all over Europe using
ity framework. The maintenance of the Digital Eurostat (http://epp.eurostat.ec.europa.eu) and Eu-
City infrastructures and services will be based robarometer (http://ec.europa.eu/public_opinion)
on payment policies over operators and digital services, in order to strengthen competitiveness
public services. and prevent further failures in Europe. Individual
and municipal Agencies can make use of the
D. Political Perspective: Comply with results extracted from e-Government case stud-
National EA ies: they can learn from both success and failure,
via understanding the conditions and the factors
EA is a tool that can succeed in e-Government that influenced results. In the e-Trikala project,
initiatives with common standards and interop- the experiences from the major strategic plans
erable features. However national EA contains presented above were combined with digital city
priorities that are formulated according to a cases. National strategic plans contributed with
political and economic background. All unique their visions and their Enterprise Architectures.
projects designed for e-Government must comply Digital city case studies were used for the evalu-
with the national EA mission and principles, and ation of their different technological models and
must comprise an architecture that will also follow for their different physiognomies. The result
EAs technological standards. Local administra- extracted by this combination is a novel Digital
tors can define their primary targets, but they City model, which is a metropolitan e-Govern-
have to formulate them in a manner compatible ment environment, where non-profit, social and
with the national mission. In the e-Trikala case, administrative public services are offered to
local needs were defined and assigned to axes of citizens (Anthopoulos and Manos, 2005).
precedence that comply with the Greek strategy.
The Greek Information Society strategy conforms G. Technical Perspective: Use
to the European strategy and to the principles Common E-government Architectures
that are set by the European Council and by and Standards to Cover Individual
the European Information Society Framework Needs
Programme. Moreover, the Greek strategy has
succeeded in the development of the broadband The implementation of the local e-Government en-
Network Syzefxis (www.syzefxis.gov.gr), which vironment requires common ICT infrastructures
connects all public agencies; the Greek strategy for the information system, the content manage-
has also legalized the Citizen Service Offices ment system and the service execution modules.
Information System (www.kep.gov.gr), with which Common tools and procedures were described
all e-Government initiatives must conform and previously. The local Agency has to opt for the
interoperate. E-Trikala Digital City EA contains optimal software, hardware and service solutions,
interfaces that interoperate with both of the above according to common national and international
public infrastructures. standards. The local e-Government environment
will interoperate with legacy and external envi-
F. Implementation Perspective: Make ronments, in order to transact data and forward
Use of Experience from International service requests. In e-Trikala the Digital City is
Case Studies based on an n-tier architecture, whose levels
are compatible with national and international
Excellence is the key to encouraging progress. e-Government standards. The whole architecture
The European Commission identifies both best is modular (Anthopoulos and Tsoukalas, 2005)
404
Collaborative Enterprise Architecture for Municipal Environments
405
Collaborative Enterprise Architecture for Municipal Environments
406
Collaborative Enterprise Architecture for Municipal Environments
DG The Information Society (2004) User Satisfac- Ishida, T. (2002). Digital City Kyoto. Communica-
tion and Usage Survey of eGovernment services. tions of the ACM, July 2002, vol.45, No.7.
Retrieved August 15th, 2007, from
KBSt Publication Series (2003) SAGA: Standards
http://europa.eu.int/information_society/ac- and Architectures for e-government Applications,
tivities/egovernment_research/doc/top_of_the_ Version 2.0. Retrieved August 15th, 2007, from
Web_report_2004.pdf) http://egovstandards.gov.in/egs/eswg5/ enter-
prise-architecture-working-group-folder/stand-
eGov Consortium (2002) IST Project 2000
ards-and-architectures-v2.pdf/ download
28471. An Integrated Platform for Realising
One-Stop Government. D121Services and Lawry, P., Albrecht, C., Nunamaker, J., & Lee,
process models functional specifications, 2002. J. (2002) Evolutionary development and research
Retrieved August 15th, 2007, from http://www. on Internet-based collaborative writing tools and
egov-project.org/egovsite/eGOV_D121.zip. processes to enhance eWriting in an eGovernment
setting. Decision Support Systems, vol. 34, (2002),
European Commission (2002) eEurope 2005: An
229-252, ElSevier.
information society for all. European Commission
- COM 263, 2002. Retrieved August 15th, 2007, Organisation for Economic Co-operation and
from http://europa.eu.int/eeurope Development (OECD) (2001) The Hidden Threat
to E-Government: Avoiding large government
Federal Enterprise Architecture (FEA) Working
IT failures (Policy brief). Retrieved August
Group (2002) E-Gov Enterprise Architecture
15th, 2007, from http://www.oecd.org/datao-
Guidance Common Reference model. (July
ecd/19/12/1901677.pdf
25, 2002). Retrieved August 15th, 2007, from
http://www.feapmo.gov/resources/E-Gov_Guid- Pavlichev, A., & Garson, G. D. (2004) Digital Gov-
ance_Final_Draft_v2.0.pdf ernment Principles and Best Practices, Chapter
1 (The promise of Digital Government), page
Federal Enterprise Architecture (FEA) Working
2, IDEA Group Publishing.
Group (2005) Enabling Citizen-Centered Elec-
tronic Government. 2005-2006 FEA-PMO Action Peristeras V., & Tarabanis K. (2004). Governance
Plan. Retrieved August 15th, 2007, from www. Enterprise Architecture (GEA): Domain models
whitehouse.gov/omb/egov/documents/2005_ for e-Governance. In the 6th international confer-
FEA_PMO_Action_Plan_FINAL.pdf ence on Electronic commerce (ICEC), ACM.
Gant, J., & Gant, D. (2002) Web portal function- Powel, A., & Picolli, G. (2004) Virtual Teams: A
ality and State Government E-service. In the Review of Current Literature and Directions for
proceedings of the 35th Hawaii international Future Research. The DATA BASE for advances
conference on system sciences (IEEE 2002). in Information Systems-Winter 2004, vol 35,
No.1. ACM.
German Federal Government (2003). BundOnline
2005. 2003 Implementation Plan. Retrieved May Reding, V. (2005) i2010: The European Commis-
25th, 2005, from http://www.bunde.de sions new programme to boost competitiveness
in the ICT sector. European Committees press
Godart, C. Saliou H., & Bignon, J.C. (2001) Asyn-
releases. Retrieved August 15th, 2007, from
chronous Coordination of Virtual Teams in Crea-
http://europa.eu.int/rapid/pressReleasesAction.
tive Applications (co-design or co-engineering):
do?reference=SPEECH/05/format=HTML&age
Requirements and Design Criteria. IEEE.
d=0&language=EN&guiLanguage=en)
407
Collaborative Enterprise Architecture for Municipal Environments
Sairamesh, J., Lee, A., & Anania, L. (2004). Part two: Technical Policies and Specifications.
Information Cities. Communications of the ACM Retrieved August 15th, 2007, from http://www.
February 2004, vol. 47, No.2. govtalk.gov.uk/documents/e-GIF4Pt2_2002-
04-25.pdf
Schubert, P., & Hausler, U. (2001) e-Government
meets e-Business: A Portal Site for Startup Com- UK Chief Information Officers Council (UK CIO)
panies in Switzerland. In the 34th International (2005) Enterprise Architecture for UK Govern-
Conference on System Sciences (IEEE 2001) ment. An overview of the process and deliverables
for Release 1. Retrieved August 15th, 2007, from
Sowa, F. J. (2000) Levels of Representation.
http://www.cio.gov.uk/documents/cto/pdf/enter-
Knowledge Representation. Logical, philosophi-
prise_architecture_uk.pdf
cal and computational foundations (pp. 188-189).
Brooks/Cole Thomson Learning. US Federal Government (2002) e-Government
Strategy: Simplified Delivery of Services to
Sproull, L. & Patterson, J., (2004). Making In-
Citizens. Executive Office of the President, Of-
formation Cities Livable. Communications of the
fice of Management and Budget, US Federal
ACM February 2004, vol. 49, No.2.
Government February 2002. Retrieved May
Tat-Kei Ho, A. (2002). Reinventing Local Gov- 25th, 2006, from http://www.firstgov.gov/Topics/
ernments and e-Government Initiative. Public Includes/Reference/egov_strategy.pdf
Administration Review, July/August 2002, Vol.
Wesley, Addison (2003). XML Data Management.
62, No. 4., Blackwell Synergy.
Native XML and XML-enabled Database Systems.
Treasury Board Secretariat, Government of Pearson Education Inc., Boston,U.S.A.
Canada (2001). Canadas Report on Portals,
Widmayer, P. (1999). Building Digital Metropo-
August 10, 2001.
lis: Chicagos Future Networks. IT Professional
Treasury Board Secretariat, Government of Volume 1, Issue 4, July-Aug. 1999, p. 40 46.
Canada (2006). Service Oriented Architecture IEEE.
Strategy. Retrieved May 25th, 2006, from http://
Wimmer, M., & Traunmuller, R. (2000) Trends
www.tbs-sct.gc.ca/cio-dpi/Webapps/architecture/
in Electronic Government: Managing Distributed
sd-eo/sd-eo_e.pdf)
Knowledge. In the 11th International Workshop
UK Cabinet Office (2000). e-Government, a on Database and Expert Systems Applications
strategic framework for public services in the in- (IEEE, DEXA00)
formation age. Retrieved May 25th, 2006, from
Zachman, J. A. (1987) A Framework for Informa-
http://archive.cabinetoffice.gov.uk/e-envoy/re- tion Systems Architecture. IBM Systems Journal,
sources-pdfs/$file/Strategy.pdf vol. 26, No. 3, 1987 (available at http://www.re-
search.ibm.com/journal/sj/263/ibmsj2603E.pdf)
UK Cabinet Office, Office of the e-Envoy (2002) e-
Government Interoperability Framework (e-GIF).
408
409
Chapter XVIII
Government Enterprise
Architectures:
Enabling the Alignment of Business
Processes and Information Systems
Nigel Martin
The Australian National University, Australia
ShirleyGregor
The Australian National University, Australia
Dennis Hart
The Australian National University, Australia
Abstract
This chapter describes the development and use of government enterprise architectures for the framing
and alignment of the core business processes and enabling information systems at the Australian Bureau
of Statistics (ABS) and the Centrelink Social Services agency. The chapter focuses on the construc-
tion and ongoing maintenance of public enterprise architectures that enable the alignment condition.
An established research model has been used to guide the analysis and explication of the government
business processes, enabling systems and architectures, and the resulting agency alignment. While the
discussion acknowledges the existence of other formal and informal enablers of alignment (such as
strategic planning or management support), this chapter concentrates on the enterprise architecture
enabler. The functionally integrated government business processes and information systems that are
established within the instantiated enterprise architecture are examined. The agencies performance
data reflects two public organizations that are closely aligned and have achieved upper benchmarked
outcomes and recognition awards. The agencies business processes and architectural practices conform
to established theoretical frameworks.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Government Enterprise Architectures
410
Government Enterprise Architectures
included discovery and analysis of architectural critical alignment, architecture, and business
documents and designs, semi-structured and process concepts are the subject of detailed dis-
unstructured interviews with agencies execu- cussions in the following sections.
tives and staff, studies of organizational public
announcements and executive presentations, and Strategic Alignment
participation in agencies system and technology
demonstrations. The research data includes the The organizational alignment construct has its
agencies enterprise architecture structures and roots in strategic management literature dating
components, and the business process and infor- back to the mid 1950s (Drucker, 1954, 1980;
mation systems alignment analysis. Porter, 1980, 1981, 1991). In his seminal work in
While this first section has provided a brief the management discipline, Porter (1980, 1981)
introduction, the balance of the chapter is orga- termed the condition of internal and external
nized as follows. In the second section, the theo- compatibility as strategic fit (sometimes also
retical foundations for the chapter in the areas of known as organizational fit). Porter (1991) also
strategic alignment, enterprise architecture, and identified an important condition for business suc-
government business processes are established. cess and leading corporate performance stating
In the third section, a model of business process that an organizations internally consistent set
and information systems alignment is introduced of goals and policies aligns the firms strengths
and discussed in some detail. In the fourth section, and weaknesses with the external opportunities
the agencies enterprise architecture data and col- and threats (p. 99). Accordingly, Porters con-
lection methods is presented. In the fifth section, cept of strategic fit was an early and important
the two agency case sites are discussed, including component of the alignment construct.
the enterprise architecture implementations (eg, Following the work of management strate-
frameworks, methods, governance arrangements, gists, such as Drucker and Porter, Earl (1989)
and resultant architectures). In the sixth section, the applied some of these strategic management
analysis of the alignment of government business principles to the information technology func-
processes and information systems is presented, tion, establishing a theory concept that links
including critical examples from the two cases. and integrates the organizations information
In the final section, the chapter concludes with a technology strategy and infrastructure with
summary of the agency enterprise architectures business objectives. Importantly, this alignment
and their capacity for enabling business process and integration was considered to be enabled by
and information systems alignment, including the formal organizational processes and mechanisms
value of the architecture in the alignment dynamic and more social people-based interactions, con-
and the importance of establishing foundation sistent with other established strategic planning
business processes. principles (Horovitz, 1984). As a further advance
in the alignment theory set, Henderson and Ven-
katraman (1993) developed a Strategic Alignment
BACKGROUND Model (SAM) that aligned and integrated business
strategy, organizational infrastructure, informa-
The theoretical foundations of this chapter draw tion systems strategy, and information systems
together several important concepts. The theory infrastructure (see Figure 1).
related to strategic alignment, enterprise architec- The SAM aligns the externally and internally
ture, and government business processes provides focused components of the enterprise (termed
the underlying background for the chapter. These strategic fit), while also integrating the business
411
Government Enterprise Architectures
E xte rn a l B u sin e ss IS
F o cu s S tra te g y S tra te g y
Strategic
Fit
B u sin e ss D o m a in IS D o m a in
Functional
integration
and information systems domains (termed func- Solomon, Raymond & Bergeron, 2001; Reich &
tional integration). The model also represents Benbasat, 1996, 2000; Sabherwal & Chan, 2001).
four view points of alignment where the business Various studies have investigated the strategic fit
strategy shapes the organizational and informa- and functional integration aspects of alignment
tion system infrastructures design (strategy with a view to determining whether improved
execution view); the business strategy shapes the alignment conditions can ultimately lead to in-
information systems strategy and infrastructure creases in corporate and business performance
design (technology transformation view); the (Chan, Huff, Copeland & Barclay, 1997; Croteau,
information systems strategy shapes the business Solomon, Raymond & Bergeron, 2001). In gen-
strategy and organizational infrastructure design eral, the findings of alignment research suggest
(competitive potential view); and, the information that closer alignment and integration results in
systems strategy shapes the information system stronger organizational business performance,
and organizational infrastructures design (service a seemingly desirable outcome for any public or
level view). Each of the four views depicts how private organization (Chan, Huff, Copeland &
a selected SAM component can be used as an Barclay, 1997; Croteau, Solomon, Raymond &
anchor for shaping the alignment and integration Bergeron, 2001; Sabherwal & Chan, 2001). These
conditions of the complete organization. research outcomes, and the expansion of our
In this chapter, we will be primarily concerned understanding of the alignment construct, serve
with the functional integration dimension of align- as a firm basis for the examination of business
ment, where the business process segment of the process and information systems alignment as
organizational infrastructure is aligned with the a means of improving public agency efficiency
information systems infrastructure. The selection and performance.
of the SAM for use in the scoping of this chapter
is based on its high level of theoretical utility, and Enterprise Architecture
its extensive use in other information systems
and technology research studies (Chan, 2002; Some of the earliest literature in the Enterprise
Chan, Huff, Copeland & Barclay, 1997; Croteau, Architecture discipline was published during
412
Government Enterprise Architectures
Figure 1. Zachman enterprise architecture framework (Source: Sowa & Zachman, 1992)
What How Where Who When Why
Layer
(Data) (Function) (Network) (People) (Time) (Motivation)
List of locations List of List of
Scope Context List of things List of processes List of events
in which organizations business
Boundary important to the business significant to
the business important to the goals/
(Planner) the business performs the business
operates business strategies
Business e.g., Semantic
Model or Entity- e.g., Business e.g., Business e.g., Work Flow e.g., Master e.g., Business
Concepts Relationship Process Model Logistics System Model Schedule Plan
(Owner) Model
System Model e.g., Distributed e.g., Human e.g.,
e.g., Logical e.g., Application e.g., Business
Logic System Interface Processing
Data Model Architecture Rule Model
(Designer) Architecture Architecture Structure
Technology
e.g., Physical e.g., System e.g., Technology e.g., Presentation e.g., Control e.g., Rule
Model Physics
Data Model Design Architecture Architecture Structure Design
(Builder)
Component
e.g., Data e.g., Network e.g., Security e.g., Timing e.g., Rule
Configuration e.g., Program
Definition Architecture Architecture Definition Specification
(Implementer)
Functioning
Enterprise e.g.,
e.g., Data e.g., Function e.g., Network e.g., Schedule e.g., Strategy
Instances Organization
(Worker)
the late 1980s and early 1990s, when informa- greater level of non-technical content for artifact
tion systems specialists commenced developing construction (Sowa & Zachman, 1992).
systematic taxonomies for categorizing real world Over time, other technical architecture spe-
objects, computers, and other information systems cialists and commercial information technology
entities (Sowa & Zachman, 1992; Zachman, 1987). organizations and vendors have contributed to
The original Zachman (1987) information systems our understanding of enterprise architectures,
architecture framework developed three domain concentrating their efforts in the areas of con-
views (ie, data, function, and network) across five trolled planning of technical architectures and
different perspectives (ie, scope, enterprise model, systems, technical systems analysis, business
system model, technology model, and compo- and technology architectures, and technology
nents). The framework columns depict different policy development (Gibson, 1994; Lloyd &
ways of representing real world entities (eg, in the Galambos, 1999; McDavid, 1999; Spewak & Hill,
network domain, an enterprise model might take 1993; Targowski, 1990; The Open Group, 2006).
the form of a sales network retail stores linked by This seemingly technology-focused approach
telephones). Importantly, the extended framework to architecture, while wholly consistent with
(see Figure 2) introduced additional formalisms, its technical origins, highlights an opportunity
including people (ie, organizational structure or to consider and examine architecture as a more
people-to-people relationships), time (ie, schedule holistic and integrated business and technical
or event-to-event relationships), and motivation systems artifact. If viewed in this way, architec-
(business motivation or ends-means-ends relation- ture offers organizations a useful and valuable
ships) domains or columns, thereby providing a mechanism for combining, closely aligning, and
413
Government Enterprise Architectures
functionally integrating their operating business harmonized through the use of the combined
and technology domains. whole-of-enterprise architecture.
Indeed, further contemporary research in What we can conclude from this evolving base
the area of organizational architectures shows a of literature is that the use of enterprise architec-
growing interest in the use of enterprise archi- tures for enabling business-technology alignment
tectures for combining business and technology and integration has taken on a growing importance
domains (Feurer, Chaharbaghi, Weber & War- in private and public organizational settings. It
gin, 2000; Gordon & Gordon, 2000; Murray & should be highlighted that while the business
Trefts, 2000). For example, Gordon and Gordon strategies, goals and processes portion of com-
(2000) examined the alignment and integration pany enterprise architectures may not necessarily
of strategic business and information technology be comparable to government architectures (ie,
units in eight large private organizations, and profit motivated strategies and processes versus
determined that internal and external business public service driven processes), the respective
factors can impact the information technology information technology and systems architecture
unit structures. This research also showed that components (such as the software, hardware, and
the information technology architecture directly IT infrastructure) may be similar in scope and
influences the whole technology domain and the scale (Martin, 2005).
connective relationships with the business units. Accordingly, architecture practitioners and
In a similar case study of the Hewlett Packard researchers in private and public sector orga-
(HP) organization, researchers examined how the nizations are providing a greater level of focus
company developed and implemented a business on the alignment dimension, while establishing
alignment framework that incorporated business the blueprints and theoretical frameworks for
processes, information, applications, data and combining the business and information systems
technology layers with a set of social organiza- domains. This chapter is directed at building
tional dimensions including culture, values and further knowledge and understanding of govern-
teams (Feurer, Chaharbaghi, Weber & Wargin, ment enterprise architecture implementations, and
2000). The researchers found that the HP business how these architectures might be used to align
alignment framework was created for aligning the and integrate business processes and information
business and information technology strategies systems in public organizations.
through mapping the core business processes and
information technology solutions so as to facilitate Government Business Processes
and enable visible company changes.
Other studies have examined the theoretical In the early 1990s, organizational business pro-
engagement of business and information technol- cesses emerged as a major issue of concern for
ogy in true corporate partnerships. Murray and executive and technical managers within private
Trefts (2000) developed a new managerial process and public organizations (Davenport & Short,
that combined the business and information tech- 1990; Hammer, 1990; Hammer & Champy, 1993;
nology architectures for the delivery of technol- Harrington, 1991). These concerns were based on
ogy projects, while aligning the organizations the assertion that some business processes and
business strategy and information technology intrinsic corporate activities were unplanned or
infrastructure. The study also asserted the im- under-designed in nature. Hammer (1990) typified
portance of ensuring that new business processes some of these concerns when he posited Why
and information systems are coordinated and did we design inefficient processes? In a way, we
didnt. Many of our procedures were not designed
414
Government Enterprise Architectures
at all; they just happened The hodgepodge of efficient business processes will likely involve the
special cases and quick fixes was passed from one synergistic use of information systems and tech-
generation of workers to the next (p.107). The nologies (Alavi & Yoo, 1995; Johnson, 1993; Leith,
widely adopted definition of business processes as 1994; Smith, 1994). Extant literature in the area
a set of logically related tasks that use the resources of organizational business processes asserts that
of an organization to achieve a defined business information systems combine with processes and
outcome further highlights the importance of task associated tasks in the enabling of performance
integration and resource planning (Davenport improvements (Gadd & Oakland, 1995; Hammer
& Short, 1990). As a consequence, some orga- & Champy, 1993). In a further supporting study,
nizations, such as the Ford Motor Company and McAdam and Donaghy (1999) found that the use
Xerox, engaged in large scale business process of information systems and technologies is one
re-engineering efforts (Davenport & Short, 1990; of the critical success factors related to organi-
Hammer, 1990). Hence, the Business Process zational process and performance improvement.
Re-engineering (BPR) discipline arose from the Second, more efficient government business pro-
need to make work processes more efficient and cesses should target performance improvement
organizationally integrated. from the customers perspective (Chang, 1994).
What this earlier business process work sug- Some researchers have suggested that Demings
gests for public sector agencies is a continual drive philosophy of continuous improvement can be
towards greater process and system alignment and readily applied to client services delivery in the
integration for the delivery of larger volume and public and private sectors (Deming, 1986; Para-
higher quality products and services. In support suraman, Zeithaml & Berry, 1985). The assertion
of this government direction, the Kettinger and is that enhanced process management practices
Grover (1995) business process change model should ultimately lead to customer-focused busi-
provides a comprehensive environmental schema ness process improvements and elevated corporate
that functionally aligns and integrates business performance. Some studies support this assertion
processes, information technology, people and and have found that the functional integration of
interpersonal aspects, management aspects, and information systems with organizational business
the organizational structure for the delivery of processes positively impact knowledge and data
products, services and corporate performance. sharing, expand corporate learning, and build
Under this model, the alignment of core informa- transparency and trust with clients (Grover, Teng
tion systems (and the associated technologies) & Fiedler, 1993; Johnston & Carrico, 1988). In
with business processes was considered to have a summary, government business processes read-
profound and lasting impact on the organizations ily combine with the organizations information
ability to deliver public products and services in a systems and technology resources in delivering
dynamic and more efficient manner. Interestingly, public products and services. The use of these
the inclusion of the people and interpersonal as- types of customer-facing business processes,
pects of process change underlines the importance which are closely aligned with synergistic infor-
of the interactions between the processes, systems, mation systems, forms part of the larger machinery
and socially based alignment mechanisms (Mar- of government that delivers these products and
tin, Gregor & Hart, 2005). services. Accordingly, these processes are wor-
In relation to government business operations thy of some further investigation and improved
there are possibly two further points that should be understanding, especially in the context of pro-
made. First, the implementation of new and more cess-system integration.
