{"title":"Method Framework for Developing Enterprise Architecture Security Principles","authors":"Sara Larno, Ville Seppänen, Jarkko Nurmi","doi":"10.7250/csimq.2019-20.03","DOIUrl":"https://doi.org/10.7250/csimq.2019-20.03","url":null,"abstract":"Organizations need to consider many facets of information security in their daily operations – among others, the rapidly increasing use of IT, emerging technologies and digitalization of organizations’ core resources provoke new threats that can be difficult to anticipate. It has been argued that the security and privacy considerations should be embedded in all the areas of organizational activities instead of only relying technical security mechanisms provided by the underlying systems and software. Enterprise Architecture Management (EAM) offers a holistic approach for managing different dimensions of an organization, and can be conceived as a coherent and consistent set of principles that guide how the enterprise must be designed. This article contributes with a method framework for integrating information security with EAM, aimed at providing support for the decision-making related to formulating context-aware EA security principles. The presented method framework is a result of a constructive research based on both the theoretical body of knowledge and the empirical evidence, obtained by interviewing 35 Finnish EA and information security practitioners.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131494794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selected Topics on Business Informatics: Editorial Introduction to Issue 20 of CSIMQ","authors":"J. Zdravkovic","doi":"10.7250/csimq.2019-20.00","DOIUrl":"https://doi.org/10.7250/csimq.2019-20.00","url":null,"abstract":"This issue complements the previous issue in the way that it aggregates some prominent research results of the 17th International Conference on Perspectives in Business Informatics Research (BIR2018) in Stockholm, Sweden, in September 24-26, 2018 together with a recent research in the Business Informatics discipline and thus makes this issue highly actual. The topics of the issue concern improvements of enterprise architecture modeling and management in the directions of automation, adaptivness, digitalization and security with privacy.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128236402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jarkko Nurmi, Ville Seppänen, Meri Katariina Valtonen
{"title":"Ecosystem Architecture Management in the Public Sector - From Problems to Solutions","authors":"Jarkko Nurmi, Ville Seppänen, Meri Katariina Valtonen","doi":"10.7250/CSIMQ.2019-19.01","DOIUrl":"https://doi.org/10.7250/CSIMQ.2019-19.01","url":null,"abstract":"Based on our research concerning enterprise architecture (EA) in the Finnish public sector, we discuss how EA concept and tool need to be developed to support government business ecosystem and organization design. Our research context indicates, beyond a federal government or a state one, that even a single municipality, like a city concern, can be perceived as an ecosystem of its sectoral domains, subsidiaries and such. We outline a vision of an overall ontology-based, shared EA repository for the-whole-of-government current state descriptions and specify the central design principles and functional requirements for such a system, illustrating some potential use cases of it. Based on interview data from four smart city cases in Finland, we suggest a management model for the government ecosystem architecture target state design, specifically a design process for co-creating new services in the ecosystem. Further, we outline some principles for government ecosystem architecture management.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"391 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131989972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Nardello, Shengnan Han, Charles Møller, J. Gøtze
{"title":"Automated Modeling with Abstraction for Enterprise Architecture (AMA4EA): Business Process Model Automation in an Industry 4.0 Laboratory","authors":"M. Nardello, Shengnan Han, Charles Møller, J. Gøtze","doi":"10.7250/csimq.2019-19.03","DOIUrl":"https://doi.org/10.7250/csimq.2019-19.03","url":null,"abstract":"The transformation towards the Industry 4.0 paradigm requires companies to manage large amounts of data. This poses serious challenges with regard to how effectively to handle data and extract value from it. The state-of-the-art research of Enterprise Architecture (EA) provides limited knowledge on addressing this challenge. In this article, the Automated Modeling with Abstraction for Enterprise Architecture (AMA4EA) method is proposed and demonstrated. An abstraction hierarchy is introduced by AMA4EA to support companies to automatically abstract data from enterprise systems to concepts, then to automatically create an EA model. AMA4EA was demonstrated at an Industry 4.0 laboratory. The demonstration showed that AMA4EA could abstract detailed data from the Enterprise Resource Planning (ERP) system and Manufacturing Execution System (MES) to be relevant for a business process model that provided a useful and simplified visualization of production process data. The model communicated the detailed business data in an easily understandable way to stakeholders. AMA4EA is an innovative and novel method that contributes new knowledge to EA research. The demonstration provides sufficient evidence that AMA4EA is useful and applicable in the Industry 4.0 environment.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124896746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modeling Approach for Getting to Win-Win in Industrial Collaboration under Strategic Coopetition","authors":"Vik Pant, E. Yu","doi":"10.7250/csimq.2019-19.02","DOIUrl":"https://doi.org/10.7250/csimq.2019-19.02","url":null,"abstract":"Interorganizational coopetition describes a relationship in which two or more organizations cooperate and compete simultaneously. Actors under coopetition cooperate to achieve collective objectives and compete to maximize their individual benefits. Such relationships are based on the logic of win-win strategies that necessitate decision-makers in coopeting organizations to develop relationships that yield favorable outcomes for each actor. We follow a strategic modeling approach that combines i* goal-modeling to explore strategic alternatives of actors with Game Tree decision-modeling to evaluate the actions and payoffs of those players. In this article, we elaborate on the method, illustrating one particular pathway towards a positive-sum outcome – through the introduction of an intermediary actor. This article demonstrates the activation of one component in this guided approach of systematically searching for alternatives to generate a new win-win strategy. We also present a meta-model for relating i* models and Game Trees. A hypothetical industrial scenario focusing on the Industrial Data Space, which is a platform that can help organizations to overcome obstacles to data sharing in a coopetitive ecosystem, is used to explain this approach.