415
Government Enterprise Architectures
Interaction layer
Interaction layer
N o te : B lack
Alignment Outcomes a rro w s a re
(e g , p ro ce ss-syste m a lign m en ts, th ird -p a rty fe ed ba ck
re co gn ition , o uttu rn b u sine ss p e rfo rm a n ce ) ch an ne ls
416
Government Enterprise Architectures
architecture influence the degree of alignment in the agency structure (enterprise conditions
achieved? In this segment of the analysis we will or context), with structural changes having the
present the structures, components and charac- potential to modify levels of management sup-
teristics of the ABS and Centrelink architectures port or social communication (social alignment
and their relative influence on the alignment state. mechanisms). This is just one example of how
Third, Does the use of an enterprise architecture dynamic change can impact the overall alignment
combine with social mechanisms of alignment outcome (ie, less or more alignment).
in processes that enable alignment outcomes? In In studying government enterprise architec-
this segment of the analysis we will examine and tures, we acknowledge that some level of align-
present the combination of the agencies man- ment would likely exist prior to an architectural
agement support, business planning styles, and implementation. Specifically, other research and
business plan communications with the enterprise analytical studies support our analytical approach,
architecture mechanisms in processes enabling and have found that different types of social and
alignment. Finally, Does the use of an enterprise formal alignment mechanisms, such as executive
architecture combine with other formal alignment management support, collective planning styles,
mechanisms in processes that enable alignment? governance processes and strategic plans, can
This segment of our analysis will briefly examine work to enable an organizations alignment condi-
and present some of the combined relationships tion (Henderson & Sifonis, 1988; Pyburn, 1983;
and interactive processes of the formal alignment Raghunathan & Raghunathan, 1989; Venkatra-
mechanisms. In a holistic sense, the four research man, Henderson & Oldach, 1993). In the balance
themes provide an aggregated view of government of this chapter, we will practically demonstrate
agency alignment and the relative contribution of how public organizations enterprise architectures
the enterprise architecture as a formal alignment can combine with other alignment mechanisms to
mechanism. Later in the chapter, we will pres- functionally integrate and align business processes
ent a process-system alignment analysis, further and information systems.
supported by resultant business performance
data and third-party recognition of information
system enabled business delivery, to illustrate the ENTERPRISE ARCHITECTURE
potential alignment outcomes. DATA AND COLLECTION METHODS
The research and analysis model is consistent
and complementary with the Henderson and The case data presented in this chapter was ex-
Venkatraman (1993) SAM outlined earlier in the tracted from a larger doctoral study that investi-
chapter. Strategic alignment is considered to be gated the use of enterprise architectures in four
a dynamic and ubiquitous organizational state Australian government agencies, including the
(ie, alignment, change, re-alignment), where the ABS and the Centrelink social services agency
various segments of the model can be collec- (Gregor, Hart & Martin, 2007; Martin, 2005;
tively and interactively influenced (Henderson & Martin, Gregor & Hart, 2005) (The agency cor-
Venkatraman, 1993). The dynamism of agency porate data has been updated to take account of
alignment is represented by the feedback channels the 2005-2006 financial year performance). The
and posits that a change in any part of the model studys case organizations were selected from
may impact the alignment state, and the model as the Commonwealth Architecture Forum and the
a whole. As an example, a change in the agency Queensland Government Forum for Enterprise
enterprise architecture or strategic plan (formal Architecture Collaboration special interest groups
alignment mechanisms) can stimulate changes that were established to further architecture goals
417
Government Enterprise Architectures
and initiatives at the federal and state government representation and glossary) contained in the ISO
levels. The decision to present the ABS and Cen- 15704 standard (Industrial Automation Systems
trelink case material in this chapter was based on Requirements for Enterprise-Reference Archi-
the highly detailed agency enterprise architecture tecture and Methodologies) that was modified to
implementations, high visibility of social and suit government agencies (Gregor, Hart & Martin,
formal alignment mechanisms, and the capacity 2007; International Standards Organization, 2000;
to examine the alignment of government business Martin, 2005; Martin, Gregor & Hart, 2005). The
processes with corporate information systems. analysis for both agencies will be presented later
Proven multiple qualitative research methods in the chapter.
were adopted for case data collection (Burgelman, Also, seven executives and thirteen managers
1983, 1994). This approach allowed research from both agencies offered comments and views
data and information to be triangulated across during eighteen semi-structured interviews and
multiple sources. The two agencies provided fifteen follow-up discussions of up to one and
archival and publicly available documents (ie, a half hours in duration (Martin, 2005; Martin
audited parliamentary and agency papers) in & Gregor, 2005, 2006; Martin, Gregor & Hart,
the areas of governance, information systems, 2005). The theme based questions are attached
agency performance, enterprise architecture at Appendix A to the chapter. In accordance with
and business plans. Architectural documents the Miles and Huberman (1994) data processing
and drawings were analyzed by comparing the principles, the interview comments were recorded,
agencies architectural state with the requirements two pass coded, and stored on a purpose built
(ie, architecture coverage, concepts, components, database management system for use in the case
Note: Codes were replicated for non-current, or emerging, characteristics that were in development
418
Government Enterprise Architectures
analysis (Martin, 2005; Miles & Huberman, 1997). The Australian Bureau of Statistics
The codes were designed to classify, present and
publish commentaries by research theme and The ABS is a federal government agency head-
summary notations within each theme (see code quartered in Canberra, Australia that employs
examples in Table 1) (Gregor, Hart & Martin, approximately 3,000 staff and has origins dat-
2007; Martin, 2005; Martin, Gregor & Hart, 2005; ing back to the early 1900s, when the Census
Miles & Huberman, 1997). and Statistics Act (1905) was passed and the
In addition, executive presentations and corpo- Commonwealth Bureau of Census and Statistics
rate announcements by the ABS and Centrelink (CBCS) established. The CBCS was abolished
were collected and integrated into the written case in 1974 and the ABS installed in its place. In
evidence. In order to gain experience with agency its capacity as Australias official statistical or-
information systems, the ABS and Centrelink also ganization, the ABS has a mission to assist and
provided researchers with system demonstrations encourage informed decision-making, research
of data warehouse facilities, automatic workflow and discussion through the delivery of high quality
applications, corporate database environments, and objective national statistics (Commonwealth
and legislative interpretation applications. This of Australia, 2005b, 2005c, 2006a). The ABS
facilitated improved understanding of some of manages a recurrent budget of approximately
the underlying internal business processes and A$338 million (in 2006 dollars) (Commonwealth
the enabling technical systems. of Australia, 2006a).
The aggregation of the collected and analyzed The ABS is characterized as a quality infor-
case data has culminated in a rich body of critically mation organisation that collects, processes and
evaluated evidence that supports the augmentation disseminates accurate and timely economic data
of the research and analysis model. Staff members and community information. The ABS offers
and executives at the agencies were not averse statistical publications in the two major areas of
to providing critical comments on architectural economic statistics (eg, trade, business, national
practice, the social mechanisms of organizational accounts, manufacturing, agriculture) and popu-
alignment, or the potential limitations of using an lation statistics (eg, census, demography, labour,
Enterprise Architecture or other formal alignment social conditions, crime), supported by three
mechanisms (Martin, 2005; Martin, Gregor & functional service groups (statistical methodol-
Hart, 2005). ogy; information management and census; and
technology and corporate services) (Common-
wealth of Australia, 2005c, 2005d, 2006a).
GOVERNMENT AGENCY CASE The ABS has been recognised as a world
STUDIES leader in the statistics delivery business since the
early 1990s (The Economist, 1991, 1993), while
In this section of the chapter, we will introduce the consistently rating well above average against
case agencies and develop a detailed discussion international government and non-government
of the two enterprise architecture implementa- organizations in Gartner Group information
tions. The opportunity will be taken to contrast technology benchmarking studies, particularly in
the different architecture approaches adopted the areas of software and systems development
by the agencies, while highlighting the impor- (Commonwealth of Australia, 2000, 2001). The
tant consistencies with commercial architecture enterprise architecture mechanism is an integral
standards and frameworks. part of the agency infrastructure, and has assisted
with the understanding of future business direc-
419
Government Enterprise Architectures
tions and processes, while aiding the identification an Australian government technology gold award
and management of the information systems and in 2003. The enterprise architecture mechanism
technologies required to support that future state is a critical tool of the agency that has enabled
(ie, maintain alignment) (Palmer, 2003). the building of connections with customers and
important information systems and technologies
The Centrelink Social Services capabilities (Treadwell, 2003).
Agency
The Enterprise Architecture
The Centrelink agency operates as the govern- Frameworks and Methods
ments social service delivery arm and is respon-
sible for delivering services and payments, such The creation of an enterprise architecture can
as job seeker assessments and referrals, parenting take many development paths and, as we have
payments, youth allowances, and social work seen earlier in the theory section of the chapter,
services on behalf of eighteen (18) government can also involve the use of proven architectural
agencies and departments at the state and fed- frameworks and methods (Sowa & Zachman,
eral levels (Commonwealth of Australia, 2006c). 1992; The Open Group, 2006; Zachman, 1987).
Centrelink was legislated as a federal agency in In the first case organization, four staff members
1997, following the merger of the Department of from the ABS commenced the architecture devel-
Social Security and the Commonwealth Employ- opment and documentation process in 1999 with a
ment Service. The organization is headquartered completed version 1.0 in September 2001, and an
in Canberra, Australia, employs approximately updated version 2.0 in March 2003. The internal
25,000 staff at over 1,000 service delivery points, architecture development method formed part of
and supports over 6.5 million customers (repre- the information resource management process,
senting approximately one-third of the population and was based on the identification of business
of Australia) (Commonwealth of Australia, 2006b, and technical systems capability gaps (see Figure
2007a, 2007c). Centrelink manages a recurrent 4) (Gregor, Hart & Martin, 2007; Martin, 2005;
budget of approximately A$2.3 billion (in 2006 Martin & Gregor, 2006; Palmer, 2003).
dollars) (Commonwealth of Australia, 2006b). The ABS enterprise architecture documenta-
In order to understand the scale of the Cen- tion was reviewed and updated periodically (every
trelink operations, it should be noted that on 6 to 12 months) by the Chief Information Officer
an annual basis the agency delivers more than (CIO) and technical services division, to reflect
140 different products and services, pays over changing alignment, systems, environments, and
10 million individual entitlements valued at business capability gaps. The architecture update
over A$63 billion, records 5.2 billion electronic process was typically triggered by shifts in busi-
customer transactions, and receives more than ness products and processes, changes in service
30.77 million telephone calls and over 47 million delivery patterns, and associated investment ac-
online page views (Commonwealth of Australia, tivities. The business drivers (eg, new products,
2007a, 2007c). Centrelink has also won several services, client needs, financial constraints) that
national awards for business delivery and technol- stimulated the development of new and enhanced
ogy driven productivity in the area of electronic information systems for product and service de-
business and customer relationship management livery were a primary input to the architecture
(Commonwealth of Australia, 2005a, 2006b; change process and method.
Martin & Gregor, 2006). As an example, the The primary mechanism for evolving the
suite of five major e-Business projects secured physical ABS enterprise architecture was the
420
Government Enterprise Architectures
Target P ro je cts
N e tw o rk,
Architecture
S e rve rs,
W orksta tio n s,
O p e ra tin g
S yste m s
____________
Current Architectural
H a rd w a re / Architecture Gap
S o ftw a re
Investment
A B S P ro d u cts Activities B u ildin g B lo cks
A B S P ro d u ct P a tte rn s,
F a m ilie s F ra m e w o rks,
C o m p o n e n ts
A B S B u sin e ss
P ro ce ss T a xo n o m y
rd
B u sin e ss S e cu rity T o ols 3 P a rty a n d
In fra structu re In -H o u se
identification of an architectural gap (ie, difference In our second case, the Centrelink agency
between current and target architectures based on adopted the Zachman Enterprise Architecture
business drivers and changes) and the enunciation Framework for developing and documenting their
of the investment activities required to bridge the architecture (Sowa & Zachman, 1992; Treadwell,
gap. A good example of architectural evolution 2003; Zachman, 1987). While Centrelink (as the
was the development of the ABS Input Data Ware- former Department of Social Security) had been
house (IDW) (2001-2004) (Gregor, Hart & Martin, developing its technical architectures since the
2007; Martin & Gregor, 2005). In 2001, the ABS late 1980s, it made a conscious decision to adopt
identified a gap in business capability (ie, statistics the Zachman framework as a more formal de-
provider processes and workloads were high and velopment method in late 2002, some four years
inefficient due to multiple database entry tasks), after its physical establishment as a government
coupled with the need for a single database struc- agency. The framework had been divided into
ture and integration tool in the architecture (ie, Zachmans Interrogatives (ie, Why, Who, What
SAS database software). The investment activities When, How and Where) and populated using
required to deliver the new system included the the Centrelink business constructs and technical
construction and documentation of a production systems artifacts (see Figure 5) (Martin, 2005;
pilot warehouse, operating pilot warehouse, and Treadwell, 2003).
full production warehouse, training of business It should be noted that Centrelink did not
operations staff, and the development of applica- augment the horizontal layers of the Zachman
tions interfaces and associated systems. The full framework, instead choosing to identify the major
production warehouse holds over 400 million clients, products, services, processes, systems,
records and was commissioned into operation business drivers and delivery locations.
in mid-2004. Importantly, the major business processes
are encapsulated in the vertical programs and
421
Government Enterprise Architectures
Delivery of Legislation/Policy
Recognition of Community
Needs and Legislation
Requirements
payment layer of the augmented framework and more reliable health and welfare payments and
are aligned with Centrelinks information and streamline and better align internal agency busi-
technology systems and community access layers ness processes. Since mid-2005, payments such as
(see process-system mappings later in the chap- the Youth Allowance, Austudy Student Payments,
ter). The architecture framework formed part of Maternity Payment and Family Tax Benefit have
the larger agency management and governance been available through online channels, form-
arrangements, and was driven by changes in ing a significant portion of the 250,000 online
business posture and structures (including the transactions processed each week. Centrelinks
underlying legislation). A typical example of architectural practice has enabled the nationally
architecture driven development was the Online recognized, continuous improvement of online
Claims and Services system (Commonwealth of services and payments, and the associated trans-
Australia, 2006d). Online claims and services formative business processes (Commonwealth of
systems were redeveloped in 2005-06 to provide Australia, 2006b, 2006d). As a further example,
422
Government Enterprise Architectures
the Student Notification of Employment Income Martin, 2007; Martin, 2005; Martin & Gregor,
Initiative supported the development and repli- 2006; Palmer, 2003). The ABS tabled larger
cation of e-Business services and processes in project (such as the data warehouse mentioned
multiple customer groups, while reducing annual earlier) business cases and documentation with
physical mail-outs by over 2 million notification the Information Resource Management Commit-
letters (Commonwealth of Australia, 2005d). tee (IRMC) that was chaired by the Deputy Chief
A critical point in the comparison of the two Executive Officer, with smaller projects (such as
architecture frameworks or methods is the parity desktop operating system upgrades) passed to
of the two development artifacts in their capacity to the CIO-chaired Investment Review Board (IRB)
describe the organization, and develop the matched for consideration and guidance. Centrelink used
business and technical system components. The a similar dual committee structure that included
two cases show that it is possible to establish and a Business Investment Committee (BIC) for
maintain a whole-of-enterprise architecture using large business directed projects, and a separate
internally developed or commercially available e-Business governance group for those key busi-
frameworks or methods. While several estab- ness process and online systems developments
lished architecture frameworks and methods exist (Commonwealth of Australia, 2002, 2003a). Both
(eg, The Open Group Architecture Framework, agencies also used working level project boards
Federal Enterprise Architecture Framework), the and joint business-technical architecture panels
creation of an architecting method that closely for the provision of guidance and support (Martin,
reflects the needs and scope of the agency should 2005; Martin & Gregor, 2006; Palmer, 2003).
not be undervalued (Commonwealth of Australia, Importantly, the two agencies used formal
2006d). The ABS method serves as an example of executive management structures to ensure that
an architecture that is tailored to reflect the busi- the architecture was corporately governed and
ness environment and dynamics that characterize managed, particularly in the areas of business
the work of the agency. process and technical systems implementation
and alignment. The two agencies practices were
The Architecture Governance found to be wholly consistent with the Informa-
tion Technology Governance Institute (ITGI)
The governance of the physical architecture is guidelines for corporate boards and executive
an important management dimension for the es- management teams (Information Technology
tablishment and maintenance of process-system Governance Institute, 2003). We would stress
alignment (Information Technology Governance that architectural governance is considered to be
Institute, 2003). In this section of the chapter we a prime responsibility of the government agencys
will present the different lines of process-systems leadership. However, ultimately this responsibility
governance for each agency, and highlight the key flows down to all operational members of staff,
structures for architecture management. particularly those charged with process-systems
The two case agencies use a combination of implementations.
information systems and technologies resource
committees for the ongoing governance and man- The Enterprise Architecture
agement of the business and technical architecture Structures
artifacts (Martin & Gregor, 2006). The ABS used
a dual committee structure supported by business While the adoption of an enterprise architecture
and technology panels and working groups in man- framework or method provides the instantiation
aging the enterprise architecture (Gregor, Hart & tool for government architectures, the ultimate
423
Government Enterprise Architectures
outcome is an agency architecture that accurately process-system alignment condition. In the busi-
reflects the shape of the organizations business ness component (shaded in grey), the ABS first
and its largely technical systems. In the follow- developed sub-structures that described how the
ing sections, we will discuss the resultant agency architecture, technologies and online environ-
architectures and their consistency with interna- ment would be developed and maintained, and
tional architecture standards. a comprehensive taxonomy and management
In the ABS case, the architecting method arrangements for the pivotal corporate business
yielded a highly structured business and techni- processes (ie, Business survey, Household survey,
cal systems architecture (see Figure 6) (Com- Index survey, Administrative By-Product collec-
monwealth of Australia, 2003b; Gregor, Hart & tion, and Derivation collection process classes).
Martin, 2007; Martin, 2005; Palmer, 2003). Importantly, the business process taxonomy com-
The ABS architecture was segmented into ponent of the architecture integrated the primary
three major structural components. In the gen- corporate business processes with the enabling
eral component, the architecture included a set information systems and technologies (see pro-
of principles and objectives that were used in the cess-system mappings later in the chapter).
architectural construction. Importantly, the two In the technical component, the ABS defined
driving objectives of the architecture were to and described its key domain architectures (ie,
ensure that the IT environment is aligned with the applications, security, data management); com-
ABS business imperatives (its mission, outputs mercial systems, tools and technology standards
and outcomes, and processes) and, to help the (eg, XML); software components, objects and
ABS build anThe ABS architecture
IT environment that canwas segmented into
be easily three designs
interface major structural
(eg, objectcomponents. In the
oriented designs,
general component, the architecture included a set of principles and objectives that
changed and extended, so as to retain its alignment application programming interfaces); and the
were used in the architectural construction. Importantly, the two driving objectives of
with changing business imperatives. hardware and software infrastructure required
the architecture were to ensure that the IT environment is aligned with the ABS
These objectives
business reinforced
imperativesthe(its ongoing for business
mission, outputs delivery
and outcomes, and(ie,processes)
mid rangeand,
computing
to help
connection between the architecture and the systems, DeveloperWorks
the ABS build an IT environment that can be easily changed and extended, sotechnology demon-
as to
retain its alignment with changing business imperatives.
Figure 6. ABSFigure
enterprise architecture
6. ABS Enterprise(Source: Palmer,(Source:
Architecture 2003) Palmer, 2003)
aBs aBs
technologies application
and toolsets
aBs enterprise architecture
architecture summary
aBs aBs
commercial components
systems and
tools
Principles and objectives and services
Interfaces
These objectives reinforced the ongoing connection between the architecture and the
process-system alignment condition. In the business component (shaded in grey), the
ABS first developed sub-structures that described how the architecture, technologies
424 and online environment would be developed and maintained, and a comprehensive
taxonomy and management arrangements for the pivotal corporate business processes
Government Enterprise Architectures
stration sandbox, data warehouses, desktop and In the Centrelink case, the Zachman frame-
mobile networks). The scope of the ABS technical work offered the agency an opportunity to segment
systems is extensive and, when combined with the architecture into five business and technical
the business component, shows a good measure systems components and allocate these to senior
of consistency with international architecture executive managers (organizational architects)
standards (see Table 2). (see Figure 7).
A comparative analysis shows that, in terms In formally enunciating its architecture,
of the key requirements for instantiating the ar- Centrelink established a detailed list of archi-
chitecture (ie, architecture coverage, concepts, tecture development principles. The principles
components, representation, and glossary), the that supported the process-system alignment
ABS enterprise architecture is largely consistent condition included each (technical) architecture
with the ISO 15704 reference architecture standard cluster having a unity of purpose which binds
(International Standards Organization, 2000). its unique business processes and data together
The table outlines a combination of business and and, each architecture cluster being owned by a
essential that
technical system artefacts for enterprise
are essentialoperations
for and overall
technical business
systems delivery.
team Important
and having examples
a business
include
enterprise operations the description
and overall business and explication
deliv- of managerial
process sponsor. governance, work activities, and
business processes that are critical for corporate performance outcomes; and the
ery. Important examples include the description The agency business architect held responsibil-
technical system development methods, technologies, toolsets, and operating entities
and explication of managerial governance, work ity for business models, processes, capabilities,
that directly support business delivery. The ABS architecture has benefited from the
activities, and business processes that are criti- and governance
adoption and implementation of the internally developed frameworks (shaded inmethod
architecture grey). that
cal for corporate performance
constructs andoutcomes;
binds theandbusiness
the Centrelink
and technical developed
parts of the sub-architectures
organization. that
technical system development methods, technolo- modelled the organizations primary
In the Centrelink case, the Zachman framework offered the agency an opportunity to business
gies, toolsets, and segment
operatingtheentities that directly
architecture into fivebehaviours
business and and client relationships,
technical systems acomponents
description and
support business delivery. The ABS architecture of the high level business processes
allocate these to senior executive managers (organizational architects) (see (ie, service
Figure 7).
has benefited fromIntheformally
adoptionenunciating
and implemen- its architecture,
delivery Centrelink
management, established
governance, a relationship
detailed list of
architecture
tation of the internally development
developed principles.
architecture The principles
management, that management,
change supported theinformation
process-system
alignment condition
method that constructs and binds the business included each (technical) architecture cluster having
management and staff capability) and operating a unity of
and technical partspurpose which binds its unique processes
of the organization. business processes
(ie, client and data together
registration, and, each
assessment,
architecture cluster being owned by a technical systems team and having a business
process sponsor.
Figure 7. Centrelink enterprise architecture (Source: Treadwell, 2003)
Figure 7. Centrelink Enterprise Architecture (Source: Treadwell, 2003)
enterprise architecture Principles
Governance framework
It Infrastructure
The agency business architect held responsibility for business models, processes,
capabilities, and governance frameworks (shaded in grey). Centrelink developed sub-
architectures that modelled the organizations primary business behaviours and client
relationships, a description of the high level business processes (ie, service delivery
management, governance, relationship management, change management, 425
information management and staff capability) and operating processes (ie, client
registration, assessment, planning, referral, payments, and review) using benefits
Government Enterprise Architectures
planning, referral, payments, and review) using tecture reflects an augmentation of the Zachman
benefits realisation techniques and process maps, framework that has enabled the creation and inte-
a register of significant internal and external gration of the business and technical parts of the
business capabilities (eg, project management, organization (Sowa & Zachman, 1992).
financial management, customer service, service In both agencies, the architectures were found
providers, telephone call centres) that are critical to to have promoted early and continued concen-
customer delivery, and the governance framework tration on the business aspects of the enterprise
that guide and direct the business and supporting including the constituent items (eg, processes,
technical systems (see process-system mappings models, capabilities), information systems and
later in the chapter). technology governance arrangements, integration
The technical segments of the architecture of the business delivery units with the supporting
reflect Centrelinks critical business delivery corporate information, and reuse of architecture
systems. The information architecture includes components for improved business efficiency and
a vast data warehouse, and data/information generic systems design (Gregor, Hart & Martin,
holdings in excess of 215 Terabytes at any point 2007; Martin, 2005). These architecture char-
in time (Martin, 2005). The security architecture acteristics further assisted the development and
covers the mainframe processing and e-Business maintenance of the business and technical systems
platforms with standards-based security access nexus and the agency alignment condition.
monitoring and intrusion systems (Martin,
2005). The IT infrastructure draws together the Other Alignment Mechanisms
mainframe and on-line production and assurance
activities for batch services, mail-outs, and sys- Earlier in the chapter, we mentioned the capacity of
tems upgrades; and the network services that are other social and formal alignment mechanisms to
related to enterprise server and desktop design, promote and sustain alignment. During the course
management and support in local and wide areas. of our work, we were able to examine and detail
The applications portfolio is segmented into the executive mangement support, business planning
larger corporate applications for mainframe, styles, and business planning communications in
production, transaction processing and customer the social alignment context (Martin, 2005; Mar-
servicing, and the critical Web applications re- tin, Gregor & Hart, 2005). The research showed
quired for e-Business delivery in the Intranet and that a strong executive management support
Internet service channels. Again, in the case of regime, a collegiate business planning style that
Centrelink, the combination of the business and utilises business and technical staff, and open
technical architecture components is largely con- internal and external communications channels
sistent with the ISO 15704 reference architecture are compelling social mechanisms of alignment
standard (International Standards Organization, (Martin, 2005; Martin, Gregor & Hart, 2005).
2000) (see Table 2). Similarly, other formal alignment mechanisms,
Some of the more relevant examples of such as the agencies strategic plan, line manage-
compliant components include the description ment structures, balanced score cards, and audit
and explication of the guiding business models, and review actions, were uncovered and formed
corporate governance arrangements, and agency part of the ubiquitous alignment dynamic (Gregor,
business processes; and the secure e-Business de- Hart & Martin, 2007; Martin, 2005). These cases
livery and backroom processing systems that are illustrate the important point that the enterprise
underpinned by network systems infrastructure architecture is one of many alignment mechanisms
for business enablement. The Centrelink archi- present within organizations. In most cases, these
426
Requirement Sub-Requirement Architecture Content ABS Centrelink Examples of Architecture Content
Applicability Enterprise Design Activities required to design, build, maintain and The ABS design activities for surveys and information processing business analysis, re-
and Coverage manage enterprise entities. engineering, prototyping, synthesis. Centrelink design activities value chain analysis,
of Enterprise Enterprise Operation Work activities required in enterprise entities simulation, business redesign, and website design.
Entity Types operations. The ABS work activities data collections, publishing operations, clearing house work.
Centrelink work activities customer service, call centre operations, transaction processing,
notification, and client access.
Enterprise Human Orientation Human roles, responsibilities, authorizations, and The ABS architecture corporate directory and plans details the roles and responsibilities of
Concepts relations to the enterprise the executive management team and staff. Centrelink architecture (governance section) details
roles and responsibilities of the board of management directors, executive management team
Process Orientation Business processes, process functionality, and and staff.
operational behaviours The ABS architecture high level business processes (eg, Census, Business surveys, Household
surveys), and operational behaviours (eg, data extraction, transformation, and loading).
Technology Orientation Technologies employed in enterprise operations and Centrelink architecture (business processes section) eg, service delivery, relationship, and
processes change management, staff capability, registration, assessment, referral.
The ABS architecture ABS technologies and IS toolsets (eg, XML, Common Object Modelling,
Mission Performance Processes or activities involved in the performance of SQL, Java Tools, MS.net). The Centrelink architecture technologies and IS toolsets (eg, Cobol,
the stated enterprise mission DB2, OS390, SQL, Java Tools, SAS, MS.net).
Government Enterprise Architectures
The ABS architecture critical business activities and processes for mission performance (eg,
2005; Palmer, 2003; Treadwell, 2003)
Life Cycle Life cycle representations of the enterprise entities Client groups surveys/information dissemination, publication production processes, systems
and constructs governance). The Centrelink architecture critical business activities and processes for mission
performance (eg, Client registration, customer service, payments/transactions, governance,
Sub-architectures Sub-architecture representations to the user social and welfare support).
The ABS architecture systems/technology lifecycle phases and history (eg, 1980s mainframe
computer retired in 2005, midrange systems implemented in 2000s). The Centrelink architecture
systems/technology lifecycle phases and history (eg, 1980s STRATPLAN M204 DB
implementation, IT Refresh Program in 2003).
The ABS architecture applications, security, data management and IT infrastructure sub-
architectures. The Centrelink architecture business, applications, security, information and IT
infrastructure sub-architectures.
Architectural Information Systems Identification of ISDMs for systems development The ABS architecture ISDM, project management framework, and software development
Components Development methodology. The Centrelink architecture ISDM (Agile based), project management
Methodologies, ISDM framework, joint applications development, and rapid applications development.
Enterprise operations modeling languages or
Modelling Languages or descriptive constructs
Descriptive Constructs The ABS architecture UML (for some software applications), XML and Lotus Workflow
Architect to model and describe agency outputs, operations and processes. The Centrelink
Enterprise Tools Computer-enabled tools that support integration architecture UML (for some software applications), XML, Forte Tools and MS Visio to model
projects and initiatives and describe agency outputs, operations and processes.
Enterprise Modules Enterprise module, building block or product family The ABS mandated toolsets for integration projects XML, Simple Object Access Protocol,
representations UML, IBM Websphere, and MS.Net. The Centrelink toolsets for integration projects XML,
Internet Inter-Orb Protocol, UML, IBM Websphere-MQ Series, CORBA Tools, and MS.Net.
Operational System Description of operational hardware and software The ABS architecture software components, service interfaces, application families, and
Descriptions systems product line architectures. The Centrelink architecture systems clusters (common business,
benefit specific, support, development), business logic modules, service interfaces, and product
families.
The ABS architecture desktop, mid range server, online, mobile hardware and associated
software. The Centrelink architecture desktop, mid range server, mainframe, online, mobiles,
call centres, and vendor and agency developed software.
Architectural Graphical Depictions High level graphical depictions of architecture The ABS architecture rich graphical depictions of the concepts/schemas (eg, IT Infrastructure
structures depicted as a rain forest ecosystem). The Centrelink architecture graphical depictions (eg,
clusters, architecture framework segments).
Architectural Glossary of Terms Reference all major terms used in the architecting The ABS architecture corporate glossary of terms. The Centrelink architecture e-Reference
Glossary approach suite, Data Dictionary, Thesaurus, and other reference tools (eg, EDGE Decision support
systems).
Table 2. Enterprise architecture requirements analysis (Adapted from ISO15704) (source: Commonwealth
427
of Australia, 2003b; Gregor, Hart & Martin, 2007; International Standards Organization, 2000; Martin,
Government Enterprise Architectures
Table 3. ABS process-systems analysis (Source: Gregor, Hart & Martin, 2007; Martin, 2005; Palmer,
2005)
Macro-edit, analysis SAS OLAP tool, SAS Assist tool, Generalized survey winsorisation
component (GENWINS)
Administrative By- Data Capture Natural software system, PL1 system, SAS DB, EAI XML, Centura SQL
Product Collection Windows development tool (CENTURA), Computer assisted coding system
Class (CAC)
Input Quality Assurance Natural software system, PL1 system, SAS DB, CENTURA, Clipper DB
Derivation SAS DB, Lotus Notes DB
Aggregation Generalized survey imputation processor (GENIMP), Generalized survey
estimation facility (GENEST), SAS DB
Macro-edit, analysis SAS OLAP tool, SAS Assist tool
Derivation Data Collect, Capture, Load Lotus 123, MS Excel, Lotus Notes DB, Forecasting-Analysis-Modeling
Collection Class Environment (FAME)
Estimates compilation Forecasting-Analysis-Modeling Environment (FAME), MODIS Online
Visualisation and Analysis System (MOVAS)
Macro-edit Forecasting-Analysis-Modeling Environment (FAME), Lotus 123, MS
Excel
Index Survey Class Data Capture CENTURA, XML, Lotus Notes DB, Constellar Hub collection system,
Laptop computers
Input Quality Assurance CENTURA, Lotus Notes DB
Input Index compilation CENTURA
Index-edit, analysis CENTURA, SQL OLAP
Household Survey Data Capture OMR scanner, BLAISE, HS Office Management system
Class
Input Quality Assurance IPS, BLAISE, Procedural Language for Edit, Amend and Tabulation system
(PLEAT), SAS DB
Derivation IPS, PLEAT, SAS DB
Weighting and Tabulation HS Facility
Edit, analysis SAS DB
428
Government Enterprise Architectures
mechanisms are non-synchronized and tend to architectures can enable the alignment of core
work in different time frames and cycles, transit- agency business processes with corporate infor-
ing between alignment, change and re-alignment, mation systems. In earlier sections of the chapter,
as business circumstances evolve (Gregor, Hart the cases identified the presence of these two
& Martin, 2007; Martin, 2005; Venkatraman, primary and integrated architectural components
Henderson & Oldach, 1993). within the agencies. Architectural drawings and
descriptive documents from both agencies allowed
the analysis and construction of the process-sys-
ALIGNING BUSINESS PROCESSES tem maps that show the linkages and points of
AND INFORMATION SYSTEMS integration (see Tables 3 and 4).
USING ARCHITECTURE The process-system mappings represented
in the tables show that the agencies have taken
The purpose of this chapter was to illustrate how the opportunity to develop accurate depictions
the development and deployment of enterprise of the process and systems relationships that are
Service Delivery Client Assessment Unix Sun Solaris Services, Unix MQ, ISIS Adaptor Forte services,
Management Client Enquiry Novell Directories, Security Management SAMS/ACF2, EDGE
Relationship Planning (Clients) Legislative Decision Support Software, COL e-Business systems.
Management Customer Service Centre, Call Centre, User Assurance Facility.
Change
Management
Information
Management
Governance Planning SAP Infolink, SAS, Brio tools, Superstar systems, Cognos systems.
Review (incl. Audit) Customer Service Centre, Call Centre.
Payments (and Procurement)
Staff Capability Planning (Staff) SAP Infolink, SAS, Brio tools, Superstar systems, Cognos systems,
UML. Customer Service Centre, Call Centre.
Payments (and Remuneration) SAP Infolink, Data Warehouse
Review (Organization and SAP Infolink, SAS, Brio tools, Superstar systems, Cognos systems.
Staffing) Customer Service Centre, Call Centre.
429
Government Enterprise Architectures
directed at delivering government outputs and enabled critical client registration processes in
outcomes. Earlier in the chapter, it was highlighted support of over 6.5 million agency customers.
that the Business Process Taxonomy (ABS) and The important outcome from this alignment
augmented Zachman framework (Centrelink) analysis is the close coupling of the working pro-
were primary artifacts for the enablement of cesses and systems within the agency architecture
process-system alignment. Notably, these artifacts and formative frameworks. The cases demonstrate
reflected several critical process-system relation- that the integration of business processes and
ships in both organizations, as illustrated in the information systems under the architectural um-
aforementioned tables. brella allows the agencies to collect and process
Examples of these relationships drawn from the data, publish information, and deliver critical
ABS architecture shows that the Business survey government social services. These public sector
process was integrated with a Generalized Survey organizations illustrate how the development and
Imputation Processor (GENIMP) system in order maintenance of the architecture can enable the
to create and maintain a complete client data set fusion of the business and technical parts of the
for forward statistics processing. Similarly, the agency. The result is the functional integration of
ABS integrated the BLAISE computer assisted the business processes and information systems
interview software systems into the Business and within the architecture frame (see Figure 8).
Household survey processes so as to improve
data provider management and input quality
for forward processing and statistical products Future Research
publication. Within the Centrelink architecture, Opportunities
the agencys Income Security Integrated System
(ISIS) enabled the client pension and benefits Future research opportunities to investigate and
payment processes, resulting in over 10 million examine enterprise architecture enabled align-
payments each year; while in a further example, ment include studies of private sector architecture
the Centrelink On-Line (COL) e-Business system users, the alignment of other business and tech-
enterpriSe architectUre
Functional integration
business information Systems
architecture architecture
Business Applications
Model
business
Business
Processes
Information outputs
Systems
and
outcomes
Business Security
Frameworks
Business Infrastructure
Governance
430
Government Enterprise Architectures
nology artifacts, the measurement, quantification tion provide opportunities to create and maintain
and maturity of business process and technology close alignment conditions. It is important to make
systems alignment and integration, other social an early determination of what business processes
alignment enablers, and the physical architecting are critical for achieving the agency mission. If
and design processes. parts of the business and/or information systems
components and their relationships are missing,
ongoing business process-systems alignment is
CONCLUSION less likely to be achieved. Third, architects should
recognize that the social enablers of alignment are
In concluding this chapter, we would stress that very important. Close business and information
alignment is very much more than a theoretical systems communications, planning, and manage-
concept. Alignment is a dynamic and ubiquitous ment support provide the interpersonal facilitation
construct that drives organizational performance, mechanisms of the alignment condition. Finally,
particularly with respect to the public sector out- while the architecture provides a formal and highly
comes and outputs required of government. While visible means of linking and integrating business
the government agencys enterprise architecture and information systems within public organiza-
is not a panacea for all the corporate alignment tions, it remains one of many corporate alignment
ills, it does deliver intrinsic value in the creation, mechanisms. Architects should not underestimate
binding and ongoing relationships support of the the importance of other alignment mechanisms,
business and its technical systems. It could also such as audit and executive review, balanced score
be argued that an architecture provides a con- cards, and administrative governance measures,
solidated depiction of public organizations that in drawing together the business processes and
supports the early and deliberate concentration supporting information systems.
on important business issues and performance, In closing, we would contend that establish-
enunciates the information systems and technol- ing and maintaining a public sector enterprise
ogy governance arrangements, unifies and shares architecture is a long and winding journey with
corporate information and data with the operating no final destination. The constant evolution of
business units, and allows the measured reuse business and information systems drives organi-
and efficient replication of business and technical zational and technological change, particularly in
systems artifacts. Each of these attributes serves those government agencies that directly serve the
to combine and align the public agencies business community. However, the architecture journey is
and technical systems. a necessary one if organizations are to success-
The cases presented in this chapter provide fully integrate and align all of their functions,
a number of important lessons for enterprise and deliver the desired outcomes and outputs of
architects. First, the origins of an architecting government.
framework are not necessarily as important as im-
plementing a structured architecture method and
set of procedures. Whether an organization uses REFERENCES
an internally developed or commercially available
architecture framework is generally less critical Alavi, M., & Yoo, Y. (1995). Productivity gains of
than the institution of an architecting method that BPR: Achieving success where others have failed.
suits the workings of the public agency. Second, Information Systems Management, 4, 43-47.
architectures that are reflective of the business and
Burgelman, R.A. (1983). A Process Model of
information systems components of the organiza-
Internal Corporate Venturing in the Diversified
431
Government Enterprise Architectures
432
Government Enterprise Architectures
Commonwealth of Australia. (2006c). Business Deming, W. (Ed.) (1986) Out of the Crisis. Cam-
Plan 2006-2007 (pp. 23). Canberra, Australia: bridge, MA: MIT Press.
Centrelink Publishing. Retrieved February 15,
Drucker, P.F. (Ed.) (1954). The Practice of Man-
2007, from http://www.centrelink.gov.au/In-
agement. New York: Harper and Row Editors.
ternet/Internet.nsf/filestores/co055_0607/$file/
co055_0607en.pdf Drucker, P.F. (Ed.) (1980). Managing in Turbulent
Times First Edition. New York: Harper and Row
Commonwealth of Australia. (2006d). Excel-
Editors.
lence in e-Government Awards 2006 (pp. 22-25).
Canberra, Australia: The Australian Government Earl, M.J. (Ed.) (1989). Management Strategies
Information Management Office. for Information Technology, New York: Prentice
Hall.
Commonwealth of Australia. (2007a). A Guide
to Australian Government Payments September Feurer. R., Chaharbaghi, K., Weber, M., & Wargin,
2007. Canberra, Australia: Centrelink Publish- J. (2000) Aligning Strategies, Processes, and IT:
ing. Retrieved April 20, 2007, from http://www. A Case Study. Information Systems Management
centrelink.gov.au/Internet/Internet.nsf/filestores/ 17 (1), 23-34.
co029_0707/$file/co029_0707en.pdf
Gadd, K.W., & Oakland, J.S. (1995). Discontinu-
Commonwealth of Australia. (2007b). Applica- ous change in a total quality environment. D2D
tion of the Outputs and Outcomes Framework, Lt.: A case study. Business Process Reengineering
The Auditor-General Audit Report No.23, 2007. and Management Journal 1 (2), 7-27.
Canberra, Australia: The Australian National
Gibson, R. (1994). Global information technol-
Audit Office.
ogy architectures. Journal of Global Information
Commonwealth of Australia. (2007c). Centrelink Management 2 (1), 28-38.
Facts and Figures 2007. Retrieved April 20, 2007,
Gordon, J.R., & Gordon, S.R. (2000). Structuring
from http://www.centrelink.gov.au/Internet/In-
the Interaction between IT and Business Units.
ternet.nsf/about_us/facts.htm
Information Systems Management 17 (1), 7-16.
Commonwealth of Australia (2007d), Core Busi-
Gregor, S.D., Hart, D.N., & Martin, N.J. (2007).
ness Processes, Centrelink. Retrieved April 20,
Enterprise Architectures: Enablers of Business
2007, from http://www.centrelink.gov.au/Inter-
Strategy and IS/IT Alignment in Government.
net/Internet.nsf/about_us/strategic_directions.
Information Technology and People 20 (2), 96-
htm
120.
Croteau, A-M., Solomon, S., Raymond, L., &
Grover, V., Teng, J.T.C., & Fiedler, K. (1993). Busi-
Bergeron, F. (2001). Organizational and Techno-
ness process re-design: an integrated planning
logical Infrastructures Alignment. Proceedings
framework. OMEGA: The International Journal
of the Thirty-Fourth Annual Hawaii International
of Management Science 21, 4, 433-447.
Conference on System Sciences, 3-6 January (pp.
234-242). New York: IEEE Press. Hammer, M. (1990). Reengineering work: Dont
automate, obliterate. Harvard Business Review
Davenport, T.H., & Short, J.E. (1990). The new
July/August, 104-112.
industrial engineering: Information technology
and business process redesign. Sloan Manage- Hammer, M., & Champy, J. (1993). Reengineer-
ment Review 31 (4), 11-27. ing the Corporation: A Manifesto for Business
Revolution. New York: Harper Business.
433
Government Enterprise Architectures
Harrington, H.J. (1991). Business Process Im- tures in Australian Government. Unpublished
provement. New York: McGraw Hill. doctoral dissertation, The Australian National
University.
Henderson, J., & Sifonis, J. (1988). Understanding
the Value of IS Planning: Understanding Martin, N.J., & Gregor, S.D. (2005). Requirements
Consistency, Validity and IS Markets, MIS Engineering: A case of developing and managing
Quarterly 12 (2), 187-200. quality software systems in the public sector. In C.
Wohlin, and A. Aybuke, (Ed.), Engineering and
Henderson, J.C., & Venkatraman, N. (1993).
Managing Software Requirements (pp. 353-372).
Strategic Alignment: Leveraging Information
Springer-Verlag, Berlin.
Technology for transforming organizations. IBM
Systems Journal 32 (1), 4-16. Martin, N.J., & Gregor, S.D. (2006). ICT Gov-
ernance: Frameworks for managing Australian
Horovitz, J. (1984). New Perspectives on Strategic
E-Government. Journal of E-Government 2 (3),
Management. Journal of Business Strategy,
19-49.
Winter, 19-33.
Martin, N.J., Gregor, S.D., & Hart, D.N. (2005).
Information Technology Governance Institute.
The Social Dimension of IS/IT Alignment: Six
(2003). Board Briefing on IT Governance, Second
Case Studies of Public Sector Organizations.
Edition, Rolling Meadows, IL: ITGI Press.
Australian Accounting Review 15 (3), 28-38.
International Standards Organization. (2000). ISO
McAdam, R., & Donaghy, J. (1999). Business
15704 Industrial Automation Systems Require-
Process re-engineering in the public sector: A
ments for Enterprise Reference Architectures and
study of staff perceptions and critical success
Methodologies. Vienna, Austria: ISO.
factors. Business Process Management Journal
Johnson, S.J. (1993). Re-engineering: what 5 (1), 33-49.
works, what doesnt? Retail Business Review 61
McDavid, D.W. (1999). A Standard for Business
(5), 28-30.
Architecture Description. IBM Systems Journal
Johnston, H.R., & Carrico, SR. (1988). Developing 38 (1), 12-31.
capabilities to use information strategically. MIS
Miles, M.B., & Huberman, A.M. (1997). Qualita-
Quarterly 12 (1), 37-50.
tive Data Analysis An Expanded Case Book 2nd
Kettinger, W.J., & Grover, V. (1995). Toward a Edition, Thousand Oaks: Sage Publications.
theory of Business Process Change Management.
Murray, R.J., & Trefts, D.E. (2000). The IT Im-
Journal of Management Information Systems 12
perative in Business Transformation. Information
(1), 9-30.
Systems Management 17 (1), 17-22.
Leith, SA. (1994). Critical success factors for
Palmer, J. (2003, March). IT Enterprise Architec-
re-engineering business processes. National
ture at the ABS. Paper presented at the Australian
Productivity Review 13 (4), 559-568.
Government Information Management Office
Lloyd, P.T., & Galambos, G.M. (1999). Technical (AGIMO) Seminar, Enterprise Architecture:
Reference Architectures. IBM Systems Journal Integrating Business and Technology Across the
38 (1), 51-75. Australian Public Service, Canberra, Australia.
Retrieved February 12, 2004, from http://www.
Martin, N.J. (2005). Business Strategy and IS/
agimo.gov.au/practice/delivery/events/2003/
IT Alignment: A study of Enterprise Architec-
ent_arch
434
Government Enterprise Architectures
Parasuraman, A., Zeithaml, V.A., & Berry, L.L. Sowa, J.F., & Zachman J.A. (1992). Extending
(1985). A conceptual model of service quality and formalizing the framework for Information
and its implications for future research. Journal Systems Architecture. IBM Systems Journal 31,
of Marketing 49 (4), 41-50. 590-616.
Porter, M.E. (1980). Competitive Strategy: Tech- Spewak, S.H., & Hill, S.C. (1993). Enterprise
niques for analyzing Industry and Competitors. Architecture Planning: Developing a Blueprint
New York: Free Press. for Data, Applications and Technology, New
York: John Wiley and Sons.
Porter, M.E. (1981). The Contributions of
Industrial Organization to Strategic Management. Targowski, A. (1990). The Architecture and
The Academy of Management Review 6 (4), 609- Planning of Enterprise-Wide Information Man-
620. agement Systems, Harrisburg, PA: Idea Group
Publishing.
Porter, M.E. (1991). Towards a Dynamic Theory
of Strategy. Strategic Management Journal 12, The Economist. (Ed.). (1991). The Good Statistics
95-117. Guide, July 320 (7723), 88.
Pyburn, P. (1983). Linking the MIS Plan with The Economist. (Ed.). (1993). The Good Statistics
Corporate Strategy: An Exploratory Study. MIS Guide, November 328 (7828), 65.
Quarterly 7 (2), 1-14.
The Open Group. (2006). The Open Group Archi-
Raghunathan, B., & Raghunathan, T.S. (1989). tecture Framework Version 8.1.1. Boston, MA:
MIS Steering Committees: Their Effect on The Open Group.