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129696435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selected Topics on Business Informatics: Editorial Introduction to Issue 19 of CSIMQ","authors":"K. Sandkuhl, J. Zdravkovic","doi":"10.7250/csimq.2019-19.00","DOIUrl":"https://doi.org/10.7250/csimq.2019-19.00","url":null,"abstract":"The objective of this thematic issue was twofold. The first it was to present selected research results of the 17th International Conference on Perspectives in Business Informatics Research (BIR2018) in Stockholm, Sweden, in September 24–26, 2018. The conference created a productive forum for researchers and practitioners on the specific topic – Business Resilience, with the intention of exploring organizational and information system resilience in congruence. Top papers were selected by the Program Chairs Prof. Janis Grabis and Prof. Jelena Zdravkovic to submit extended versions for a possible publication to this thematic issue. The second objective was to consider external candidate submissions for bringing attention to recent research in the Business Informatics discipline and thus make this issue even more actual. Five articles were selected that report on research in ecosystem architecture management, strategic coopetition, deriving enterprise architecture model from data, hierarchic viewpoints in control compliance assessments, and operationalizing enterprise IT architecture.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Robert Lagerström, Alan MacCormack, David Dreyfus, Carliss Y. Baldwin
{"title":"A Methodology for Operationalizing Enterprise IT Architecture and Evaluating its Modifiability","authors":"Robert Lagerström, Alan MacCormack, David Dreyfus, Carliss Y. Baldwin","doi":"10.7250/CSIMQ.2019-19.05","DOIUrl":"https://doi.org/10.7250/CSIMQ.2019-19.05","url":null,"abstract":"Recent contributions to information systems theory suggest that the primary role of a firm’s information technology (IT) architecture is to facilitate, and therefore ensure the continued alignment of a firm’s IT investments with a constantly changing business environment. Despite the advances we lack robust methods with which to operationalize enterprise IT architecture, in a way that allows us to analyze performance, in terms of the ability to adapt and evolve over time. We develop a methodology for analyzing enterprise IT architecture based on “Design Structure Matrices” (DSMs), which capture the coupling between all components in the architecture. Our method addresses the limitations of prior work, in that it i) captures the architecture “in-use” as opposed to high level plans or conceptual models; ii) identifies discrete layers in the architecture associated with different technologies; iii) reveals the “flow of control” within the architecture; and iv) generates measures that can be used to analyze performance. We apply our methodology to a dataset from a large pharmaceutical firm. We show that measures of coupling derived from an IT architecture DSM predict IT modifiability – defined as the cost to change software applications. Specifically, applications that are tightly coupled cost significantly more to change.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"10 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127377984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discussing Hierarchic Viewpoints Theoretical Considerations and a Practical Example","authors":"Dierk Jugel, Christian M. Schweda, A. Zimmermann","doi":"10.7250/csimq.2019-19.04","DOIUrl":"https://doi.org/10.7250/csimq.2019-19.04","url":null,"abstract":"Enterprise Governance, Risk and Compliance (GRC) systems are key to managing risks threatening modern enterprises from many different angles. Key constituent to GRC systems is the definition of Controls that are implemented on the different layers of an Enterprise Architecture (EA). Controls become part of a “Concern” of the EA, which allows to use an EA viewpoint to cover Control compliance assessments. In this article we explore this relationship further, derive a metamodel linking Control and EA, and elicit how this linkage give rise to a hierarchic understanding of the viewpoint concept for EAs. We complement these considerations with an expository instantiation in a cockpit for Control compliance applied in an international enterprise in the insurance industry.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125886700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Maps to Bridge the Socio-technical Gap: A Practitioner's Experience Report","authors":"P. Mauri","doi":"10.7250/csimq.2019-18.05","DOIUrl":"https://doi.org/10.7250/csimq.2019-18.05","url":null,"abstract":"In my projects, devoted to the implementation of management systems, it is necessary to take into account several social and technical features and link and merge social and technical environments. To bridge the gap between these environments, maps and mapping are a useful support. In this article these topics are presented through a cluster of projects I developed in large sized companies, where exploring the context is difficult and time consuming and the relationships are structured as a complex network. I focus on the maps that describe relationships between organizational structures and IT technologies; and describe in detail two cases: a success and a failure of my socio-technical approach. The lessons learned are presented and proposed as a reflection on the socio-technical perspective.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122680259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Erjon Zoto, Mazaher Kianpour, S. Kowalski, E. A. Lopez-Rojas
{"title":"A Socio-technical Systems Approach to Design and Support Systems Thinking in Cybersecurity and Risk Management Education","authors":"Erjon Zoto, Mazaher Kianpour, S. Kowalski, E. A. Lopez-Rojas","doi":"10.7250/csimq.2019-18.04","DOIUrl":"https://doi.org/10.7250/csimq.2019-18.04","url":null,"abstract":"Cybersecurity decisions are made across a range of social, technical, economic, regulatory and political domains. There is a gap between what companies and institutions plan to do while developing their internal IS-related policies and what should be done according to a multi-stakeholder system perspective in this area. Our task as researchers is to bridge this gap by offering potential solutions. The aim of our work is to promote the usage of the socio-technical systems (STS) approach to support the emerging role of systems thinking in cybersecurity education, using simulation as a supporting tool for learning. Meanwhile, new trends in cybersecurity curricula suggest an important shift toward new thinking approaches such as adversarial and systems thinking. We explored individuals’ adversarial and systems thinking skills in an open agent-based simulated environment and subsequently assessed the impact based on a participant survey. We discuss these results and point to directions for further investigation. The second contribution of the article is the provision of a tool for developing target users’ skills in making quantitative risk decisions and giving them a deeper understanding of the importance and use of key indices in the cyber risk management process.","PeriodicalId":416219,"journal":{"name":"Complex Syst. Informatics Model. Q.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122392380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}