Information Systems Planning. Journal of
Treadwell, J. (2003, March). Centrelink, Capa-
Information Systems, Spring, 104-116.
bilities, and Connections. Paper presented at the
Reich, B.H, & Benbasat, I. (1996). Measuring Australian Government Information Management
linkages between Business and IT Objectives. Office (AGIMO) Seminar, Enterprise Archi-
MIS Quarterly 20 (1), 55-81. tecture: Integrating Business and Technology
Across the Australian Public Service, Canberra,
Reich, B.H, & Benbasat, I. (2000). Factors that
Australia. Retrieved February 12, 2004, from
influence the Social Dimension of Alignment
http://www.agimo.gov.au/practice/delivery/
between Business and Information Technology
events/2003/ent_arch
Objectives. MIS Quarterly 24 (1), 81-113.
Venkatraman, N., Henderson, J.C., & Oldach.
Sabherwal, R., & Chan, Y.E. (2001). Alignment
S. (1993). Continuous Strategic Alignment: Ex-
between Business and Information Systems
ploiting Information Technology Capabilities for
Strategies: A Study of Prospectors, Analyzers,
Competitive Success. European Management
and Defenders. Information Systems Research
Journal 11 (2), 139-149.
12 (1), 11-33.
Zachman, J.A. (1987). A framework for Informa-
Smith, B. (1994). Business Process Re-engineer-
tion Systems Architecture. IBM Systems Journal
ing: more than a buzzword, Human Resources
26, 276-292.
Focus 7 (1), 17-18.
435
Government Enterprise Architectures
Indicative questions that were used in the semi-structured and unstructured case interviews are outlined
as follows:
Do you use Enterprise Architecture in your organization? If so, can you outline the framework or method
used to build the architecture? What resources are used to implement the Enterprise Architecture?
What structures (eg, business, applications, infrastructure) are inherent in the architecture?
Can you please describe the artifacts (eg, systems, specific models, processes, plans, services) that
comprise the architecture?
In your experience, what parts of the architecture work well and what parts work not so well? Why?
Please describe your IS/IT/IM environment and the various components (eg, staffing, governance,
hardware, software, capabilities, technologies, toolsets, languages, modeling languages).
Can you describe some of the development/design activities, business processes and procedures used
to develop your organization and guide its operations?
Do you use any specific systems development and/or project management methods for developing in-
formation systems or executing projects?
Does the systems development method consider the lifecycle aspects of the system?
Are data dictionaries or electronic glossaries available for use within your organization?
Does the management team support you and the work you do?
What type of management support do you get for the business strategy execution, information systems
infrastructure proposals and Enterprise Architecture?
436
Government Enterprise Architectures
Does your organization have a strategic plan? If so, how is the plan compiled ?
Does your organization have a corporate business plan? If so, how is the plan compiled ?
How would you characterize the business planning style (eg, top-down, bottom-up, collegiate, decen-
tralized) in your organization?
What business planning communications are in place for business strategy and information systems
planning activities within the agency? Do you communicate with external stakeholders or parties? If
so, how?
How do you achieve alignment? Do things like strategic planning, business modeling, and non-execu-
tive/executive reviews help alignment? How?
Would you consider that your organizational information systems help you deliver your business strate-
gies? If yes, to what extent do they assist you?
Would you consider that your organizational information systems help you address external business
drivers? If yes, to what extent do they assist you?
Do you meet your annual outputs, in terms of performance, reliability and service level agreement
targets, using the organizational information systems?
Would you say that the business outputs would be negatively impacted if there was less (or a poorer)
fit between information systems infrastructure and business strategy? Please provide reasons for your
answer?
437
438
Compilation of References
Abramson, M.A., Breul, J.D., & Kamensky, J.M. Allan, K. (1994). Speech act classification and defini-
(2006). Six Trends Transforming Government. IBM tion. In R. Asher (Ed.), Encyclopedia of Language
Center for The Business of Government Report. Re- and Linguistics (Vol. 8, pp. 4124- 4127): Oxford:
trieved September 7, 2007, from http://www.busines- Pergamon Press.
sofgovernment.org/pdfs/SixTrends.pdf.
Allega, P.J. (2005); Architecture framework debates
Accenture (2005) Leadership in Customer Service: are irrelevant; Gartner report G00127331, 07 Jun
New Expectations, New Experiences. The Govern- 2005.
ment Executive Series, Accenture, April 2005. Re-
Allega, P.J. (2005); Enterprise Architecture will
trieved May 25th, 2006, from http://www.accenture.
never realize a return on investment; Gartner report
com/NR/rdonlyres/F45CE4C8-9330-4450-BB4A-
G00128285, 24 Jun 2005.
AF4E265C88D4/0/leadership_cust.pdf) .
Alting van Geusau-Ghosh, S., Zeef, P, Toorn, H. van,
Adams, Jonathan; Koushik, Srinivas; Vasudeva, Guru;
& Visch, E. (2006). Globaal Ontwerp Persoonlijke
and Galambos George. (2001). Patterns for E-Business:
Internet Pagina, version 1.2. The Hague, The Nether-
A Strategy for Reuse. Mc Pr Llc, ISBN: 1931182027.
lands: Stichting ICTU. Retrieved July 17, 2007, from
Adigun M. O., & Biyela D. P. (2003) Modelling and http://www.e-overheid.nl/data/files/PIP/Globaal_Ont-
Enterprise for re-Engineering: A Case Study. In the werp_versie_1[1].2.pdf.pdf
2003 annual research conference of the South Afri-
Ambite, Jos Luis; Giuliano, Genevieve; Gordon, Pe-
can institute of computer scientists and information
ter; Decker, Stefan; Harth, Andreas; Jassar, Karanbir;
technologists on Enablement through technology
Pan, Qisheng; and Wang, LanLan. (2005). Argos: An
(SAICSIT 2003), ACM.
Ontology and Web Service Composition Infrastructure
Agha, Gul, A. (2002) . Adaptive Middleware. Com- for Goods Movement Analysis, Information Sciences
munications of the ACM, 45(6). Institute School of Policy, Planning, and Development,
Digital Gov. Website.
Agranoff, R. and McGuire, M. (2001). Big questions
in public network management research. Journal of Ambler, S. W. (2002). Agile Modeling: Effective
Public Administration Theory and Research 11(3), Practices for Extreme Programming and the Unified
295326. Process. New York, New York: John Wiley & Sons.
Alexander, C; Ishikawa, S., Silverstein, M., Jacobson, American Customer Satisfaction Index (ACSI), e-
M., Fiksdahl-King, I., and Angel, S. (1977). A pattern Government Satisfaction Index (2005) Number of
Language. Oxford University Press. e-GOV sites measuring satisfaction surges, satisfac-
tion growth stalls. March 15, 2005. Retrieved May
Alfred Tat-Hei. (July/August 2002). Reinventing Local
25th, 2006, from
Government and the E-government initiative. Public
Administration Review, 62(4): 434-444.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Compilation of References
Anderson, Ross (2001). Security Engineering: A Embedded and Real-Time Computing Systems and
Guide to Building Dependable Distributed Systems. Applications, Hong Kong, China.
New York: Wiley.
ATHENA Project. (2005). D.A6.1, Specification of a
Ankolekar, V. (2003). Application Development Basic Architecture Reference Model.
Technology & Tools: Vulnerabilities & Threat
Austin, J. L. (1962). How to do things with Words.
Management with Secure Programming Practices, a
Cambridge, MA: Harvard University Press.
defense in-depth approach. GIAC Security Essentials
Certification (GSEC) Practical Assignment, Version Austria (2006). Administration on the Net An ABC
1.4b, Option 1. 10 November 2003. Guide to E-Government in Austria. Vienna, Austria:
Oesterreichische Computer Gesellschaft. Retrieved
Anthopoulos L., Siozos P., & Tsoukalas I. A. (2007)
July 17, 2007, from http://www.cio.gv.at/egovernment/
Applying Participatory Design and Collaboration in
umbrella/Administration_on_the_Net.zip.
Digital Public Services for discovering and re-design-
ing e-Government services. Government Information Babb, J. (2006). Signification and Information Systems
Quarterly, Volume 24, Issue 2, April 2007, Pages Security Policies: a Semiotic Analysis and Case Study.
353-376, ElSevier. Virginia Commonwealth University School of Busi-
ness, Department of Information Systems.
Anthopoulos, L., & Manos A. (2005) e-Government
beyond e-administration. The evolution of municipal Bace, R., Mell, P. (?). NIST-SP800-31 Intrusion Detec-
area environments could establish a digital framework tion Systems. NIST Special Publication on Intrusion
of confidence for citizens. In the 5th European Confer- Detection Systems.
ence on e-Government, (ECEG 2005) University of
Antwerp, Belgium, 16-17 June 2005. Bach, K., & Harnish, R. M. (1979). Linguistic Com-
munication and Speech Acts. Cambridge MA: MIT
Anthopoulos, L., & Tsoukalas, I.A. (2005) The imple- Press.
mentation model of a Digital City. The case study of
the first Digital City in Greece: e-Trikala. Journal of Barker, W. (June 2004). NIST Special Publication
e-Government, Vol.2, Issue 2, 2005. Haworth Press, 800-60 Volume 1: Guide for Mapping Types of Infor-
Inc., University of Southern California, Center for mation and Information Systems to Security Catego-
Digital Government. ries. National Institute of Standards and Technology.
Computer Security Division.
Arens, Yigal; and Rosenbloom, Paul. (2002). Respond-
ing to the Unexpected, USC/Information Sciences Barnett W., Presley A., Johnson M., & Loles D.H.
Institute, NSF Workshop. (1994); An Architecture for the Virtual Enterprise;
1994 IEEE International Conference on Systems,
Armour Dr. F., Kaisler Dr. S., Getter J., & Pippin D. Man, and Cybernetics, 1 (pp. 506-511)
(2003); A UML-driven Enterprise Architecture case
study; Proceedings of the 36th Hawaii International Battle, S., Bernstein, A., Boley, H., Grosof, B., Grun-
Conference on System Sciences (HICSS) 2003. inger, M., Hull, R., et al. (2005). Semantic Web Services
Framework (SWSF).
Armour, F. J., Emery, C., Houk, J., Kaisler, S. H., &
Kirk, J.S. (2007). The Integrated Enterprise Lifecycle: Bauer, Johannes M. (2004). Harnessing the Swarm:
Enterprise Architecture, Investment Management and Communications Policy in an Era of Ubiquitous Net-
System Development. In Saha, P. (Ed.). Handbook of works and Disruptive Technologies. Communications
Enterprise Systems Architecture in Practice. Hershey, & Strategies, 54, 2nd quarter.
PA: IGI Global Information Science Reference. Baum, C., & Di Maio, A. (2000). Gartners Four Phases
Arora, A., Ramnath, R., Ertin, E., Sinha, P. (2005). of E-Government Model. Gartner Group Research
ExScal: Elements of an Extreme Scale Wireless Sen- Note. Retrieved June 15, 2007, from http://aln.hha.
sor Network, 11th IEEE International Conference on dk/IFI/Hdi/2001/ITstrat/Download/Gartner_eGov-
ernment.pdf.
439
Compilation of References
Bayens, G.I.H.M. (2006). E-Government in The Betz, C. T. (2006). Architecture and Patterns for IT
Netherlands: An Architectural Approach, Via Nova Service Management, Resource Planning, and Gov-
Architectura, October 9, 2006. Retrieved July 17, 2007, ernance: Making Shoes for the Cobblers Children.
from http://www.via-nova-architectura.org. San Francisco, CA: Morgan Kaufmann.
Bayens, G.I.H.M., et al. (2007). Nederlandse Overheid Bevir, M., & Rhodes, R. A. W. (2001). A Decentered
Referentie Architectuur (NORA) v. 2.0. The Hague, Theory of Governance (Working Paper 2001-10).
The Netherlands: Stichting ICTU. Retrieved July 17, Berkeley: Institute of Governmental Studies, Uni-
2007, from http://www.e-overheid.nl/atlas/referen- versity of California.
tiearchitectuur/
Bittler, R.S., & Kreizman, G. (2005). Gartner Enter-
B-dossier (2007). B-dossier project Website. Enschede, prise Architecture Process: Evolution 2005. Gartner
The Netherlands: Telematica Instituut. Retrieved July Group Research Note, G00130849. Retrieved July 27,
17, 2007, from http://www.b-dossier.nl. 2007, from http://www.gartner.com/research/spot-
light/asset_50080.jsp.
Beck, K. (1999). Extreme Programming Explained:
Embrace Change. Boston: Addison-Wesley Profes- Booch, G., Rumbaugh, J., and Jacobson I. (1999). The
sional. Unified Modeling Language User Guide. New York,
NY: Addison-Wesley Object Technology Series.
Bernard, S, A. (2005). An Introduction To Enterprise
Architecture: Second Edition. Bloomington, Indiana: Borins, Sandford. (2006). The Challenge of Innovating
AuthorHouse. in Government (2nd ed.). Retrieved 5 June 2007 from
IBM Center for the Business of Government Web
Bernard, S. (2001). Evaluating Clinger-Cohen Com-
site: http://www.businessofgovernment.org/pdfs/Bo-
pliance in Federal Agency Chief Information Officer
rinsReprint.pdf
Positions. Doctoral Dissertation, Virginia Polytechnic
Institute and State University, Blacksburg, VA. Bos, H. (2005). De ICT-strategie van de Gemeente
The Hague (2001-2007). Utrecht, The Netherlands:
Bernard, S. A. (2004). An introduction to enterprise
Informatiehuis. Retrieved July 17, 2007, from
architecture. Bloomington, IN: AuthorHouse.
http://www.egem.nl/projecten/voorhoedegemeen-
Bernard, S. A. (2004). Enterprise Architecture Man- ten/kennisconferentie2006/documenten/Evaluatie%
agement Maturity (EAMM) Enterprise Architecture 20Haagse%20aanpak%20door%20Informatiehuis.
Development, Documentation and Measurement. pdf?searchterm=None
Lecture notes for the enterprise architecture course
Bovens, M.; and Zouridis, S. (2002). From Street-Level
sponsored by Korea IT Industry Promotion Agency,
to System-Level Bureaucracies. Public Administration
Seoul, Korea.
Review 62(2): 174-184.
Berners-Lee, T., Hendler, J., & Lassila, O. (2001).
Bozeman, B., and Straussman, J.D. (1990). Public
The Semantic Web. SCIENTIFIC AMERICAN, May
management strategies: Guidelines for managerial
2001.
effectiveness. San Francisco, CA: Jossey-Bass, Inc.
Bernus, P., & Nemes, L. (1996). A framework to
BPMI. Business Process Management Initiative,
define a generic enterprise reference architecture and
www.BPMI.org.
methodology. Computer Integrated Manufacturing
Systems, 9(3), 179-191. Brahim Medjahed, Abdelmounaam Rezgui, Athman
Bouguettaya, & Ouzzani, M. (2003). Infrastructure
Bernus, P., Nemes, L., & Schmidt, G, (Eds.). (2003).
for E-Government Web Services. IEEE Internet
Handbook on Enterprise Architecture. Berlin :
Computing, 7(1), 58-65.
Springer.
440
Compilation of References
Breul, J.D. (2006). What is Transformation?. In M.A. C4ISR Architecture Framework (Version 2.0) (1997);
Abramson, J.D. Breul, & J.M. Kamensky (Eds.), Six C4ISR Architectures Working Group (USA) ; Depart-
Trends Transforming Government (p. 7). Retrieved ment of Defense (USA)
16 April 2007 from IBM Center for the Business of
Cabinet Office (2005), Transformational Government,
Government Web site: http://www.businessofgovern-
Enabled by IT. Retrieved 31st July 2007 from http://
ment.org/pdfs/SixTrends.pdf
www.cio.gov.uk/documents/pdf/transgov/transgov-
Breul, J.D., & Morales, A. (2007, June). 2007-2008 strategy.pdf
Research Announcement: Providing Cutting Edge
Cabinet Office (2007), Chief Technology Officer
Knowledge to Government Leaders. Retrieved 16
Council. Retrieved 31st July 2007 from http://www.
July 2007 from IBM Center for Business of Govern-
cio.gov.uk/chief_technology_officer/index.asp
ment Web site: http://www.businessofgovernment.
org/pdfs/Research_Announcement_07.pdf Cap Gemini Ernst & Young (2003) Online availabil-
ity of public services. How is Europe progressing?
Browne, A., & Wildavsky, A. (1984). Should Evolution
Information Society DG, 2003.
become Implementation: Pressman and Wildavsky.
CCA. (1996). Clinger-Cohen Act of 1996: Information
Bruce, E. (2005, 21-22 February). Linking Enterprise
Technology Management Reform, Public Law 104-106,
Architectures between Multiple Government Agencies
Fiscal Year 1996 Defense Authorization Act.
The NZ Experience. Paper presented at the Confer-
ence in Enterprise Architecture for Government, Center for Information Technology, National Institutes
Canberra, Australia. of Health Canadian Trusted Computer Product Evalu-
ation Criteria (CTCPEC). Accessed from http://www.
BSI DISC. (1998). The TickIT Guide A Guide to
alw.nih.gov/Security/FIRST/papers/criteria/ctcpec1.
Software Quality Management System, Consturction
ps.
and Certification to ISO 9001.
Checkland, P. (1981). Systems Thinking, Systems
Burger@Overheid (2005). BurgerServiceCode, versie
Practice. Chichester: Wiley.
2.1. The Hague, The Netherlands: Burger@Overheid.
nl. Retrieved July 17, 2007, from http://www.burger. Chen, D., Vallespir, B., & Doumeingts, G. (1997).
overheid.nl/files/burgerservicecode_nl.pdf GRAI integrated methodology and its mapping onto
generic enterprise reference architecture and method-
Burger@Overheid (2006). Evaluatieonderzoek 2006.
ology. Computers in Industry, 33, 387-394.
The Hague, The Netherlands: Burger@Overheid.nl.
Retrieved July 17, 2007, from http://www.burger.over- Chief Information Officer (CIO) Council (2001) A Prac-
heid.nl/files/b@o_evaluatieonderzoek_bop_2006. tical Guide to Federal Enterprise Architecture, version
pdf 1.0, February 2001. Retrieved May 25th, 2006, from
http://www.gao.gov/bestpractices/bpeaguide.pdf
Burk, R.R. (2006, 21-22 February). Enterprise Gov-
ernance: Defining the Long Term Vision. Paper pre- Child, J. (1972). Organizations, Structure, Environ-
sented at the Conference in Enterprise Architecture ment, and Performance: The Role of Strategic Choice.
for Government, Canberra, Australia. Sociology, 6 1-22.
BuyIT Best Practice Network & Shared Services Ad- Chrissis, B. M., Konrad, M., & Shrum, S. (2007).
visory Group. (2006). Shared Services in the Public CMMI Guidelines for Process Integration and
Sector: Vision. Retrieved 27 April 2007 from BuyIT Product Improvement. 2nd Ed. Addison-Wesley.
Best Practice Network Web site: http://www.buyitnet.
org/Best_Practice_Guidelines/SharedServicesPub- CIO Council. (1999). Federal Enterprise Architecture
Sect/docs/G1%20Vision.pdf Framework, Version 1.1. Retrieved February 20, 2008
from http://www.whitehouse.gov/omb/egov/a-1-fea.
html
441
Compilation of References
Claudio Masolo, Stefano Borgo, Aldo Gangemi, Ni- Defence Architecture Framework Resources (CD)
cola Guarino, & Oltramari, A. (2003). WonderWeb: (Version 1.0) (2005); Australian Government, Depart-
Deliverable D1.8, Ontology Library (IST Project ment of Defence (Chief Information Officer Group)
2001-33052).
Deloitte and Touch (2001). The Citizen as Customer.
Clements, P. et. al. (2003). Software Architecture in CMA Management, 74(10), 58.
Practice, (2nd ed.) New York, NY: Addison Wesley.
Demchenko, Y., Gommans, L., De Laat, C., Ouden-
CMG. Capacity Management Group aarde, B., Tokmakoff, A., Snijders, M., et al. (2005).
Security Architecture for Open Collaborative Environ-
Collison C., & Parcell G. (2005); KM Self-Assess-
ment. Paper presented at the European Grid Conference
ment; Retrieved 01/04/2007 from Learning to Fly
- EGC 2005, Amsterdam, The Netherlands.
Website (http://www.chriscollison.com/l2f/whatiskm.
html#assessment) Deming W. E. (1982). Out of the Crisis, Cambridge,
MA: MIT Press.
Commission on Federal Paperwork. (1977). Informa-
tion resources management: A report of the com- Denmark (2006). Architecture for e-Government in
mission on federal paperwork. Washington, D.C.: Denmark. Offentlig Information Online. Retrieved
Government Printing Office. July 17, 2007, from http://www.oio.dk/arkitektur/
eng.
CommonCriteria.org (2005) Common Criteria for In-
formation Technology Security Evaluation (CCITSE). Department of Defense Directive 5200.28-STD (De-
Accessed from http://www.commoncriteriaportal. cember 1985) Trusted Computer System Evaluation
org/public/consumer/index.php?menu=2. Criteria (TCSEC). Accessed from http://www.boran.
com/security/tcsec.html.
Computer Systems Laboratory of the National In-
stitute of Standards and Technology. (1993). FIPS Department of Defense. (2007). The Department of
Publication 183. Defense Architecture Framework Version 1.0. The
Department of Defense. Retrieved February 20,
COPS 03-1. http://www.cops.usdoj.gov/txt/fact_
2008 from http://www.defenselink.mil/cio-nii/docs/
sheets/e01060007.txt
DoDAF_Volume_I.pdf DoDAF 1.5
Cross, Cross, S. et al. (2002). SEI Independent Research
Derks, W.L.A., & Lankhorst, M.M. (2006). Definitie
and Development Projects, TECHNICAL REPORT
en conceptualisatie van het Bdossier. Technical
CMU/SEI-2002-TR-023 ESC-TR-2002-023.
Report TI/RS/2006/013. Enschede, The Netherlands:
CSIRT Services. Carnegie Mellon University. (2002). Telematica Instituut. Retrieved July 17, 2007, from
Software Engineering Institute. CERT Coordination https://doc.telin.nl/dscgi/ds.py/Get/File-61820
Center. Stelvio bv, The Netherlands; PRESECURE
Desai, Anand. (2005). Special Issue: Adaptive Com-
Consulting GmbH, Germany. Accessed July 2002
plex Systems. CACM 49(5).
from http://www.cert.org/csirts/services.html.
Devadoss, P., Pan, S., & Huang, J. (2002) Structura-
D. Apostolou, L. Stojanovic, T. Pariente Lobo, &
tional analysis of e-Government initiatives: a case
Thoenssen, B. (2005). Towards a Semantically-Driven
study of SCO. Decision Support Systems, vol. 34, p.
Software Engineering Environment for eGovernment.
253-269, ElSevier.
In (Vol. 3416, pp. 157 168): LNAI.
DGI. (2003). Deutscher Corporate Governance Kodex.
DAML. www.daml.org. The DARPA Agent Markup
Retrieved May 21, 2003 from http://www.corporate-
Language (DAML).
governance-code.de/ger/kodex/index.html.
Davenport, T. H. (1992). Process innovation: Reengi-
Dietz, J. L. G., & Mulder, J. B. F. (1998). Organisational
neering work through information technology. Boston,
transformation requires constructional knowledge of
MA: Harvard Business School Press.
442
Compilation of References
business systems. Paper presented at the 31st Annual Government. D121Services and process models
HICCS. functional specifications, 2002. Retrieved August
15th, 2007, from http://www.egov-project.org/egov-
Digtalgovernment. Government agencies affiliated
site/eGOV_D121.zip.
with dg.o, are known as the Digital Government
Consortium. Member agencies often partner with NSF Elliman, T., Irani, Z., & Jackson, P. (2007). Establish-
research performers and the private sector to leverage ing a framework for eGovernment research: project
information technology research and identify financial VIEGO. Transforming Government: People, Process
resources to help build the Digital Government of the and Policy, 1(4), 364-376.
21st Century. www.digitalgovernment.org
Emery, G.R. (2003, July 21). It aint easy getting to
DIP Project. (2004). D9.3 e-Government ontology. green: Most agencies making progress but manage-
ment goals yet to be achieved. WashingtonTechnology.
DoD. (2006). Department of Defense Chief Information
Retrieved Oct 25, 2007 from http://www.washington-
Officer Desk Reference. Vol.1 Foundation Documents.
technology.com/print/18_8/21225-1.html
United States Department of Defense,
EquaTerra & International Public Management As-
Donaldson, L. (1999). The Normal Science of Struc-
sociation for Human Resources [IPMA-HR]. (2006,
tural Contingency Theory, in S.R.
June). Human Resources Transformation in Public
Donnelly, M. (April 2000). An Introduction to LDAP. Sector Organizations. Retrieved 2 May2007 from
Obtained from http://www.ldapman.org/articles/in- the IPMA-HR Web site: http://www.ipma-hr.org/pdf/
tro_to_ldap.html. TransformationWhitePaper.pdf
Dool, F. van den, Keller, W.J., Wagenaar, R. & Eriksson, H; and Penker, M. (2000). Business Model-
Hinfelaar, J.A.F. (2002) Architectuur elektronische ing with UML: Business Patterns at Work. New York,
overheid. Samenhang en Samenwerking. Zoetermeer, NY: John Wiley.
The Netherlands: Verdonck Klooster & Associates.
European Commission (2002) eEurope 2005: An
Retrieved July 17, 2007, from http://www.e-overheid.
information society for all. European Commission
nl/data/files/architectuur/architectuurelektronische-
- COM 263, 2002. Retrieved August 15th, 2007, from
overheid.pdf.
http://europa.eu.int/eeurope
Doumeingts G., Ducq Y., Vallespir B., & Kleinhans
European Commission (2004). European Interoper-
S., (2000). Production management and enterprise
ability Framework for Pan-European e-Government
modelling. Computers in Industry, 42, 245-263.
Services, version 1.0. Retrieved July 17, 2007, from
Drazin, Robert; and Van de Van, Andrew H. (1985). http://ec.europa.eu/idabc/servlets/Doc?id=19529.
Alternative Forms of Fit in Contingency Theory. Ad-
Fayyad, Usama; and Uthurusamy, Ramasamy. (2002).
ministrative Science Quarterly, 30, 514-539.
Into Evolving Data Mining Solutions for Insights.
Duttaroy A. (2005); Five Ms of Meta Data; DM Review CACM, 45,(8).
(http://www.dmreview.com) April 2005.
Federal Enterprise Architecture (FEA) Working Group
EA Shared Interest Group. (2005). Advancing Enter- (2002) E-Gov Enterprise Architecture Guidance
prise Architecture Maturity, version 2.0. American Common Reference model. (July 25, 2002). Retrieved
Council for Technology/Industry Advisory Council. August 15th, 2007, from http://www.feapmo.gov/re-
sources/E-Gov_Guidance_Final_Draft_v2.0.pdf
EFQM. (2006). The EFQM Excellence Award, In-
formation Brochure for 2006, Version 2. European Federal Enterprise Architecture (FEA) Working
Foundation for Quality Management. Group (2005) Enabling Citizen-Centered Electronic
Government. 2005-2006 FEA-PMO Action Plan.
eGov Consortium (2002) IST Project 2000 28471. Retrieved August 15th, 2007, from www.whitehouse.
An Integrated Platform for Realising One-Stop
443
Compilation of References
444
Compilation of References
Godart, C. Saliou H., & Bignon, J.C. (2001) Asyn- tional Conference on Electronic Commerce Edited by:
chronous Coordination of Virtual Teams in Creative Marijn Janssen, Henk G. Sol, and Ren W. Wagenaar.
Applications (co-design or co-engineering): Require- Copyright ACM 1-58113-930-6/04/10.
ments and Design Criteria. IEEE.
Governance and Performance: New Perspectives
Goldkuhl, G. (1996). Generic business frameworks Washington, DC: Georgetown University Press pp.
and action modeling. Paper presented at the 1st In- 263-291.
ternational Workshop on Communications Modeling
Government of British Columbia (2004). e-Govern-
- The Language/Action Perspective.
ment Plan. Office of the Chief Information Officer,
Goldstein, H (2005) Who Killed the Virtual Case Ministry of Management Services. Retrieved June 18,
File?, IEEE Spectrum September 2005, http://www. 2007, from www.cio.gov.bc.ca/ebc/egovplan20041215.
spectrum.ieee.org/print/1455 pdf.
Good, J (2004) Defining an Architecture Roadmap Government of Ontario, Office of the Premier (2006).
that talks to the Enterprise Culture, EA Conference Description of the role of the Treasury Board / Man-
Europe 2004, London, IRM UK Ltd agement Board of Cabinet. Retrieved 30th July 2007,
from http://www.premier.gov.on.ca/team/Committee.
Good, J and Fairhead, N (2007) Getting started in
asp?Team=2
Enterprise Architecture EA Conference Europe 2007,
London, IRM UK Ltd (copyright Serco Consulting, Government of Western Australia (2004). e-Gov-
used with permission) ernment Strategy for the Western Australian Public
Sector. Office of e-Government, Department of the
Gore, A. (1993). Creating a government that works
Premier and Cabinet. Retrieved June 18, 2007, from
better and costs less: The report of the national per-
http://www.egov.dpc.wa.gov.au/documents/e-govern-
formance review. New York, NY: Penguin Books.
ment_strategy.doc.
Gortmaker, J. (2008). Designing a Reference Archi-
Grance, T. et. al. (January 2004). NIST Special Publi-
tecture for the Accountable & Adaptive Orchestration
cation 800-61: Computer Security Incident Handling
of Public Service Networks. Unpublished doctoral
Guide: Recommendations of the National Institute of
dissertation (forthcoming). Delft University of Tech-
Standards and Technology.
nology.
Grance, T. et. al. (October 2003). NIST Special
Gortmaker, J., & Janssen, M. (2004). Business Process
Publication 800-64: Security Considerations in the
Orchestration in e-Government: A Gap Analysis.
Information System Development Life Cycle: Rec-
International Resources Management Association
ommendations of the National Institute of Standards
(IRMA).
and Technology.
Gortmaker, J., & Janssen, M. (2007). Automating Gov-
Gregor, S., Hart, D., & Martin, N. (2007). Enterprise
ernmental Cross-Agency Processes Using Web Service
architectures: enables of business strategy and IS/IT
Orchestration: A Gap Analysis. In L. Al-Hakim (Ed.),
alignment in government. Information Technology &
Global E-Government: Theory, Applications and
People, 20(2), 96-120.
Benchmarking. Hershey: Idea Group Publishing.
Gresov, C. (1989). Exploring Fit and Misfit with Mul-
Gortmaker, J., Janssen, M., & Wagenaar, R. W. (2005).
tiple Contingencies. Administrative Science Quarterly
Accountability of Electronic Cross-Agency Service-
34, 431-453.
Delivery Processes. EGOV2005, 4th International
Conference on Electronic Government, 49-56. Groenlund, A. (1997). Public Computer Systems A
New Focus for Information Systems Research. Infor-
Gortmaker, Jeffrey; Janssen, Marijn; and Wagenaar,
mation Infrastructure and Policy, 6, 47-65.
Ren W. (2004). The Advantages of Web Service
Orchestration in Perspective. ICEC04, Sixth Interna-
445
Compilation of References
Gronlund, A. (2005). Whats In a Field Exploring the Arlington, VA: PricewaterhouseCoopers Endowment
eGoverment Domain. Paper presented at the 38th Ha- for the Business of Government.
waii International Conference on System Sciences.
Hjort-Madsen, K. (2007). Institutional patterns of
H. Koontz, Donnell, C. O., & Weihreich, H. (1980). enterprise architecture adoption in government.
Management (7th Edition ed.): McGraw Hill. Transforming Government: People, Process and
Policy, 1(4), 333-349.
Hall, M. (2005). Building and Enterprise Architec-
ture Website and Repository. Lecture notes for the Ho, S M. & Caldera, C. (2005). Eight Challenges
enterprise architecture course sponsored by Korea IT Faced By a Defense Contractor: An Interview with
Industry Promotion Agency, Seoul, Korea. a Security Chief. (ISC)2 Newsletter May-June 2005.
Obtained from https://www.isc2.org/cgi-bin/content.
Hall, W.P. (2000). Managing Technical Documentation
cgi?page=766 on July 18, 2006.
for Large Defence Projects: Engineering Corporate
Knowledge. In J.P.T. Mo & L. Nemes (Eds.) Global Ho, S M. (2006). Conceptualizing Security Archi-
Engineering, Manufacturing and Enterprise Networks tecture based on Enterprise Architecture. End-of-
(pp.370-378). Boston: Kluwer Academic Publishers. Coursework Statement. School of Information Studies,
Syracuse University. Obtained from http:// Web.syr.
Hammer, M.; and J. Champy. (1993). Reengineering
edu/~smho/research.htm.
the Corporation: A Manifesto for Business Revolution.
New York, NY: Harper. Ho, S M. (2006). The Mechanism Discovery of Person-
nel Anomaly Detection. ISOneWorld 2006 Doctoral
Harris, S. (2003). CISSP All-In-One Exam Guide,
Symposium, Las Vegas, Nevada, 19-21 April 2006.
Third Edition. McGraw-Hill/Osborne, Emeryville,
CA. ISBN: 0-07-222966-7. Ho, S M. (2008). Towards A Deeper Understanding of
Personnel Anomaly Detection. Encyclopedia of Cyber
Harvard Policy Group on Network Enabled Services
Warfare and Cyber Terrorism. IDEA Publications.
and Government (2000). Eight Imperatives for Leaders
in a Networked World: Guidelines for the 2000 Election Hogwood, B. W., & Gunn, L. A. (1984). Policy Analy-
and Beyond, John F. Kennedy School of Government, sis for the Real World. Oxford: Oxford University
Cambridge, MA. Retrieved June 18, 2007, from www. Press.
ksg.harvard.edu/stratcom/hpg/index.htm.
Holmes, A. (2007). Gov. Perdue knows IT. Government
Hash, J. et. al. (March 2005). NIST Special Publica- Executive. Retrieved August 8, 2007, from http://
tion 800-66: An Introductory Resource Guide for blogs.govexec.com/techinsider/archives/2007/08/
Implementing the Health Insurance Portability and gov_aligns_it_with_government.php
Accountability Act (HIPAA) Security Rule. National
Holowczak, Richard D.; Soon, Ae Chun; Artigas,
Institute of Standards and Technology.
Francisco J.; and Atlurit, Vijayalakshmi. (2003).
Hay, D. (1996). Data Models Patterns. NY: Dorste Customized Geospatial Workflows for E-Government
House Publishing. Services, Proceedings of the IEEE/WIC International
Conference on Web Intelligence, IEEE.
Hepp, M., Leymann, F., Domingue, J., Wahler, A.,
& Fensel, D. (2005, October 18-20). Semantic Busi- Hong Kong (2007). The HKSARG Interoperability
ness Process Management: A Vision Towards Using Framework. Version: 5.1. Hong Kong: Government
Semantic Web Services for Business Process Man- of the Hong Kong Special Administrative Region,
agement. Paper presented at the IEEE ICEBE 2005, Office of the Government Chief Information Officer.
Beijing, China. Retrieved July 17, 2007, from http://www.ogcio.gov.
hk/eng/infra/download/s18.pdf
Hiller, J. & Belanger, F. (2001). Privacy Strategies
for Electronic Government. E-Government Series.
446
Compilation of References
Horn, R. E. (1998). Visual language: Global com- ITU (1995), Open Distributed Processing - Reference
munication for the 21st century. Bainbridge Island, Model - Part 3: Architecture, ITU Recommendation
WA: MacroVu. X.903 | ISO/IEC 10746-3. Geneva, Switzerland: In-
ternational Telecommunication Union.
Hoven, J. van den, Wagenaar, R., Daskapan, S.,
Manders, N. Kenny, S. & Eldin, A.A. (2005), Manag- Iyer B., Shankaranarayanan G., & Wyner G. (2006);
ing Identity, Privacy & Profiles. Technical Report TI/ Process Coordination Requirements: Implications for
RS/2005/101, Enschede, The Netherlands: Telematica the design of Knowledge Management Systems; The
Instituut. Retrieved July 17, 2007, from https://doc. Journal of Computer Information Systems; Volume
telin.nl/dscgi/ds.py/Get/File-52040/TUD_sotas.pdf 46, Issue 5; 2006
Hughes, & Owen E. (1994). Public Management J Ramanathan and R. Ramnath. (2006). Co-engi-
and Administration: an introduction. New York: St. neering Business, Information Use, and Operations
Martins Press. Systems for IT-enabled Adaptation. Book chapter in
Adaptive Technologies and Business Integration:
ICTU. (2007). Flyer NORA v2. Retrieved June, 15,
Social, Managerial and organizational Dimensions,
2007, from http://www.e-overheid.nl/data/files/archi-
Publisher IDEAS.
tectuur/flyer-nora-v2.pdf
Jain, Sanjay; and McLean, Chuck; (2003). Model-
IFIPIFAC Task Force on Architectures for Enterprise
ing and Simulation for Emergency Response, NISY
Integration, (1999). GERAM: Generalised Enterprise
Technical Report, NISTIR 7071.
Reference Architecture and Methodology Version
1.6.3, Annex to ISO WD15704, Requirements for Jansen, W. & Karygiannis, T. NIST Special Publica-
enterprise-reference architectures and methodologies. tion 800-19: Mobile Agent Security. National Institute
March, pub: IFIP and IFAC. of Standards and Technology.
Iftikhar Z., Eriksson I.V., & Dickson G.W. (2003); Janssen, M., & Hjort-Madsen, K. (2007). Analyzing
Developing an Instrument for Knowledge Management Enterprise Architecture in National Governments:
Project Evaluation; Electronic Journal of Knowledge The cases of Denmark and the Netherlands. Paper
Management, Vol1, Issue 1, 2003, pp55-62 presented at the Hawaii International Conference on
System Sciences (HICSS), Hawaii, Big Island.
Infocomm Development Authority of Singapore
(2005). Singapore E-Government 2005. 2005 Report Janssen, M., Gortmaker, J., & Wagenaar, R. (2006).
on Singapore E-Government. Retrieved November Web Service Orchestration in Public Administration:
13, 2007, from www.igov.gov.sg/NR/rdonlyres/ Challenges, Roles, and Growth Stages. Information
C586E52F-176A-44B6-B21E-2DB7E4FA45D1/11228/ Systems Management, Spring 2006, pp. 4455.
2005ReportonSporeeGov.pdf.
Janssen, M., Gortmaker, J., & Wagenaar, R. W. (2006).
Innella, P. (December 2001). An Introduction to IDS. Web Service Orchestration in Public Administration:
SecurityFocus.com. Obtained from http://www.secu- Challenges, Roles, and Growth Stages. Information
rityfocus.com/infocus/1520. Systems Management(Spring 2006), 44-55.
Inter-Agency Benchmarking & Best Practices Council. Janssen, M., Kuk, G., & Wagenaar, R. W. (2008). A
(1996). Government Process Classification Scheme. Survey of Web-based Business Models for e-Govern-
Retrieved Dec. 2001, from http://www.va.gov/feds- ment in the Netherlands. Government Information
best/index.htm Quarterly, 25(2) (forthcoming).
Ishida, T. (2002). Digital City Kyoto. Communications Japan Quality Award Committee. (2000). Japan Qual-
of the ACM, July 2002, vol.45, No.7. ity Award Award Criteria: Innovation and Creation
for Competitiveness 2000 Ed. Japan Quality Award
IT Governance Institute. (2000): Management
Committee. Tokyo.
Guidelines for COBIT. Retreived June 29, 2004 from
http://www.isaca.org
447
Compilation of References
Jiang, H.C., & Mo, J.P.T. (2001). Internet Based http://egovstandards.gov.in/egs/eswg5/ enterprise-
Design System for Globally Distributed Concurrent architecture-working-group-folder/standards-and-
Engineering. Journal of Cybernetics and Systems, architectures-v2.pdf/ download
32(7), 737 754.
Kelly, S.; and Allison. M. A. (1998). The Complexity
Johannesson, P. (2001). A Language/Action based Advantage. New York, NY: McGraw Hill.
Approach to Information Modeling. In Rossi M. &
Kenniscentrum. (2007). NORA 2.0 (Nederlandse
Siau K. (Eds.), Information Modeling in the new Mil-
Overheid Referentie Architectuur): Stichting ICTU.
lenium: IDEA Publishing.
Kettl, D. (2000). The global public management revo-
Johannesson, P., & Wohed, P. (1998). Deontic Speci-
lution: A report on the transformation of governance.
fication Patterns - Generalisation and Classification.
Washington, D.C.: Brookings Institution Press.
Paper presented at the International Conference on
Formal Ontologies in Information Systems, Trento, Kettl, D. (2002). The transformation of governance.
Italy. Baltimore, MD: The Johns Hopkins University
Press.
Jones, S., Hackney, R., & Irani, Z. (2007). Towards
e-government transformation: conceptualising citizen King, C., Dalton, C., and Osmanoglu, T. Security
engagement: A research note. Transforming Govern- Architecture: Design, Deployment & Operations.
ment: People, Process and Policy, 1(2), 145-152. Osborne/McGraw-Hill, Berkeley, CA. ISBN: 0-07-
213385-6. 2001.
Jonkers H., van Buuren R., Arbab F., de Boer F., Bon-
sangue M., Bosma H., ter Doest H., Groenewegen L., Klein J; ECM best practices for the Enlightened En-
Scholten J.G., Hoppenbrouwers S., Iacob M., Janssen terprise, KM World; Vol 14, Issue5, May 2005
W., Lankhorst M., van Leeuwen D., Proper E., Stam A.,
van der Torre L., & van Zanten G.V. (2003); Towards Klijn, Erik-Hans. (1996). Analyzing and Managing
an Language for Coherent Enterprise Architecture Policy Processes in Complex Networks. Administra-
Descriptions; Proceedings of the Seventh IEEE In- tion and Society, 28(1), 90-119.
ternational Enterprise Distributed Object Computing Kling, R. et al. (2001). Transforming Coordination:
Conference (EDOC) 2003. The Promise and Problems of Information Technology
Kankanhalli A., & Tan B.C.Y. (2004); A review of in Coordination. In G. Olson, T. Malone, J.B. Smith.
Metrics for Knowledge Management Systems and The Interdisciplinary Study of Coordination. Mahwah,
Knowledge Management Initiatives; Proceedings of NJ: Lawrence Erlbaum Associates.
the 37th Hawaii International Conference on System Klischewski, R. (2004). Semantic Web for e-Govern-
Sciences 2004. ment - a Research Agenda. AIS SIG SEMIS Newsletter
Kaplan, R. S.; and D. P. Norton. (1996). The Balanced Volume 1, Issue 1.
Scorecard. Boston MA: Harvard. Klischewski, R., & Jeenicke, M. (2004). Semantic
Karygiannis, T. & Owens, L. (November 2002). Web Technologies for Information Management
NIST SP-800-48 Wireless Network Security - 802.11, within e-Government Services. Paper presented at
Bluetooth and Handheld Devices. Recommendations the 37th Hawaii International Conference on System
of the National Institute of Standards and Technology. Sciences.
Computer Security Division - Information Technol- Kosanke, K., Vernadat, F., & Zelm, M. (1999).
ogy Laboratory - National Institute of Standards and CIMOSA: enterprise engineering and integration,
Technology. Computers in Industry, 40, 83-97.
KBSt Publication Series (2003) SAGA: Standards Kramer, J. (2003). The CISA Prep Guide: Mastering
and Architectures for e-government Applications, the Certified Information Systems Auditor Exam.
Version 2.0. Retrieved August 15th, 2007, from
448
Compilation of References
Wiley Publishing, Indianapolis, Indiana. ISBN: 0- Conference (EDOC 2007). Los Alamitos, CA: IEEE
471-25032-5. Computer Society.
Kreizman, G., Baum, C., & Fraga, E. (2003). Gartner Lankhorst, M.M., et al. (2005). Enterprise Architecture
Enterprise Architecture: A Home for E-Government. at Work Modelling, Communication, and Analysis.
Gartner Group Research Note, TU-20-1831. Retrieved Berlin: Springer-Verlag.
June 15, 2007, from http://www.gartner.com/research/
Lapkin A. (2004); A users guide to architectural pat-
spotlight/asset_50080.jsp.
terns; Gartner Report G00124049, 22 October 2004
Kuhn, D. Richard, et. al. (August 2002). NIST Special
Lapkin A. (2004); Architecture Frameworks: How to
Publication 800-46: Security for Telecommuting and
Choose; Gartner Report G00124230, 19 November
Broadband Communications: Recommendations of the
2004
National Institute of Standards and Technology.
Larsen, L.B., & Vesterager, J. (1999, 15-17 March).
Kuhn, D. Richard, et. al. (January 2005). NIST Special
Framework and methodology for creating virtual en-
Publication 800-58: Security Considerations for Voice
terprises - Initial results from the Globeman21 project.
Over IP Systems: Recommendations of the National
Paper presented at the 5th International conference on
Institute of Standards and Technology.
Concurrent Enterprising: The Concurrent Enterprise
Ladley J. (2002); Beyond the Data Warehouse: in Operation. The Hague, the Netherlands.
Information Management Maturity; DM Review
Laurence, P.R. and J.W. Lorsch. (1967). Organization
(http://www.dmreview.com) August 2002.
and Environment (Boston: Division of Research,
Lakoff, G.; and Johnson, M. (1980). Metaphors we live Graduate School of Business Administration, Harvard
by. Chicago, IL: University of Chicago Press. University.
Landsbergen, D. and Wolken, G. (2001). Realizing the Lawrence, T. B., Dyck, B., Maitlis, S., & Mauws,
Promise: Government Information Systems and the M. K. (2006). The underlying structure of continu-
Fourth Generation of Information Technology, Public ous change. MIT Sloan Management Review, (2006,
Administration Review. Summer), 59-66.
Lane, J.-E. (1995). The Public Sector: Concepts, Lawry, P., Albrecht, C., Nunamaker, J., & Lee, J.
Models and Approaches (2nd ed. ed.): Sage Publica- (2002) Evolutionary development and research on
tions. Internet-based collaborative writing tools and proc-
esses to enhance eWriting in an eGovernment setting.
Lankhorst, M. M., & Derks, W. L. A. (2007). Towards
Decision Support Systems, vol. 34, (2002), 229-252,
a Service-Oriented Architecture for Demand-Driven
ElSevier.
e-Government. Paper presented at the 11th IEEE In-
ternational EDOC Conference (EDOC 2007). Layne, K., & Lee, J. (2001). Developing fully func-
tional e-government: a four stage model. Government
Lankhorst, M. M., Derks, W. L. A., Fennema, P., Iacob,
Information Quarterly, 18(2), 122-136.
M. E., & Joosten, S. (2006). B-dossier architectuur.
Enschede: Telematica Instituut. Li, H., & Williams, T.J., (1997). Some extensions to
the Purdue Enterprise Reference Architecture (PERA)
Lankhorst, M.M. & Derks, W.L.A. (2006). B-dos-
- I. Explaining the Purdue architecture and the Purdue
sier architectuur. Technical Report TI/RS/2006/014,
methodology using the axioms of engineering design.
Enschede, The Netherlands: Telematica Instituut.
Computers in Industry, 34, 247-259.
Retrieved July 17, 2007, from https://doc.telin.nl/dscgi/
ds.py/Get/File-61826 Li, H., & Williams, T.J., (2000). The interconnected
chain of enterprises as presented by the Purdue
Lankhorst, M.M. & Derks, W.L.A. (2007). Towards
Enterprise Reference Architecture. Computers in
a Service-Oriented Architecture for Demand-Driven
Industry, 42, 265-274.
e-Government. 11th IEEE International EDOC
449
Compilation of References
Light, Paul C (1999). The Changing Shape of Govern- Maier, M.W. Emery, D. and Hilliard, R. (2001). Soft-
ment The Brookings Institute, Policy Brief # 45 ware Architecture: Introducing IEEE Standard 1471,
IEEE Computer. April 2001, Vol. 34-4, 107-109.
Lind M., & Goldkuhl, G. (2001). Generic Layered
Patterns for Business Modeling. Paper presented at Malladi, S., & Min, K.J., (2005). Decision support
the 6th International Workshop on the Language- models for the selection of Internet access technolo-
Action Perspective on Communication Modeling, gies in rural communities. Telematics and Informatics,
Montreal, Canada. 22, 201219.
Linder, S. H. (1999). Coming to Terms With the Public- Malone, T.; and K. Crowston. (2001). The Interdis-
Private Partnership: A Grammar of Multiple Meanings. ciplinary Study of Coordination. In Coordination
American Behavioral Scientist, 43(1), 35-51. Theory and Collaboration Technology, Gary M.
Olson, Thomas W.
Lohr, Steve and Markoff, John (in press) Windows Is So
Slow, but Why? New York Times; March 27, 2006 Mandelbrot, B. B. (1982). Fractal Geometry of Nature.
New York, NY: W H Freeman.
Longstaff, P.H. (2005). Security, Resilience, and
Communication In Unpredictable Environments Such Mandler, Niemann, von Henning (2007). Serviceori-
as Terrorism, Natural Disasters and Complex Tech- entierte Architekturen: Governance, Compliance und
nology Program for Information Resources Policy, Security. Duesseldorf, Euroforum.
Harvard University.
Marco D. (2002); Meta Data & Knowledge Man-
Lopez, J. (2002); Return on Enterprise Architecture: agement: Capability Maturity Model; DM Review
Measure it in Asset Productivity; Gartner Report: (http://www.dmreview.com) August/September/Oc-
RPT-0702-0119, 19 July 2002 tober/November 2002.
Lowi, T. J. (1979). The End of Liberalism: The Sec- Martin P. (2006); Measuring KM-Based improve-
ond Republic of the United States. New York: W.W. ments in decision-making; personal communication
Norton. through the ACTKM forum (http://www.actKM.org)
March 2006.
Lyons-Burke, Kathy. (October 2000). NIST Special
Publication 800-25: Federal Agency Use of Public Mason, M. (2005). Obtained from www.asisonline.
Key Technology for Digital Signatures and Authen- org/certification/ ppt/CPPPersonnelSecurityTrain-
tication. Federal Public Key Infrastructure Steering ing8-2-01.ppt, July 1, 2006. Lyondell/Equistar Chemi-
Committee. cal Companies.
MacKenzie, C.M., Laskey, K., McCabe, F., Brown, P. Massey, C. (2003). Enterprise assistance: responses
F., & Metz, R. (2006). Reference Model for Service from the public and private sectors. Journal of Small
Oriented Architecture 1.0, OASIS Committee Speci- Business and Enterprise Development, 10(2), 128-
fication. OASIS Open 2005-2006. 135.
Mackenzie, D. (2002). The Science of Surprise - Matthes, F., Wittenburg, A. (2004). Softwarekarten
Can complexity theory help us understand the real zur Visualisierung von Anwendungslandschaften und
consequences of a convoluted event like September. ihren Aspekten Eine Bestandsaufnahme. Retrieved
DISCOVER, 23(2). December 19, 2004, from http://wwwmatthes.in.tum.
de/de/main.htm.
Maes, R. (1999). A Generic Framework for Informa-
tion Management, PrimaVera Working Paper 99-03, Maynard & Ruighaver (2006). What Makes a Good In-
Amsterdam, The Netherlands: University of Am- formation Security Policy: A Preliminary Framework
sterdam, Department of Accountancy & Information For Evaluating Security Policy Quality. Proceedings
Management. of the 5th International Security Conference, Las
Vegas.
450
Compilation of References
McDavid, D.W. (1999). A standard for business ar- Mo, J.P.T., Zhou, M., Anticev, J., Nemes, L., Jones,
chitecture description. IBM Systems Journal, 38 (1), M., Hall, W. (2006). A study on the logistics and per-
12-31. Retrieved 20 April 2007 from IBM Systems formance of a real virtual enterprise. International
Journal Web site: http://www.research.ibm.com/jour- Journal of Business Performance Management, 8(2-
nal/sj/381/mcdavid.html 3), 152-169.
Medjahed, B., Benatallah, B., Bouguettaya, A., Ngu, Mohanty S., & Chand M. (2005); 5iKM3 Knowledge
A. H. H., & Elmagarmid, A. K. (2003). Business-to- Management Maturity Model; TATA Consultancy
business interactions: issues and enabling technolo- Services 2005.
gies. The VLDB Journal The International Journal
Monmonier, M., 2ed. (1996). How to lie with maps.
on Very Large Data Bases, 12(1), 59-85.
Chicago, IL: University of Chicago Press.
Mednikarov, B.K., & Dereliev, P.H. (2004). Structured
Moon, M. Jae. (2002). The Evolution of E-government
description of naval tasks. Information and Security,
among municipalities, Rhetoric or Reality Public Ad-
13, 25-34.
ministration Review (July / August), 62:4: 424-433.
Mendonca, D., Jefferson, T., Harrald, J. (March ,2007).
Moon, M.J. (2002). The evolution of e-government
Collaborative Adhocracies and Mix-and-Match Tech-
among municipalities: rhetoric or reality?. Public
nologies in Emergency Management. Communications
Administration Review, 62(4), 424-433.
of the ACM.
Moore A. (2005); What makes government different?;
Metainnovation (2004); KM Concepts Module 8: Met-
KM World Vol 14 Issue 6; Jun 2005
rics; Retrieved May 2006 from Metainnovation KM
Concepts course (www.metainnovation.com) Morl, G. (2002). A New Mind for Policy Analysis
Westport CT: Praeger.
Mettau, P. (2005). mijnoverheid.nl Publieke Dienst-
verlening in de toekomst. The Hague: Het Expertise Morgan, Gareth (1997) Images of Organisation, 2nd
Centrum. Edition, London. Sage Publications
Mintzberg, H. (1996). Managing Government, Gov- Motta, E., Domingue, J., Cabral, L., & Gaspari, M.
erning Management. Harvard Business Review(May- (2003). IRS II: A Framework and Infrastructure for
June 1996). Semantic Web Services. Paper presented at the 2nd
International Semantic Web Conference.
MIPT. (2004). Responder Knowledge base, National
Technology Emergency Plan for Emergency Response Musgrave, R. A. (1959). The Theory of Public Finance.
to Catastrophic Terrorism, MIPT (National Memo- New York: McGraw-Hill.
rial Institute for the Prevention of Terrorism), April,
www.rkb.mipt.org. . NASCIO. (2003). NASCIO Enterprise Architecture
Maturity Model, Version 1.3. National Association
Missikoff, M. (2002). Harmonise an ontology-based of State Chief Information Officers.
approach for semantic interoperability. ERCIM News,
51, 33-34. Nassar, M., et. al. (June 2006). Intrusion Detection
Methods for VoIP Applications. The Third Annual
Mo, J.P.T., & Menzel, C. (1998). An integrated process VoIP Security Workshop. Accessed June 2006 from
model driven knowledge based system for remote cus- http://www.iptel.org/voipsecurity/
tomer support. Computers in Industry, 37, 171-183.
National Institute of Science and Technology. Federal
Mo, J.P.T., Beckett, R., Nemes, L. (2005, 26-28 Information Processing Standard Publication 1999:
September). Technology Infrastructure for Virtual Standards for Security Categorization of Federal
Organisation of Tooling. Paper presented at Sixth Information and Information Systems.
IFIP Working Conference on Virtual Enterprises
(PRO-VE05). Valencia, Spain.
451
Compilation of References
National Institute of Science and Technology. Special tion power. The Journal of Enterprise Architecture,
Publication 800-37: Guide for the Security Certification 1 (1), 31-40.
and Accreditation of Information Systems.
Niemann, K. (2006). From Enterprise Architecture
National Institute of Science and Technology. Special to IT-Governance. Wiesbaden: Vieweg.
Publication 800-12. An Introduction to Computer
Security: The NIST Handbook. National Institute of Niles, I., & Pease, A. (2001, October 17-19). Towards
Standards and Technology, Technology Administra- a Standard Upper Ontology. Paper presented at the
tion. Published by U.S. Department of Commerce. 2nd International Conference on Formal Ontology
in Information Systems (FOIS-2001), Ogunquit,
National Institute of Science and Technology. Spe-
Maine.
cial Publication 800-53 (Guide for the Selection and
NIMS. National Incident Management System, www.
Specification of Security Controls for Federal Infor-
fema.gov.
mation Systems),
NIST. (2007). Baldrige National Quality Program.
National Institute of Science and Technology. Spe-
NIST. Technology Administration. Department of
cial Publication 53A: Techniques and Procedures for
Commerce.
Verifying the Effectiveness of Security Controls in
Information Systems. Nohria, N. (1992). Is a Network Perspective a Useful
Way of Studying organizations? In N. Nohria and
National Institute of Science and Technology. Spe-
R. G. Eccles (eds.), Networks and organizations:
cial Publication 800-60 (Guide for Mapping Types
Structure, Form and Fit (Boston: Harvard Business
of Information and Information Systems to Security
School Press).
Categorization Levels),
Noran O. (2003); A systematic evaluation of the C4ISR
National Research Council (2004). McGroddy, James
AF using ISO1504 Annex A (GERAM); Computers in
C., and Lin, Herbert S., Editors, A Review of the FBIs
Industry vol 56 (2005) pp 407-427.
Trilogy Information Technology, Committee on the
FBIs Trilogy Information Technology Modernization Noran O. (2005); An analysis of the Zachman frame-
Program, Computer Science and Telecommunications work of enterprise architecture from the GERAM
Board, Division on Engineering and Physical Sciences, perspective; Annual Reviews in Control Vol 27 (2003)
National Research Council of the National Academies, pp 163-183.
. ISBN:0-309-09224-8. Retrieved on August 6 2007
Noran, O. (2005). A systematic evaluation of the C4ISR
from http://www.nap.edu/catalog/10991.html
AF using ISO15704 Annex A (GERAM). Computers
Nemes, L., & Mo, J.P.T., (2004). Collaborative Net- in Industry, 56, 407-427.
works in Australia Challenges and Recommenda-
OToole, Laurence and Meier, Kenneth. (2000). Net-
tions. In L.M. Camarinha-Matos, H. Afsarmanesh
works, Hierarchies, and Management: Modeling the
(Eds.). Collaborative Networked Organizations
nonlinearities, in Heinrich, C. and L. Lynn (eds.).
(pp.97-102). Boston: Kluwer Academic Publishers.
OAG. Open applications group. Uses XML for every
New Zealand, Security in the Government Sector
where to every where integration.
(2002). Obtained from http://www.security.govt.
nz/sigs/html/chapter7.html, June 29, 2006. OASIS: www.oasis-open.org, OASIS (Organization
for the Advancement of Structured Information Stan-
NIA. (2006). Government Information Technology
dards) is a not-for-profit, international consortium that
Architecture-Maturity Model, Version 1.0 (Draft).
drives the development, convergence, and adoption of
National Information Society Agency. Korea.
e-business standards
Niemann, K. (2005). IT Governance and Enterprise
Office of e-Envoy UK. (2002). e-Services Develop-
Architecture - Impact of IT cost reduction on innova-
ment Framework Primer v1.0b. Retrieved Noe 2002,
452
Compilation of References
453
Compilation of References
Peitgen, H.; Jurgens, H.; and Saupe, D. (1992). Peristeras, V., Tsekos, T., & Tarabanis, K. (2003, 31
Chaos and Fractals: New Frontiers of Science. Berlin: Jul.-2 Aug.). Building Domain Models for the (e-) Gov-
Springer Verlag. ernance System. Paper presented at the International
Conference on Politics and Information Systems:
Peristeras V., & Tarabanis K. (2004). Governance
Technologies and Applications (PISTA 03), Orlando,
Enterprise Architecture (GEA): Domain models for
Florida, USA.
e-Governance. In the 6th international conference on
Electronic commerce (ICEC), ACM. Platt, M. (2007). CIO Definitions Enterprise Architec-
ture. Retrieved August 13, 2007, from http://searchcio.
Peristeras V., & Tarabanis K. (2004a). Advancing the
techtarget.com/sDefinition/0,,sid19_gci1081274,00.
Government Enterprise Architecture - GEA: The Ser-
html
vice Execution Object Model. In R. Traunmuller (Ed.),
Electronic Government, DEXA, 3rd International Plya, G. (1971). How to Solve it: A New Aspect of
Conference EGOV 2004, Zaragoza, Lecture Notes in Mathematical Method. Princeton, NJ: Princeton
Computer Science 3183 (pp. 476-482): Springer. University Press.
Peristeras V., & Tarabanis K. (2004b). The Gover- Pongsiri, N. (2003). Public-Private Partnerships in
nance Enterprise Architecture (GEA) Object Model. Thailand: A Case Study of the Electric Utility Industry.
In M. A. Wimmer (Ed.), Knowledge Management in Public Policy and Administration, 18(3), 69.
Electronic Government, Lecture Notes in Computer
Porter, M. (1985). Competitive Advantage: Creating
Science 3035, (5th IFIP International Working Con-
and Sustaining Superior Performance. New York,
ference, KMGov 2004, Krems, Austria, May 27-29)
NY: The Free Press.
(pp. 101-110): Springer.
Porter, M. E. (1998). Competitive Strategy: Techniques
Peristeras V., & Tarabanis K. (2005, 22-24 April 2005).
For Analyzing Industries And Competitors. New York,
The GEA Generic Process Model for Public Adminis-
NY: Free Press.
tration Service Execution. Paper presented at the 8th
International Conference for Business Information Powel, A., & Picolli, G. (2004) Virtual Teams: A Re-
Systems (8th BIS 2005), Poznan, Poland. view of Current Literature and Directions for Future
Research. The DATA BASE for advances in Information
Peristeras V., & Tarabanis K. (2006, Mar. 27-29).
Systems-Winter 2004, vol 35, No.1. ACM.
Reengineering the public administration modus ope-
randi through the use of reference domain models and Prabandham, S.M. (2007, June). A Case Study in
Semantic Web Service technologies. Paper presented Service Component Reusability and Interoperability:
at the 2006 AAAI Spring Symposium, The Semantic HR LOB Technical Reference Model. Unpublished
Web meets eGovernment (SWEG), Stanford Univer- manuscript.
sity, California, USA.
Prime Ministers Strategy Unit (2004). Strategy
Peristeras V., Goudos S., Vitvar T., Mocan A., & Ta- Survival Guide v2.1. Retrieved 31st July 2007 from
rabanis K. (2006). Towards Semantic Web Services http://www.cabinetoffice.gov.uk/strategy/downloads/
for Public Administration based on the Web Service survivalguide/skills/s_pestle.htm
Modeling Ontology (WSMO) and the Governance
Enterprise Architecture (GEA). Paper presented at Provan, K. G., & Milward, H. B. (2001). Do Networks
the 5th EGOV International Conference, DEXA Really Work? A Framework for Evaluating Public-Sec-
Krakow, Poland. tor Organizational Networks. Public Administration
Review, 61(4), 414-423.
Peristeras, V., & Tarabanis, K. (2000). Towards an
Enterprise Architecture for Public Administration : A Punia, Devendra K.; and Saxena, K. B. C. (March
Top Down Approach. European Journal of Informa- 2004). E-government services and policy track: Man-
tion Systems, 9(Dec. 2000), 252-260. aging inter-organizational workflows in eGovernment
454
Compilation of References
services, Proceedings of the 6th international confer- From Texaco and Star Enterprise. MIS Quarterly,
ence on Electronic commerce. 14(4), 385-403.
Qurashi, R. (2005). Eight Steps for Integrating Security Riggins, F. J., & Mukhopadhyay, T. (1994). Interde-
Into Application Development. MCI NetSec. Published pendent benefits from interorganizational systems:
by ComputerWorld, December 6, 2005. Obtained from opportunities for business partner reengineering.
http://www.computerworld.com/securitytopics/secu- Journal of Management Information Systems, 11(2),
rity/story/0,10801,106805,00.html. 37-57.
R.E. Asher (ed.). (1994). The Encyclopedia of Language Riley, B. T. (2003). e-Government vs. e-Governance
and Linguistics. Oxford: Pergamon. (International Tracking Survey Report, No 4). Ottawa:
Commonwealth Centre for E-Governance.
Ramanathan, J. (1999). Enterprise Integration with
NIIIP Protocols, SME, ASME Autofact Proceed- Robertson J. (2003); Metrics for knowledge manage-
ings. ment and content management; Step Two Designs
(www.steptwo.com.au) February 2003, accessed
Ramanathan, J. (2005). Fractal Architecture for the
May 2006.
Adaptive Complex Enterprise, Communications of
the ACM, May. Rodriquez, E. (2005). Physical Network Security.
Obtained from http://www.skullbox.net/physicalnet-
Ramanathan, J. and Ramnath, Rajiv. (2004) IT Ar-
worksecurity.php, June 29, 2006.
chitecture and the Case for Lean eBusiness Process
Management, Knowledge Supply and Information Rosati, L., Lai, M. E., & Gnoli, C. (2004, 10th Decem-
Logistics in Enterprises and Networked organiza- ber). Faceted Classification for Public Administration.
tions, Fraunhofer-Institute for Software and Systems Paper presented at the Semantic Web Applications
Engineering ISST. and Perspectives (SWAP) - 1st Italian Semantic Web
Workshop, Ancona, Italy.
Ramanathan, J.; and Beswick, R. (2000). Imperative:
Why Process-based Architecture is Essential for Suc- Rosenau, P. V. (1999). Introduction. The Strengths and
cessful Supply-Chain Participation. EAI Journal. Weaknesses of Public-Private Policy Partnerships.
American Behavioral Scientist, 43(1), 10-34.
Ramnath, R. and Desai, A. (2007). City of Columbus,
311 Impact Evaluation, Final Report. Rosetta Net. http://www.rosettanet.org/.
Ramnath, R., Landsbergen, D. (May, 2005) IT-enabled Ross, J. (2003). Creating a strategic IT architecture
sense-and-respond strategies in complex public orga- competency: Learning in stage. MISQ Quarterly
nizations. Communications of the ACM, 48(5). Executive, 2(1), 31-43.
Reding, V. (2005) i2010: The European Commissions Ross, J.W. (2006). Design Priorities for the IT Unit of
new programme to boost competitiveness in the ICT the Future. MIT Sloan CISR Research Briefings, 4(3D).
sector. European Committees press releases. Re- Retrieved September 7, 2007, from http://mitsloan.mit.
trieved August 15th, 2007, from http://europa.eu.int/rap- edu/cisr/papers.php.
id/pressReleasesAction.do?reference=SPEECH/05/
Ross, J.W., Weill, P., & Robertson, D.C. (2006). Enter-
format=HTML&aged=0&language=EN&guiLang
prise Architecture as Strategy. Boston, MA: Harvard
uage=en)
Business School Press.
Rhodes, R. A. W. (1997). Understanding Governance:
Ross, R. et. al. (February 2005). NIST Special Pub-
Open University Press.
lication 800-53: Recommended Security Controls
Richardson, L., Jackson, B. M., & Dickson, G. (1990). for Federal Information Systems. National Institute
A Principle-Based Enterprise Architecture: Lessons of Standards and Technology, Computer Security
Division.
455
Compilation of References
Ross, R.. et. al. (May 2002). NIST Special Publication Schekkerman J. (2004); Trends in Enterprise Archi-
800-37: Guide for the Security Certification and Ac- tecture: How are organizations progressing?; Institute
creditation of Federal Information Systems. National for Enterprise Architecture Developments, 2004.
Institute of Standards and Technology, Computer
Schekkerman J. (2006); How to survive in the jungle
Security Division.
of Enterprise Architecture Frameworks: Creating
Rosser B. (2002); Architectural styles and Enterprise or choosing an Enterprise Architecture Framework;
Architecture; Gartner report AV-17-4384, 13 August Trafford Publishing; 3rd Edition 2006 (First published
2002. 2004).
Sackett, P., Rose, T., & Adamson, V. (2003). The Schekkerman, J. (2005). Trends in Enterprise Archi-
importance of business process clarification within tecture 2005: How are Organizations Progressing?
the virtual enterprise. Journal of Small Business and 1st Ed. Institute for Enterprise Architecture Develop-
Enterprise Development, 10(3), 298-305. ments (IFEAD).
Saha, P. (2004); A real options perspective to Enterprise Scholl, H.J. (2003). E-government: A special case of
Architecture as an investment activity; (accessed 24 IT-enabled Business Process Change, Chapter pre-
Aug 05 through The Open Group Architecture Forum sented at the 36th Hawaiian Conference of Systems
http://www.opengroup.org/architecture). Sciences, Hawaii.
Saha, P. (2006). A Real Options Perspective to Enter- Schubert, P., & Hausler, U. (2001) e-Government meets
prise Architecture as an Investment Activity. Journal e-Business: A Portal Site for Startup Companies in
of Enterprise Architecture, 2(3), 32-52. Switzerland. In the 34th International Conference on
System Sciences (IEEE 2001)
Saha, P. (2007a). A Synergistic Assessment of the
Federal Enterprise Architecture Framework against Schulman J. (2004); Architecture Frameworks provide
GERAM (ISO 15704:2000). In Saha, P. (Ed.). Hand- system road maps; Gartner Report G00125007, 29
book of Enterprise Systems Architecture in Practice. November 2004.
Hershey, PA: IGI Global Information Science Refer-
Schwartz, Peter. (2003). Inevitable Surprises: Thinking
ence.
Ahead in a Time of Turbulence. New York: Gotham
Saha, P. (Ed.). (2007b). Handbook of Enterprise Books.
Systems Architecture in Practice. Hershey, PA: IGI
SCOR. http://wwwsupply-chain.org.
Global Information Science Reference.
Searle, J. R. (1969). Speech Acts. An Essay in the
Sairamesh, J., Lee, A., & Anania, L. (2004). Informa-
Philosophy of Language. London: Cambridge Uni-
tion Cities. Communications of the ACM February
versity Press.
2004, vol. 47, No.2.
Searle, J. R. (1975). A taxonomy of illocutionary acts. In
Salmela, H.; and Spil, T.A.M. (2002). Dynamic and
Gunderson K. (Ed.), Language, Mind and Knowledge.
emergent information systems strategy formulation
Minneapolis: University of Minesota.
and implementation. International Journal of Infor-
mation Management, 22, 441-460. Semantic Interoperability Community of Practice
(SICoP). (2005). Introducing Semantic Technologies
SAP. (2000). R/3 System SAP Solution Map. Retrieved
and the Vision of the Semantic Web, White Paper
Dec. 2000, from www.sap.com
Series Module 1.
Schekkerman J. (2004); Enterprise Architecture
Semy, S. K., Pulvermacher, M. K., & Obrst, L. J. (2004).
Validation; Institute for Enterprise Architecture De-
Toward the Use of an Upper Ontology for U.S. Gov-
velopments, August 2004.
ernment and U.S. Military Domains: An Evaluation
(No. 04B0000063): The MITRE Corporation.
456
Compilation of References
Shankararaman, V., & Lee, B.S. (1994). Knowl- Spears, J. (2006). Defining Information Security.
edge-Based Safety Training System (KBSTS) - A The Pennsylvania State University, Smeal College of
Prototype Implementation. Computers in Industry, Business. 5th Security Conference 2006. Las Vegas,
25, 145-157. Nevada.
Shen, H., Wall, B., Zaremba, M., Chen, Y., & Browne, Spewak, S. H. (1992). Enterprise architecture plan-
J. (2004). Integration of business modelling methods ning: Developing a blueprint for data, applications,
for enterprise information system analysis and user and technology. New York, NY: Wiley.
requirements gathering. Computers in Industry, 54,
Springer, L.M. (n.d.). Retirement Systems Moderniza-
307-323.
tion. Retrieved 1 August 2007 from the OPM Web
Shinonome, M., Hashimoto, H., Fuse, A., & Mo, J.P.T. site: http://www.opm.gov/rsm/index.asp
(1998). Development of an information technology
Sproull, L. & Patterson, J., (2004). Making Information
infrastructure for extended enterprise. In J. Mills &
Cities Livable. Communications of the ACM February
F. Kimura (Eds.). Information Infrastructure Systems
2004, vol. 49, No.2.
for Manufacturing (pp.353-364). Boston: Kluwer
Academic Publishers. Standards Australia (2005); Australian Standard 5037-
2005: Knowledge management a guide; Standards
Siegel, Lloyd H. (2006). Lessons Learned, Dept of Vet-
Australia, September 2005.
erans Affairs, Physical Security Assessment Program.
Federal Facility Council. Physical Security & Hazard State of Arkansas (2004). Personnel Security. Office
Mitigation Committee, March 14th, 2006. Obtained of Information Technology. Document Number SS-
from www.va.gov/facmgt, June 29, 2006. 70-007. February 2004.
Simsion, G. (2006). Conceptual, Logical, Physical: Steen M.W.A., Akehurst D.H., ter Doest H.W.L., &
Clearing the Confusion. The Data Administration Lankhorst M.M.(2004); Supporting Viewpoint-Ori-
Newsletter, No. 36. Robert S. Seiner. ented Enterprise Architecture; Proceedings of the
8th IEEE International Enterprise Distributed Object
Sinha, Rajiv. (March 2001) A Security Checklist for
Computing Conference (EDOC) 2004.
Oracle 9i. Oracle White Papers. Accessed June 2006
from http://www.oracle.com/technology/deploy/secu- Steen, M.W.A., Lankhorst, M.M., Doest, H. ter,
rity/oracle9i/pdf/9i_checklist.pdf. Strating, P., & Iacob, M.-E. (2005). Service-Oriented
Enterprise Architecture. In Z. Stojanovic and A. Da-
Snouffer, R., et. al. (June 2001). NIST Special Publica-
hanayake (Eds.), Service-Oriented Software System
tion 800-29: A Comparison of the Security Require-
Engineering: Challenges and Practices, Hershey, PA:
ments for Cryptographic Modules in FIPS 140-1 AND
IDEA Group.
FIPS 140-2.
Stevenson, D.A. (1996, April). Positioning Enterprise
Snyman S., & Kruger CJ; The interdependency be-
Architecture. In D.A. Stevenson, Component Based
tween strategic management and strategic knowledge
Enterprise Architecture. Dissertation presented to the
management; Journal of Knowledge Management;
Department of Information Systems, University of
Vol 8, Issue 1, 2004).
Cape Town, South Africa. Retrieved 10 August 2007
Sowa J.F., & Zachman J.A.(1992); Extending and from the IS World Net Web site: http://users.iafrica.
formalizing the framework for information systems com/o/om/omisditd/denniss/text/eapositn.html
architecture; IBM Systems Journal, Vol 31, No 3,
Stoneburner, G., et. al. (July 2002). NIST Special
1992.
Publication 800-30: Risk Management Guide for In-
Sowa, F. J. (2000) Levels of Representation. Knowl- formation Technology Systems: Recommendations of
edge Representation. Logical, philosophical and the National Institute of Standards and Technology.
computational foundations (pp. 188-189).Brooks/Cole
Thomson Learning.
457
Compilation of References
Sulin, B.A., Lang, K.R., & Whinston. A.B. (1997). tion. Reading, UK: The Open Group. Retrieved July
Enterprise decision support using Intranet technology. 17, 2007, from http://www.opengroup.org/togaf/.
Decision Support Systems, 20, 99-134.
The Open Group. (1995-2005). Single Sign-On. Ob-
Swanson, M. (November 2001). NIST Special Pub- tained from http://www.opengroup.org/security/sso/.
lication 800-26: Security Self-Assessment Guide for
The Open Group. (2006). The Open Group Architec-
Information Technology Systems. National Institute
ture Framework Enterprise Edition Version 8.1.1. The
of Standards and Technology, Computer Security
Open Group Architecture Forum. Retrieved February
Division.
20, 2008 from http://www.theopengroup.org/
Swanson, M. et. al. (June 2002). NIST Special Publica-
The World Bank (2003). Retrieved June 18, 2007, from
tion 800-34: Contingency Planning Guide for Informa-
http://Web.worldbank.org/WBSITE/EXTERNAL/
tion Technology Systems: Recommendations of the
TOPICS/EXTINFORMATIONANDCOMMUNI-
National Institute of Standards and Technology.
CATIONANDTECHNOLOGIES/EXTEGOVERN-
Tambouris, E. (2001). An Integrated Platform for MENT/contentMDK:20507153~menuPK:702592~p
Realising One-Stop Government: The eGOV proj- agePK:148956~piPK:216618~theSitePK:702586,00.
ect. Paper presented at the E-Government Workshop html.
within DEXA01.
The World Bank. (1992). Governance and Develop-
Tambouris, E., Kavadias, G., & Spanos, E. (2004). The ment. Washington: World Bank.
Governmental Markup Language (GovML). Journal
Thitart, R.A. and B. Forgues. (1995). Chaos Theory
of E-Government, vol. 1 (2).
and Organization Science, 6(1):19-31.
Tan, E.P., & Gan, W.B. (2007). Enterprise Archi-
Toavs, D. (2004). Pixelating policy: Issue transforma-
tecture in Singapore Government. In Saha, P. (Ed.).
tion in real and virtual worlds. (Doctoral dissertation,
Handbook of Enterprise Systems Architecture in
Virginia Polytechnic Institute and State University,
Practice. Hershey, PA: IGI Global Information Sci-
2004). Retrieved June 10, 2007, from http://scholar.lib.
ence Reference.
vt.edu/theses/available/etd-12222004-094635/
Tapscott, D., & Caston, A. (1994). Paradigm Shift :
TopQuadrant. (2005a). FEA Reference Models Ontolo-
The New Promise of Information Technology.
gies v.1.1. Retrieved 16 Mar., 2006, from http://www.
Tarabanis, K., Peristeras, V., & Fragidis, G. (2001, June topquadrant.com/documents/TQFEARMO.pdf
2001). Building an Enterprise Architecture for Public
Tracy, M. et. al. (September 2002). NIST Special Pub-
Administration: A High Level Data Model for Strategic
lication 800-44: Guidelines on Securing Public Web
Planning. Paper presented at the 9th European Confer-
Servers: Recommendations of the National Institute
ence on Information Systems, Bled, Slovenia.
of Standards and Technology.
Tat-Kei Ho, A. (2002). Reinventing Local Governments
Tracy, M. et. al. (September 2002). NIST Special
and e-Government Initiative. Public Administration
Publication 800-45: Guidelines on Electronic Mail
Review, July/August 2002, Vol. 62, No. 4., Blackwell
Security: Recommendations of the National Institute
Synergy.
of Standards and Technology.
Teisman, G. and E.H. Klijn. (2002). Partnership Ar-
Treasury Board Secretariat, Government of Canada
rangements: Governmental Rhetoric or Governance
(2001). Canadas Report on Portals, August 10,
Scheme? Public Administration Review, 62(2), 197-
2001.
205.
Treasury Board Secretariat, Government of Canada
The Open Group (2006). The Open Group Architectur-
(2006). Service Oriented Architecture Strategy. Re-
al Framework (TOGAF) Version 8.1.1 Enterprise Edi-
trieved May 25th, 2006, from http://www.tbs-sct.gc.ca/
cio-dpi/Webapps/architecture/sd-eo/sd-eo_e.pdf)
458
Compilation of References
Tsichritzis, D., & Klug, A. (Eds.). (1978). The ANSI/ United States Congress (1996) Public Law 191-104
XWSPARC DBMS framework report of the study Health Information Portability and Accountability
group on database management systems. Information Act of 1996. Accessed from http://fr Webgate.access.
Systems, 3(3), 173-191. gpo.gov/cgi-bin/getdoc.cgi?dbname=104_cong_pub-
lic_laws&docid=f:publ191.104.
U.S. General Accounting Office (2003). Information
Technology: A Framework for Assessing and Improv- United States Congress (2002) Public Law 204-107
ing Enterprise Architecture Management (Version 1.1), Sarbanes-Oxley Act of 2002. Accessed from Accessed
GAO-03-584G, April 1, 2003. Retrieved 3rd August from http://fr Webgate.access.gpo.gov/cgi-bin/get-
2007 from http://www.gao.gov/new.items/d03584g. doc.cgi?dbname=107_cong_public_laws&docid=f:
pdf publ204.107.
U.S. General Accounting Office. (2002). Homeland United States Congress (2002) Public Law 347-107
security: Proposal for cabinet agency has merit, Federal Information Security Management Act of
but implementation will be pivotal to success. (GAO 2002. http://fr Webgate.access.gpo.gov/cgi-bin/get-
Publication No. GAO-02-886T). Washington, D.C. doc.cgi?dbname=107_cong_public_laws&docid=f:
Retrieved June 9, 2007, from http://www.gao.gov/new. publ347.107.
items/d02886t.pdf
United States Department of Justice System Devel-
UK (2005). e-Government Interoperability Frame- opment Life Cycle Guidance Document. (2003). The
work Version 6.1. London: Cabinet Office. Retrieved Department of Justice Information Resource Manage-
July 17, 2007, from http://www.govtalk.gov.uk/sche- ment, January 2003. Obtained from http://www.usdoj.
masstandards/egif_document.asp?docnum=949 gov/jmd/irm/lifecycle/table.htm.
UK Cabinet Office (2000). e-Government, a strategic United States Federal Enterprise Architecture Pro-
framework for public services in the information age. gramme Management Office (2006). FEA Consoli-
Retrieved May 25th, 2006, from dated Reference Model, Version 2.0. Retrieved June
18, 2007, from http://www.whitehouse.gov/omb/egov/
UK Cabinet Office, Office of the e-Envoy (2002) e-
a-1-fea.html.
Government Interoperability Framework (e-GIF). Part
two: Technical Policies and Specifications. Retrieved United States House of Representatives Government
August 15th, 2007, from http://www.govtalk.gov.uk/ Reform Committee (February 2005) Federal Computer
documents/e-GIF4Pt2_2002-04-25.pdf Security Report Card for 2003 2004. Accessed from
http://reform.house.gov/UploadedFiles/Computer%20
UK Chief Information Officers Council (UK CIO)
Security%20Report%20card%202%20years.pdf.
(2005) Enterprise Architecture for UK Government.
An overview of the process and deliverables for Re- United States. Executive Office of the President.
lease 1. Retrieved August 15th, 2007, from http://www. Office of Management and Budget [OMB]. (2005,
cio.gov.uk/documents/cto/pdf/enterprise_architec- November). The Data Reference Model Version 2.0.
ture_uk.pdf Retrieved 10 August 2007 from the OMB E-Gov
Web site: http://www.whitehouse.gov/omb/egov/docu-
United Kingdom, Department of Trade and Industry
ments/DRM_2_0_Final.pdf
(June 1991) Information Technology System Evalu-
ation Criteria (IITSEC). Accessed from http://nsi. United States. Executive Office of the President.
org/Library/Compsec/eurooran.txt. Office of Management and Budget [OMB]. Federal
Enterprise Architecture Program Management Office
United Nations and American Society for Public Ad-
[FEAPMO]. (2006, December). FEA Practice Guid-
ministration (2001). Global Survey of E-Government,
ance. Retrieved 22 October 2007 from the OMB E-Gov
Retrieved June 15, 2007, from http://www.unpan.
Web site: http://www.whitehouse.gov/omb/egov/docu-
org/egovernment2.asp.
ments/FEA_Practice_Guidance.pdf
459
Compilation of References
United States. Executive Office of the President. Office GoLearn Web site: http://www.golearn.gov/MaestroC/
of Management and Budget [OMB]. (2006, December). index.cfm?room=welcome&roomaction=about
Expanding E-Government: Making a Difference for
United States. Office of Personnel Management [OPM].
the American People Using Information Technology.
Human Resources Line of Business [HR LOB]. (2006,
Retrieved 30 April 2007 from the OMB E-Gov Web
January). HR LOB Business Reference Model version
site: http://www.whitehouse.gov/omb/egov/documents/
2. Retrieved 23 April 2007 from the OPM HR LOB
expanding_egov_2006.pdf
Web site: http://www.opm.gov/egov/documents/archi-
United States. Executive Office of the President. Office tecture/BRM_Report_V2.pdf
of Management and Budget [OMB]. (2007, February).
United States. Office of Personnel Management [OPM].
Report to Congress on the Benefits of the E-Govern-
Human Resources Line of Business [HR LOB]. (2006,
ment Initiatives. Retrieved 16 May 2007 from the
February). HR LOB Data Model version 1. Retrieved
OMB E-Gov Web site: http://www.whitehouse.gov/
23 April 2007 from the OPM HR LOB Web site:
omb/egov/documents/FY07_Benefits_Report.pdf
http://www.opm.gov/egov/documents/architecture/
United States. Executive Office of the President. Office HRLOB_DM.pdf
of Management and Budget [OMB]. (2007, July). FEA
United States. Office of Personnel Management
Consolidated Reference Model Document Version
[OPM]. Human Resources Line of Business [HR LOB].
2.2. Retrieved 16 July 2007 from the OMB E-Gov
(2006, June). HR LOB Performance Model version 1.
Web site: http://www.whitehouse.gov/omb/egov/docu-
Retrieved 23 April 2007 from the OPM HR LOB Web
ments/FEA_CRM_v22_Final_July_2007.pdf
site: http://www.opm.gov/egov/documents/architec-
United States. Executive Office of the President. ture/HRLOB_PM_6.30.06.pdf
Office of Management and Budget [OMB]. (n.d.a).
United States. Office of Personnel Management [OPM].
E-Gov Background. Retrieved 8 May 2007 from
Human Resources Line of Business [HR LOB]. (2006,
the OMB E-Gov Web site: http://www.whitehouse.
September). HR LOB Target Requirements for Shared
gov/omb/egov/g-1-background.html
Service Centers version 2.0. Retrieved 23 April 2007
United States. Executive Office of the President. Office from the OPM HR LOB Web site: http://www.opm.
of Management and Budget [OMB]. (n.d.b) Federal gov/egov/documents/requirements/Reqv2.pdf
Enterprise Architecture. Retrieved 22 May 2007 from
United States. Office of Personnel Management [OPM].
the OMB E-Gov Web site: http://www.whitehouse.
Human Resources Line of Business [HR LOB]. (2006,
gov/omb/egov/a-1-fea.html
September). HR LOB Service Component Model
United States. General Accounting Office [GAO]. version 1. Retrieved 23 April 2007 from the OPM
(2003, November). Information Technology: Leader- HR LOB Web site: http://www.opm.gov/egov/docu-
ship Remains Key to Agencies Making Progress on ments/architecture/HRLOBSCMv1.pdf
Enterprise Architecture Efforts. Retrieved 10 October
United States. Office of Personnel Management [OPM].
2007 from the GAO Web site: http://www.gao.gov/new.
Human Resources Line of Business [HR LOB]. (2007,
items/d0440.pdf
September). HR LOB Service Component Model ver-
United States. Office of Personnel Management [OPM]. sion 2. Retrieved 15 November 2007 from the OPM
(n.d.). Human Capital Assessment and Accountability HR LOB Web site: http://www.opm.gov/egov/docu-
Framework [HCAAF]. Retrieved 18 May 2007 from ments/architecture/HRLOBSCMv2.pdf
the OPM Web site: http://www.opm.gov/hcaaf_re-
United States. Office of Personnel Management [OPM].
source_center/2-2.asp
Human Resources Line of Business [HR LOB]. (n.d.).
United States. Office of Personnel Management [OPM]. HR LOB Benefits and Accomplishments. Retrieved
GoLearn. (n.d.) The Office of Personnel Managements 30 May 2007 from the OPM HR LOB Web site: http://
GoLearn Program. Retrieved 24 October 2007 from the www.opm.gov/egov/HR_LOB/benefits/
460
Compilation of References
US (2007). Federal Enterprise Architecture. Wash- Warmer, Kleppe A, J.; and Bast, W. (2003). MDA
ington, DC: Office of Management and Budget. Re- Explained: The Model Driven Architecture--Practice
trieved July 17, 2007, from http://www.whitehouse. and Promise. New York, NY: Addison-Wesley.
gov/omb/egov/a-1-fea.html.
Weerdmeester R., Pocterra C., & Hefke M. (2003);
US Federal Government (2002) e-Government Strat- Thematic Network/Roadmap: Knowledge Manage-
egy: Simplified Delivery of Services to Citizens. Ex- ment Maturity Model; Information Societies Technol-
ecutive Office of the President, Office of Management ogy Programme, June 2003.
and Budget, US Federal Government February 2002.
Weill, P. (2004). Dont Just Lead, Govern: How Top-
Retrieved May 25th, 2006, from http://www.firstgov.
Performing Firms Govern IT. MIS Quarterly Execu-
gov/Topics/Includes/Reference/egov_strategy.pdf
tive, 3(1), 1-17.
Van den Berg, R.J., & Tolle, M. (2000). Assessing
Weill, P., & Ross, J. (2004). IT Governance: How Top
Ability to Execute in Virtual Enterprises. In J.P.T. Mo
Performers Manage IT Decision Rights for Superior
& L. Nemes (Eds.) Global Engineering, Manufactur-
Results. Boston, Massachusetts: Harvard Business
ing and Enterprise Networks (pp.370-378). Boston:
School Press.
Kluwer Academic Publishers.
Weill, P., & Ross, J. (2005). A Matrixed Approach to
Vandegriff L.J. (2006); Unified approach to agile
Designing IT Governance. MIT Sloan Management
knowledge-based enterprise decision support; VINE
Review, 46(2), 26-34.
Vol 36, Issue 2; 2006)
Wesley, Addison (2003). XML Data Management.
Vendler, Z. (1972). Res Cogitans: Ithaca: Cornell Native XML and XML-enabled Database Systems.
University Press. Pearson Education Inc., Boston,U.S.A.
Vernadat, F.B. (2002). Enterprise Modelling and Weston, R.H. (1999). Reconfigurable, component-
Integration (EMI): Current Status and Research based systems and the role of enterprise engineering
Perspectives. Annual Reviews in Control, 26, 15-25. concepts, Computers in Industry, 40, 321-343.
Vitvar T., Kerrigan M., Overeem v. A., V., P., & K., WfMC. www.wfmc.org.
T. (2006, Mar. 27-29). Infrastructure for the Seman- Widmayer, P. (1999). Building Digital Metropolis:
tic Pan-European E-government Services. Paper Chicagos Future Networks. IT Professional Volume
presented at the AAAI Spring Symposium, The Se- 1, Issue 4, July-Aug. 1999, p. 40 46. IEEE.
mantic Web meets eGovernment (SWEG), Stanford
Wiedman, B. (2005). Database Security (Common-
University, California, USA.
Sense Principles.) GovernmentSecurity.org Network
Vu, J. (2004). Process Improvement Journey. Lecture Security Resources. Obtained from http://www.gov-
notes for the CMMI course sponsored by Korea IT ernmentsecurity.org/articles/DatabaseSecurityCom-
Industry Promotion Agency, Seoul, Korea. mon-sensePrinciples.php.
W3C. www.w3c.org. (August 2003). WSA, Web Ser- Wieringa, R., & Meyer, J. (1993). Applications of
vices Architecture. W3C working Draft 8. Deontic Logic in Computer Science: A Concise
Overview: Wiley.
Wack, J., et. al. (January 2002). NIST Special Publi-
cation 800-41: Guidelines on Firewalls and Firewall Williams, T.J. (1994). The Purdue Enterprise Refer-
Policy: Recommendations of the National Institute of ence Architecture, Computers in Industry, 24(2-3),
Standards and Technology. 141-158.
Wack, J., et. al. (October 2003). NIST Special Publica- Williams, T.J., Bernus, P., Brosvic, J., Chen, D.,
tion 800-42: Guideline on Network Security Testing: Doumeingts, G., Nemes, L., Nevins, J.L., Vallespir, B.,
Recommendations of the National Institute of Stan- Vlietstra, J., & Zoetekouw, D. (1994). Architectures for
dards and Technology.
461
Compilation of References
integrating manufacturing activities and enterprises. Zachman J.; The Physics of Knowledge Management;
Computers in Industry, 24, 111-139. undated, retrieved 29 Apr 2007 from http://www.
zifa.com
Williamson, O. E. (1975). Markets and Hierarchies.
New York: The Free Press. Zachman J.A. (1996); Enterprise Architecture and
legacy systems. Getting beyond the legacy; accessed
Wilson, M., Zafra, D., Pitcher, S., Tressler, J., Ippolito,
from Information Engineering Services Pty Ltd via
J. (1998). NIST Special Publication 800-16: Informa-
http://members.ozemail.com.au/~visible/papers/zach-
tion Technology Security Training Requirements:
man1.htm on 25/07/2005
A Role- and Performance- Based Model. National
Institute of Standards and Technology, Computer Zachman J.A. (1997); Concepts of the framework for
Security Division. enterprise architecture. Background, description
and utility; accessed from Information Engineering
Wimmer, M., & Traunmuller, R. (2000) Trends
Services Pty Ltd via http://members.ozemail.com.
in Electronic Government: Managing Distributed
au/~visible/papers/zachman3.htm on 25/07/2005
Knowledge. In the 11th International Workshop on
Database and Expert Systems Applications (IEEE, Zachman J.A. (1997); The challenge is change: a
DEXA00) management paper; accessed from Information
Engineering Services Pty Ltd via http://members.
Wimmer, M.A. (2002). Integrated Service Modelling
ozemail.com.au/~visible/papers/zachman2.htm on
for One-Stop Government. Electronic Markets, special
25/07/2005
issue on eGovernment, 12(3):18.
Zachman, J. A. (1987), A Framework for Information
Winograd, T. and Flores F. (1987). Understanding Systems Architecture. IBM Systems Journal, 26(3),
Computers and Cognition - A New Foundation for 276-292.
Design. Reading: Addison Wesley.
Zachman, J. A. (2005). The Zachman Framework
Wortmann, J.C., Hegge, H.M.H., & Rolefes, S. (2000). for Enterprise Architecture: A Primer for Enterprise
Embedding enterprise software in extended enterprise Engineering and Manufacturing. Zach man
models. Computers in Industry, 42, 231-243. International, www.ZachmanInternational.com.
Zachman, J. A., & Sowa, J. F. (1992). Extending and
Wu, R.C.Y. (2007). Enterprise integration in e-gov- formalizing the framework for information systems
ernment. Transforming Government: People, Process architecture. IBM Systems Journal, 31(3).
and Policy, 1(1), 89-99.
Zwegers, A., Tolle, M., & Vesterager, J., (2003). VE-
Xia Wang, Goudos S., Peristeras V., Vitvar T., Mocan RAM: Virtual Enterprise Reference Architecture and
A., & Tarabanis K. (2007, 4-10 Jan. ). WSMO-PA: Methodology. In I. Karvonen, R. Van den Berg, P.
Formal Specification of Public Administration Service Bernus, Y. Fukuda, M. Hannus, I. Hartel, J. Vesterager.
Model on Semantic Web Service Ontology. Paper VTT Symposium 224 (pp.17-38), Helsinki, Finland.
presented at the 40th HICSS, Hawaii.
462
463
Pallab Saha is currently a member of the faculty with the National University of Singapore (NUS).
His current research and consulting interests include Enterprise Architecture, IT Governance, and Busi-
ness Process Management. He has published several research papers in these areas. Pallab is an active
researcher in the area of Enterprise Architecture and has published his first book titled Handbook of
Enterprise Systems Architecture in Practice in March 2007. Dr. Saha also leads the Information Sys-
tems Management research group within NUSInstitute of Systems Science. Dr. Saha teaches courses
in Enterprise Architecture, IT Governance and Business Process Management at the post-graduate
and senior executive levels (including CIOs). His current consulting engagements are in Enterprise
Architecture for Singapore Government agencies. He has provided consulting and advisory services to
Infocomm Development Authority of Singapore, Intellectual Property Office of Singapore, CPF Board,
and Great Eastern Life Assurance among others. Dr. Saha is the primary author of the Enterprise Ar-
chitecture Methodology and Toolkit for the Government of Singapore. He is also a contributing author
of the Enterprise Architecture Management Guide being developed by the International Association of
Enterprise Architects (a|EA) and is a frequently invited speaker at international and local conferences
on Enterprise architecture and IT governance (including keynote sessions). Prior to academia, he was
instrumental in managing Baxters environmental health and safety offshore development centre in
Bangalore as Head of Projects and Development. He has worked on engagements in several Fortune
100 organizations in various capacities. Pallab received his Ph.D in 1999 from the Indian Institute of
Science, Bangalore. His Ph.D dissertation was awarded the best thesis in the department. His Ph.D.
proposal was selected as one of the top five in India and received a special research grant for the same.
Earlier he completed an M.B.A in Information Systems and prior to that gained a B.Sc. in Electronic
Sciences from Bangalore University. He can be contacted at pallab@nus.edu.sg.
***
Chris Aitken holds a PhD in psychophysiology and has worked with a variety of government
agencies over the last 15 years in both clinical and IM & ICT roles. During the last 6 years he has held a
number of IM & ICT related positions and is currently Manager Enterprise Architecture and Information
Management in Queensland Health in Australia. Chris clinical applied research background means
that he brings a combination of a strong human service delivery perspective and a keen logical rigour to
his approach to enterprise architecture and IM & ICT implementation. Chris current interests include
topics as varied as; the development of an abstract enterprise meta-model, IM & ICT policy and standards
development, and the integration of IM & ICT strategic planning with enterprise architecture.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
About the Contributors
Leonidas G. Anthopoulos was born in Trikala, Greece in 1974. He graduated (1996) and he got his
PHD in the e-Government area (2005) from the Department of Informatics of the Aristotle University
of Thessaloniki (AUTh). He is an Expert Counselor in e-Government and e-Diplomacy of the Hellenic
Ministry of Foreign Affairs, while he has worked for many organizations such as the Greek Ministry
of Education, the Research Committee (AUTh), the Information Society S.A. (Ministry of Interior of
Greece) etc. He has published several works for international journals, magazines and conferences and
his research interests concern e-Government, Information Society aspects and social networks.
Guido Bayens, MSc, MBAis a principal consultant at Novius Business & Information Management.
He is also the head of the architecture team at ICTU and responsible for theDutch government refer-
ence architecture. Guido studied sociology in Utrecht andattained a Master of Business Administration
degree at Henley. From 2001 2005 he was responsible for the business and ICT architecture of UWV,
the national Dutch Social Security agency. His vision on the possibilities of business architecture is
based on almost 20 years of management experience in environments where fundamental changes of
strategic policy were to be made.
Scott Bernard has over twenty years of experience in information technology management including
work in the academic, federal, military, and private sectors. He is currently the Deputy CIO and Chief
Enterprise Architect. at the Federal Railroad Administration in Washington DC. He also serves on the
faculty of the School of Information Studies at Syracuse University and is a lecturer at the School of
Computer Science at Carnegie Mellon University. Dr. Bernard wrote a textbook on Enterprise Archi-
tecture in 2004 and is the Chief Editor of the Journal of Enterprise Architecture.
Amit Bhagwat has worked on Enterprise-wide IT transformation programs through two decades.
Amit has served as strategist, leader, mentor, manager and auditor for Enterprise Architecture and
Systems Engineering practices in enterprises leading in the world / Europe in their sector. He serves
on the British Computer Society Elite (Effective Leadership in Information Technology) group. Among
the very small number of IBM-Rational accredited instructors to educate IBM and premier-partner staff
consultants, Amit is also TOGAF-8 accredited and contributes to Ethics Workgroup of AOGEA. Amit
has written widely on Requirement-Project-Process Management, Analysis, Design, Visual Modeling
Concepts and Estimation Techniques, with 17 publications, including an oft-quoted cover feature for
The Rational Edge, to his credit. In 2007, Amit led Enterprise Architecture Maturity Appraisal for one
of the largest British government departments and advised CTOs of two multinational institutions, both
leaders in their field in the UK.
Timothy Biggert has led the Human Resources Line of Business enterprise architecture team since
June 2004. In that role, he has guided his team in the development of the HR LOB EA artifacts and
target requirements. He is now working with HR LOB Program stakeholders to benchmark existing
practices and help define the Federal HR enterprise of the future. Tim is an IBM-certified Senior Manag-
ing Consultant with IBMs Global Business Services (GBS) Public Sector Human Capital Management
consulting practice. Over the course of his 19 years working for the worlds largest consulting firm, Tim
has led teams in many different project areas including human capital strategy, enterprise architecture,
business transformation, organization change, project management, education development and delivery,
methodology creation and implementation, and application development. He has worked on a broad
464
About the Contributors
range of business environments including federal, state, and local government, education, aerospace,
retail, manufacturing, distribution and logistics, financial services, banking, life sciences, pharmaceuti-
cal, agriculture, utility and telecommunications. He has a Masters Degree in Business Administration
from the University of Minnesota.
William S. Boddie serves as the Professor of Systems Management at the U.S. National Defense
University (NDU) Information Resources Management (IRM) College. Dr. Boddie has nearly 30 years
experience leading and managing information technology (IT) environments for public, private, and
non-profit-sector organizations. Dr. Boddie specializes in organizational leadership, enterprise perfor-
mance effectiveness, enterprise architecture, and program and project management and is the NDU
IRM College Professor of the Year for 2006 2007. Further, Dr. Boddie developed and delivered the
Business Information Technology Leadership Certificate Program, a continuing education program,
to various Washington DC colleges since 1999.
Anand Desai is Professor in the John Glenn School of Public Affairs at the Ohio State University.His
research interests include performance measurement and evaluation in the public sector and the use of
policy modeling to support public sector decision-making.
Wijnand Derks (1973) is scientific researcher at Telematica Instituut since 2005. Previously, he
worked at the research department of the largest Dutch telecom company KPN Telecom (1997-2001)
and the faculty of computer science at University of Twente (2001-2005). In the past ten years he worked
on several fundamental and applied research projects in national and international context in the do-
mains of scaleable database- and transaction technology, enterprise architecture and cross-enterprise
workflow management. His prime interests involve the development and application of fundamentally
new ICT solutions in the industry. Within Telematica Institute he develops new application concepts for
demand-driven and integral electronic service provisioning in the context of public-private partnerships.
In addition, he is involved in the research program Software for Service where ICT-users, ICT-suppliers
and research parties jointly to develop novel business models and ICT-based applications.
Alan Dyer has many years experience with organisational decision-making, from a variety of per-
spectives (including as a consumer, provider and developer); the majority of these experiences
were gained through the Australian Defence Forces. Alan has been directly involved in information
and knowledge management in the form of technology, projects or abstract application of principles
for the last 17 years. Alans current studies include post-graduate research in Enterprise Architecture,
building upon a B.Sc. (Maths and CompSci) and an M.Sc.(IT). Alan is currently employed by EWA-
Australia (http://www.ewa-australia.com).
Neil Fairhead, in a 30 year career in information technology has worked as an enterprise architect
and technology strategist with a number of major organizations including the Canada Post, the Canadian
Imperial Bank of Commerce, the British Home Office and a major British bank. He also brings service
management experience to bear following several years at Microsoft where he helped to introduce ITIL.
His IT experience includes systems engineering at IBM, office and distributed systems at Digital (DEC),
information engineering at James Martin Associates and he is currently focused on structured managed
service offerings at Fujitsu Services. He has studied at Cambridge, Manchester Business School and,
465
About the Contributors
John Good is currently a Director at Serco Consulting where he leads the Enterprise Architecture
capability group. He focuses on helping organisations establish Enterprise Architecture teams and
specializes in data and information architecture and the use of enterprise architecture in enabling
major business transformation. His career spans 20 years in information and media technology as
a solutions and enterprise architect, principal technologist and technology strategist. A graduate of
Edinburgh University in Computer and Management Sciences, and a TOGAF certified practitioner,
he trained in information systems with Price Waterhouse before a career with DHL, the BBC and his
current consulting role.
Shirley Gregor heads the National Centre for Information Systems Research in the College of
Business and Economics at the Australian National University. Professor Gregor has led several large
projects in the e-commerce area funded by the private sector and government. Professor Gregor was
inaugural President of the Australasian Association of Information Systems and is Vice-President of
the Australian Council of Professors and Heads of Information Systems. Professor Gregor was made
an Officer of the Order of Australia in the Queens Birthday Honours list in June 2005 for services as
an educator and researcher in the field of information systems and in the development of applications
for electronic commerce in the agribusiness sector.
Dennis Hart is a Senior Lecturer in the College of Business and Economics at the Australian National
University and has research interests in the areas of ownership issues in information systems develop-
ment and information management; Semiotics and information systems. Dr Hart was a former senior
officer in the Royal Australian Navy before commencing a career as an academic. In addition to his
academic activities, Dr Hart also manages and runsa 20 acre vineyard with his partner on a property
near Yass in the state of New South Wales.
Shuyuan Mary Ho is a PhD Candidate at School of Information Studies, Syracuse University. Her
research interests focus on information systems security, which includes information content security,
information security management and computing security. Her dissertation is in the interdisciplinary area
of behavioral anomaly detection for online community. This research is aimed to discover the mechanism
for detecting changes in trustworthiness for countering insider threats. Shuyuan is a CISSP certified by
(ISC)2 and a CISM certified by ISACA. She has acquired a Master in Philosophy in Information Science
and Technology, a Master in Business Administration, and a Bachelor in Computer Science.
Marijn Janssen is director of education of the Systems Engineering, Policy Analysis & Management
Master at the Faculty of Technology, Policy and Management of Delft University of Technology. He is
elected as secretary of the IFIP WP 8.5 working group on Information Systems in Public Administra-
tion. He also teaches courses on middleware architecture, web-information systems and management,
and designing large-scale ICT-infrastructure and services. He conducted several research projects in the
field of e-government, enterprise architecture and orchestration in interorganizational networks. He is
an associate editor of the International Journal of E-Government Research (IJEGR) and International
Journal of E-business Research (IJEBR) and co-chair of the E-government Architecture, Infrastructure
466
About the Contributors
and Interoperability minitrack at the HICSS conference. He serves on several international program
committees and is a program chair of the Annual Conference on Digital Government (dg.o2008). He
published over 100 refereed publications.
Hong Sik Kim is Adjunct Professor of Korea Polytechnic University, Computer Engineering
Department and Secretary of KIITA (Korea Institute of Information Technology Architecture). He had
been involved in the a|EA standardization project (EAMG: Enterprise Architecture Management Guide)
for 2 years as a vice president of a|EA Korean Chapter. He suggested a more practical and sustainable
development strategy to the EA community world wide, especially for area of the quality and maturity
model of EIA in stead of EA. He had experiences to consolidate 21 MIS departments of Hyundai Group
into one mega center as a foundation member of Hyundai Information Technology. And He introduced
company wide QMS (Quality Management System), TickIT scheme (British standard version of ISO
9000-3) and institutionalized the QMS for 6 years. He also had introduced customer satisfaction system
company-wide and executed pilot project of MBNQA (Malcolm Baldridge National Quality Award).
Bram Klievink is research assistant and Ph.D. researcher at Delft University of Technology at
the faculty of Technology, Policy and Management. Bram holds a degree in political science from
the University of Nijmegen (M.Sc, 2006) and a degree in business information systems (2004). His
research focus is on coordination mechanisms for public-private cooperation in electronic government
service-delivery. For this research he participates in two major research projects. One is on creating
demand-driven integrated electronic service-delivery by government and private partners, which aims
at exploring future directions for public services. The other project is on the coordination of multiple
channels operated by government, private parties may be part of these channels.
Marc M. Lankhorst is a senior member of scientific staff at Telematica Instituut where he heads
the institutes expertise group on Service Architectures. His research interests range from enterprise
architecture and business process management to service orientation and model-driven software develop-
ment. In the past, he has managed several multi-party research projects with partners from government,
industry and academia. At the moment, he is responsible for a major project on integrated, demand-
driven egovernment services. Furthermore,he teaches several courses on architecture at universities
and other institutes. Marc holds an MSc in Computer Science from the University of Twente and a PhD
from the University of Groningen in the Netherlands.
Ryan Kobb has provided business performance management and program management leadership
to the IBM team supporting the OPM Office of the Human Resources Line of Business since March
2005. In that role, he helps lead the management of the HR LOB governance structure and provides
support in the areas of enterprise architecture, change management, and communications and outreach.
He is now working to complete the migration planning guidance that agencies will leverage to select
and migrate to a shared service center as well developing a transformation toolkit for agencies as they
prepare for their selection and migration to a shared service center. Ryan is a Senior Consultant in IBMs
Global Business Services (GBS) Public Sector Financial Management Practice. He is IBM-certified
in Earned Value Management and recently has been recognized by Consulting Magazine as one of the
Top 30 Consultants Under the Age of 30.
467
About the Contributors
Nigel Martin is a Lecturer in the College of Business and Economics at the Australian National
University, and has principal research interests in the areas of Enterprise Architecture, Requirements
Engineering, IT Governance, ICT Strategy, Systems Design and Electronic Government. Dr Martin was
a former oil industry manager, and government executive working primarily in the areas of defence,
national security, and law enforcement.
John Mo is a Professor and Discipline Head for Manufacturing and Materials Engineering at the
RMIT University, Melbourne, Australia. Prior to this, John was the Team Leader of the Manufacturing
Systems and Infrastructure Networks research group in the Division of Manufacturing and Infrastruc-
ture Technology of Commonwealth Scientific and Industrial Research Organisation (CSIRO). John
led several large scale international projects involving multi-disciplinary teams in the development of
advanced project collaboration systems for designing one-off facilities such as chemical plants and high
value computer controlled assets. His team of 15 professionals had completed projects on developing
methodologies for risks analysis, critical infrastructure protection modelling, electricity market simula-
tion, wireless communication, fault detection and production scheduling. He also led the National EPC
Network Demonstrator Project and its extension, which were the first EPC implementation conforming
to EPC Global standard. He obtained his PhD from Loughborough University, UK. John is a Fellow
of the Institution of Engineers, Australia.
Sungwook Moon is working as a software consultant at ComponentBasis, Co., Ltd., Korea. He has
experienced dozens of software development projects, and mainly played a role for component-based
development discipline mentoring and software quality assurance. In addition, he has much interest in
software process improvement and software architecture. Since 2003, he has presented his researches
at several conferences such as the European Software Process Improvement and the Korea Society of
Management Information Systems. Recently, he joined in MIS department of University of Seoul as a
PhD candidate to research into service-oriented architecture and enterprise architecture. He obtained
his MS degree in Chemical Engineering from Korea Advanced Institute of Science and Technology in
1998 and his BS degree in Chemical Engineering from Yonsei University in 1996.
Laszlo Nemes was Chief Research Scientist and Science Director in the Division of Manufactur-
ing and Infrastructure Technology of Commonwealth Scientific and Industrial Research Organisation
(CSIRO) Australia. He led a research program with more than 50 staff working on enterprise integra-
tion, machine vision, autonomous robotics, signal diagnostics and process control. In addition, he also
led complex international research teams to complete large, industry related R&D projects in the area of
computer aided design and manufacturing, within the international Intelligent Manufacturing Systems
program. His achievements are hallmarked with six industry related patents; over 100 papers published
internationally, six books/monographs. His major achievement, the development of the Generic En-
terprise Reference Architecture was developed in a team of international experts and was endorsed as
the Annex to ISO enterprise engineering standard. Dr Nemes is a Fellow of the Australian Academy of
Technological Sciences and Engineering, Fellow of the Institution of Engineers, Australia.
Klaus Niemann has more than 25 years experience with the design of complex IT-architectures in the
telecommunication and financial sector. He worked as system designer, software architect, consultant,
project manager and enterprise architect in several positions and for a wide range of clients. Klaus holds
468
About the Contributors
a diploma in computer science from the Technical University of Berlin. In the 80s his main focus was
on distributed systems, telecommunication and banking networks in Europe as well as in the Far East.
In the 90s he worked on the introduction of object orientation to large organizations and then focused
on client/server architectures. He frequently gave professional training sessions, published several
articles and books, and also became a frequent speaker to conferences. He founded ACT! Consulting
in 1998 with special emphasis on enterprise architecture management. He developed the enterprise
architecture framework t-eam (toolbox for enterprise architecture management). Klaus is a member of
the OpenGroups Architecture Forum and works with the International Committee on EA Standards
(Association of Enterprise Architects).
Vassilios Peristeras is a Research Fellow and Adjunct Lecturer at the National University of Ireland,
Galway, Digital Enterprise Research Institute (DERI). He has studied Political Science and holds M.Sc
and PhD in Information Systems. For the last 12 years, he has worked for the Greek National Center for
Public Administration and Decentralization, the United Nations, the Center for Research and Technol-
ogy Hellas (CERTH), the University of Macedonia and as consultant for many governments and private
companies. His main research areas are eGovernment, enterprise architecture and semantic technologies.
He has published more than 40 papers in international conferences and scientific journals.
Jay Ramanathan is the Director of Research at the Collaborative for Enterprise Transformation and
Innovation (or CETI). She is currently engaged in developing programs of industry-focused research,
practice, and education. Particular areas of interest are Adaptive Complex Enterprise Architectures for
Business-IT alignment and management; and business-driven IT innovation.
Rajiv Ramnath is Director of Practice at the Collaborative for Enterprise Transformation and Inno-
vation (CETI) at OSU. His expertise ranges from wireless sensor networking and pervasive computing
to business-IT alignment, enterprise architecture, software engineering, e-Government, collaborative
environments and work-management systems.
Kunal Suryavanshi has led the IBM team supporting the OPM Office of the Human Resources
Line of Business since April 2003. In that role, he provides thought leadership and strategic advice to
the OPM HR LOB leadership team. He was influential in building the coalition of 24 Federal agencies
that crafted the vision, goals, and concept of operations of the HR LOB program and that subsequently
developed the HR LOB target enterprise architecture and requirements for shared service centers. Kunal
is an Associate Partner and IBM-certified strategy consultant in IBMs Global Business Services (GBS)
Federal Strategy and Change Practice. He has led teams in many different project areas including elec-
tronic government strategy, enterprise architecture, business transformation, organization change, project
management, and business case development for Federal IT projects. Kunal has an undergraduate degree
in Civil Engineering from University of Bombay and an MBA from Carnegie Mellon University.
469
About the Contributors
He was a research staff member at the IBM T.J. Watson Research Center 1991-1994 and was employed
by the IBM Corporation as a whole during 1984-1994. In recognition of his research, he was the recipi-
ent of the Anton Philips Best Paper Award at the 1991 IEEE International Conference on Robotics and
Automation. His current research interests include e-government and e-business. In recognition of his
work in the field of e-government, he was the recipient of the Best Paper Award in the e-government
track at the European Conference on Information Systems in 2000. Also in recognition of his work in
the field of e-Business he received the Outstanding Research Paper Award in the 7th Annual Conference
of the International Academy of e-Business in 2007.
Dwight Toavs, PhD, is a Professor of Systems Management at the National Defense Universitys
Information Resources Management College in Washington, D.C. His academic, teaching, and research
interests lie at the intersection of public policy, governance, and information technology in public or-
ganizations. In particular, he is interested in visual techniques and technologies as a means to under-
stand and explain policy topics. He is the creator of PolicyWorld, the first virtual reality depiction of
a contemporary public policy topic, a 3D collaborative virtual environment for exploring information
resources management policies in the US Federal government. His interest in information visualiza-
tion, cognitive mapping, and virtual environments results from the expressive and communicative
potential of these approaches to aid in understanding complex policy and governance issues. He can
be contacted at toavs@ndu.edu.
John A. Zachman is the originator of the Framework for Enterprise Architecture which has re-
ceived broad acceptance around the world as an integrative framework, or periodic table of descriptive
representations for Enterprises. John is not only known for this work on Enterprise Architecture, but is
also known for his early contributions to IBMs Information Strategy methodology (Business Systems
Planning) as well as to their Executive team planning techniques (Intensive Planning). He retired from
IBM in 1990, having served them for 26 years. He presently is Chairman of the Board of Zachman
Framework Associates, a worldwide consortium managing conformance to the Zachman Framework
principles. He is Chief Executive Officer of the Zachman Institute for Framework Advancement (ZIFA),
an organization dedicated to advancing the conceptual and implementation states of the art in Enterprise
Architecture. He also operates his own education and consulting business, Zachman International (www.
ZachmanInternational.com). John serves on the Executive Council for Information Management and
Technology (ECIMT) of the United States Government Accountability Office (GAO). He is a Fellow
for the College of Business Administration of the University of North Texas. He serves on the Advisory
Board for the Data Resource Management Program at the University of Washington and on the Advisory
Board of the Data Administration Management Association International (DAMA-I) from whom he was
awarded the 2002 Lifetime Achievement Award. He was awarded the 2004 Oakland University, Applied
Technology in Business (ATIB), Award for IS Excellence and Innovation. John has been focusing on
Enterprise Architecture since 1970 and has written extensively on the subject. He is the author of the
book, The Zachman Framework for Enterprise Architecture: A Primer on Enterprise Engineering and
Manufacturing. He has facilitated innumerable executive team planning sessions. He travels nation-
ally and internationally, teaching and consulting, and is a popular conference speaker, known for his
motivating messages on Enterprise Architecture issues. He has spoken to many thousands of enterprise
managers and information professionals on every continent. In addition to his professional activities,
John Zachman serves on the Elder Council of the Church on the Way (First Foursquare Church of Van
470
About the Contributors
Nuys, California), the Board of Directors of Living Way Ministries, a radio and television ministry of
the Church on the Way, the Presidents Cabinet of the Kings College and Seminary, the Board of Direc-
tors of the Los Angeles Citywide Childrens Christian Choir and on the Board of Directors of Native
Hope International, a Los Angeles-based ministry to the Native American people. Prior to joining IBM,
John served as a line officer in the United States Navy and is a retired Commander in the U. S. Naval
Reserve. He chaired a panel on Planning, Development and Maintenance Tools and Methods Integra-
tion for the U.S. National Institute of Standards and Technology. He holds a degree in Chemistry from
Northwestern University, has taught at Tufts University, has served on the Board of Councilors for the
School of Library and Information Management at the University of Southern California, as a Special
Advisor to the School of Library and Information Management at Emporia State University, and on the
Advisory Council to the School of Library and Information Management at Dominican University.
471
472
Index
Symbols D
311 system 160 Department of Homeland Security (DHS) 193
design integrity 174
A design integrity, implementing 179
ACE framework 153 design integrity framework 176, 181
ANZAC Ship Alliance (ASA) 377 design integrity framework, and enterprise architec-
ArchiMate 40 ture governance 173190
architecture maturity model 9 Digital City 395
Australian Bureau of Statistics 409, 419 Dutch e-government 34
Dutch government 3055, 263
B
E
Beacon Architecture 5681
e-government 392
C e-government, in Singapore 10
e-government, overview of 3
capability maturity profile (CMP) 110 e-government, stages of 4
Centrelink Social Services Agency 409, 420 E-Government Act of 2002 309
collaborative enterprise architecture, for municipal E-Gov Travel 310
environments 392408 E-Payroll initiative 310
Columbus, Ohio 157 e-Training initiative 310
communication 138 EA cube 345
confidentiality 348 EIA maturity model 90
cooperation, public-private 269 enterprise architecture, and government 194
corporate governance 211 enterprise architecture, and information security
340370
enterprise architecture, as documentation method
343
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Index
473
Index
474